options.py 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. #!/usr/bin/env python3
  2. # -*- coding: utf-8 -*-"
  3. """
  4. This file is part of the UFONet project, https://ufonet.03c8.net
  5. Copyright (c) 2013/2022 | psy <epsylon@riseup.net>
  6. You should have received a copy of the GNU General Public License along
  7. with UFONet; if not, write to the Free Software Foundation, Inc., 51
  8. Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
  9. """
  10. import optparse, math
  11. class UFONetOptions(optparse.OptionParser):
  12. def __init__(self, *args):
  13. self.zombies_file = "botnet/zombies.txt" # set source path to retrieve 'zombies'
  14. self.aliens_file = "botnet/aliens.txt" # set source path to retrieve 'aliens'
  15. self.droids_file = "botnet/droids.txt" # set source path to retrieve 'droids'
  16. self.ucavs_file = "botnet/ucavs.txt" # set source path to retrieve 'ucavs'
  17. self.rpcs_file = "botnet/rpcs.txt" # set source path to retrieve 'rpcs'
  18. self.dnss_file = "botnet/dns.txt" # set source path to retrieve 'dnss'
  19. self.ntps_file = "botnet/ntp.txt" # set source path to retrieve 'ntps'
  20. self.snmps_file = "botnet/snmp.txt" # set source path to retrieve 'snmp'
  21. self.dorks_file = "botnet/dorks.txt" # set source path to retrieve 'dorks'
  22. self.nodes_file = "data/nodes.txt" # set source path to retrieve 'nodes'
  23. self.globalnet_file = "data/globalnet.txt" # set source path to retrieve 'globalnet'
  24. self.sengines = self.extract_sengines()
  25. self.zombies = int(self.extract_zombies())
  26. self.aliens = int(self.extract_aliens())
  27. self.droids = int(self.extract_droids())
  28. self.ucavs = int(self.extract_ucavs())
  29. self.rpcs = int(self.extract_rpcs())
  30. self.dnss = int(self.extract_dnss())
  31. self.ntps = int(self.extract_ntps())
  32. self.snmps = int(self.extract_snmps())
  33. self.dorks = int(self.extract_dorks())
  34. self.nodes = int(self.extract_nodes())
  35. self.globalnet = int(self.extract_globalnet())
  36. self.tools = self.extract_tools()
  37. self.etools = self.extra_tools()
  38. self.weapons = self.extract_weapons()
  39. self.ebotnet = self.electronic_botnet()
  40. self.eweapons = self.extra_weapons()
  41. self.total_botnet = str(self.zombies+self.aliens+self.droids+self.ucavs+self.rpcs+self.dnss+self.ntps+self.snmps)
  42. self.d_energy = self.extract_d_energy()
  43. self.y_energy = self.extract_y_energy()
  44. self.x_energy = self.extract_x_energy()
  45. self.formula = self.formula_x_energy()
  46. optparse.OptionParser.__init__(self,
  47. description='\n{(D)enial(OFF)ensive(S)ervice[ToolKit]}-{by_(io=psy+/03c8.net)}',
  48. prog='./ufonet',
  49. version='\nVersion: 1.8 '+"\u25BC "+'[DPh] DarK-PhAnT0m! '+"\u25BC"+'\n')
  50. self.add_option("-v", "--verbose", action="store_true", dest="verbose", help="active verbose on requests")
  51. self.add_option("--examples", action="store_true", dest="examples", help="print some examples")
  52. self.add_option("--timeline", action="store_true", dest="timeline", help="show program's code timeline")
  53. self.add_option("--update", action="store_true", dest="update", help="check for latest stable version")
  54. self.add_option("--check-tor", action="store_true", dest="checktor", help="check to see if Tor is used properly")
  55. self.add_option("--force-ssl", action="store_true", dest="forcessl", help="force usage of SSL/HTTPS requests")
  56. self.add_option("--force-yes", action="store_true", dest="forceyes", help="set 'YES' to all questions")
  57. self.add_option("--gui", action="store_true", dest="web", help="start GUI (UFONet Web Interface)")
