# LolyFramework
**LolyFramework** is a security testing framework designed to make it easier for penetration testers and security enthusiasts to find vulnerabilities in web applications. It offers a variety of tools for subdomain enumeration, URL discovery, vulnerability checking, and more, all in one place.
## Features:
- Subdomain enumeration
- URL enumeration
- Vulnerability scanning (XSS, SQL injection, etc.)
- Web scanning and security checking
- Admin panel finder
- Port scanning
- DDoS simulation
## Getting Started
### Prerequisites
Before you begin, ensure you have the following installed on your system:
- **Python 3.6 or higher**
- Libraries listed in `requirements.txt` (these can be installed using the instructions below)
### PyPI Installation (Recommended)
- Alternatively, you can install the framework globally via PyPI:
```bash
sudo pip install loly-framework
```
- After installation, you can simply run the framework using
```bash
loly
```
### Installation
Clone the repository to your local machine:
```bash
git clone https://github.com/hemaabokila/loly_framework
```
1. Navigate to the project directory:
```bash
cd loly-framework
```
2. Install the required dependencies:
```
pip install -r requirements.txt
```
3. Run the framework:
```
python3 main.py
```
- Alternatively, to install the framework globally and run it directly using the command loly, you can use:
```
sudo pip install .
```
- After installation, simply run the framework with:
```
loly
```
## Usage
Once the framework is running, you can use the following commands within the framework:
## List of Tools
<div align="center">
| Tool Name | Description | Example Command |
|-----------|-------------|------------------|
| subdomain | Subdomain Enumeration | `run subdomain example.com >> subdomains.txt` |
| enumurl | URL Enumeration | `run enumurl http://example.com >> urls.txt` |
| pf | URL Vulnerability Checker | `run pf urls.txt >> vulnerabilities_report.txt` |
| scanall | Security Checker | `run scanall urls.txt >> security_report.txt` |
| webscan | Comprehensive Web Scanner | `run webscan urls.txt >> webscan_report.txt` |
| adminp | Admin Panel Finder | `run adminp http://example.com >> adminpanels.txt` |
| portscan | Port Scanner | `run portscan example.com >> ports.txt` |
| ddos | DDoS Simulation | `run ddos 192.168.1.1` |
</div>
## Example Usage
To enumerate subdomains of example.com and save the output to a file:
```
run subdomain example.com >> subdomains.txt
```
To perform a full vulnerability check on URLs stored in a file urls.txt:
```
run scanall urls.txt >> security_report.txt
```
### Commands Overview
- run: Executes a specific tool against a target.
- Usage: run <tool_name> <target> [>> <output_file>]
- exit: Exits the framework.
- help: Displays detailed information about available commands and tools.
## Available Tools
### Subdomain Enumeration
- Find subdomains associated with a domain.
```
run subdomain <domain> [>> <output_file>]
```
### URL Enumeration
- Enumerate URLs on a specified domain.
```
run enumurl <url> [>> <output_file>]
```
### Vulnerability Checker
- Check URLs for common vulnerabilities like XSS or SQL injection.
```
run pf <urls_file> [>> <output_file>]
```
### Security Checker
- Run a comprehensive security scan on a list of URLs.
```
run scanall <urls_file> [>> <output_file>]
```
### Web Scanner
- Perform detailed security scanning on web applications.
```
run webscan <urls_file> [>> <output_file>]
```
### Admin Panel Finder
- Scan for admin panel URLs on the target.
```
run adminp <url> [>> <output_file>]
```
### Port Scanner
- Scan open ports on a target domain or IP.
```
run portscan <url_or_ip> [>> <output_file>]
```
### DDoS Simulation
- Simulate a distributed denial-of-service (DDoS) attack.
```
run ddos <ip_address>
```
## License
This project is licensed under the MIT License - see the LICENSE file for details.
