Add 35 new tools across 3 new + 6 existing categories

New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
  Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)

Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
  Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
  Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)

hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
This commit is contained in:
Hardik Zinzuvadiya 2026-03-15 17:58:45 +05:30
parent d63df74193
commit 9b4b5236b2
10 changed files with 428 additions and 4 deletions

View file

@ -49,6 +49,9 @@ from tools.web_attack import WebAttackTools
from tools.wireless_attack import WirelessAttackTools
from tools.wordlist_generator import WordlistGeneratorTools
from tools.xss_attack import XSSAttackTools
from tools.active_directory import ActiveDirectoryTools
from tools.cloud_security import CloudSecurityTools
from tools.mobile_security import MobileSecurityTools
# ── Tool registry ──────────────────────────────────────────────────────────────
@ -72,6 +75,9 @@ tool_definitions = [
("Remote Administrator Tools (RAT)", "🖥 ", "Remote Admin (RAT)"),
("XSS Attack Tools", "💥", "XSS Attack"),
("Steganography tools", "🖼 ", "Steganography"),
("Active Directory Tools", "🏢", "Active Directory"),
("Cloud Security Tools", "", "Cloud Security"),
("Mobile Security Tools", "📱", "Mobile Security"),
("Other tools", "", "Other Tools"),
("Update or Uninstall | Hackingtool", "", "Update / Uninstall"),
]
@ -93,6 +99,9 @@ all_tools = [
RemoteAdministrationTools(),
XSSAttackTools(),
SteganographyTools(),
ActiveDirectoryTools(),
CloudSecurityTools(),
MobileSecurityTools(),
OtherTools(),
ToolManager(),
]
@ -110,8 +119,8 @@ def show_help():
Text.assemble(
(" Main menu\n", "bold white"),
(" ─────────────────────────────────────\n", "dim"),
(" 117 ", "bold cyan"), ("open a category\n", "white"),
(" 18 ", "bold cyan"), ("Update / Uninstall hackingtool\n", "white"),
(" 120 ", "bold cyan"), ("open a category\n", "white"),
(" 21 ", "bold cyan"), ("Update / Uninstall hackingtool\n", "white"),
(" ? ", "bold cyan"), ("show this help\n", "white"),
(" q ", "bold cyan"), ("quit hackingtool\n\n", "white"),
(" Inside a category\n", "bold white"),
@ -210,7 +219,7 @@ def _build_header() -> Panel:
(" kernel ", info["kernel"][:34]),
(" user ", f"{info['user']} @ {info['host'][:20]}"),
(" ip ", info["ip"]),
(" tools ", f"{len(all_tools)} categories · 150+ modules"),
(" tools ", f"{len(all_tools)} categories · 185+ modules"),
(" session ", info["time"]),
("", ""),
(" python ", f"{sys.version_info.major}.{sys.version_info.minor}.{sys.version_info.micro}"),

