Пример #1
0
def Jdorker():
    Jdorker.title = "J-dorker : a Website List grabber from Bing"
    tool_dir = "/WEB/Tools/Jdorker"
    if os.path.exists('/usr/local/bin/Jdorker'):
        shrts.prilogspc()
        os.system("git clone  https://github.com/04x/J-dorker.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Jdorker.title + "\033[90m")
        shrts.spc()
        os.system("Jdorker")
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Jdorker.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/04x/J-dorker.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Jdorker.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Jdorker""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Jdorker""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir +
                  "/priv8dorker.py >> /usr/local/bin/Jdorker")
        os.system("chmod +x /usr/local/bin/Jdorker")
        print(("You can now use " + "\033[91m" + Jdorker.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Пример #2
0
def Findsploit():
    Findsploit.title = "Findsploit : Find exploits in local and online databases instantly"
    tool_dir = "/EXPLOITATION/Tools/Findsploit"
    if os.path.exists('/usr/local/bin/Findsploit'):
        shrts.prilogspc()
        os.system("git clone  https://github.com/1N3/Findsploit.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        ans = input("\033[92mWhat exploits are you looking  ? : \033[90m")
        os.system("Findsploit " + ans)
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/1N3/Findsploit.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Findsploit.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip3 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("sh " + shrts.getinstalldir() + tool_dir + "/install.sh")
        os.system("ln -s /usr/bin/findsploit /usr/local/bin/Findsploit")
        shrts.spc()
        print("You can now use " + "\033[91m" + Findsploit.title + "\033[90m" +
              " from Lockdoor [\033[92m Lockdoor \033[90m ]")
        shrts.okex()
Пример #3
0
def Photon():
    Photon.title = "Photon : an incredibly fast crawler designed for OSINT."
    tool_dir = "/INFO-GATH/Tools/Photon"
    if os.path.exists('/usr/local/bin/Photon'):
        shrts.prilogspc()
        os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Photon.title + "\033[90m")
        shrts.spc()
        os.system("Photon")
        shrts.spc()
        print("\033[92mFor more options, Use Photon --help\033[0m")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Photon.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/s0md3v/Photon.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Photon.title + "\033[90m")
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install -r " + shrts.getinstalldir() + tool_dir + "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Photon""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Photon""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir + "/photon.py >> /usr/local/bin/Photon")
        os.system("chmod +x /usr/local/bin/Photon")
        print("You can now use " + "\033[91m" + Photon.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Пример #4
0
def burp():
    burp.title = "BurpSuite : Web vulnerability scanner."
    tool_dir = "/EXPLOITATION/Tools/burp"
    if os.path.exists('/usr/local/bin/burp'):
        shrts.prilogspc()
        shrts.prilogspc()
        print("\033[92m           " + burp.title + "\033[90m")
        shrts.spc()
        os.system("burpsuite")
        shrts.okex()
    else:
        shrts.prilogspc()
        print("\033[92m           " + burp.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("mkdir " + shrts.getinstalldir() + tool_dir)
        os.system(
            "wget -O " + shrts.getinstalldir() + tool_dir +
            "/burp.jar https://portswigger.net/DownloadUpdate.ashx\?Product\=Free"
        )
        shrts.prilogspc()
        print("\033[92m           " + burp.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/burp""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/burp""")
        os.system("echo java -jar " + shrts.getinstalldir() + tool_dir +
                  "/burp.jar >> /usr/local/bin/burp")
        os.system("chmod +x /usr/local/bin/burp")
        print(("You can now use " + "\033[91m" + burp.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okex()
Пример #5
0
def sherlock():

    sherlock.title = "sherlock : Find usernames across social networks"
