Redesign README, templates, and update .github workflows

README.md:
- Modern centered header with full badge row
- Stats banner: 17 categories, 150+ tools
- What's new as a comparison table
- Tool category table with per-category counts
- Complete tool listing with star markers for new tools
- Contributing section with enforced title formats for issues and PRs
- Star History chart (Z4nzu/hackingtool)
- Cleaned up Installation, Requirements, Social sections

README_template.md:
- Full redesign matching README.md layout
- {{toc}} and {{tools}} placeholders preserved for generate_readme.py
- Contributing section with title format rules embedded in template

.github/ISSUE_TEMPLATE/bug_report.md:
- Remove irrelevant browser/smartphone sections
- Add tool name, category, error output, environment table

.github/ISSUE_TEMPLATE/feature_request.md:
- Tighten to 4 focused fields, note tool additions use separate template

.github/ISSUE_TEMPLATE/tool_request.md (new):
- Structured template for new tool suggestions
- Required fields: name, URL, category, OS, install/run commands, reason
- Enforced title format: [Tool Request] ToolName - Category

.github/PULL_REQUEST_TEMPLATE.md (new):
- PR checklist for new tool additions and other change types
- Enforced title format: [New Tool] / [Fix] / [Improve]
- All required class fields listed as checklist items

.github/workflows/lint_python.yml:
- actions/checkout v3 -> v4, setup-python v4 -> v5
- python-version: 3.x -> 3.12 (project requires 3.10+)
- ruff target-version: py37 -> py310
- ruff --show-source -> --output-format=full (updated flag name)
- Remove deprecated safety check command

.github/workflows/test_install.yml:
- actions/checkout v3 -> v4, setup-python v4 -> v5
- python-version: 3.x -> 3.12
- Replace fragile matrix of hard-coded menu numbers with
  two simple smoke tests: launch+quit, and navigate+back
This commit is contained in:
Hardik Zinzuvadiya 2026-03-15 14:21:20 +05:30
parent bbc6b7c929
commit 06245219c9
8 changed files with 440 additions and 247 deletions

View file

@ -1,38 +1,37 @@
---
name: Bug report
about: Create a report to help us improve
title: ''
labels: ''
name: Bug Report
about: Report a broken install, crash, or unexpected behavior
title: "[BUG] <tool name><short description>"
labels: bug
assignees: ''
---
**Describe the bug**
A clear and concise description of what the bug is.
## Description
<!-- Clear, concise description of what went wrong -->
**To Reproduce**
Steps to reproduce the behavior:
1. Go to '...'
2. Click on '....'
3. Scroll down to '....'
4. See error
## Affected Tool
- **Category:** <!-- e.g. Web Attack Tools -->
- **Tool name:** <!-- e.g. Nuclei -->
**Expected behavior**
A clear and concise description of what you expected to happen.
## Steps to Reproduce
1.
2.
3.
**Screenshots**
If applicable, add screenshots to help explain your problem.
## Expected Behavior
<!-- What should have happened? -->
**Desktop (please complete the following information):**
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]
## Error Output
```
<paste the full terminal output / traceback here>
```
**Smartphone (please complete the following information):**
- Device: [e.g. iPhone6]
- OS: [e.g. iOS8.1]
- Browser [e.g. stock browser, safari]
- Version [e.g. 22]
## Environment
| Field | Value |
|---|---|
| OS | <!-- e.g. Kali Linux 2024.1, Ubuntu 22.04, macOS 14 --> |
| Python | <!-- `python3 --version` --> |
| hackingtool | v2.0.0 |
**Additional context**
Add any other context about the problem here.
## Additional Context
<!-- Screenshots, workarounds tried, etc. -->

View file

@ -1,20 +1,19 @@
---
name: Feature request
about: Suggest an idea for this project
title: ''
labels: ''
name: Feature Request
about: Suggest an improvement to hackingtool itself (not a new tool addition — use the Tool Request template for that)
title: "[FEATURE] <short description>"
labels: enhancement
assignees: ''
---
**Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
## Problem
<!-- What limitation or friction prompted this request? -->
**Describe the solution you'd like**
A clear and concise description of what you want to happen.
## Proposed Solution
<!-- Describe the change or new capability you'd like -->
**Describe alternatives you've considered**
A clear and concise description of any alternative solutions or features you've considered.
## Alternatives Considered
<!-- Other approaches you thought about -->
**Additional context**
Add any other context or screenshots about the feature request here.
## Additional Context
<!-- Screenshots, mockups, links, etc. -->

