| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140 |
- #!/usr/bin/env python
- from urllib2 import *
- from platform import system
- import sys
- def clear():
- if system() == 'Linux':
- os.system("clear")
- if system() == 'Windows':
- os.system('cls')
- os.system('color a')
- else:
- pass
- def slowprint(s):
- for c in s + '\n':
- sys.stdout.write(c)
- sys.stdout.flush()
- time.sleep(4. / 100)
- banner = '''
-
- ========= ToolMaster =======\033[91m
- ========== @ChumoGH=========\033[92m
- ======= Telegram @ChumoGH ====\033[96m
- '''
- print banner
- def menu():
- print'''
- \033[91m 1 \033[92m)\033[96m DNS Lookup
- \033[91m 2 \033[92m)\033[96m Whois Lookup
- \033[91m 3 \033[92m)\033[96m Reverse IP Lookup
- \033[91m 4 \033[92m)\033[96m GeoIP Lookup
- \033[91m 5 \033[92m)\033[96m Subnet Lookup
- \033[91m 6 \033[92m)\033[96m Port Scanner
- \033[91m 7 \033[92m)\033[96m Extract Links
- \033[91m 8 \033[92m)\033[96m Zone Transfer
- \033[91m 9 \033[92m)\033[96m HTTP Header
- \033[91m 10\033[92m)\033[96m Host Finder
- \033[91m 11\033[92m)\033[96m Info
- \033[91m 0 \033[92m)\033[96m Salir
- '''
- slowprint("\033[1;91mchumogh.xyz" + "\n - toolmaster")
- menu()
- def ext():
- ex = raw_input ('\033[92mContinuar/Exit -=[C/E]=- -> ')
- if ex[0].upper() == 'E' :
- print 'Saliendo!!!'
- exit()
- else:
- clear()
- print banner
- menu()
- select()
- def select():
- try:
- joker = input("\033[96mEscribe \033[92m0/\033[91m11 -> -> ")
- if joker == 2:
- dz = raw_input('\033[91mEscribe la IP o Dominio : \033[91m')
- whois = "http://api.hackertarget.com/whois/?q=" + dz
- dev = urlopen(whois).read()
- print (dev)
- ext()
- elif joker == 3:
- dz = raw_input('\033[92mEscribe la IP : \033[92m')
- revrse = "http://api.hackertarget.com/reverseiplookup/?q=" + dz
- lookup = urlopen(revrse).read()
- print (lookup)
- ext()
- elif joker == 1:
- dz = raw_input('\033[96mEscribe tu dominio :\033[96m')
- dns = "http://api.hackertarget.com/dnslookup/?q=" + dz
- joker = urlopen(dns).read()
- print (joker)
- ext()
- elif joker == 4:
- dz = raw_input('\033[91mEscribe la IP : \033[91m')
- geo = "http://api.hackertarget.com/geoip/?q=" + dz
- ip = urlopen(geo).read()
- print (ip)
- ext()
- elif joker == 5:
- dz = raw_input('\033[92mEscribe la IP : \033[92m')
- sub = "http://api.hackertarget.com/subnetcalc/?q=" + dz
- net = urlopen(sub).read()
- print (net)
- ext()
- elif joker == 6:
- dz = raw_input('\033[96mEscribe la IP : \033[96m')
- port = "http://api.hackertarget.com/nmap/?q=" + dz
- scan = urlopen(port).read()
- print (scan)
- ext()
- elif joker == 7:
- dz = raw_input('\033[91mEscribe tu dominio :\033[91m')
- get = "https://api.hackertarget.com/pagelinks/?q=" + dz
- page = urlopen(get).read()
- print(page)
- ext()
- elif joker == 8:
- dz = raw_input('\033[92mEscribe tu dominio :\033[92m')
- zon = "http://api.hackertarget.com/zonetransfer/?q=" + dz
- tran = urlopen(zon).read()
- print (tran)
- ext()
- elif joker == 9:
- dz = raw_input('\033[96mEscribe tu dominio :\033[96m')
- hea = "http://api.hackertarget.com/httpheaders/?q=" + dz
- der = urlopen(hea).read()
- print (der)
- ext()
- elif joker == 10:
- dz = raw_input('\033[91mEscribe tu dominio :\033[91m')
- host = "http://api.hackertarget.com/hostsearch/?q=" + dz
- finder = urlopen(host).read()
- print (finder)
- ext()
- elif joker == 11:
- slowprint("ToolMaster \033[92m")
- slowprint(".....................")
- slowprint("@ChumoGH \033[96m")
- slowprint(".........................")
- slowprint("website : chumogh.xyz \033[91m")
- ext()
- elif joker == 0:
- print "Exiting!!"
- ext()
- except(KeyboardInterrupt):
- print "\nCtrl + C -> Saliendo!!"
- select()
|