def enyx(): enyx.title = "Enyx : An SNMP IPv6 Enumeration Tool" tool_dir = "/INFO-GATH/Tools/Enyx" if os.path.exists('/usr/local/bin/enyx'): shrts.prilogspc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() snmpversion = sanitize.bash_escape_restrictor(input("Whats the snmp Version (1 or 2c) : ")) communitystring = sanitize.bash_escape_restrictor(input("Whats the Community string (public or private) : ")) ipad = sanitize.bash_escape_restrictor(input("Whats the IP : ")) shrts.prilogspc() os.system("python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py " + snmpversion + " " + communitystring + " " + ipad) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/enyx""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/enyx""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py >> /usr/local/bin/enyx") os.system("chmod +x /usr/local/bin/enyx") print(("You can now use " + "\033[91m" + enyx.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def dirsearch(): tool_dir = "/INFO-GATH/Tools/dirsearch" dirsearch.title = "DirSearch : Web path scanner " if os.path.exists('/usr/local/bin/DirSearch'): shrts.prilogspc() os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() choice = sanitize.bash_escape_restrictor(input("Select a Target : ")) extchoice = sanitize.bash_escape_restrictor(input("Select an extention (php,asp,aspx ..) : ")) shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/file_enumeration.md \033[92m') shrts.popp() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py" + " -u " + choice + " -e " + extchoice) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/DirSearch""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/DirSearch""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py >> /usr/local/bin/DirSearch") os.system("chmod +x /usr/local/bin/DirSearch") print("You can now use " + "\033[91m" + dirsearch.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def Nasnum(): Nasnum.title = "Nasnum : The NAS Enumerator" tool_dir = "/INFO-GATH/Tools/Nasnum" if os.path.exists('/usr/local/bin/Nasnum'): shrts.prilogspc() os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() smb = input("Want to grab Grab SMB info ? (Y/N) : ") nsf = input("Want to grab Grab NFS info ? (Y/N) : ") csnmp = input("Want to Check SNMP for connection data ? (Y/N) : ") anonftp = input("Want to Check for anonymous FTP and enumerate dirs/files ? (Y/N) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'nfs.*enum|nfs.*enum'") os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'smb.*enum|smb.*enum'") os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'ftp.*enum|ftp.*enum'") print(" \033[90m") shrts.pop() target = sanitize.bash_escape_restrictor(input("Select A Target : ")) output = sanitize.bash_escape_restrictor(input("Select an output file : ")) if not smb in no: smb = "-s" else: smb = "" if not nsf in no: nsf = "-n" else: nsf = "" if not csnmp in no: csnmp = "-b" else: csnmp = "" if not anonftp in no: anonftp = "-f" else: anonftp = "" shrts.prilogspc() os.system("Nasnum " + output + target + " " + smb + " " + nsf + " " + csnmp + " " + anonftp) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Nasnum""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Nasnum""") os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/nasnum.sh >> /usr/local/bin/Nasnum") os.system("chmod +x /usr/local/bin/Nasnum") print(("You can now use " + "\033[91m" + Nasnum.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def findmyhash(): findmyhash.title = "findmyhash : Python script to crack hashes using online services" tool_dir = "/ENCRYPTION/Tools/Findmyhash" if os.path.exists('/usr/local/bin/Findmyhash'): shrts.prilogspc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print(""" MD4 - RFC 1320 MD5 - RFC 1321 SHA1 - RFC 3174 (FIPS 180-3) SHA224 - RFC 3874 (FIPS 180-3) SHA256 - FIPS 180-3 SHA384 - FIPS 180-3 SHA512 - FIPS 180-3 RMD160 - RFC 2857 GOST - RFC 5831 WHIRLPOOL - ISO/IEC 10118-3:2004 LM - Microsoft Windows hash NTLM - Microsoft Windows hash MYSQL - MySQL 3, 4, 5 hash CISCO7 - Cisco IOS type 7 encrypted passwords JUNIPER - Juniper Networks $9$ encrypted passwords LDAP_MD5 - MD5 Base64 encoded LDAP_SHA1 - SHA1 Base64 encoded """) algo = sanitize.bash_escape_restrictor(input("What Algo you want to use ? : ")) hash = sanitize.bash_escape_restrictor(input("Enter the hash : ")) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " +algo+ " -h " +hash) shrts.okenc() else: shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Findmyhash""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Findmyhash""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py >> /usr/local/bin/Findmyhash") os.system("chmod +x /usr/local/bin/Findmyhash") print(("You can now use " + "\033[91m" + findmyhash.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okenc()
