Beispiel #1
0
def enyx():
    enyx.title = "Enyx : An SNMP IPv6 Enumeration Tool"
    tool_dir = "/INFO-GATH/Tools/Enyx"
    if os.path.exists('/usr/local/bin/enyx'):
        shrts.prilogspc()
        os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        snmpversion = sanitize.bash_escape_restrictor(input("Whats the snmp Version (1 or 2c) : "))
        communitystring = sanitize.bash_escape_restrictor(input("Whats the Community string (public or private) : "))
        ipad = sanitize.bash_escape_restrictor(input("Whats the IP : "))
        shrts.prilogspc()
        os.system("python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py " + snmpversion + " " + communitystring + " " + ipad)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/enyx""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/enyx""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py >> /usr/local/bin/enyx")
        os.system("chmod +x /usr/local/bin/enyx")
        print(("You can now use " + "\033[91m" + enyx.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #2
0
def dirsearch():
    tool_dir = "/INFO-GATH/Tools/dirsearch"
    dirsearch.title = "DirSearch : Web path scanner "
    if os.path.exists('/usr/local/bin/DirSearch'):
        shrts.prilogspc()
        os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + dirsearch.title + "\033[90m")
        shrts.spc()
        choice = sanitize.bash_escape_restrictor(input("Select a Target : "))
        extchoice = sanitize.bash_escape_restrictor(input("Select an extention (php,asp,aspx ..) : "))
        shrts.spc()
        print("Cheatsheets that can help you with this :")
        shrts.spc()
        print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/file_enumeration.md \033[92m')
        shrts.popp()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py" + " -u " + choice + " -e " + extchoice)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + dirsearch.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + dirsearch.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/DirSearch""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/DirSearch""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py >> /usr/local/bin/DirSearch")
        os.system("chmod +x /usr/local/bin/DirSearch")
        print("You can now use " + "\033[91m" + dirsearch.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
def Nasnum():
    Nasnum.title = "Nasnum : The NAS Enumerator"
    tool_dir = "/INFO-GATH/Tools/Nasnum"
    if os.path.exists('/usr/local/bin/Nasnum'):
        shrts.prilogspc()
        os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Nasnum.title + "\033[90m")
        shrts.spc()
        smb = input("Want to grab Grab SMB info ? (Y/N) : ")
        nsf = input("Want to grab Grab NFS info ? (Y/N) : ")
        csnmp = input("Want to Check SNMP for connection data ? (Y/N) : ")
        anonftp = input("Want to Check for anonymous FTP and enumerate dirs/files ? (Y/N) : ")
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'nfs.*enum|nfs.*enum'")
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'smb.*enum|smb.*enum'")
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'ftp.*enum|ftp.*enum'")
        print(" \033[90m")
        shrts.pop()
        target = sanitize.bash_escape_restrictor(input("Select A Target : "))
        output = sanitize.bash_escape_restrictor(input("Select an output file : "))
        if not smb in no:
            smb = "-s"
        else:
            smb = ""
        if not nsf in no:
            nsf = "-n"
        else:
            nsf = ""
        if not csnmp in no:
            csnmp = "-b"
        else:
            csnmp = ""
        if not anonftp in no:
            anonftp = "-f"
        else:
            anonftp = ""
        shrts.prilogspc()
        os.system("Nasnum " + output + target + " " + smb + " " + nsf + " " + csnmp + " " + anonftp)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Nasnum.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Nasnum.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Nasnum""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Nasnum""")
        os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/nasnum.sh >> /usr/local/bin/Nasnum")
        os.system("chmod +x /usr/local/bin/Nasnum")
        print(("You can now use " + "\033[91m" + Nasnum.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #4
0
def findmyhash():
    findmyhash.title = "findmyhash : Python script to crack hashes using online services"
    tool_dir = "/ENCRYPTION/Tools/Findmyhash"
    if os.path.exists('/usr/local/bin/Findmyhash'):
        shrts.prilogspc()
        os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        print("""
              MD4       - RFC 1320
              MD5       - RFC 1321