43
.github/ISSUE_TEMPLATE/tool_request.md vendored Normal file
View file

@ -0,0 +1,43 @@
---
name: Tool Request
about: Suggest a new tool to be added to hackingtool
title: "[Tool Request] <ToolName><Category>"
labels: tool-request
assignees: ''
---
<!--
TITLE FORMAT (required): [Tool Request] ToolName — Category
Example: [Tool Request] Subfinder — Information Gathering
Issues without this title format may be closed without review.
-->
## Tool Details
| Field | Value |
|---|---|
| **Tool name** | <!-- e.g. Subfinder --> |
| **GitHub URL** | <!-- e.g. https://github.com/projectdiscovery/subfinder --> |
| **Category** | <!-- Choose one: Anonymously Hiding / Information Gathering / Wordlist Generator / Wireless Attack / SQL Injection / Phishing / Web Attack / Post Exploitation / Forensics / Payload Creation / Exploit Framework / Reverse Engineering / DDOS / RAT / XSS / Steganography / Other --> |
| **Supported OS** | <!-- Linux / macOS / Both --> |
| **Language** | <!-- Python / Go / Rust / C / Bash / etc. --> |
| **Install method** | <!-- pip / go install / apt / git clone / etc. --> |
## Why should it be added?
<!-- What does this tool do that isn't already covered? Min 2 sentences. -->
## Install Command
```bash
# paste the install command(s) here
```
## Run Command
```bash
# paste the run/usage command here
```
## Is the tool actively maintained?
<!-- Yes / No — link to last commit or release date -->
## Additional Notes
<!-- Anything else the maintainer should know -->

45
.github/PULL_REQUEST_TEMPLATE.md vendored Normal file
View file

@ -0,0 +1,45 @@
<!--
TITLE FORMAT
─────────────────────────────────────────────────────────────────
Adding a new tool → [New Tool] ToolName — Category
Bug fix → [Fix] Short description of what was fixed
Improvement → [Improve] Short description
─────────────────────────────────────────────────────────────────
PRs without a properly formatted title may be closed without review.
-->
## Type of Change
- [ ] New tool addition
- [ ] Bug fix
- [ ] Improvement / refactor
- [ ] Documentation update
---
## For New Tool Additions — Required Fields
| Field | Value |
|---|---|
| **Tool name** | |
| **GitHub URL** | |
| **Category** | |
| **Supported OS** | Linux / macOS / Both |
| **Install method** | pip / go install / apt / git clone |
**Why should it be added?**
<!-- What gap does this fill? Min 2 sentences. -->
**Is the tool actively maintained?**
<!-- Link to last release / commit -->
---
## Checklist
- [ ] Title follows the format above
- [ ] New tool class added to the correct `tools/*.py` file
- [ ] `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL` all set
- [ ] `SUPPORTED_OS` set correctly (`["linux"]` / `["linux", "macos"]`)
- [ ] Tool added to the `TOOLS` list in the collection class at the bottom of the file
- [ ] No new dependencies added to `requirements.txt` without discussion
- [ ] Tested locally — install and run commands work

View file

@ -8,24 +8,21 @@ jobs:
lint_python:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- uses: actions/setup-python@v4
- uses: actions/checkout@v4
- uses: actions/setup-python@v5
with:
python-version: 3.x
python-version: "3.12"
- run: pip install --upgrade pip ruff setuptools wheel
- name: "Ruff: Show stopper (must-fix) issues"
run: ruff . --select=E9,F63,F7,F82,PLE,YTT --show-source .
run: ruff check . --select=E9,F63,F7,F82,PLE,YTT --output-format=full
- name: "Ruff: All issues"
run: ruff --exit-zero --select=ALL --statistics --target-version=py37 .
run: ruff check --exit-zero --select=ALL --statistics --target-version=py310 .
- name: "Ruff: All fixable (ruff --fix) issues"
run: ruff --exit-zero --select=ALL --ignore=ANN204,COM812,ERA001,RSE102
--statistics --target-version=py37 . | grep "\[\*\]"
- run: pip install black codespell mypy pytest safety
run: ruff check --exit-zero --select=ALL --ignore=ANN204,COM812,ERA001,RSE102 --statistics --target-version=py310 . | grep "\[\*\]" || true
- run: pip install black codespell mypy pytest
- run: black --check . || true
- run: codespell
- run: pip install -r requirements.txt || pip install --editable . || pip install . || true
- run: pip install -r requirements.txt || true
- run: mkdir --parents --verbose .mypy_cache
- run: mypy --ignore-missing-imports --install-types --non-interactive . || true
- run: pytest . || true
- run: pytest --doctest-modules . || true
- run: safety check

