2020-08-14 11:11:59 +00:00
|
|
|
import os
|
|
|
|
|
|
2026-03-15 08:25:04 +00:00
|
|
|
from core import HackingTool, HackingToolsCollection, console
|
2020-08-14 11:11:59 +00:00
|
|
|
|
2025-10-14 06:02:18 +00:00
|
|
|
from rich.panel import Panel
|
|
|
|
|
from rich.prompt import Prompt
|
|
|
|
|
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
class Vegile(HackingTool):
|
|
|
|
|
TITLE = "Vegile - Ghost In The Shell"
|
2026-03-15 08:30:55 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
2020-08-14 11:11:59 +00:00
|
|
|
DESCRIPTION = "This tool will set up your backdoor/rootkits when " \
|
|
|
|
|
"backdoor is already setup it will be \n" \
|
|
|
|
|
"hidden your specific process,unlimited your session in " \
|
|
|
|
|
"metasploit and transparent."
|
|
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/Screetsec/Vegile.git",
|
2020-08-14 11:11:59 +00:00
|
|
|
"cd Vegile && sudo chmod +x Vegile"
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd Vegile && sudo bash Vegile"]
|
|
|
|
|
PROJECT_URL = "https://github.com/Screetsec/Vegile"
|
|
|
|
|
|
|
|
|
|
def before_run(self):
|
2026-03-15 08:25:05 +00:00
|
|
|
console.print(
|
|
|
|
|
"[bold magenta]Vegile commands:[/]\n"
|
|
|
|
|
" Vegile -i / --inject [backdoor/rootkit]\n"
|
|
|
|
|
" Vegile -u / --unlimited [backdoor/rootkit]\n"
|
|
|
|
|
" Vegile -h / --help"
|
|
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class ChromeKeyLogger(HackingTool):
|
|
|
|
|
TITLE = "Chrome Keylogger"
|
2026-03-15 08:30:55 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
2020-08-14 11:11:59 +00:00
|
|
|
DESCRIPTION = "Hera Chrome Keylogger"
|
|
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/UndeadSec/HeraKeylogger.git",
|
2020-08-14 11:11:59 +00:00
|
|
|
"cd HeraKeylogger && sudo apt-get install python3-pip -y && sudo pip3 install -r requirements.txt"
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd HeraKeylogger && sudo python3 hera.py"]
|
|
|
|
|
PROJECT_URL = "https://github.com/UndeadSec/HeraKeylogger"
|
|
|
|
|
|
|
|
|
|
|
Phase 10: Add modern tools across 6 categories
Information Gathering (+7):
theHarvester, Amass, Masscan, RustScan, Holehe, Maigret, httpx
Web Attack (+6):
Nuclei, ffuf, Feroxbuster, Nikto, wafw00f, Katana
Wordlist/Password (+3):
Hashcat, John the Ripper, haiti
Wireless Attack (+3):
Airgeddon, hcxdumptool, hcxtools
Forensics (+2):
Volatility3, Binwalk
Post Exploitation (+1):
pwncat-cs
2026-03-15 08:34:39 +00:00
|
|
|
class PwncatCS(HackingTool):
|
|
|
|
|
TITLE = "pwncat-cs (Reverse Shell Handler)"
|
|
|
|
|
DESCRIPTION = (
|
|
|
|
|
"Post-exploitation platform — manages reverse/bind shells with automation.\n"
|
|
|
|
|
"Handles file upload/download, persistence, privilege escalation.\n"
|
|
|
|
|
"Usage: pwncat-cs -lp 4444"
|
|
|
|
|
)
|
|
|
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
INSTALL_COMMANDS = ["pip install --user pwncat-cs"]
|
|
|
|
|
RUN_COMMANDS = ["pwncat-cs --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/calebstewart/pwncat"
|
|
|
|
|
|
|
|
|
|
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
class Sliver(HackingTool):
|
|
|
|
|
TITLE = "Sliver (C2 Framework)"
|
|
|
|
|
DESCRIPTION = "Cross-platform adversary emulation/red team C2 framework — mTLS, HTTP(S), DNS, WireGuard."
|
|
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 14:25:00 +00:00
|
|
|
"curl -sSf https://sliver.sh/install -o /tmp/sliver-install.sh",
|
|
|
|
|
"sudo bash /tmp/sliver-install.sh",
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["sliver --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/BishopFox/sliver"
|
|
|
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Havoc(HackingTool):
|
|
|
|
|
TITLE = "Havoc (C2 Framework)"
|
|
|
|
|
DESCRIPTION = "Modern post-exploitation C2 framework with EDR evasion. Cobalt Strike alternative."