              SHA1      - RFC 3174 (FIPS 180-3)
              SHA224    - RFC 3874 (FIPS 180-3)
              SHA256    - FIPS 180-3
              SHA384    - FIPS 180-3
              SHA512    - FIPS 180-3
              RMD160    - RFC 2857
              GOST      - RFC 5831
              WHIRLPOOL - ISO/IEC 10118-3:2004
              LM        - Microsoft Windows hash
              NTLM      - Microsoft Windows hash
              MYSQL     - MySQL 3, 4, 5 hash
              CISCO7    - Cisco IOS type 7 encrypted passwords
              JUNIPER   - Juniper Networks $9$ encrypted passwords
              LDAP_MD5  - MD5 Base64 encoded
              LDAP_SHA1 - SHA1 Base64 encoded
        """)
        algo = sanitize.bash_escape_restrictor(input("What Algo you want to use ? : "))
        hash = sanitize.bash_escape_restrictor(input("Enter the hash : "))
        os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " +algo+ " -h " +hash)
        shrts.okenc()
    else:
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Findmyhash""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Findmyhash""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py >> /usr/local/bin/Findmyhash")
        os.system("chmod +x /usr/local/bin/Findmyhash")
        print(("You can now use " + "\033[91m" + findmyhash.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okenc()
def inurlbr():
    inurlbr.title = "inurlbr : Python tool that helps RFI exploitation."
    tool_dir = "/EXPLOITATION/Tools/inurlbr"
    if os.path.exists('/usr/local/bin/inurlbr'):
        shrts.prilogspc()
        os.system(
            "git clone https://github.com/googleinurl/SCANNER-INURLBR.git " +
            shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + inurlbr.title + "\033[90m")
        shrts.spc()
        print("type : inurlbr --help for more options ")
        shrts.spc()
        print("Cheatsheets that can help you with this :")
        shrts.spc()
        print("\033[92m" + shrts.getinstalldir() + '/Google FU.pdf \033[92m')
        print("\033[92m" + shrts.getinstalldir() + '/GHDB.pdf \033[92m')
        shrts.spc()
        dork = sanitize.bash_escape_restrictor(
            input("\033[92m Choose a Dork : \033[90m"))
        savefile = sanitize.bash_escape_restrictor(
            input("\033[92m output file ? (Ex : results.txt) : \033[90m"))
        os.system("php " + shrts.getinstalldir() + tool_dir +
                  "/inurlbr.php --dork " + dork + " -s " + savefile)
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + inurlbr.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system(
            "git clone https://github.com/googleinurl/SCANNER-INURLBR.git " +
            shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + inurlbr.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/inurlbr""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/inurlbr""")
        os.system("echo php " + shrts.getinstalldir() + tool_dir +
                  "/inurlbr.php >> /usr/local/bin/inurlbr")
        os.system("chmod +x /usr/local/bin/inurlbr")
        print(("You can now use " + "\033[91m" + inurlbr.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okex()
Beispiel #6
0
def denumerator():
    denumerator.title = "denumerator.py : Enumerates list of subdomains"
    tool_dir = "/INFO-GATH/Tools/"
    if os.path.exists('/usr/local/bin/denumerator'):
        shrts.prilogspc()
        os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null)
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        targetlist = sanitize.bash_escape_restrictor(input("Enter the Targets list: "))
        shrts.prilogspc()
        os.system("denumerator -f " + targetlist + " -t 10")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null)
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/denumerator""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/denumerator""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/denumerator.py >> /usr/local/bin/denumerator")
        os.system("chmod +x /usr/local/bin/denumerator")
        print("You can now use " + "\033[91m" + denumerator.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Beispiel #7
0
def sherlock():

    sherlock.title = "sherlock : Find usernames across social networks"
    tool_dir = "/INFO-GATH/Tools/sherlock"
    if os.path.exists('/usr/local/bin/sherlock'):
        shrts.prilogspc()
        os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Enter the target username : "******"python " + shrts.getinstalldir() + tool_dir + "/sherlock.py " + target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install --upgrade setuptools && pip3 install -r requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/sherlock""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sherlock""")
