mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-22 16:39:40 +00:00
Redesign README with modern GitHub features
Header: - for-the-badge style badges with logos and custom colors - Stats counter table (20 categories, 185+ tools, 19 tags, 2 platforms) - CTA buttons: Install Now, Quick Commands, Suggest a Tool What's New: - Wrapped in collapsible <details open> with icon-prefixed table rows - Each feature has an emoji icon for visual scanning Quick Commands: - Centered table with Works-in column showing scope Tool Categories: - 2-column table layout showing all 20 categories side by side - Wrapped in collapsible section Tool lists: - Every category wrapped in collapsible <details> sections - Keeps README scannable — users expand only what they need - New tools still marked with star Contributing: - Side-by-side table: Issue template left, PR template right Installation: - Side-by-side table: One-liner left, Manual right - Docker in collapsible section (not everyone needs it) Requirements: - Table format with version, dependency, and "needed for" columns Support/Social: - Centered layout with for-the-badge Twitter/GitHub follow buttons - Larger Buy Me a Coffee button
This commit is contained in:
parent
c1792a04a6
commit
bf3b7e7f52
1 changed files with 227 additions and 150 deletions
377
README.md
377
README.md
|
|
@ -2,101 +2,126 @@
|
|||
|
||||
<img src="images/logo.svg" alt="HackingTool" width="600">
|
||||
|
||||
<br>
|
||||
<br><br>
|
||||
|
||||
**All-in-One Hacking Tool for Security Researchers & Pentesters**
|
||||
|
||||
[](LICENSE)
|
||||
[](https://www.python.org/)
|
||||
[](#)
|
||||
[](#)
|
||||
[](https://github.com/Z4nzu/hackingtool/stargazers)
|
||||
[](https://github.com/Z4nzu/hackingtool/network/members)
|
||||
[](https://github.com/Z4nzu/hackingtool/issues)
|
||||
[](https://github.com/Z4nzu/hackingtool/commits/master)
|
||||
<br>
|
||||
|
||||
[](LICENSE)
|
||||
[](https://www.python.org/)
|
||||
[](#)
|
||||
[](#)
|
||||
|
||||
[](https://github.com/Z4nzu/hackingtool/stargazers)
|
||||
[](https://github.com/Z4nzu/hackingtool/network/members)
|
||||
[](https://github.com/Z4nzu/hackingtool/issues)
|
||||
[](https://github.com/Z4nzu/hackingtool/commits/master)
|
||||
|
||||
<br>
|
||||
|
||||
```
|
||||
20 categories · 185+ tools · Linux & macOS · Rich terminal UI
|
||||
```
|
||||
<table>
|
||||
<tr>
|
||||
<td align="center"><b>20</b><br><sub>Categories</sub></td>
|
||||
<td align="center"><b>185+</b><br><sub>Tools</sub></td>
|
||||
<td align="center"><b>19</b><br><sub>Tags</sub></td>
|
||||
<td align="center"><b>2</b><br><sub>Platforms</sub></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<br>
|
||||
|
||||
<a href="#installation"><img src="https://img.shields.io/badge/Get_Started-Install_Now-00FF88?style=for-the-badge&logo=rocket&logoColor=white" alt="Install Now"></a>
|
||||
|
||||
<a href="#quick-commands"><img src="https://img.shields.io/badge/Quick_Commands-Reference-7B61FF?style=for-the-badge&logo=bookopen&logoColor=white" alt="Quick Commands"></a>
|
||||
|
||||
<a href="https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md"><img src="https://img.shields.io/badge/Suggest_a_Tool-Request-FF61DC?style=for-the-badge&logo=plus&logoColor=white" alt="Suggest a Tool"></a>
|
||||
|
||||
</div>
|
||||
|
||||
---
|
||||
|
||||
## What's New in v2.0.0
|
||||
<details open>
|
||||
<summary><h2>What's New in v2.0.0</h2></summary>
|
||||
|
||||
| | Change |
|
||||
|---|---|
|
||||
| **Python** | 3.10+ required — all Python 2 code removed |