View file

@ -9,28 +9,20 @@ jobs:
runs-on: ubuntu-latest
env:
TERM: "linux"
strategy:
fail-fast: false
matrix:
commands:
# Enter hackingtool starting from the main menu with \n as the delimiter.
- "17\n0\n1\n\n99\n99\n99" # Install, run, update, update system, press ENTER to continue, back to main menu, quit
- "17\n0\n2\n\n99\n99\n99" # Install, run, update, update hackingtool, press ENTER to continue, back to main menu, quit
- "17\n1\n1\n" # Install, run, uninstall, press ENTER to continue
- "99" # Install, run, quit
steps:
- uses: actions/checkout@v3
- uses: actions/setup-python@v4
- uses: actions/checkout@v4
- uses: actions/setup-python@v5
with:
python-version: 3.x
python-version: "3.12"
cache: 'pip'
- run: pip install --upgrade pip
- run: pwd && ls -hal
- run: sudo ./install.py 1
- run: pwd && ls -hal
# Typing "1" will allow us to manually enter the filepath to hackingtool.
# Provide the filepath ${HOME}/work/hackingtool/hackingtool
# Type the matrix.commands.
- run: echo -e "1\n${HOME}/work/hackingtool/hackingtool\n${{ matrix.commands }}\n" | hackingtool
- run: pwd && ls -hal
- run: pip install -r requirements.txt
- run: sudo python3 install.py 1
# Verify the hackingtool entrypoint is on PATH
- run: which hackingtool
# Smoke test: launch and immediately quit (99)
- name: "Smoke test: launch and quit"
run: echo -e "99\n" | hackingtool || true
# Navigate into first category and back out
- name: "Navigation test: enter category 1, quit"
run: echo -e "1\n99\n99\n" | hackingtool || true

