About Lockdoor-Framework Author: SofianeHamlaoui Tested on: Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)
LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.
Lockdoor-Framework installation: For now, Lockdoor-Framework supports Debian-based Linux distros (Kali Linux, ParrotSec, Ubuntu...), Arch Linux based distros (Manjaro, BlackArch, ArchStrike...), Fedora, OpenSuse, Cygwin on Windows.
Open your Terminal and enter these commands:
You can watch detail here:
Lockdoor Tools contents 🛠️: * Information Gathering 🔎:- dirsearch: A Web path scanner
- brut3k1t: security-oriented bruteforce framework
- gobuster: DNS and VHost busting tool written in Go
- Enyx: an SNMP IPv6 Enumeration Tool
- Goohak: Launchs Google Hacking Queries Against A Target Domain
- Nasnum: The NAS Enumerator
- Sublist3r: Fast subdomains enumeration tool for penetration testers
- wafw00f: identify and fingerprint Web Application Firewall
- Photon: ncredibly fast crawler designed for OSINT.
- Raccoon: offensive security tool for reconnaissance and vulnerability scanning
- DnsRecon: DNS Enumeration Script
- Nmap: The famous security Scanner, Port Scanner, & Network Exploration Tool
- sherlock: Find usernames across social networks
- snmpwn: An SNMPv3 User Enumerator and Attack tool
- Striker: an offensive information and vulnerability scanner.
- theHarvester: E-mails, subdomains and names Harvester
- URLextractor: Information gathering & website reconnaissance
- denumerator.py: Enumerates list of subdomains
- other: other Information gathering,recon and Enumeration scripts I collected somewhere.
- ReconDog: Reconnaissance Swiss Army Knife
- RED_HAWK: All in one tool for Information Gathering, Vulnerability Scanning and Crawling
- Dracnmap: Info Gathering Framework
* Web Hacking 🌐:
- Spaghetti: Spaghetti - Web Application Security Scanner
- CMSmap: CMS scanner
- BruteXSS: BruteXSS is a tool to find XSS vulnerabilities in web application
- J-dorker: Website List grabber from Bing
- droopescan: scanner, identify, CMSs, Drupal, Silverstripe.
- Optiva: Web Application Scanner
- V3n0M: Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
- AtScan: Advanced dork Search & Mass Exploit Scanner
- WPSeku: Wordpress Security Scanner
- WPScan: A simple Wordpress scanner written in python
- XSStrike: Most advanced XSS scanner.
- SQLMap: automatic SQL injection and database takeover tool
- WhatWeb: the Next generation web scanner
- joomscan: Joomla Vulnerability Scanner Project
- Dzjecter: Server checking Tool
* Privilege Escalation ⚠️:
- Linux 🐧:linux_checksec.sh
linux_enum.sh
linux_gather_files.sh
linux_kernel_exploiter.pl
linux_privesc.py
linux_privesc.sh
linux_security_test
Linux_exploits folder - Windows
: windows-privesc-check.py
windows-privesc-check.exe - MySql:raptor_udf.c
raptor_udf2.c
* Reverse Engineering ⚡:
- Radare2: unix-like reverse engineering framework
- VirtusTotal: VirusTotal tools
- Miasm: Reverse engineering framework
- Mirror: reverses the bytes of a file
- DnSpy: .NET debugger and assembly
- AngrIo: A python framework for analyzing binaries (Suggested by @Hamz-a)
- DLLRunner: a smart DLL execution script for malware analysis in sandbox systems.
- Fuzzy Server: a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
- yara: a tool aimed at helping malware researchers toidentify and classify malware samples
- Spike: a protocol fuzzer creation kit + audits
- other: other scripts collected somewhere
* Exploitation ❗:
- Findsploit: Find exploits in local and online databases instantly
- Pompem: Exploit and Vulnerability Finder
- rfix: Python tool that helps RFI exploitation.
- InUrlBr: Advanced search in search engines
- Burpsuite: Burp Suite for security testing & scanning.
- linux-exploit-suggester2: Next-Generation Linux Kernel Exploit Suggester
- other: other scripts I collected somewhere.
