{ "info": { "author": "SofianeHamlaoui", "author_email": "s0fianehaml40u1@gmal.com", "bugtrack_url": null, "classifiers": [ "License :: OSI Approved :: GNU General Public License v3 (GPLv3)", "Operating System :: OS Independent", "Programming Language :: Python :: 3" ], "description": "

\n \n

\n

\n
\nLockdoor Pentesting Framework

\n [~] Tested on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin) [~]\n

\n

\n !NEWS!

\n

\n [~] Version 1.0 Beta IS OUT !!
\n

\n\nVersions:\n=========\n09/2019 : 1.0Beta\n-----------------\n\n> - Information Gathring Tools (21)\n> - Web Hacking Tools(15)\n> - Reverse Engineering Tools (15)\n> - Exploitation Tools (6)\n> - Pentesting & Security Assessment Findings Report Templates (6)\n> - Password Attack Tools (4)\n> - Shell Tools + Blackarch's Webshells Collection (4)\n> - Walk Throughs & Pentest Processing Helpers (3)\n> - Encryption/Decryption Tools (2)\n> - Social Engineering tools (1)\n> - All you need as Privilege Escalation scripts and exploits\n> - Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin)\n\n![image](https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/test.gif)\n\n09/2019 : 1.0_TEST\n-------------------\n\n> - Information Gathring tools (20)\n> - Web Hacking Tools (14)\n> - Working on Kali,Ubuntu,Arch,Fedora,Opensuse and Windows (Cygwin)\n> - Some bugs That I'm fixing with time so don't worry about that.\n> - Test :\n![image](https://raw.githubusercontent.com/SofianeHamlaoui/Lockdoor-Framework/master/pictures/gifs/kali.gif)\n\n Check the Wiki Pages to know more about the tool.\n ------------\n - The Wiki pages :\n - [Lockdoor Wiki page Home](https://github.com/SofianeHamlaoui/Lockdoor-Framework/wiki)\n - [Lockdoor Demos](ttps://github.com/SofianeHamlaoui/Lockdoor-Framework/wiki/Demos\n - [Lockdoor Screenshots](https://github.com/SofianeHamlaoui/Lockdoor-Framework/wiki/Screenshots)\n\n Overview\n ----------\n *LockDoor* is a Framework aimed at **helping penetration testers, bug bounty hunters And cyber security engineers**.\n This tool is designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. But containing the favorite and the most used tools by Pentesters.\n As pentesters, most of us has his personal ' /pentest/ ' directory so this Framework is helping you to build a perfect one.\n\n\n Features\n ------------\n Added value : (what makes it different from other frameworks).\n\n Pentesting Tools Selection:\n --------------------------\n\n - **Tools ?**: **Lockdoor** doesn't contain all pentesting tools (Added value) , let's be honest ! Who ever used all the Tools you find on all those Penetration Testing distributions ? Lockdoor contains only the favorite (Added value) and the most used toolsby Pentesters (Added value).\n - **what Tools ?**: the tools contains **Lockdoor** are a collection from the best tools (Added value) on Kali,Parrot Os and BlackArch. Also some private tools (Added value) from some other hacking teams (Added value) like InurlBr, iran-cyber. Without forgeting some cool and amazing tools I found on Github made by some perfect human beigns (Added value).\n - **Easy Customization**: Easily add/remove tools. (Added value)\n\n Resources and cheatsheets: (Added value)\n --------------------------\n\n - **Resources**: That's what makes **Lockdoor** Added value, Lockdoor Doesn't contain only tools ! Pentesing and Security Assessment Findings Reports templates (Added value) , Pentesting walkthrough examples and tempales (Added value) and more.