About Lockdoor-Framework Author: SofianeHamlaoui Tested on: Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)
LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.
Lockdoor-Framework installation: For now, Lockdoor-Framework supports Debian-based Linux distros (Kali Linux, ParrotSec, Ubuntu...), Arch Linux based distros (Manjaro, BlackArch, ArchStrike...), Fedora, OpenSuse, Cygwin on Windows.
Open your Terminal and enter these commands:
You can watch detail here:
Lockdoor Tools contents 🛠️: * Information Gathering 🔎:- dirsearch: A Web path scanner
- brut3k1t: security-oriented bruteforce framework
- gobuster: DNS and VHost busting tool written in Go
- Enyx: an SNMP IPv6 Enumeration Tool
- Goohak: Launchs Google Hacking Queries Against A Target Domain
- Nasnum: The NAS Enumerator
- Sublist3r: Fast subdomains enumeration tool for penetration testers
- wafw00f: identify and fingerprint Web Application Firewall
- Photon: ncredibly fast crawler designed for OSINT.
- Raccoon: offensive security tool for reconnaissance and vulnerability scanning
- DnsRecon: DNS Enumeration Script
- Nmap: The famous security Scanner, Port Scanner, & Network Exploration Tool
- sherlock: Find usernames across social networks
- snmpwn: An SNMPv3 User Enumerator and Attack tool
- Striker: an offensive information and vulnerability scanner.
- theHarvester: E-mails, subdomains and names Harvester
- URLextractor: Information gathering & website reconnaissance
- denumerator.py: Enumerates list of subdomains
- other: other Information gathering,recon and Enumeration scripts I collected somewhere.
- ReconDog: Reconnaissance Swiss Army Knife
- RED_HAWK: All in one tool for Information Gathering, Vulnerability Scanning and Crawling
- Dracnmap: Info Gathering Framework
* Web Hacking 🌐:
- Spaghetti: Spaghetti - Web Application Security Scanner
- CMSmap: CMS scanner
- BruteXSS: BruteXSS is a tool to find XSS vulnerabilities in web application
- J-dorker: Website List grabber from Bing
- droopescan: scanner, identify, CMSs, Drupal, Silverstripe.
- Optiva: Web Application Scanner
- V3n0M: Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
- AtScan: Advanced dork Search & Mass Exploit Scanner
- WPSeku: Wordpress Security Scanner
- WPScan: A simple Wordpress scanner written in python
- XSStrike: Most advanced XSS scanner.
- SQLMap: automatic SQL injection and database takeover tool
- WhatWeb: the Next generation web scanner
- joomscan: Joomla Vulnerability Scanner Project
- Dzjecter: Server checking Tool
* Privilege Escalation ⚠️:
- Linux 🐧:linux_checksec.sh
linux_enum.sh
linux_gather_files.sh
linux_kernel_exploiter.pl
linux_privesc.py
linux_privesc.sh
linux_security_test
Linux_exploits folder - Windows
: windows-privesc-check.py
windows-privesc-check.exe - MySql:raptor_udf.c
raptor_udf2.c
* Reverse Engineering ⚡:
- Radare2: unix-like reverse engineering framework
- VirtusTotal: VirusTotal tools
- Miasm: Reverse engineering framework
- Mirror: reverses the bytes of a file
- DnSpy: .NET debugger and assembly
- AngrIo: A python framework for analyzing binaries (Suggested by @Hamz-a)
- DLLRunner: a smart DLL execution script for malware analysis in sandbox systems.
- Fuzzy Server: a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
- yara: a tool aimed at helping malware researchers toidentify and classify malware samples
- Spike: a protocol fuzzer creation kit + audits
- other: other scripts collected somewhere
* Exploitation ❗:
- Findsploit: Find exploits in local and online databases instantly
- Pompem: Exploit and Vulnerability Finder
- rfix: Python tool that helps RFI exploitation.
- InUrlBr: Advanced search in search engines
- Burpsuite: Burp Suite for security testing & scanning.
- linux-exploit-suggester2: Next-Generation Linux Kernel Exploit Suggester
- other: other scripts I collected somewhere.
