def nmap(): nmap.title = "Nmap : the Network Mapper " tool_dir = "/INFO-GATH/Tools/nmap" if os.path.exists('/usr/bin/nmap'): shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/Nmap-Cheat-Sheet.pdf \033[90m') shrts.popp() os.system("nmap " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("svn checkout https://svn.nmap.org/nmap/ " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + nmap.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && ./configure && make -j4 && make install && cd " + shrts.getinstalldir() + tool_dir + "/ncat && ./configure && make -j4 && make install") shrts.spc() print("You can now use " + "\033[91m" + nmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def URLextractor(): URLextractor.title = "URLextractor : an Information gathering & website reconnaissance tool" tool_dir = "/INFO-GATH/Tools/URLextractor" if os.path.exists('/usr/local/bin/URLextractor'): shrts.prilogspc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Select a Target : ")) shrts.prilogspc() os.system(shrts.getinstalldir() + tool_dir + "/extractor.sh "+ target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + URLextractor.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/URLextractor""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/URLextractor""") os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/extractor.sh >> /usr/local/bin/URLextractor") os.system("chmod +x /usr/local/bin/URLextractor") print("You can now use " + "\033[91m" + URLextractor.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def denumerator(): denumerator.title = "denumerator.py : Enumerates list of subdomains" tool_dir = "/INFO-GATH/Tools/" if os.path.exists('/usr/local/bin/denumerator'): shrts.prilogspc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() targetlist = sanitize.bash_escape_restrictor(input("Enter the Targets list: ")) shrts.prilogspc() os.system("denumerator -f " + targetlist + " -t 10") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null) shrts.prilogspc() print("\033[92m " + denumerator.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/denumerator""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/denumerator""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/denumerator.py >> /usr/local/bin/denumerator") os.system("chmod +x /usr/local/bin/denumerator") print("You can now use " + "\033[91m" + denumerator.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def sherlock(): sherlock.title = "sherlock : Find usernames across social networks" tool_dir = "/INFO-GATH/Tools/sherlock" if os.path.exists('/usr/local/bin/sherlock'): shrts.prilogspc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() target = sanitize.bash_escape_restrictor(input("Enter the target username : "******"python " + shrts.getinstalldir() + tool_dir + "/sherlock.py " + target) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + sherlock.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install --upgrade setuptools && pip3 install -r requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/sherlock""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sherlock""") os.system("echo python " + shrts.getinstalldir() + tool_dir + "/sherlock.py >> /usr/local/bin/sherlock") os.system("chmod +x /usr/local/bin/sherlock") print(("You can now use " + "\033[91m" + sherlock.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def dirsearch(): tool_dir = "/INFO-GATH/Tools/dirsearch" dirsearch.title = "DirSearch : Web path scanner " if os.path.exists('/usr/local/bin/DirSearch'): shrts.prilogspc() os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() choice = sanitize.bash_escape_restrictor(input("Select a Target : ")) extchoice = sanitize.bash_escape_restrictor(input("Select an extention (php,asp,aspx ..) : ")) shrts.spc() print("Cheatsheets that can help you with this :") shrts.spc() print("\033[92m" + shrts.getinstalldir() + '/INFO-GATH/CHEATSHEETS/file_enumeration.md \033[92m') shrts.popp() os.system("python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py" + " -u " + choice + " -e " + extchoice) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/maurosoria/dirsearch.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + dirsearch.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/DirSearch""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/DirSearch""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/dirsearch.py >> /usr/local/bin/DirSearch") os.system("chmod +x /usr/local/bin/DirSearch") print("You can now use " + "\033[91m" + dirsearch.