|
2026-03-15 14:25:00 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/HavocFramework/Havoc.git",
|
|
|
|
|
"cd Havoc && make",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd Havoc && ./havoc --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/HavocFramework/Havoc"
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class PEASSng(HackingTool):
|
|
|
|
|
TITLE = "PEASS-ng — LinPEAS/WinPEAS (Priv Esc)"
|
|
|
|
|
DESCRIPTION = "Privilege escalation enumeration scripts for Linux and Windows."
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"curl -sSL https://github.com/peass-ng/PEASS-ng/releases/latest/download/linpeas.sh -o linpeas.sh",
|
|
|
|
|
"chmod +x linpeas.sh",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["./linpeas.sh --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/peass-ng/PEASS-ng"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class LigoloNg(HackingTool):
|
|
|
|
|
TITLE = "Ligolo-ng (Tunneling/Pivoting)"
|
|
|
|
|
DESCRIPTION = "Advanced tunneling/pivoting tool using TUN interfaces — no SOCKS needed."
|
|
|
|
|
REQUIRES_GO = True
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"go install github.com/nicocha30/ligolo-ng@latest",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["ligolo-ng --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/nicocha30/ligolo-ng"
|
|
|
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class ChiselTunnel(HackingTool):
|
|
|
|
|
TITLE = "Chisel (HTTP Tunnel)"
|
|
|
|
|
DESCRIPTION = "Fast TCP/UDP tunnel over HTTP, secured via SSH — pivoting and port forwarding."
|
|
|
|
|
REQUIRES_GO = True
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"go install github.com/jpillora/chisel@latest",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["chisel --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/jpillora/chisel"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class EvilWinRM(HackingTool):
|
|
|
|
|
TITLE = "Evil-WinRM (Windows Remote Shell)"
|
|
|
|
|
DESCRIPTION = "Ultimate WinRM shell for hacking/pentesting Windows machines."
|
|
|
|
|
REQUIRES_RUBY = True
|
|
|
|
|
INSTALL_COMMANDS = ["gem install evil-winrm"]
|
|
|
|
|
RUN_COMMANDS = ["evil-winrm --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/Hackplayers/evil-winrm"
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Mythic(HackingTool):
|
|
|
|
|
TITLE = "Mythic (C2 Platform)"
|
|
|
|
|
DESCRIPTION = "Collaborative, multi-payload C2 platform designed for red team operations."
|
|
|
|
|
REQUIRES_DOCKER = True
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/its-a-feature/Mythic.git",
|
|
|
|
|
"cd Mythic && sudo make",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd Mythic && sudo ./mythic-cli start"]
|
|
|
|
|
PROJECT_URL = "https://github.com/its-a-feature/Mythic"
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
|
|
|
|
|
2020-08-14 11:11:59 +00:00
|
|
|
class PostExploitationTools(HackingToolsCollection):
|
|
|
|
|
TITLE = "Post exploitation tools"
|
|
|
|
|
TOOLS = [
|
|
|
|
|
Vegile(),
|
Phase 10: Add modern tools across 6 categories
Information Gathering (+7):
theHarvester, Amass, Masscan, RustScan, Holehe, Maigret, httpx
Web Attack (+6):
Nuclei, ffuf, Feroxbuster, Nikto, wafw00f, Katana
Wordlist/Password (+3):
Hashcat, John the Ripper, haiti
Wireless Attack (+3):
Airgeddon, hcxdumptool, hcxtools
Forensics (+2):
Volatility3, Binwalk
Post Exploitation (+1):
pwncat-cs
2026-03-15 08:34:39 +00:00
|
|
|
ChromeKeyLogger(),
|
|
|
|
|
PwncatCS(),
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
Sliver(),
|
|
|
|
|
Havoc(),
|
|
|
|
|
PEASSng(),
|
|
|
|
|
LigoloNg(),
|
|
|
|
|
ChiselTunnel(),
|
|
|
|
|
EvilWinRM(),
|
|
|
|
|
Mythic(),
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2025-10-14 06:02:18 +00:00
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
|
tools = PostExploitationTools()
|
|
|
|
|
tools.show_options()
|