Ejemplo n.º 1
0
def gobuster():
    tool_dir = "/INFO-GATH/Tools/gobuster"
    gobuster.title = "gobuster : A DNS and VHost busting tool written in Go "
    if os.path.exists('/usr/local/bin/gobuster'):
        shrts.prilogspc()
        os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        choice = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("      \033[92m    Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m")
        shrts.spc()
        wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : "))
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/gobuster dir -u " + choice + " -w " + wordlist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/OJ/gobuster.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + gobuster.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && go get && go build")
        shrts.prilogspc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/gobuster""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/gobuster""")
        os.system("echo " + shrts.getinstalldir() + tool_dir + "/gobuster >> /usr/local/bin/gobuster")
        os.system("chmod +x /usr/local/bin/gobuster")
        print(("You can now use " + "\033[91m" + gobuster.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 2
0
def theHarvester():
    theHarvester.title = "theHarvester : E-mails, subdomains and names Harvester "
    tool_dir = "/INFO-GATH/Tools/theHarvester"
    if os.path.exists('/usr/local/bin/theHarvester'):
        shrts.prilogspc()
        os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.spc()
        print("Cheatsheets that can help you with this :")
        shrts.spc()
        print("\033[92m" + shrts.getinstalldir() + '/PASSWORD/wordlists/others/names.txt \033[90m')
        shrts.spc()
        shrts.oktocont()
        target = " -d " + target
        shrts.spc()
        print(""" Sources :
            baidu, bing, bingapi, censys, crtsh, dnsdumpster,
            dogpile, duckduckgo, exalead, github-code, google,
            hunter, intelx, linkedin, netcraft, securityTrails,
            threatcrowd, trello, twitter, vhost, virustotal, yahoo
            """)
        shrts.spc()
        source = sanitize.bash_escape_restrictor(input("Select a Soruce (Ex : bing,google,baidu) : "))
        shrts.prilogspc()
        os.system("theHarvester" + target + " -l 500 -b " + source)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/laramies/theHarvester.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + theHarvester.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 " + shrts.getinstalldir() + tool_dir + "/setup.py install" + null)
        os.system("ln -s /usr/bin/theHarvester /usr/local/bin/theHarvester")
        print("You can now use " + "\033[91m" + theHarvester.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Ejemplo n.º 3
0
def brut3k1t():
    tool_dir = "/INFO-GATH/Tools/brut3k1t"
    brut3k1t.title = "brut3k1t : A security-oriented bruteforce framework"
    if os.path.exists('/usr/bin/brut3k1t'):
        shrts.prilogspc()
        os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        service = sanitize.bash_escape_restrictor(input("Select a service (ssh,smtp,xmpp,facebook,instagram,twitter,md5):"))
        user = sanitize.bash_escape_restrictor(input("Choose a user : "******"Enter an address : "))
        shrts.spc()
        print("      \033[92m    Check files on " + shrts.getinstalldir() + "/PASSWORD/wordlists/\033[90m")
        shrts.spc()
        wordlist = sanitize.bash_escape_restrictor(input("Select the wordlist file : "))
        shrts.prilogspc()
        os.system("brut3k1t -s"  + service + " -a " + address + " -u " + user + " -w " + wordlist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/ex0dus-0x/brut3k1t.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + brut3k1t.title + "\033[90m")
        shrts.spc()
        print("\033[91m\033[91mInstalling ...\033[0m\033[0m")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python2 setup.py install" + null)
        os.system("ln -s /usr/bin/brut3k1t /usr/local/bin/brut3k1t")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + brut3k1t.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 4
0
def Striker():
    Striker.title = "Striker : an offensive information and vulnerability scanner."
    tool_dir = "/INFO-GATH/Tools/Striker"
    if os.path.exists('/usr/local/bin/Striker'):
        shrts.prilogspc()
        os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability")
        print("\033[90m")
        shrts.pop()
        shrts.prilogspc()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/striker.py " + target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/s0md3v/Striker.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Striker.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Striker""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Striker""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/striker.py >> /usr/local/bin/Striker")
        os.system("chmod +x /usr/local/bin/Striker")
        print(("You can now use " + "\033[91m" + Striker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 5
0
def snmpwn():
    snmpwn.title = "snmpwn : An SNMPv3 User Enumerator and Attack tool"
    tool_dir = "/INFO-GATH/Tools/snmpwn"
    if os.path.exists('/usr/local/bin/snmpwn'):
        shrts.prilogspc()
        os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        hosts = sanitize.bash_escape_restrictor(input("Enter the targets hosts file : "))
        users = sanitize.bash_escape_restrictor(input("List of users you want to try : "))
        passlist = sanitize.bash_escape_restrictor(input("Password list for attacks : "))
        enclist = sanitize.bash_escape_restrictor(input("Encryption Password List for AuthPriv types : "))
        hosts = "--hosts " + hosts
        users = "--users " + users
        passlist = "--passlist " + passlist
        enclist = "--enclist " + enclist
        shrts.prilogspc()
        os.system("snmpwn " + hosts + " " + users + " " + passlist + " " + enclist)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + snmpwn.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        print("\033[91m-[!]-\033[90m    \033[94mTo install this tool you need a non-root user, Please choose one !\033[90m \033[91m-[!] \033[90m")
        user = input("\033[91m-[!]-\033[90m        \033[94mEnter the non-root user username\033[90m  : ")
        shrts.spc()
        os.system("su -c " + "'cd " + shrts.getinstalldir() + tool_dir + " && gem install bundler && bundle install' " + user + null)
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/snmpwn""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/snmpwn""")
        os.system("echo ruby " + shrts.getinstalldir() + tool_dir + "/snmpwn.rb >> /usr/local/bin/snmpwn")
        os.system("chmod +x /usr/local/bin/snmpwn")
        print(("You can now use " + "\033[91m" + snmpwn.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 6
0
def wafw00f():
    wafw00f.title = "wafw00f : identify and fingerprint Web Application Firewall "
    tool_dir = "/INFO-GATH/Tools/wafw00f"
    if os.path.exists('/usr/local/bin/wafw00f'):
        shrts.prilogspc()
        os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.spc()
        domaine = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.prilogspc()
        os.system("wafw00f "  + domaine)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + wafw00f.title + "\033[90m")
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m")
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install" + null)
        os.system("ln -s /usr/bin/wafw00f /usr/local/bin/wafw00f")
        print(("You can now use " + "\033[91m" + wafw00f.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 7
0
def Sublist3r():
    Sublist3r.title = "Sublist3r : Fast subdomains enumeration tool for penetration testers"
    tool_dir = "/INFO-GATH/Tools/Sublist3r"
    if os.path.exists('/usr/local/bin/Sublist3r'):
        shrts.prilogspc()
        os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        domaine = sanitize.bash_escape_restrictor(input("Select a Target: "))
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() + "/PASSWORD/wordlists/ -type f | grep domain")
        os.system("find " + shrts.getinstalldir() + "/IMAGES/ -type f | grep tcp")
        os.system("find " + shrts.getinstalldir() + "/NETWORKING/ -type f ")
        print("\033[90m")
        shrts.pop()
        bruteforce = input("Enable the subbrute bruteforce module ? (Y/N) : ")
        verbose = input("Enable the verbose mode and display results in realtime ? (Y/N) : ")
        ports = sanitize.bash_escape_restrictor(input("Specify tcp ports for subdomains finding : "))
        threads = sanitize.bash_escape_restrictor(input("Number of threads to use for subbrute bruteforce ?  : "))
        engines = sanitize.bash_escape_restrictor(input("Specify a comma-separated list of search engines : "))
        if not domaine:
            domaine = ""
        else:
            domaine = " -d " + domaine
        if not ports:
            ports = ""
        else:
            ports = " -p " + ports
        if not threads:
            threads = ""
        else:
            threads = " -t " + threads
        if not engines:
            engines = ""
        else:
            engines = " -e " + engines
        if not bruteforce in no:
            bruteforce = "-b"
        else:
            bruteforce = ""
        if not verbose in no:
            verbose = " -v "
        else:
            verbose = ""
        shrts.prilogspc()
        os.system("python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py" + domaine + " " + bruteforce + " " + verbose + ports + engines + threads)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/aboul3la/Sublist3r.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Sublist3r.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m")
        shrts.spc()
        os.system("pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Sublist3r""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Sublist3r""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sublist3r.py >> /usr/local/bin/Sublist3r")
        os.system("chmod +x /usr/local/bin/Sublist3r")
        print(("You can now use " + "\033[91m" + Sublist3r.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Ejemplo n.º 8
0
def menu():
    shrts.clscprilo()
    print("""\033[94m
    [ INFORMATION GATHERING ]

