About
LazyOwn Framework [;,;] is a powerful tool written in Python designed to simplify and automate pentesting and vulnerability analysis tasks. This framework offers a wide range of features, from real-time packet capture and analysis to the execution of various pentesting techniques such as fuzzing, deployment of webshells, creation of botnets, implementation of trojans (Rat), keylogging, port scanning with Nmap, and more. The interactive terminal interface provided by LazyOwn makes it easy to configure and execute these functions, providing users with an intuitive and powerful environment for conducting security tests. Additionally, LazyOwn offers the ability to save captured packets to a file for later analysis, facilitating research and incident tracking. Installation of LazyOwn is straightforward, simply by cloning the repository from GitHub and then installing the required dependencies via pip. Once installed, users can start the framework by running the python app.py command from the command line. For any questions or comments, users can contact the developer, Gris Iscomeback, through the channels provided on the official LazyOwn Framework website. In summary, LazyOwn Framework is a comprehensive tool that offers a centralized and automated solution for pentesting and vulnerability analysis needs, enabling cybersecurity professionals to conduct security tests efficiently and effectively.
Features
██▓ ▄▄▄ ▒███████▒▓██ ██▓ ▒█████ █ █░███▄ █ ▓██▒ ▒████▄ ▒ ▒ ▒ ▄▀░ ▒██ ██▒▒██▒ ██▒▓█░ █ ░█░██ ▀█ █ ▒██░ ▒██ ▀█▄ ░ ▒ ▄▀▒░ ▒██ ██░▒██░ ██▒▒█░ █ ░█▓██ ▀█ ██▒ ▒██░ ░██▄▄▄▄██ ▄▀▒ ░ ░ ▐██▓░▒██ ██░░█░ █ ░█▓██▒ ▐▌██▒ ░██████▒▓█ ▓██▒▒███████▒ ░ ██▒▓░░ ████▓▒░░░██▒██▓▒██░ ▓██░ ░ ▒░▓ ░▒▒ ▓▒█░░▒▒ ▓░▒░▒ ██▒▒▒ ░ ▒░▒░▒░ ░ ▓░▒ ▒ ░ ▒░ ▒ ▒ ░ ░ ▒ ░ ▒ ▒▒ ░░░▒ ▒ ░ ▒ ▓██ ░▒░ ░ ▒ ▒░ ▒ ░ ░ ░ ░░ ░ ▒░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ▒ ░░ ░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ █████▒██▀███ ▄▄▄ ███▄ ▄███▓▓█████ █ █░ ▒█████ ██▀███ ██ ▄█▀ ▓██ ▒▓██ ▒ ██▒▒████▄ ▓██▒▀█▀ ██▒▓█ ▀ ▓█░ █ ░█░▒██▒ ██▒▓██ ▒ ██▒ ██▄█▒ ▒████ ░▓██ ░▄█ ▒▒██ ▀█▄ ▓██ ▓██░▒███ ▒█░ █ ░█ ▒██░ ██▒▓██ ░▄█ ▒▓███▄░ ░▓█▒ ░▒██▀▀█▄ ░██▄▄▄▄██ ▒██ ▒██ ▒▓█ ▄ ░█░ █ ░█ ▒██ ██░▒██▀▀█▄ ▓██ █▄ ░▒█░ ░██▓ ▒██▒ ▓█ ▓██▒▒██▒ ░██▒░▒████▒░░██▒██▓ ░ ████▓▒░░██▓ ▒██▒▒██▒ █▄ ▒ ░ ░ ▒▓ ░▒▓░ ▒▒ ▓▒█░░ ▒░ ░ ░░░ ▒░ ░░ ▓░▒ ▒ ░ ▒░▒░▒░ ░ ▒▓ ░▒▓░▒ ▒▒ ▓▒ ░ ░▒ ░ ▒░ ▒ ▒▒ ░░ ░ ░ ░ ░ ░ ▒ ░ ░ ░ ▒ ▒░ ░▒ ░ ▒░░ ░▒ ▒░ ░ ░ ░░ ░ ░ ▒ ░ ░ ░ ░ ░ ░ ░ ░ ▒ ░░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ [⚠] Starting 👽 LazyOwn Framew0rk ☠ [;,;] Autor: grisUN0 [wlp2s0] 192.168.1.99 [tun0] 10.10.66.6 [*] Welcome to the LazyOwn Framework [;,;] release/0.1.22 [*] interactive sHell! Type ? to list commands [!] Please do not use in military or secret service organizations, [!] or for illegal purposes (this is non-binding, [!] these *** ignore laws and ethics anyway) [+] Github: https://github.com/grisuno/LazyOwn [+] Web: https://grisuno.github.io/LazyOwn/ [+] Reddit: https://www.reddit.com/r/LazyOwn/ [+] Facebook: https://web.facebook.com/profile.php?id=61560596232150 [+] hackTheBox: https://app.hackthebox.com/teams/overview/6429 [+] Patreon: https://patreon.com/LazyOwn
- README.html
- COMMANDS.html
- UTILS.html
- CHANGELOG.html
- Real-time packet capture
- Detailed packet analysis
- Interactive terminal interface
- Save captured packets to a file
- Fuzzing
- Webshellz
- BotNet
- Rat
- Keylogger
- Nmap
- Pwn
Modules
- lazysearch
- lazysearch_gui
- lazyown
- update_db
- lazynmap
- lazynmapdiscovery
- lazygptcli
- lazyburpfuzzer
- lazymetaextract0r
- lazyreverse_shell
- lazyattack
- lazyownratcli
- lazyownrat
- lazygath
- lazysniff
- lazynetbios
- lazybotnet
- lazybotcli
- lazyhoneypot
- lazysearch_bot
Installation
To get started with LazyOwn Framework, clone the repository and install the dependencies:
git clone https://github.com/grisuno/LazyOwn.git
cd LazyOwn
pip install -r requirements.txt
Usage
Run the Framework with the following command:
python app.py
Para codificar y decodificar payloads con esta app web, sí se te dificulta el uso de test_lazyencode_decode.py
https://lazyownencoderdecoder.onrender.com/Contact
For any questions or feedback, please reach out to Gris Iscomeback.
README LazyOwn Framework Pentesting t00lz
LazyOwn CRIME
██▓ ▄▄▄ ▒███████▒▓██ ██▓ ▒█████ █ █░███▄ █
▓██▒ ▒████▄ ▒ ▒ ▒ ▄▀░ ▒██ ██▒▒██▒ ██▒▓█░ █ ░█░██ ▀█ █
▒██░ ▒██ ▀█▄ ░ ▒ ▄▀▒░ ▒██ ██░▒██░ ██▒▒█░ █ ░█▓██ ▀█ ██▒
▒██░ ░██▄▄▄▄██ ▄▀▒ ░ ░ ▐██▓░▒██ ██░░█░ █ ░█▓██▒ ▐▌██▒
░██████▒▓█ ▓██▒▒███████▒ ░ ██▒▓░░ ████▓▒░░░██▒██▓▒██░ ▓██░
░ ▒░▓ ░▒▒ ▓▒█░░▒▒ ▓░▒░▒ ██▒▒▒ ░ ▒░▒░▒░ ░ ▓░▒ ▒ ░ ▒░ ▒ ▒
░ ░ ▒ ░ ▒ ▒▒ ░░░▒ ▒ ░ ▒ ▓██ ░▒░ ░ ▒ ▒░ ▒ ░ ░ ░ ░░ ░ ▒░
░ ░ ░ ▒ ░ ░ ░ ░ ░ ▒ ▒ ░░ ░ ░ ░ ▒ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░
LazyOwn comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under the terms of the GNU General Public License v3. See the LICENSE file for details about using this software.
