def Nasnum(): Nasnum.title = "Nasnum : The NAS Enumerator" tool_dir = "/INFO-GATH/Tools/Nasnum" if os.path.exists('/usr/local/bin/Nasnum'): shrts.prilogspc() os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() smb = input("Want to grab Grab SMB info ? (Y/N) : ") nsf = input("Want to grab Grab NFS info ? (Y/N) : ") csnmp = input("Want to Check SNMP for connection data ? (Y/N) : ") anonftp = input("Want to Check for anonymous FTP and enumerate dirs/files ? (Y/N) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'nfs.*enum|nfs.*enum'") os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'smb.*enum|smb.*enum'") os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep -E 'ftp.*enum|ftp.*enum'") print(" \033[90m") shrts.pop() target = input("Select A Target : ") output = input("Select an output file : ") if not smb in no: smb = "-s" else: smb = "" if not nsf in no: nsf = "-n" else: nsf = "" if not csnmp in no: csnmp = "-b" else: csnmp = "" if not anonftp in no: anonftp = "-f" else: anonftp = "" shrts.prilogspc() os.system("Nasnum " + output + target + " " + smb + " " + nsf + " " + csnmp + " " + anonftp) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/tcstool/Nasnum.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Nasnum.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Nasnum""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Nasnum""") os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/nasnum.sh >> /usr/local/bin/Nasnum") os.system("chmod +x /usr/local/bin/Nasnum") print(("You can now use " + "\033[91m" + Nasnum.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def dnsrecon(): dnsrecon.title = "DnsRecon : A DNS Enumeration Script" tool_dir = "/INFO-GATH/Tools/DnsRecon" if os.path.exists('/usr/local/bin/dnsrecon'): shrts.prilogspc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() target = input( "Select a Target (use 'dnsrecon --help' for more options) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + " -type f | grep dns_") print("\033[90m") shrts.pop() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py -d " + target) shrts.spc() print("\033[92mFor more options, Use dnsrecon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/dnsrecon""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/dnsrecon""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py >> /usr/local/bin/dnsrecon") os.system("chmod +x /usr/local/bin/dnsrecon") shrts.prilogspc() print(("You can now use " + "\033[91m" + dnsrecon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def Striker(): Striker.title = "Striker : an offensive information and vulnerability scanner." tool_dir = "/INFO-GATH/Tools/Striker" if os.path.exists('/usr/local/bin/Striker'): shrts.prilogspc() os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() target = input("Select a Target: ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability") print("\033[90m") shrts.pop() shrts.prilogspc() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/striker.py " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Striker.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Striker""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Striker""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/striker.py >> /usr/local/bin/Striker") os.system("chmod +x /usr/local/bin/Striker") print(("You can now use " + "\033[91m" + Striker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def Raccoon(): Raccoon.title = "Raccoon : an offensive security tool for reconnaissance and vulnerability scanning." tool_dir = "/INFO-GATH/Tools/Raccoon" if os.path.exists('/usr/local/bin/Raccoon'): shrts.prilogspc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() target = input( "Select a Target (use 'raccoon --help' for more options) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability") print("\033[90m") shrts.pop() os.system("raccoon " + target) shrts.spc() print("\033[92mFor more options, Use raccoon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install" + null) os.system("ln -s /usr/bin/raccoon /usr/local/bin/Raccoon") shrts.prilogspc() print(("You can now use " + "\033[91m" + Raccoon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def Sublist3r(): Sublist3r.title = "Sublist3r : Fast subdomains enumeration tool for penetration testers" tool_dir = "/INFO-GATH/Tools/Sublist3r" if os.path.exists('/usr/local/bin/Sublist3r'): shrts.prilogspc() os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() domaine = input("Select a Target: ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/PASSWORD/wordlists/ -type f | grep domain") os.system("find " + shrts.getinstalldir() + "/IMAGES/ -type f | grep tcp") os.system("find " + shrts.getinstalldir() + "/NETWORKING/ -type f ") print("\033[90m") shrts.pop() bruteforce = input("Enable the subbrute bruteforce module ? (Y/N) : ") verbose = input( "Enable the verbose mode and display results in realtime ? (Y/N) : " ) ports = input("Specify tcp ports for subdomains finding : ") threads = input( "Number of threads to use for subbrute bruteforce ? : ") engines = input("Specify a comma-separated list of search engines : ") if not domaine: domaine = "" else: domaine = " -d " + domaine if not ports: ports = "" else: ports = " -p " + ports if not threads: threads = "" else: threads = " -t " + threads if not engines: engines = "" else: engines = " -e " + engines if not bruteforce in no: bruteforce = "-b" else: bruteforce = "" if not verbose in no: verbose = " -v " else: verbose = "" shrts.prilogspc() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py" + domaine + " " + bruteforce + " " + verbose + ports + engines + threads) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Sublist3r.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m") shrts.spc() os.system("pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Sublist3r""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Sublist3r""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py >> /usr/local/bin/Sublist3r") os.system("chmod +x /usr/local/bin/Sublist3r") print(("You can now use " + "\033[91m" + Sublist3r.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()