    tool_dir = "/INFO-GATH/Tools/sherlock"
    if os.path.exists('/usr/local/bin/sherlock'):
        shrts.prilogspc()
        os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Enter the target username : "******"python " + shrts.getinstalldir() + tool_dir + "/sherlock.py " + target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/sherlock-project/sherlock.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sherlock.title + "\033[90m")
        shrts.spc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir + " && pip3 install --upgrade setuptools && pip3 install -r requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/sherlock""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sherlock""")
        os.system("echo python " + shrts.getinstalldir() + tool_dir + "/sherlock.py >> /usr/local/bin/sherlock")
        os.system("chmod +x /usr/local/bin/sherlock")
        print(("You can now use " + "\033[91m" + sherlock.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Пример #6
0
def Codetective():
    Codetective.title = "Codetective : a tool to determine the crypto/encoding algorithm used"
    tool_dir = "/ENCRYPTION/Tools/Codetective"
    if os.path.exists('/usr/local/bin/Codetective'):
        shrts.prilogspc()
        os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Codetective.title + "\033[90m")
        shrts.spc()
        os.system("Codetective")
        shrts.okenc()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Codetective.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/blackthorne/Codetective.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Codetective.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Codetective""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Codetective""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/codetective.py >> /usr/local/bin/Codetective")
        os.system("chmod +x /usr/local/bin/Codetective")
        print(("You can now use " + "\033[91m" + Codetective.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        print("Type Codetective to run the tool from Terminal")
        shrts.okenc()
Пример #7
0
def menu():
    shrts.clscprilo()
    print("""\033[94m
    [ REVERSE ENGINEERING  ]

        Make A Choice :\033[90m
    \033[91m -[!]----- Tools ------[!]-\033[90m

            \033[93m1)  Radar2
            2)  Virustotal
            3)  Miasm
            4)  Mirror
            5)  Dnspy
            6)  Angrio
            7)  DLLRunner
            8)  Yara\033[90m
    \033[91m-[!]----- Cheatsheets ------[!]-\033[90m

        \033[93m    9) Reverse Engineering Cheatsheets\033[90m
    ------------------------
    \033[94mb)    Back to ROOT MENU
    q)    Leave  Lockdoor\033[94m
       """)
    choice = input("\033[92mLockdoor@ReverseEngineering~# \033[0m")
    os.system('clear')
    if choice == "1":
        radar2()
    elif choice == "2":
        virustotal()
    elif choice == "3":
        miasm()
    elif choice == "4":
        mirror()
    elif choice == "5":
        Dnspy()
    elif choice == "6":
        angrio()
    elif choice == "7":
        dllrunner()
    elif choice == "8":
        yara()
    elif choice == "9":
        revsh()
    elif choice == "b":
        main.menu()
    elif choice == "q":
        shrts.prilogspc()
        now = datetime.now()
        dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
        print(
            "                 \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m")
        shrts.spc()
        print("                 \033[91m-[!]- EXITING AT " + dt_string +
              " -[!]-\033[0m")
        sys.exit()
    elif choice == "":
        menu()
    else:
        menu()
Пример #8
0
def findmyhash():
    findmyhash.title = "findmyhash : Python script to crack hashes using online services"
    tool_dir = "/ENCRYPTION/Tools/Findmyhash"
    if os.path.exists('/usr/local/bin/Findmyhash'):
        shrts.prilogspc()
        os.system("git clone https://github.com/frdmn/findmyhash.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        print("""
              MD4       - RFC 1320
              MD5       - RFC 1321
              SHA1      - RFC 3174 (FIPS 180-3)
              SHA224    - RFC 3874 (FIPS 180-3)
              SHA256    - FIPS 180-3
              SHA384    - FIPS 180-3
              SHA512    - FIPS 180-3
              RMD160    - RFC 2857
              GOST      - RFC 5831
              WHIRLPOOL - ISO/IEC 10118-3:2004
