π Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
β1,529Jun 4, 2025Updated 9 months ago
Alternatives and similar repositories for Lockdoor-Framework
Users that are interested in Lockdoor-Framework are comparing it to the libraries listed below
Sorting:
- A Modern Orchestration Engine for Securityβ6,116Updated this week
- Attack Surface Management Platformβ9,435Feb 15, 2026Updated 2 weeks ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheetβ5,460Dec 12, 2024Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security β¦β1,035May 27, 2020Updated 5 years ago
- π Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.β2,608Sep 26, 2023Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repositoryβ4,231Aug 26, 2024Updated last year
- A collection of useful links for Pentestersβ176Jun 6, 2025Updated 9 months ago
- Tools for Pentestingβ2,129Nov 18, 2023Updated 2 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.β1,822Nov 19, 2024Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and moreβ1,762Dec 9, 2025Updated 2 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanningβ3,516Jun 10, 2025Updated 8 months ago
- The all-in-one browser extension for offensive security professionals πβ6,640Jan 5, 2025Updated last year
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.β2,699Apr 20, 2024Updated last year
- articlesβ13,705Apr 3, 2023Updated 2 years ago
- Awesome hacking is an awesome collection of hacking tools.β3,764Feb 26, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β2,695Jul 6, 2025Updated 8 months ago
- All In One Web Reconβ2,667Apr 30, 2025Updated 10 months ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Frameworkβ1,073Jun 7, 2024Updated last year
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Managementβ4,859Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,511Jan 18, 2026Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β10,158Sep 29, 2025Updated 5 months ago
- The Multi-Tool Web Vulnerability Scanner.β1,977Aug 22, 2023Updated 2 years ago
- Red Teaming Tactics and Techniquesβ4,495Aug 22, 2024Updated last year
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoorβ2,448May 6, 2024Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creβ¦β3,824Feb 26, 2026Updated last week
- HostHunter a recon tool for discovering hostnames using OSINT techniques.β1,156Mar 30, 2023Updated 2 years ago
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Sβ¦β1,651Nov 24, 2020Updated 5 years ago
- List of Awesome Red Teaming Resourcesβ7,809Dec 28, 2023Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Usβ¦β376Nov 8, 2022Updated 3 years ago
- Automation for internal Windows Penetrationtest / AD-Securityβ3,644Aug 28, 2025Updated 6 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Sβ¦β2,900Jun 27, 2023Updated 2 years ago
- A list of web application securityβ6,797Feb 27, 2026Updated last week
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.β3,291Nov 1, 2025Updated 4 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifiβ¦β2,446Oct 3, 2025Updated 5 months ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor aβ¦β1,176Oct 20, 2022Updated 3 years ago
- vulnx π·οΈ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It β¦β2,075Jun 7, 2023Updated 2 years ago
- Automatically brute force all services running on a target.β2,224Aug 18, 2024Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, alβ¦β2,184Dec 11, 2022Updated 3 years ago
- All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blogβ1,777Jul 24, 2024Updated last year