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def enyx(): enyx.title = "Enyx : An SNMP IPv6 Enumeration Tool" tool_dir = "/INFO-GATH/Tools/Enyx" if os.path.exists('/usr/local/bin/enyx'): shrts.prilogspc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() snmpversion = sanitize.bash_escape_restrictor(input("Whats the snmp Version (1 or 2c) : ")) communitystring = sanitize.bash_escape_restrictor(input("Whats the Community string (public or private) : ")) ipad = sanitize.bash_escape_restrictor(input("Whats the IP : ")) shrts.prilogspc() os.system("python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py " + snmpversion + " " + communitystring + " " + ipad) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + enyx.title + "\033[90m") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/enyx""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/enyx""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py >> /usr/local/bin/enyx") os.system("chmod +x /usr/local/bin/enyx") print(("You can now use " + "\033[91m" + enyx.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Photon(): Photon.title = "Photon : an incredibly fast crawler designed for OSINT." tool_dir = "/INFO-GATH/Tools/Photon" if os.path.exists('/usr/local/bin/Photon'): shrts.prilogspc() os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.spc() os.system("Photon") shrts.spc() print("\033[92mFor more options, Use Photon --help\033[0m") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Photon.title + "\033[90m") shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("""echo "#!/bin/bash" > /usr/local/bin/Photon""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Photon""") os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/photon.py >> /usr/local/bin/Photon") os.system("chmod +x /usr/local/bin/Photon") print("You can now use " + "\033[91m" + Photon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ) shrts.okinf()
def droopescan(): droopescan.title = "droopescan : scanner , identify , CMSs , Drupal , Silverstripe." tool_dir = "/WEB/Tools/droopescan" if os.path.exists('/usr/local/bin/droopescan'): shrts.prilogspc() os.system("git clone https://github.com/droope/droopescan.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() os.system("droopescan") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/droope/droopescan.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + droopescan.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install " + null) os.system("ln -s /usr/bin/droopescan /usr/local/bin/droopescan") shrts.prilogspc() print(("You can now use " + "\033[91m" + droopescan.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def Codetective(): Codetective.title = "Codetective : a tool to determine the crypto/encoding algorithm used" tool_dir = "/ENCRYPTION/Tools/Codetective" if os.path.exists('/usr/local/bin/Codetective'): shrts.prilogspc() os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() os.system("Codetective") shrts.okenc() else: shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Codetective.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Codetective""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Codetective""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/codetective.py >> /usr/local/bin/Codetective") os.system("chmod +x /usr/local/bin/Codetective") print(("You can now use " + "\033[91m" + Codetective.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) print("Type Codetective to run the tool from Terminal") shrts.okenc()
def RED_HAWK(): RED_HAWK.title = "RED_HAWK : All in one tool for Information Gathering, Vulnerability Scanning and Crawling" tool_dir = "/INFO-GATH/Tools/RED_HAWK" if os.path.exists('/usr/local/bin/RED_HAWK'): shrts.prilogspc() os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + RED_HAWK.title + "\033[90m") shrts.spc() os.system("RED_HAWK") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + RED_HAWK.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/Tuhinshubhra/RED_HAWK.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + RED_HAWK.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/RED_HAWK""") os.system("echo php " + shrts.getinstalldir() + tool_dir + "/rhawk.php >> /usr/local/bin/RED_HAWK") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/RED_HAWK""") os.system("chmod +x /usr/local/bin/RED_HAWK") shrts.spc() print(("You can now use " + "\033[91m" + RED_HAWK.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def Dracnmap(): Dracnmap.title = "Dracnmap : Info Gathering Framework" tool_dir = "/INFO-GATH/Tools/Dracnmap" if os.path.exists('/usr/local/bin/Dracnmap'): shrts.prilogspc() os.system("git clone https://github.com/Screetsec/Dracnmap.