              LM        - Microsoft Windows hash
              NTLM      - Microsoft Windows hash
              MYSQL     - MySQL 3, 4, 5 hash
              CISCO7    - Cisco IOS type 7 encrypted passwords
              JUNIPER   - Juniper Networks $9$ encrypted passwords
              LDAP_MD5  - MD5 Base64 encoded
              LDAP_SHA1 - SHA1 Base64 encoded
        """)
        algo = input("What Algo you want to use ? : ")
        hash = input("Enter the hash : ")
        os.system("python2 " + shrts.getinstalldir() + tool_dir +
                  "/findmyhash.py " + algo + " -h " + hash)
        shrts.okenc()
    else:
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/frdmn/findmyhash.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + findmyhash.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/Findmyhash""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/Findmyhash""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir +
                  "/findmyhash.py >> /usr/local/bin/Findmyhash")
        os.system("chmod +x /usr/local/bin/Findmyhash")
        print(("You can now use " + "\033[91m" + findmyhash.title +
               "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okenc()
Пример #9
0
def wtpp():
    shrts.clscprilo()
    print("\033[91mHere is the list of the files :\033[90m")
    print("\033[92m")
    os.system("     find " + shrts.getinstalldir() + "/WALK -type f")
    print("\033[90m")
    shrts.spc()
    shrts.oktocont()
    main.menu()
Пример #10
0
def psafrt():
    shrts.clscprilo()
    print("\033[91mHere is the list of the files :\033[90m")
    print("\033[92m")
    os.system("     find " + shrts.getinstalldir() +
              "/REPORT/TEMPLATES/ -type f")
    print("\033[90m")
    shrts.spc()
    shrts.oktocont()
    main.menu()
Пример #11
0
def webshells():
    shrts.printlogo()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/BlackArch/webshells.git " +
              shrts.getinstalldir() + "/SHELLS/WebShells")
    shrts.spc()
    print(
        "BlackArch Webshells collection downloaded successfully , you can use them from "
        + shrts.getinstalldir() + "/SHELLS/WebShells")
    shrts.oksh()
Пример #12
0
def ptyshells():
    shrts.printlogo()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/infodox/python-pty-shells " +
              shrts.getinstalldir() + "/SHELLS/python-pty-shells")
    shrts.spc()
    print(
        "The Python PTY backdoors collection downloaded successfully , you can use them from "
        + shrts.getinstalldir() + "/SHELLS/python-pty-shells")
    shrts.oksh()
Пример #13
0
def radar2():
    radar2.title = "Radar 2 : unix-like reverse engineering framework"
    tool_dir = "/REVERSE/Tools/radar2"
    shrts.prilogspc()
    os.system("git clone https://github.com/radare/radare2.git " +
              shrts.getinstalldir() + tool_dir + null)
    shrts.clscprilo()
    print("\033[92m           Radar2 Downlaoded successfully \033[90m")
    shrts.spc()
    print("\033[92m           Check " + shrts.getinstalldir() + tool_dir +
          " Folder\033[90m")
    shrts.okrev()
Пример #14
0
def menu():
    shrts.clscprilo()
    print("""\033[94m
        [ EXPLOITATION ]

        Make A Choice :\033[90m
        \033[91m -[!]----- Tools ------[!]-\033[90m
            \033[93m1)  Findsploit
            2)  Pompem
            3)  rFix
            4)  Inurlbr
            5)  BurpSuite
            6)  Linux exploit suggester2\033[90m

        \033[91m -[!]----- Cheatsheets ------[!]-\033[90m
            \033[93m7) Exploitation Cheatsheets\033[90m
    ------------------------
    \033[94mb)    Back to ROOT MENU
    q)    Leave  Lockdoor\033[90m
       """)
    choice = input("\033[92mLockdoor@Exploitation~# \033[0m")
    os.system('clear')
    if choice == "1":
        Findsploit()
    elif choice == "2":
        Pompem()
    elif choice == "3":
        rfix()
    elif choice == "4":
        inurlbr()
    elif choice == "5":
        burp()
    elif choice == "6":
        linexpsug()
    elif choice == "7":
        expsh()
    elif choice == "b":
        main.menu()
    elif choice == "q":
        shrts.prilogspc()
        now = datetime.now()
        dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
        print(
            "                 \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m")
        shrts.spc()
        print("                 \033[91m-[!]- EXITING AT " + dt_string +
              " -[!]-\033[0m")