293
README.md
View file

@ -1,117 +1,130 @@
### All in One Hacking tool For Hackers
![](https://img.shields.io/github/license/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues-closed/Z4nzu/hackingtool)
![](https://img.shields.io/badge/Python-3.10+-blue)
![](https://img.shields.io/badge/version-2.0.0-green)
![](https://img.shields.io/github/forks/Z4nzu/hackingtool)
![](https://img.shields.io/github/stars/Z4nzu/hackingtool)
![](https://img.shields.io/github/last-commit/Z4nzu/hackingtool)
![](https://img.shields.io/badge/platform-Linux%20%7C%20KaliLinux%20%7C%20ParrotOs%20%7C%20macOS-blue)
<div align="center">
## What's new in v2.0.0
- Python 3.10+ required — all Python 2 code removed
- OS-aware menus — Linux-only tools are hidden automatically on macOS
- Archived tools (Python 2, unmaintained) shown in a separate sub-menu
- All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/`
- No more `sudo git clone` — tools install to user home, no root needed
- 22 new modern tools added across 6 categories
- Rich terminal UI with shared theme — no more 32 different console instances
- Iterative menus — no more recursion stack overflow on deep navigation
- Docker image builds locally — no unverified external images
- requirements.txt cleaned — removed unused flask/boxes/lolcat/requests
# HackingTool
# Hackingtool Menu
- [Anonymously Hiding Tools](#anonymously-hiding-tools)
- [Information gathering tools](#information-gathering-tools)
- [Wordlist Generator](#wordlist-generator)
- [Wireless attack tools](#wireless-attack-tools)
- [SQL Injection Tools](#sql-injection-tools)
- [Phishing attack tools](#phishing-attack-tools)
- [Web Attack tools](#web-attack-tools)
- [Post exploitation tools](#post-exploitation-tools)
- [Forensic tools](#forensic-tools)
- [Payload creation tools](#payload-creation-tools)
- [Exploit framework](#exploit-framework)
- [Reverse engineering tools](#reverse-engineering-tools)
- [DDOS Attack Tools](#ddos-attack-tools)
- [Remote Administrator Tools (RAT)](#remote-administrator-tools-rat)
- [XSS Attack Tools](#xss-attack-tools)
- [Steganography tools](#steganography-tools)
- [Other tools](#other-tools)
- [SocialMedia Bruteforce](#socialmedia-bruteforce)
- [Android Hacking tools](#android-hacking-tools)
- [IDN Homograph Attack](#idn-homograph-attack)
- [Email Verify tools](#email-verify-tools)
- [Hash cracking tools](#hash-cracking-tools)
- [Wifi Deauthenticate](#wifi-deauthenticate)
- [SocialMedia Finder](#socialmedia-finder)
- [Payload Injector](#payload-injector)
- [Web crawling](#web-crawling)
- [Mix tools](#mix-tools)
**All-in-One Hacking Tool for Security Researchers & Pentesters**
[![License](https://img.shields.io/github/license/Z4nzu/hackingtool?style=flat-square)](LICENSE)
[![Python](https://img.shields.io/badge/Python-3.10+-3776AB?style=flat-square&logo=python&logoColor=white)](https://www.python.org/)
[![Version](https://img.shields.io/badge/version-2.0.0-brightgreen?style=flat-square)](#)
[![Platform](https://img.shields.io/badge/platform-Linux%20%7C%20Kali%20%7C%20Parrot%20%7C%20macOS-informational?style=flat-square)](#)
[![Stars](https://img.shields.io/github/stars/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/stargazers)
[![Forks](https://img.shields.io/github/forks/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/network/members)
[![Issues](https://img.shields.io/github/issues/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/issues)
[![Last Commit](https://img.shields.io/github/last-commit/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/commits/master)
### Anonymously Hiding Tools
<br>
```
17 categories · 150+ tools · Linux & macOS · Rich terminal UI
```
</div>
---
## What's New in v2.0.0
| | Change |
|---|---|
| **Python** | 3.10+ required — all Python 2 code removed |
| **OS-aware** | Linux-only tools hidden automatically on macOS |
| **Archived** | Unmaintained tools moved to a separate sub-menu |
| **Paths** | All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/` |
| **Root** | No more `sudo git clone` — installs to user home |
| **New tools** | 22 modern tools added across 6 categories |
| **UI** | Rich terminal UI with shared theme — single consistent console |
| **Menus** | Iterative navigation — no more recursion stack overflow |
| **Docker** | Builds locally — no unverified external images |
| **Deps** | `requirements.txt` cleaned — removed unused flask/boxes/lolcat/requests |
---
## Tool Categories
| # | Category | Tools |
|---|---|:---:|
| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 |
