2025-10-14 06:02:18 +00:00
|
|
|
from rich.prompt import Prompt
|
|
|
|
|
|
2026-03-15 08:24:03 +00:00
|
|
|
from core import HackingTool, HackingToolsCollection, console
|
2025-10-14 06:02:18 +00:00
|
|
|
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
class WIFIPumpkin(HackingTool):
|
|
|
|
|
TITLE = "WiFi-Pumpkin"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"The WiFi-Pumpkin is a rogue AP framework to easily create fake networks\n"
|
|
|
|
|
"while forwarding legitimate traffic to and from the unsuspecting target."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:24:03 +00:00
|
|
|
"sudo apt install -y libssl-dev libffi-dev build-essential python3-pyqt5",
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/P0cL4bs/wifipumpkin3.git",
|
2020-12-26 16:56:05 +00:00
|
|
|
"chmod -R 755 wifipumpkin3",
|
2026-03-15 08:24:03 +00:00
|
|
|
"cd wifipumpkin3 && pip install --user .",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["sudo wifipumpkin3"]
|
|
|
|
|
PROJECT_URL = "https://github.com/P0cL4bs/wifipumpkin3"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class pixiewps(HackingTool):
|
|
|
|
|
TITLE = "pixiewps"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"Pixiewps is a tool written in C used to bruteforce offline the WPS pin\n"
|
|
|
|
|
"exploiting the low or non-existing entropy of some Access Points "
|
|
|
|
|
"(pixie dust attack)."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:24:03 +00:00
|
|
|
# Bug 29 fix: removed wget https://pastebin.com/... (insecure download from pastebin)
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/wiire/pixiewps.git && apt-get -y install build-essential",
|
2026-03-15 08:24:03 +00:00
|
|
|
"cd pixiewps && make",
|
|
|
|
|
"cd pixiewps && sudo make install",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
PROJECT_URL = "https://github.com/wiire/pixiewps"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
def run(self):
|
2026-03-15 08:24:03 +00:00
|
|
|
console.print(
|
|
|
|
|
"[bold cyan]Usage:[/bold cyan]\n"
|
|
|
|
|
" 1. Put interface into monitor mode: [yellow]airmon-ng start <iface>[/yellow]\n"
|
|
|
|
|
" 2. Scan: [yellow]wash -i <mon-iface>[/yellow]\n"
|
|
|
|
|
" 3. Attack: [yellow]reaver -i <mon-iface> -b <BSSID> -c <ch> -vvv -K 1 -f[/yellow]\n"
|
|
|
|
|
" 4. Run: [yellow]pixiewps -h[/yellow]"
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class BluePot(HackingTool):
|
|
|
|
|
TITLE = "Bluetooth Honeypot GUI Framework"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"You need at least 1 bluetooth receiver.\n"
|
|
|
|
|
"Install libbluetooth-dev (Ubuntu) / bluez-libs-devel (Fedora) / bluez-devel (openSUSE)."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:24:03 +00:00
|
|
|
# Bug 15 fix: missing comma caused implicit string concatenation — two strings joined
|
|
|
|
|
"sudo wget https://raw.githubusercontent.com/andrewmichaelsmith/bluepot/master/bin/bluepot-0.2.tar.gz",
|
|
|
|
|
"sudo tar xfz bluepot-0.2.tar.gz && sudo rm bluepot-0.2.tar.gz",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2020-12-26 17:18:49 +00:00
|
|
|
RUN_COMMANDS = ["cd bluepot && sudo java -jar bluepot.jar"]
|
2020-08-14 11:11:59 +00:00
|
|
|
PROJECT_URL = "https://github.com/andrewmichaelsmith/bluepot"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_JAVA = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class Fluxion(HackingTool):
|
|
|
|
|
TITLE = "Fluxion"
|
2020-12-28 18:53:23 +00:00
|
|
|
DESCRIPTION = "Fluxion is a remake of linset by vk496 with enhanced functionality."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2020-12-28 18:53:23 +00:00
|
|
|
"git clone https://github.com/FluxionNetwork/fluxion.git",
|
2026-03-15 08:24:03 +00:00
|
|
|
"cd fluxion && chmod +x fluxion.sh",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2026-03-15 08:24:03 +00:00
|
|
|
RUN_COMMANDS = ["cd fluxion && sudo bash fluxion.sh -i"]
|
2020-12-28 18:53:23 +00:00
|
|
|
PROJECT_URL = "https://github.com/FluxionNetwork/fluxion"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class Wifiphisher(HackingTool):
|
|
|
|
|
TITLE = "Wifiphisher"
|
2026-03-15 08:24:03 +00:00
|
|
|
DESCRIPTION = (
|
|
|
|
|
"Wifiphisher is a rogue Access Point framework for conducting red team engagements\n"
|
|
|
|
|
"or Wi-Fi security testing. Easily achieve man-in-the-middle position against\n"
|
|
|
|
|
"wireless clients by performing targeted Wi-Fi association attacks."
