All Projects โ†’ SofianeHamlaoui โ†’ Lockdoor Framework

SofianeHamlaoui / Lockdoor Framework

Licence: gpl-3.0
๐Ÿ” Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources

Programming Languages

python
103659 projects - #7 most used programming language

Projects that are alternatives of or similar to Lockdoor Framework

Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: โœญ 4,897 (+623.34%)
Mutual labels:  cybersecurity, hacking-tool, pentest-tool, pentest-scripts, penetration-testing, pentesting
Oscp Pentest Methodologies
ๅค‡่€ƒ OSCP ็š„ๅ„็งๅนฒ่ดง่ต„ๆ–™/ๆธ—้€ๆต‹่ฏ•ๅนฒ่ดง่ต„ๆ–™
Stars: โœญ 166 (-75.48%)
Mutual labels:  pentesting, penetration-testing, cybersecurity, pentest-tool, redteam
Dirsearch
Web path scanner
Stars: โœญ 7,246 (+970.31%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: โœญ 764 (+12.85%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: โœญ 474 (-29.99%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool, pentest-tool
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: โœญ 382 (-43.57%)
Mutual labels:  hacking, pentesting, penetration-testing, cybersecurity, redteam
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: โœญ 636 (-6.06%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool
Webmap
A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generation during a Web Penetration Testing
Stars: โœญ 188 (-72.23%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool
Habu
Hacking Toolkit
Stars: โœญ 635 (-6.2%)
Mutual labels:  hacking, pentesting, penetration-testing, pentest-tool
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: โœญ 2,312 (+241.51%)
Mutual labels:  hacking, pentesting, hacking-tool, pentest-tool
Cloudbrute
Awesome cloud enumerator
Stars: โœญ 268 (-60.41%)
Mutual labels:  hacking, pentesting, pentest-tool, redteam
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: โœญ 3,391 (+400.89%)
Mutual labels:  hacking, penetration-testing, hacking-tool, pentest-tool
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: โœญ 182 (-73.12%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool
Cameradar
Cameradar hacks its way into RTSP videosurveillance cameras
Stars: โœญ 2,775 (+309.9%)
Mutual labels:  hacking, pentesting, penetration-testing, hacking-tool
Hack Tools
The all-in-one Red Team extension for Web Pentester ๐Ÿ› 
Stars: โœญ 2,750 (+306.2%)
Mutual labels:  hacking, pentesting, cybersecurity, pentest-tool
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: โœญ 517 (-23.63%)
Mutual labels:  pentesting, hacking-tool, pentest-tool, pentest-scripts
Hackerenv
Stars: โœญ 309 (-54.36%)
Mutual labels:  pentesting, hacking-tool, pentest-tool, pentest-scripts
Kaboom
A tool to automate penetration tests
Stars: โœญ 322 (-52.44%)
Mutual labels:  pentesting, penetration-testing, pentest-tool, pentest-scripts
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: โœญ 116 (-82.87%)
Mutual labels:  hacking, pentesting, hacking-tool, pentest-tool
Ratel
RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: โœญ 121 (-82.13%)
Mutual labels:  hacking, pentesting, cybersecurity, pentest-tool

.. raw:: html

.. image:: https://sofianehamlaoui.github.io/junk/lockdoor/logos/logo205x250.gif

.. raw:: html


Lockdoor Pentesting Framework

[~] Works perfectly on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows [~]

!NEWS!

Version v2.2.4 IS OUT !!
Check the changelog here Changelog of v2.2.4

.. |code-quality| image:: https://api.codacy.com/project/badge/Grade/a5ccede5f91247ab91b14eb97309b74b :target: https://www.codacy.com/manual/SofianeHamlaoui/Lockdoor-Framework?utm_source=github.com&utm_medium=referral&utm_content=SofianeHamlaoui/Lockdoor-Framework&utm_campaign=Badge_Grade

.. |forthebadge made-with-python| image:: http://ForTheBadge.com/images/badges/made-with-python.svg :target: https://www.python.org/

.. |GitHub release| image:: https://badgen.net/github/release/SofianeHamlaoui/Lockdoor-Framework :target: https://GitHub.com/SofianeHamlaoui/Lockdoor-Framework/releases/

