About Lockdoor-Framework Author: SofianeHamlaoui Tested on: Kali Linux, Ubuntu, Arch Linux, Fedora, OpenSuse and Windows (Cygwin)
LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.
Lockdoor-Framework installation: For now, Lockdoor-Framework supports Debian-based Linux distros (Kali Linux, ParrotSec, Ubuntu...), Arch Linux based distros (Manjaro, BlackArch, ArchStrike...), Fedora, OpenSuse, Cygwin on Windows.
Open your Terminal and enter these commands:
You can watch detail here:
Lockdoor Tools contents 🛠️: * Information Gathering 🔎:- dirsearch: A Web path scanner
- brut3k1t: security-oriented bruteforce framework
- gobuster: DNS and VHost busting tool written in Go
- Enyx: an SNMP IPv6 Enumeration Tool
- Goohak: Launchs Google Hacking Queries Against A Target Domain
- Nasnum: The NAS Enumerator
- Sublist3r: Fast subdomains enumeration tool for penetration testers
- wafw00f: identify and fingerprint Web Application Firewall
- Photon: ncredibly fast crawler designed for OSINT.
- Raccoon: offensive security tool for reconnaissance and vulnerability scanning
- DnsRecon: DNS Enumeration Script
- Nmap: The famous security Scanner, Port Scanner, & Network Exploration Tool
- sherlock: Find usernames across social networks
- snmpwn: An SNMPv3 User Enumerator and Attack tool
- Striker: an offensive information and vulnerability scanner.
- theHarvester: E-mails, subdomains and names Harvester
- URLextractor: Information gathering & website reconnaissance
- denumerator.py: Enumerates list of subdomains
- other: other Information gathering,recon and Enumeration scripts I collected somewhere.
- ReconDog: Reconnaissance Swiss Army Knife
- RED_HAWK: All in one tool for Information Gathering, Vulnerability Scanning and Crawling
- Dracnmap: Info Gathering Framework
* Web Hacking 🌐:
- Spaghetti: Spaghetti - Web Application Security Scanner
- CMSmap: CMS scanner
- BruteXSS: BruteXSS is a tool to find XSS vulnerabilities in web application
- J-dorker: Website List grabber from Bing
- droopescan: scanner, identify, CMSs, Drupal, Silverstripe.
- Optiva: Web Application Scanner
- V3n0M: Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
- AtScan: Advanced dork Search & Mass Exploit Scanner
- WPSeku: Wordpress Security Scanner
- WPScan: A simple Wordpress scanner written in python
- XSStrike: Most advanced XSS scanner.
- SQLMap: automatic SQL injection and database takeover tool
- WhatWeb: the Next generation web scanner
- joomscan: Joomla Vulnerability Scanner Project
- Dzjecter: Server checking Tool
* Privilege Escalation ⚠️:
- Linux 🐧:linux_checksec.sh
linux_enum.sh
linux_gather_files.sh
linux_kernel_exploiter.pl
linux_privesc.py
linux_privesc.sh
linux_security_test
Linux_exploits folder - Windows
: windows-privesc-check.py
windows-privesc-check.exe - MySql:raptor_udf.c
raptor_udf2.c
* Reverse Engineering ⚡:
- Radare2: unix-like reverse engineering framework
- VirtusTotal: VirusTotal tools
- Miasm: Reverse engineering framework
- Mirror: reverses the bytes of a file
- DnSpy: .NET debugger and assembly
- AngrIo: A python framework for analyzing binaries (Suggested by @Hamz-a)
- DLLRunner: a smart DLL execution script for malware analysis in sandbox systems.
- Fuzzy Server: a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
- yara: a tool aimed at helping malware researchers toidentify and classify malware samples
- Spike: a protocol fuzzer creation kit + audits
- other: other scripts collected somewhere
* Exploitation ❗:
- Findsploit: Find exploits in local and online databases instantly
- Pompem: Exploit and Vulnerability Finder
- rfix: Python tool that helps RFI exploitation.
- InUrlBr: Advanced search in search engines
- Burpsuite: Burp Suite for security testing & scanning.
- linux-exploit-suggester2: Next-Generation Linux Kernel Exploit Suggester
- other: other scripts I collected somewhere.
* Shells 🐚:
- WebShells: BlackArch's Webshells Collection
- ShellSum: A defense tool - detect web shells in local directories
- Weevely: Weaponized web shell
- python-pty-shells: Python PTY backdoors
- crunch : a wordlist generator
- CeWL : a Custom Word List Generator
- patator : a multi-purpose brute-forcer, with a modular design and a flexible usage
* Encryption - Decryption 🛡️:- Codetective: a tool to determine the crypto/encoding algorithm used
- findmyhash: Python script to crack hashes using online services
* Social Engineering 🎭:
- scythe: an accounts enumerator
Contributing:
- Fork Lockdoor-Framework:
git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git
- Create your feature branch
- Commit your changes
- Push to the branch
- Create a new Pull Request
Features 📙:- Pentesting Tools Selection 📙:
Tools ?: Lockdoor doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value). what Tools ?: the tools contains Lockdoor are a collection from the best tools (Added value) on Kali Linux, ParrotSec and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value). Easy customization: Easily add/remove tools. (Added value) Installation: You can install the tool automatically using the install.sh
. Manually or on Docker [COMING SOON]- Resources and cheatsheets 📙 (Added value):
Resources: That's what makes Lockdoor Added value, Lockdoor Doesn't contain only tools! Pentesing and Security Assessment Findings Reports templates (Added value), Pentesting walkthrough examples and tempales (Added value) and more. Cheatsheets: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.
Check the Wiki Pages to know more about the tool 📙: Lockdoor-Framework's screenshots:![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkT7pLK6ZMTwlV9Fwq69CEBkvH4UQ2cZMUUvTLO7LMByjgnU7Xr-_jI8KL4IGmP5y-XLde6ceAuFpzFEwCxIBOipsdsxf-pXHXbJu0XoZGnwViSkaj9RvYUNG_e0w3JHqILRiHm_7A7Q0/s1600/Lockdoor-Framework+First+Step.png) |
First Step |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgVsi-bhC0YR1kSfEr4-_zcZYBnrfljrsFK6RV2Yf-m9h4QkEK-pop8hW01QYsDXXIa3NKEl25Opx9sAUh_gkTYbpFY_DS5Aca_k_nPjdZCcwGf0i2jC_jQnlkh-UaUaDLxEPURQLQgx_o/s1600/Lockdoor-Framework+Lockdoor+update.png) |
Lockdoor update |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCOk6u_XbHLWJRj4n2M3CVi-lRdUHdYeVByarOxULPQmJsK_-VzwOPMk4pvGGH-BMw-e7IhNhlVdCfVCIDp8l-DZ5-xQffxQo3sYN6G4c3a6tcyAwiKL64fPw-1NzUX9H-RpC-T-Rxxk8/s1600/Lockdoor-Framework+ROOT+Menu.png) |
ROOT Menu |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhowxc_zMMHMiu3xY5i60sJKrmIeJgPfzRwvJm_kZg9zFiVF6dz_AK5B6uokd2N2C1yoKAJaqy2AmOs_IXgvXHT1cBT716wi7_QyckDRttK5rzta1NsakwrZbdKq2YUXEPZ9BzObEToDJk/s1600/Lockdoor-Framework+Information+Gathering.png) |