  58. group9 = optparse.OptionGroup(self, "*Tools*")
  59. group9.add_option("--crypter", action="store_true", dest="cryptomsg", help="Crypt/Decrypt messages using AES256+HMAC-SHA1")
  60. group9.add_option("--network", action="store_true", dest="shownet", help="Show info about your network (MAC, IPs)")
  61. group9.add_option("--xray", action="store", dest="xray", help="Fast port scanner (ex: --xray 'http(s)://target.com')")
  62. group9.add_option("--xray-ps", action="store", dest="xrayps", help="Set range of ports to scan (ex: --xray-ps '1-1024')")
  63. self.add_option_group(group9)
  64. group1 = optparse.OptionGroup(self, "*Configure Request(s)*")
  65. group1.add_option("--proxy", action="store", dest="proxy", help="Use proxy server (ex: --proxy 'http://127.0.0.1:8118')")
  66. group1.add_option("--user-agent", action="store", dest="agent", help="Use another HTTP User-Agent header (default: SPOOFED)")
  67. group1.add_option("--referer", action="store", dest="referer", help="Use another HTTP Referer header (default: SPOOFED)")
  68. group1.add_option("--host", action="store", dest="host", help="Use another HTTP Host header (default: NONE)")
  69. group1.add_option("--xforw", action="store_true", dest="xforw", help="Set your HTTP X-Forwarded-For with random IP values")
  70. group1.add_option("--xclient", action="store_true", dest="xclient", help="Set your HTTP X-Client-IP with random IP values")
  71. group1.add_option("--timeout", action="store", dest="timeout", type="int", help="Select your timeout (default: 5)")
  72. group1.add_option("--retries", action="store", dest="retries", type="int", help="Retries when the connection timeouts (default: 0)")
  73. group1.add_option("--threads", action="store", dest="threads", type="int", help="Max number of concurrent HTTP requests (default: 5)")
  74. group1.add_option("--delay", action="store", dest="delay", type="int", help="Delay between each HTTP request (default: 0)")
  75. self.add_option_group(group1)
  76. group2 = optparse.OptionGroup(self, "*Search for 'Zombies'*")
  77. group2.add_option("--auto-search", action="store_true", dest="autosearch", help="Search automatically for 'zombies' (may take time!)")
  78. group2.add_option("-s", action="store", dest="search", help="Search from a 'dork' (ex: -s 'proxy.php?url=')")
  79. group2.add_option("--sd", action="store", dest="dorks", help="Search from 'dorks' file (ex: --sd 'botnet/dorks.txt')")
  80. group2.add_option("--sn", action="store", dest="num_results", help="Set max number of results for engine (default: 10)")
  81. group2.add_option("--se", action="store", dest="engine", help="Search engine for 'dorking' (default: DuckDuckGo)")
  82. group2.add_option("--sa", action="store_true", dest="allengines", help="Search massively using all engines (may take time!)")
  83. group2.add_option("--sax", action="store", dest="ex_engine", help="Exclude engines when mass searching (ex: 'Bing,Yahoo')")
  84. self.add_option_group(group2)
  85. group3 = optparse.OptionGroup(self, "*Test Botnet*")
  86. group3.add_option("--test-offline", action="store_true", dest="testoffline", help="Fast check to discard offline bots")
  87. group3.add_option("--test-all", action="store_true", dest="testall", help="Update ALL botnet status (may take time!)")
  88. group3.add_option("-t", action="store", dest="test", help="Update 'zombies' status (ex: -t 'botnet/zombies.txt')")
  89. group3.add_option("--test-rpc", action="store_true", dest="testrpc", help="Update 'reflectors' status (ex: --test-rpc)")
  90. group3.add_option("--attack-me", action="store_true", dest="attackme", help="Order 'zombies' to attack you (NAT required!)")
