π Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
- Fixing some CI
- making a more stable version
- new docker iaage build
- adding packages for each supported distros
Config file checking.
Updating the tools.
Showing the current version of Lockdoor by -v arg.
checking the version and asking for possible update.
Making it easier to customize.
No added tools for the moment.
Fixing the docker misconfiguration, the docker version now works perfectly.
* Reddit : https://www.reddit.com/r/cybersecurity/comments/d4hthh/lockdoor_a_penetration_testing_framework_with/
* Medium.com : https://medium.com/@SofianeHamlaoui/lockdoor-framework-a-penetration-testing-framework-with-cyber-security-resources-sofiane-22fbb7942378
* Xploit Lab : https://xploitlab.com/lockdoor-framework-penetration-testing-framework-with-cyber-security-resources/
* Station X : https://www.stationx.net/threat-intelligence-17th-september/
* Kelvin Security : https://blog.kelvinsecurity.com/2019/09/12/lookdoor-framework-a-penetration-testing-framework-with-cyber-security-resources/
* All About hacking : https://www.allabouthack.com/2019/09/lookdoor-framework-penetration-testing.html
* Wired Intel : http://wiredintel.bravehost.com/wired/2019/09/15/%F0%9F%94%90-lockdoor-a-penetration-testing-framework-with-cyber-security-resources
* Social networks :
* LinkedIn :
* By Nermin S. : https://www.linkedin.com/posts/nsmajic_sofianehamlaouilockdoor-framework-activity-6578952540564529152-B-0P
* Twitter :
* By Me :D : https://twitter.com/S0fianeHamlaoui/status/1173079963567820801
* National Cyber Security Services : https://twitter.com/NationalCyberS1/status/1173917454151475202
* Xploit Lab : https://twitter.com/xploit_lab/status/1173990273644261376
* More : https://twitter.com/search?q=Lockdoor%20Framework
* More : https://twitter.com/search?q=Lookdoor%20Framework
* Facebook :
* By ME :D : https://www.facebook.com/S0fianeHamlaoui/posts/678704759315090
* National Cyber Security Services : https://www.facebook.com/ncybersec/posts/1273735519463836
* Xploit Lab : https://www.facebook.com/XploitLab/posts/2098443780463126
* Root Developers : https://www.facebook.com/root.deve/posts/1181412315364265
* More : https://www.facebook.com/search/top/?q=Lockdoor%20Framework
* Youtube :
* My youtube video : https://www.youtube.com/watch?v=_agvb29FQrs
* The Shadow Brokers video : https://www.youtube.com/watch?v=6njKRrKQtow
LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers.
This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters.
As pentesters, most of us has his personal β /pentest/ β directory so this Framework is helping you to build a perfect one.
With all of that ! It automates the Pentesting process to help you do the job more quickly and
easily.
Tools: Lockdoor doesnβt contain all pentesting tools , letβs be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite and the most used tools by Pentesters.
what Tools: the tools contains Lockdoor are a collection from the best tools on Kali,Parrot Os and BlackArch. Also some private tools from some other hacking teams like InurlBr, iran-cyber. Without forgetting some cool and amazing tools I found on Github made by some perfect human beings.
Easy customization: Easily add/remove tools.
Installation: You can install the tool automatically using the installer.sh , Manually or by running the Docker Image.
Resources: Thatβs what makes Lockdoor, Lockdoor Doesnβt contain only tools ! Pentesing and Security Assessment Findings Reports templates, Pentesting walkthrough examples and templates and more.
Cheatsheets: Everyone can forget something on processing or a tool use, or even some tricks. Here comes the Cheatsheets role ! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.
The recommended way to use Lockdoor is by pulling the Docker Image so you will not have
to worry about dependencies issues.
- A Docker image is available on Docker Hub and automatically re-built at each update:
https://hub.docker.com/r/sofianehamlaoui/lockdoor. It is initially based on the official debian docker image (debian).
Docker Installation
sudo apt install docker < Debian-based distributions
sudo dnf install docker < RPM-based distributions
sudo pacman -S docker < Arch-based distributions
sudo zypper install docker < OS-based distributions
sudo yum install docker < RH-based distributions
1. *Pull lockdoor Docker Image:*
sudo docker pull sofianehamlaoui/lockdoor
2. *Run fresh Docker container:*
sudo docker run -it --name lockdoor-container -w /Lockdoor-Framework --net=host sofianehamlaoui/lockdoor
3. *Run Lockdoor Framework*
sudo lockdoor
4. *To re-run a stopped container:*
sudo docker start -i sofianehamlaoui/lockdoor
5. *To open multiple shells inside the container:*
sudo docker exec -it lockdoor-container bash
Using LockAller - Lockdoor Installer
Installing it using the script may take some time depends on the packages already installed on your system.
here you can find a fresh installation on a new debian distro with no pre-installed packages : [11min]
git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git && cd Lockdoor-Framework && chmod +x ./install.sh && ./install.sh
- Cheatsheet_SMBEnumeration
- configuration_management
- dns_enumeration
- file_enumeration
- http_enumeration
- information_gathering_owasp_guide
- miniserv_webmin_enumeration
- ms_sql_server_enumeration
- nfs_enumeration
- osint_recon_ng
- passive_information_gathering
- pop3_enumeration
- ports_emumeration
- rpc_enumeration
- scanning
- smb_enumeration
- smtp_enumeration
- snmb_enumeration
- vulnerability_scanning
- Demo Company - Security Assessment Findings Report.docx
- linux-template.md
- PWKv1-REPORT.doc
- pwkv1_report.doc
- template-penetration-testing-report-v03.pdf
- windows-template.md
- OSCP-OS-XXXXX-Lab-Report_Template3.2.docx
- OSCP-OS-XXXXX-Exam-Report_Template3.2.docx
- CherryTree_template.ctb
- eventory-sample-pentest-report.pdf
- auxiliary_info.md
- Cheatsheet_ApacheSSL
- Cheatsheet_AttackingMSSQL
- Cheatsheet_DomainAdminExploitation
- Cheatsheet_SQLInjection
- Cheatsheet_VulnVerify.txt
- code-execution-reverse-shell-commands
- file_upload.md
- html5_cheat_sheet
- jquery_cheat_sheet_1.3.2
- sqli
- sqli_cheatsheet
- sqli-quries
- sqli-tips
- web_app_security
- web_app_vulns_Arabic
- Xss_1
- Xss_2
- xss_actionscript
- xxe