75
tools/active_directory.py Normal file
View file

@ -0,0 +1,75 @@
from core import HackingTool
from core import HackingToolsCollection
class BloodHound(HackingTool):
TITLE = "BloodHound (AD Attack Paths)"
DESCRIPTION = "Uses graph theory to reveal hidden attack paths in Active Directory/Azure environments."
INSTALL_COMMANDS = [
"pip install --user bloodhound",
"sudo apt-get install -y neo4j",
]
RUN_COMMANDS = ["bloodhound-python --help"]
PROJECT_URL = "https://github.com/BloodHoundAD/BloodHound"
SUPPORTED_OS = ["linux", "macos"]
class NetExec(HackingTool):
TITLE = "NetExec — nxc (Network Pentesting)"
DESCRIPTION = "Swiss army knife for pentesting Windows/AD networks. Successor to CrackMapExec."
INSTALL_COMMANDS = ["pip install --user netexec"]
RUN_COMMANDS = ["nxc --help"]
PROJECT_URL = "https://github.com/Pennyw0rth/NetExec"
SUPPORTED_OS = ["linux", "macos"]
class Impacket(HackingTool):
TITLE = "Impacket (Network Protocol Tools)"
DESCRIPTION = "Python classes for working with SMB, MSRPC, Kerberos, LDAP, and more."
INSTALL_COMMANDS = ["pip install --user impacket"]
RUN_COMMANDS = ["impacket-smbclient --help"]
PROJECT_URL = "https://github.com/fortra/impacket"
SUPPORTED_OS = ["linux", "macos"]
class Responder(HackingTool):
TITLE = "Responder (LLMNR/NBT-NS Poisoner)"
DESCRIPTION = "LLMNR/NBT-NS/MDNS poisoner with rogue authentication servers for credential capture."
INSTALL_COMMANDS = ["git clone https://github.com/lgandx/Responder.git"]
RUN_COMMANDS = ["cd Responder && sudo python3 Responder.py --help"]
PROJECT_URL = "https://github.com/lgandx/Responder"
SUPPORTED_OS = ["linux"]
class Certipy(HackingTool):
TITLE = "Certipy (AD Certificate Abuse)"
DESCRIPTION = "Active Directory Certificate Services enumeration and abuse tool."
INSTALL_COMMANDS = ["pip install --user certipy-ad"]
RUN_COMMANDS = ["certipy --help"]
PROJECT_URL = "https://github.com/ly4k/Certipy"
SUPPORTED_OS = ["linux", "macos"]
class Kerbrute(HackingTool):
TITLE = "Kerbrute (Kerberos Brute Force)"
DESCRIPTION = "Kerberos pre-auth brute-forcer for username enumeration and password spraying."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install github.com/ropnop/kerbrute@latest",
]
RUN_COMMANDS = ["kerbrute --help"]
PROJECT_URL = "https://github.com/ropnop/kerbrute"
SUPPORTED_OS = ["linux", "macos"]
class ActiveDirectoryTools(HackingToolsCollection):
TITLE = "Active Directory Tools"
DESCRIPTION = "Tools for AD enumeration, attack path discovery, and credential attacks."
TOOLS = [
BloodHound(),
NetExec(),
Impacket(),
Responder(),
Certipy(),
Kerbrute(),
]

51
tools/cloud_security.py Normal file
View file

@ -0,0 +1,51 @@
from core import HackingTool
from core import HackingToolsCollection
class Prowler(HackingTool):
TITLE = "Prowler (Cloud Security Scanner)"
DESCRIPTION = "Open-source security tool for AWS, Azure, GCP, and Kubernetes assessments."
INSTALL_COMMANDS = ["pip install --user prowler"]
RUN_COMMANDS = ["prowler --help"]
PROJECT_URL = "https://github.com/prowler-cloud/prowler"
SUPPORTED_OS = ["linux", "macos"]
class ScoutSuite(HackingTool):
TITLE = "ScoutSuite (Multi-Cloud Auditing)"
DESCRIPTION = "Multi-cloud security auditing tool for AWS, Azure, GCP, Alibaba, and Oracle."
INSTALL_COMMANDS = ["pip install --user scoutsuite"]
RUN_COMMANDS = ["scout --help"]
PROJECT_URL = "https://github.com/nccgroup/ScoutSuite"
SUPPORTED_OS = ["linux", "macos"]
class Pacu(HackingTool):
TITLE = "Pacu (AWS Exploitation Framework)"
DESCRIPTION = "AWS exploitation framework for offensive security testing of AWS environments."
INSTALL_COMMANDS = ["pip install --user pacu"]
RUN_COMMANDS = ["pacu --help"]
PROJECT_URL = "https://github.com/RhinoSecurityLabs/pacu"
SUPPORTED_OS = ["linux", "macos"]
class Trivy(HackingTool):
TITLE = "Trivy (Container/K8s Scanner)"
DESCRIPTION = "Comprehensive vulnerability scanner for containers, Kubernetes, IaC, and code."
INSTALL_COMMANDS = [
"curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin",
]
RUN_COMMANDS = ["trivy --help"]
PROJECT_URL = "https://github.com/aquasecurity/trivy"
SUPPORTED_OS = ["linux", "macos"]
class CloudSecurityTools(HackingToolsCollection):
TITLE = "Cloud Security Tools"
DESCRIPTION = "Tools for cloud infrastructure security assessment and exploitation."
TOOLS = [
Prowler(),
ScoutSuite(),
Pacu(),
Trivy(),
]