  91. self.add_option_group(group3)
  92. group4 = optparse.OptionGroup(self, "*Community*")
  93. group4.add_option("--deploy", action="store_true", dest="deploy", help="Deploy data to share in '/var/www/ufonet/'")
  94. group4.add_option("--grider", action="store_true", dest="grider", help="Create a 'grider' to share 'stats/wargames/messages'")
  95. group4.add_option("--blackhole", action="store_true", dest="blackhole", help="Generate a 'blackhole' to share 'zombies'")
  96. group4.add_option("--download-nodes", action="store_true", dest="download_nodes", help="Download 'zombies' from Radar")
  97. group4.add_option("--up-to", action="store", dest="upip", help="Upload 'zombies' to IP (ex: --up-to '<IP>')")
  98. group4.add_option("--down-from", action="store", dest="dip", help="Download 'zombies' from IP (ex: --down-from '<IP>')")
  99. group4.add_option("--upload-zombies", action="store_true", dest="upload", help="Upload 'zombies' to Community")
  100. group4.add_option("--download-zombies", action="store_true", dest="download", help="Download 'zombies' from Community")
  101. group4.add_option("--upload-github", action="store_true", dest="upload_github", help="Upload 'zombies' to GitHub")
  102. group4.add_option("--download-github", action="store_true", dest="download_github", help="Download 'zombies' from GitHub")
  103. self.add_option_group(group4)
  104. group5 = optparse.OptionGroup(self, "*Research Target*")
  105. group5.add_option("-i", action="store", dest="inspect", help="Search biggest file (ex: -i 'http(s)://target.com')")
  106. group5.add_option("-x", action="store", dest="abduction", help="Examine webserver configuration (+CVE, +WAF detection)")
  107. self.add_option_group(group5)
  108. group6 = optparse.OptionGroup(self, "*Configure Attack(s)*")
  109. group6.add_option("-a", action="store", dest="target", help="[DDoS] attack a target (ex: -a 'http(s)://target.com')")
  110. group6.add_option("-f", action="store", dest="target_list", help="[DDoS] attack a list of targets (ex: -f 'targets.txt')")
  111. group6.add_option("-b", action="store", dest="place", help="Set place to attack (ex: -b '/path/big.jpg')")
  112. group6.add_option("-r", action="store", dest="rounds", help="Set number of rounds (ex: -r '1000') (default: 1)")
  113. self.add_option_group(group6)
  114. group7 = optparse.OptionGroup(self, "*Extra Configuration(s)*")
  115. group7.add_option("--no-droids", action="store_true", dest="disabledroids", help="Disable 'DROIDS' redirectors")
  116. group7.add_option("--no-ucavs", action="store_true", dest="disableucavs", help="Disable 'UCAVS' checkers")
  117. group7.add_option("--no-aliens", action="store_true", dest="disablealiens", help="Disable 'ALIENS' web abuse")
  118. group7.add_option("--no-rpcs", action="store_true", dest="disablerpcs", help="Disable 'XML-RPCs' reflectors")
  119. group7.add_option("--no-head", action="store_true", dest="disablehead", help="Disable 'Is target up?' starting check")
  120. group7.add_option("--no-scan", action="store_true", dest="disablescanner", help="Disable 'Scan shields' round check")
  121. group7.add_option("--no-purge", action="store_true", dest="disablepurge", help="Disable 'Zombies purge' round check")
  122. group7.add_option("--expire", action="store", dest="expire", help="Set expire time for 'Zombies purge' (default: 30)")
  123. self.add_option_group(group7)
  124. group8 = optparse.OptionGroup(self, "*Extra Attack(s)*")
  125. group8.add_option("--fraggle", action="store", dest="fraggle", help="[DDoS] 'UDP amplification' (ex: --fraggle 101)")
  126. group8.add_option("--tachyon", action="store", dest="tachyon", help="[DDoS] 'DNS amplification' (ex: --tachyon 101)")
  127. group8.add_option("--monlist", action="store", dest="monlist", help="[DDoS] 'NTP amplification' (ex: --monlist 101)")