def inurlbr(): inurlbr.title = "inurlbr : Python tool that helps RFI exploitation." tool_dir = "/EXPLOITATION/Tools/inurlbr" if os.path.exists('/usr/local/bin/inurlbr'): shrts.prilogspc() os.system( "git clone https://github.com/googleinurl/SCANNER-INURLBR.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + inurlbr.title + "\033[90m") shrts.spc() print("type : inurlbr --help for more options ") shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/Google FU.pdf \033[92m') print("\033[92m" + shrts.getinstalldir() + '/GHDB.pdf \033[92m') shrts.spc() dork = sanitize.bash_escape_restrictor( input("\033[92m Choose a Dork : \033[90m")) savefile = sanitize.bash_escape_restrictor( input("\033[92m output file ? (Ex : results.txt) : \033[90m")) os.system("php " + shrts.getinstalldir() + tool_dir + "/inurlbr.php --dork " + dork + " -s " + savefile) shrts.okex() else: shrts.prilogspc() print("\033[92m " + inurlbr.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system( "git clone https://github.com/googleinurl/SCANNER-INURLBR.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + inurlbr.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/inurlbr""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/inurlbr""") os.system("echo php " + shrts.getinstalldir() + tool_dir + "/inurlbr.php >> /usr/local/bin/inurlbr") os.system("chmod +x /usr/local/bin/inurlbr") print(("You can now use " + "\033[91m" + inurlbr.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okex()
def denumerator(): denumerator.title = "denumerator.py : Enumerates list of subdomains" tool_dir = "/INFO-GATH/Tools/" if os.path.exists('/usr/local/bin/denumerator'): shrts.prilogspc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() targetlist = sanitize.bash_escape_restrictor(input("Enter the Targets list: ")) shrts.prilogspc() os.system("denumerator -f " + targetlist + " -t 10") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/denumerator""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/denumerator""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/denumerator.py >> /usr/local/bin/denumerator") os.system("chmod +x /usr/local/bin/denumerator") print("You can now use " + "\033[91m" + denumerator.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def sherlock(): sherlock.title = "sherlock : Find usernames across social networks" tool_dir = "/INFO-GATH/Tools/sherlock" if os.path.exists('/usr/local/bin/sherlock'): shrts.prilogspc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Enter the target username : "******"python " + shrts.getinstalldir() + tool_dir + "/sherlock.py " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install --upgrade setuptools && pip3 install -r requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/sherlock""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sherlock""") os.system("echo python " + shrts.getinstalldir() + tool_dir + "/sherlock.py >> /usr/local/bin/sherlock") os.system("chmod +x /usr/local/bin/sherlock") print(("You can now use " + "\033[91m" + sherlock.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def wafw00f(): wafw00f.title = "wafw00f : identify and fingerprint Web Application Firewall " tool_dir = "/INFO-GATH/Tools/wafw00f" if os.path.exists('/usr/local/bin/wafw00f'): shrts.prilogspc() os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.spc() domaine = sanitize.bash_escape_restrictor(input("Select a Target: ")) shrts.prilogspc() os.system("wafw00f " + domaine) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.prilogspc() print("\033[91mInstalling ...\033[0m") os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install" + null) os.system("ln -s /usr/bin/wafw00f /usr/local/bin/wafw00f") print(("You can now use " + "\033[91m" + wafw00f.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def nmap(): nmap.title = "Nmap : the Network Mapper " tool_dir = "/INFO-GATH/Tools/nmap" if os.path.exists('/usr/bin/nmap'): shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/Nmap-Cheat-Sheet.pdf \033[90m') shrts.popp() os.system("nmap " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("svn checkout https://svn.nmap.org/nmap/ " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && ./configure && make -j4 && make install && cd " + shrts.getinstalldir() + tool_dir + "/ncat && ./configure && make -j4 && make install") shrts.spc() print("You can now use " + "\033[91m" + nmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def URLextractor(): URLextractor.title = "URLextractor : an Information gathering & website reconnaissance tool" tool_dir = "/INFO-GATH/Tools/URLextractor" if os.path.exists('/usr/local/bin/URLextractor'): shrts.prilogspc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/extractor.sh "+ target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/URLextractor""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/URLextractor""") os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/extractor.sh >> /usr/local/bin/URLextractor") os.system("chmod +x /usr/local/bin/URLextractor") print("You can now use " + "\033[91m" + URLextractor.