        Make A Choice :\033[90m
    \033[91m -[!]----- Tools ------[!]-\033[90m

        \033[93m-[!]----- Auto ------[!]-

            1)  DirSearch
            2)  brut3k1t
            3)  Gobuster
            4)  Enyx
            5)  Nasnum
            6)  Sublist3r
            7)  Wafw00f
            8)  Sherlock
            9)  Snmpwn
            10) Striker
            11) TheHarvester
            12) URLextractor
            13) Denumerator

        -[!]----- Manual ------[!]-

            14) Photon
            15) Raccoon
            16) dnsrecon
            17) Nmap
        -[!]----- FrameWorks ------[!]-

            18) ReconDog
            19) RED_HAWK
            20) Dracnmap\033[90m

    \033[91m-[!]----- Cheatsheets ------[!]-\033[90m

        \033[93m    21) Information Gathering Cheatsheets\033[90m
    ------------------------
    \033[94mb)    Back to ROOT MENU
    q)    Leave  Lockdoor\033[94m
       """)
    choice = input("\033[92mLockdoor@EnumInfoGathering~# \033[0m")
    os.system('clear')
    if choice == "1":
      dirsearch()
    elif choice == "2":
      brut3k1t()
    elif choice == "3":
      gobuster()
    elif choice == "4":
      enyx()
    elif choice == "5":
      Nasnum()
    elif choice == "6":
      Sublist3r()
    elif choice == "7":
      wafw00f()
    elif choice == "8":
      sherlock()
    elif choice == "9":
      snmpwn()
    elif choice == "10":
      Striker()
    elif choice == "11":
      theHarvester()
    elif choice == "12":
      URLextractor()
    elif choice == "13":
      denumerator()
    elif choice == "14":
      Photon()
    elif choice == "15":
      Raccoon()
    elif choice == "16":
      dnsrecon()
    elif choice == "17":
      nmap()
    elif choice == "18":
      ReconDog()
    elif choice == "19":
      RED_HAWK()
    elif choice == "20":
      Dracnmap()
    elif choice == "21":
      infgathsh()
    elif choice == "b":
      main.menu()
    elif choice == "q":
        shrts.prilogspc()
        now = datetime.now()
        dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
        print("                 \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m")
        shrts.spc()
        print("                 \033[91m-[!]- EXITING AT " + dt_string + " -[!]-\033[0m")
        sys.exit()
    elif choice == "":
      menu()
    else:
      menu()