.. |Last commit| image:: https://badgen.net/github/last-commit/SofianeHamlaoui/Lockdoor-Framework :target: https://github.com/SofianeHamlaoui/Lockdoor-Framework/commits/master .. |License| image:: https://badgen.net/pypi/license/lockdoor .. |Pypi| image:: https://badgen.net/pypi/v/lockdoor :target: https://pypi.org/project/lockdoor/ .. |Twitter| image:: https://badgen.net/twitter/follow/S0fianeHamlaoui :target: https://twitter.com/S0fianeHamlaoui .. |built-with-love| image:: http://ForTheBadge.com/images/badges/built-with-love.svg :target: https://GitHub.com/SofianeHamlaoui/ .. |Tested-on| image:: https://img.shields.io/badge/Tested%20on%20%20-Linux%20%26%20Windows-blue :target: https://GitHub.com/SofianeHamlaoui/Lockdoor-Framework .. contents:: :local: :depth: 3

============= Badges ๐Ÿ“Œ :

|forthebadge made-with-python| |built-with-love|

|code-quality| |Pypi| |GitHub release| |Tested-on| |Last commit| |License| |Twitter|

============= Support me ๐Ÿ’ฐ :

============= Versions ๐Ÿ” :

08/2020 : 2.2.4

  • Config file checking.

  • Updating the tools.

  • Showing the current version of Lockdoor by -v arg.

  • checking the version and asking for possible update.

  • Making it easier to customize.

  • No added tools for the moment.

  • Fixing the docker misconfiguration, the docker version now works perfectly.

    • Information Gathring Tools (21)
    • Web Hacking Tools(15)
    • Reverse Engineering Tools (15)
    • Exploitation Tools (6)
    • Pentesting & Security Assessment Findings Report Templates (6)
    • Password Attack Tools (4)
    • Shell Tools + Blackarch's Webshells Collection (4)
    • Walk Throughs & Pentest Processing Helpers (3)
    • Encryption/Decryption Tools (2)
    • Social Engineering tools (1)
    • All you need as Privilege Escalation scripts and exploits

03/2020 : 2.2.3

  • Information Gathring Tools (21)
  • Web Hacking Tools(15)
  • Reverse Engineering Tools (15)
  • Exploitation Tools (6)
  • Pentesting & Security Assessment Findings Report Templates (6)
  • Password Attack Tools (4)
  • Shell Tools + Blackarch's Webshells Collection (4)
  • Walk Throughs & Pentest Processing Helpers (3)
  • Encryption/Decryption Tools (2)
  • Social Engineering tools (1)
  • All you need as Privilege Escalation scripts and exploits
  • Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin)

.. image:: https://img.youtube.com/vi/_agvb29FQrs/maxresdefault.jpg :target: https://www.youtube.com/watch?v=_agvb29FQrs

============= Blogs & Articles ๐Ÿ“ฐ :

  * Reddit : https://www.reddit.com/r/cybersecurity/comments/d4hthh/lockdoor_a_penetration_testing_framework_with/
  * Medium.com : https://medium.com/@SofianeHamlaoui/lockdoor-framework-a-penetration-testing-framework-with-cyber-security-resources-sofiane-22fbb7942378
  * Xploit Lab : https://xploitlab.com/lockdoor-framework-penetration-testing-framework-with-cyber-security-resources/
  * Station X : https://www.stationx.net/threat-intelligence-17th-september/
  * Kelvin Security : https://blog.kelvinsecurity.com/2019/09/12/lookdoor-framework-a-penetration-testing-framework-with-cyber-security-resources/
  * All About hacking : https://www.allabouthack.com/2019/09/lookdoor-framework-penetration-testing.html
  * Wired Intel : http://wiredintel.bravehost.com/wired/2019/09/15/%F0%9F%94%90-lockdoor-a-penetration-testing-framework-with-cyber-security-resources