\n\n - **Cheatsheets**: Everyone can forget something on processing or a tool use, or even some trciks. Here comes the Cheatsheets (Added value) role ! there are cheatsheets about everything, every tool on the framework and any enumeration,exploitation and post-exploitation techniques.\n\n\nLockdoor Tools contents:\n------------------------\n\n**Information Gathering**:\n\n> Tools:\n> - dirsearch : A Web path scanner\n> - brut3k1t : security-oriented bruteforce framework\n> - gobuster : DNS and VHost busting tool written in Go\n> - Enyx : an SNMP IPv6 Enumeration Tool\n> - Goohak : Launchs Google Hacking Queries Against A Target Domain \n> - Nasnum : The NAS Enumerator\n> - Sublist3r : Fast subdomains enumeration tool for penetration testers\n> - wafw00f : identify and fingerprint Web Application Firewall\n> - Photon : ncredibly fast crawler designed for OSINT.\n> - Raccoon : offensive security tool for reconnaissance and vulnerability scanning \n> - DnsRecon : DNS Enumeration Script\n> - sherlock : Find usernames across social networks\n> - snmpwn : An SNMPv3 User Enumerator and Attack tool\n> - Striker : an offensive information and vulnerability scanner.\n> - theHarvester : E-mails, subdomains and names Harvester\n> - URLextractor : Information gathering & website reconnaissance \n> - denumerator.py : Enumerates list of subdomains\n> - other : other Information gathering,recon and Enumeration scripts I collected somewhere. \n> - Frameworks:\n> : - ReconDog : Reconnaissance Swiss Army Knife\n> : - RED\\_HAWK : All in one tool for Information Gathering, Vulnerability Scanning and Crawling\n> : - TIDoS : Offensive Manual Web Application Penetration Testing Framework.\n> : - Dracnmap : Info Gathering Framework\n\n**Web Hacking**:\n> Tools:\n> - Spaghetti : Spaghetti - Web Application Security Scanner\n> - HTTPoxyScan : HTTPoxy Exploit Scanner by 1N3\n> - CMSmap : CMS scanner\n> - BruteXSS : BruteXSS is a tool to find XSS vulnerabilities in web application\n> - J-dorker : Website List grabber from Bing\n> - droopescan : scanner , identify , CMSs , Drupal , Silverstripe.\n> - ptiva : Web Application Scanne\n> - V3n0M : Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns\n> - Priv8SqliTool : Find Sqli Targets v\n> - SqliV : massive SQL injection vulnerability scanner\n> - AtScan : Advanced dork Search & Mass Exploit Scanner\n> - WPSeku : Wordpress Security Scanner\n> - WpBrute : Wordpress BruteForce Tools\n> - Wpscan : A simple Wordpress scanner written in python\n> - B7S-ToolB0x : Wordpress vulnerability scanner\n> - XSStrike : Most advanced XSS scanner.\n> - joomscan : Joomla Vulnerability Scanner Project\n> - Frameworks:\n> : - Dzjecter : Server checking Tool\n> : - W3af : web application attack and audit framework\n\n**Privilege Escalation**:\n\n>Linux :\n> - Scripts :\n> - linux\\_checksec.sh\n> - linux\\_enum.sh\n> - linux\\_gather\\_files.sh\n> - linux\\_kernel\\_exploiter.pl\n> - linux\\_privesc.py\n> - linux\\_privesc.sh\n> - linux\\_security\\_test\n> - Linux_exploits folder\n>\n>Windows :\n> - windows-privesc-check.py\n> - windows-privesc-check.exe\n>\n>MySql :\n> - raptor\\_udf.c\n> - raptor\\_udf2.c\n>\n**Reverse Engineering**:\n\n\n> - Radare2 : unix-like reverse engineering framework\n> - VirtusTotal : VirusTotal tools\n> - Miasm : Reverse engineering framework\n> - Mirror : reverses the bytes of a file\n> - DnSpy : .NET debugger and assembly\n> - DLLRunner : a smart DLL execution script for malware analysis in sandbox systems.