|
||||
| **OS-aware** | Linux-only tools hidden automatically on macOS |
|
||||
| **Archived** | Unmaintained tools moved to a separate sub-menu |
|
||||
| **Paths** | All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/` |
|
||||
| **Root** | No more `sudo git clone` — installs to user home |
|
||||
| **New tools** | 22 modern tools added across 6 categories |
|
||||
| **UI** | Rich terminal UI with shared theme — single consistent console |
|
||||
| **Menus** | Iterative navigation — no more recursion stack overflow |
|
||||
| **Docker** | Builds locally — no unverified external images |
|
||||
| **Deps** | `requirements.txt` cleaned — removed unused flask/boxes/lolcat/requests |
|
||||
| **Search** | Type `/` or `s` to search 185+ tools by name, description, or keyword |
|
||||
| **Tags** | Type `t` to filter by tag — osint, web, c2, cloud, mobile, wireless, and 13 more |
|
||||
| **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools |
|
||||
| **Install status** | Each tool shows ✔ (installed) or ✘ (not installed) in the menu |
|
||||
| **Install all** | Option `97` in any category — install all tools at once |
|
||||
| **Update** | Each tool has an Update option — smart detection (git pull / pip upgrade / go install) |
|
||||
| **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — no manual clone needed |
|
||||
| **3 new categories** | Active Directory, Cloud Security, Mobile Security |
|
||||
| **35 new tools** | BloodHound, Sliver, Impacket, Frida, Prowler, Subfinder, Gobuster, and 28 more |
|
||||
<table>
|
||||
<tr><td>
|
||||
|
||||
| | Feature | Description |
|
||||
|:---:|---|---|
|
||||
| **🐍** | **Python 3.10+** | All Python 2 code removed, modern syntax throughout |
|
||||
| **🖥** | **OS-aware menus** | Linux-only tools hidden automatically on macOS |
|
||||
| **📦** | **185+ tools** | 35 new modern tools added across 6 categories |
|
||||
| **🔍** | **Search** | Type `/` to search all tools by name, description, or keyword |
|
||||
| **🏷** | **Tag filter** | Type `t` to filter by 19 tags — osint, web, c2, cloud, mobile... |
|
||||
| **💡** | **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools |
|
||||
| **✅** | **Install status** | ✔/✘ shown next to every tool — know what's ready |
|
||||
| **⚡** | **Install all** | Option `97` in any category — batch install at once |
|
||||
| **🔄** | **Smart update** | Each tool has Update — auto-detects git pull / pip upgrade / go install |
|
||||
| **📂** | **Open folder** | Jump into any tool's directory for manual inspection |
|
||||
| **🐳** | **Docker** | Builds locally — no unverified external images |
|
||||
| **🚀** | **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — zero manual steps |
|
||||
| **🏢** | **3 new categories** | Active Directory, Cloud Security, Mobile Security |
|
||||
|
||||
</td></tr>
|
||||
</table>
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
## Quick Commands
|
||||
|
||||
| Command | What it does |
|
||||
|---|---|
|
||||
| `/` or `s` | Search all 185+ tools by name, description, or keyword |
|
||||
| `t` | Filter tools by tag (osint, scanner, c2, cloud, etc.) |
|
||||
| `r` | Recommend tools for a task ("scan a network", "crack passwords", ...) |
|
||||
| `?` | Quick help reference — works in every menu |
|
||||
| `q` | Quit from any menu level |
|
||||
| `97` | Install all tools in current category |
|
||||
| `99` | Go back to previous menu |
|
||||
<div align="center">
|
||||
|
||||
| Command | Action | Works in |
|
||||
|:---:|---|:---:|