        * Social networks :
              * LinkedIn :
                    * By Nermin S. : https://www.linkedin.com/posts/nsmajic_sofianehamlaouilockdoor-framework-activity-6578952540564529152-B-0P
              * Twitter :
                    * By Me :D : https://twitter.com/S0fianeHamlaoui/status/1173079963567820801
                    * National Cyber Security Services : https://twitter.com/NationalCyberS1/status/1173917454151475202
                    * Xploit Lab : https://twitter.com/xploit_lab/status/1173990273644261376
                    * More : https://twitter.com/search?q=Lockdoor%20Framework
                    * More : https://twitter.com/search?q=Lookdoor%20Framework
              * Facebook :
                    * By ME :D : https://www.facebook.com/S0fianeHamlaoui/posts/678704759315090
                    * National Cyber Security Services : https://www.facebook.com/ncybersec/posts/1273735519463836
                    * Xploit Lab : https://www.facebook.com/XploitLab/posts/2098443780463126
                    * Root Developers : https://www.facebook.com/root.deve/posts/1181412315364265
                    * More : https://www.facebook.com/search/top/?q=Lockdoor%20Framework
        * Youtube :
              * My youtube video : https://www.youtube.com/watch?v=_agvb29FQrs
              * The Shadow Brokers video : https://www.youtube.com/watch?v=6njKRrKQtow

============= Overview ๐Ÿ“™ :

LockDoor is a Framework aimed at helping penetration testers, bug bounty hunters And cyber security engineers. This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters. As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one. With all of that ! It automates the Pentesting process to help you do the job more quickly and easily.

============= Features ๐Ÿ“™ :

Added value : (what makes it different from other frameworks).

Pentesting Tools Selection ๐Ÿ“™ :

  • Tools ?: Lockdoor doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value).

  • what Tools ?: the tools contains Lockdoor are a collection from the best tools (Added value) on Kali,Parrot Os and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value).

  • Easy customization: Easily add/remove tools. (Added value)

  • Installation: You can install the tool automatically using the installer.sh , Manually or on Docker [COMING SOON]

Resources and cheatsheets ๐Ÿ“™ : (Added value)

  • Resources: That's what makes Lockdoor Added value, Lockdoor Doesn't contain only tools ! Pentesing and Security Assessment Findings Reports templates (Added value) , Pentesting walkthrough examples and tempales (Added value) and more.

  • Cheatsheets: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role ! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.

============= Screenshots ๐Ÿ’ป :

.. |1st| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/installation-dir-1.png

.. |lockup| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/verbosemode.png

.. |root| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/RootMenu.png

.. |infogath| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/infogath.png

.. |web| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/webhack.png

.. |expl| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/exploitation.png

.. |Revers| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/reverseeng.png

.. |Enc| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/encdec.png

.. |passwd| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/passattack.png

.. |shells| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/shells.png

.. |Privesc| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/privesc.png

.. |SE| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/socialengin.png

.. |psafrt| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/reporttemplates.png

.. |help| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/walkth.png

.. |update| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/update.png

.. |about| image:: https://sofianehamlaoui.github.io/junk/lockdoor/screenshots/about.png

+------------+--------------+-----------+-----------------------+-------------+--------------+---------------------+---------+------------------+----------+-----------+--------------------+----------+--------------+-----------------+---------+ | First Step | Verbose mode | R00T menu | Information Gathering | Web Hacking | Exploitation | Reverse Engineering | Enc/Dec | Password Attacks | Shells | PrivEsc | Social Engineering | PSAFRT | Walkthroughs | Update Lockdoor | About | +------------+--------------+-----------+-----------------------+-------------+--------------+---------------------+---------+------------------+----------+-----------+--------------------+----------+--------------+-----------------+---------+ | |1st| | |lockup| | |root| | |infogath| | |web| | |expl| | |Revers| | |Enc| | |passwd| | |shells| | |Privesc| | |SE| | |psafrt| | |help| | |update| | |about| | +------------+--------------+-----------+-----------------------+-------------+--------------+---------------------+---------+------------------+----------+-----------+--------------------+----------+--------------+-----------------+---------+

============ Demos ๐Ÿ’ป :

.. |Kali| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/kali.gif

.. |Ubuntu| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/ubuntu.gif

.. |Arch Linux| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/archlinux.gif

.. |Fedora| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/fedora.gif

.. |Opensuse| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/opensuse.gif

.. |Windows1| image:: https://sofianehamlaoui.github.io/junk/lockdoor/gifs/windows.gif