\n> - Fuzzy Server : a Program That Uses Pre-Made Spike Scripts to Attack VulnServer.\n> - yara : a tool aimed at helping malware researchers toidentify and classify malware samples\n> - Spike : a protocol fuzzer creation kit + audits\n> - other : other scripts collected somewhere\n\n**Exploitation**:\n\n\n> - Findsploit : Find exploits in local and online databases instantly\n> - MassExpConsole : concurrent exploiting\n> - Pompem : Exploit and Vulnerability Finder\n> - rfix : Python tool that helps RFI exploitation.\n> - InUrlBr : Advanced search in search engines\n> - linux-exploit-suggester2 : Next-Generation Linux Kernel Exploit Suggester\n> - other : other scripts I collected somewhere.\n\n**Shells**:\n\n> - WebShells : Webshells Collection\n> - ShellSum : A defense tool - detect web shells in local directories\n> - Weevely : Weaponized web shell\n> - python-pty-shells : Python PTY backdoors\n\n**Password Attacks**:\n\n\n> - crunch : a wordlist generator\n> - CeWL : a Custom Word List Generator\n> - patator : a multi-purpose brute-forcer, with a modular design and a flexible usage\n\n**Encryption - Decryption**: \n\n> - Codetective : a tool to determine the crypto/encoding algorithm used \n> - findmyhash : Python script to crack hashes using online services \n> - hashID : Software to identify the different types of hashes\n\n**Post Exploitation:**:\n\n\n> - TheFatRat : massive exploiting tool\n\n**Reverse Engineering**:\n\n\n> - scythe : an accounts enumerator\n\n Lockdoor Resources contents:\n ------------------------------\n\n**Information Gathering**:\n\n\n> - [Cheatsheet\\_SMBEnumeration](ToolsResources/INFO-GATH/CHEATSHEETS/Cheatsheet_SMBEnumeration.txt)\n> - [configuration\\_management](ToolsResources/INFO-GATH/CHEATSHEETS/configuration_management.md)\n> - [dns\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/dns_enumeration.md)\n> - [file\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/file_enumeration.md)\n> - [http\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/http_enumeration.md)\n> - [information\\_gathering\\_owasp\\_guide](ToolsResources/INFO-GATH/CHEATSHEETS/information_gathering_owasp_guide.md)\n> - [miniserv\\_webmin\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/miniserv_webmin_enumeration.md)\n> - [ms\\_sql\\_server\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/ms_sql_server_enumeration.md)\n> - [nfs\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/nfs_enumeration.md)\n> - [osint\\_recon\\_ng](ToolsResources/INFO-GATH/CHEATSHEETS/osint_recon_ng.md)\n> - [passive\\_information\\_gathering](ToolsResources/INFO-GATH/CHEATSHEETS/passive_information_gathering.md)\n> - [pop3\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/pop3_enumeration.md)\n> - [ports\\_emumeration](ToolsResources/INFO-GATH/CHEATSHEETS/ports_emumeration.md)\n> - [rpc\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/rpc_enumeration.md)\n> - [scanning](ToolsResources/INFO-GATH/CHEATSHEETS/scanning.md)\n> - [smb\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/smb_enumeration.md)\n> - [smtp\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/smtp_enumeration.md)\n> - [snmb\\_enumeration](ToolsResources/INFO-GATH/CHEATSHEETS/snmb_enumeration.md)\n> - [vulnerability\\_scanning](ToolsResources/INFO-GATH/CHEATSHEETS/vulnerability_scanning.md)\n\n**Crypto**:\n\n\n