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Dracnmap.title + "\033[90m") shrts.spc() os.system("Dracnmap") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + Dracnmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/Screetsec/Dracnmap.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Dracnmap.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("chmod +x " + shrts.getinstalldir() + tool_dir + "/dracnmap-v2.2.sh") os.system("""echo "#!/bin/bash" > /usr/local/bin/Dracnmap""") os.system("echo " + shrts.getinstalldir() + tool_dir + "/dracnmap-v2.2.sh >> /usr/local/bin/Dracnmap") os.system("chmod +x /usr/local/bin/Dracnmap") shrts.spc() print(("You can now use " + "\033[91m" + Dracnmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def wafw00f(): wafw00f.title = "wafw00f : identify and fingerprint Web Application Firewall " tool_dir = "/INFO-GATH/Tools/wafw00f" if os.path.exists('/usr/local/bin/wafw00f'): shrts.prilogspc() os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.spc() domaine = input("Select a Target: ") shrts.prilogspc() os.system("wafw00f " + domaine) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/EnableSecurity/wafw00f.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + wafw00f.title + "\033[90m") shrts.prilogspc() print("\033[91mInstalling ...\033[0m") os.system("cd " + shrts.getinstalldir() + tool_dir + " && python setup.py install" + null) os.system("ln -s /usr/bin/wafw00f /usr/local/bin/wafw00f") print(("You can now use " + "\033[91m" + wafw00f.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def Optiva(): Optiva.title = "Optiva-Framework : a Web Application Scanner" tool_dir = "/WEB/Tools/Optiva" if os.path.exists('/usr/local/bin/Optiva'): shrts.prilogspc() os.system( "git clone https://github.com/joker25000/Optiva-Framework " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() os.system("optiva") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/joker25000/Optiva-Framework " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Optiva.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("chmod +x " + shrts.getinstalldir() + tool_dir + "/installer.sh") os.system("cd " + shrts.getinstalldir() + tool_dir + " && sh installer.sh") os.system("ln -s /usr/bin/optiva /usr/local/bin/Optiva") shrts.prilogspc() print(("You can now use " + "\033[91m" + Optiva.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def V3n0M(): V3n0M.title = "V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns " tool_dir = "/WEB/Tools/V3n0M" if os.path.exists('/usr/local/bin/V3n0M'): shrts.prilogspc() os.system( "git clone https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() os.system("V3n0M") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system( "git clone https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + V3n0M.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("python3 " + shrts.getinstalldir() + tool_dir + "/setup.py install" + null) os.system("ln -s /usr/bin/v3n0m /usr/local/bin/V3n0M") shrts.prilogspc() print(("You can now use " + "\033[91m" + V3n0M.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def CMSmap(): CMSmap.title = "CMSmap : A CMS scanner " tool_dir = "/WEB/Tools/CMSmap" if os.path.exists('/usr/local/bin/CMSmap'): shrts.prilogspc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() os.system("cmsmap") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/Dionach/CMSmap.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + CMSmap.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && python3 setup.py install >/dev/null") os.system("ln -s /usr/bin/cmsmap /usr/local/bin/CMSmap") shrts.prilogspc() print(("You can now use " + "\033[91m" + CMSmap.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def ReconDog(): ReconDog.title = "ReconDog # Reconnaissance Swiss Army Knife" tool_dir = "/INFO-GATH/Tools/ReconDog" if os.path.exists('/usr/local/bin/ReconDog'): shrts.prilogspc() os.system("git clone https://github.com/s0md3v/ReconDog.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + ReconDog.title + "\033[90m") shrts.spc() os.system("ReconDog") shrts.okinf() else: shrts.prilogspc() print("\033[92m " + ReconDog.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/s0md3v/ReconDog.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + ReconDog.title + "\033[90m") shrts.spc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("chmod +x " + shrts.getinstalldir() + tool_dir + "/dog") os.system("""echo "#!/bin/bash" > /usr/local/bin/ReconDog""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/ReconDog""") os.system("echo " + shrts.getinstalldir() + tool_dir + "/dog >> /usr/local/bin/ReconDog") os.system("chmod +x /usr/local/bin/ReconDog") shrts.spc() print(("You can now use " + "\033[91m" + ReconDog.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )) shrts.okinf()
