def webshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/BlackArch/webshells.git " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.spc() print( "BlackArch Webshells collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.oksh()
def ptyshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/infodox/python-pty-shells " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.spc() print( "The Python PTY backdoors collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.oksh()
def priivesc(): priivesc.title=("A collection of Windows, Linux and MySQL privilege escalation scripts and exploits") shrts.printlogo() print("\033[92m" + priivesc.title + "\033[90m") print() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/PrivEsc.git " + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.spc() print("\033[91m" + """\033[91mThe collection of Windows, Linux and MySQL privilege escalation scripts and exploits is downloaded successfully , you can check it here : """ + "\033[90m" + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.okpr()
def dnsrecon(): dnsrecon.title = "DnsRecon : A DNS Enumeration Script" tool_dir = "/INFO-GATH/Tools/DnsRecon" if os.path.exists('/usr/local/bin/dnsrecon'): shrts.prilogspc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() target = input( "Select a Target (use 'dnsrecon --help' for more options) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + " -type f | grep dns_") print("\033[90m") shrts.pop() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py -d " + target) shrts.spc() print("\033[92mFor more options, Use dnsrecon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/darkoperator/dnsrecon.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() print("\033[92m " + dnsrecon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/dnsrecon""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/dnsrecon""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dnsrecon.py >> /usr/local/bin/dnsrecon") os.system("chmod +x /usr/local/bin/dnsrecon") shrts.prilogspc() print(("You can now use " + "\033[91m" + dnsrecon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def lockdoor(): shrts.clr() shrts.printlogo() shrts.spc() choiceupdate = input(" \033[92m[Confirmation]\033[90m\033[94m You want to update Lockdoor and all tools ? (Y / N) : \033[90m") if not choiceupdate in no: print("\033[92mUpdating Lockdoor...\033[90m") shrts.spc() os.system('pip install --upgrade lockdoor') shrts.spc() shrts.oktocont() print("\033[92mUpdating The Tools...\033[90m") shrts.spc() os.system('sudo find ' + shrts.getinstalldir() + ' -type d -name .git -exec sh -c "cd \"{}\"/../ && git pull --ff-only origin master" \;') shrts.clr() main.menu()
def Raccoon(): Raccoon.title = "Raccoon : an offensive security tool for reconnaissance and vulnerability scanning." tool_dir = "/INFO-GATH/Tools/Raccoon" if os.path.exists('/usr/local/bin/Raccoon'): shrts.prilogspc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() target = input( "Select a Target (use 'raccoon --help' for more options) : ") shrts.spc() print("\033[92mCheatsheets that can help you with this :") shrts.spc() os.system("find " + shrts.getinstalldir() + "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability") print("\033[90m") shrts.pop() os.system("raccoon " + target) shrts.spc() print("\033[92mFor more options, Use raccoon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/evyatarmeged/Raccoon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Raccoon.title + "\033[90m") shrts.spc() shrts.printlogo() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install" + null) os.system("ln -s /usr/bin/raccoon /usr/local/bin/Raccoon") shrts.prilogspc() print(("You can now use " + "\033[91m" + Raccoon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def dlrockyou(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system( "wget -O " + shrts.getinstalldir() + "/PASSWORD/wordlists/rockyou.gz https://gitlab.com/kalilinux/packages/wordlists/raw/kali/master/rockyou.txt.gz" ) shrts.spc() print("\033[91mExtracting ...\033[0m") os.system("gunzip " + shrts.getinstalldir() + "/PASSWORD/wordlists/rockyou.gz") os.system("rm " + shrts.getinstalldir() + "/PASSWORD/wordlists/rockyou.txt.gz") shrts.spc() print( "Rockyou Password list downloaded successfully , you can use it from here " + shrts.getinstalldir() + "/PASSWORD/wordlists/") shrts.okpa()
def sqlmap(): sqlmap.title = "SQLmap : Automatic SQL injection and database takeover tool " tool_dir = "/WEB/Tools/sqlmap" if os.path.exists('/usr/bin/sqlmap'): shrts.printlogo() os.system("git clone https://github.com/sqlmapproject/sqlmap " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() target = input("Select a Target : ") shrts.spc() print("Check the sqli cheatsheets to know more") shrts.spc() os.system("find " + shrts.getinstalldir() + "/WEB/CHEATSHEETS/ -type f | grep sqli") shrts.popp() os.system("sqlmap -u " + target) shrts.okwe() else: shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/sqlmapproject/sqlmap " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sqlmap.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("""echo "#!/bin/bash" > /usr/local/bin/sqlmap""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sqlmap""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/sqlmap.py >> /usr/local/bin/sqlmap") os.system("chmod +x /usr/local/bin/sqlmap") shrts.spc() print(("You can now use " + "\033[91m" + sqlmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def whatweb(): whatweb.title = "whatweb : Next generation web scanner " tool_dir = "/WEB/Tools/whatweb" if os.path.exists('/usr/local/bin/whatweb'): shrts.printlogo() os.system("git clone https://github.com/urbanadventurer/WhatWeb " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() shrts.spc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() target = input("Select a Target : ") shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/whatweb " + target) shrts.okwe() else: shrts.prilogspc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/urbanadventurer/WhatWeb " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + whatweb.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && gem install json && gem install rchardet") os.system("""echo "#!/bin/bash" > /usr/local/bin/whatweb""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/whatweb""") os.system("echo " + shrts.getinstalldir() + tool_dir + "/whatweb >> /usr/local/bin/whatweb") os.system("chmod +x /usr/local/bin/whatweb") shrts.spc() print(("You can now use " + "\033[91m" + whatweb.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def menu(): os.system('clear') shrts.printlogo() print(""" \033[94m [ R00T MENU ] Make A Choice :\033[0m \033[93m1) Information Gathering 2) Web Hacking 3) Exploitation 4) Reverse Engineering 5) Encryption/Decryption 6) Password Attacks 7) Shells 8) Privilege Escalation 9) Social Engineering 10) Pentesting & Security Assessment Findings Report Templates 11) Help with Walk Throughs & Pentest Processing\033[0m ------------------------ \033[94ma) About Lockdoor u) Update Lockdoor q) Leave Lockdoor\033[90m """) choice = input("\033[92mLockdoor~# \033[0m") os.system('clear') if choice == "1": infogathering.menu() elif choice == "2": webhack.menu() elif choice == "3": exploitation.menu() elif choice == "4": reverse.menu() elif choice == "5": encdyc.menu() elif choice == "6": passattack.menu() elif choice == "7": shells.menu() elif choice == "8": privesc.menu() elif choice == "9": soceng.menu() elif choice == "10": psafrt.psafrt() elif choice == "11": wtpp.wtpp() elif choice == "a": about.show() elif choice == "u": update.lockdoor() elif choice == "q": shrts.printlogo() print("") now = datetime.now() date = now.strftime("%d/%m/%Y %H:%M:%S") print( " \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m") print("") print(" \033[91m-[!]- EXITING AT " + date + " -[!]-\033[0m") sys.exit() elif choice == "": menu() else: menu()