> - [Crypto101.pdf](ToolsResources/ENCRYPTION/Crypto101.pdf)\n\n**Exploitation**:\n\n\n> - [computer\\_network\\_exploits](ToolsResources/EXPLOITATION/CHEATSHEETS/computer_network_exploits.md)\n> - [file\\_inclusion\\_vulnerabilities](ToolsResources/EXPLOITATION/CHEATSHEETS/file_inclusion_vulnerabilities.md)\n> - [File\\_Transfers](ToolsResources/EXPLOITATION/CHEATSHEETS/File_Transfers.md)\n> - [nc\\_transfers](ToolsResources/EXPLOITATION/CHEATSHEETS/nc_transfers.txt)\n> - [networking\\_pivoting\\_and\\_tunneling](ToolsResources/EXPLOITATION/CHEATSHEETS/networking_pivoting_and_tunneling.md)\n> - [network\\_pivoting\\_techniques](ToolsResources/EXPLOITATION/CHEATSHEETS/network_pivoting_techniques.md)\n> - [pivoting](ToolsResources/EXPLOITATION/CHEATSHEETS/pivoting.md)\n> - [pivoting\\_](ToolsResources/EXPLOITATION/CHEATSHEETS/pivoting_.md)\n> - [Public Exploits](ToolsResources/EXPLOITATION/CHEATSHEETS/Public%20Exploits.md)\n> - [reverse\\_shell\\_with\\_msfvenom](ToolsResources/EXPLOITATION/CHEATSHEETS/reverse_shell_with_msfvenom.md)\n\n**Networking**:\n\n\n> - [bpf\\_syntax](ToolsResources/NETWORKING/bpf_syntax.md)\n> - [Cheatsheet\\_Networking](ToolsResources/NETWORKING/Cheatsheet_Networking.txt)\n> - [Cheatsheet\\_Oracle](ToolsResources/NETWORKING/Cheatsheet_Oracle.txt)\n> - [networking\\_concept](ToolsResources/NETWORKING/networking_concept)\n> - [nmap\\_quick\\_reference\\_guide](ToolsResources/NETWORKING/nmap_quick_reference_guide.pdf)\n> - [tcpdump](ToolsResources/NETWORKING/tcpdump.pdf)\n\n**Password Attacks**:\n\n\n> - [password\\_attacks](ToolsResources/PASSWORD/CHEATSHEETS/password_attacks.md)\n> - [Some-Links-To-Wordlists](ToolsResources/PASSWORD/CHEATSHEETS/Some-Links-To-Wordlists.txt)\n\n**Post Exploitation**:\n\n\n> - [Cheatsheet\\_AVBypass](ToolsResources/POST-EXPL/CHEATSHEETS/Cheatsheet_AVBypass.txt)\n> - [Cheatsheet\\_BuildReviews](ToolsResources/POST-EXPL/CHEATSHEETS/Cheatsheet_BuildReviews.txt)\n> - [code-execution-reverse-shell-commands](ToolsResources/POST-EXPL/CHEATSHEETS/code-execution-reverse-shell-commands.txt)\n> - [important-linux-serv-files](ToolsResources/POST-EXPL/CHEATSHEETS/important-linux-serv-files.txt)\n\n**Privilege Escalation**:\n\n\n> - [Cheatsheet\\_LinuxPrivilegeEsc](ToolsResources/PrivEsc/CHEATSHEETS/Cheatsheet_LinuxPrivilegeEsc.txt)\n> - [linux\\_enumeration](ToolsResources/PrivEsc/CHEATSHEETS/linux_enumeration.md)\n> - [windows\\_enumeration](ToolsResources/PrivEsc/CHEATSHEETS/windows_enumeration.md)\n> - [windows\\_priv\\_escalation](ToolsResources/PrivEsc/CHEATSHEETS/windows_priv_escalation.md)\n> - [windows\\_priv\\_escalation\\_practical](ToolsResources/PrivEsc/CHEATSHEETS/windows_priv_escalation_practical.md)\n\n**Pentesting & Security Assessment Findings Report Templates**:\n\n\n- [Demo Company - Security Assessment Findings Report.docx](ToolsResources/REPORT/TEMPLATES/Demo%20Company%20-%20Security%20Assessment%20Findings%20Report.docx)\n- [linux-template.md](ToolsResources/REPORT/TEMPLATES/linux-template.md)\n- [PWKv1-REPORT.doc](ToolsResources/REPORT/TEMPLATES/PWKv1-REPORT.doc) \n- [pwkv1\\_report.doc](ToolsResources/REPORT/TEMPLATES/pwkv1_report.doc) \n- [template-penetration-testing-report-v03.pdf](ToolsResources/REPORT/TEMPLATES/template-penetration-testing-report-v03.pdf)\n- [windows-template.md](ToolsResources/REPORT/TEMPLATES/windows-template.md)\n\n**Reverse