        os.system("echo python " + shrts.getinstalldir() + tool_dir + "/sherlock.py >> /usr/local/bin/sherlock")
        os.system("chmod +x /usr/local/bin/sherlock")
        print(("You can now use " + "\033[91m" + sherlock.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #8
0
def wafw00f():
    wafw00f.title = "wafw00f : identify and fingerprint Web Application Firewall "
    tool_dir = "/INFO-GATH/Tools/wafw00f"
    if os.path.exists('/usr/local/bin/wafw00f'):
        shrts.prilogspc()
        os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.spc()
        domaine = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.prilogspc()
        os.system("wafw00f "  + domaine)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m")
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install" + null)
        os.system("ln -s /usr/bin/wafw00f /usr/local/bin/wafw00f")
        print(("You can now use " + "\033[91m" + wafw00f.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #9
0
def nmap():
    nmap.title = "Nmap : the Network Mapper "
    tool_dir = "/INFO-GATH/Tools/nmap"
    if os.path.exists('/usr/bin/nmap'):
        shrts.prilogspc()
        print("\033[92m           " + nmap.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("Cheatsheets that can help you with this :")
        shrts.spc()
        print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/Nmap-Cheat-Sheet.pdf \033[90m')
        shrts.popp()
        os.system("nmap " + target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + nmap.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("svn checkout https://svn.nmap.org/nmap/ " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + nmap.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && ./configure && make -j4 && make install && cd " + shrts.getinstalldir() + tool_dir + "/ncat && ./configure && make -j4 && make install")
        shrts.spc()
        print("You can now use " + "\033[91m" + nmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Beispiel #10
0
def URLextractor():
    URLextractor.title = "URLextractor : an  Information gathering & website reconnaissance tool"
    tool_dir = "/INFO-GATH/Tools/URLextractor"
    if os.path.exists('/usr/local/bin/URLextractor'):
        shrts.prilogspc()
        os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/extractor.sh "+ target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/URLextractor""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/URLextractor""")
        os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/extractor.sh >> /usr/local/bin/URLextractor")
        os.system("chmod +x /usr/local/bin/URLextractor")
        print("You can now use " + "\033[91m" + URLextractor.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
def rfix():
    rfix.title = "Rfix : Python tool that helps RFI exploitation."
    tool_dir = "/EXPLOITATION/Tools//rfix"
    if os.path.exists('/usr/local/bin/rfix'):
        shrts.prilogspc()
        os.system("git clone https://github.com/joaogmauricio/rfix.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + rfix.title + "\033[90m")
        shrts.spc()
        print("\033[92m Usage: rfix target_url payload_path. \033[90m")
        shrts.spc()
        print(
            "Example: rfix http://target_host/index.php?flawed_param= php.txt "
        )
        shrts.spc()
        target = sanitize.bash_escape_restrictor(
            input("\033[92m Choose a Target : \033[90m"))
        payload = sanitize.bash_escape_restrictor(
            input("\033[92m Choose the payload path : \033[90m"))
        os.system("python2 " + shrts.getinstalldir() + tool_dir + "/rfix.py " +
                  target + " " + payload)
        shrts.spc()
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + rfix.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/joaogmauricio/rfix.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + rfix.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/rfix""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/rfix""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir +
                  "/rfix.py >> /usr/local/bin/rfix")
        os.system("chmod +x /usr/local/bin/rfix")
        print(("You can now use " + "\033[91m" + rfix.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.spc()
        shrts.okex()
Beispiel #12
0
def theHarvester():
    theHarvester.title = "theHarvester : E-mails, subdomains and names Harvester "
    tool_dir = "/INFO-GATH/Tools/theHarvester"
    if os.path.exists('/usr/local/bin/theHarvester'):
        shrts.prilogspc()
        os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("Cheatsheets that can help you with this :")
        shrts.spc()
        print("\033[92m" + shrts.getinstalldir() + '/PASSWORD/wordlists/others/names.txt \033[90m')
