Setting Up LanManVan: Your Modular Security Framework in Minutes
Hey there, fellow security researcher! π
A few months ago, I started working on a personal project to create a flexible and powerful tool for security research and penetration testing. I wanted something inspired by Metasploit β an interactive framework where I could easily load, manage, and run different modules without dealing with heavy dependencies or complex setups.
At first, I considered building it in Python (like many similar tools), but then I chose Go. Why? Go offers incredible performance, seamless cross-compilation, single binary output, and amazing concurrency support β all perfect for a CLI tool that needs to feel snappy and reliable, even when running multiple tasks or handling modules efficiently.
And so, LanManVan was born β and now it's ready for YOU to use!
Since the initial release, we've added dynamic module installation from GitHub repos, a standalone Python module manager (lmv_module), and the basic81 pack with over 80 battle-tested modules for recon, web testing, network attacks, encoding/decoding, and more.
Today, I'll walk you through the complete setup process β from clone to running your first module in under 5 minutes.
Prerequisites
Linux (recommended) or WSL2 on Windows
Go 1.20+
Git
Python 3 (for Python modules)
- That's it! No Docker, no virtualenvs, no headaches.
Step 1: Clone the Repository
git clone https://github.com/hmZa-Sfyn/lanmanvan.git
cd lanmanvan
Step 2: Run the Magic Setup Script
The project ships with a smart setup.sh that does everything automatically:
chmod +x setup.sh
./setup.sh
Here's what happens behind the scenes:
-
Builds the Go binary β
~/bin/lanmanvan(single executable!) -
Creates directories β
~/lanmanvan/modules -
Detects repos from
modules/repo_url.yaml -
Prompts for module packs β say Y to
basic81to grab 80+ modules!
You'll see output like this:
Download module repo 'basic81'[](https://github.com/Lanmanvan-Org/basic81)? [Y/n]: y
Cloning basic81...
β Cloned basic81 successfully
β Copied module: portscan
β Copied module: ip-geolocation
β Copied module: http-fuzzer
β Copied module: wifi-scanner
... [80+ more modules!]
It auto-detects modules via module.yaml files and copies them perfectly.
Step 3: Reload Your Shell
source ~/.zshrc # or source ~/.bashrc
Step 4: Launch LanManVan!
lanmanvan
Boom! π
You'll get the epic ASCII banner and interactive shell:
Type ls to see your 80+ modules loaded and ready!
Bonus: Module Management with lmv_module
The setup also installs a standalone Python module manager β no need to launch the full console!
# List modules
lmv_module list
# Update basic81 pack
lmv_module install repo=basic81
# Install from any URL
lmv_module install repo=https://github.com/Lanmanvan-Org/basic81
# Nuke wifi modules
lmv_module remove name="wifi-*"
One-Command Updates
lmv_update
Pulls latest code + re-runs setup. Zero effort.
Try It Live!
IP Geolocation (one of my favorites):
hmza@0root β― ip-geolocation 8.8.8.8
[+] IP: 8.8.8.8
π Country: United States
π City: Mountain View
πΊοΈ Coordinates: 37.4056, -122.0775
... [full details!]
Quick Spider (web crawler):
hmza@0root β― quick-spider --target example.com --threads 10
Tech Stack
- Core: Go (single binary, blazing fast)
- Modules: Python3/Bash (easy to write!)
-
Module Manager: Python3 (
lmv_module.py) - Linux native (WSL works perfectly)
Get Involved!
Fully open source (MIT): https://github.com/hmZa-Sfyn/lanmanvan
Contributions welcome! New modules? UI tweaks? Bug fixes? Ideas? Open a PR!
Thanks for reading β now go install LanManVan and start hacking (ethically, of course)! π
Tags: golang, cybersecurity, penetration-testing, red-team, open-source, metasploit, cli-tools, security-framework



Top comments (0)