| 2 | [Information Gathering](#information-gathering-tools) | 22 |
| 3 | [Wordlist Generator](#wordlist-generator) | 7 |
| 4 | [Wireless Attack](#wireless-attack-tools) | 12 |
| 5 | [SQL Injection](#sql-injection-tools) | 7 |
| 6 | [Phishing Attack](#phishing-attack-tools) | 17 |
| 7 | [Web Attack](#web-attack-tools) | 13 |
| 8 | [Post Exploitation](#post-exploitation-tools) | 3 |
| 9 | [Forensics](#forensic-tools) | 7 |
| 10 | [Payload Creation](#payload-creation-tools) | 8 |
| 11 | [Exploit Framework](#exploit-framework) | 4 |
| 12 | [Reverse Engineering](#reverse-engineering-tools) | 3 |
| 13 | [DDOS Attack](#ddos-attack-tools) | 5 |
| 14 | [RAT](#remote-administrator-tools-rat) | 1 |
| 15 | [XSS Attack](#xss-attack-tools) | 9 |
| 16 | [Steganography](#steganography-tools) | 4 |
| 17 | [Other Tools](#other-tools) | 24 |
---
## Anonymously Hiding Tools
- [Anonymously Surf](https://github.com/Und3rf10w/kali-anonsurf)
- [Multitor](https://github.com/trimstray/multitor)
### Information gathering tools
## Information Gathering Tools
- [Network Map (nmap)](https://github.com/nmap/nmap)
- [Dracnmap](https://github.com/Screetsec/Dracnmap)
- Port scanning
- Host to IP
- [Xerosploit](https://github.com/LionSec/xerosploit)
- [RED HAWK (All In One Scanning)](https://github.com/Tuhinshubhra/RED_HAWK)
- [RED HAWK](https://github.com/Tuhinshubhra/RED_HAWK)
- [ReconSpider](https://github.com/bhavsec/reconspider)
- IsItDown (Check Website Down/Up)
- [Infoga - Email OSINT](https://github.com/m4ll0k/Infoga)
- IsItDown
- [Infoga](https://github.com/m4ll0k/Infoga)
- [ReconDog](https://github.com/s0md3v/ReconDog)
- [Striker](https://github.com/s0md3v/Striker)
- [SecretFinder (API keys, tokens)](https://github.com/m4ll0k/SecretFinder)
- [Find Info Using Shodan](https://github.com/m4ll0k/Shodanfy.py)
- [Port Scanner - rang3r](https://github.com/floriankunushevci/rang3r)
- [SecretFinder](https://github.com/m4ll0k/SecretFinder)
- [Shodanfy](https://github.com/m4ll0k/Shodanfy.py)
- [rang3r](https://github.com/floriankunushevci/rang3r)
- [Breacher](https://github.com/s0md3v/Breacher)
- [theHarvester](https://github.com/laramies/theHarvester) ★ new
- [Amass](https://github.com/owasp-amass/amass) ★ new
- [Masscan](https://github.com/robertdavidgraham/masscan) ★ new
- [RustScan](https://github.com/RustScan/RustScan) ★ new
- [Holehe](https://github.com/megadose/holehe) ★ new
- [Maigret](https://github.com/soxoj/maigret) ★ new
- [httpx](https://github.com/projectdiscovery/httpx) ★ new
- [theHarvester](https://github.com/laramies/theHarvester) ★
- [Amass](https://github.com/owasp-amass/amass) ★
- [Masscan](https://github.com/robertdavidgraham/masscan) ★
- [RustScan](https://github.com/RustScan/RustScan) ★
- [Holehe](https://github.com/megadose/holehe) ★
- [Maigret](https://github.com/soxoj/maigret) ★
- [httpx](https://github.com/projectdiscovery/httpx) ★
### Wordlist Generator
## Wordlist Generator
- [Cupp](https://github.com/Mebus/cupp)
- [WordlistCreator](https://github.com/Z4nzu/wlcreator)
- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator)
- [Password list (1.4B Passwords)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
- [Hashcat](https://github.com/hashcat/hashcat) ★ new
- [John the Ripper](https://github.com/openwall/john) ★ new
- [haiti (Hash Identifier)](https://github.com/noraj/haiti) ★ new
- [Password list (1.4B)](https://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got)
- [Hashcat](https://github.com/hashcat/hashcat) ★
- [John the Ripper](https://github.com/openwall/john) ★
- [haiti](https://github.com/noraj/haiti) ★
### Wireless attack tools
## Wireless Attack Tools
- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
- [pixiewps](https://github.com/wiire/pixiewps)
- [Bluetooth Honeypot GUI Framework](https://github.com/andrewmichaelsmith/bluepot)
- [Fluxion](https://github.com/thehackingsage/Fluxion)
- [Bluetooth Honeypot (bluepot)](https://github.com/andrewmichaelsmith/bluepot)
- [Fluxion](https://github.com/FluxionNetwork/fluxion)
- [Wifiphisher](https://github.com/wifiphisher/wifiphisher)
- [Wifite](https://github.com/derv82/wifite2)
- [EvilTwin](https://github.com/Z4nzu/fakeap)
- [Fastssh](https://github.com/Z4nzu/fastssh)
- Howmanypeople
- [Airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) ★ new
- [hcxdumptool](https://github.com/ZerBea/hcxdumptool) ★ new
- [hcxtools](https://github.com/ZerBea/hcxtools) ★ new
- [Airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) ★
- [hcxdumptool](https://github.com/ZerBea/hcxdumptool) ★