        sys.exit()
    elif choice == "":
        menu()
    else:
        menu()
Пример #15
0
def priivesc():
    priivesc.title=("A collection of Windows, Linux and MySQL privilege escalation scripts and exploits")
    shrts.printlogo()
    print("\033[92m" + priivesc.title + "\033[90m")
    print()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/1N3/PrivEsc.git " + shrts.getinstalldir() + "/PrivEsc/Scripts")
    shrts.spc()
    print("\033[91m" + """\033[91mThe collection of Windows, Linux and MySQL privilege
    escalation scripts and exploits is downloaded successfully , you can check
    it here : """ + "\033[90m" + shrts.getinstalldir() + "/PrivEsc/Scripts")
    shrts.okpr()
Пример #16
0
def scythe():
    scythe.title = "Cewl : an accounts enumerator"
    tool_dir = "/SOCIAL_ENGINEERING/Tools/scythe"
    shrts.prilogspc()
    shrts.prilogspc()
    print("\033[92m           " + scythe.title + "\033[90m")
    shrts.spc()
    print("\033[92m" + "Change " + shrts.getinstalldir() + tool_dir +
          "/accountfile.txt" + """ with
    your targes""" + "\033[90m")
    shrts.spc()
    os.system("python2 " + shrts.getinstalldir() + tool_dir + "/scythe.py")
    shrts.okso()
Пример #17
0
def Dnspy():
    Dnspy.title = "Dnspy : reverses the bytes of a file"
    tool_dir = "/REVERSE/Tools/Dnspy"
    shrts.prilogspc()
    os.system("git clone https://github.com/0xd4d/dnSpy.git " +
              shrts.getinstalldir() + tool_dir + null)
    shrts.clr()
    shrts.prilogspc()
    print("\033[92m           Dnspy Downlaoded successfully \033[90m")
    shrts.spc()
    print("\033[92m           Check " + shrts.getinstalldir() + tool_dir +
          " Folder\033[90m")
    shrts.okrev()
Пример #18
0
def dllrunner():
    dllrunner.title = "Dllrunner : a smart DLL execution script for malware analysis"
    tool_dir = "/REVERSE/Tools/dllrunner"
    shrts.prilogspc()
    os.system("git clone https://github.com/Neo23x0/DLLRunner " +
              shrts.getinstalldir() + tool_dir + null)
    shrts.clr()
    shrts.prilogspc()
    print("\033[92m           Dllrunner Downlaoded successfully \033[90m")
    shrts.spc()
    print("\033[92m           Check " + shrts.getinstalldir() + tool_dir +
          " Folder\033[90m")
    shrts.okrev()
Пример #19
0
def mirror():
    mirror.title = "mirror : reverses the bytes of a file"
    tool_dir = "/REVERSE/Tools/mirror"
    shrts.prilogspc()
    os.system("git clone https://github.com/guelfoweb/mirror.git " +
              shrts.getinstalldir() + tool_dir + null)
    shrts.clr()
    shrts.prilogspc()
    print("\033[92m           Mirror Downlaoded successfully \033[90m")
    shrts.spc()
    print("\033[92m           Check " + shrts.getinstalldir() + tool_dir +
          " Folder\033[90m")
    shrts.okrev()
Пример #20
0
def V3n0M():
    V3n0M.title = "V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns "
    tool_dir = "/WEB/Tools/V3n0M"
    if os.path.exists('/usr/local/bin/V3n0M'):
        shrts.prilogspc()
        os.system(
            "git clone  https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " +
            shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + V3n0M.title + "\033[90m")
        shrts.spc()
        os.system("V3n0M")
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + V3n0M.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system(
            "git clone https://github.com/v3n0m-Scanner/V3n0M-Scanner.git " +
            shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + V3n0M.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("python3 " + shrts.getinstalldir() + tool_dir +
                  "/setup.py install" + null)
        os.system("ln -s /usr/bin/v3n0m /usr/local/bin/V3n0M")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + V3n0M.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Пример #21
0
def URLextractor():
    URLextractor.title = "URLextractor : an  Information gathering & website reconnaissance tool"
    tool_dir = "/INFO-GATH/Tools/URLextractor"
    if os.path.exists('/usr/local/bin/URLextractor'):
        shrts.prilogspc()
        os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        target = sanitize.bash_escape_restrictor(input("Select a Target : "))
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/extractor.sh "+ target)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/SofianeHamlaoui/URLextractor.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + URLextractor.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/URLextractor""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/URLextractor""")
