From f56d05c7b31f2506cef3dab275742a7e282e3379 Mon Sep 17 00:00:00 2001 From: x3rz Date: Sun, 13 Jun 2021 12:08:56 -0400 Subject: [PATCH] Multiple CI fix in Lockdoor Framework --- lockdoors/encdyc.py | 3 ++- lockdoors/exploitation.py | 11 ++++++----- lockdoors/reverse.py | 5 +++-- 3 files changed, 11 insertions(+), 8 deletions(-) diff --git a/lockdoors/encdyc.py b/lockdoors/encdyc.py index 8cc0757..6e41d05 100644 --- a/lockdoors/encdyc.py +++ b/lockdoors/encdyc.py @@ -1,6 +1,7 @@ import os import sys from lockdoors import main +from lockdoors import sanitize from lockdoors import shrts from pathlib import Path from datetime import datetime @@ -79,7 +80,7 @@ def findmyhash(): LDAP_SHA1 - SHA1 Base64 encoded """) algo = input("What Algo you want to use ? : ") - hash = input("Enter the hash : ") + hash = sanitize.bash_escape_restrictor(input("Enter the hash : ")) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/findmyhash.py " +algo+ " -h " +hash) shrts.okenc() else: diff --git a/lockdoors/exploitation.py b/lockdoors/exploitation.py index b64642d..438acba 100644 --- a/lockdoors/exploitation.py +++ b/lockdoors/exploitation.py @@ -1,5 +1,6 @@ import os from lockdoors import main +from lockdoors import sanitize from lockdoors import shrts import sys from pathlib import Path @@ -28,7 +29,7 @@ def Findsploit(): shrts.prilogspc() print("\033[92m " + Findsploit.title + "\033[90m") shrts.spc() - ans = input("\033[92mWhat exploits are you looking ? : \033[90m") + ans = sanitize.bash_escape_restrictor(input("\033[92mWhat exploits are you looking ? : \033[90m")) os.system("Findsploit " + ans) shrts.okex() else: @@ -58,7 +59,7 @@ def Pompem(): shrts.prilogspc() print("\033[92m " + Pompem.title + "\033[90m") shrts.spc() - ans = input("\033[92mWhat exploits are you looking ? : \033[90m") + ans = sanitize.bash_escape_restrictor(input("\033[92mWhat exploits are you looking ? : \033[90m")) os.system("python3 " + shrts.getinstalldir() + tool_dir + "/pompem.py -s " + ans) shrts.spc() shrts.okex() @@ -96,8 +97,8 @@ def rfix(): shrts.spc() print("Example: rfix http://target_host/index.php?flawed_param= php.txt ") shrts.spc() - target = input("\033[92m Choose a Target : \033[90m") - payload = input("\033[92m Choose the payload path : \033[90m") + target = sanitize.bash_escape_restrictor(input("\033[92m Choose a Target : \033[90m")) + payload = sanitize.bash_escape_restrictor(input("\033[92m Choose the payload path : \033[90m")) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/rfix.py " + target + " " + payload) shrts.spc() shrts.okex() @@ -138,7 +139,7 @@ def inurlbr(): print("\033[92m" + shrts.getinstalldir() + '/GHDB.pdf \033[92m') shrts.spc() dork = input("\033[92m Choose a Dork : \033[90m") - savefile = input("\033[92m output file ? (Ex : results.txt) : \033[90m") + savefile = sanitize.bash_escape_restrictor(input("\033[92m output file ? (Ex : results.txt) : \033[90m")) os.system("php " + shrts.getinstalldir() + tool_dir + "/inurlbr.php --dork " + dork + " -s " + savefile) shrts.okex() else: diff --git a/lockdoors/reverse.py b/lockdoors/reverse.py index 986d12e..6909a44 100644 --- a/lockdoors/reverse.py +++ b/lockdoors/reverse.py @@ -1,6 +1,7 @@ import os import sys from lockdoors import main +from lockdoors import sanitize from lockdoors import shrts from pathlib import Path from datetime import datetime @@ -38,8 +39,8 @@ def virustotal(): shrts.prilogspc() print("\033[92m " + virustotal.title + "\033[90m") shrts.spc() - key = input("\033[92mEnter the Virtustoal Api ? : \033[90m") - outp = input("\033[92mEnter directory containing files to scan ? : \033[90m") + key = sanitize.bash_escape_restrictor(input("\033[92mEnter the Virtustoal Api ? : \033[90m")) + outp = sanitize.bash_escape_restrictor(input("\033[92mEnter directory containing files to scan ? : \033[90m")) os.system("python2 " + shrts.getinstalldir() + tool_dir + "/vt.py --key "+key+" " +outp) shrts.okrev() else: