About Lockdoor-Framework Author: SofianeHamlaoui Tested on: Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)
LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.
Lockdoor-Framework installation: For now, Lockdoor-Framework supports Debian-based Linux distros (Kali Linux, ParrotSec, Ubuntu...), Arch Linux based distros (Manjaro, BlackArch, ArchStrike...), Fedora, OpenSuse, Cygwin on Windows.
Open your Terminal and enter these commands:
You can watch detail here:
Lockdoor Tools contents 🛠️: * Information Gathering 🔎:- dirsearch: A Web path scanner
- brut3k1t: security-oriented bruteforce framework
- gobuster: DNS and VHost busting tool written in Go
- Enyx: an SNMP IPv6 Enumeration Tool
- Goohak: Launchs Google Hacking Queries Against A Target Domain
- Nasnum: The NAS Enumerator
- Sublist3r: Fast subdomains enumeration tool for penetration testers
- wafw00f: identify and fingerprint Web Application Firewall
- Photon: ncredibly fast crawler designed for OSINT.
- Raccoon: offensive security tool for reconnaissance and vulnerability scanning
- DnsRecon: DNS Enumeration Script
- Nmap: The famous security Scanner, Port Scanner, & Network Exploration Tool
- sherlock: Find usernames across social networks
- snmpwn: An SNMPv3 User Enumerator and Attack tool
- Striker: an offensive information and vulnerability scanner.
- theHarvester: E-mails, subdomains and names Harvester
- URLextractor: Information gathering & website reconnaissance
- denumerator.py: Enumerates list of subdomains
- other: other Information gathering,recon and Enumeration scripts I collected somewhere.
- ReconDog: Reconnaissance Swiss Army Knife
- RED_HAWK: All in one tool for Information Gathering, Vulnerability Scanning and Crawling
- Dracnmap: Info Gathering Framework
* Web Hacking 🌐:
- Spaghetti: Spaghetti - Web Application Security Scanner
- CMSmap: CMS scanner
- BruteXSS: BruteXSS is a tool to find XSS vulnerabilities in web application
- J-dorker: Website List grabber from Bing
- droopescan: scanner, identify, CMSs, Drupal, Silverstripe.
- Optiva: Web Application Scanner
- V3n0M: Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
- AtScan: Advanced dork Search & Mass Exploit Scanner
- WPSeku: Wordpress Security Scanner
- WPScan: A simple Wordpress scanner written in python
- XSStrike: Most advanced XSS scanner.
- SQLMap: automatic SQL injection and database takeover tool
- WhatWeb: the Next generation web scanner
- joomscan: Joomla Vulnerability Scanner Project
- Dzjecter: Server checking Tool
* Privilege Escalation ⚠️:
- Linux 🐧:linux_checksec.sh
linux_enum.sh
linux_gather_files.sh
linux_kernel_exploiter.pl
linux_privesc.py
linux_privesc.sh
linux_security_test
Linux_exploits folder - Windows
: windows-privesc-check.py
windows-privesc-check.exe - MySql:raptor_udf.c
raptor_udf2.c
* Reverse Engineering ⚡:
- Radare2: unix-like reverse engineering framework
- VirtusTotal: VirusTotal tools
- Miasm: Reverse engineering framework
- Mirror: reverses the bytes of a file
- DnSpy: .NET debugger and assembly
- AngrIo: A python framework for analyzing binaries (Suggested by @Hamz-a)
- DLLRunner: a smart DLL execution script for malware analysis in sandbox systems.
- Fuzzy Server: a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
- yara: a tool aimed at helping malware researchers toidentify and classify malware samples
- Spike: a protocol fuzzer creation kit + audits
- other: other scripts collected somewhere
* Exploitation ❗:
- Findsploit: Find exploits in local and online databases instantly
- Pompem: Exploit and Vulnerability Finder
- rfix: Python tool that helps RFI exploitation.
- InUrlBr: Advanced search in search engines
- Burpsuite: Burp Suite for security testing & scanning.