Information Gathering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8SHHr2Q2X1bfxMV2Tq_yLR4EDVMRgwCc4aOSWZV0n-aNYZWB2l_avtowS9N9Yr_wDLlz6ZS8dgjVnndo7IlwrPgUci387mDZwon7dqrMj0YKgUvwTmvsU0MQB3gcek7kMU6DIOCwzIzA/s1600/Lockdoor-Framework+%25285%2529.png) |
Web Hacking |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxZls85VQqWdlFJxG8cN6-5jxdN3gdwqYy0lao5hOCDuc1ztJ02IAlXGobgHCT94NfuhhiiwxBTiT4QiNM0MUjhLfhKgAG6PzfDtAAbOeQ8XtgxlvCAkdE2J6hjoYTZePPE3MU9Xy8FCY/s1600/Lockdoor-Framework+%25286%2529.png) |
Exploitation |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlr42icHMPVmp_40ulmNjxCG76JElmS5AYKznAadT6cSBdRXz1W-vfzZe-pd6ZWjCqKWrBeUmQmo15N1xd-u_JVXynmjRUETRBK_Z98Q4UP0qe8hcFt3zAbeqILfn5D6Y2Cefq71ovxW8/s1600/Lockdoor-Framework+%25287%2529.png) |
Reverse Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGe8JlDB8hpd02yPqnH8BHOxS69p7V2qHUjN3tal2KGTiLp_tS1YV2DX0VDFD98Wbq3a0ar4TRI1WRBdvIDTgtvXgMwqPp6l5UNflOHDv7Wn4i5_9N5baqfJYkjoDhRVQyWmGfImEmuOE/s1600/Lockdoor-Framework+%25288%2529.png) |
Enc/Dec |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjs57hUcRITlAq7P5BaHRAspIB910vQidfAhfNtw9VE7RGE84blTR4gsNuZmOtcdhOOWNDaobv-J_HonSggALvVxayAcLYGRVjyp4vXzx8pIf2tk1Q9uZLiot4Cl9t8qoQBdS-SEq9ddY/s1600/Lockdoor-Framework+%25289%2529.png) |
Password Attacks |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhi9YoYaUR6zNYyRHheH4xYV1A6g33bIcEy0pum1Hl2y66x3g1azeobYaKfSsVo7tvP5yvz8NyM36osDmV6WeBbjBgof_orVnnHzcgz6OFWGlk-rULTEcTXwc_v5X_sbQkaVFC3eP1mI1E/s1600/Lockdoor-Framework+%252810%2529.png) |
Shells |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSlqzn7qHTWKRvdqVwxK-KXBx8SYIRrhyphenhyphenR91P7kPvr63YKsakzHewbMTuJ6jvObLYy-WQRX0r5Il33ggvUe-Ki0ySLudtzY_jowTTgqj-khq3CoeQW2p5SkyxJSppDm3W483JZWFKFuUA/s1600/Lockdoor-Framework+%252811%2529.png) |
PrivEsc |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhNPpos3Zf34Hfvn0MRZ-vqThlErihM1pKZZ4IijMdT_QKuXqqzFjmoFI74Y_OvsWU1LYpyokJQwSMsCKdtONK49vjwB8kMkKr499bvyYnYIQaCo3b_7vH2NwQH4UdtHH57J54MMdJLeLw/s1600/Lockdoor-Framework+%252812%2529.png) |
Social Engineering |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEio2ZW52YZWgPvcEgC1x5vxMpUaCUs0fBdb8P7Nq0nA8iOOjQORulRCuZlVxxOo5yXrHbjgZoQSgL9UsNj0Jt6ojSg0qsl2fzAFMnsWrjRm2x7JVXZ0uemKvU5Q0UiVuWp1cV27A_EP9nE/s1600/Lockdoor-Framework+%252813%2529.png) |
PSAFRT |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ5FFmCipiL9ZDM6npA450eyojWHK0TcWloHqz54wzW67H5Ze_y_s6yanfHDwHPw54wb2a4Ve7-1CyHZN0pUZa0l6gTkQj4qLEV82hqzefCh8Y5KHHuR_Hku5DtjQsyf7NM8mdL5tMI1E/s1600/Lockdoor-Framework+%252814%2529.png) |
Walkthroughs |
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhax82ucOuNDT62FFFmVwHILW0t1s3zViaWaRBRty_5I8Cv36GOExQTX0h70RPqFJPTHk473sRHvnLhaPb_eoCgtu_XWnY-S9-UeSYfKJAV5PIBGGwjkkZh485VaO-5FwpTjOy5boha7no/s1600/Lockdoor-Framework+%252815%2529.png) |
About |
Support the author: BTC Address: ![](https://chart.googleapis.com/chart?cht=qr&chl=1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk&chs=180x180&choe=UTF-8&chld=L|2)
Related posts
ليست هناك تعليقات:
إرسال تعليق