# LazyOwn: Cyber Redteam Interface Management Environment Network (CRIMEN)
In the shadowy realm of cybersecurity, where digital fortresses are besieged by relentless adversaries, LazyOwn: CRIMEN emerges as a beacon of strategic prowess and technical mastery. This advanced and comprehensive toolkit is meticulously crafted for professional red teams, penetration testers, and security researchers, offering an unparalleled arsenal of over 333 meticulously designed attacks tailored for Linux/*nix/bsd/osx and Windows environments. Additionally, LazyOwn: CRIMEN integrates the extensive attack library of the Atomic RedTeam Framework, exponentially increasing its offensive capabilities.
LazyOwn: CRIMEN is not merely a tool; it is an ethereal manifestation of the art of cyber warfare, seamlessly integrating a myriad of functionalities to streamline and enhance the efficiency of security assessments. This interactive environment combines multiple tools and scripts, enabling cybersecurity professionals to navigate the complex labyrinth of the security assessment lifecycle with unmatched precision.
At the heart of LazyOwn: CRIMEN lies an intuitive command-line interface (CLI) powered by cmd2, complemented by a sophisticated web-based graphical user interface (GUI) developed in Flask. This dual interface allows users to configure specific parameters, execute custom scripts, and obtain real-time results, all from a single, unified platform. The framework’s advanced adversary simulation capabilities enable the generation of sessions for red team operations, meticulously executed within the scope defined in the payload.json file. This not only expands its range of applications but also enhances usability and accessibility through multiple interfaces.
One of the standout features of LazyOwn: CRIMEN is
its ability to schedule tasks using the cron
command,
facilitating persistent and automated threat simulations. This
functionality transforms LazyOwn: CRIMEN into a
formidable Advanced Persistent Threat (APT) framework, capable of
mimicking the relentless and methodical attacks of sophisticated cyber
adversaries.
Why CRIMEN?
CRIMEN stands for Cyber Redteam Interface Management Environment Network, encapsulating the essence of this powerful framework. Each letter in the acronym represents a critical component of its capabilities:
- Cyber: Emphasizes the digital battleground where LazyOwn: CRIMEN operates, encompassing all aspects of cybersecurity.
- Redteam: Highlights the framework’s primary function as a tool for red team operations, simulating real-world cyber attacks to test and strengthen defenses.
- Interface: Refers to the intuitive and user-friendly interfaces, both CLI and GUI, that facilitate seamless interaction and control.
- Management: Underscores the framework’s ability to manage and orchestrate complex security assessments and adversary simulations.
- Environment: Denotes the comprehensive and immersive environment provided by LazyOwn: CRIMEN, integrating various tools and scripts for a holistic security assessment experience.
- Network: Emphasizes the framework’s network-centric approach, enabling persistent and automated threat simulations across diverse network environments.
Key Features of LazyOwn: CRIMEN
- Comprehensive Attack Library: Over 333 crafted attacks for various environments, each a testament to the framework’s depth and versatility, augmented by the extensive attack library of the Atomic RedTeam Framework.
- Interactive CLI: Based on cmd2, offering an intuitive and efficient command-line experience.
- Web GUI: Developed in Flask, providing a user-friendly interface for seamless interaction.
- Adversary Simulation: Advanced capabilities for generating red team operation sessions, ensuring meticulous and effective simulations.
- Task Scheduling: Utilize the
cron
command to schedule and automate tasks, enabling persistent threat simulations. - Real-Time Results: Obtain immediate feedback and results from security assessments, ensuring timely and accurate insights.
- RAT and Botnet Capabilities: Includes features for remote access and control, allowing for the management of botnets and persistent threats.
- C2 Framework: Acts as a command and control (C2) framework, enabling covert communication and control over compromised systems.
Command Capabilities
LazyOwn: CRIMEN offers a rich set of commands that can be executed from both the CLI and the web interface, each designed to empower users with unparalleled control and flexibility:
- list: Enumerates all available LazyOwn Modules within the framework, providing a comprehensive overview of the toolkit’s capabilities.
- assign
assign rhost 192.168.1.1
to define the target IP address, ensuring precise and tailored attacks. - show: Displays the current values of all configured parameters, offering a clear and concise view of the operational setup.
- **run