|
||||
| `/query` | **Search** — find tools instantly by keyword | Main menu |
|
||||
| `t` | **Tags** — filter by osint, scanner, c2, cloud, mobile... | Main menu |
|
||||
| `r` | **Recommend** — "I want to do X" → matching tools | Main menu |
|
||||
| `?` | **Help** — quick reference card | Everywhere |
|
||||
| `q` | **Quit** — exit from any depth | Everywhere |
|
||||
| `97` | **Install All** — batch install all tools in category | Category |
|
||||
| `99` | **Back** — return to previous menu | Everywhere |
|
||||
|
||||
</div>
|
||||
|
||||
---
|
||||
|
||||
## Tool Categories
|
||||
<details open>
|
||||
<summary><h2>Tool Categories</h2></summary>
|
||||
|
||||
| # | Category | Tools |
|
||||
|---|---|:---:|
|
||||
| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 |
|
||||
| 2 | [Information Gathering](#information-gathering-tools) | 26 |
|
||||
| 3 | [Wordlist Generator](#wordlist-generator) | 7 |
|
||||
| 4 | [Wireless Attack](#wireless-attack-tools) | 13 |
|
||||
| 5 | [SQL Injection](#sql-injection-tools) | 7 |
|
||||
| 6 | [Phishing Attack](#phishing-attack-tools) | 17 |
|
||||
| 7 | [Web Attack](#web-attack-tools) | 20 |
|
||||
| 8 | [Post Exploitation](#post-exploitation-tools) | 10 |
|
||||
| 9 | [Forensics](#forensic-tools) | 8 |
|
||||
| 10 | [Payload Creation](#payload-creation-tools) | 8 |
|
||||
| 11 | [Exploit Framework](#exploit-framework) | 4 |
|
||||
| 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 |
|
||||
| 13 | [DDOS Attack](#ddos-attack-tools) | 5 |
|
||||
| 14 | [RAT](#remote-administrator-tools-rat) | 1 |
|
||||
| 15 | [XSS Attack](#xss-attack-tools) | 9 |
|
||||
| 16 | [Steganography](#steganography-tools) | 4 |
|
||||
| 17 | [Active Directory](#active-directory-tools) | 6 |
|
||||
| 18 | [Cloud Security](#cloud-security-tools) | 4 |
|
||||
| 19 | [Mobile Security](#mobile-security-tools) | 3 |
|
||||
| 20 | [Other Tools](#other-tools) | 24 |
|
||||
<div align="center">
|
||||
|
||||
| # | Category | Tools | | # | Category | Tools |
|
||||
|:---:|---|:---:|---|:---:|---|:---:|
|
||||
| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 | | 11 | [Exploit Framework](#exploit-framework) | 4 |
|
||||
| 2 | [Information Gathering](#information-gathering-tools) | 26 | | 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 |
|
||||
| 3 | [Wordlist Generator](#wordlist-generator) | 7 | | 13 | [DDOS Attack](#ddos-attack-tools) | 5 |
|
||||
| 4 | [Wireless Attack](#wireless-attack-tools) | 13 | | 14 | [RAT](#remote-administrator-tools-rat) | 1 |
|
||||
| 5 | [SQL Injection](#sql-injection-tools) | 7 | | 15 | [XSS Attack](#xss-attack-tools) | 9 |
|
||||
| 6 | [Phishing Attack](#phishing-attack-tools) | 17 | | 16 | [Steganography](#steganography-tools) | 4 |
|
||||
| 7 | [Web Attack](#web-attack-tools) | 20 | | 17 | [Active Directory](#active-directory-tools) | 6 |
|
||||
| 8 | [Post Exploitation](#post-exploitation-tools) | 10 | | 18 | [Cloud Security](#cloud-security-tools) | 4 |
|
||||
| 9 | [Forensics](#forensic-tools) | 8 | | 19 | [Mobile Security](#mobile-security-tools) | 3 |
|
||||
| 10 | [Payload Creation](#payload-creation-tools) | 8 | | 20 | [Other Tools](#other-tools) | 24 |
|
||||
|
||||
</div>
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
## Anonymously Hiding Tools
|
||||
<details>
|
||||
<summary><h2>Anonymously Hiding Tools</h2></summary>
|
||||
|
||||
- [Anonymously Surf](https://github.com/Und3rf10w/kali-anonsurf)
|
||||