|
|
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/wifiphisher/wifiphisher.git",
|
2026-03-15 08:24:03 +00:00
|
|
|
"cd wifiphisher && pip install --user .",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2026-03-15 08:24:03 +00:00
|
|
|
RUN_COMMANDS = ["cd wifiphisher && sudo wifiphisher"]
|
2020-08-14 11:11:59 +00:00
|
|
|
PROJECT_URL = "https://github.com/wifiphisher/wifiphisher"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class Wifite(HackingTool):
|
|
|
|
|
TITLE = "Wifite"
|
2026-03-15 08:24:03 +00:00
|
|
|
DESCRIPTION = "Wifite is an automated wireless attack tool."
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/derv82/wifite2.git",
|
2026-03-15 08:24:03 +00:00
|
|
|
"cd wifite2 && pip install --user .",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2026-03-15 08:24:03 +00:00
|
|
|
RUN_COMMANDS = ["sudo wifite"]
|
2020-08-14 11:11:59 +00:00
|
|
|
PROJECT_URL = "https://github.com/derv82/wifite2"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class EvilTwin(HackingTool):
|
|
|
|
|
TITLE = "EvilTwin"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"Fakeap — perform Evil Twin Attack by getting credentials "
|
|
|
|
|
"using a Fake page and Fake Access Point."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2026-03-15 08:25:05 +00:00
|
|
|
INSTALL_COMMANDS = ["git clone https://github.com/Z4nzu/fakeap.git"]
|
2020-08-14 11:11:59 +00:00
|
|
|
RUN_COMMANDS = ["cd fakeap && sudo bash fakeap.sh"]
|
|
|
|
|
PROJECT_URL = "https://github.com/Z4nzu/fakeap"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class Fastssh(HackingTool):
|
|
|
|
|
TITLE = "Fastssh"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"Fastssh — multi-threaded scan and brute force attack against SSH protocol\n"
|
|
|
|
|
"using the most commonly used credentials."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:25:05 +00:00
|
|
|
"git clone https://github.com/Z4nzu/fastssh.git && cd fastssh && chmod +x fastssh.sh",
|
2025-10-14 06:02:18 +00:00
|
|
|
"sudo apt-get install -y sshpass netcat",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd fastssh && sudo bash fastssh.sh --scan"]
|
|
|
|
|
PROJECT_URL = "https://github.com/Z4nzu/fastssh"
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
class Howmanypeople(HackingTool):
|
|
|
|
|
TITLE = "Howmanypeople"
|
2025-10-14 06:02:18 +00:00
|
|
|
DESCRIPTION = (
|
2026-03-15 08:24:03 +00:00
|
|
|
"Count the number of people around you by monitoring wifi signals.\n"
|
|
|
|
|
"[@] WIFI ADAPTER REQUIRED\n"
|
|
|
|
|
"[*] It may be illegal to monitor networks for MAC addresses on networks you do not own."
|
2025-10-14 06:02:18 +00:00
|
|
|
)
|
2020-08-14 11:11:59 +00:00
|
|
|
INSTALL_COMMANDS = [
|
2026-03-15 08:24:03 +00:00
|
|
|
# Bug 14 fix: missing comma caused "sudo apt-get install tshark;sudo python3..."
|
|
|
|
|
# to be one implicitly concatenated string — only first command ran
|
|
|
|
|
"sudo apt-get install -y tshark",
|
|
|
|
|
"sudo python3 -m pip install howmanypeoplearearound",
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2020-12-15 23:09:52 +00:00
|
|
|
RUN_COMMANDS = ["howmanypeoplearearound"]
|
2026-03-15 08:24:03 +00:00
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
2020-08-14 11:11:59 +00:00
|
|
|
|
|
|
|
|
|
Phase 10: Add modern tools across 6 categories
Information Gathering (+7):
theHarvester, Amass, Masscan, RustScan, Holehe, Maigret, httpx
Web Attack (+6):
Nuclei, ffuf, Feroxbuster, Nikto, wafw00f, Katana
Wordlist/Password (+3):
Hashcat, John the Ripper, haiti
Wireless Attack (+3):
Airgeddon, hcxdumptool, hcxtools
Forensics (+2):
Volatility3, Binwalk
Post Exploitation (+1):
pwncat-cs
2026-03-15 08:34:39 +00:00
|
|
|
class Airgeddon(HackingTool):
|
|
|
|
|
TITLE = "Airgeddon (Wireless Attack Suite)"
|
|
|
|
|
DESCRIPTION = (
|
|
|
|
|
"Multi-use bash script for auditing wireless networks.\n"
|
|
|
|
|
"Covers WPA/WPA2, WEP, WPS, PMKID, evil twin, handshake capture and more."