View file

@ -128,6 +128,18 @@ class Binwalk(HackingTool):
PROJECT_URL = "https://github.com/ReFirmLabs/binwalk"
class Pspy(HackingTool):
TITLE = "pspy (Process Monitor — No Root)"
DESCRIPTION = "Monitor Linux processes without root — detects cron jobs, scheduled tasks, other users' commands."
INSTALL_COMMANDS = [
"curl -sSL https://github.com/DominicBreuker/pspy/releases/latest/download/pspy64 -o pspy",
"chmod +x pspy",
]
RUN_COMMANDS = ["./pspy --help"]
PROJECT_URL = "https://github.com/DominicBreuker/pspy"
SUPPORTED_OS = ["linux"]
class ForensicTools(HackingToolsCollection):
TITLE = "Forensic tools"
TOOLS = [
@ -138,6 +150,7 @@ class ForensicTools(HackingToolsCollection):
Toolsley(),
Volatility3(),
Binwalk(),
Pspy(),
]
if __name__ == "__main__":

View file

@ -306,6 +306,44 @@ class Httpx(HackingTool):
PROJECT_URL = "https://github.com/projectdiscovery/httpx"
class SpiderFoot(HackingTool):
TITLE = "SpiderFoot (OSINT Automation)"
DESCRIPTION = "Automates OSINT collection for threat intelligence and attack surface mapping."
INSTALL_COMMANDS = ["pip install --user spiderfoot"]
RUN_COMMANDS = ["spiderfoot -h"]
PROJECT_URL = "https://github.com/smicallef/spiderfoot"
class Subfinder(HackingTool):
TITLE = "Subfinder (Subdomain Enumeration)"
DESCRIPTION = "Fast passive subdomain enumeration using multiple sources."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest",
]
RUN_COMMANDS = ["subfinder -h"]
PROJECT_URL = "https://github.com/projectdiscovery/subfinder"
class TruffleHog(HackingTool):
TITLE = "TruffleHog (Secret Scanner)"
DESCRIPTION = "Find, verify, and analyze leaked credentials across git repos, S3 buckets, filesystems."
INSTALL_COMMANDS = ["pip install --user trufflehog"]
RUN_COMMANDS = ["trufflehog --help"]
PROJECT_URL = "https://github.com/trufflesecurity/trufflehog"
class Gitleaks(HackingTool):
TITLE = "Gitleaks (Git Secret Scanner)"
DESCRIPTION = "Fast secret scanner for git repos — detects hardcoded passwords, API keys, tokens."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install github.com/gitleaks/gitleaks/v8@latest",
]
RUN_COMMANDS = ["gitleaks --help"]
PROJECT_URL = "https://github.com/gitleaks/gitleaks"
class InformationGatheringTools(HackingToolsCollection):
TITLE = "Information gathering tools"
TOOLS = [
@ -331,6 +369,10 @@ class InformationGatheringTools(HackingToolsCollection):
Holehe(),
Maigret(),
Httpx(),
SpiderFoot(),
Subfinder(),
TruffleHog(),
Gitleaks(),
]
if __name__ == "__main__":