- [Multitor](https://github.com/trimstray/multitor)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Information Gathering Tools</h2></summary>
|
||||
|
||||
## Information Gathering Tools
|
||||
- [Network Map (nmap)](https://github.com/nmap/nmap)
|
||||
- [Dracnmap](https://github.com/Screetsec/Dracnmap)
|
||||
- Port scanning
|
||||
|
|
@ -123,8 +148,11 @@
|
|||
- [Subfinder](https://github.com/projectdiscovery/subfinder) ★
|
||||
- [TruffleHog](https://github.com/trufflesecurity/trufflehog) ★
|
||||
- [Gitleaks](https://github.com/gitleaks/gitleaks) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Wordlist Generator</h2></summary>
|
||||
|
||||
## Wordlist Generator
|
||||
- [Cupp](https://github.com/Mebus/cupp)
|
||||
- [WordlistCreator](https://github.com/Z4nzu/wlcreator)
|
||||
- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator)
|
||||
|
|
@ -132,8 +160,11 @@
|
|||
- [Hashcat](https://github.com/hashcat/hashcat) ★
|
||||
- [John the Ripper](https://github.com/openwall/john) ★
|
||||
- [haiti](https://github.com/noraj/haiti) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Wireless Attack Tools</h2></summary>
|
||||
|
||||
## Wireless Attack Tools
|
||||
- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
|
||||
- [pixiewps](https://github.com/wiire/pixiewps)
|
||||
- [Bluetooth Honeypot (bluepot)](https://github.com/andrewmichaelsmith/bluepot)
|
||||
|
|
@ -147,8 +178,11 @@
|
|||
- [hcxdumptool](https://github.com/ZerBea/hcxdumptool) ★
|
||||
- [hcxtools](https://github.com/ZerBea/hcxtools) ★
|
||||
- [Bettercap](https://github.com/bettercap/bettercap) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>SQL Injection Tools</h2></summary>
|
||||
|
||||
## SQL Injection Tools
|
||||
- [Sqlmap](https://github.com/sqlmapproject/sqlmap)
|
||||
- [NoSqlMap](https://github.com/codingo/NoSQLMap)
|
||||
- [DSSS](https://github.com/stamparm/DSSS)
|
||||
|
|
@ -156,8 +190,11 @@
|
|||
- [Blisqy](https://github.com/JohnTroony/Blisqy)
|
||||
- [Leviathan](https://github.com/leviathan-framework/leviathan)
|
||||
- [SQLScan](https://github.com/Cvar1984/sqlscan)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Phishing Attack Tools</h2></summary>
|
||||
|
||||
## Phishing Attack Tools
|
||||
- [Autophisher](https://github.com/CodingRanjith/autophisher)
|
||||
- [PyPhisher](https://github.com/KasRoudra/PyPhisher)
|
||||
- [AdvPhishing](https://github.com/Ignitetch/AdvPhishing)
|
||||
|
|
@ -175,8 +212,11 @@
|
|||
- [Maskphish](https://github.com/jaykali/maskphish)
|
||||
- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
|
||||
- [dnstwist](https://github.com/elceef/dnstwist)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Web Attack Tools</h2></summary>
|
||||
|
||||
## Web Attack Tools
|
||||
- [Web2Attack](https://github.com/santatic/web2attack)
|
||||
- Skipfish
|
||||
- [Sublist3r](https://github.com/aboul3la/Sublist3r)
|
||||
|
|
@ -196,8 +236,11 @@
|
|||
- [Arjun](https://github.com/s0md3v/Arjun) ★
|
||||
- [Caido](https://github.com/caido/caido) ★
|
||||
- [mitmproxy](https://github.com/mitmproxy/mitmproxy) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Post Exploitation Tools</h2></summary>
|
||||
|
||||
## Post Exploitation Tools
|
||||
- [Vegile](https://github.com/Screetsec/Vegile)
|
||||
- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
|
||||
- [pwncat-cs](https://github.com/calebstewart/pwncat) ★
|
||||
|
|
@ -208,8 +251,11 @@
|
|||
- [Chisel](https://github.com/jpillora/chisel) ★
|
||||
- [Evil-WinRM](https://github.com/Hackplayers/evil-winrm) ★
|
||||
- [Mythic](https://github.com/its-a-feature/Mythic) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Forensic Tools</h2></summary>
|
||||
|
||||
## Forensic Tools
|
||||
- Autopsy
|
||||
- Wireshark
|
||||
- [Bulk extractor](https://github.com/simsong/bulk_extractor)
|
||||
|
|
@ -218,8 +264,11 @@
|
|||
- [Volatility 3](https://github.com/volatilityfoundation/volatility3) ★
|
||||
- [Binwalk](https://github.com/ReFirmLabs/binwalk) ★
|
||||
- [pspy](https://github.com/DominicBreuker/pspy) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Payload Creation Tools</h2></summary>
|
||||
|
||||
## Payload Creation Tools
|
||||
- [The FatRat](https://github.com/Screetsec/TheFatRat)
|
||||
- [Brutal](https://github.com/Screetsec/Brutal)
|
||||
- [Stitch](https://nathanlopez.github.io/Stitch)
|
||||
|
|
@ -228,31 +277,46 @@
|
|||
- [Spycam](https://github.com/indexnotfound404/spycam)
|
||||
- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
|
||||
- [Enigma](https://github.com/UndeadSec/Enigma)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Exploit Framework</h2></summary>
|
||||
|
||||
## Exploit Framework
|
||||
- [RouterSploit](https://github.com/threat9/routersploit)
|
||||
- [WebSploit](https://github.com/The404Hacking/websploit)
|
||||
- [Commix](https://github.com/commixproject/commix)
|
||||
- [Web2Attack](https://github.com/santatic/web2attack)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Reverse Engineering Tools</h2></summary>
|
||||
|
||||
## Reverse Engineering Tools
|
||||
- [Androguard](https://github.com/androguard/androguard)
|
||||
- [Apk2Gold](https://github.com/lxdvs/apk2gold)
|
||||
- [JadX](https://github.com/skylot/jadx)
|
||||
- [Ghidra](https://github.com/NationalSecurityAgency/ghidra) ★
|
||||
- [Radare2](https://github.com/radareorg/radare2) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>DDOS Attack Tools</h2></summary>
|
||||
|
||||
## DDOS Attack Tools
|
||||
- [DDoS Script](https://github.com/the-deepnet/ddos)
|
||||
- [SlowLoris](https://github.com/gkbrk/slowloris)
|
||||
- [Asyncrone](https://github.com/fatihsnsy/aSYNcrone)
|
||||
- [UFOnet](https://github.com/epsylon/ufonet)
|
||||
- [GoldenEye](https://github.com/jseidl/GoldenEye)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Remote Administrator Tools (RAT)</h2></summary>
|
||||
|
||||
## Remote Administrator Tools (RAT)
|
||||
- [Pyshell](https://github.com/knassar702/pyshell)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>XSS Attack Tools</h2></summary>
|
||||
|
||||
## XSS Attack Tools
|
||||
- [DalFox](https://github.com/hahwul/dalfox)
|
||||
- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER)
|
||||
- [Extended XSS Searcher](https://github.com/Damian89/extended-xss-search)
|
||||
|
|
@ -262,32 +326,46 @@
|
|||
- [XanXSS](https://github.com/Ekultek/XanXSS)
|
||||
- [XSStrike](https://github.com/UltimateHackers/XSStrike)
|
||||
- [RVuln](https://github.com/iinc0gnit0/RVuln)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Steganography Tools</h2></summary>
|
||||
|
||||
## Steganography Tools
|
||||
- SteganoHide
|
||||
- [StegoCracker](https://github.com/W1LDN16H7/StegoCracker)
|
||||
- [Whitespace](https://github.com/beardog108/snow10)
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Active Directory Tools</h2></summary>
|
||||
|
||||
## Active Directory Tools
|
||||
- [BloodHound](https://github.com/BloodHoundAD/BloodHound) ★
|
||||
- [NetExec (nxc)](https://github.com/Pennyw0rth/NetExec) ★
|
||||
- [Impacket](https://github.com/fortra/impacket) ★
|