  128. group8.add_option("--smurf", action="store", dest="smurf", help="[DDoS] 'ICMP amplification' (ex: --smurf 101)")
  129. group8.add_option("--sniper", action="store", dest="sniper", help="[DDoS] 'SNMP amplification' (ex: --sniper 101)")
  130. group8.add_option("--spray", action="store", dest="spray", help="[DDoS] 'TCP-SYN reflection' (ex: --spray 101)")
  131. group8.add_option("--db", action="store", dest="dbstress", help="[DDoS] 'HTTP-DB flood' (ex: --db 'search.php?q=')")
  132. group8.add_option("--loic", action="store", dest="loic", help="[ DoS] 'HTTP-FAST flood' (ex: --loic 101)")
  133. group8.add_option("--loris", action="store", dest="loris", help="[ DoS] 'HTTP-SLOW flood' (ex: --loris 101)")
  134. group8.add_option("--ufosyn", action="store", dest="ufosyn", help="[ DoS] 'TCP-SYN flood' (ex: --ufosyn 101)")
  135. group8.add_option("--xmas", action="store", dest="xmas", help="[ DoS] 'TCP-XMAS flood' (ex: --xmas 101)")
  136. group8.add_option("--nuke", action="store", dest="nuke", help="[ DoS] 'TCP-STARVATION flood' (ex: --nuke 101)")
  137. group8.add_option("--ufoack", action="store", dest="ufoack", help="[ DoS] 'TCP-ACK flood' (ex: --ufoack 101)")
  138. group8.add_option("--uforst", action="store", dest="uforst", help="[ DoS] 'TCP-RST flood' (ex: --uforst 101)")
  139. group8.add_option("--droper", action="store", dest="droper", help="[ DoS] 'IP-FRAGMENTATION flood' (ex: --droper 101)")
  140. group8.add_option("--overlap", action="store", dest="overlap", help="[ DoS] 'IP-OVERLAP flood' (ex: --overlap 101)")
  141. group8.add_option("--pinger", action="store", dest="pinger", help="[ DoS] 'ICMP flood' (ex: --pinger 101)")
  142. group8.add_option("--ufoudp", action="store", dest="ufoudp", help="[ DoS] 'UDP flood' (ex: --ufoudp 101)")
  143. self.add_option_group(group8)
  144. def extract_sengines(self):
  145. sengines = ["Yahoo", "Bing", "DuckDuckGo"]
  146. sengines = len(sengines)
  147. return sengines
  148. def extract_tools(self):
  149. tools = ["CYPTER", "NETWORK", "XRAY", "WARPER", "INSPECTOR", "ABDUCTOR", "AI.BOTNET", "AI.GUI", "AI.STATS", "AI.EVASIVE", "BLACKHOLE", "AI.LINKS", "AI.STREAMS", "AI.BROWSER", "AI.GLOBALNET", "AI.GAMES"]
  150. tools = len(tools)
  151. return tools
  152. def extra_tools(self):
  153. etools = '\n _> ABDUCTOR * Defensive Shield Detector'
  154. etools += '\n _> AI.BOTNET * Intelligent Attack System'
  155. etools += '\n _> AI.BROWSER * Private Sandbox Browser'
  156. etools += '\n _> AI.EVASIVE * Automatic Evasion System'
  157. etools += '\n _> AI.GAMES * Fun & Games Center'
  158. etools += '\n _> AI.GEO * Geomapping System'
  159. etools += '\n _> AI.GLOBAL_NET * Global UFONET Network'
  160. etools += '\n _> AI.LIBRARY * Public (data.Links) Library'
  161. etools += '\n _> AI.STATS * Live Stats Reporter'
  162. etools += '\n _> AI.STREAMING * Video (data.Streams) Player'
  163. etools += '\n _> AI.WEB * Graphical User Web-Interface'
  164. etools += '\n _> BLACKHOLE * Warper (p2p.Botnet) Generator'
  165. etools += '\n _> CRYPTER * Telegram (crypto.Community) System'
  166. etools += '\n _> INSPECTOR * Objective Scanning Crawler'
  167. etools += '\n _> AI.NETWORK * Network (MACs, IPs) Reporter'
  168. etools += '\n _> XRAY * Ultra-Fast Ports Scanner'
  169. return etools
  170. def extract_weapons(self):
  171. weapons = ["SMURF", "TACHYON", "MONLIST", "SNIPER", "SPRAY", "DBSTRESS", "LOIC", "LORIS", "UFOSYN", "XMAS", "NUKE", "UFOACK", "UFORST", "DROPER", "OVERLAP", "PINGER", "UFOUPD", "FRAGGLE"]
  172. weapons = len(weapons)
  173. return weapons
  174. def extra_weapons(self):
  175. eweapons = '\n _> FRAGGLE * [DDoS] UDP Amplificator'
  176. eweapons += '\n _> TACHYON * [DDoS] DNS Amplificator'
