# Lockdoor-Framework **Repository Path**: domald/Lockdoor-Framework ## Basic Information - **Project Name**: Lockdoor-Framework - **Description**: Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources - **Primary Language**: Unknown - **License**: GPL-3.0 - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2019-12-31 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README .. raw:: html

.. image:: ./pictures/logos/logo205x250.gif .. raw:: html
Lockdoor Pentesting Framework

[~] Tested on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin) [~]

!NEWS!

[~] Version 2.0 IS OUT !! | 26/12/2019 06:57AM GMT+2 |

Lockdoor v2.0 is OUT!

Lockdoor is now available on Docker

Fixing Docker issue

Lockdoor is now optimized for quick execution

Lockdoor is now availabe on Redcould

Bugs Fixing for 7 tools

fixing (apt) package manager problems

.. |code-quality| image:: https://api.codacy.com/project/badge/Grade/a5ccede5f91247ab91b14eb97309b74b :target: https://www.codacy.com/manual/SofianeHamlaoui/Lockdoor-Framework?utm_source=github.com&utm_medium=referral&utm_content=SofianeHamlaoui/Lockdoor-Framework&utm_campaign=Badge_Grade .. |forthebadge made-with-python| image:: http://ForTheBadge.com/images/badges/made-with-python.svg :target: https://www.python.org/ .. |GitHub release| image:: https://badgen.net/github/release/SofianeHamlaoui/Lockdoor-Framework :target: https://GitHub.com/SofianeHamlaoui/Lockdoor-Framework/releases/ .. |Last commit| image:: https://badgen.net/github/last-commit/SofianeHamlaoui/Lockdoor-Framework :target: https://github.com/SofianeHamlaoui/Lockdoor-Framework/commits/master .. |License| image:: https://badgen.net/pypi/license/lockdoor .. |Pypi| image:: https://badgen.net/pypi/v/lockdoor :target: https://pypi.org/project/lockdoor/ .. |Twitter| image:: https://badgen.net/twitter/follow/S0fianeHamlaoui :target: https://twitter.com/S0fianeHamlaoui .. |built-with-love| image:: http://ForTheBadge.com/images/badges/built-with-love.svg :target: https://GitHub.com/SofianeHamlaoui/ .. |Tested-on| image:: https://img.shields.io/badge/Tested%20on%20%20-Linux%20%26%20Windows-blue :target: https://GitHub.com/SofianeHamlaoui/Lockdoor-Framework .. |Docker| image:: https://img.shields.io/docker/pulls/sofianehamlaoui/lockdoor :target: https://hub.docker.com/r/sofianehamlaoui/lockdoor .. contents:: :local: :depth: 3 ============= Badges 📌 : ============= |forthebadge made-with-python| |built-with-love| |code-quality| |Pypi| |GitHub release| |Docker| |Tested-on| |Last commit| |License| |Twitter| ============= Support me 💰 : ============= - On Paypal : https://www.paypal.com/paypalme2/SofianeHamlaoui - BTC Addresse : 1NR2oqsuevvWJwzCyhBXmqEA5eYAaSoJFk ============= Versions :closed_lock_with_key: : ============= 12/2019 : 2.0 -------------------------- - Information Gathring Tools (21) - Web Hacking Tools(15) - Reverse Engineering Tools (15) - Exploitation Tools (6) - Pentesting & Security Assessment Findings Report Templates (6) - Password Attack Tools (4) - Shell Tools + Blackarch's Webshells Collection (4) - Walk Throughs & Pentest Processing Helpers (3) - Encryption/Decryption Tools (2) - Social Engineering tools (1) - All you need as Privilege Escalation scripts and exploits - Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin) .. image:: https://img.youtube.com/vi/_agvb29FQrs/maxresdefault.jpg :target: https://www.youtube.com/watch?v=_agvb29FQrs 09/2019 : 0.6 -------------------------- - Information Gathring tools (13) - Web Hacking Tools (9) - Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin) - Some bugs That I'm fixing with time so don't worry about that. .. image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/kali.gif ============= Blogs & Articles 📰 : ============= * Reddit : https://www.reddit.com/r/cybersecurity/comments/d4hthh/lockdoor_a_penetration_testing_framework_with/ * Medium.com : https://medium.com/@SofianeHamlaoui/lockdoor-framework-a-penetration-testing-framework-with-cyber-security-resources-sofiane-22fbb7942378 * Xploit Lab : https://xploitlab.com/lockdoor-framework-penetration-testing-framework-with-cyber-security-resources/ * Station X : https://www.stationx.net/threat-intelligence-17th-september/ * Kelvin Security : https://blog.kelvinsecurity.com/2019/09/12/lookdoor-framework-a-penetration-testing-framework-with-cyber-security-resources/ * All About hacking : https://www.allabouthack.com/2019/09/lookdoor-framework-penetration-testing.html * Wired Intel : http://wiredintel.bravehost.com/wired/2019/09/15/%F0%9F%94%90-lockdoor-a-penetration-testing-framework-with-cyber-security-resources * Social networks : * LinkedIn : * By Nermin S. : https://www.linkedin.com/posts/nsmajic_sofianehamlaouilockdoor-framework-activity-6578952540564529152-B-0P * Twitter : * By Me :D : https://twitter.com/S0fianeHamlaoui/status/1173079963567820801 * National Cyber Security Services : https://twitter.com/NationalCyberS1/status/1173917454151475202 * Xploit Lab : https://twitter.com/xploit_lab/status/1173990273644261376 * More : https://twitter.com/search?q=Lockdoor%20Framework * More : https://twitter.com/search?q=Lookdoor%20Framework * Facebook : * By ME :D : https://www.facebook.com/S0fianeHamlaoui/posts/678704759315090 * National Cyber Security Services : https://www.facebook.com/ncybersec/posts/1273735519463836 * Xploit Lab : https://www.facebook.com/XploitLab/posts/2098443780463126 * Root Developers : https://www.facebook.com/root.deve/posts/1181412315364265 * More : https://www.facebook.com/search/top/?q=Lockdoor%20Framework * Youtube : * My youtube video : https://www.youtube.com/watch?v=_agvb29FQrs * The Shadow Brokers video : https://www.youtube.com/watch?v=6njKRrKQtow ============= Overview 📙 : ============= *LockDoor* is a Framework aimed at **helping penetration testers, bug bounty hunters And cyber security engineers**. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily. ============= Features 📙 : ============= Added value : (what makes it different from other frameworks). Pentesting Tools Selection 📙 : -------------------------- - **Tools ?**: **Lockdoor** doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value). - **what Tools ?**: the tools contains **Lockdoor** are a collection from the best tools (Added value) on Kali,Parrot Os and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value). - **Easy customization**: Easily add/remove tools. (Added value) - **Installation**: You can install the tool automatically using the installer.sh , Manually or on Docker [COMING SOON] Resources and cheatsheets 📙 : (Added value) -------------------------- - **Resources**: That's what makes **Lockdoor** Added value, Lockdoor Doesn't contain only tools ! Pentesing and Security Assessment Findings Reports templates (Added value) , Pentesting walkthrough examples and tempales (Added value) and more. - **Cheatsheets**: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role ! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques. ============= Screenshots đŸ’ģ : ============= .. |1st| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/1.png .. |lockup| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/2.png .. |root| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/3.png .. |infogath| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/4.png .. |web| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/5.png .. |expl| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/6.png .. |Revers| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/7.png .. |Enc| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/8.png .. |passwd| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/9.png .. |shells| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/10.png .. |Privesc| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/11.png .. |SE| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/12.png .. |psafrt| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/13.png .. |help| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/14.png .. |about| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/screenshots/15.png +------------+-----------------+-----------+-----------------------+-------------+--------------+---------------------+---------+------------------+----------+-----------+--------------------+----------+--------------+---------+ | First Step | Lockdoor update | ROOT Menu | Information Gathering | Web Hacking | Exploitation | Reverse Engineering | Enc/Dec | Password Attacks | Shells | PrivEsc | Social Engineering | PSAFRT | Walkthroughs | About | +============+=================+===========+=======================+=============+==============+=====================+=========+==================+==========+===========+====================+==========+==============+=========+ | |1st| | |lockup| | |root| | |infogath| | |web| | |expl| | |Revers| | |Enc| | |passwd| | |shells| | |Privesc| | |SE| | |psafrt| | |help| | |about| | +------------+-----------------+-----------+-----------------------+-------------+--------------+---------------------+---------+------------------+----------+-----------+--------------------+----------+--------------+---------+ ============ Demos đŸ’ģ : ============ .. |Kali| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/kali.gif .. |Ubuntu| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/ubuntu.gif .. |Arch Linux| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/archlinux.gif .. |Fedora| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/fedora.gif .. |Opensuse| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/opensuse.gif .. |Windows1| image:: https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/windows.gif +------------+----------+--------------+----------+------------+-------------------+ | Kali Linux | Ubuntu | Arch Linux | Fedora | Opensuse | Windows (Cygwin) | +============+==========+==============+==========+============+===================+ | |Kali| | |Ubuntu| | |Arch Linux| | |Fedora| | |Opensuse| | |Windows1| | +------------+----------+--------------+----------+------------+-------------------+ .. |Windows| image:: http://icons.iconarchive.com/icons/dakirby309/windows-8-metro/16/Folders-OS-Windows-8-Metro-icon.png .. |Security| image:: http://icons.iconarchive.com/icons/aha-soft/free-large-boss/24/Security-Guard-icon.png ============= Installation đŸ› ī¸ : ============= **The recommended way to use Lockdoor is by pulling the Docker Image so you will not have to worry about dependencies issues.** **A Docker image is available on Docker Hub and automatically re-built at each update: https://hub.docker.com/r/sofianehamlaoui/lockdoor. It is initially based on official Kali Linux Docker image (kalilinux/kali).** - Docker Installation - Installing requirments .. code-block:: console sudo apt install docker < Debian-based distributions sudo dnf install docker < RPM-based distributions sudo pacman -S docker < Arch-based distributions sudo zypper install docker < OS-based distributions sudo yum install docker < RH-based distributions - Using lockdoor's docker version 1. *Pull lockdoor Docker Image:* .. code-block:: console sudo docker pull sofianehamlaoui/lockdoor 2. *Run fresh Docker container:* .. code-block:: console sudo docker run -it --name lockdoor-container -w /home/Lockdoor-Framework --net=host sofianehamlaoui/lockdoor 3. *Run Lockdoor Framework* .. code-block:: console lockdoor 4. *To re-run a stopped container:* .. code-block:: console sudo docker start -i sofianehamlaoui/lockdoor 5. *To open multiple shells inside the container:* .. code-block:: console sudo docker exec -it lockdoor-container bash - Automatically .. code-block:: console git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git && cd Lockdoor-Framework chmod +x ./install.sh ./install.sh - Manually - Installing requirments .. code-block:: console python python-pip python-requests python2 python2-pip gcc ruby php git wget bc curl netcat subversion jre-openjdk make automake gcc linux-headers gzip - Installing Go .. code-block:: console wget https://dl.google.com/go/go1.13.linux-amd64.tar.gz tar -xvf go1.13.linux-amd64.tar.gz mv go /usr/local export GOROOT=/usr/local/go export PATH=$GOPATH/bin:$GOROOT/bin:$PATH rm go1.13.linux-amd64.tar.gz - Installing Lockdoor .. code-block:: console # Clonnig git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git && cd Lockdoor-Framework # Create the config file # INSTALLDIR = where you want to install Lockdoor (Ex : /opt/sofiane/pentest) echo "Location:"$installdir > $HOME"/.config/lockdoor/lockdoor.conf" # Moving the resources folder mv ToolsResources/* INSTALLDIR # Installing Lockdoor from PyPi pip3 install lockdoor ============= Lockdoor Tools contents đŸ› ī¸ : ============= **Information Gathering** :mag_right: : -------------------------- - Tools: - dirsearch : A Web path scanner - brut3k1t : security-oriented bruteforce framework - gobuster : DNS and VHost busting tool written in Go - Enyx : an SNMP IPv6 Enumeration Tool - Goohak : Launchs Google Hacking Queries Against A Target Domain - Nasnum : The NAS Enumerator - Sublist3r : Fast subdomains enumeration tool for penetration testers - wafw00f : identify and fingerprint Web Application Firewall - Photon : ncredibly fast crawler designed for OSINT. - Raccoon : offensive security tool for reconnaissance and vulnerability scanning - DnsRecon : DNS Enumeration Script - Nmap : The famous security Scanner, Port Scanner, & Network Exploration Tool - sherlock : Find usernames across social networks - snmpwn : An SNMPv3 User Enumerator and Attack tool - Striker : an offensive information and vulnerability scanner. - theHarvester : E-mails, subdomains and names Harvester - URLextractor : Information gathering & website reconnaissance - denumerator.py : Enumerates list of subdomains - other : other Information gathering,recon and Enumeration scripts I collected somewhere. - Frameworks: - ReconDog : Reconnaissance Swiss Army Knife - RED_HAWK : All in one tool for Information Gathering, Vulnerability Scanning and Crawling - Dracnmap : Info Gathering Framework **Web Hacking** 🌐 : -------------------------- - Tools: - Spaghetti : Spaghetti - Web Application Security Scanner - CMSmap : CMS scanner - BruteXSS : BruteXSS is a tool to find XSS vulnerabilities in web application - J-dorker : Website List grabber from Bing - droopescan : scanner , identify , CMSs , Drupal , Silverstripe. - Optiva : Web Application Scanne - V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns - AtScan : Advanced dork Search & Mass Exploit Scanner - WPSeku : Wordpress Security Scanner - Wpscan : A simple Wordpress scanner written in python - XSStrike : Most advanced XSS scanner. - Sqlmap : automatic SQL injection and database takeover tool - WhatWeb : the Next generation web scanner - joomscan : Joomla Vulnerability Scanner Project - Frameworks: - Dzjecter : Server checking Tool **Privilege Escalation** âš ī¸ : -------------------------- - Tools: - Linux 🐧 : - Scripts : - linux_checksec.sh - linux_enum.sh - linux_gather_files.sh - linux_kernel_exploiter.pl - linux_privesc.py - linux_privesc.sh - linux_security_test - Linux_exploits folder - Windows |Windows| : - windows-privesc-check.py - windows-privesc-check.exe - MySql : - raptor_udf.c - raptor_udf2.c **Reverse Engineering** ⚡: -------------------------- - Radare2 : unix-like reverse engineering framework - VirtusTotal : VirusTotal tools - Miasm : Reverse engineering framework - Mirror : reverses the bytes of a file - DnSpy : .NET debugger and assembly - AngrIo : A python framework for analyzing binaries ( Suggested by @Hamz-a ) - DLLRunner : a smart DLL execution script for malware analysis in sandbox systems. - Fuzzy Server : a Program That Uses Pre-Made Spike Scripts to Attack VulnServer. - yara : a tool aimed at helping malware researchers toidentify and classify malware samples - Spike : a protocol fuzzer creation kit + audits - other : other scripts collected somewhere **Exploitation** ❗: -------------------------- - Findsploit : Find exploits in local and online databases instantly - Pompem : Exploit and Vulnerability Finder - rfix : Python tool that helps RFI exploitation. - InUrlBr : Advanced search in search engines - Burpsuite : Burp Suite for security testing & scanning. - linux-exploit-suggester2 : Next-Generation Linux Kernel Exploit Suggester - other : other scripts I collected somewhere. **Shells** 🐚: -------------------------- - WebShells : BlackArch's Webshells Collection - ShellSum : A defense tool - detect web shells in local directories - Weevely : Weaponized web shell - python-pty-shells : Python PTY backdoors **Password Attacks** âœŗī¸: -------------------------- - crunch : a wordlist generator - CeWL : a Custom Word List Generator - patator : a multi-purpose brute-forcer, with a modular design and a flexible usage **Encryption - Decryption** đŸ›Ąī¸: -------------------------- - Codetective : a tool to determine the crypto/encoding algorithm used - findmyhash : Python script to crack hashes using online services **Social Engineering** 🎭: -------------------------- - scythe : an accounts enumerator ============= Lockdoor Resources contents 📚 : ============= **Information Gathering** :mag_right: : -------------------------- - `Cheatsheet_SMBEnumeration `_ - `configuration_management `_ - `dns_enumeration `_ - `file_enumeration `_ - `http_enumeration `_ - `information_gathering_owasp_guide `_ - `miniserv_webmin_enumeration `_ - `ms_sql_server_enumeration `_ - `nfs_enumeration `_ - `osint_recon_ng `_ - `passive_information_gathering `_ - `pop3_enumeration `_ - `ports_emumeration `_ - `rpc_enumeration `_ - `scanning `_ - `smb_enumeration `_ - `smtp_enumeration `_ - `snmb_enumeration `_ - `vulnerability_scanning `_ **Crypto** đŸ›Ąī¸: -------------------------- - `Crypto101.pdf `_ **Exploitation** ❗: -------------------------- - `computer_network_exploits `_ - `file_inclusion_vulnerabilities `_ - `File_Transfers `_ - `nc_transfers `_ - `networking_pivoting_and_tunneling `_ - `network_pivoting_techniques `_ - `pivoting `_ - `pivoting_ `_ - `Public Exploits `_ - `reverse_shell_with_msfvenom `_ **Networking** 🖧 : -------------------------- - `bpf_syntax `_ - `Cheatsheet_Networking `_ - `Cheatsheet_Oracle `_ - `networking_concept `_ - `nmap_quick_reference_guide `_ - `tcpdump `_ **Password Attacks** âœŗī¸: -------------------------- - `password_attacks `_ - `Some-Links-To-Wordlists `_ **Post Exploitation** ❗❗: -------------------------- - `Cheatsheet_AVBypass `_ - `Cheatsheet_BuildReviews `_ - `code-execution-reverse-shell-commands `_ - `important-linux-serv-files `_ **Privilege Escalation** âš ī¸: -------------------------- - `Cheatsheet_LinuxPrivilegeEsc `_ - `linux_enumeration `_ - `windows_enumeration `_ - `windows_priv_escalation `_ - `windows_priv_escalation_practical `_ **Pentesting & Security Assessment Findings Report Templates** 📝 : -------------------------- - `Demo Company - Security Assessment Findings Report.docx `_ - `linux-template.md `_ - `PWKv1-REPORT.doc `_ - `pwkv1_report.doc `_ - `template-penetration-testing-report-v03.pdf `_ - `windows-template.md `_ - `OSCP-OS-XXXXX-Lab-Report_Template3.2.docx `_ - `OSCP-OS-XXXXX-Exam-Report_Template3.2.docx `_ - `CherryTree_template.ctb `_ **Reverse Engineering** ⚡ : -------------------------- - `Buffer_Overflow_Exploit `_ - `buffer_overflows `_ - `gdb_cheat_sheet `_ - `r2_cheatsheet `_ - `win32_buffer_overflow_exploitation `_ - `64_ia_32_jmp_instructions `_ - `course_notes `_ - `debuging `_ - `IntelCodeTable_x86 `_ - `Radare2 cheat sheet `_ - `x86_assembly_x86_architecture `_ - `x86_opcode_structure_and_instruction_overview `_ **Social Engineering** 🎭: -------------------------- - `social_engineering `_ **Walk Throughs** đŸšļ : -------------------------- - `Cheatsheet_PenTesting.txt `_ - `OWASP Testing Guide v4 `_ - `OWASPv4_Checklist.xlsx `_ **Web Hacking** 🌐 : -------------------------- - `auxiliary_info.md `_ - `Cheatsheet_ApacheSSL `_ - `Cheatsheet_AttackingMSSQL `_ - `Cheatsheet_DomainAdminExploitation `_ - `Cheatsheet_SQLInjection `_ - `Cheatsheet_VulnVerify.txt `_ - `code-execution-reverse-shell-commands `_ - `file_upload.md `_ - `html5_cheat_sheet `_ - `jquery_cheat_sheet_1.3.2 `_ - `sqli `_ - `sqli_cheatsheet `_ - `sqli-quries `_ - `sqli-tips `_ - `web_app_security `_ - `web_app_vulns_Arabic `_ - `Xss_1 `_ - `Xss_2 `_ - `xss_actionscript `_ - `xxe `_ **Other** 📚 : -------------------------- - Security |Security| - `Best Version of BriskSec Security Cheatsheets : `_ - `Images (I'll let you discover that) `_ - `Google Hacking DataBase `_ - `Google Fu `_ **Contributing** â„šī¸ : ----------------------- 1. Fork it ( https://github.com/SofianeHamlaoui/Lockdoor-Framework/fork ) 2. Create your feature branch 3. Commit your changes 4. Push to the branch 5. Create a new Pull Request