||||
- [Responder](https://github.com/lgandx/Responder) ★
|
||||
- [Certipy](https://github.com/ly4k/Certipy) ★
|
||||
- [Kerbrute](https://github.com/ropnop/kerbrute) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Cloud Security Tools</h2></summary>
|
||||
|
||||
## Cloud Security Tools
|
||||
- [Prowler](https://github.com/prowler-cloud/prowler) ★
|
||||
- [ScoutSuite](https://github.com/nccgroup/ScoutSuite) ★
|
||||
- [Pacu](https://github.com/RhinoSecurityLabs/pacu) ★
|
||||
- [Trivy](https://github.com/aquasecurity/trivy) ★
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary><h2>Mobile Security Tools</h2></summary>
|
||||
|
||||
## Mobile Security Tools
|
||||
- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) ★
|
||||
- [Frida](https://github.com/frida/frida) ★
|
||||
- [Objection](https://github.com/sensepost/objection) ★
|
||||
</details>
|
||||
|
||||
## Other Tools
|
||||
<details>
|
||||
<summary><h2>Other Tools</h2></summary>
|
||||
|
||||
#### SocialMedia Bruteforce
|
||||
- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
|
||||
|
|
@ -330,114 +408,107 @@
|
|||
#### Mix Tools
|
||||
- Terminal Multiplexer (tilix)
|
||||
- [Crivo](https://github.com/GMDSantana/crivo)
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
## Contributing — Add a New Tool
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<td width="50%">
|
||||
|
||||
### Open an Issue
|
||||
|
||||
> **Title format:** `[Tool Request] ToolName — Category`
|
||||
> Example: `[Tool Request] Subfinder — Information Gathering`
|
||||
> **Title:** `[Tool Request] ToolName — Category`
|
||||
|
||||
Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) issue template.
|
||||
Required fields: tool name, GitHub URL, category, supported OS, install command, reason for inclusion.
|
||||
Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) template.
|
||||
|
||||
Required: tool name, GitHub URL, category, OS, install command, reason.
|
||||
|
||||
</td>
|
||||
<td width="50%">
|
||||
|
||||
### Open a Pull Request
|
||||
|
||||
> **Title format:** `[New Tool] ToolName — Category`
|
||||
> Example: `[New Tool] Subfinder — Information Gathering`
|
||||
> **Title:** `[New Tool] ToolName — Category`
|
||||
|
||||
Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist. Key requirements:
|
||||
Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist.
|
||||
|
||||
1. Add your class to the right `tools/*.py` file
|
||||
2. Set `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL`
|
||||
3. Set `SUPPORTED_OS` — `["linux"]` or `["linux", "macos"]`
|
||||
4. Append the instance to `TOOLS` list in the collection at the bottom of the file
|
||||
5. Test install + run locally before submitting
|
||||
Required: class in `tools/*.py`, TITLE, DESCRIPTION, INSTALL/RUN commands, SUPPORTED_OS, test locally.
|
||||
|
||||
Issues or PRs that **don't follow the title format** will be closed without review.
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
> Issues or PRs that don't follow the title format will be closed without review.
|
||||
|
||||
---
|
||||
|
||||
## Installation
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<td>
|
||||
|
||||
### One-liner (recommended)
|
||||
|
||||
```bash
|
||||
curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bash
|
||||
```
|
||||
|
||||
This handles everything — installs prerequisites, clones the repo, sets up a venv, and creates the `hackingtool` command.
|
||||
Handles everything — prerequisites, clone, venv, launcher.
