def Jdorker(): Jdorker.title = "J-dorker : a Website List grabber from Bing" tool_dir = "/WEB/Tools/Jdorker" if os.path.exists('/usr/local/bin/Jdorker'): shrts.prilogspc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() os.system("Jdorker") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Jdorker""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Jdorker""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/priv8dorker.py >> /usr/local/bin/Jdorker") os.system("chmod +x /usr/local/bin/Jdorker") print(("You can now use " + "\033[91m" + Jdorker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def Findsploit(): Findsploit.title = "Findsploit : Find exploits in local and online databases instantly" tool_dir = "/EXPLOITATION/Tools/Findsploit" if os.path.exists('/usr/local/bin/Findsploit'): shrts.prilogspc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() ans = input("\033[92mWhat exploits are you looking ? : \033[90m") os.system("Findsploit " + ans) shrts.okex() else: shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("sh " + shrts.getinstalldir() + tool_dir + "/install.sh") os.system("ln -s /usr/bin/findsploit /usr/local/bin/Findsploit") shrts.spc() print("You can now use " + "\033[91m" + Findsploit.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]") shrts.okex()
def Photon(): Photon.title = "Photon : an incredibly fast crawler designed for OSINT." tool_dir = "/INFO-GATH/Tools/Photon" if os.path.exists('/usr/local/bin/Photon'): shrts.prilogspc() os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.spc() os.system("Photon") shrts.spc() print("\033[92mFor more options, Use Photon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Photon""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Photon""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/photon.py >> /usr/local/bin/Photon") os.system("chmod +x /usr/local/bin/Photon") print("You can now use " + "\033[91m" + Photon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def burp(): burp.title = "BurpSuite : Web vulnerability scanner." tool_dir = "/EXPLOITATION/Tools/burp" if os.path.exists('/usr/local/bin/burp'): shrts.prilogspc() shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() os.system("burpsuite") shrts.okex() else: shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("mkdir " + shrts.getinstalldir() + tool_dir) os.system( "wget -O " + shrts.getinstalldir() + tool_dir + "/burp.jar https://portswigger.net/DownloadUpdate.ashx\?Product\=Free" ) shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/burp""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/burp""") os.system("echo java -jar " + shrts.getinstalldir() + tool_dir + "/burp.jar >> /usr/local/bin/burp") os.system("chmod +x /usr/local/bin/burp") print(("You can now use " + "\033[91m" + burp.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okex()
def sherlock(): sherlock.title = "sherlock : Find usernames across social networks" tool_dir = "/INFO-GATH/Tools/sherlock" if os.path.exists('/usr/local/bin/sherlock'): shrts.prilogspc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Enter the target username : "******"python " + shrts.getinstalldir() + tool_dir + "/sherlock.py " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install --upgrade setuptools && pip3 install -r requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/sherlock""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sherlock""") os.system("echo python " + shrts.getinstalldir() + tool_dir + "/sherlock.py >> /usr/local/bin/sherlock") os.system("chmod +x /usr/local/bin/sherlock") print(("You can now use " + "\033[91m" + sherlock.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Codetective(): Codetective.title = "Codetective : a tool to determine the crypto/encoding algorithm used" tool_dir = "/ENCRYPTION/Tools/Codetective" if os.path.exists('/usr/local/bin/Codetective'): shrts.prilogspc() os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() os.system("Codetective") shrts.okenc() else: shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Codetective""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Codetective""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/codetective.py >> /usr/local/bin/Codetective") os.system("chmod +x /usr/local/bin/Codetective") print(("You can now use " + "\033[91m" + Codetective.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) print("Type Codetective to run the tool from Terminal") shrts.okenc()
