Skip to content
Permalink
Browse files
Merge pull request #17 from x3rz/Multiple-ci-fix
Multiple ci fix
  • Loading branch information
SofianeHamlaoui committed Jun 13, 2021
2 parents d003c9f + f56d05c commit 59e4277adaed3d5c2a6d473374bddc3bebce6858
Showing with 11 additions and 8 deletions.
  1. +2 鈭1 lockdoors/encdyc.py
  2. +6 鈭5 lockdoors/exploitation.py
  3. +3 鈭2 lockdoors/reverse.py
@@ -1,6 +1,7 @@
import os
import sys
from lockdoors import main
from lockdoors import sanitize
from lockdoors import shrts
from pathlib import Path
from datetime import datetime
@@ -79,7 +80,7 @@ def findmyhash():
LDAP_SHA1 - SHA1 Base64 encoded
""")
algo = input("What Algo you want to use ? : ")
hash = input("Enter the hash : ")
hash = sanitize.bash_escape_restrictor(input("Enter the hash : "))
os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " +algo+ " -h " +hash)
shrts.okenc()
else:
@@ -1,5 +1,6 @@
import os
from lockdoors import main
from lockdoors import sanitize
from lockdoors import shrts
import sys
from pathlib import Path
@@ -28,7 +29,7 @@ def Findsploit():
shrts.prilogspc()
print("\033[92m " + Findsploit.title + "\033[90m")
shrts.spc()
ans = input("\033[92mWhat exploits are you looking ? : \033[90m")
ans = sanitize.bash_escape_restrictor(input("\033[92mWhat exploits are you looking ? : \033[90m"))
os.system("Findsploit " + ans)
shrts.okex()
else:
@@ -58,7 +59,7 @@ def Pompem():
shrts.prilogspc()
print("\033[92m " + Pompem.title + "\033[90m")
shrts.spc()
ans = input("\033[92mWhat exploits are you looking ? : \033[90m")
ans = sanitize.bash_escape_restrictor(input("\033[92mWhat exploits are you looking ? : \033[90m"))
os.system("python3 " + shrts.getinstalldir() + tool_dir + "/pompem.py -s " + ans)
shrts.spc()
shrts.okex()
@@ -96,8 +97,8 @@ def rfix():
shrts.spc()
print("Example: rfix http://target_host/index.php?flawed_param= php.txt ")
shrts.spc()
target = input("\033[92m Choose a Target : \033[90m")
payload = input("\033[92m Choose the payload path : \033[90m")
target = sanitize.bash_escape_restrictor(input("\033[92m Choose a Target : \033[90m"))
payload = sanitize.bash_escape_restrictor(input("\033[92m Choose the payload path : \033[90m"))
os.system("python2 " + shrts.getinstalldir() + tool_dir + "/rfix.py " + target + " " + payload)
shrts.spc()
shrts.okex()
@@ -138,7 +139,7 @@ def inurlbr():
print("\033[92m" + shrts.getinstalldir() + '/GHDB.pdf \033[92m')
shrts.spc()
dork = input("\033[92m Choose a Dork : \033[90m")
savefile = input("\033[92m output file ? (Ex : results.txt) : \033[90m")
savefile = sanitize.bash_escape_restrictor(input("\033[92m output file ? (Ex : results.txt) : \033[90m"))
os.system("php " + shrts.getinstalldir() + tool_dir + "/inurlbr.php --dork " + dork + " -s " + savefile)
shrts.okex()
else:
@@ -1,6 +1,7 @@
import os
import sys
from lockdoors import main
from lockdoors import sanitize
from lockdoors import shrts
from pathlib import Path
from datetime import datetime
@@ -38,8 +39,8 @@ def virustotal():
shrts.prilogspc()
print("\033[92m " + virustotal.title + "\033[90m")
shrts.spc()
key = input("\033[92mEnter the Virtustoal Api ? : \033[90m")
outp = input("\033[92mEnter directory containing files to scan ? : \033[90m")
key = sanitize.bash_escape_restrictor(input("\033[92mEnter the Virtustoal Api ? : \033[90m"))
outp = sanitize.bash_escape_restrictor(input("\033[92mEnter directory containing files to scan ? : \033[90m"))
os.system("python2 " + shrts.getinstalldir() + tool_dir + "/vt.py --key "+key+" " +outp)
shrts.okrev()
else:

0 comments on commit 59e4277

Please sign in to comment.