42
tools/mobile_security.py Normal file
View file

@ -0,0 +1,42 @@
from core import HackingTool
from core import HackingToolsCollection
class MobSF(HackingTool):
TITLE = "MobSF (Mobile Security Framework)"
DESCRIPTION = "All-in-one mobile app pentesting, malware analysis, and security assessment."
INSTALL_COMMANDS = [
"git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git",
"cd Mobile-Security-Framework-MobSF && ./setup.sh",
]
RUN_COMMANDS = ["cd Mobile-Security-Framework-MobSF && ./run.sh"]
PROJECT_URL = "https://github.com/MobSF/Mobile-Security-Framework-MobSF"
SUPPORTED_OS = ["linux", "macos"]
class Frida(HackingTool):
TITLE = "Frida (Dynamic Instrumentation)"
DESCRIPTION = "Dynamic instrumentation toolkit for runtime hooking on Android, iOS, Windows, macOS, Linux."
INSTALL_COMMANDS = ["pip install --user frida-tools"]
RUN_COMMANDS = ["frida --help"]
PROJECT_URL = "https://github.com/frida/frida"
SUPPORTED_OS = ["linux", "macos"]
class Objection(HackingTool):
TITLE = "Objection (Mobile Runtime Exploration)"
DESCRIPTION = "Runtime mobile exploration toolkit powered by Frida — no jailbreak/root required."
INSTALL_COMMANDS = ["pip install --user objection"]
RUN_COMMANDS = ["objection --help"]
PROJECT_URL = "https://github.com/sensepost/objection"
SUPPORTED_OS = ["linux", "macos"]
class MobileSecurityTools(HackingToolsCollection):
TITLE = "Mobile Security Tools"
DESCRIPTION = "Tools for Android/iOS application security testing and analysis."
TOOLS = [
MobSF(),
Frida(),
Objection(),
]

View file

@ -54,12 +54,100 @@ class PwncatCS(HackingTool):
PROJECT_URL = "https://github.com/calebstewart/pwncat"
class Sliver(HackingTool):
TITLE = "Sliver (C2 Framework)"
DESCRIPTION = "Cross-platform adversary emulation/red team C2 framework — mTLS, HTTP(S), DNS, WireGuard."
INSTALL_COMMANDS = [
"curl https://sliver.sh/install | sudo bash",
]
RUN_COMMANDS = ["sliver --help"]
PROJECT_URL = "https://github.com/BishopFox/sliver"
SUPPORTED_OS = ["linux", "macos"]
class Havoc(HackingTool):
TITLE = "Havoc (C2 Framework)"
DESCRIPTION = "Modern post-exploitation C2 framework with EDR evasion. Cobalt Strike alternative."
INSTALL_OS = ["linux"]
INSTALL_COMMANDS = [
"git clone https://github.com/HavocFramework/Havoc.git",
"cd Havoc && make",
]
RUN_COMMANDS = ["cd Havoc && ./havoc --help"]
PROJECT_URL = "https://github.com/HavocFramework/Havoc"
SUPPORTED_OS = ["linux"]
class PEASSng(HackingTool):
TITLE = "PEASS-ng — LinPEAS/WinPEAS (Priv Esc)"
DESCRIPTION = "Privilege escalation enumeration scripts for Linux and Windows."
INSTALL_COMMANDS = [
"curl -sSL https://github.com/peass-ng/PEASS-ng/releases/latest/download/linpeas.sh -o linpeas.sh",
"chmod +x linpeas.sh",
]
RUN_COMMANDS = ["./linpeas.sh --help"]
PROJECT_URL = "https://github.com/peass-ng/PEASS-ng"
class LigoloNg(HackingTool):
TITLE = "Ligolo-ng (Tunneling/Pivoting)"
DESCRIPTION = "Advanced tunneling/pivoting tool using TUN interfaces — no SOCKS needed."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install github.com/nicocha30/ligolo-ng@latest",
]
RUN_COMMANDS = ["ligolo-ng --help"]
PROJECT_URL = "https://github.com/nicocha30/ligolo-ng"
SUPPORTED_OS = ["linux", "macos"]
class ChiselTunnel(HackingTool):
TITLE = "Chisel (HTTP Tunnel)"
DESCRIPTION = "Fast TCP/UDP tunnel over HTTP, secured via SSH — pivoting and port forwarding."
REQUIRES_GO = True
INSTALL_COMMANDS = [
"go install github.com/jpillora/chisel@latest",
]
RUN_COMMANDS = ["chisel --help"]
PROJECT_URL = "https://github.com/jpillora/chisel"
class EvilWinRM(HackingTool):
TITLE = "Evil-WinRM (Windows Remote Shell)"
DESCRIPTION = "Ultimate WinRM shell for hacking/pentesting Windows machines."
REQUIRES_RUBY = True
INSTALL_COMMANDS = ["gem install evil-winrm"]
RUN_COMMANDS = ["evil-winrm --help"]
PROJECT_URL = "https://github.com/Hackplayers/evil-winrm"
SUPPORTED_OS = ["linux"]
class Mythic(HackingTool):
TITLE = "Mythic (C2 Platform)"
DESCRIPTION = "Collaborative, multi-payload C2 platform designed for red team operations."
REQUIRES_DOCKER = True
INSTALL_COMMANDS = [
"git clone https://github.com/its-a-feature/Mythic.git",
"cd Mythic && sudo make",
]
RUN_COMMANDS = ["cd Mythic && sudo ./mythic-cli start"]
PROJECT_URL = "https://github.com/its-a-feature/Mythic"
SUPPORTED_OS = ["linux"]
class PostExploitationTools(HackingToolsCollection):
TITLE = "Post exploitation tools"
TOOLS = [
Vegile(),
ChromeKeyLogger(),
PwncatCS(),
Sliver(),
Havoc(),
PEASSng(),
LigoloNg(),
ChiselTunnel(),
EvilWinRM(),
Mythic(),
]
if __name__ == "__main__":