def menu(): shrts.clscprilo() print("""\033[94m [ REVERSE ENGINEERING ] Make A Choice :\033[90m \033[91m -[!]----- Tools ------[!]-\033[90m \033[93m1) Radar2 2) Virustotal 3) Miasm 4) Mirror 5) Dnspy 6) Angrio 7) DLLRunner 8) Yara\033[90m \033[91m-[!]----- Cheatsheets ------[!]-\033[90m \033[93m 9) Reverse Engineering Cheatsheets\033[90m ------------------------ \033[94mb) Back to ROOT MENU q) Leave Lockdoor\033[94m """) choice = input("\033[92mLockdoor@ReverseEngineering~# \033[0m") os.system('clear') if choice == "1": radar2() elif choice == "2": virustotal() elif choice == "3": miasm() elif choice == "4": mirror() elif choice == "5": Dnspy() elif choice == "6": angrio() elif choice == "7": dllrunner() elif choice == "8": yara() elif choice == "9": revsh() elif choice == "b": main.menu() elif choice == "q": shrts.prilogspc() now = datetime.now() dt_string = now.strftime("%d/%m/%Y %H:%M:%S") print( " \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m") shrts.spc() print(" \033[91m-[!]- EXITING AT " + dt_string + " -[!]-\033[0m") sys.exit() elif choice == "": menu() else: menu()
def findmyhash(): findmyhash.title = "findmyhash : Python script to crack hashes using online services" tool_dir = "/ENCRYPTION/Tools/Findmyhash" if os.path.exists('/usr/local/bin/Findmyhash'): shrts.prilogspc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print(""" MD4 - RFC 1320 MD5 - RFC 1321 SHA1 - RFC 3174 (FIPS 180-3) SHA224 - RFC 3874 (FIPS 180-3) SHA256 - FIPS 180-3 SHA384 - FIPS 180-3 SHA512 - FIPS 180-3 RMD160 - RFC 2857 GOST - RFC 5831 WHIRLPOOL - ISO/IEC 10118-3:2004 LM - Microsoft Windows hash NTLM - Microsoft Windows hash MYSQL - MySQL 3, 4, 5 hash CISCO7 - Cisco IOS type 7 encrypted passwords JUNIPER - Juniper Networks $9$ encrypted passwords LDAP_MD5 - MD5 Base64 encoded LDAP_SHA1 - SHA1 Base64 encoded """) algo = input("What Algo you want to use ? : ") hash = input("Enter the hash : ") os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " + algo + " -h " + hash) shrts.okenc() else: shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Findmyhash""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Findmyhash""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py >> /usr/local/bin/Findmyhash") os.system("chmod +x /usr/local/bin/Findmyhash") print(("You can now use " + "\033[91m" + findmyhash.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okenc()
def wtpp(): shrts.clscprilo() print("\033[91mHere is the list of the files :\033[90m") print("\033[92m") os.system(" find " + shrts.getinstalldir() + "/WALK -type f") print("\033[90m") shrts.spc() shrts.oktocont() main.menu()
def psafrt(): shrts.clscprilo() print("\033[91mHere is the list of the files :\033[90m") print("\033[92m") os.system(" find " + shrts.getinstalldir() + "/REPORT/TEMPLATES/ -type f") print("\033[90m") shrts.spc() shrts.oktocont() main.menu()
def webshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/BlackArch/webshells.git " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.spc() print( "BlackArch Webshells collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.oksh()
def ptyshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/infodox/python-pty-shells " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.spc() print( "The Python PTY backdoors collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.oksh()
def radar2(): radar2.title = "Radar 2 : unix-like reverse engineering framework" tool_dir = "/REVERSE/Tools/radar2" shrts.prilogspc() os.system("git clone https://github.com/radare/radare2.git " + shrts.getinstalldir() + tool_dir + null) shrts.clscprilo() print("\033[92m Radar2 Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def menu(): shrts.clscprilo() print("""\033[94m [ EXPLOITATION ] Make A Choice :\033[90m \033[91m -[!]----- Tools ------[!]-\033[90m \033[93m1) Findsploit 2) Pompem 3) rFix 4) Inurlbr 5) BurpSuite 6) Linux exploit suggester2\033[90m \033[91m -[!]----- Cheatsheets ------[!]-\033[90m \033[93m7) Exploitation Cheatsheets\033[90m ------------------------ \033[94mb) Back to ROOT MENU q) Leave Lockdoor\033[90m """) choice = input("\033[92mLockdoor@Exploitation~# \033[0m") os.system('clear') if choice == "1": Findsploit() elif choice == "2": Pompem() elif choice == "3": rfix() elif choice == "4": inurlbr() elif choice == "5": burp() elif choice == "6": linexpsug() elif choice == "7": expsh() elif choice == "b": main.menu() elif choice == "q": shrts.prilogspc() now = datetime.now() dt_string = now.strftime("%d/%m/%Y %H:%M:%S") print( " \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m") shrts.spc() print(" \033[91m-[!]- EXITING AT " + dt_string + " -[!]-\033[0m") sys.exit() elif choice == "": menu() else: menu()