  177. eweapons += '\n _> MONLIST * [DDoS] NTP Amplificator'
  178. eweapons += '\n _> SMURF * [DDoS] ICMP Amplificator'
  179. eweapons += '\n _> SNIPER * [DDoS] SNMP Amplificator'
  180. eweapons += '\n _> SPRAY * [DDoS] TCP SYN Reflector'
  181. eweapons += '\n _> DBSTRESS * [DDoS] HTTP-DB Stresser'
  182. eweapons += '\n _> LOIC * [ DoS] HTTP-FAST Requester'
  183. eweapons += '\n _> LORIS * [ DoS] HTTP-SLOW Requester'
  184. eweapons += '\n _> UFOSYN * [ DoS] TCP-SYN Flooder'
  185. eweapons += '\n _> XMAS * [ DoS] TCP-XMAS Flooder'
  186. eweapons += '\n _> NUKE * [ DoS] TCP-STARVATION Flooder'
  187. eweapons += '\n _> UFOACK * [ DoS] TCP-ACK Flooder'
  188. eweapons += '\n _> UFORST * [ DoS] TCP-RST Flooder'
  189. eweapons += '\n _> DROPER * [ DoS] IP-FRAGMENTATION Flooder'
  190. eweapons += '\n _> OVERLAP * [ DoS] IP-OVERLAP Flooder'
  191. eweapons += '\n _> PINGER * [ DoS] ICMP Flooder'
  192. eweapons += '\n _> UFOUDP * [ DoS] UDP Flooder'
  193. return eweapons
  194. def electronic_botnet(self):
  195. ebotnet = '\n _> ZOMBIES [ '+ format(int(self.zombies), '08d')+ ' ] * HTTP GET (simple)'
  196. ebotnet += '\n _> DROIDS [ '+ format(int(self.droids), '08d')+ ' ] * HTTP GET (complex)'
  197. ebotnet += '\n _> UCAVs [ '+ format(int(self.ucavs), '08d')+ ' ] * WebAbuse (multiple)'
  198. ebotnet += '\n _> ALIENS [ '+ format(int(self.aliens), '08d')+ ' ] * HTTP POST'
  199. ebotnet += '\n _> X-RPCs [ '+ format(int(self.rpcs), '08d')+ ' ] * XML-RPC'
  200. ebotnet += '\n _> DNSs [ '+ format(int(self.dnss), '08d')+ ' ] * DNS'
  201. ebotnet += '\n _> NTPs [ '+ format(int(self.ntps), '08d')+ ' ] * NTP'
  202. ebotnet += '\n _> SNMPs [ '+ format(int(self.snmps), '08d')+ ' ] * SNMP'
  203. return ebotnet
  204. def extract_zombies(self):
  205. try:
  206. f = open(self.zombies_file)
  207. zombies = len(f.readlines())
  208. f.close()
  209. except:
  210. zombies = "broken!"
  211. return zombies
  212. def extract_aliens(self):
  213. try:
  214. f = open(self.aliens_file)
  215. aliens = len(f.readlines())
  216. f.close()
  217. except:
  218. aliens = "broken!"
  219. return aliens
  220. def extract_droids(self):
  221. try:
  222. f = open(self.droids_file)
  223. droids = len(f.readlines())
  224. f.close()
  225. except:
  226. droids = "broken!"
  227. return droids
  228. def extract_ucavs(self):
  229. try:
  230. f = open(self.ucavs_file)
  231. ucavs = len(f.readlines())
  232. f.close()
  233. except:
  234. ucavs = "broken!"
  235. return ucavs
  236. def extract_rpcs(self):
  237. try:
  238. f = open(self.rpcs_file)
  239. rpcs = len(f.readlines())
  240. f.close()
  241. except:
  242. rpcs = "broken!"
  243. return rpcs
  244. def extract_dnss(self):
  245. try:
  246. f = open(self.dnss_file)
  247. dnss = len(f.readlines())
  248. f.close()
  249. except:
  250. dnss = "broken!"
  251. return dnss
  252. def extract_ntps(self):
  253. try:
  254. f = open(self.ntps_file)
  255. ntps = len(f.readlines())
  256. f.close()
  257. except:
  258. ntps = "broken!"
  259. return ntps
  260. def extract_snmps(self):
  261. try:
  262. f = open(self.snmps_file)
  263. snmps = len(f.readlines())
  264. f.close()
  265. except:
  266. snmps = "broken!"
  267. return snmps
  268. def extract_dorks(self):
  269. try:
  270. f = open(self.dorks_file)
  271. dorks = len(f.readlines())
  272. f.close()
  273. except:
  274. dorks = "broken!"
  275. return dorks
  276. def extract_nodes(self):
  277. try:
  278. f = open(self.nodes_file)
  279. nodes = len(f.readlines())
  280. f.close()
  281. except:
  282. nodes = "broken!"
  283. return nodes
  284. def extract_globalnet(self):
  285. try:
  286. f = open(self.globalnet_file)
  287. globalnet = len(f.readlines())
  288. f.close()
  289. except:
  290. globalnet = "broken!"