        shrts.spc()
        shrts.oktocont()
        target = " -d " + target
        shrts.spc()
        print(""" Sources :
            baidu, bing, bingapi, censys, crtsh, dnsdumpster,
            dogpile, duckduckgo, exalead, github-code, google,
            hunter, intelx, linkedin, netcraft, securityTrails,
            threatcrowd, trello, twitter, vhost, virustotal, yahoo
            """)
        shrts.spc()
        source = sanitize.bash_escape_restrictor(input("Select a Soruce (Ex : bing,google,baidu) : "))
        shrts.prilogspc()
        os.system("theHarvester" + target + " -l 500 -b " + source)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 " + shrts.getinstalldir() + tool_dir + "/setup.py install" + null)
        os.system("ln -s /usr/bin/theHarvester /usr/local/bin/theHarvester")
        print("You can now use " + "\033[91m" + theHarvester.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Beispiel #13
0
def snmpwn():
    snmpwn.title = "snmpwn : An SNMPv3 User Enumerator and Attack tool"
    tool_dir = "/INFO-GATH/Tools/snmpwn"
    if os.path.exists('/usr/local/bin/snmpwn'):
        shrts.prilogspc()
        os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        hosts = sanitize.bash_escape_restrictor(input("Enter the targets hosts file : "))
        users = sanitize.bash_escape_restrictor(input("List of users you want to try : "))
        passlist = sanitize.bash_escape_restrictor(input("Password list for attacks : "))
        enclist = sanitize.bash_escape_restrictor(input("Encryption Password List for AuthPriv types : "))
        hosts = "--hosts " + hosts
        users = "--users " + users
        passlist = "--passlist " + passlist
        enclist = "--enclist " + enclist
        shrts.prilogspc()
        os.system("snmpwn " + hosts + " " + users + " " + passlist + " " + enclist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        print("\033[91m-[!]-\033[90m    \033[94mTo install this tool you need a non-root user, Please choose one !\033[90m \033[91m-[!] \033[90m")
        user = input("\033[91m-[!]-\033[90m        \033[94mEnter the non-root user username\033[90m  : ")
        shrts.spc()
        os.system("su -c " + "'cd " + shrts.getinstalldir() + tool_dir + " && gem install bundler && bundle install' " + user + null)
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/snmpwn""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/snmpwn""")
        os.system("echo ruby " + shrts.getinstalldir() + tool_dir + "/snmpwn.rb >> /usr/local/bin/snmpwn")
        os.system("chmod +x /usr/local/bin/snmpwn")
        print(("You can now use " + "\033[91m" + snmpwn.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #14
0
def virustotal():
    virustotal.title = "VirusTotal tools"
    tool_dir = "/REVERSE/Tools/virustotal"
    if os.path.exists('/usr/local/bin/virustotal'):
        shrts.prilogspc()
        os.system("git clone https://github.com/botherder/virustotal.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + virustotal.title + "\033[90m")
        shrts.spc()
        key = sanitize.bash_escape_restrictor(
            input("\033[92mEnter the Virtustoal Api  ? : \033[90m"))
        outp = sanitize.bash_escape_restrictor(
            input(
                "\033[92mEnter directory containing files to scan ? : \033[90m"
            ))
        os.system("python2 " + shrts.getinstalldir() + tool_dir +
                  "/vt.py --key " + key + " " + outp)
        shrts.okrev()
    else:
        shrts.prilogspc()
        print("\033[92m           " + virustotal.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone  https://github.com/botherder/virustotal.git  " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + virustotal.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/virustotal""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/virustotal""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir +
                  "/vt.py >> /usr/local/bin/virustotal")
        os.system("chmod +x /usr/local/bin/virustotal")
        print(("You can now use " + "\033[91m" + virustotal.title +
               "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okrev()
Beispiel #15
0
def gobuster():
    tool_dir = "/INFO-GATH/Tools/gobuster"
    gobuster.title = "gobuster : A DNS and VHost busting tool written in Go "
    if os.path.exists('/usr/local/bin/gobuster'):
        shrts.prilogspc()
        os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        choice = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("      \033[92m    Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m")
        shrts.spc()
        wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : "))