def priivesc(): priivesc.title=("A collection of Windows, Linux and MySQL privilege escalation scripts and exploits") shrts.printlogo() print("\033[92m" + priivesc.title + "\033[90m") print() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/PrivEsc.git " + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.spc() print("\033[91m" + """\033[91mThe collection of Windows, Linux and MySQL privilege escalation scripts and exploits is downloaded successfully , you can check it here : """ + "\033[90m" + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.okpr()
def scythe(): scythe.title = "Cewl : an accounts enumerator" tool_dir = "/SOCIAL_ENGINEERING/Tools/scythe" shrts.prilogspc() shrts.prilogspc() print("\033[92m " + scythe.title + "\033[90m") shrts.spc() print("\033[92m" + "Change " + shrts.getinstalldir() + tool_dir + "/accountfile.txt" + """ with your targes""" + "\033[90m") shrts.spc() os.system("python2 " + shrts.getinstalldir() + tool_dir + "/scythe.py") shrts.okso()
def Dnspy(): Dnspy.title = "Dnspy : reverses the bytes of a file" tool_dir = "/REVERSE/Tools/Dnspy" shrts.prilogspc() os.system("git clone https://github.com/0xd4d/dnSpy.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Dnspy Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def dllrunner(): dllrunner.title = "Dllrunner : a smart DLL execution script for malware analysis" tool_dir = "/REVERSE/Tools/dllrunner" shrts.prilogspc() os.system("git clone https://github.com/Neo23x0/DLLRunner " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Dllrunner Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def mirror(): mirror.title = "mirror : reverses the bytes of a file" tool_dir = "/REVERSE/Tools/mirror" shrts.prilogspc() os.system("git clone https://github.com/guelfoweb/mirror.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Mirror Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def V3n0M(): V3n0M.title = "V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns " tool_dir = "/WEB/Tools/V3n0M" if os.path.exists('/usr/local/bin/V3n0M'): shrts.prilogspc() os.system( "git clone https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() os.system("V3n0M") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system( "git clone https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("python3 " + shrts.getinstalldir() + tool_dir + "/setup.py install" + null) os.system("ln -s /usr/bin/v3n0m /usr/local/bin/V3n0M") shrts.prilogspc() print(("You can now use " + "\033[91m" + V3n0M.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def URLextractor(): URLextractor.title = "URLextractor : an Information gathering & website reconnaissance tool" tool_dir = "/INFO-GATH/Tools/URLextractor" if os.path.exists('/usr/local/bin/URLextractor'): shrts.prilogspc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/extractor.sh "+ target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/URLextractor""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/URLextractor""") os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/extractor.sh >> /usr/local/bin/URLextractor") os.system("chmod +x /usr/local/bin/URLextractor") print("You can now use " + "\033[91m" + URLextractor.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def denumerator(): denumerator.title = "denumerator.py : Enumerates list of subdomains" tool_dir = "/INFO-GATH/Tools/" if os.path.exists('/usr/local/bin/denumerator'): shrts.prilogspc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() targetlist = sanitize.bash_escape_restrictor(input("Enter the Targets list: ")) shrts.prilogspc() os.system("denumerator -f " + targetlist + " -t 10") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/denumerator""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/denumerator""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/denumerator.py >> /usr/local/bin/denumerator") os.system("chmod +x /usr/local/bin/denumerator") print("You can now use " + "\033[91m" + denumerator.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def CMSmap(): CMSmap.title = "CMSmap : A CMS scanner " tool_dir = "/WEB/Tools/CMSmap" if os.path.exists('/usr/local/bin/CMSmap'): shrts.prilogspc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() os.system("cmsmap") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/Dionach/CMSmap.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install >/dev/null") os.system("ln -s /usr/bin/cmsmap /usr/local/bin/CMSmap") shrts.prilogspc() print(("You can now use " + "\033[91m" + CMSmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def droopescan(): droopescan.title = "droopescan : scanner , identify , CMSs , Drupal , Silverstripe." tool_dir = "/WEB/Tools/droopescan" if os.path.exists('/usr/local/bin/droopescan'): shrts.prilogspc() os.system("git clone https://github.com/droope/droopescan.