* Shells 🐚:
- WebShells: BlackArch's Webshells Collection
- ShellSum: A defense tool - detect web shells in local directories
- Weevely: Weaponized web shell
- python-pty-shells: Python PTY backdoors
- crunch : a wordlist generator
- CeWL : a Custom Word List Generator
- patator : a multi-purpose brute-forcer, with a modular design and a flexible usage
* Encryption - Decryption 🛡️:- Codetective: a tool to determine the crypto/encoding algorithm used
- findmyhash: Python script to crack hashes using online services
* Social Engineering 🎭:
- scythe: an accounts enumerator
Contributing:
- Fork Lockdoor-Framework:
git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git
- Create your feature branch
- Commit your changes
- Push to the branch
- Create a new Pull Request
Features 📙:- Pentesting Tools Selection 📙:
Tools ?: Lockdoor doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value). what Tools ?: the tools contains Lockdoor are a collection from the best tools (Added value) on Kali Linux, ParrotSec and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value). Easy customization: Easily add/remove tools. (Added value) Installation: You can install the tool automatically using the install.sh
. Manually or on Docker [COMING SOON]- Resources and cheatsheets 📙 (Added value):
Resources: That's what makes Lockdoor Added value, Lockdoor Doesn't contain only tools! Pentesing and Security Assessment Findings Reports templates (Added value), Pentesting walkthrough examples and tempales (Added value) and more. Cheatsheets: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.
Check the Wiki Pages to know more about the tool 📙: Lockdoor-Framework's screenshots:![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhds1rytgaXXzugFPHPH_RNY7KywrvXEYbOFZKMYEHhA_6ss2p9s0bE6t1nXOjybr4zhE_epUTkSCxhvz5YB3HPG-0_p71nAdeSNaos4NwE4i_L0DjHrN4dpyCNGCAZ7sZsRCjugLyl8A/s1600/Lockdoor-Framework+First+Step.png) |
First Step |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguTU3MwOSHKsDm1bRtL2YrlbZRqaLeJaXby8NdexSbNo4vCuF-RjgPB0NmrQl5upL6PKvkBxr13buTmJPKoKwZvShlduzvUZV9_tOjyBZJi5vF0fG4zc1fIfs7mPWXdJuGr1VN4VNc4w/s1600/Lockdoor-Framework+Lockdoor+update.png) |
Lockdoor update |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijjz_sNVCr4ps7f0c53kYvwleCtU_ztw7ZvsfPV3R1dh6_VGNLF8hkvlY9RUM6r-g-W8Tpz_HrWjGO0go9vx-7UE3akf13uIsgi1ylRv2ET1CMfjkSOvZbAWQ-u7PZWaJjapm_jdsvmg/s1600/Lockdoor-Framework+ROOT+Menu.png) |
ROOT Menu |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYTec68U_Fkfmp-2EqontpUdY4vZesRig0H5WOBt2HLn9cW6heAnRLtT-neS0S0e7U4Q2cJbUBDJ2x9gPK8DiPTcNv-MM-7TYraOLlL2ZxhT3ZD7XmsgKCJGFxyhxIErOfslBcOQ1rtA/s1600/Lockdoor-Framework+Information+Gathering.png) |
Information Gathering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgd9kXj_2vFq2FEMdj2zVDfQp5ESS-0OoAnxnMUAv7unCobhlqelwlu0Rv8sH2lLIoJT2iigalCpVXzZCmCHU-WYMaPWadnE_PNMQqr7pPVzvXC3KCtdV_bv49OdTIydpwPcpg6CZzDzQ/s1600/Lockdoor-Framework+%25285%2529.png) |