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def rfix(): rfix.title = "Rfix : Python tool that helps RFI exploitation." tool_dir = "/EXPLOITATION/Tools//rfix" if os.path.exists('/usr/local/bin/rfix'): shrts.prilogspc() os.system("git clone https://github.com/joaogmauricio/rfix.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + rfix.title + "\033[90m") shrts.spc() print("\033[92m Usage: rfix target_url payload_path. \033[90m") shrts.spc() print( "Example: rfix http://target_host/index.php?flawed_param= php.txt " ) shrts.spc() target = sanitize.bash_escape_restrictor( input("\033[92m Choose a Target : \033[90m")) payload = sanitize.bash_escape_restrictor( input("\033[92m Choose the payload path : \033[90m")) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/rfix.py " + target + " " + payload) shrts.spc() shrts.okex() else: shrts.prilogspc() print("\033[92m " + rfix.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/joaogmauricio/rfix.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + rfix.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/rfix""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/rfix""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/rfix.py >> /usr/local/bin/rfix") os.system("chmod +x /usr/local/bin/rfix") print(("You can now use " + "\033[91m" + rfix.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.spc() shrts.okex()
def theHarvester(): theHarvester.title = "theHarvester : E-mails, subdomains and names Harvester " tool_dir = "/INFO-GATH/Tools/theHarvester" if os.path.exists('/usr/local/bin/theHarvester'): shrts.prilogspc() os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + theHarvester.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/PASSWORD/wordlists/others/names.txt \033[90m') shrts.spc() shrts.oktocont() target = " -d " + target shrts.spc() print(""" Sources : baidu, bing, bingapi, censys, crtsh, dnsdumpster, dogpile, duckduckgo, exalead, github-code, google, hunter, intelx, linkedin, netcraft, securityTrails, threatcrowd, trello, twitter, vhost, virustotal, yahoo """) shrts.spc() source = sanitize.bash_escape_restrictor(input("Select a Soruce (Ex : bing,google,baidu) : ")) shrts.prilogspc() os.system("theHarvester" + target + " -l 500 -b " + source) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + theHarvester.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + theHarvester.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 " + shrts.getinstalldir() + tool_dir + "/setup.py install" + null) os.system("ln -s /usr/bin/theHarvester /usr/local/bin/theHarvester") print("You can now use " + "\033[91m" + theHarvester.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def snmpwn(): snmpwn.title = "snmpwn : An SNMPv3 User Enumerator and Attack tool" tool_dir = "/INFO-GATH/Tools/snmpwn" if os.path.exists('/usr/local/bin/snmpwn'): shrts.prilogspc() os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() hosts = sanitize.bash_escape_restrictor(input("Enter the targets hosts file : ")) users = sanitize.bash_escape_restrictor(input("List of users you want to try : ")) passlist = sanitize.bash_escape_restrictor(input("Password list for attacks : ")) enclist = sanitize.bash_escape_restrictor(input("Encryption Password List for AuthPriv types : ")) hosts = "--hosts " + hosts users = "--users " + users passlist = "--passlist " + passlist enclist = "--enclist " + enclist shrts.prilogspc() os.system("snmpwn " + hosts + " " + users + " " + passlist + " " + enclist) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") print("\033[91m-[!]-\033[90m \033[94mTo install this tool you need a non-root user, Please choose one !\033[90m \033[91m-[!] \033[90m") user = input("\033[91m-[!]-\033[90m \033[94mEnter the non-root user username\033[90m : ") shrts.spc() os.system("su -c " + "'cd " + shrts.getinstalldir() + tool_dir + " && gem install bundler && bundle install' " + user + null) shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/snmpwn""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/snmpwn""") os.system("echo ruby " + shrts.getinstalldir() + tool_dir + "/snmpwn.rb >> /usr/local/bin/snmpwn") os.system("chmod +x /usr/local/bin/snmpwn") print(("You can now use " + "\033[91m" + snmpwn.