示例#1
0
def webshells():
    shrts.printlogo()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/BlackArch/webshells.git " +
              shrts.getinstalldir() + "/SHELLS/WebShells")
    shrts.spc()
    print(
        "BlackArch Webshells collection downloaded successfully , you can use them from "
        + shrts.getinstalldir() + "/SHELLS/WebShells")
    shrts.oksh()
示例#2
0
def ptyshells():
    shrts.printlogo()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/infodox/python-pty-shells " +
              shrts.getinstalldir() + "/SHELLS/python-pty-shells")
    shrts.spc()
    print(
        "The Python PTY backdoors collection downloaded successfully , you can use them from "
        + shrts.getinstalldir() + "/SHELLS/python-pty-shells")
    shrts.oksh()
示例#3
0
def priivesc():
    priivesc.title=("A collection of Windows, Linux and MySQL privilege escalation scripts and exploits")
    shrts.printlogo()
    print("\033[92m" + priivesc.title + "\033[90m")
    print()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system("git clone https://github.com/1N3/PrivEsc.git " + shrts.getinstalldir() + "/PrivEsc/Scripts")
    shrts.spc()
    print("\033[91m" + """\033[91mThe collection of Windows, Linux and MySQL privilege
    escalation scripts and exploits is downloaded successfully , you can check
    it here : """ + "\033[90m" + shrts.getinstalldir() + "/PrivEsc/Scripts")
    shrts.okpr()
示例#4
0
def dnsrecon():
    dnsrecon.title = "DnsRecon : A DNS Enumeration Script"
    tool_dir = "/INFO-GATH/Tools/DnsRecon"
    if os.path.exists('/usr/local/bin/dnsrecon'):
        shrts.prilogspc()
        os.system("git clone https://github.com/darkoperator/dnsrecon.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        target = input(
            "Select a Target (use 'dnsrecon --help' for more options) : ")
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find  " + shrts.getinstalldir() + " -type f | grep dns_")
        print("\033[90m")
        shrts.pop()
        os.system("python3 " + shrts.getinstalldir() + tool_dir +
                  "/dnsrecon.py -d " + target)
        shrts.spc()
        print("\033[92mFor more options, Use dnsrecon --help\033[0m")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/darkoperator/dnsrecon.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.clr()
        print("\033[92m           " + dnsrecon.title + "\033[90m")
        shrts.spc()
        shrts.printlogo()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip3 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("""echo "#!/bin/bash" > /usr/local/bin/dnsrecon""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/dnsrecon""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir +
                  "/dnsrecon.py >> /usr/local/bin/dnsrecon")
        os.system("chmod +x /usr/local/bin/dnsrecon")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + dnsrecon.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okinf()
示例#5
0
def lockdoor():
    shrts.clr()
    shrts.printlogo()
    shrts.spc()
    choiceupdate = input("        \033[92m[Confirmation]\033[90m\033[94m You want to update Lockdoor and all tools ? (Y / N) : \033[90m")
    if not choiceupdate in no:
        print("\033[92mUpdating Lockdoor...\033[90m")
        shrts.spc()
        os.system('pip install --upgrade lockdoor')
        shrts.spc()
        shrts.oktocont()
        print("\033[92mUpdating The Tools...\033[90m")
        shrts.spc()
        os.system('sudo find ' + shrts.getinstalldir() + ' -type d -name .git -exec sh -c "cd \"{}\"/../ && git pull --ff-only origin master" \;')
        shrts.clr()
        main.menu()
示例#6
0
def Raccoon():
    Raccoon.title = "Raccoon : an offensive security tool for reconnaissance and vulnerability scanning."
    tool_dir = "/INFO-GATH/Tools/Raccoon"
    if os.path.exists('/usr/local/bin/Raccoon'):
        shrts.prilogspc()
        os.system("git clone https://github.com/evyatarmeged/Raccoon.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        target = input(
            "Select a Target (use 'raccoon --help' for more options) :  ")
        shrts.spc()
        print("\033[92mCheatsheets that can help you with this :")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() +
                  "/INFO-GATH/CHEATSHEETS/ -type f | grep vulnerability")
        print("\033[90m")
        shrts.pop()
        os.system("raccoon " + target)
        shrts.spc()
        print("\033[92mFor more options, Use raccoon --help\033[0m")
        shrts.okinf()
    else:
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/evyatarmeged/Raccoon.git " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + Raccoon.title + "\033[90m")
        shrts.spc()
        shrts.printlogo()
        print("\033[91mInstalling ...\033[0m.")
