#!/usr/bin/env python from urllib2 import * from platform import system import sys def clear(): if system() == 'Linux': os.system("clear") if system() == 'Windows': os.system('cls') os.system('color a') else: pass def slowprint(s): for c in s + '\n': sys.stdout.write(c) sys.stdout.flush() time.sleep(4. / 100) banner = ''' ========= ToolMaster =======\033[91m ========== @drowkid01 =========\033[92m ======= Telegram @drowkid01 ====\033[96m ''' print banner def menu(): print''' \033[91m 1 \033[92m)\033[96m DNS Lookup \033[91m 2 \033[92m)\033[96m Whois Lookup \033[91m 3 \033[92m)\033[96m Reverse IP Lookup \033[91m 4 \033[92m)\033[96m GeoIP Lookup \033[91m 5 \033[92m)\033[96m Subnet Lookup \033[91m 6 \033[92m)\033[96m Port Scanner \033[91m 7 \033[92m)\033[96m Extract Links \033[91m 8 \033[92m)\033[96m Zone Transfer \033[91m 9 \033[92m)\033[96m HTTP Header \033[91m 10\033[92m)\033[96m Host Finder \033[91m 11\033[92m)\033[96m Info \033[91m 0 \033[92m)\033[96m Salir ''' slowprint("\033[1;91mchumogh.xyz" + "\n - toolmaster") menu() def ext(): ex = raw_input ('\033[92mContinuar/Exit -=[C/E]=- -> ') if ex[0].upper() == 'E' : print 'Saliendo!!!' exit() else: clear() print banner menu() select() def select(): try: joker = input("\033[96mEscribe \033[92m0/\033[91m11 -> -> ") if joker == 2: dz = raw_input('\033[91mEscribe la IP o Dominio : \033[91m') whois = "http://api.hackertarget.com/whois/?q=" + dz dev = urlopen(whois).read() print (dev) ext() elif joker == 3: dz = raw_input('\033[92mEscribe la IP : \033[92m') revrse = "http://api.hackertarget.com/reverseiplookup/?q=" + dz lookup = urlopen(revrse).read() print (lookup) ext() elif joker == 1: dz = raw_input('\033[96mEscribe tu dominio :\033[96m') dns = "http://api.hackertarget.com/dnslookup/?q=" + dz joker = urlopen(dns).read() print (joker) ext() elif joker == 4: dz = raw_input('\033[91mEscribe la IP : \033[91m') geo = "http://api.hackertarget.com/geoip/?q=" + dz ip = urlopen(geo).read() print (ip) ext() elif joker == 5: dz = raw_input('\033[92mEscribe la IP : \033[92m') sub = "http://api.hackertarget.com/subnetcalc/?q=" + dz net = urlopen(sub).read() print (net) ext() elif joker == 6: dz = raw_input('\033[96mEscribe la IP : \033[96m') port = "http://api.hackertarget.com/nmap/?q=" + dz scan = urlopen(port).read() print (scan) ext() elif joker == 7: dz = raw_input('\033[91mEscribe tu dominio :\033[91m') get = "https://api.hackertarget.com/pagelinks/?q=" + dz page = urlopen(get).read() print(page) ext() elif joker == 8: dz = raw_input('\033[92mEscribe tu dominio :\033[92m') zon = "http://api.hackertarget.com/zonetransfer/?q=" + dz tran = urlopen(zon).read() print (tran) ext() elif joker == 9: dz = raw_input('\033[96mEscribe tu dominio :\033[96m') hea = "http://api.hackertarget.com/httpheaders/?q=" + dz der = urlopen(hea).read() print (der) ext() elif joker == 10: dz = raw_input('\033[91mEscribe tu dominio :\033[91m') host = "http://api.hackertarget.com/hostsearch/?q=" + dz finder = urlopen(host).read() print (finder) ext() elif joker == 11: slowprint("ToolMaster \033[92m") slowprint(".....................") slowprint("@drowkid01 \033[96m") slowprint(".........................") slowprint("website : chumogh.xyz \033[91m") ext() elif joker == 0: print "Exiting!!" ext() except(KeyboardInterrupt): print "\nCtrl + C -> Saliendo!!" select()