- linux-exploit-suggester2: Next-Generation Linux Kernel Exploit Suggester
- other: other scripts I collected somewhere.
* Shells 🐚:
- WebShells: BlackArch's Webshells Collection
- ShellSum: A defense tool - detect web shells in local directories
- Weevely: Weaponized web shell
- python-pty-shells: Python PTY backdoors
- crunch : a wordlist generator
- CeWL : a Custom Word List Generator
- patator : a multi-purpose brute-forcer, with a modular design and a flexible usage
* Encryption - Decryption 🛡️:- Codetective: a tool to determine the crypto/encoding algorithm used
- findmyhash: Python script to crack hashes using online services
* Social Engineering 🎭:
- scythe: an accounts enumerator
Contributing:
- Fork Lockdoor-Framework:
git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git
- Create your feature branch
- Commit your changes
- Push to the branch
- Create a new Pull Request
Features 📙:- Pentesting Tools Selection 📙:
Tools ?: Lockdoor doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value). what Tools ?: the tools contains Lockdoor are a collection from the best tools (Added value) on Kali Linux, ParrotSec and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value). Easy customization: Easily add/remove tools. (Added value) Installation: You can install the tool automatically using the install.sh
. Manually or on Docker [COMING SOON]- Resources and cheatsheets 📙 (Added value):
Resources: That's what makes Lockdoor Added value, Lockdoor Doesn't contain only tools! Pentesing and Security Assessment Findings Reports templates (Added value), Pentesting walkthrough examples and tempales (Added value) and more. Cheatsheets: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.
Check the Wiki Pages to know more about the tool 📙: Lockdoor-Framework's screenshots:![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkM-7rmGLQIVjSGUqOfOJo_abQDrGC8G2U-yRJWCEnPwM95DuNaRqqafTHI9QI37iSlxrYZ_8c-OG5tHnihVz6C73A4G5cKf_nOSK91WPTAKhAEoHJPuRM2kRe-jVcuzoimbf-/s1600/Lockdoor-Framework+First+Step.png) |
First Step |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiazJaeOz5abTfRkDC6p_6_mIVbeEDjFIk7kuxTGa5ZbF6uSWALZQJ8um5bCq2wbVs4q9GgvMUOVbIr3Cz7b60fNtbcaMBHtQ6FA40Ijs5V3qfr4uWutP3DgytKnw7LfM0kDwUo/s1600/Lockdoor-Framework+Lockdoor+update.png) |
Lockdoor update |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGVn0N9Uzfvix8EG1CyrJ3INBioF93g7L-9Ky2u7fcmEdyLI6TuGesQchk58vp89uxGLYgZV9YqJguFNp7_ZhxQYdhRl0OqnjBw45aC5rUwhKKyebqIHnSWaPPNBFDxIx7oJNR/s1600/Lockdoor-Framework+ROOT+Menu.png) |
ROOT Menu |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibhtjRsmyvq41vGtU3RTyhFOa8WuJle7-kqTS8pvt-CzGCSvady4wkALeXDtgr1TtcRa_IHnwWLuHJJ1UcRaC5bRJsr6zQkZMZglxbDrSK_BDtqmbu6QkDjm9iKG1HjyuAZ-Ht/s1600/Lockdoor-Framework+Information+Gathering.png) |
Information Gathering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7_54RCEmegjWTfr-FFh_rYUUWOFzXLaap5X3ZUIXdvp8EL4Li4eANNiBzIXgEolgDn7RQhbJ4lLSQqiMZGRnHZwp4ZIEvCiEWP0T2AVfDXfyh4VTYjwCCpP3W_1EDPZIOAiS6/s1600/Lockdoor-Framework+%25285%2529.png) |
