Example #1
0
def exploit_db():
    db = raw_input("" + N + "Pentest>> (" + B + "modules/exploitdb" + N +
                   "): ")
    if db == 'show options':
        help.optionsdb()
        exploit_db()
    elif db == 'set exploitdb/exploits':
        exploitdb.explo()
        exploit_db()
    elif db == 'set exploitdb/shellcode':
        exploitdb.shel()
        exploit_db()
    elif db == 'searchsploit':
        exploitdb.searchsploit()
        exploit_db()
    elif db == 'show module':
        help.db()
        exploit_db()
    elif db == 'exit':
        print
        print "" + G + "Thanks for using PTF"
        print
        exit()
    elif db == 'clear':
        clean()
        exploit_db()
    elif db == 'back':
        main()
    else:
        print "Wrong Command => ", db
        print "" + N + "" + B + "[" + R + "!" + B + "] " + N + "Please enter 'show options'"
        exploit_db()
def exploit_db():
    db = raw_input("" + N + "Pentest>> (" + B + "modules/exploitdb" + N +
                   "): ")
    if db == 'show options':
        print """
              +-----------------------------------------------------------------------+
              |OPTIONS                                                                |
              -------------------------------------------------------------------------
              |  \033[31mCommand                                Description      \033[1;37m             |
              -------------------------------------------------------------------------
              | show module                      Lock this modules exploitdb          |
              | searchsploit                     searchsploit exploit-db              |
              | set                              set modules exploitdb                |
              | back                             back menu                            |
              -------------------------------------------------------------------------
"""
        exploit_db()
    elif db == 'set exploitdb/exploits':
        exploitdb.explo()
        exploit_db()
    elif db == 'set exploitdb/shellcode':
        exploitdb.shel()
        exploit_db()
    elif db == 'searchsploit':
        exploitdb.searchsploit()
        exploit_db()
    elif db == 'show module':
        help.db()
        exploit_db()
    elif db == 'exit':
        print
        print "" + G + "Thanks for using PTF"
        print
        exit()

    elif db == 'clear':
        clean()
        exploit_db()
    elif db == 'back':
        main()
    else:
        print "Wrong Command => ", db
        print "" + N + "" + B + "[" + R + "!" + B + "] " + N + "Please enter 'show options'"
        exploit_db()