+------------+----------+--------------+----------+------------+-------------------+ | Kali Linux | Ubuntu | Arch Linux | Fedora | Opensuse | Windows (Cygwin) | +============+==========+==============+==========+============+===================+ | |Kali| | |Ubuntu| | |Arch Linux| | |Fedora| | |Opensuse| | |Windows1| | +------------+----------+--------------+----------+------------+-------------------+

.. |Windows| image:: http://icons.iconarchive.com/icons/dakirby309/windows-8-metro/16/Folders-OS-Windows-8-Metro-icon.png

.. |Security| image:: http://icons.iconarchive.com/icons/aha-soft/free-large-boss/24/Security-Guard-icon.png

============= Installation ๐Ÿ› ๏ธ :

The recommended way to use Lockdoor is by pulling the Docker Image so you will not have to worry about dependencies issues.

A Docker image is available on Docker Hub and automatically re-built at each update: https://hub.docker.com/r/sofianehamlaoui/lockdoor. It is initially based on the official debian docker image (debian).

  • Docker Installation

    - Installing requirments
    
          .. code-block:: console
    
                   sudo apt install docker < Debian-based distributions
                   sudo dnf install docker < RPM-based distributions
                   sudo pacman -S docker < Arch-based distributions
                   sudo zypper install docker < OS-based distributions
                   sudo yum install docker < RH-based distributions
    
    - Using lockdoor's docker version
    
                1. *Pull lockdoor Docker Image:*
    
                            .. code-block:: console
    
                                     sudo docker pull sofianehamlaoui/lockdoor
    
                2. *Run fresh Docker container:*
    
                            .. code-block:: console
    
                                     sudo docker run -it --name lockdoor-container -w /Lockdoor-Framework --net=host sofianehamlaoui/lockdoor
    
                3. *Run Lockdoor Framework*
    
                            .. code-block:: console
    
                                     lockdoor
    
                4. *To re-run a stopped container:*
    
                            .. code-block:: console
    
                                     sudo docker start -i sofianehamlaoui/lockdoor
    
    
                5. *To open multiple shells inside the container:*
    
                            .. code-block:: console
    
                                     sudo docker exec -it lockdoor-container bash
    
  • Automatically

       .. code-block:: console
    
                 1) Automatically(x2) installation :
    
                    bash <(wget -qO- https://git.io/JUBlZ)
    
                 2) Automatically(x1) installation :
    
                    git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git && cd Lockdoor-Framework
                    chmod +x ./install.sh
                    ./install.sh
    
  • Manually

    • Installing requirments

      .. code-block:: console
      
            python python-pip python-requests python2 python2-pip gcc ruby php git wget bc curl netcat subversion jre-openjdk make automake gcc linux-headers gzip
      
    • Installing Go

      .. code-block:: console
      
            wget https://dl.google.com/go/go1.13.linux-amd64.tar.gz
            tar -xvf go1.13.linux-amd64.tar.gz
            mv go /usr/local
            export GOROOT=/usr/local/go
            export PATH=$GOPATH/bin:$GOROOT/bin:$PATH
            rm go1.13.linux-amd64.tar.gz
      
    • Installing Lockdoor

      .. code-block:: console
      
               # Clonnig
               git clone https://github.com/SofianeHamlaoui/Lockdoor-Framework.git && cd Lockdoor-Framework
               # Create the config file
               # INSTALLDIR = where you want to install Lockdoor (Ex : /opt/sofiane/pentest)
               echo "Location:"$installdir > $HOME"/.config/lockdoor/lockdoor.conf"
               # Moving the resources folder
               mv ToolsResources/* INSTALLDIR
               # Installing Lockdoor from PyPi
               pip3 install lockdoor
      

============= Lockdoor Tools contents ๐Ÿ› ๏ธ :

Information Gathering ๐Ÿ”Ž :