Web Hacking |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9Ts-MezkhkL3waBCrhc9cfAklA5H1PCrfMD5mz26G51CQdjnOBxBe9k_k4t_Cqiy6edhvkdt3VILZs120DgKtoVFXGPsjmU1yPABm_EbQlQESzN9q02caceFyX61tIGF5XO15/s1600/Lockdoor-Framework+%25286%2529.png) |
Exploitation |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMsmZ646gLorKZ1ffQ80fCI-U2GCIBhDF7eR0j7vODWhDxttzSBEzLfHWp2A1pU_9RTiEL9zRl8NiE7_nTWGTl86rhb38orUMglt2UNPY6DAQUZcQQm3DuEJFd1jMVN-M7lpJM/s1600/Lockdoor-Framework+%25287%2529.png) |
Reverse Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTgymJQoP8luprR6P2qQ1c_wLXjryW-6PKFUWMlc25AUaHVVUhe5P23MjGPUqeEegLvMvPSWPIwV-G3XJcPKVQg4K92srnzE3Bjl6PwS2t7SETKeY_zE6VCnd_Y59sm30OvuRK/s1600/Lockdoor-Framework+%25288%2529.png) |
Enc/Dec |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOSws1BASusOM_ztA7PRhpF9DXa6wb3LOON-MqvZE32lzGlfBPgqCPATtQ3aAyHbfhyZ1TL-RFW1UIhUhNbzad09Mj4NbEB62LtmnhrgHpe9z0P0BrZMI8HpMsbc0A1EkMPbal/s1600/Lockdoor-Framework+%25289%2529.png) |
Password Attacks |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihiPrwx-6RshVPKBb5cDstrv6K5EGbMOnCzS5DSQn0b9A1mWUCq6xk9KACJxZkKIW_Xzgi3zSnppF4B9uVAbSUp74RlaE_-NaBXK3m8wXi4pOirCUOeuEGikN9ZjFvjvjLgVkr/s1600/Lockdoor-Framework+%252810%2529.png) |
Shells |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieIV-r4IefSNklRfAjRtKLzkHrZhORNS9ZNcqmIKcRwqFdYgxHTqjenwD_KrEL-00NapYt0O5f5k5m_aXIrOyW7KgiMqKVY4r53MnUUQSB2iA071hlGcC8bv9Ec9pm-kDT86rT/s1600/Lockdoor-Framework+%252811%2529.png) |
PrivEsc |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG8tNihAnoX9dG1Vp3B-sF_tqGoWQe6YCK8v6dUk9RiG8qpeYb02ug6pU9irAp9AoS16MXXrbuew45ZSo1qwqja308yKtRQ95faxz5A3xSccn9u3NAM87qQ9UqPbAfJpyLm-UZ/s1600/Lockdoor-Framework+%252812%2529.png) |
Social Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKGPpk8lQX5Hgvh2PuVIAvNc2XVhTn837jng2IfqqjQnI4O2hZM-WUM1vn4cfaJtWoT7RY30tptkSmVXTrxGkIWcyEc8-jF9CmKN2wGmIfRVhfAKBY8MY89nxNCgsU6PfbC8v-/s1600/Lockdoor-Framework+%252813%2529.png) |
PSAFRT |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5hyphenhypheneqRbXe_sNnBWnSWRPNs7hP4cWPExzucmZWzn00133mN9pBwio8H-nQPj6oRPZtQhsQp4YTV9ICZ0gKm8YRkJdTjG29pIVJz75d_iu2tOJnDPUAmxHWVIb21K8ZLhwE0SoA/s1600/Lockdoor-Framework+%252814%2529.png) |
Walkthroughs |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX1fTnUme2ZfINpxFlMKQdXgCXL_GblbUjd17G0VbKJjLdb9YUD5lOwkCWy_AeA9pm0MLgCFqW4BuxRUzami5WkfKQZKd49UKjC54q5tNSpcd_62ancPu4AvtPzpIvWKxiPgqE/s1600/Lockdoor-Framework+%252815%2529.png) |
About |
Support the author: BTC Address: ![](https://chart.googleapis.com/chart?cht=qr&chl=1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk&chs=180x180&choe=UTF-8&chld=L|2)
Related articles
- Hack Tools Pc
- Hacking Tools Windows
- New Hacker Tools
- Hacker Search Tools
- Hacker Tools Github
- How To Install Pentest Tools In Ubuntu
- Underground Hacker Sites
- Pentest Tools Kali Linux
- Hacker Tools For Windows
- Pentest Tools Android
- Hacking Tools Software