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def virustotal(): virustotal.title = "VirusTotal tools" tool_dir = "/REVERSE/Tools/virustotal" if os.path.exists('/usr/local/bin/virustotal'): shrts.prilogspc() os.system("git clone https://github.com/botherder/virustotal.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + virustotal.title + "\033[90m") shrts.spc() key = sanitize.bash_escape_restrictor( input("\033[92mEnter the Virtustoal Api ? : \033[90m")) outp = sanitize.bash_escape_restrictor( input( "\033[92mEnter directory containing files to scan ? : \033[90m" )) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/vt.py --key " + key + " " + outp) shrts.okrev() else: shrts.prilogspc() print("\033[92m " + virustotal.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/botherder/virustotal.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + virustotal.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/virustotal""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/virustotal""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/vt.py >> /usr/local/bin/virustotal") os.system("chmod +x /usr/local/bin/virustotal") print(("You can now use " + "\033[91m" + virustotal.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okrev()
def gobuster(): tool_dir = "/INFO-GATH/Tools/gobuster" gobuster.title = "gobuster : A DNS and VHost busting tool written in Go " if os.path.exists('/usr/local/bin/gobuster'): shrts.prilogspc() os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + gobuster.title + "\033[90m") shrts.spc() choice = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.spc() print(" \033[92m Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m") shrts.spc() wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : ")) shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/gobuster dir -u " + choice + " -w " + wordlist) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + gobuster.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + gobuster.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && go get && go build") shrts.prilogspc() os.system("""echo "#!/bin/bash" > /usr/local/bin/gobuster""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/gobuster""") os.system("echo " + shrts.getinstalldir() + tool_dir + "/gobuster >> /usr/local/bin/gobuster") os.system("chmod +x /usr/local/bin/gobuster") print(("You can now use " + "\033[91m" + gobuster.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def brut3k1t(): tool_dir = "/INFO-GATH/Tools/brut3k1t" brut3k1t.title = "brut3k1t : A security-oriented bruteforce framework" if os.path.exists('/usr/bin/brut3k1t'): shrts.prilogspc() os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + brut3k1t.title + "\033[90m") shrts.spc() service = sanitize.bash_escape_restrictor(input("Select a service (ssh,smtp,xmpp,facebook,instagram,twitter,md5):")) user = sanitize.bash_escape_restrictor(input("Choose a user : "******"Enter an address : ")) shrts.spc() print(" \033[92m Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m") shrts.spc() wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : ")) shrts.prilogspc() os.system("brut3k1t -s" + service + " -a " + address + " -u " + user + " -w " + wordlist) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + brut3k1t.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + brut3k1t.title + "\033[90m") shrts.spc() print("\033[91m\033[91mInstalling ...\033[0m\033[0m") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && python2 setup.py install" + null) os.system("ln -s /usr/bin/brut3k1t /usr/local/bin/brut3k1t") shrts.prilogspc() print(("You can now use " + "\033[91m" + brut3k1t.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Pompem(): Pompem.title = "Pompem : an Exploit and Vulnerability Finder" tool_dir = "/EXPLOITATION/Tools/Pompem" if os.path.exists('/usr/local/bin/Pompem'): shrts.prilogspc() os.system("git clone https://github.com/rfunix/Pompem.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Pompem.title + "\033[90m") shrts.spc() ans = sanitize.bash_escape_restrictor( input("\033[92mWhat exploits are you looking ? : \033[90m")) os.system("python3 " + shrts.getinstalldir() + tool_dir + "/pompem.py -s " + ans) shrts.spc() shrts.okex() else: shrts.prilogspc() print("\033[92m " + Pompem.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/rfunix/Pompem.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Pompem.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Pompem""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Pompem""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/pompem.py >> /usr/local/bin/Pompem") os.system("chmod +x /usr/local/bin/Pompem") print(("You can now use " + "\033[91m" + Pompem.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.spc() shrts.okex()