* Shells 🐚:
- WebShells: BlackArch's Webshells Collection
- ShellSum: A defense tool - detect web shells in local directories
- Weevely: Weaponized web shell
- python-pty-shells: Python PTY backdoors
- crunch : a wordlist generator
- CeWL : a Custom Word List Generator
- patator : a multi-purpose brute-forcer, with a modular design and a flexible usage
* Encryption - Decryption 🛡️:- Codetective: a tool to determine the crypto/encoding algorithm used
- findmyhash: Python script to crack hashes using online services
* Social Engineering 🎭:
- scythe: an accounts enumerator
Contributing:
- Fork Lockdoor-Framework:
git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git
- Create your feature branch
- Commit your changes
- Push to the branch
- Create a new Pull Request
Features 📙:- Pentesting Tools Selection 📙:
Tools ?: Lockdoor doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value). what Tools ?: the tools contains Lockdoor are a collection from the best tools (Added value) on Kali Linux, ParrotSec and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value). Easy customization: Easily add/remove tools. (Added value) Installation: You can install the tool automatically using the install.sh
. Manually or on Docker [COMING SOON]- Resources and cheatsheets 📙 (Added value):
Resources: That's what makes Lockdoor Added value, Lockdoor Doesn't contain only tools! Pentesing and Security Assessment Findings Reports templates (Added value), Pentesting walkthrough examples and tempales (Added value) and more. Cheatsheets: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.
Check the Wiki Pages to know more about the tool 📙: Lockdoor-Framework's screenshots:![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1rTluxXsDegOGdi_zg6nMqqbKwes587sHK3uXaS9a_TItKCKs9A_efrJ9rXoy6AxG0gZht5PPE7si4WUU4WqfH_ssxlZUORwZq4uK41ft5R6pMr9R-zEKG7Cq-FZQZdK4VsiyG1BJ8_M/s1600/Lockdoor-Framework+First+Step.png) |
First Step |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mOyFFBejOdfzIyHhf88zclQWbDMEb37UcVy_X0qzGKgt9m_fdS58jKvdL4G1FhH5isVdMLuzI6zDawtW2JF0L_XqW-SGrwS-HqVoby0LAu9RBu4pAzfxeDDU400jP6ynoKJoldf5xLg/s1600/Lockdoor-Framework+Lockdoor+update.png) |
Lockdoor update |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-1s-GYFOAdlbW0Xo3uZuUySbPKy7eGJlg8XbUOpbKYpdfr3tKVhTFbrmDQBUTKkMlox8aNNMuHAeE8VLNv49hLOCb2Pg-OIv_VqQF0YZIUwKkYa5Cgei9T90llFAUJwNLxisQ2PTahdo/s1600/Lockdoor-Framework+ROOT+Menu.png) |
ROOT Menu |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAqgZmwNq9Ipdr0UwVfxaikwex7iCUq6caU_6dkZu2lu09-uUrpcqtTZVEPm8lJzz3HNOW0Vdz2pg_k1Ml5ExTWmps-E1RdnI1ckrMZ2ByhuQSiPcyWPko0lF_Iiqn4Js3o01VeU34_nY/s1600/Lockdoor-Framework+Information+Gathering.png) |
Information Gathering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw5vDHK1jmsDEQdkDOe6s_eX-GVMm9J33FkStFh19qCs22WOkE_5GSzaNf_BOg2viPQa5vjhor0ymugl30iqo0pbqhABjwVPSnpC7_1ie3UB6kn_hNfQ5QKcDR_E9IdCevPi1ap3pfUHQ/s1600/Lockdoor-Framework+%25285%2529.png) |