Web Hacking |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxxqa6gZZxlt-Gu1VZ8Dku2KLtGUYm8Ve6XzqC-LC42bF0ljK31vlw30oWpi7qYywXjTIX0YIoU54MrLDQnx95h84AJOS8JusM39A7f58pRZSgNV_Ii0H0iYV7dCnTaGoa8lAnhRrcpg/s1600/Lockdoor-Framework+%25286%2529.png) |
Exploitation |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRz4zKgnIH2W3CKEkZfWGZPKbbYJfoXk06uWoxIKr78jImq04ZSTDes2Dlg9xsoY2yw9bZc3_hR4MaCe94dE3e6mr3UGv3_63b4tXyp8BHi1eYOny2rF3trpqgDDtClkiAaPyYam2I1g/s1600/Lockdoor-Framework+%25287%2529.png) |
Reverse Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg83owJYtdNcl6gtOLRSfUQi19a0ORQE7uZHmZmb35zwHiPbxO_V371RF5HFIlmjmgrSTZJksdIKjtaX1L0jKOj8qcIhN3G-NZqT3m27An37pUSPotYjq1yuqL6XrF0e677GSOeU8h8nw/s1600/Lockdoor-Framework+%25288%2529.png) |
Enc/Dec |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0Q9wFbgXE1B1zTxeonWDqxEOUMA1BughEsJDFdlnTJJuE-1di5Oa7idErH7Mj-xOVUh1dEVFfAaSroVNvrBpw7OJgu290T4bTJZUQKU8GMxiCNIY-AJSoWmXXQvf6KFXwzRKjC303PQ/s1600/Lockdoor-Framework+%25289%2529.png) |
Password Attacks |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizBAQhrKprMV15NuiOZwzCkXAN8zQHlR3EwutFr0euXXArdJoQKdVpdiCMUscWgZ-CSyMHDghhBM1JYlEXiXfMBDTKoU6dUHREfkzodwl1L8DgKWc7MNB8FWIAB63_unOCLtMq5KRURQ/s1600/Lockdoor-Framework+%252810%2529.png) |
Shells |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXb-woh7bmoCN6zkUQ1BJQCEVsZRupmY9TS43BIFzfFmU-1Lbc1YoqU4EYoyJXTfsEhv0zJPByRwS3OqKHStdksPv3fF4GTbRRareu8Z_RdCupj22MyCouNkv5kUwu8XcXWatc6z4nlw/s1600/Lockdoor-Framework+%252811%2529.png) |
PrivEsc |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdwMLc7xRIUMQt49SvU5YneQYEJI2UGNlzXKE6JncXI-Tei-j2cWRPE2CNYt-NjOlX7o-zKgQ1tQmFDQMJ2GgDKDgNlhR67KxEIVTGry6JceSuvLimLqd8m9x0nKi4jsAdZ1M3GgC6YQ/s1600/Lockdoor-Framework+%252812%2529.png) |
Social Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhly_PPMetIUNUwQYInY87iET8slhpXEcZuV4oDVFm4gDLDNqviyCQRqx_T0ZBF16Cm_2gVt3NQOucSsD_5AI5ULUU47uXpOZ9rolq_6ZvZwfVfjP0UA34gvabHduO9D5-DQQBQZNz_dw/s1600/Lockdoor-Framework+%252813%2529.png) |
PSAFRT |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCKOVYyduzkVurgYm6vULcv5dhD-Z1IGjaEzTHu4gXtTuGYTjYKa0Z0YrFluEAFPB8dJyxVzau2x0wGitZar285h8yhqpcvpLZnnMWYt4N8GbldkwQUilwPqPkOb3cXPuKDMVfFPoByA/s1600/Lockdoor-Framework+%252814%2529.png) |
Walkthroughs |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwzd502CAW9lZVAN2yEBGHFD9hUuRsayjRx62rBfaoBKlSM2mvfURo17G6RJn9oZ9ocnB-AOcSheTuWW6Mzm3ud88S4OjT6c6OjXbBWlkvBr_EK4wumee8VWGwO1C_teDykxtv2i_tcQ/s1600/Lockdoor-Framework+%252815%2529.png) |
About |
Support the author: BTC Address: ![](https://chart.googleapis.com/chart?cht=qr&chl=1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk&chs=180x180&choe=UTF-8&chld=L|2)
More information- Hacking Netflix Account
- Hacking Curso
- Mundo Hacker
- Penetration Testing A Hands-On Introduction To Hacking
- Hacking Team
- Hacking Marketing
No comments:
Post a Comment