        shrts.spc()
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && pip3 install -r " + shrts.getinstalldir() + tool_dir +
                  "/requirements.txt" + null)
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && python3 setup.py install" + null)
        os.system("ln -s /usr/bin/raccoon /usr/local/bin/Raccoon")
        shrts.prilogspc()
        print(("You can now use " + "\033[91m" + Raccoon.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okinf()
def dlrockyou():
    shrts.printlogo()
    print("\033[91mDownloading ...\033[0m")
    shrts.spc()
    os.system(
        "wget -O " + shrts.getinstalldir() +
        "/PASSWORD/wordlists/rockyou.gz https://gitlab.com/kalilinux/packages/wordlists/raw/kali/master/rockyou.txt.gz"
    )
    shrts.spc()
    print("\033[91mExtracting ...\033[0m")
    os.system("gunzip " + shrts.getinstalldir() +
              "/PASSWORD/wordlists/rockyou.gz")
    os.system("rm " + shrts.getinstalldir() +
              "/PASSWORD/wordlists/rockyou.txt.gz")
    shrts.spc()
    print(
        "Rockyou Password list downloaded successfully , you can use it from here "
        + shrts.getinstalldir() + "/PASSWORD/wordlists/")
    shrts.okpa()
示例#8
0
def sqlmap():
    sqlmap.title = "SQLmap : Automatic SQL injection and database takeover tool "
    tool_dir = "/WEB/Tools/sqlmap"
    if os.path.exists('/usr/bin/sqlmap'):
        shrts.printlogo()
        os.system("git clone  https://github.com/sqlmapproject/sqlmap " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        target = input("Select a Target : ")
        shrts.spc()
        print("Check the sqli cheatsheets to know more")
        shrts.spc()
        os.system("find " + shrts.getinstalldir() +
                  "/WEB/CHEATSHEETS/ -type f | grep sqli")
        shrts.popp()
        os.system("sqlmap -u " + target)
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/sqlmapproject/sqlmap " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + sqlmap.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("""echo "#!/bin/bash" > /usr/local/bin/sqlmap""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/sqlmap""")
        os.system("echo python3 " + shrts.getinstalldir() + tool_dir +
                  "/sqlmap.py >> /usr/local/bin/sqlmap")
        os.system("chmod +x /usr/local/bin/sqlmap")
        shrts.spc()
        print(("You can now use " + "\033[91m" + sqlmap.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
示例#9
0
def whatweb():
    whatweb.title = "whatweb : Next generation web scanner "
    tool_dir = "/WEB/Tools/whatweb"
    if os.path.exists('/usr/local/bin/whatweb'):
        shrts.printlogo()
        os.system("git clone  https://github.com/urbanadventurer/WhatWeb " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        shrts.spc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        target = input("Select a Target : ")
        shrts.prilogspc()
        os.system(shrts.getinstalldir() + tool_dir + "/whatweb " + target)
        shrts.okwe()
    else:
        shrts.prilogspc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        print("\033[91mDownloading ...\033[0m")
        shrts.spc()
        os.system("git clone https://github.com/urbanadventurer/WhatWeb " +
                  shrts.getinstalldir() + tool_dir + null)
        shrts.prilogspc()
        print("\033[92m           " + whatweb.title + "\033[90m")
        shrts.spc()
        shrts.prilogspc()
        print("\033[91mInstalling ...\033[0m.")
        os.system("cd " + shrts.getinstalldir() + tool_dir +
                  " && gem install json && gem install rchardet")
        os.system("""echo "#!/bin/bash" > /usr/local/bin/whatweb""")
        os.system(
            """echo "#Dev : Sofiane Hamlaoui" >> /usr/local/bin/whatweb""")
        os.system("echo " + shrts.getinstalldir() + tool_dir +
                  "/whatweb >> /usr/local/bin/whatweb")
        os.system("chmod +x /usr/local/bin/whatweb")
        shrts.spc()
        print(("You can now use " + "\033[91m" + whatweb.title + "\033[90m" +
               " from Lockdoor [\033[92m Lockdoor \033[90m ]"))
        shrts.okwe()
示例#10
0
def menu():
    os.system('clear')
    shrts.printlogo()
    print("""
    \033[94m         [ R00T MENU ]

            Make A Choice :\033[0m

        \033[93m1)  Information Gathering
        2)  Web Hacking
        3)  Exploitation
        4)  Reverse Engineering
        5)  Encryption/Decryption
        6)  Password Attacks
        7)  Shells
        8)  Privilege Escalation
        9)  Social Engineering
        10) Pentesting & Security Assessment Findings Report Templates
        11) Help with Walk Throughs & Pentest Processing\033[0m
        ------------------------
        \033[94ma)    About  Lockdoor
        u)    Update Lockdoor
        q)    Leave  Lockdoor\033[90m
        """)
    choice = input("\033[92mLockdoor~# \033[0m")
    os.system('clear')
    if choice == "1":
        infogathering.menu()
    elif choice == "2":
        webhack.menu()
    elif choice == "3":
        exploitation.menu()
    elif choice == "4":
        reverse.menu()
    elif choice == "5":
        encdyc.menu()
    elif choice == "6":
        passattack.menu()
    elif choice == "7":
        shells.menu()
    elif choice == "8":
        privesc.menu()
    elif choice == "9":
        soceng.menu()
    elif choice == "10":
        psafrt.psafrt()
    elif choice == "11":
        wtpp.wtpp()
    elif choice == "a":
        about.show()
    elif choice == "u":
        update.lockdoor()
    elif choice == "q":
        shrts.printlogo()
        print("")
        now = datetime.now()
        date = now.strftime("%d/%m/%Y %H:%M:%S")
        print(
            "                 \033[91m-[!]- LOCKDOOR IS EXITING -[!]-\033[0m")
        print("")
        print("                 \033[91m-[!]- EXITING AT " + date +
              " -[!]-\033[0m")
        sys.exit()
    elif choice == "":
        menu()
    else:
        menu()