Draft:Lockdoor Framework
![]() | Draft article not currently submitted for review.
This is a draft Articles for creation (AfC) submission. It is not currently pending review. While there are no deadlines, abandoned drafts may be deleted after six months. To edit the draft click on the "Edit" tab at the top of the window. To be accepted, a draft should:
It is strongly discouraged to write about yourself, your business or employer. If you do so, you must declare it. Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
Last edited by Qwerfjkl (bot) (talk | contribs) 30 days ago. (Update) |
Lockdoor Framework | |
---|---|
Developer(s) | Sofiane Hamlaoui |
Initial release | September 2019 |
Stable release | 2.3
/ 2021 |
Written in | Python, Shell script |
Operating system | Linux (Debian, Ubuntu, Arch Linux) |
Type | Penetration test framework |
License | Open-source license |
Website | github |
The Lockdoor Framework is an open-source penetration testing framework designed for security professionals and researchers. Created by French cybersecurity engineer Sofiane Hamlaoui in 2019, it provides a curated collection of security tools organized by testing phases along with educational resources.
Features
[edit]The framework distinguishes itself through several key characteristics:
- Curated tool selection: Focuses on most frequently used penetration testing tools rather than exhaustive collections
- Educational integration: Includes cheatsheets, methodology guides, and report templates
- Multi-platform support: Available for Linux distributions and via Docker containers
- Automated processes: Simplifies tool installation and updates
Tool Categories
[edit]The framework organizes tools into logical categories:
- Information gathering (21 tools)
- Web hacking (15 tools)
- Privilege escalation (15 tools)
- Reverse engineering (15 tools)
- Exploitation (6 tools)
- Shells (4 tools)
- Password attacks (4 tools)
- Encryption/Decryption (2 tools)
- Social engineering (1 tool)
Development
[edit]Version History
[edit]Version | Release Date | Key Features |
---|---|---|
0.6 | September 2019 | Initial release with 13 information gathering tools |
1.0 Beta | September 2019 | Expanded to 21 information gathering tools, 15 web hacking tools |
2.2.3 | March 2020 | Added privilege escalation scripts |
2.2.4 | August 2020 | Improved Docker support |
2.3 | 2021 | Production-ready release |
2.4 | 2024 | Production-ready release + Auto deployment |
Architecture
[edit]The framework is built primarily in Python with supporting shell scripts. Key architectural components include:
- Configuration files stored at
~/.config/lockdoor/lockdoor.conf
- Automatic tool updating capabilities
- Docker container support
- Continuous integration pipelines
Comparison with Other Frameworks
[edit]Unlike comprehensive distributions like Kali Linux, Lockdoor Framework emphasizes:
- Selective tool inclusion based on professional usage
- Integrated learning resources
- Simplified deployment options
- Community-driven development model
Reception
[edit]The framework has been:
- Featured on cybersecurity platforms including KitPloit
- Adopted by security professionals and students
- Starred over 1,500 times on GitHub
- Forked nearly 300 times for community modifications