  291. return globalnet
  292. def extract_d_energy(self): # Dark Energy Density = (Fluctuations)*(Baryon)*(Event horizont sphere)/(Age of the Universe)
  293. d_density = 0.8288*0.05
  294. d_sphere = d_density * 4 * math.pi * 16 **2
  295. d_energy = d_sphere/13.64**2
  296. return d_energy
  297. def extract_y_energy(self): # Y-Energy = (Momento Entropy)*(Energy of Invariability lost)
  298. y_entropy = int(self.total_botnet)+int(self.dorks)+int(self.sengines)+int(self.tools)+int(self.weapons)+int(self.nodes)+int(self.globalnet)
  299. y_energy = y_entropy * 0.49
  300. return y_energy
  301. def extract_x_energy(self): # X-Energy = (Y-Energy)*(Dark Energy Density)
  302. x_energy = self.y_energy / self.d_energy
  303. return x_energy
  304. def formula_x_energy(self): # X-Energy Final Formula
  305. formula = 'X'+"\u2091"+''+"\N{SUBSCRIPT EIGHT}"' = '+"\u03A8"+'/'+"\u03A9"+''+"\u028C"+' = ('+"\u03A3"+''+"\u2091"+')/('+"\u03C3"+''+"\N{SUBSCRIPT EIGHT}"+'*'+"\u03A9"+'b*A'+"\u2091"+''+"\u2095"+'/t'+"\N{SUPERSCRIPT TWO}"+')\n '+ str(self.y_energy) + '*0.49/0.8288*0.05*4'+"\u03A0"+'16'+"\N{SUPERSCRIPT TWO}"+'/13.64'+"\N{SUPERSCRIPT TWO}"+''
  306. return formula
  307. def get_options(self, user_args=None):
  308. (options, args) = self.parse_args(user_args)
  309. if (not options.test and not options.testrpc and not options.target and not options.target_list and not options.checktor and not options.search and not options.dorks and not options.inspect and not options.abduction and not options.update and not options.download_nodes and not options.download and not options.download_github and not options.upload and not options.upload_github and not options.web and not options.attackme and not options.upip and not options.dip and not options.blackhole and not options.grider and not options.cryptomsg and not options.shownet and not options.xray and not options.timeline and not options.examples and not options.autosearch and not options.testoffline and not options.testall and not options.deploy):
  310. print('='*75, "\n")
  311. print("888 888 8888888888 .d88888b. 888b 888 888 ")
  312. print("888 888 888 d88P" "Y888b 8888b 888 888 ")
  313. print("888 888 888 888 888 88888b 888 888 ")
  314. print("888 888 8888888 888 888 888Y88b 888 .d88b. 888888 ")
  315. print("888 888 888 888 888 888 Y88b888 d8P Y8b 888 ")
  316. print("888 888 888 888 888 888 Y88888 88888888 888 ")
  317. print("Y88b. .d88P 888 Y88b. .d88P 888 Y8888 Y8b. Y88b. ")
  318. print(" 'Y88888P' 888 'Y88888P' 888 Y888 'Y8888 'Y8888")
  319. print(self.description, "\n")
  320. print('='*75)
  321. self.version = self.version.replace("\n","")
  322. print('\n '+"\u25BC "+self.version+'\n')
  323. print("-"*75+"\n")
  324. print(' -> _BOTNET [DDoS]: [', format(int(self.total_botnet), '08d'),'] '+"\u25BC"+' Bots (Available)'+ self.ebotnet)
  325. print('\n -> _DORKS: [', format(int(self.dorks), '08d'), '] '+"\u25BC"+' Open Redirect (CWE-601) patterns')
  326. print(' _> ENGINES [', format(int(self.sengines), '08d'), '] * Dorking providers (Working)')
  327. print('\n -> _PEERS: [', format(int(self.globalnet)+int(self.nodes), '08d'), '] '+"\u25BC"+' Blackholes (Community)')
  328. print(' _> WARPS [', format(int(self.nodes), '08d'), '] * Static W.A.R.P.S')
  329. print(' _> NODES [', format(int(self.globalnet), '08d'), '] * Dynamic Radar Detector')
  330. print('\n -> _TOOLS: [', format(int(self.tools), '08d'),'] '+"\u25BC"+' Extra Tools (Misc)'+self.etools)
  331. print('\n -> _WEAPONS: [', format(int(self.weapons), '08d'),'] '+"\u25BC"+' Extra Attacks (DDoS & DoS)'+ self.eweapons)
  332. print('\n -> _X-ENERGY [X'+"\u2091"+''+"\N{SUBSCRIPT EIGHT}"+']: [', format(int(self.x_energy), '08d'),'] '+"\u25BC"+' '+self.formula+'\n')
  333. print("-"*75+"\n")
  334. print(" -> _HELP: ./ufonet --help (or ./ufonet -h)")
  335. print(' -> _EXAMPLES: ./ufonet --examples')
  336. print("\n -> _WEB_INTERFACE: ./ufonet --gui\n")
  337. print('='*75, "\n")
  338. return False
  339. return options