def Jdorker(): Jdorker.title = "J-dorker : a Website List grabber from Bing" tool_dir = "/WEB/Tools/Jdorker" if os.path.exists('/usr/local/bin/Jdorker'): shrts.prilogspc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() os.system("Jdorker") shrts.okwe() else: shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/04x/J-dorker.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Jdorker.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Jdorker""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Jdorker""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/priv8dorker.py >> /usr/local/bin/Jdorker") os.system("chmod +x /usr/local/bin/Jdorker") print(("You can now use " + "\033[91m" + Jdorker.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okwe()
def burp(): burp.title = "BurpSuite : Web vulnerability scanner." tool_dir = "/EXPLOITATION/Tools/burp" if os.path.exists('/usr/local/bin/burp'): shrts.prilogspc() shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() os.system("burpsuite") shrts.okex() else: shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("mkdir " + shrts.getinstalldir() + tool_dir) os.system( "wget -O " + shrts.getinstalldir() + tool_dir + "/burp.jar https://portswigger.net/DownloadUpdate.ashx\?Product\=Free" ) shrts.prilogspc() print("\033[92m " + burp.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/burp""") os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/burp""") os.system("echo java -jar " + shrts.getinstalldir() + tool_dir + "/burp.jar >> /usr/local/bin/burp") os.system("chmod +x /usr/local/bin/burp") print(("You can now use " + "\033[91m" + burp.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okex()
def Findsploit(): Findsploit.title = "Findsploit : Find exploits in local and online databases instantly" tool_dir = "/EXPLOITATION/Tools/Findsploit" if os.path.exists('/usr/local/bin/Findsploit'): shrts.prilogspc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() ans = input("\033[92mWhat exploits are you looking ? : \033[90m") os.system("Findsploit " + ans) shrts.okex() else: shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/Findsploit.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null) os.system("sh " + shrts.getinstalldir() + tool_dir + "/install.sh") os.system("ln -s /usr/bin/findsploit /usr/local/bin/Findsploit") shrts.spc() print("You can now use " + "\033[91m" + Findsploit.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]") shrts.okex()
def findmyhash(): findmyhash.title = "findmyhash : Python script to crack hashes using online services" tool_dir = "/ENCRYPTION/Tools/Findmyhash" if os.path.exists('/usr/local/bin/Findmyhash'): shrts.prilogspc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print(""" MD4 - RFC 1320 MD5 - RFC 1321 SHA1 - RFC 3174 (FIPS 180-3) SHA224 - RFC 3874 (FIPS 180-3) SHA256 - FIPS 180-3 SHA384 - FIPS 180-3 SHA512 - FIPS 180-3 RMD160 - RFC 2857 GOST - RFC 5831 WHIRLPOOL - ISO/IEC 10118-3:2004 LM - Microsoft Windows hash NTLM - Microsoft Windows hash MYSQL - MySQL 3, 4, 5 hash CISCO7 - Cisco IOS type 7 encrypted passwords JUNIPER - Juniper Networks $9$ encrypted passwords LDAP_MD5 - MD5 Base64 encoded LDAP_SHA1 - SHA1 Base64 encoded """) algo = input("What Algo you want to use ? : ") hash = input("Enter the hash : ") os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " + algo + " -h " + hash) shrts.okenc() else: shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/frdmn/findmyhash.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + findmyhash.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/Findmyhash""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Findmyhash""") os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py >> /usr/local/bin/Findmyhash") os.system("chmod +x /usr/local/bin/Findmyhash") print(("You can now use " + "\033[91m" + findmyhash.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okenc()
def webshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/BlackArch/webshells.git " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.spc() print( "BlackArch Webshells collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/WebShells") shrts.oksh()
