loly-framework


Nameloly-framework JSON
Version 1.0.0 PyPI version JSON
download
home_pagehttps://github.com/hemaabokila/loly_framework
SummaryA security framework for testing web applications.
upload_time2024-10-21 00:22:45
maintainerNone
docs_urlNone
authorIbrahem Abo Kila
requires_python>=3.6
licenseMIT
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # LolyFramework

**LolyFramework** is a security testing framework designed to make it easier for penetration testers and security enthusiasts to find vulnerabilities in web applications. It offers a variety of tools for subdomain enumeration, URL discovery, vulnerability checking, and more, all in one place.

## Features:
- Subdomain enumeration
- URL enumeration
- Vulnerability scanning (XSS, SQL injection, etc.)
- Web scanning and security checking
- Admin panel finder
- Port scanning
- DDoS simulation

## Getting Started

### Prerequisites
Before you begin, ensure you have the following installed on your system:

- **Python 3.6 or higher**
- Libraries listed in `requirements.txt` (these can be installed using the instructions below)
### PyPI Installation (Recommended)
- Alternatively, you can install the framework globally via PyPI:


```bash
sudo pip install loly-framework
```
- After installation, you can simply run the framework using
```bash
loly
```
### Installation
Clone the repository to your local machine:

```bash
git clone https://github.com/hemaabokila/loly_framework
```

1. Navigate to the project directory:

```bash
cd loly-framework
```
2. Install the required dependencies:
```
pip install -r requirements.txt
```
3. Run the framework:

```
python3 main.py
```
- Alternatively, to install the framework globally and run it directly using the command loly, you can use:

```
sudo pip install .
```
- After installation, simply run the framework with:

```
loly
```
## Usage
Once the framework is running, you can use the following commands within the framework:

## List of Tools
<div align="center">

| Tool Name | Description | Example Command |
|-----------|-------------|------------------|
| subdomain | Subdomain Enumeration | `run subdomain example.com >> subdomains.txt` |
| enumurl   | URL Enumeration | `run enumurl http://example.com >> urls.txt` |
| pf        | URL Vulnerability Checker | `run pf urls.txt >> vulnerabilities_report.txt` |
| scanall   | Security Checker | `run scanall urls.txt >> security_report.txt` |
| webscan   | Comprehensive Web Scanner | `run webscan urls.txt >> webscan_report.txt` |
| adminp    | Admin Panel Finder | `run adminp http://example.com >> adminpanels.txt` |
| portscan  | Port Scanner | `run portscan example.com >> ports.txt` |
| ddos      | DDoS Simulation | `run ddos 192.168.1.1` |

</div>

## Example Usage
To enumerate subdomains of example.com and save the output to a file:

```
run subdomain example.com >> subdomains.txt
```
To perform a full vulnerability check on URLs stored in a file urls.txt:

```
run scanall urls.txt >> security_report.txt
```
### Commands Overview
- run: Executes a specific tool against a target.
    - Usage: run <tool_name> <target> [>> <output_file>]
- exit: Exits the framework.
- help: Displays detailed information about available commands and tools.
## Available Tools
### Subdomain Enumeration
- Find subdomains associated with a domain.

```
run subdomain <domain> [>> <output_file>]
```
### URL Enumeration
- Enumerate URLs on a specified domain.

```
run enumurl <url> [>> <output_file>]
```
### Vulnerability Checker
- Check URLs for common vulnerabilities like XSS or SQL injection.

```
run pf <urls_file> [>> <output_file>]
```
### Security Checker
- Run a comprehensive security scan on a list of URLs.

```
run scanall <urls_file> [>> <output_file>]
```
### Web Scanner
- Perform detailed security scanning on web applications.

```
run webscan <urls_file> [>> <output_file>]
```
### Admin Panel Finder
- Scan for admin panel URLs on the target.

```
run adminp <url> [>> <output_file>]
```
### Port Scanner
- Scan open ports on a target domain or IP.

```
run portscan <url_or_ip> [>> <output_file>]
```
### DDoS Simulation
- Simulate a distributed denial-of-service (DDoS) attack.

```
run ddos <ip_address>
```
## License
This project is licensed under the MIT License - see the LICENSE file for details.