- [hcxtools](https://github.com/ZerBea/hcxtools) ★
### SQL Injection Tools
## SQL Injection Tools
- [Sqlmap](https://github.com/sqlmapproject/sqlmap)
- [NoSqlMap](https://github.com/codingo/NoSQLMap)
- [Damn Small SQLi Scanner](https://github.com/stamparm/DSSS)
- [DSSS](https://github.com/stamparm/DSSS)
- [Explo](https://github.com/dtag-dev-sec/explo)
- [Blisqy - Time-based blind SQLi](https://github.com/JohnTroony/Blisqy)
- [Leviathan - Wide Range Mass Audit](https://github.com/leviathan-framework/leviathan)
- [Blisqy](https://github.com/JohnTroony/Blisqy)
- [Leviathan](https://github.com/leviathan-framework/leviathan)
- [SQLScan](https://github.com/Cvar1984/sqlscan)
### Phishing attack tools
## Phishing Attack Tools
- [Autophisher](https://github.com/CodingRanjith/autophisher)
- [PyPhisher](https://github.com/KasRoudra/PyPhisher)
- [AdvPhishing](https://github.com/Ignitetch/AdvPhishing)
@ -119,8 +132,8 @@
- [SocialFish](https://github.com/UndeadSec/SocialFish)
- [HiddenEye](https://github.com/Morsmalleo/HiddenEye)
- [Evilginx3](https://github.com/kgretzky/evilginx2)
- [I-See-You (Location via phishing)](https://github.com/Viralmaniar/I-See-You)
- [SayCheese (Webcam grab)](https://github.com/hangetzzu/saycheese)
- [I-See-You](https://github.com/Viralmaniar/I-See-You)
- [SayCheese](https://github.com/hangetzzu/saycheese)
- [QR Code Jacking](https://github.com/cryptedwolf/ohmyqr)
- [BlackEye](https://github.com/thelinuxchoice/blackeye)
- [ShellPhish](https://github.com/An0nUD4Y/shellphish)
@ -130,67 +143,66 @@
- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
- [dnstwist](https://github.com/elceef/dnstwist)
### Web Attack tools
## Web Attack Tools
- [Web2Attack](https://github.com/santatic/web2attack)
- Skipfish
- [SubDomain Finder (Sublist3r)](https://github.com/aboul3la/Sublist3r)
- [Sublist3r](https://github.com/aboul3la/Sublist3r)
- [CheckURL](https://github.com/UndeadSec/checkURL)
- [Sub-Domain TakeOver](https://github.com/edoardottt/takeover)
- [Dirb](https://gitlab.com/kalilinux/packages/dirb)
- [Nuclei](https://github.com/projectdiscovery/nuclei) ★ new
- [ffuf](https://github.com/ffuf/ffuf) ★ new
- [Feroxbuster](https://github.com/epi052/feroxbuster) ★ new
- [Nikto](https://github.com/sullo/nikto) ★ new
- [wafw00f](https://github.com/EnableSecurity/wafw00f) ★ new
- [Katana](https://github.com/projectdiscovery/katana) ★ new
- [Nuclei](https://github.com/projectdiscovery/nuclei) ★
- [ffuf](https://github.com/ffuf/ffuf) ★
- [Feroxbuster](https://github.com/epi052/feroxbuster) ★
- [Nikto](https://github.com/sullo/nikto) ★
- [wafw00f](https://github.com/EnableSecurity/wafw00f) ★
- [Katana](https://github.com/projectdiscovery/katana) ★
### Post exploitation tools
- [Vegile - Ghost In The Shell](https://github.com/Screetsec/Vegile)
## Post Exploitation Tools
- [Vegile](https://github.com/Screetsec/Vegile)
- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
- [pwncat-cs](https://github.com/calebstewart/pwncat) ★ new
- [pwncat-cs](https://github.com/calebstewart/pwncat) ★
### Forensic tools
## Forensic Tools
- Autopsy
- Wireshark
- [Bulk extractor](https://github.com/simsong/bulk_extractor)
- [Disk Clone / Image Acquire (Guymager)](https://guymager.sourceforge.io/)
- [Guymager](https://guymager.sourceforge.io/)
- [Toolsley](https://www.toolsley.com/)
- [Volatility 3](https://github.com/volatilityfoundation/volatility3) ★ new
- [Binwalk](https://github.com/ReFirmLabs/binwalk) ★ new
- [Volatility 3](https://github.com/volatilityfoundation/volatility3) ★
- [Binwalk](https://github.com/ReFirmLabs/binwalk) ★
### Payload creation tools
## Payload Creation Tools
- [The FatRat](https://github.com/Screetsec/TheFatRat)
- [Brutal](https://github.com/Screetsec/Brutal)
- [Stitch](https://nathanlopez.github.io/Stitch)
- [MSFvenom Payload Creator](https://github.com/g0tmi1k/msfpc)
- [Venom Shellcode Generator](https://github.com/r00t-3xp10it/venom)
- [Venom](https://github.com/r00t-3xp10it/venom)
- [Spycam](https://github.com/indexnotfound404/spycam)
- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
- [Enigma](https://github.com/UndeadSec/Enigma)
### Exploit framework
## Exploit Framework
- [RouterSploit](https://github.com/threat9/routersploit)
- [WebSploit](https://github.com/The404Hacking/websploit)
- [Commix](https://github.com/commixproject/commix)
- [Web2Attack](https://github.com/santatic/web2attack)
### Reverse engineering tools
## Reverse Engineering Tools
- [Androguard](https://github.com/androguard/androguard)
- [Apk2Gold](https://github.com/lxdvs/apk2gold)
