Draft:Lockdoor Framework (software)
Submission declined on 4 June 2025 by Spiderone (talk). This submission is not adequately supported by reliable sources. Reliable sources are required so that information can be verified. If you need help with referencing, please see Referencing for beginners and Citing sources.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
| ![]() |
Comment: In accordance with Wikipedia's Conflict of interest policy, I disclose that I have a conflict of interest regarding the subject of this article. SofianeHamlaoui (talk) 21:59, 4 June 2025 (UTC)
Developer(s) | Sofiane Hamlaoui |
---|---|
Initial release | September 2019 |
Stable release | 2.3
/ 2021 |
Written in | Python, Shell script |
Operating system | Linux (Debian, Ubuntu, Arch Linux) |
Type | Penetration test framework |
License | Open-source license |
Website | github |
The Lockdoor Framework is an open-source penetration testing framework designed for security professionals and researchers. Created by French cybersecurity engineer Sofiane Hamlaoui in 2019, it provides a curated collection of security tools organized by testing phases along with educational resources.
Features
[edit]The framework distinguishes itself through several key characteristics:
- Curated tool selection: Focuses on most frequently used penetration testing tools rather than exhaustive collections
- Educational integration: Includes cheatsheets, methodology guides, and report templates
- Multi-platform support: Available for Linux distributions and via Docker containers
- Automated processes: Simplifies tool installation and updates
Tool Categories
[edit]The framework organizes tools into logical categories:
- Information gathering (21 tools)
- Web hacking (15 tools)
- Privilege escalation (15 tools)
- Reverse engineering (15 tools)
- Exploitation (6 tools)
- Shells (4 tools)
- Password attacks (4 tools)
- Encryption/Decryption (2 tools)
- Social engineering (1 tool)
Development
[edit]Version History
[edit]Version | Release Date | Key Features |
---|---|---|
0.6 | September 2019 | Initial release with 13 information gathering tools |
1.0 Beta | September 2019 | Expanded to 21 information gathering tools, 15 web hacking tools |
2.2.3 | March 2020 | Added privilege escalation scripts |
2.2.4 | August 2020 | Improved Docker support |
2.3 | 2021 | Production-ready release |
2.4 | 2024 | Production-ready release + Auto deployment |
Architecture
[edit]The framework is built primarily in Python with supporting shell scripts. Key architectural components include:
- Configuration files stored at
~/.config/lockdoor/lockdoor.conf
- Automatic tool updating capabilities
- Docker container support
- Continuous integration pipelines
Comparison with Other Frameworks
[edit]Unlike comprehensive distributions like Kali Linux, Lockdoor Framework emphasizes:
- Selective tool inclusion based on professional usage
- Integrated learning resources
- Simplified deployment options
- Community-driven development model
Reception
[edit]The framework has been:
- Featured on cybersecurity platforms including KitPloit
- Adopted by security professionals and students
- Starred over 1,500 times on GitHub
- Forked nearly 300 times for community modifications