Engineering**:\n\n\n> - [Buffer\\_Overflow\\_Exploit](ToolsResources/REVERSE/CHEATSHEETS/Buffer_Overflow_Exploit.md)\n> - [buffer\\_overflows](ToolsResources/REVERSE/CHEATSHEETS/buffer_overflows.md)\n> - [gdb\\_cheat\\_sheet](ToolsResources/REVERSE/CHEATSHEETS/gdb_cheat_sheet.pdf)\n> - [r2\\_cheatsheet](ToolsResources/REVERSE/CHEATSHEETS/r2_cheatsheet.pdf)\n> - [win32\\_buffer\\_overflow\\_exploitation](ToolsResources/REVERSE/CHEATSHEETS/win32_buffer_overflow_exploitation.md)\n> - [64\\_ia\\_32\\_jmp\\_instructions](ToolsResources/REVERSE/CHEATSHEETS/assembly/64_ia_32_jmp_instructions.pdf)\n> - [course\\_notes](ToolsResources/REVERSE/CHEATSHEETS/assembly/course_notes.md)\n> - [debuging](ToolsResources/REVERSE/CHEATSHEETS/assembly/debuging.md)\n> - [IntelCodeTable\\_x86](ToolsResources/REVERSE/CHEATSHEETS/assembly/IntelCodeTable_x86.pdf)\n> - [Radare2 cheatsheet](ToolsResources/REVERSE/CHEATSHEETS/assembly/Radare2%20cheat%20sheet.txt)\n> - [x86\\_assembly\\_x86\\_architecture](ToolsResources/REVERSE/CHEATSHEETS/assembly/x86_assembly_x86_architecture.pdf)\n> - [x86\\_opcode\\_structure\\_and\\_instruction\\_overview](ToolsResources/REVERSE/CHEATSHEETS/assembly/x86_opcode_structure_and_instruction_overview.png)\n\n**Social Engineering**:\n\n> - [social\\_engineering](ToolsResources/SOCIAL_ENGINEERING/CHEATSHEETS/social_engineering.md)\n\n**Walk Throughs**:\n\n> - [Cheatsheet\\_PenTesting.txt](ToolsResources/WALK/Cheatsheet_PenTesting.txt)\n> - [OWASP Testing Guide v4](ToolsResources/WALK/OTGv4.pdf)\n> - [OWASPv4\\_Checklist.xlsx](ToolsResources/WALK/OWASPv4_Checklist.xlsx)\n\n**Web Hacking**:\n\n\n> - [auxiliary\\_info.md](ToolsResources/WEB/CHEATSHEETS/auxiliary_info.md)\n> - [Cheatsheet\\_ApacheSSL](ToolsResources/WEB/CHEATSHEETS/Cheatsheet_ApacheSSL.txt)\n> - [Cheatsheet\\_AttackingMSSQL](ToolsResources/WEB/CHEATSHEETS/Cheatsheet_AttackingMSSQL.txt)\n> - [Cheatsheet\\_DomainAdminExploitation](ToolsResources/WEB/CHEATSHEETS/Cheatsheet_DomainAdminExploitation.txt)\n> - [Cheatsheet\\_SQLInjection](ToolsResources/WEB/CHEATSHEETS/Cheatsheet_SQLInjection.txt)\n> - [Cheatsheet\\_VulnVerify.txt](ToolsResources/WEB/CHEATSHEETS/Cheatsheet_VulnVerify.txt)\n> - [code-execution-reverse-shell-commands](ToolsResources/WEB/CHEATSHEETS/code-execution-reverse-shell-commands.txt)\n> - [file\\_upload.md](ToolsResources/WEB/CHEATSHEETS/file_upload.md)\n> - [html5\\_cheat\\_sheet](ToolsResources/WEB/CHEATSHEETS/html5_cheat_sheet.pdf)\n> - [jquery\\_cheat\\_sheet\\_1.3.2](ToolsResources/WEB/CHEATSHEETS/jquery_cheat_sheet_1.3.2.pdf)\n> - [sqli](ToolsResources/WEB/CHEATSHEETS/sqli.md)\n> - [sqli\\_cheatsheet](ToolsResources/WEB/CHEATSHEETS/sqli_cheatsheet.md)\n> - [sqli-quries](ToolsResources/WEB/CHEATSHEETS/sqli-quries.txt)\n> - [sqli-tips](ToolsResources/WEB/CHEATSHEETS/sqli-tips.txt)\n> - [web\\_app\\_security](ToolsResources/WEB/CHEATSHEETS/web_app_security.md)\n> - [web\\_app\\_vulns\\_Arabic](ToolsResources/WEB/CHEATSHEETS/web_app_vulns_Arabic.md)\n> - [Xss\\_1](ToolsResources/WEB/CHEATSHEETS/xss.md)\n> - [Xss\\_2](ToolsResources/WEB/CHEATSHEETS/xss.png)\n> - [xss\\_actionscript](ToolsResources/WEB/CHEATSHEETS/xss_actionscript)\n> - [xxe](ToolsResources/WEB/CHEATSHEETS/xxe.md)\n\n**Other**:\n\n> - Security\n> : - [Best Version of BriskSec Security Cheatsheets](https://sofianehamlaoui.github.io/Security-Cheatsheets/index.html)\n> - [Images (I'll let you discover that)](ToolsResources/IMAGES/)\n> - [Google Hacking DataBase](ToolsResources/GHDB.pdf)\n> - [Google