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/gobuster dir -u " + choice + " -w " + wordlist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && go get && go build")
        shrts.prilogspc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/gobuster""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/gobuster""")
        os.system("echo " + shrts.getinstalldir() + tool_dir + "/gobuster >> /usr/local/bin/gobuster")
        os.system("chmod +x /usr/local/bin/gobuster")
        print(("You can now use " + "\033[91m" + gobuster.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #16
0
def brut3k1t():
    tool_dir = "/INFO-GATH/Tools/brut3k1t"
    brut3k1t.title = "brut3k1t : A security-oriented bruteforce framework"
    if os.path.exists('/usr/bin/brut3k1t'):
        shrts.prilogspc()
        os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        service = sanitize.bash_escape_restrictor(input("Select a service (ssh,smtp,xmpp,facebook,instagram,twitter,md5):"))
        user = sanitize.bash_escape_restrictor(input("Choose a user : "******"Enter an address : "))
        shrts.spc()
        print("      \033[92m    Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m")
        shrts.spc()
        wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : "))
        shrts.prilogspc()
        os.system("brut3k1t -s"  + service + " -a " + address + " -u " + user + " -w " + wordlist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        print("\033[91m\033[91mInstalling ...\033[0m\033[0m")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python2 setup.py install" + null)
        os.system("ln -s /usr/bin/brut3k1t /usr/local/bin/brut3k1t")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + brut3k1t.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
def Pompem():
    Pompem.title = "Pompem : an Exploit and Vulnerability Finder"
    tool_dir = "/EXPLOITATION/Tools/Pompem"
    if os.path.exists('/usr/local/bin/Pompem'):
        shrts.prilogspc()
        os.system("git clone https://github.com/rfunix/Pompem.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Pompem.title + "\033[90m")
        shrts.spc()
        ans = sanitize.bash_escape_restrictor(
            input("\033[92mWhat exploits are you looking  ? : \033[90m"))
        os.system("python3 " + shrts.getinstalldir() + tool_dir +
                  "/pompem.py -s " + ans)
        shrts.spc()
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Pompem.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/rfunix/Pompem.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Pompem.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip3 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Pompem""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Pompem""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir +
                  "/pompem.py >> /usr/local/bin/Pompem")
        os.system("chmod +x /usr/local/bin/Pompem")
        print(("You can now use " + "\033[91m" + Pompem.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.spc()
        shrts.okex()
Beispiel #18
0
def sqlmap():
    sqlmap.title = "SQLmap : Automatic SQL injection and database takeover tool "
    tool_dir = "/WEB/Tools/sqlmap"
    if os.path.exists('/usr/bin/sqlmap'):
        shrts.printlogo()
        os.system("git clone  https://github.com/sqlmapproject/sqlmap " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("Check the sqli cheatsheets to know more")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() +
                  "/WEB/CHEATSHEETS/ -type f | grep sqli")
        shrts.popp()
        os.system("sqlmap -u " + target)
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/sqlmapproject/sqlmap " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("""echo "#!/bin/bash" > /usr/local/bin/sqlmap""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sqlmap""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir +
                  "/sqlmap.py >> /usr/local/bin/sqlmap")
        os.system("chmod +x /usr/local/bin/sqlmap")
        shrts.spc()
        print(("You can now use " + "\033[91m" + sqlmap.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
def dnsrecon():
    dnsrecon.title = "DnsRecon : A DNS Enumeration Script"
    tool_dir = "/INFO-GATH/Tools/DnsRecon"
    if os.path.exists('/usr/local/bin/dnsrecon'):
        shrts.prilogspc()
        os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target (use 'dnsrecon --help' for more options) : "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find  " + shrts.getinstalldir() + " -type f | grep dns_")
        print("\033[90m")
        shrts.pop()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py -d " + target)
        shrts.spc()