## Contact
**Developed by Ibrahem Abo Kila**
- For any issues or inquiries, feel free to contact me:
- Email: ibrahemabokila@gmail.com
- GitHub: hemaabokila
Raw data
{
"_id": null,
"home_page": "https://github.com/hemaabokila/loly_framework",
"name": "loly-framework",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": null,
"keywords": null,
"author": "Ibrahem Abo Kila",
"author_email": "ibrahemabokila@gmail.com",
"download_url": "https://files.pythonhosted.org/packages/d9/a8/a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86/loly_framework-1.0.0.tar.gz",
"platform": null,
"description": "# LolyFramework\n\n**LolyFramework** is a security testing framework designed to make it easier for penetration testers and security enthusiasts to find vulnerabilities in web applications. It offers a variety of tools for subdomain enumeration, URL discovery, vulnerability checking, and more, all in one place.\n\n## Features:\n- Subdomain enumeration\n- URL enumeration\n- Vulnerability scanning (XSS, SQL injection, etc.)\n- Web scanning and security checking\n- Admin panel finder\n- Port scanning\n- DDoS simulation\n\n## Getting Started\n\n### Prerequisites\nBefore you begin, ensure you have the following installed on your system:\n\n- **Python 3.6 or higher**\n- Libraries listed in `requirements.txt` (these can be installed using the instructions below)\n### PyPI Installation (Recommended)\n- Alternatively, you can install the framework globally via PyPI:\n\n\n```bash\nsudo pip install loly-framework\n```\n- After installation, you can simply run the framework using\n```bash\nloly\n```\n### Installation\nClone the repository to your local machine:\n\n```bash\ngit clone https://github.com/hemaabokila/loly_framework\n```\n\n1. Navigate to the project directory:\n\n```bash\ncd loly-framework\n```\n2. Install the required dependencies:\n```\npip install -r requirements.txt\n```\n3. Run the framework:\n\n```\npython3 main.py\n```\n- Alternatively, to install the framework globally and run it directly using the command loly, you can use:\n\n```\nsudo pip install .\n```\n- After installation, simply run the framework with:\n\n```\nloly\n```\n## Usage\nOnce the framework is running, you can use the following commands within the framework:\n\n## List of Tools\n<div align=\"center\">\n\n| Tool Name | Description | Example Command |\n|-----------|-------------|------------------|\n| subdomain | Subdomain Enumeration | `run subdomain example.com >> subdomains.txt` |\n| enumurl | URL Enumeration | `run enumurl http://example.com >> urls.txt` |\n| pf | URL Vulnerability Checker | `run pf urls.txt >> vulnerabilities_report.txt` |\n| scanall | Security Checker | `run scanall urls.txt >> security_report.txt` |\n| webscan | Comprehensive Web Scanner | `run webscan urls.txt >> webscan_report.txt` |\n| adminp | Admin Panel Finder | `run adminp http://example.com >> adminpanels.txt` |\n| portscan | Port Scanner | `run portscan example.com >> ports.txt` |\n| ddos | DDoS Simulation | `run ddos 192.168.1.1` |\n\n</div>\n\n## Example Usage\nTo enumerate subdomains of example.com and save the output to a file:\n\n```\nrun subdomain example.com >> subdomains.txt\n```\nTo perform a full vulnerability check on URLs stored in a file urls.txt:\n\n```\nrun scanall urls.txt >> security_report.txt\n```\n### Commands Overview\n- run: Executes a specific tool against a target.\n - Usage: run <tool_name> <target> [>> <output_file>]\n- exit: Exits the framework.\n- help: Displays detailed information about available commands and tools.\n## Available Tools\n### Subdomain Enumeration\n- Find subdomains associated with a domain.\n\n```\nrun subdomain <domain> [>> <output_file>]\n```\n### URL Enumeration\n- Enumerate URLs on a specified domain.\n\n```\nrun enumurl <url> [>> <output_file>]\n```\n### Vulnerability Checker\n- Check URLs for common vulnerabilities like XSS or SQL injection.\n\n```\nrun pf <urls_file> [>> <output_file>]\n```\n### Security Checker\n- Run a comprehensive security scan on a list of URLs.\n\n```\nrun scanall <urls_file> [>> <output_file>]\n```\n### Web Scanner\n- Perform detailed security scanning on web applications.\n\n```\nrun webscan <urls_file> [>> <output_file>]\n```\n### Admin Panel Finder\n- Scan for admin panel URLs on the target.\n\n```\nrun adminp <url> [>> <output_file>]\n```\n### Port Scanner\n- Scan open ports on a target domain or IP.\n\n```\nrun portscan <url_or_ip> [>> <output_file>]\n```\n### DDoS Simulation\n- Simulate a distributed denial-of-service (DDoS) attack.\n\n```\nrun ddos <ip_address>\n```\n## License\nThis project is licensed under the MIT License - see the LICENSE file for details.\n\n## Contact\n**Developed by Ibrahem Abo Kila**\n- For any issues or inquiries, feel free to contact me:\n\n- Email: ibrahemabokila@gmail.com\n- GitHub: hemaabokila\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "A security framework for testing web applications.",
"version": "1.0.0",
"project_urls": {
"Homepage": "https://github.com/hemaabokila/loly_framework"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "521a8c7f023279b89cac0e2a0249e201da3582c9f4de5e40ad854af8e4a9eeb3",
"md5": "6bd3d239c0f08828af8495244cbd8ba8",
"sha256": "812a6ca2837d1b49864652b1bbcf1b5b2a2d0524e168a2b3805d0ad21095fdb4"
},
"downloads": -1,
"filename": "loly_framework-1.0.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "6bd3d239c0f08828af8495244cbd8ba8",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 18739,
"upload_time": "2024-10-21T00:22:37",
"upload_time_iso_8601": "2024-10-21T00:22:37.010963Z",
"url": "https://files.pythonhosted.org/packages/52/1a/8c7f023279b89cac0e2a0249e201da3582c9f4de5e40ad854af8e4a9eeb3/loly_framework-1.0.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "d9a8a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86",
"md5": "73bc7b6c5a49d80a8c78541e8c303f53",
"sha256": "cd32086b5f9c07843d50e74b5a5467cba3a2d55ebd9aa4fe75ef13313b79f356"
},
"downloads": -1,
"filename": "loly_framework-1.0.0.tar.gz",
"has_sig": false,
"md5_digest": "73bc7b6c5a49d80a8c78541e8c303f53",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 842998,
"upload_time": "2024-10-21T00:22:45",
"upload_time_iso_8601": "2024-10-21T00:22:45.681600Z",
"url": "https://files.pythonhosted.org/packages/d9/a8/a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86/loly_framework-1.0.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-10-21 00:22:45",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "hemaabokila",
"github_project": "loly_framework",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"requirements": [],
"lcname": "loly-framework"
}