        os.system("echo sh " + shrts.getinstalldir() + tool_dir + "/extractor.sh >> /usr/local/bin/URLextractor")
        os.system("chmod +x /usr/local/bin/URLextractor")
        print("You can now use " + "\033[91m" + URLextractor.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Пример #22
0
def denumerator():
    denumerator.title = "denumerator.py : Enumerates list of subdomains"
    tool_dir = "/INFO-GATH/Tools/"
    if os.path.exists('/usr/local/bin/denumerator'):
        shrts.prilogspc()
        os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null)
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        targetlist = sanitize.bash_escape_restrictor(input("Enter the Targets list: "))
        shrts.prilogspc()
        os.system("denumerator -f " + targetlist + " -t 10")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("wget -O " + shrts.getinstalldir() + tool_dir + "denumerator.py https://raw.githubusercontent.com/bl4de/security-tools/master/denumerator/denumerator.py" + null)
        shrts.prilogspc()
        print("\033[92m           " + denumerator.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/denumerator""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/denumerator""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/denumerator.py >> /usr/local/bin/denumerator")
        os.system("chmod +x /usr/local/bin/denumerator")
        print("You can now use " + "\033[91m" + denumerator.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" )
        shrts.okinf()
Пример #23
0
def CMSmap():
    CMSmap.title = "CMSmap : A CMS scanner "
    tool_dir = "/WEB/Tools/CMSmap"
    if os.path.exists('/usr/local/bin/CMSmap'):
        shrts.prilogspc()
        os.system("git clone  https://github.com/04x/J-dorker.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + CMSmap.title + "\033[90m")
        shrts.spc()
        os.system("cmsmap")
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + CMSmap.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/Dionach/CMSmap.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + CMSmap.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && python3 setup.py install >/dev/null")
        os.system("ln -s /usr/bin/cmsmap /usr/local/bin/CMSmap")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + CMSmap.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Пример #24
0
def droopescan():
    droopescan.title = "droopescan : scanner , identify , CMSs , Drupal , Silverstripe."
    tool_dir = "/WEB/Tools/droopescan"
    if os.path.exists('/usr/local/bin/droopescan'):
        shrts.prilogspc()
        os.system("git clone  https://github.com/droope/droopescan.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + droopescan.title + "\033[90m")
        shrts.spc()
        os.system("droopescan")
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + droopescan.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/droope/droopescan.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + droopescan.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && python setup.py install " + null)
        os.system("ln -s /usr/bin/droopescan /usr/local/bin/droopescan")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + droopescan.title +
               "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Пример #25
0
def Optiva():
    Optiva.title = "Optiva-Framework : a  Web Application Scanner"
    tool_dir = "/WEB/Tools/Optiva"
    if os.path.exists('/usr/local/bin/Optiva'):
        shrts.prilogspc()
        os.system(
            "git clone  https://github.com/joker25000/Optiva-Framework " +
            shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Optiva.title + "\033[90m")
        shrts.spc()
        os.system("optiva")
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Optiva.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/joker25000/Optiva-Framework " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Optiva.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("chmod +x " + shrts.getinstalldir() + tool_dir +
                  "/installer.sh")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && sh installer.sh")
        os.system("ln -s /usr/bin/optiva /usr/local/bin/Optiva")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + Optiva.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