- [JadX](https://github.com/skylot/jadx)
### DDOS Attack Tools
- [DDoS Script (36+ methods)](https://github.com/the-deepnet/ddos)
## DDOS Attack Tools
- [DDoS Script](https://github.com/the-deepnet/ddos)
- [SlowLoris](https://github.com/gkbrk/slowloris)
- [Asyncrone | SYN Flood DDoS](https://github.com/fatihsnsy/aSYNcrone)
- [Asyncrone](https://github.com/fatihsnsy/aSYNcrone)
- [UFOnet](https://github.com/epsylon/ufonet)
- [GoldenEye](https://github.com/jseidl/GoldenEye)
- [SaphyraDDoS](https://github.com/anonymous24x7/Saphyra-DDoS)
### Remote Administrator Tools (RAT)
## Remote Administrator Tools (RAT)
- [Pyshell](https://github.com/knassar702/pyshell)
### XSS Attack Tools
## XSS Attack Tools
- [DalFox](https://github.com/hahwul/dalfox)
- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER)
- [Extended XSS Searcher](https://github.com/Damian89/extended-xss-search)
@ -201,18 +213,19 @@
- [XSStrike](https://github.com/UltimateHackers/XSStrike)
- [RVuln](https://github.com/iinc0gnit0/RVuln)
### Steganography tools
## Steganography Tools
- SteganoHide
- [StegoCracker](https://github.com/W1LDN16H7/StegoCracker)
- [Whitespace](https://github.com/beardog108/snow10)
### Other tools
## Other Tools
#### SocialMedia Bruteforce
- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
- [Facebook Attack](https://github.com/Matrix07ksa/Brute_Force)
- [Application Checker](https://github.com/jakuta-tech/underhanded)
#### Android Hacking tools
#### Android Hacking Tools
- [Keydroid](https://github.com/F4dl0/keydroid)
- [MySMS](https://github.com/papusingh2sms/mysms)
- [Lockphish](https://github.com/JasonJerry/lockphish)
@ -222,10 +235,10 @@
#### IDN Homograph Attack
- [EvilURL](https://github.com/UndeadSec/EvilURL)
#### Email Verify tools
#### Email Verify Tools
- [Knockmail](https://github.com/4w4k3/KnockMail)
#### Hash cracking tools
#### Hash Cracking Tools
- [Hash Buster](https://github.com/s0md3v/Hash-Buster)
#### Wifi Deauthenticate
@ -242,13 +255,41 @@
- [Debinject](https://github.com/UndeadSec/Debinject)
- [Pixload](https://github.com/chinarulezzz/pixload)
#### Web crawling
#### Web Crawling
- [Gospider](https://github.com/jaeles-project/gospider)
#### Mix tools
#### Mix Tools
- Terminal Multiplexer (tilix)
- [Crivo](https://github.com/GMDSantana/crivo)
---
## Contributing — Add a New Tool
### Open an Issue
> **Title format:** `[Tool Request] ToolName — Category`
> Example: `[Tool Request] Subfinder — Information Gathering`
Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) issue template.
Required fields: tool name, GitHub URL, category, supported OS, install command, reason for inclusion.
### Open a Pull Request
> **Title format:** `[New Tool] ToolName — Category`
> Example: `[New Tool] Subfinder — Information Gathering`
Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist. Key requirements:
1. Add your class to the right `tools/*.py` file
2. Set `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL`
3. Set `SUPPORTED_OS``["linux"]` or `["linux", "macos"]`
4. Append the instance to `TOOLS` list in the collection at the bottom of the file
5. Test install + run locally before submitting
Issues or PRs that **don't follow the title format** will be closed without review.
---
## Installation
@ -283,21 +324,31 @@ docker exec -it hackingtool bash
- Python 3.10+
- Linux (Kali, Parrot, Ubuntu) or macOS
- Go 1.21+ (for nuclei, ffuf, amass, httpx, katana, dalfox)
- Ruby (for haiti)
- Go 1.21+ *(for nuclei, ffuf, amass, httpx, katana, dalfox)*
- Ruby *(for haiti)*
Install Python deps:
```bash
pip install -r requirements.txt
```
---
#### Thanks to all original authors of the tools used in hackingtool
## Star History
**Please don't use for illegal activity.**
<picture>
<source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date&theme=dark" />
<source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date" />
<img alt="HackingTool Star History Chart" src="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date" />
</picture>
---
## Social
## Social Media
[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Ftwitter.com%2F_Zinzu07)](https://twitter.com/_Zinzu07)
[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/)
##### Your favourite tool is not listed? [Suggest it here](https://forms.gle/b235JoCKyUq5iM3t8)
> **Please don't use for illegal activity.**
> Thanks to all original authors of the tools included in hackingtool.
Your favourite tool is not listed? [Suggest it here](https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md)

View file

@ -1,69 +1,136 @@
### All in One Hacking tool For Hackers🥇
![](https://img.shields.io/github/license/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues/Z4nzu/hackingtool)
![](https://img.shields.io/github/issues-closed/Z4nzu/hackingtool)
![](https://img.shields.io/badge/Python-3-blue)
![](https://img.shields.io/github/forks/Z4nzu/hackingtool)
![](https://img.shields.io/github/stars/Z4nzu/hackingtool)
![](https://img.shields.io/github/last-commit/Z4nzu/hackingtool)
[![HitCount](http://hits.dwyl.com/Z4nzu/hackingtool.svg)](http://hits.dwyl.com/Z4nzu/hackingtool)
![](https://img.shields.io/badge/platform-Linux%20%7C%20KaliLinux%20%7C%20ParrotOs-blue)
<div align="center">
#### How to run the Kali Linux CLI on Windows 10 without running a VM [YOUTUBE](https://youtu.be/BsFhpIDcd9I)
# HackingTool
## Update available V1.1.0 🚀
- [x] Added New Tools
- [x] Reverse Engineering
- [x] RAT Tools
- [x] Web Crawling
- [x] Payload Injector
- [x] Multitor Tools update
- [X] Added Tool in Wifi-Jamming
**All-in-One Hacking Tool for Security Researchers & Pentesters**
[![License](https://img.shields.io/github/license/Z4nzu/hackingtool?style=flat-square)](LICENSE)
[![Python](https://img.shields.io/badge/Python-3.10+-3776AB?style=flat-square&logo=python&logoColor=white)](https://www.python.org/)
[![Version](https://img.shields.io/badge/version-2.0.0-brightgreen?style=flat-square)](#)
[![Platform](https://img.shields.io/badge/platform-Linux%20%7C%20Kali%20%7C%20Parrot%20%7C%20macOS-informational?style=flat-square)](#)
[![Stars](https://img.shields.io/github/stars/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/stargazers)
[![Forks](https://img.shields.io/github/forks/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/network/members)
[![Issues](https://img.shields.io/github/issues/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/issues)
[![Last Commit](https://img.shields.io/github/last-commit/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/commits/master)
# Hackingtool Menu 🧰
</div>
![](https://github.com/Z4nzu/hackingtool/blob/master/images/A.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/AA.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/AAA.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/AAAA.png)
![](https://github.com/Z4nzu/hackingtool/blob/master/images/AAAAA.png)
---
## Installation guide for Linux <img src="https://konpa.github.io/devicon/devicon.git/icons/linux/linux-original.svg" alt="linux" width="25" height="25"/></p><p align="center">
## What's New in v2.0.0
#### THIS TOOL MUST BE RUN AS ROOT !!! run these following commands below ONE AT A TIME
- Python 3.10+ required — all Python 2 code removed
- OS-aware menus — Linux-only tools are hidden automatically on macOS
- Archived tools (Python 2, unmaintained) shown in a separate sub-menu
- All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/`
- No more `sudo git clone` — tools install to user home, no root needed
- 22 new modern tools added across 6 categories
- Rich terminal UI with shared theme — no more 32 different console instances
- Iterative menus — no more recursion stack overflow on deep navigation
- Docker image builds locally — no unverified external images
- `requirements.txt` cleaned — removed unused flask/boxes/lolcat/requests
git clone https://github.com/Z4nzu/hackingtool.git
chmod -R 755 hackingtool
cd hackingtool
sudo pip3 install -r requirements.txt
python install.py
sudo hackingtool
---
After all steps are completed, run the following command ---> **root@kaliLinux:~** **hackingtool**
## Menu
#### Thanks to original Author of the tools used in hackingtool
{{toc}}
<img src ="https://img.shields.io/badge/Important-notice-red" />
<h4>Please Don't Use for illegal Activity</h4>
---
### To do
- [ ] Fully release tool
- [ ] Add Tools for CTF
- [ ] Want to do automatic
## Tools
## Social Media :mailbox_with_no_mail:
[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Fwww.reddit.com%2Fuser%2FFatChicken277)](https://twitter.com/_Zinzu07)
{{tools}}
---
## Contributing — Add a New Tool
Want a tool included? **Raise an Issue or open a PR** using the templates below.
### Issue (Tool Request)
> Title format: `[Tool Request] ToolName — Category`
> Example: `[Tool Request] Subfinder — Information Gathering`
Use the **Tool Request** issue template and fill in all required fields:
tool name, GitHub URL, category, supported OS, install command, and why it should be added.
### Pull Request
> Title format: `[New Tool] ToolName — Category`
> Example: `[New Tool] Subfinder — Information Gathering`
Use the **PR template** checklist. Key requirements:
1. Add your tool class to the correct `tools/*.py` file
2. Set `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL`
3. Set `SUPPORTED_OS = ["linux"]` or `["linux", "macos"]` appropriately
4. Add the instance to the `TOOLS` list in the collection class
5. Test install and run locally before submitting
Issues or PRs that don't follow the title format may be closed without review.
---
## Installation
**Requires Python 3.10+**
```bash
git clone https://github.com/Z4nzu/hackingtool.git
cd hackingtool
chmod -R 755 .
sudo python3 install.py
```
Then run:
```bash
sudo hackingtool
```
## Docker
```bash
# Build image
docker build -t hackingtool .
# Run
docker-compose up -d
# Interact
docker exec -it hackingtool bash
```
## Requirements
- Python 3.10+
- Linux (Kali, Parrot, Ubuntu) or macOS
- Go 1.21+ (for nuclei, ffuf, amass, httpx, katana, dalfox)
- Ruby (for haiti)
```bash
pip install -r requirements.txt
```
---
## Star History
<picture>
<source media="(prefers-color-scheme: dark)" srcset="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date&theme=dark" />
<source media="(prefers-color-scheme: light)" srcset="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date" />
<img alt="HackingTool Star History Chart" src="https://api.star-history.com/svg?repos=Z4nzu/hackingtool&type=Date" />
</picture>
---
## Social
[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Ftwitter.com%2F_Zinzu07)](https://twitter.com/_Zinzu07)
[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/)
##### If you favorite tool is not included, or you have any suggestions, please [CLICK HERE](https://forms.gle/b235JoCKyUq5iM3t8)
![Z4nzu's github stats](https://github-readme-stats.vercel.app/api?username=Z4nzu&show_icons=true&title_color=fff&icon_color=79ff97&text_color=9f9f9f&bg_color=151515)
<a href="https://www.buymeacoffee.com/Zinzu" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/arial-yellow.png" alt="Buy Me A Coffee" style="height: 50px !important;width: 50px !important;"></a>
> **Please don't use for illegal activity.**
> Thanks to all original authors of the tools included in hackingtool.
#### Don't forget to share this tool with your friends!
#### Thank you!!!
Your favourite tool is not listed? [Suggest it here](https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md)