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() os.system("droopescan") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/droope/droopescan.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install " + null) os.system("ln -s /usr/bin/droopescan /usr/local/bin/droopescan") shrts.prilogspc() print(("You can now use " + "\033[91m" + droopescan.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def Optiva(): Optiva.title = "Optiva-Framework : a Web Application Scanner" tool_dir = "/WEB/Tools/Optiva" if os.path.exists('/usr/local/bin/Optiva'): shrts.prilogspc() os.system( "git clone https://github.com/joker25000/Optiva-Framework " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() os.system("optiva") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/joker25000/Optiva-Framework " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("chmod +x " + shrts.getinstalldir() + tool_dir + "/installer.sh") os.system("cd " + shrts.getinstalldir() + tool_dir + " && sh installer.sh") os.system("ln -s /usr/bin/optiva /usr/local/bin/Optiva") shrts.prilogspc() print(("You can now use " + "\033[91m" + Optiva.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def enyx(): enyx.title = "Enyx : An SNMP IPv6 Enumeration Tool" tool_dir = "/INFO-GATH/Tools/Enyx" if os.path.exists('/usr/local/bin/enyx'): shrts.prilogspc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() snmpversion = sanitize.bash_escape_restrictor(input("Whats the snmp Version (1 or 2c) : ")) communitystring = sanitize.bash_escape_restrictor(input("Whats the Community string (public or private) : ")) ipad = sanitize.bash_escape_restrictor(input("Whats the IP : ")) shrts.prilogspc() os.system("python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py " + snmpversion + " " + communitystring + " " + ipad) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/enyx""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/enyx""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py >> /usr/local/bin/enyx") os.system("chmod +x /usr/local/bin/enyx") print(("You can now use " + "\033[91m" + enyx.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def linexpsug(): linexpsug.title = "linux-exploit-suggester2 : A perl Linux exploit suggester script" tool_dir = "/EXPLOITATION/linux-exploit-suggester" shrts.prilogspc() os.system( "git clone https://github.com/jondonas/linux-exploit-suggester-2.git " + shrts.getinstalldir() + tool_dir + null) shrts.clscprilo() print( "\033[92m linux-exploit-suggester2 Downlaoded successfully \033[90m" ) shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okex()
def yara(): yara.title = "YARA : a tool to identify and classify malwares " tool_dir = "/REVERSE/Tools/yara" shrts.prilogspc() print("\033[92m Installing \033[90m") shrts.spc() os.system("pip install yara-python") shrts.clr() shrts.prilogspc() print("\033[92m YARA Downlaoded successfully \033[90m") shrts.spc() print( "\033[92m Check YARA Docs to learn more about the tool\033[90m" ) print("\033[92m https://yara.readthedocs.io/en/latest/\033[90m") shrts.okrev()
def angrio(): angrio.title = "angrio : a python framework for analyzing binaries" tool_dir = "/REVERSE/Tools/angrio" shrts.prilogspc() print("\033[92m Installing \033[90m") shrts.spc() os.system("pip install angr ") shrts.clr() shrts.prilogspc() print("\033[92m Dnspy Downlaoded successfully \033[90m") shrts.spc() print( "\033[92m Check Angr.io docs to learn more about the tool \033[90m" ) print("\033[92m https://github.com/angr/angr-doc \033[90m") shrts.okrev()
def menu(): shrts.clscprilo() print("""\033[94m [ PASSWORD ATTACKS ] Make A Choice :\033[90m \033[91m -[!]----- Tools ------[!]-\033[90m \033[93m1) Crunch 2) CeWl 3) Patator 4) Download Rockyou.txt\033[90m \033[91m-[!]----- Cheatsheets ------[!]-\033[90m \033[93m 5) Password Attacks Cheatsheets Cheatsheets\033[90m ------------------------ \033[94mb) Back to ROOT MENU q) Leave Lockdoor\033[94m """) choice = input("\033[92mLockdoor@PassAttacks~# \033[0m") os.system('clear') if choice == "1": crunch() elif choice == "2": Cewl() elif choice == "3": patator() elif choice == "4": dlrockyou() elif choice == "5": passsh() elif choice == "b": main.menu() elif choice == "q": shrts.prilogspc() now = datetime.now() dt_string = now.strftime("%d/%m/%Y %H:%M:%S") print( " \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m") shrts.spc() print(" \033[91m-[!]- EXITING AT " + dt_string + " -[!]-\033[0m") sys.exit() elif choice == "": menu() else: menu()