        print("\033[92mFor more options, Use dnsrecon --help\033[0m")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.clr()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        shrts.printlogo()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/dnsrecon""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/dnsrecon""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py >> /usr/local/bin/dnsrecon")
        os.system("chmod +x /usr/local/bin/dnsrecon")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + dnsrecon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #20
0
def whatweb():
    whatweb.title = "whatweb : Next generation web scanner "
    tool_dir = "/WEB/Tools/whatweb"
    if os.path.exists('/usr/local/bin/whatweb'):
        shrts.printlogo()
        os.system("git clone  https://github.com/urbanadventurer/WhatWeb " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        shrts.spc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/whatweb " + target)
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/urbanadventurer/WhatWeb " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && gem install json && gem install rchardet")
        os.system("""echo "#!/bin/bash" > /usr/local/bin/whatweb""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/whatweb""")
        os.system("echo " + shrts.getinstalldir() + tool_dir +
                  "/whatweb >> /usr/local/bin/whatweb")
        os.system("chmod +x /usr/local/bin/whatweb")
        shrts.spc()
        print(("You can now use " + "\033[91m" + whatweb.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
def Raccoon():
    Raccoon.title = "Raccoon : an offensive security tool for reconnaissance and vulnerability scanning."
    tool_dir = "/INFO-GATH/Tools/Raccoon"
    if os.path.exists('/usr/local/bin/Raccoon'):
        shrts.prilogspc()
        os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target (use 'raccoon --help' for more options) : "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability")
        print("\033[90m")
        shrts.pop()
        os.system("raccoon " + target)
        shrts.spc()
        print("\033[92mFor more options, Use raccoon --help\033[0m")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        shrts.printlogo()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install" + null)
        os.system("ln -s /usr/bin/raccoon /usr/local/bin/Raccoon")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + Raccoon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Beispiel #22
0
def Striker():
    Striker.title = "Striker : an offensive information and vulnerability scanner."
    tool_dir = "/INFO-GATH/Tools/Striker"
    if os.path.exists('/usr/local/bin/Striker'):
        shrts.prilogspc()
        os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability")
        print("\033[90m")
        shrts.pop()
        shrts.prilogspc()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/striker.py " + target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Striker""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Striker""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/striker.py >> /usr/local/bin/Striker")
        os.system("chmod +x /usr/local/bin/Striker")
        print(("You can now use " + "\033[91m" + Striker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
def Findsploit():
    Findsploit.title = "Findsploit : Find exploits in local and online databases instantly"
    tool_dir = "/EXPLOITATION/Tools/Findsploit"
    if os.path.exists('/usr/local/bin/Findsploit'):
        shrts.prilogspc()
        os.system("git clone  https://github.com/1N3/Findsploit.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        ans = sanitize.bash_escape_restrictor(
            input("\033[92mWhat exploits are you looking  ? : \033[90m"))
        os.system("Findsploit " + ans)
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/1N3/Findsploit.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip3 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("sh " + shrts.getinstalldir() + tool_dir + "/install.sh")
        os.system("ln -s /usr/bin/findsploit /usr/local/bin/Findsploit")
        shrts.spc()
        print("You can now use " + "\033[91m" + Findsploit.title + "\033[90m" +
              " from Lockdoor [\033[92m Lockdoor \033[90m ]")
        shrts.okex()
Beispiel #24
0
def Spaghetti():
    Spaghetti.title = "Spaghetti - Web Application Security Scanner"
    tool_dir = "/WEB/Tools/Spaghetti"
    if os.path.exists('/usr/local/bin/Spaghetti'):
        shrts.prilogspc()
        os.system("git clone https://github.com/c0ll3cti0n/Spaghetti.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Spaghetti.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.spc()
        print("""Scan Options :
            0:	Full Scan
            1:	Bruteforce (dirs,files,..)