def snmpwn(): snmpwn.title = "snmpwn : An SNMPv3 User Enumerator and Attack tool" tool_dir = "/INFO-GATH/Tools/snmpwn" if os.path.exists('/usr/local/bin/snmpwn'): shrts.prilogspc() os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() hosts = input("Enter the targets hosts file : ") users = input("List of users you want to try : ") passlist = input("Password list for attacks : ") enclist = input("Encryption Password List for AuthPriv types : ") hosts = "--hosts " + hosts users = "--users " + users passlist = "--passlist " + passlist enclist = "--enclist " + enclist shrts.prilogspc() os.system("snmpwn " + hosts + " " + users + " " + passlist + " " + enclist) shrts.okinf() else: shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/hatlord/snmpwn.git " + shrts.getinstalldir() + tool_dir + null) shrts.prilogspc() print("\033[92m " + snmpwn.title + "\033[90m") shrts.spc() shrts.prilogspc() print("\033[91mInstalling ...\033[0m.") print( "\033[91m-[!]-\033[90m \033[94mTo install this tool you need a non-root user, Please choose one !\033[90m \033[91m-[!] \033[90m" ) user = input( "\033[91m-[!]-\033[90m \033[94mEnter the non-root user username\033[90m : " ) shrts.spc() os.system("su -c " + "'cd " + shrts.getinstalldir() + tool_dir + " && gem install bundler && bundle install' " + user + null) shrts.spc() os.system("""echo "#!/bin/bash" > /usr/local/bin/snmpwn""") os.system( """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/snmpwn""") os.system("echo ruby " + shrts.getinstalldir() + tool_dir + "/snmpwn.rb >> /usr/local/bin/snmpwn") os.system("chmod +x /usr/local/bin/snmpwn") print(("You can now use " + "\033[91m" + snmpwn.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]")) shrts.okinf()
def ptyshells(): shrts.printlogo() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/infodox/python-pty-shells " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.spc() print( "The Python PTY backdoors collection downloaded successfully , you can use them from " + shrts.getinstalldir() + "/SHELLS/python-pty-shells") shrts.oksh()
def radar2(): radar2.title = "Radar 2 : unix-like reverse engineering framework" tool_dir = "/REVERSE/Tools/radar2" shrts.prilogspc() os.system("git clone https://github.com/radare/radare2.git " + shrts.getinstalldir() + tool_dir + null) shrts.clscprilo() print("\033[92m Radar2 Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def scythe(): scythe.title = "Cewl : an accounts enumerator" tool_dir = "/SOCIAL_ENGINEERING/Tools/scythe" shrts.prilogspc() shrts.prilogspc() print("\033[92m " + scythe.title + "\033[90m") shrts.spc() print("\033[92m" + "Change " + shrts.getinstalldir() + tool_dir + "/accountfile.txt" + """ with your targes""" + "\033[90m") shrts.spc() os.system("python2 " + shrts.getinstalldir() + tool_dir + "/scythe.py") shrts.okso()
def priivesc(): priivesc.title=("A collection of Windows, Linux and MySQL privilege escalation scripts and exploits") shrts.printlogo() print("\033[92m" + priivesc.title + "\033[90m") print() print("\033[91mDownloading ...\033[0m") shrts.spc() os.system("git clone https://github.com/1N3/PrivEsc.git " + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.spc() print("\033[91m" + """\033[91mThe collection of Windows, Linux and MySQL privilege escalation scripts and exploits is downloaded successfully , you can check it here : """ + "\033[90m" + shrts.getinstalldir() + "/PrivEsc/Scripts") shrts.okpr()
def dllrunner(): dllrunner.title = "Dllrunner : a smart DLL execution script for malware analysis" tool_dir = "/REVERSE/Tools/dllrunner" shrts.prilogspc() os.system("git clone https://github.com/Neo23x0/DLLRunner " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Dllrunner Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def Dnspy(): Dnspy.title = "Dnspy : reverses the bytes of a file" tool_dir = "/REVERSE/Tools/Dnspy" shrts.prilogspc() os.system("git clone https://github.com/0xd4d/dnSpy.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Dnspy Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def mirror(): mirror.title = "mirror : reverses the bytes of a file" tool_dir = "/REVERSE/Tools/mirror" shrts.prilogspc() os.system("git clone https://github.com/guelfoweb/mirror.git " + shrts.getinstalldir() + tool_dir + null) shrts.clr() shrts.prilogspc() print("\033[92m Mirror Downlaoded successfully \033[90m") shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okrev()
def linexpsug(): linexpsug.title = "linux-exploit-suggester2 : A perl Linux exploit suggester script" tool_dir = "/EXPLOITATION/linux-exploit-suggester" shrts.prilogspc() os.system( "git clone https://github.com/jondonas/linux-exploit-suggester-2.git " + shrts.getinstalldir() + tool_dir + null) shrts.clscprilo() print( "\033[92m linux-exploit-suggester2 Downlaoded successfully \033[90m" ) shrts.spc() print("\033[92m Check " + shrts.getinstalldir() + tool_dir + " Folder\033[90m") shrts.okex()