- Pentest Recon Tools
- Hacker Tools Github
- Hacking Tools 2020
- Hackrf Tools
- Hack Tool Apk No Root
- Hacker Tools Hardware
- Hack Tools
- Hack Tool Apk No Root
- Hacking Tools Kit
- What Is Hacking Tools
- New Hack Tools
- Pentest Tools Open Source
- Pentest Tools Apk
- Pentest Tools Port Scanner
- Pentest Tools
- Hacker Hardware Tools
- Hack App
- Hacker Tools Software
- Kik Hack Tools
- Hacker Tools Apk Download
- Hacker Tools For Pc
- Android Hack Tools Github
- Hacking Tools For Games
- Hacking Tools Windows
- Best Hacking Tools 2019
- Hacking Apps
- Pentest Tools Kali Linux
- Blackhat Hacker Tools
- Ethical Hacker Tools
- Kik Hack Tools
- Hak5 Tools
- Hacking Tools Software
- Hacking Tools For Windows Free Download
- Hacking Tools For Mac
- Hacking Tools Mac
- Hacker Tools 2020
- Wifi Hacker Tools For Windows
- Hacker Tools Windows
- Hacker Hardware Tools
- Pentest Tools List
- Hacker Tools Windows
- Hack Rom Tools
- Pentest Reporting Tools
- Hack Website Online Tool
- Top Pentest Tools
- Hacking Tools Name
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Framework
- Hacking Tools For Kali Linux
- Ethical Hacker Tools
- Pentest Tools Free
- Hacking Tools For Windows Free Download
- Hacker Tools 2020
- Physical Pentest Tools
- Pentest Recon Tools
- Underground Hacker Sites
- Nsa Hack Tools
- Wifi Hacker Tools For Windows
- Tools 4 Hack
- Hacking Tools 2019
- Hacker Tools 2020
- Pentest Tools Review
- Hack Tools For Windows
- Hack Apps
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Port Scanner
- Hack Tools Pc
- Hacking Tools Kit
- Underground Hacker Sites
- Hacker Tools For Ios
- How To Install Pentest Tools In Ubuntu
- Top Pentest Tools
- Hack Tools
- Pentest Tools Website
- Kik Hack Tools
- Hacking Tools And Software
- Hacking Tools For Games
- Pentest Tools For Windows
- Pentest Tools Review
- Hack Tools Download
- Hacker Tools Github
- Nsa Hacker Tools
- Pentest Tools Android
- Hacking Tools Hardware
- Hack Tools Github
- Hacker Tools Apk
- Pentest Tools Windows
- Pentest Box Tools Download
- Pentest Tools Nmap
- Hack And Tools
- Pentest Tools Kali Linux
- Nsa Hack Tools
- Best Hacking Tools 2020
- Pentest Automation Tools
- Hacking Tools 2020
- Hacking Tools Windows 10
- Hack Tools For Ubuntu
- Hacking Tools Hardware
- Hacker Tools For Windows
- Pentest Tools Alternative
- Pentest Tools Kali Linux
- Hack Tool Apk No Root
- Growth Hacker Tools
- Hacker Tools For Pc
- Hacking App
- Hack Tools For Games
- What Are Hacking Tools
- What Is Hacking Tools
- Easy Hack Tools
- Pentest Tools Url Fuzzer
- Hack Tools
- Underground Hacker Sites
- Hacking Tools For Windows
- Pentest Recon Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Tools 2019
- Hacker Tool Kit
- Hackrf Tools
- Ethical Hacker Tools
- Hacking Tools Windows
- Nsa Hack Tools
- Hacking Tools Download
- Hacking Tools Free Download
- Beginner Hacker Tools
- Pentest Tools Download
- Pentest Tools For Android
0 Comments:
コメントを投稿
<< Home