-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathghost-menu.sh
More file actions
95 lines (92 loc) · 4.08 KB
/
ghost-menu.sh
File metadata and controls
95 lines (92 loc) · 4.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
#!/bin/bash
# Ghost-Framework - Full CyberSec Edition v2.0
# Author: Steve Vandenbossche (ecomdesign.be)
# Platform: Raspberry Pi 5 - ParrotOS ARM64
# === Imports ===
source ~/ghost00ls/lib/colors.sh
source ~/ghost00ls/lib/banner.sh
source ~/ghost00ls/lib/config.sh
# === Menu Principal ===
while true; do
clear
banner
echo -e "${CYAN}================= MENU PRINCIPAL =================${NC}"
echo
echo -e "${GREEN} 1) 🤖 GhostGPT LIVE${NC}"
echo -e "${GREEN} 2) 🛠️ Installation des outils${NC}"
echo -e "${GREEN} 3) 🧪 Labs / CTF / Vuln Labs${NC}"
echo
echo -e "${YELLOW}--- Offensive Security ---${NC}"
echo -e "${CYAN} 4) 💣 Pentest${NC}"
echo -e "${CYAN} 5) 🕵️ Red Team${NC}"
echo -e "${CYAN} 6) 📡 Wireless / Mobile / IoT${NC}"
echo -e "${CYAN} 7) 🧨 Exploit-Dev / Reverse${NC}"
echo
echo -e "${YELLOW}--- Defensive Security ---${NC}"
echo -e "${CYAN} 8) 🔐 Blue Team${NC}"
echo -e "${CYAN} 9) 🚨 Incident Response / Threat Hunting${NC}"
echo -e "${CYAN}10) 🧬 Forensics / Malware Analysis${NC}"
echo -e "${CYAN}11) 📊 SIEM / Monitoring${NC}"
echo
echo -e "${YELLOW}--- Cross-Domain & Emerging ---${NC}"
echo -e "${CYAN}12) 🌐 Web / AppSec${NC}"
echo -e "${CYAN}13) ☁️ Cloud / Container / DevSecOps${NC}"
echo -e "${CYAN}14) 🎭 Social Engineering / Awareness${NC}"
echo -e "${CYAN}15) ⚖️ Legal-Lab (scénarios légaux)${NC}"
echo -e "${CYAN}16) 🛰️ OSINT / Threat Intel${NC}"
echo
echo -e "${YELLOW}--- Governance & Knowledge ---${NC}"
echo -e "${CYAN}17) 📜 Compliance / Standards (NIST, ISO, NIS2…)${NC}"
echo -e "${CYAN}18) 🎓 Training & Learn (TryHackMe / HTB / Labs)${NC}"
echo
echo -e "${YELLOW}--- System & Automation ---${NC}"
echo -e "${CYAN}19) 🧱 System & Hardening${NC}"
echo -e "${CYAN}20) 📂 Logs${NC}"
echo -e "${CYAN}21) 📝 Reporting & Export${NC} ${GREEN}[NEW]${NC}"
echo -e "${CYAN}22) 🤖 Automation & Scheduling${NC} ${GREEN}[NEW]${NC}"
echo
echo -e "${RED}0) ❌ Quitter${NC}"
echo
read -p "👉 Choisis une option : ${NC}" choice
case $choice in
1) bash ~/ghost00ls/modules/ghostgpt.sh ;;
2) bash ~/ghost00ls/modules/install.sh ;;
3) bash ~/ghost00ls/modules/labs.sh ;;
4) bash ~/ghost00ls/modules/offensive/pentest.sh ;;
5) bash ~/ghost00ls/modules/offensive/redteam.sh ;;
6) bash ~/ghost00ls/modules/offensive/wireless.sh ;;
7) bash ~/ghost00ls/modules/offensive/exploitdev.sh ;;
8) bash ~/ghost00ls/modules/defensive/blueteam.sh ;;
9) bash ~/ghost00ls/modules/defensive/ir_threat_hunting.sh ;;
10) bash ~/ghost00ls/modules/defensive/forensics.sh ;;
11) bash ~/ghost00ls/modules/defensive/siem.sh ;;
12) bash ~/ghost00ls/modules/cross/webappsec.sh ;;
13) bash ~/ghost00ls/modules/cross/cloud.sh ;;
14) bash ~/ghost00ls/modules/cross/socialeng.sh ;;
15) bash ~/ghost00ls/modules/cross/legallab.sh ;;
16)
clear
banner
echo -e "${CYAN}=== 🛰️ OSINT / Threat Intel ===${NC}"
echo
echo -e "${GREEN}1) 🔍 OSINT Tools${NC}"
echo -e "${GREEN}2) 🦠 Threat Intelligence (VirusTotal, AbuseIPDB, etc.)${NC}"
echo -e "${RED}0) Retour${NC}"
echo
read -p "👉 Choix : " osint_choice
case $osint_choice in
1) bash ~/ghost00ls/modules/cross/osint.sh ;;
2) bash ~/ghost00ls/modules/cross/threat_intel.sh ;;
0) ;;
esac
;;
17) bash ~/ghost00ls/modules/governance/compliance.sh ;;
18) bash ~/ghost00ls/modules/governance/training.sh ;;
19) bash ~/ghost00ls/modules/system/system_menu.sh ;;
20) bash ~/ghost00ls/modules/logs.sh ;;
21) bash ~/ghost00ls/modules/reporting.sh ;;
22) bash ~/ghost00ls/modules/automation.sh ;;
0) echo -e "${GREEN}Bye 👻 ${NC}"; exit 0 ;;
*) echo -e "${RED}Option invalide !${NC}"; sleep 1 ;;
esac
done