  • Tools:
    • dirsearch : A Web path scanner
    • brut3k1t : security-oriented bruteforce framework
    • gobuster : DNS and VHost busting tool written in Go
    • Enyx : an SNMP IPv6 Enumeration Tool
    • Goohak : Launchs Google Hacking Queries Against A Target Domain
    • Nasnum : The NAS Enumerator
    • Sublist3r : Fast subdomains enumeration tool for penetration testers
    • wafw00f : identify and fingerprint Web Application Firewall
    • Photon : ncredibly fast crawler designed for OSINT.
    • Raccoon : offensive security tool for reconnaissance and vulnerability scanning
    • DnsRecon : DNS Enumeration Script
    • Nmap : The famous security Scanner, Port Scanner, & Network Exploration Tool
    • sherlock : Find usernames across social networks
    • snmpwn : An SNMPv3 User Enumerator and Attack tool
    • Striker : an offensive information and vulnerability scanner.
    • theHarvester : E-mails, subdomains and names Harvester
    • URLextractor : Information gathering & website reconnaissance
    • denumerator.py : Enumerates list of subdomains
    • other : other Information gathering,recon and Enumeration scripts I collected somewhere.
  • Frameworks:
    • ReconDog : Reconnaissance Swiss Army Knife
    • RED_HAWK : All in one tool for Information Gathering, Vulnerability Scanning and Crawling
    • Dracnmap : Info Gathering Framework

Web Hacking ๐ŸŒ :

  • Tools:
    • Spaghetti : Spaghetti - Web Application Security Scanner
    • CMSmap : CMS scanner
    • BruteXSS : BruteXSS is a tool to find XSS vulnerabilities in web application
    • J-dorker : Website List grabber from Bing
    • droopescan : scanner , identify , CMSs , Drupal , Silverstripe.
    • Optiva : Web Application Scanne
    • V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
    • AtScan : Advanced dork Search & Mass Exploit Scanner
    • WPSeku : Wordpress Security Scanner
    • Wpscan : A simple Wordpress scanner written in python
    • XSStrike : Most advanced XSS scanner.
    • Sqlmap : automatic SQL injection and database takeover tool
    • WhatWeb : the Next generation web scanner
    • joomscan : Joomla Vulnerability Scanner Project
  • Frameworks:
    • Dzjecter : Server checking Tool

Privilege Escalation โš ๏ธ :

  • Tools:
    • Linux ๐Ÿง :
      • Scripts :
        • linux_checksec.sh
        • linux_enum.sh
        • linux_gather_files.sh
        • linux_kernel_exploiter.pl
        • linux_privesc.py
        • linux_privesc.sh
        • linux_security_test
      • Linux_exploits folder
    • Windows |Windows| :
      • windows-privesc-check.py
      • windows-privesc-check.exe
    • MySql :
      • raptor_udf.c
      • raptor_udf2.c

Reverse Engineering โšก:

  • Radare2 : unix-like reverse engineering framework
  • VirtusTotal : VirusTotal tools
  • Miasm : Reverse engineering framework
  • Mirror : reverses the bytes of a file
  • DnSpy : .NET debugger and assembly
  • AngrIo : A python framework for analyzing binaries ( Suggested by @Hamz-a )
  • DLLRunner : a smart DLL execution script for malware analysis in sandbox systems.
  • Fuzzy Server : a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.
  • yara : a tool aimed at helping malware researchers toidentify and classify malware samples
  • Spike : a protocol fuzzer creation kit + audits
  • other : other scripts collected somewhere

Exploitation โ—:

  • Findsploit : Find exploits in local and online databases instantly
  • Pompem : Exploit and Vulnerability Finder
  • rfix : Python tool that helps RFI exploitation.
  • InUrlBr : Advanced search in search engines
  • Burpsuite : Burp Suite for security testing & scanning.
  • linux-exploit-suggester2 : Next-Generation Linux Kernel Exploit Suggester
  • other : other scripts I collected somewhere.