            2:	Disclosure (ip,emails,..)
            3:	Attacks (sql,lfi,..)
            4:	Others (webdav,..)
            5:	Vulns (shellshock,..)
            6:	Fingerprint only
        """)
        scoption = input("choose a Scan Option: ")
        crawler = input("Use Deep crawling (Slow) ? (Y/N) : ")
        if crawler in yes:
            crawler = " --crawler "
        else:
            crawler = ""
        ranagent = input("use a random user agent ? (Y/N) : ")
        if ranagent in yes:
            ranagent = " --random-agent "
        else:
            ranagent = ""
        agent = sanitize.bash_escape_restrictor(
            input("Use a specified Agent ? (Y/N) : "))
        if agent in yes:
            agent = sanitize.bash_escape_restrictor(
                input("Specify the Agent ! : "))
            agent = " --agent " + agent
        else:
            agent = ""
        proxy = sanitize.bash_escape_restrictor(
            input("Set a proxy ? (Y/N) : "))
        if proxy in yes:
            proxy = sanitize.bash_escape_restrictor(
                input("Set the Proxy (host:port) : "))
            proxy = " --proxy " + proxy
        verbose = input("Verbose output ? (Y/N) : ")
        if verbose in yes:
            verbose = "--verbose"
        else:
            verbose = ""
        shrts.prilogspc()
        os.system("cd  " + shrts.getinstalldir() + tool_dir +
                  " && python2 spaghetti.py -u " + target + " -s " + scoption +
                  crawler + ranagent + agent + proxy + verbose)
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Spaghetti.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/c0ll3cti0n/Spaghetti.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Spaghetti.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip2 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Spaghetti""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Spaghetti""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir +
                  "/spaghetti.py >> /usr/local/bin/Spaghetti")
        os.system("chmod +x /usr/local/bin/Spaghetti")
        print(("You can now use " + "\033[91m" + Spaghetti.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Beispiel #25
0
def Sublist3r():
    Sublist3r.title = "Sublist3r : Fast subdomains enumeration tool for penetration testers"
    tool_dir = "/INFO-GATH/Tools/Sublist3r"
    if os.path.exists('/usr/local/bin/Sublist3r'):
        shrts.prilogspc()
        os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        domaine = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/PASSWORD/wordlists/ -type f | grep domain")
        os.system("find " + shrts.getinstalldir() + "/IMAGES/ -type f | grep tcp")
        os.system("find " + shrts.getinstalldir() + "/NETWORKING/ -type f ")
        print("\033[90m")
        shrts.pop()
        bruteforce = input("Enable the subbrute bruteforce module ? (Y/N) : ")
        verbose = input("Enable the verbose mode and display results in realtime ? (Y/N) : ")
        ports = sanitize.bash_escape_restrictor(input("Specify tcp ports for subdomains finding : "))
        threads = sanitize.bash_escape_restrictor(input("Number of threads to use for subbrute bruteforce ?  : "))
        engines = sanitize.bash_escape_restrictor(input("Specify a comma-separated list of search engines : "))
        if not domaine:
            domaine = ""
        else:
            domaine = " -d " + domaine
        if not ports:
            ports = ""
        else:
            ports = " -p " + ports
        if not threads:
            threads = ""
        else:
            threads = " -t " + threads
        if not engines:
            engines = ""
        else:
            engines = " -e " + engines
        if not bruteforce in no:
            bruteforce = "-b"
        else:
            bruteforce = ""
        if not verbose in no:
            verbose = " -v "
        else:
            verbose = ""
        shrts.prilogspc()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py" + domaine + " " + bruteforce + " " + verbose + ports + engines + threads)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m")
        shrts.spc()
        os.system("pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Sublist3r""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Sublist3r""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py >> /usr/local/bin/Sublist3r")
        os.system("chmod +x /usr/local/bin/Sublist3r")
        print(("You can now use " + "\033[91m" + Sublist3r.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()