View file

@ -52,12 +52,38 @@ class Jadx(HackingTool):
super().__init__(runnable=False)
class Ghidra(HackingTool):
TITLE = "Ghidra (NSA Reverse Engineering)"
DESCRIPTION = "NSA's software reverse engineering framework — disassembly, decompilation, scripting."
REQUIRES_JAVA = True
INSTALL_COMMANDS = [
"sudo apt-get install -y ghidra || echo 'Download from https://ghidra-sre.org/'",
]
RUN_COMMANDS = ["ghidra --help || echo 'Run: ghidraRun'"]
PROJECT_URL = "https://github.com/NationalSecurityAgency/ghidra"
SUPPORTED_OS = ["linux", "macos"]
class Radare2(HackingTool):
TITLE = "Radare2 (RE Framework)"
DESCRIPTION = "Portable UNIX-like reverse engineering framework and command-line toolset."
INSTALL_COMMANDS = [
"git clone https://github.com/radareorg/radare2.git",
"cd radare2 && sys/install.sh",
]
RUN_COMMANDS = ["r2 -h"]
PROJECT_URL = "https://github.com/radareorg/radare2"
SUPPORTED_OS = ["linux", "macos"]
class ReverseEngineeringTools(HackingToolsCollection):
TITLE = "Reverse engineering tools"
TOOLS = [
AndroGuard(),
Apk2Gold(),
Jadx()
Jadx(),
Ghidra(),
Radare2(),
]
if __name__ == "__main__":