Пример #26
0
def enyx():
    enyx.title = "Enyx : An SNMP IPv6 Enumeration Tool"
    tool_dir = "/INFO-GATH/Tools/Enyx"
    if os.path.exists('/usr/local/bin/enyx'):
        shrts.prilogspc()
        os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        snmpversion = sanitize.bash_escape_restrictor(input("Whats the snmp Version (1 or 2c) : "))
        communitystring = sanitize.bash_escape_restrictor(input("Whats the Community string (public or private) : "))
        ipad = sanitize.bash_escape_restrictor(input("Whats the IP : "))
        shrts.prilogspc()
        os.system("python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py " + snmpversion + " " + communitystring + " " + ipad)
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/trickster0/Enyx.git " + shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + enyx.title + "\033[90m")
        shrts.spc()
        os.system("""echo "#!/bin/bash" > /usr/local/bin/enyx""")
        os.system("""echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/enyx""")
        os.system("echo python2 " + shrts.getinstalldir() + tool_dir + "/enyx.py >> /usr/local/bin/enyx")
        os.system("chmod +x /usr/local/bin/enyx")
        print(("You can now use " + "\033[91m" + enyx.title + "\033[90m" + " from Lockdoor [\033[92m Lockdoor \033[90m ]" ))
        shrts.okinf()
Пример #27
0
def linexpsug():
    linexpsug.title = "linux-exploit-suggester2 : A perl Linux exploit suggester script"
    tool_dir = "/EXPLOITATION/linux-exploit-suggester"
    shrts.prilogspc()
    os.system(
        "git clone https://github.com/jondonas/linux-exploit-suggester-2.git "
        + shrts.getinstalldir() + tool_dir + null)
    shrts.clscprilo()
    print(
        "\033[92m           linux-exploit-suggester2 Downlaoded successfully \033[90m"
    )
    shrts.spc()
    print("\033[92m           Check " + shrts.getinstalldir() + tool_dir +
          " Folder\033[90m")
    shrts.okex()
Пример #28
0
def yara():
    yara.title = "YARA :  a tool to identify and classify malwares "
    tool_dir = "/REVERSE/Tools/yara"
    shrts.prilogspc()
    print("\033[92m           Installing \033[90m")
    shrts.spc()
    os.system("pip install yara-python")
    shrts.clr()
    shrts.prilogspc()
    print("\033[92m           YARA Downlaoded successfully \033[90m")
    shrts.spc()
    print(
        "\033[92m           Check YARA Docs to learn more about the tool\033[90m"
    )
    print("\033[92m           https://yara.readthedocs.io/en/latest/\033[90m")
    shrts.okrev()
Пример #29
0
def angrio():
    angrio.title = "angrio : a python framework for analyzing binaries"
    tool_dir = "/REVERSE/Tools/angrio"
    shrts.prilogspc()
    print("\033[92m           Installing \033[90m")
    shrts.spc()
    os.system("pip install angr ")
    shrts.clr()
    shrts.prilogspc()
    print("\033[92m           Dnspy Downlaoded successfully \033[90m")
    shrts.spc()
    print(
        "\033[92m           Check Angr.io docs to learn more about the tool \033[90m"
    )
    print("\033[92m           https://github.com/angr/angr-doc \033[90m")
    shrts.okrev()
Пример #30
0
def menu():
    shrts.clscprilo()
    print("""\033[94m
    [ PASSWORD ATTACKS ]

        Make A Choice :\033[90m
    \033[91m -[!]----- Tools ------[!]-\033[90m

            \033[93m1)  Crunch
            2)  CeWl
            3)  Patator
            4)  Download Rockyou.txt\033[90m
    \033[91m-[!]----- Cheatsheets ------[!]-\033[90m

        \033[93m    5) Password Attacks Cheatsheets Cheatsheets\033[90m
    ------------------------
    \033[94mb)    Back to ROOT MENU
    q)    Leave  Lockdoor\033[94m
       """)
    choice = input("\033[92mLockdoor@PassAttacks~# \033[0m")
    os.system('clear')
    if choice == "1":
        crunch()
    elif choice == "2":
        Cewl()
    elif choice == "3":
        patator()
    elif choice == "4":
        dlrockyou()
    elif choice == "5":
        passsh()
    elif choice == "b":
        main.menu()
    elif choice == "q":
        shrts.prilogspc()
        now = datetime.now()
        dt_string = now.strftime("%d/%m/%Y %H:%M:%S")
        print(
            "                 \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m")
        shrts.spc()
        print("                 \033[91m-[!]- EXITING AT " + dt_string +
              " -[!]-\033[0m")
        sys.exit()
    elif choice == "":
        menu()
    else:
        menu()