def sqlmap(): sqlmap.title = "SQLmap : Automatic SQL injection and database takeover tool " tool_dir = "/WEB/Tools/sqlmap" if os.path.exists('/usr/bin/sqlmap'): shrts.printlogo() os.system("git clone https://github.com/sqlmapproject/sqlmap " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.spc() print("Check the sqli cheatsheets to know more") shrts.spc() os.system("find " + shrts.getinstalldir() + "/WEB/CHEATSHEETS/ -type f | grep sqli") shrts.popp() os.system("sqlmap -u " + target) shrts.okwe() else: shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/sqlmapproject/sqlmap " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("""echo "#!/bin/bash" > /usr/local/bin/sqlmap""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sqlmap""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sqlmap.py >> /usr/local/bin/sqlmap") os.system("chmod +x /usr/local/bin/sqlmap") shrts.spc() print(("You can now use " + "\033[91m" + sqlmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def dnsrecon(): dnsrecon.title = "DnsRecon : A DNS Enumeration Script" tool_dir = "/INFO-GATH/Tools/DnsRecon" if os.path.exists('/usr/local/bin/dnsrecon'): shrts.prilogspc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target (use 'dnsrecon --help' for more options) : ")) shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + " -type f | grep dns_") print("\033[90m") shrts.pop() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py -d " + target) shrts.spc() print("\033[92mFor more options, Use dnsrecon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/dnsrecon""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/dnsrecon""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py >> /usr/local/bin/dnsrecon") os.system("chmod +x /usr/local/bin/dnsrecon") shrts.prilogspc() print(("You can now use " + "\033[91m" + dnsrecon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def whatweb(): whatweb.title = "whatweb : Next generation web scanner " tool_dir = "/WEB/Tools/whatweb" if os.path.exists('/usr/local/bin/whatweb'): shrts.printlogo() os.system("git clone https://github.com/urbanadventurer/WhatWeb " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() shrts.spc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/whatweb " + target) shrts.okwe() else: shrts.prilogspc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/urbanadventurer/WhatWeb " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && gem install json && gem install rchardet") os.system("""echo "#!/bin/bash" > /usr/local/bin/whatweb""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/whatweb""") os.system("echo " + shrts.getinstalldir() + tool_dir + "/whatweb >> /usr/local/bin/whatweb") os.system("chmod +x /usr/local/bin/whatweb") shrts.spc() print(("You can now use " + "\033[91m" + whatweb.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def Raccoon(): Raccoon.title = "Raccoon : an offensive security tool for reconnaissance and vulnerability scanning." tool_dir = "/INFO-GATH/Tools/Raccoon" if os.path.exists('/usr/local/bin/Raccoon'): shrts.prilogspc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target (use 'raccoon --help' for more options) : ")) shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability") print("\033[90m") shrts.pop() os.system("raccoon " + target) shrts.spc() print("\033[92mFor more options, Use raccoon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install" + null) os.system("ln -s /usr/bin/raccoon /usr/local/bin/Raccoon") shrts.prilogspc() print(("You can now use " + "\033[91m" + Raccoon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Striker(): Striker.title = "Striker : an offensive information and vulnerability scanner." tool_dir = "/INFO-GATH/Tools/Striker" if os.path.exists('/usr/local/bin/Striker'): shrts.prilogspc() os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target: ")) shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability") print("\033[90m") shrts.pop() shrts.prilogspc() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/striker.py " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Striker""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Striker""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/striker.py >> /usr/local/bin/Striker") os.system("chmod +x /usr/local/bin/Striker") print(("You can now use " + "\033[91m" + Striker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Findsploit(): Findsploit.title = "Findsploit : Find exploits in local and online databases instantly" tool_dir = "/EXPLOITATION/Tools/Findsploit" if os.path.exists('/usr/local/bin/Findsploit'): shrts.prilogspc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() ans = sanitize.bash_escape_restrictor( input("\033[92mWhat exploits are you looking ? : \033[90m")) os.system("Findsploit " + ans) shrts.okex() else: shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("sh " + shrts.getinstalldir() + tool_dir + "/install.sh") os.system("ln -s /usr/bin/findsploit /usr/local/bin/Findsploit") shrts.spc() print("You can now use " + "\033[91m" + Findsploit.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]") shrts.okex()