|
||||
|
||||
### Manual install
|
||||
</td>
|
||||
<td>
|
||||
|
||||
### Manual
|
||||
|
||||
```bash
|
||||
git clone https://github.com/Z4nzu/hackingtool.git
|
||||
cd hackingtool
|
||||
sudo python3 install.py # detects local source, copies instead of re-cloning
|
||||
sudo python3 install.py
|
||||
```
|
||||
|
||||
Then run:
|
||||
```bash
|
||||
hackingtool
|
||||
```
|
||||
Then run: `hackingtool`
|
||||
|
||||
## Docker
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
### Step 1 — Clone the repository
|
||||
|
||||
```bash
|
||||
git clone https://github.com/Z4nzu/hackingtool.git
|
||||
cd hackingtool
|
||||
```
|
||||
|
||||
### Step 2 — Build the image
|
||||
<details>
|
||||
<summary><h3>Docker</h3></summary>
|
||||
|
||||
```bash
|
||||
# Build
|
||||
docker build -t hackingtool .
|
||||
```
|
||||
|
||||
> First build takes a few minutes (Kali base + apt packages). Subsequent builds are fast thanks to BuildKit layer caching.
|
||||
|
||||
### Step 3 — Run
|
||||
|
||||
**Option A — Direct (no Compose):**
|
||||
```bash
|
||||
# Run (direct)
|
||||
docker run -it --rm hackingtool
|
||||
```
|
||||
|
||||
**Option B — With Docker Compose (recommended):**
|
||||
```bash
|
||||
# Start in background
|
||||
# Run (Compose — recommended)
|
||||
docker compose up -d
|
||||
|
||||
# Open an interactive shell
|
||||
docker exec -it hackingtool bash
|
||||
|
||||
# Then launch the tool inside the container
|
||||
python3 hackingtool.py
|
||||
```
|
||||
|
||||
**Option C — Dev mode (live source mount, changes reflected without rebuild):**
|
||||
```bash
|
||||
# Dev mode (live source mount)
|
||||
docker compose --profile dev up
|
||||
docker exec -it hackingtool-dev bash
|
||||
|
||||
# Stop
|
||||
docker compose down # stop container
|
||||
docker compose down -v # also remove data volume
|
||||
```
|
||||
|
||||
### Stopping
|
||||
</details>
|
||||
|
||||
```bash
|
||||
docker compose down # stop and remove container
|
||||
docker compose down -v # also remove the tools data volume
|
||||
```
|
||||
### Requirements
|
||||
|
||||
## Requirements
|
||||
|
||||
- Python 3.10+
|
||||
- Linux (Kali, Parrot, Ubuntu) or macOS
|
||||
- Go 1.21+ *(for nuclei, ffuf, amass, httpx, katana, dalfox)*
|
||||
- Ruby *(for haiti)*
|
||||
| Dependency | Version | Needed for |
|
||||
|---|---|---|
|
||||
| Python | 3.10+ | Core |
|
||||
| Go | 1.21+ | nuclei, ffuf, amass, httpx, katana, dalfox, gobuster, subfinder |
|
||||
| Ruby | any | haiti, evil-winrm |
|
||||
| Docker | any | Mythic, MobSF (optional) |
|
||||
|
||||
```bash
|
||||
pip install -r requirements.txt
|
||||
|
|
@ -455,18 +526,24 @@ pip install -r requirements.txt
|
|||
|
||||
---
|
||||
|
||||
<div align="center">
|
||||
|
||||
## Support
|
||||
|
||||
If this project helps you, consider buying me a coffee:
|
||||
|
||||
<a href="https://buymeacoffee.com/hardikzinzu" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" height="50"></a>
|
||||
<a href="https://buymeacoffee.com/hardikzinzu" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" height="60"></a>
|
||||
|
||||
## Social
|
||||
<br><br>
|
||||
|
||||
[](https://twitter.com/_Zinzu07)
|
||||
[](https://github.com/Z4nzu/)
|
||||
[](https://twitter.com/_Zinzu07)
|
||||
[](https://github.com/Z4nzu/)
|
||||
|
||||
> **Please don't use for illegal activity.**
|
||||
<br>
|
||||
|
||||
> **For authorized security testing only.**
|
||||
> Thanks to all original authors of the tools included in hackingtool.
|
||||
|
||||
Your favourite tool is not listed? [Suggest it here](https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md)
|
||||
|
||||
</div>
|
||||
|
|
|
|||
Loading…
Reference in a new issue