Fu](ToolsResources/Google%20FU.pdf)\n\n\n", "description_content_type": "text/markdown", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "https://github.com/SofianeHamlaoui/Lockdoor-Framework", "keywords": "", "license": "GPL-3.0", "maintainer": "", "maintainer_email": "", "name": "lockdoor", "package_url": "https://pypi.org/project/lockdoor/", "platform": "", "project_url": "https://pypi.org/project/lockdoor/", "project_urls": { "Homepage": "https://github.com/SofianeHamlaoui/Lockdoor-Framework" }, "release_url": "https://pypi.org/project/lockdoor/1.8/", "requires_dist": [ "requests" ], "requires_python": "", "summary": "Lockdoor Framework : A Penetration Testing framework", "version": "1.8" }, "last_serial": 5854304, "releases": { "0.5": [ { "comment_text": "", "digests": { "md5": "03b314c7eec173f2d87e2fbb1e37fc1b", "sha256": "7c2df232c46fe98698ed51a31d10693f21d77ad66e6e815e7db5a85b481f1658" }, "downloads": -1, "filename": "lockdoor-0.5-py3-none-any.whl", "has_sig": false, "md5_digest": "03b314c7eec173f2d87e2fbb1e37fc1b", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 28175, "upload_time": "2019-09-12T05:09:41", "url": "https://files.pythonhosted.org/packages/ac/d4/4628a8d873d97fbb4f3ceb8f51cc0fa94512504b8b6d89f1a1291d453e47/lockdoor-0.5-py3-none-any.whl" } ], "0.6": [ { "comment_text": "", "digests": { "md5": "576a5236431a099a2dba6abbb89bbf83", "sha256": "604fcc1ce962d634a4e9eedd6bae05977e468bd0dda45a0f979fc83195eaa50f" }, "downloads": -1, "filename": "lockdoor-0.6-py3-none-any.whl", "has_sig": false, "md5_digest": "576a5236431a099a2dba6abbb89bbf83", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 28162, "upload_time": "2019-09-12T05:52:35", "url": "https://files.pythonhosted.org/packages/39/8e/d5cb27ec098d0aac83f114310a338df5d849fb83425e2c7c3c6961594767/lockdoor-0.6-py3-none-any.whl" } ], "1.7": [ { "comment_text": "", "digests": { "md5": "2d911e2730525466200475b31667d3e2", "sha256": "e52062a52c998d0d6795fae5570cd42c3bad831c7213800b603ef622f4670364" }, "downloads": -1, "filename": "lockdoor-1.7-py3-none-any.whl", "has_sig": false, "md5_digest": "2d911e2730525466200475b31667d3e2", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 21857, "upload_time": "2019-09-15T02:51:25", "url": "https://files.pythonhosted.org/packages/e6/09/f8f90c5e20fac9e5b3fbc961cf5d9b7baacec3a480397db010b0fa6db874/lockdoor-1.7-py3-none-any.whl" } ], "1.8": [ { "comment_text": "", "digests": { "md5": "f84bf38362c17be0924bcef06bd61892", "sha256": "6437d6405d01a4c1a9cfba53890c9986d8a8bc707b4d6a309ae3787af2e5cd96" }, "downloads": -1, "filename": "lockdoor-1.8-py3-none-any.whl", "has_sig": false, "md5_digest": "f84bf38362c17be0924bcef06bd61892", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 21904, "upload_time": "2019-09-19T06:36:53", "url": "https://files.pythonhosted.org/packages/4d/79/d8013d3f040ff4e260b4ca0a15452ed2acbab57c9c58a2e9877be3138ad8/lockdoor-1.8-py3-none-any.whl" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "f84bf38362c17be0924bcef06bd61892", "sha256": "6437d6405d01a4c1a9cfba53890c9986d8a8bc707b4d6a309ae3787af2e5cd96" }, "downloads": -1, "filename": "lockdoor-1.8-py3-none-any.whl", "has_sig": false, "md5_digest": "f84bf38362c17be0924bcef06bd61892", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 21904, "upload_time": "2019-09-19T06:36:53", "url": "https://files.pythonhosted.org/packages/4d/79/d8013d3f040ff4e260b4ca0a15452ed2acbab57c9c58a2e9877be3138ad8/lockdoor-1.8-py3-none-any.whl" } ] }