def Spaghetti(): Spaghetti.title = "Spaghetti - Web Application Security Scanner" tool_dir = "/WEB/Tools/Spaghetti" if os.path.exists('/usr/local/bin/Spaghetti'): shrts.prilogspc() os.system("git clone https://github.com/c0ll3cti0n/Spaghetti.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Spaghetti.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target: ")) shrts.spc() print("""Scan Options : 0: Full Scan 1: Bruteforce (dirs,files,..) 2: Disclosure (ip,emails,..) 3: Attacks (sql,lfi,..) 4: Others (webdav,..) 5: Vulns (shellshock,..) 6: Fingerprint only """) scoption = input("choose a Scan Option: ") crawler = input("Use Deep crawling (Slow) ? (Y/N) : ") if crawler in yes: crawler = " --crawler " else: crawler = "" ranagent = input("use a random user agent ? (Y/N) : ") if ranagent in yes: ranagent = " --random-agent " else: ranagent = "" agent = sanitize.bash_escape_restrictor( input("Use a specified Agent ? (Y/N) : ")) if agent in yes: agent = sanitize.bash_escape_restrictor( input("Specify the Agent ! : ")) agent = " --agent " + agent else: agent = "" proxy = sanitize.bash_escape_restrictor( input("Set a proxy ? (Y/N) : ")) if proxy in yes: proxy = sanitize.bash_escape_restrictor( input("Set the Proxy (host:port) : ")) proxy = " --proxy " + proxy verbose = input("Verbose output ? (Y/N) : ") if verbose in yes: verbose = "--verbose" else: verbose = "" shrts.prilogspc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && python2 spaghetti.py -u " + target + " -s " + scoption + crawler + ranagent + agent + proxy + verbose) shrts.okwe() else: shrts.prilogspc() print("\033[92m " + Spaghetti.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/c0ll3cti0n/Spaghetti.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Spaghetti.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip2 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Spaghetti""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Spaghetti""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/spaghetti.py >> /usr/local/bin/Spaghetti") os.system("chmod +x /usr/local/bin/Spaghetti") print(("You can now use " + "\033[91m" + Spaghetti.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def Sublist3r(): Sublist3r.title = "Sublist3r : Fast subdomains enumeration tool for penetration testers" tool_dir = "/INFO-GATH/Tools/Sublist3r" if os.path.exists('/usr/local/bin/Sublist3r'): shrts.prilogspc() os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() domaine = sanitize.bash_escape_restrictor(input("Select a Target: ")) shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/PASSWORD/wordlists/ -type f | grep domain") os.system("find " + shrts.getinstalldir() + "/IMAGES/ -type f | grep tcp") os.system("find " + shrts.getinstalldir() + "/NETWORKING/ -type f ") print("\033[90m") shrts.pop() bruteforce = input("Enable the subbrute bruteforce module ? (Y/N) : ") verbose = input("Enable the verbose mode and display results in realtime ? (Y/N) : ") ports = sanitize.bash_escape_restrictor(input("Specify tcp ports for subdomains finding : ")) threads = sanitize.bash_escape_restrictor(input("Number of threads to use for subbrute bruteforce ? : ")) engines = sanitize.bash_escape_restrictor(input("Specify a comma-separated list of search engines : ")) if not domaine: domaine = "" else: domaine = " -d " + domaine if not ports: ports = "" else: ports = " -p " + ports if not threads: threads = "" else: threads = " -t " + threads if not engines: engines = "" else: engines = " -e " + engines if not bruteforce in no: bruteforce = "-b" else: bruteforce = "" if not verbose in no: verbose = " -v " else: verbose = "" shrts.prilogspc() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py" + domaine + " " + bruteforce + " " + verbose + ports + engines + threads) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m") shrts.spc() os.system("pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Sublist3r""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Sublist3r""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py >> /usr/local/bin/Sublist3r") os.system("chmod +x /usr/local/bin/Sublist3r") print(("You can now use " + "\033[91m" + Sublist3r.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()