|
|
|
|
|
)
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["cd airgeddon && sudo bash airgeddon.sh"]
|
|
|
|
|
PROJECT_URL = "https://github.com/v1s1t0r1sh3r3/airgeddon"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Hcxdumptool(HackingTool):
|
|
|
|
|
TITLE = "hcxdumptool (PMKID Capture)"
|
|
|
|
|
DESCRIPTION = (
|
|
|
|
|
"Capture packets and PMKID hashes from WLAN devices.\n"
|
|
|
|
|
"Usage: hcxdumptool -i <iface> -o capture.pcapng --enable_status=1"
|
|
|
|
|
)
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
REQUIRES_WIFI = True
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/ZerBea/hcxdumptool.git",
|
|
|
|
|
"cd hcxdumptool && make && sudo make install",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["hcxdumptool --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/ZerBea/hcxdumptool"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class Hcxtools(HackingTool):
|
|
|
|
|
TITLE = "hcxtools (PMKID/Hash Conversion)"
|
|
|
|
|
DESCRIPTION = (
|
|
|
|
|
"Convert captured WLAN packets to hashcat/JtR-compatible format.\n"
|
|
|
|
|
"Usage: hcxpcapngtool -o hashes.txt capture.pcapng"
|
|
|
|
|
)
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
INSTALL_COMMANDS = [
|
|
|
|
|
"git clone https://github.com/ZerBea/hcxtools.git",
|
|
|
|
|
"cd hcxtools && make && sudo make install",
|
|
|
|
|
]
|
|
|
|
|
RUN_COMMANDS = ["hcxpcapngtool --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/ZerBea/hcxtools"
|
|
|
|
|
|
|
|
|
|
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
class Bettercap(HackingTool):
|
|
|
|
|
TITLE = "Bettercap (Network/WiFi/BLE MITM)"
|
|
|
|
|
DESCRIPTION = "Swiss army knife for WiFi, BLE, HID, and Ethernet network recon and MITM attacks."
|
|
|
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
INSTALL_COMMANDS = ["sudo apt-get install -y bettercap"]
|
|
|
|
|
RUN_COMMANDS = ["sudo bettercap --help"]
|
|
|
|
|
PROJECT_URL = "https://github.com/bettercap/bettercap"
|
|
|
|
|
|
|
|
|
|
|
2020-08-14 11:11:59 +00:00
|
|
|
class WirelessAttackTools(HackingToolsCollection):
|
|
|
|
|
TITLE = "Wireless attack tools"
|
|
|
|
|
TOOLS = [
|
|
|
|
|
WIFIPumpkin(),
|
|
|
|
|
pixiewps(),
|
|
|
|
|
BluePot(),
|
|
|
|
|
Fluxion(),
|
|
|
|
|
Wifiphisher(),
|
|
|
|
|
Wifite(),
|
|
|
|
|
EvilTwin(),
|
|
|
|
|
Fastssh(),
|
2025-10-14 06:02:18 +00:00
|
|
|
Howmanypeople(),
|
Phase 10: Add modern tools across 6 categories
Information Gathering (+7):
theHarvester, Amass, Masscan, RustScan, Holehe, Maigret, httpx
Web Attack (+6):
Nuclei, ffuf, Feroxbuster, Nikto, wafw00f, Katana
Wordlist/Password (+3):
Hashcat, John the Ripper, haiti
Wireless Attack (+3):
Airgeddon, hcxdumptool, hcxtools
Forensics (+2):
Volatility3, Binwalk
Post Exploitation (+1):
pwncat-cs
2026-03-15 08:34:39 +00:00
|
|
|
Airgeddon(),
|
|
|
|
|
Hcxdumptool(),
|
|
|
|
|
Hcxtools(),
|
Add 35 new tools across 3 new + 6 existing categories
New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)
Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)
hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
2026-03-15 12:28:45 +00:00
|
|
|
Bettercap(),
|
2020-08-14 11:11:59 +00:00
|
|
|
]
|
2025-10-14 06:02:18 +00:00
|
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
|
tools = WirelessAttackTools()
|
2026-03-15 08:24:03 +00:00
|
|
|
tools.show_options()
|