## Contact
**Developed by Ibrahem Abo Kila**
- For any issues or inquiries, feel free to contact me:

- Email: ibrahemabokila@gmail.com
- GitHub: hemaabokila

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/hemaabokila/loly_framework",
    "name": "loly-framework",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": null,
    "keywords": null,
    "author": "Ibrahem Abo Kila",
    "author_email": "ibrahemabokila@gmail.com",
    "download_url": "https://files.pythonhosted.org/packages/d9/a8/a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86/loly_framework-1.0.0.tar.gz",
    "platform": null,
    "description": "# LolyFramework\n\n**LolyFramework** is a security testing framework designed to make it easier for penetration testers and security enthusiasts to find vulnerabilities in web applications. It offers a variety of tools for subdomain enumeration, URL discovery, vulnerability checking, and more, all in one place.\n\n## Features:\n- Subdomain enumeration\n- URL enumeration\n- Vulnerability scanning (XSS, SQL injection, etc.)\n- Web scanning and security checking\n- Admin panel finder\n- Port scanning\n- DDoS simulation\n\n## Getting Started\n\n### Prerequisites\nBefore you begin, ensure you have the following installed on your system:\n\n- **Python 3.6 or higher**\n- Libraries listed in `requirements.txt` (these can be installed using the instructions below)\n### PyPI Installation (Recommended)\n- Alternatively, you can install the framework globally via PyPI:\n\n\n```bash\nsudo pip install loly-framework\n```\n- After installation, you can simply run the framework using\n```bash\nloly\n```\n### Installation\nClone the repository to your local machine:\n\n```bash\ngit clone https://github.com/hemaabokila/loly_framework\n```\n\n1. Navigate to the project directory:\n\n```bash\ncd loly-framework\n```\n2. Install the required dependencies:\n```\npip install -r requirements.txt\n```\n3. Run the framework:\n\n```\npython3 main.py\n```\n- Alternatively, to install the framework globally and run it directly using the command loly, you can use:\n\n```\nsudo pip install .\n```\n- After installation, simply run the framework with:\n\n```\nloly\n```\n## Usage\nOnce the framework is running, you can use the following commands within the framework:\n\n## List of Tools\n<div align=\"center\">\n\n| Tool Name | Description | Example Command |\n|-----------|-------------|------------------|\n| subdomain | Subdomain Enumeration | `run subdomain example.com >> subdomains.txt` |\n| enumurl   | URL Enumeration | `run enumurl http://example.com >> urls.txt` |\n| pf        | URL Vulnerability Checker | `run pf urls.txt >> vulnerabilities_report.txt` |\n| scanall   | Security Checker | `run scanall urls.txt >> security_report.txt` |\n| webscan   | Comprehensive Web Scanner | `run webscan urls.txt >> webscan_report.txt` |\n| adminp    | Admin Panel Finder | `run adminp http://example.com >> adminpanels.txt` |\n| portscan  | Port Scanner | `run portscan example.com >> ports.txt` |\n| ddos      | DDoS Simulation | `run ddos 192.168.1.1` |\n\n</div>\n\n## Example Usage\nTo enumerate subdomains of example.com and save the output to a file:\n\n```\nrun subdomain example.com >> subdomains.txt\n```\nTo perform a full vulnerability check on URLs stored in a file urls.txt:\n\n```\nrun scanall urls.txt >> security_report.txt\n```\n### Commands Overview\n- run: Executes a specific tool against a target.\n    - Usage: run <tool_name> <target> [>> <output_file>]\n- exit: Exits the framework.\n- help: Displays detailed information about available commands and tools.\n## Available Tools\n### Subdomain Enumeration\n- Find subdomains associated with a domain.\n\n```\nrun subdomain <domain> [>> <output_file>]\n```\n### URL Enumeration\n- Enumerate URLs on a specified domain.\n\n```\nrun enumurl <url> [>> <output_file>]\n```\n### Vulnerability Checker\n- Check URLs for common vulnerabilities like XSS or SQL injection.\n\n```\nrun pf <urls_file> [>> <output_file>]\n```\n### Security Checker\n- Run a comprehensive security scan on a list of URLs.\n\n```\nrun scanall <urls_file> [>> <output_file>]\n```\n### Web Scanner\n- Perform detailed security scanning on web applications.\n\n```\nrun webscan <urls_file> [>> <output_file>]\n```\n### Admin Panel Finder\n- Scan for admin panel URLs on the target.\n\n```\nrun adminp <url> [>> <output_file>]\n```\n### Port Scanner\n- Scan open ports on a target domain or IP.\n\n```\nrun portscan <url_or_ip> [>> <output_file>]\n```\n### DDoS Simulation\n- Simulate a distributed denial-of-service (DDoS) attack.\n\n```\nrun ddos <ip_address>\n```\n## License\nThis project is licensed under the MIT License - see the LICENSE file for details.\n\n## Contact\n**Developed by Ibrahem Abo Kila**\n- For any issues or inquiries, feel free to contact me:\n\n- Email: ibrahemabokila@gmail.com\n- GitHub: hemaabokila\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "A security framework for testing web applications.",
    "version": "1.0.0",
    "project_urls": {
        "Homepage": "https://github.com/hemaabokila/loly_framework"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "521a8c7f023279b89cac0e2a0249e201da3582c9f4de5e40ad854af8e4a9eeb3",
                "md5": "6bd3d239c0f08828af8495244cbd8ba8",
                "sha256": "812a6ca2837d1b49864652b1bbcf1b5b2a2d0524e168a2b3805d0ad21095fdb4"
            },
            "downloads": -1,
            "filename": "loly_framework-1.0.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "6bd3d239c0f08828af8495244cbd8ba8",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 18739,
            "upload_time": "2024-10-21T00:22:37",
            "upload_time_iso_8601": "2024-10-21T00:22:37.010963Z",
            "url": "https://files.pythonhosted.org/packages/52/1a/8c7f023279b89cac0e2a0249e201da3582c9f4de5e40ad854af8e4a9eeb3/loly_framework-1.0.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "d9a8a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86",
                "md5": "73bc7b6c5a49d80a8c78541e8c303f53",
                "sha256": "cd32086b5f9c07843d50e74b5a5467cba3a2d55ebd9aa4fe75ef13313b79f356"
            },
            "downloads": -1,
            "filename": "loly_framework-1.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "73bc7b6c5a49d80a8c78541e8c303f53",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 842998,
            "upload_time": "2024-10-21T00:22:45",
            "upload_time_iso_8601": "2024-10-21T00:22:45.681600Z",
            "url": "https://files.pythonhosted.org/packages/d9/a8/a01149a86c4d62949df188145805a18b52ad69ecd0aa9a52f47f773c3f86/loly_framework-1.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-10-21 00:22:45",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "hemaabokila",
    "github_project": "loly_framework",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [],
    "lcname": "loly-framework"
}
        
Elapsed time: 0.58068s