View file

@ -193,6 +193,67 @@ class Katana(HackingTool):
PROJECT_URL = "https://github.com/projectdiscovery/katana"
class Gobuster(HackingTool):
TITLE = "Gobuster (Dir/DNS/Vhost Brute Force)"
DESCRIPTION = "Directory/file, DNS, and vhost brute-forcing tool written in Go."
REQUIRES_GO = True
INSTALL_COMMANDS = ["go install github.com/OJ/gobuster/v3@latest"]
RUN_COMMANDS = ["gobuster --help"]
PROJECT_URL = "https://github.com/OJ/gobuster"
class Dirsearch(HackingTool):
TITLE = "Dirsearch (Web Path Discovery)"
DESCRIPTION = "Web path brute-forcing tool for discovering directories and files on web servers."
INSTALL_COMMANDS = ["pip install --user dirsearch"]
RUN_COMMANDS = ["dirsearch --help"]
PROJECT_URL = "https://github.com/maurosoria/dirsearch"
class OwaspZap(HackingTool):
TITLE = "OWASP ZAP (Web App Scanner)"
DESCRIPTION = "Full-featured web application security scanner — proxy, spider, fuzzer, scanner."
SUPPORTED_OS = ["linux"]
INSTALL_COMMANDS = ["sudo apt-get install -y zaproxy"]
RUN_COMMANDS = ["zaproxy --help"]
PROJECT_URL = "https://github.com/zaproxy/zaproxy"
class TestSSL(HackingTool):
TITLE = "testssl.sh (TLS/SSL Checker)"
DESCRIPTION = "Check TLS/SSL ciphers, protocols, and cryptographic flaws on any port."
INSTALL_COMMANDS = ["git clone https://github.com/drwetter/testssl.sh.git"]
RUN_COMMANDS = ["cd testssl.sh && ./testssl.sh --help"]
PROJECT_URL = "https://github.com/drwetter/testssl.sh"
class Arjun(HackingTool):
TITLE = "Arjun (HTTP Parameter Discovery)"
DESCRIPTION = "HTTP parameter discovery suite that finds hidden GET/POST parameters."
INSTALL_COMMANDS = ["pip install --user arjun"]
RUN_COMMANDS = ["arjun --help"]
PROJECT_URL = "https://github.com/s0md3v/Arjun"
class Caido(HackingTool):
TITLE = "Caido (Web Security Auditing)"
DESCRIPTION = "Lightweight, modern web security auditing toolkit — Burp Suite alternative written in Rust."
INSTALL_COMMANDS = [
"curl -sSL https://caido.download/releases/latest/caido-cli-linux-x86_64.tar.gz | sudo tar xz -C /usr/local/bin",
]
RUN_COMMANDS = ["caido --help"]
PROJECT_URL = "https://github.com/caido/caido"
SUPPORTED_OS = ["linux", "macos"]
class Mitmproxy(HackingTool):
TITLE = "mitmproxy (Intercepting Proxy)"
DESCRIPTION = "Interactive TLS-capable intercepting HTTP proxy for pentesters and developers."
INSTALL_COMMANDS = ["pip install --user mitmproxy"]
RUN_COMMANDS = ["mitmproxy --version"]
PROJECT_URL = "https://github.com/mitmproxy/mitmproxy"
class WebAttackTools(HackingToolsCollection):
TITLE = "Web Attack tools"
DESCRIPTION = ""
@ -210,6 +271,13 @@ class WebAttackTools(HackingToolsCollection):
Nikto(),
Wafw00f(),
Katana(),
Gobuster(),
Dirsearch(),
OwaspZap(),
TestSSL(),
Arjun(),
Caido(),
Mitmproxy(),
]
if __name__ == "__main__":

View file

@ -200,6 +200,15 @@ class Hcxtools(HackingTool):
PROJECT_URL = "https://github.com/ZerBea/hcxtools"
class Bettercap(HackingTool):
TITLE = "Bettercap (Network/WiFi/BLE MITM)"
DESCRIPTION = "Swiss army knife for WiFi, BLE, HID, and Ethernet network recon and MITM attacks."
SUPPORTED_OS = ["linux"]
INSTALL_COMMANDS = ["sudo apt-get install -y bettercap"]
RUN_COMMANDS = ["sudo bettercap --help"]
PROJECT_URL = "https://github.com/bettercap/bettercap"
class WirelessAttackTools(HackingToolsCollection):
TITLE = "Wireless attack tools"
TOOLS = [
@ -215,6 +224,7 @@ class WirelessAttackTools(HackingToolsCollection):
Airgeddon(),
Hcxdumptool(),
Hcxtools(),
Bettercap(),
]