Shells ๐Ÿš:

  • WebShells : BlackArch's Webshells Collection
  • ShellSum : A defense tool - detect web shells in local directories
  • Weevely : Weaponized web shell
  • python-pty-shells : Python PTY backdoors

Password Attacks โœณ๏ธ:

  • crunch : a wordlist generator
  • CeWL : a Custom Word List Generator
  • patator : a multi-purpose brute-forcer, with a modular design and a flexible usage

Encryption - Decryption ๐Ÿ›ก๏ธ:

  • Codetective : a tool to determine the crypto/encoding algorithm used
  • findmyhash : Python script to crack hashes using online services

Social Engineering ๐ŸŽญ:

  • scythe : an accounts enumerator

============= Lockdoor Resources contents ๐Ÿ“š :

Information Gathering ๐Ÿ”Ž :

  • Cheatsheet_SMBEnumeration <ToolsResources/INFO-GATH/CHEATSHEETS/Cheatsheet_SMBEnumeration.txt>_
  • configuration_management <ToolsResources/INFO-GATH/CHEATSHEETS/configuration_management.md>_
  • dns_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/dns_enumeration.md>_
  • file_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/file_enumeration.md>_
  • http_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/http_enumeration.md>_
  • information_gathering_owasp_guide <ToolsResources/INFO-GATH/CHEATSHEETS/information_gathering_owasp_guide.md>_
  • miniserv_webmin_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/miniserv_webmin_enumeration.md>_
  • ms_sql_server_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/ms_sql_server_enumeration.md>_
  • nfs_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/nfs_enumeration.md>_
  • osint_recon_ng <ToolsResources/INFO-GATH/CHEATSHEETS/osint_recon_ng.md>_
  • passive_information_gathering <ToolsResources/INFO-GATH/CHEATSHEETS/passive_information_gathering.md>_
  • pop3_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/pop3_enumeration.md>_
  • ports_emumeration <ToolsResources/INFO-GATH/CHEATSHEETS/ports_emumeration.md>_
  • rpc_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/rpc_enumeration.md>_
  • scanning <ToolsResources/INFO-GATH/CHEATSHEETS/scanning.md>_
  • smb_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/smb_enumeration.md>_
  • smtp_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/smtp_enumeration.md>_
  • snmb_enumeration <ToolsResources/INFO-GATH/CHEATSHEETS/snmb_enumeration.md>_
  • vulnerability_scanning <ToolsResources/INFO-GATH/CHEATSHEETS/vulnerability_scanning.md>_

Crypto ๐Ÿ›ก๏ธ:

  • Crypto101.pdf <ToolsResources/ENCRYPTION/CHEATSHEETS/Crypto101.pdf>_

Exploitation โ—:

  • computer_network_exploits <ToolsResources/EXPLOITATION/CHEATSHEETS/computer_network_exploits.md>_
  • file_inclusion_vulnerabilities <ToolsResources/EXPLOITATION/CHEATSHEETS/file_inclusion_vulnerabilities.md>_
  • File_Transfers <ToolsResources/EXPLOITATION/CHEATSHEETS/File_Transfers.md>_
  • nc_transfers <ToolsResources/EXPLOITATION/CHEATSHEETS/nc_transfers.txt>_
  • networking_pivoting_and_tunneling <ToolsResources/EXPLOITATION/CHEATSHEETS/networking_pivoting_and_tunneling.md>_
  • network_pivoting_techniques <ToolsResources/EXPLOITATION/CHEATSHEETS/network_pivoting_techniques.md>_
  • pivoting <ToolsResources/EXPLOITATION/CHEATSHEETS/pivoting.md>_
  • pivoting_ <ToolsResources/EXPLOITATION/CHEATSHEETS/pivoting_.md>_
  • Public Exploits <ToolsResources/EXPLOITATION/CHEATSHEETS/Public%20Exploits.md>_
  • reverse_shell_with_msfvenom <ToolsResources/EXPLOITATION/CHEATSHEETS/reverse_shell_with_msfvenom.md>_

Networking ๐Ÿ–ง :

  • bpf_syntax <ToolsResources/NETWORKING/bpf_syntax.md>_
  • Cheatsheet_Networking <ToolsResources/NETWORKING/Cheatsheet_Networking.txt>_
  • Cheatsheet_Oracle <ToolsResources/NETWORKING/Cheatsheet_Oracle.txt>_
  • networking_concept <ToolsResources/NETWORKING/networking_concept.md>_
  • nmap_quick_reference_guide <ToolsResources/NETWORKING/nmap_quick_reference_guide.pdf>_
  • tcpdump <ToolsResources/NETWORKING/tcpdump.pdf>_

Password Attacks โœณ๏ธ:

  • password_attacks <ToolsResources/PASSWORD/CHEATSHEETS/password_attacks.md>_
  • Some-Links-To-Wordlists <ToolsResources/PASSWORD/CHEATSHEETS/Some-Links-To-Wordlists.txt>_

Post Exploitation โ—โ—:

  • Cheatsheet_AVBypass <ToolsResources/POST-EXPL/CHEATSHEETS/Cheatsheet_AVBypass.txt>_
  • Cheatsheet_BuildReviews <ToolsResources/POST-EXPL/CHEATSHEETS/Cheatsheet_BuildReviews.txt>_
  • code-execution-reverse-shell-commands <ToolsResources/POST-EXPL/CHEATSHEETS/code-execution-reverse-shell-commands.txt>_

Privilege Escalation โš ๏ธ:

  • Cheatsheet_LinuxPrivilegeEsc <ToolsResources/PrivEsc/CHEATSHEETS/Cheatsheet_LinuxPrivilegeEsc.txt>_
  • linux_enumeration <ToolsResources/PrivEsc/CHEATSHEETS/linux_enumeration.md>_
  • windows_enumeration <ToolsResources/PrivEsc/CHEATSHEETS/windows_enumeration.md>_
  • windows_priv_escalation <ToolsResources/PrivEsc/CHEATSHEETS/windows_priv_escalation.md>_
  • windows_priv_escalation_practical <ToolsResources/PrivEsc/CHEATSHEETS/windows_priv_escalation_practical.md>_

Pentesting & Security Assessment Findings Report Templates ๐Ÿ“ :

  • Demo Company - Security Assessment Findings Report.docx <ToolsResources/REPORT/TEMPLATES/Demo-Company-Security-Asses-Findings-Report.docx>_
  • linux-template.md <ToolsResources/REPORT/TEMPLATES/linux-template.md>_
  • PWKv1-REPORT.doc <ToolsResources/REPORT/TEMPLATES/PWKv1-REPORT.doc>_
  • pwkv1_report.doc <ToolsResources/REPORT/TEMPLATES/pwkv1_report.doc>_
  • template-penetration-testing-report-v03.pdf <ToolsResources/REPORT/TEMPLATES/template-penetration-testing-report-v03.pdf>_
  • windows-template.md <ToolsResources/REPORT/TEMPLATES/windows-template.md>_
  • OSCP-OS-XXXXX-Lab-Report_Template3.2.docx <ToolsResources/REPORT/TEMPLATES/OSCP-OS-XXXXX-Lab-Report_Template3.2.docx>_
  • OSCP-OS-XXXXX-Exam-Report_Template3.2.docx <ToolsResources/REPORT/TEMPLATES/OSCP-OS-XXXXX-Exam-Report_Template3.2.docx>_
  • CherryTree_template.ctb <ToolsResources/REPORT/TEMPLATES/CherryTree_template.ctb>_
  • eventory-sample-pentest-report.pdf <ToolsResources/REPORT/TEMPLATES/eventory-sample-pentest-report.pdf>_ Reverse Engineering โšก :

  • Buffer_Overflow_Exploit <ToolsResources/REVERSE/CHEATSHEETS/Buffer_Overflow_Exploit.md>_
  • buffer_overflows <ToolsResources/REVERSE/CHEATSHEETS/buffer_overflows.md>_
  • gdb_cheat_sheet <ToolsResources/REVERSE/CHEATSHEETS/gdb_cheat_sheet.pdf>_
  • r2_cheatsheet <ToolsResources/REVERSE/CHEATSHEETS/r2_cheatsheet.pdf>_
  • win32_buffer_overflow_exploitation <ToolsResources/REVERSE/CHEATSHEETS/win32_buffer_overflow_exploitation.md>_
  • 64_ia_32_jmp_instructions <ToolsResources/REVERSE/CHEATSHEETS/assembly/64_ia_32_jmp_instructions.pdf>_
  • course_notes <ToolsResources/REVERSE/CHEATSHEETS/assembly/course_notes.md>_
  • debuging <ToolsResources/REVERSE/CHEATSHEETS/assembly/debuging.md>_
  • IntelCodeTable_x86 <ToolsResources/REVERSE/CHEATSHEETS/assembly/IntelCodeTable_x86.pdf>_
  • Radare2 cheat sheet <ToolsResources/REVERSE/CHEATSHEETS/assembly/Radare2 cheat sheet.txt>_
  • x86_assembly_x86_architecture <ToolsResources/REVERSE/CHEATSHEETS/assembly/x86_assembly_x86_architecture.pdf>_
  • x86_opcode_structure_and_instruction_overview <ToolsResources/REVERSE/CHEATSHEETS/assembly/x86_opcode_structure_and_instruction_overview.png>_