Web Hacking |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_A7S_Ujr5He7Y_i6fuCmNgW4Bpm1alJGn5thTJPgjf-X3PwJ40H-2Ks1OnrdokAYiXytuhLhUFD9Yn3Id1fvNFQpWE_qCRuDNPSdO11rYGcsFfXRcxUMeWMr8tDVUXq0RAl5hABu9MBs/s1600/Lockdoor-Framework+%25286%2529.png) |
Exploitation |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAxzUoDax05Rhw330LbUDcyeZ5k6CDzPpWk0c6vPnnu3YTLzpTnx9nNrtO2MBOeMXO0JXT7m3-R4T1K4LKTQHNSOAape2KW8UA3_4LO6MB_dAKqnBIN_UCaSLRCkoEnyExL98X3R-x-VA/s1600/Lockdoor-Framework+%25287%2529.png) |
Reverse Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivJxBSoGA9HUjVxX_1kdkR28uwlkvSKmzx2TaJPErWDE48G82IQ5mbfSa1KsNljz1nrNlJER_ea9ixXEsxMZP5FLCDLjngQUGmukQSmy_Y9hjd16yu9VB0atzreuDZ0cwj8ZGRiz8bc_o/s1600/Lockdoor-Framework+%25288%2529.png) |
Enc/Dec |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoIEc5QF1tEaOjPwNCDrjY58zVzPxVeBx9upHQIlI1AO_ICSOiCtmNcELHjJH7jVqAolUDS1VwCdhsA4xKMdXRSiLuQnAQNx3eFpeAu_a5kihCFo3WupGn6Ch7-HLcsTW2A93i3t6Uveg/s1600/Lockdoor-Framework+%25289%2529.png) |
Password Attacks |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdsZWSGjSa1WfPY0eKE3s4eUb35X5RQA1OrLYgfmu0FSTIMo7YRFylDTOxE93BsMi7N8sUYrXGGFnp_Nl1LJT6kWeIoPvmTnlGPn1mSR1ruivyVawb1J0-kJv3mpjvo2iBY3bHq5a92wI/s1600/Lockdoor-Framework+%252810%2529.png) |
Shells |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWeqp9jrxWW9YWkNFWpxa4LtEzTAoS9_7LHcs8w6OzRV6Ai6_WbEO0FU9-dJKvda2PRUgurZSRvkkPRnIKL21dHm5ouhqutHhmVyvWtKko8g4lCLjYlue9p9BISGA6Jexel0D-0rySFtE/s1600/Lockdoor-Framework+%252811%2529.png) |
PrivEsc |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgE9NmLlOaL_UidJfF0exOdm5d0SpgKGIn-1fo_ml53xyCHumnmz45nFQ-RkoQ9_QAirs0CfjuO760P8FolXWbXDabdKnjMIwNzHM4vthoWuc5bWH787cisHLQu0O9dcIRwiF9H7_oGjjY/s1600/Lockdoor-Framework+%252812%2529.png) |
Social Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB1H9Niodo8vD91-YCUwOZoyoXXYFxiowMYChXJtUDuzHp-au4FfyBvidHMBArxPGUSm9AxpUqa0ZrSCVLuvAWG8I1OS3McXeQcMilJocNLJUb36Gfz94EKoPaAAPCBOa-1U27vHKRDe8/s1600/Lockdoor-Framework+%252813%2529.png) |
PSAFRT |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtIRn_TfU0Fch1jyhe1nKzeBMLakMhXvgIo6od3oB8yirjF3CBffEraGuFvszBcOw56U07YsuF8-QdoCDl4nz3QUj4pwFPj1Ch04bolRu8IzVk-nyAVXS6c7WzH21ggJAIurHLYuHyamE/s1600/Lockdoor-Framework+%252814%2529.png) |
Walkthroughs |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhp7p-s9vAqzfyY9WiaRkAxU7DgzZnFBb-O8cajx0AZyHXPATEe7Zxb4Hf6HaqtDbC2s_TitXXTUfJ67QzzCBFlDMGXE8CcJEEKS51tjcCnBSt6oQNFMySB0MFhBa_WQoITgoHFJmiDfh0/s1600/Lockdoor-Framework+%252815%2529.png) |
About |
Support the author: BTC Address: ![](https://chart.googleapis.com/chart?cht=qr&chl=1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk&chs=180x180&choe=UTF-8&chld=L|2)
Read more
- Hacking Tools Free Download
- Hacking Tools Windows
- Pentest Tools For Mac
- Hacking Tools For Beginners
- Tools For Hacker
- How To Hack
- Nsa Hack Tools Download
- How To Make Hacking Tools
- Pentest Tools Tcp Port Scanner
- Underground Hacker Sites
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Android
- Hack Tool Apk No Root
- Hacker Tools Linux
- Pentest Tools List
- Hack Tools Github
- Game Hacking
0 comments:
Post a Comment