Social Engineering ๐ŸŽญ:

  • social_engineering <ToolsResources/SOCIAL_ENGINEERING/CHEATSHEETS/social_engineering.md>_

Walk Throughs ๐Ÿšถ :

  • Cheatsheet_PenTesting.txt <ToolsResources/WALK/Cheatsheet_PenTesting.txt>_
  • OWASP Testing Guide v4 <ToolsResources/WALK/OTGv4.pdf>_
  • OWASPv4_Checklist.xlsx <ToolsResources/WALK/OWASPv4_Checklist.xlsx>_

Web Hacking ๐ŸŒ :

  • auxiliary_info.md <ToolsResources/WEB/CHEATSHEETS/auxiliary_info.md>_
  • Cheatsheet_ApacheSSL <ToolsResources/WEB/CHEATSHEETS/Cheatsheet_ApacheSSL.txt>_
  • Cheatsheet_AttackingMSSQL <ToolsResources/WEB/CHEATSHEETS/Cheatsheet_AttackingMSSQL.txt>_
  • Cheatsheet_DomainAdminExploitation <ToolsResources/WEB/CHEATSHEETS/Cheatsheet_DomainAdminExploitation.txt>_
  • Cheatsheet_SQLInjection <ToolsResources/WEB/CHEATSHEETS/Cheatsheet_SQLInjection.txt>_
  • Cheatsheet_VulnVerify.txt <ToolsResources/WEB/CHEATSHEETS/Cheatsheet_VulnVerify.txt>_
  • code-execution-reverse-shell-commands <ToolsResources/WEB/CHEATSHEETS/code-execution-reverse-shell-commands.txt>_
  • file_upload.md <ToolsResources/WEB/CHEATSHEETS/file_upload.md>_
  • html5_cheat_sheet <ToolsResources/WEB/CHEATSHEETS/html5_cheat_sheet.pdf>_
  • jquery_cheat_sheet_1.3.2 <ToolsResources/WEB/CHEATSHEETS/jquery_cheat_sheet_1.3.2.pdf>_
  • sqli <ToolsResources/WEB/CHEATSHEETS/sqli.md>_
  • sqli_cheatsheet <ToolsResources/WEB/CHEATSHEETS/sqli_cheatsheet.md>_
  • sqli-quries <ToolsResources/WEB/CHEATSHEETS/sqli-quries.txt>_
  • sqli-tips <ToolsResources/WEB/CHEATSHEETS/sqli-tips.txt>_
  • web_app_security <ToolsResources/WEB/CHEATSHEETS/web_app_security.md>_
  • web_app_vulns_Arabic <ToolsResources/WEB/CHEATSHEETS/web_app_vulns_Arabic.md>_
  • Xss_1 <ToolsResources/WEB/CHEATSHEETS/xss.md>_
  • Xss_2 <ToolsResources/WEB/CHEATSHEETS/xss.png>_
  • xss_actionscript <ToolsResources/WEB/CHEATSHEETS/xss_actionscript>_
  • xxe <ToolsResources/WEB/CHEATSHEETS/xxe.md>_

Other ๐Ÿ“š :

  • Security |Security|

    • Best Version of BriskSec Security Cheatsheets : <https://sofianehamlaoui.github.io/Security-Cheatsheets/index.html>_
  • Images (I'll let you discover that) <ToolsResources/IMAGES/>_

  • Google Hacking DataBase <ToolsResources/GHDB.pdf>_

  • Google Fu <ToolsResources/GoogleFu.pdf>_ Contributing โ„น๏ธ :


  1. Fork it ( https://github.com/SofianeHamlaoui/Lockdoor-Framework/fork )
  2. Create your feature branch
  3. Commit your changes
  4. Push to the branch
  5. Create a new Pull Request
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected]