diff --git a/README.md b/README.md index 3f714cb..88e160d 100644 --- a/README.md +++ b/README.md @@ -2,101 +2,126 @@ HackingTool -
+

**All-in-One Hacking Tool for Security Researchers & Pentesters** -[![License](https://img.shields.io/github/license/Z4nzu/hackingtool?style=flat-square)](LICENSE) -[![Python](https://img.shields.io/badge/Python-3.10+-3776AB?style=flat-square&logo=python&logoColor=white)](https://www.python.org/) -[![Version](https://img.shields.io/badge/version-2.0.0-brightgreen?style=flat-square)](#) -[![Platform](https://img.shields.io/badge/platform-Linux%20%7C%20Kali%20%7C%20Parrot%20%7C%20macOS-informational?style=flat-square)](#) -[![Stars](https://img.shields.io/github/stars/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/stargazers) -[![Forks](https://img.shields.io/github/forks/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/network/members) -[![Issues](https://img.shields.io/github/issues/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/issues) -[![Last Commit](https://img.shields.io/github/last-commit/Z4nzu/hackingtool?style=flat-square)](https://github.com/Z4nzu/hackingtool/commits/master) +
+ +[![License](https://img.shields.io/github/license/Z4nzu/hackingtool?style=for-the-badge&color=7B61FF)](LICENSE) +[![Python](https://img.shields.io/badge/Python-3.10+-3776AB?style=for-the-badge&logo=python&logoColor=white)](https://www.python.org/) +[![Version](https://img.shields.io/badge/version-2.0.0-00FF88?style=for-the-badge)](#) +[![Platform](https://img.shields.io/badge/Linux%20%7C%20Kali%20%7C%20Parrot%20%7C%20macOS-informational?style=for-the-badge&logo=linux&logoColor=white&color=FFA116)](#) + +[![Stars](https://img.shields.io/github/stars/Z4nzu/hackingtool?style=for-the-badge&logo=github&color=yellow)](https://github.com/Z4nzu/hackingtool/stargazers) +[![Forks](https://img.shields.io/github/forks/Z4nzu/hackingtool?style=for-the-badge&logo=git&color=blue)](https://github.com/Z4nzu/hackingtool/network/members) +[![Issues](https://img.shields.io/github/issues/Z4nzu/hackingtool?style=for-the-badge&logo=target&color=red)](https://github.com/Z4nzu/hackingtool/issues) +[![Last Commit](https://img.shields.io/github/last-commit/Z4nzu/hackingtool?style=for-the-badge&logo=github&color=00FF88)](https://github.com/Z4nzu/hackingtool/commits/master)
-``` - 20 categories · 185+ tools · Linux & macOS · Rich terminal UI -``` + + + + + + + +
20
Categories
185+
Tools
19
Tags
2
Platforms
+ +
+ +Install Now +  +Quick Commands +  +Suggest a Tool --- -## What's New in v2.0.0 +
+

What's New in v2.0.0

-| | Change | -|---|---| -| **Python** | 3.10+ required — all Python 2 code removed | -| **OS-aware** | Linux-only tools hidden automatically on macOS | -| **Archived** | Unmaintained tools moved to a separate sub-menu | -| **Paths** | All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/` | -| **Root** | No more `sudo git clone` — installs to user home | -| **New tools** | 22 modern tools added across 6 categories | -| **UI** | Rich terminal UI with shared theme — single consistent console | -| **Menus** | Iterative navigation — no more recursion stack overflow | -| **Docker** | Builds locally — no unverified external images | -| **Deps** | `requirements.txt` cleaned — removed unused flask/boxes/lolcat/requests | -| **Search** | Type `/` or `s` to search 185+ tools by name, description, or keyword | -| **Tags** | Type `t` to filter by tag — osint, web, c2, cloud, mobile, wireless, and 13 more | -| **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools | -| **Install status** | Each tool shows ✔ (installed) or ✘ (not installed) in the menu | -| **Install all** | Option `97` in any category — install all tools at once | -| **Update** | Each tool has an Update option — smart detection (git pull / pip upgrade / go install) | -| **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — no manual clone needed | -| **3 new categories** | Active Directory, Cloud Security, Mobile Security | -| **35 new tools** | BloodHound, Sliver, Impacket, Frida, Prowler, Subfinder, Gobuster, and 28 more | + + +
+ +| | Feature | Description | +|:---:|---|---| +| **🐍** | **Python 3.10+** | All Python 2 code removed, modern syntax throughout | +| **🖥** | **OS-aware menus** | Linux-only tools hidden automatically on macOS | +| **📦** | **185+ tools** | 35 new modern tools added across 6 categories | +| **🔍** | **Search** | Type `/` to search all tools by name, description, or keyword | +| **🏷** | **Tag filter** | Type `t` to filter by 19 tags — osint, web, c2, cloud, mobile... | +| **💡** | **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools | +| **✅** | **Install status** | ✔/✘ shown next to every tool — know what's ready | +| **⚡** | **Install all** | Option `97` in any category — batch install at once | +| **🔄** | **Smart update** | Each tool has Update — auto-detects git pull / pip upgrade / go install | +| **📂** | **Open folder** | Jump into any tool's directory for manual inspection | +| **🐳** | **Docker** | Builds locally — no unverified external images | +| **🚀** | **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — zero manual steps | +| **🏢** | **3 new categories** | Active Directory, Cloud Security, Mobile Security | + +
+ +
--- ## Quick Commands -| Command | What it does | -|---|---| -| `/` or `s` | Search all 185+ tools by name, description, or keyword | -| `t` | Filter tools by tag (osint, scanner, c2, cloud, etc.) | -| `r` | Recommend tools for a task ("scan a network", "crack passwords", ...) | -| `?` | Quick help reference — works in every menu | -| `q` | Quit from any menu level | -| `97` | Install all tools in current category | -| `99` | Go back to previous menu | +
+ +| Command | Action | Works in | +|:---:|---|:---:| +| `/query` | **Search** — find tools instantly by keyword | Main menu | +| `t` | **Tags** — filter by osint, scanner, c2, cloud, mobile... | Main menu | +| `r` | **Recommend** — "I want to do X" → matching tools | Main menu | +| `?` | **Help** — quick reference card | Everywhere | +| `q` | **Quit** — exit from any depth | Everywhere | +| `97` | **Install All** — batch install all tools in category | Category | +| `99` | **Back** — return to previous menu | Everywhere | + +
--- -## Tool Categories +
+

Tool Categories

-| # | Category | Tools | -|---|---|:---:| -| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 | -| 2 | [Information Gathering](#information-gathering-tools) | 26 | -| 3 | [Wordlist Generator](#wordlist-generator) | 7 | -| 4 | [Wireless Attack](#wireless-attack-tools) | 13 | -| 5 | [SQL Injection](#sql-injection-tools) | 7 | -| 6 | [Phishing Attack](#phishing-attack-tools) | 17 | -| 7 | [Web Attack](#web-attack-tools) | 20 | -| 8 | [Post Exploitation](#post-exploitation-tools) | 10 | -| 9 | [Forensics](#forensic-tools) | 8 | -| 10 | [Payload Creation](#payload-creation-tools) | 8 | -| 11 | [Exploit Framework](#exploit-framework) | 4 | -| 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 | -| 13 | [DDOS Attack](#ddos-attack-tools) | 5 | -| 14 | [RAT](#remote-administrator-tools-rat) | 1 | -| 15 | [XSS Attack](#xss-attack-tools) | 9 | -| 16 | [Steganography](#steganography-tools) | 4 | -| 17 | [Active Directory](#active-directory-tools) | 6 | -| 18 | [Cloud Security](#cloud-security-tools) | 4 | -| 19 | [Mobile Security](#mobile-security-tools) | 3 | -| 20 | [Other Tools](#other-tools) | 24 | +
+ +| # | Category | Tools | | # | Category | Tools | +|:---:|---|:---:|---|:---:|---|:---:| +| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 | | 11 | [Exploit Framework](#exploit-framework) | 4 | +| 2 | [Information Gathering](#information-gathering-tools) | 26 | | 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 | +| 3 | [Wordlist Generator](#wordlist-generator) | 7 | | 13 | [DDOS Attack](#ddos-attack-tools) | 5 | +| 4 | [Wireless Attack](#wireless-attack-tools) | 13 | | 14 | [RAT](#remote-administrator-tools-rat) | 1 | +| 5 | [SQL Injection](#sql-injection-tools) | 7 | | 15 | [XSS Attack](#xss-attack-tools) | 9 | +| 6 | [Phishing Attack](#phishing-attack-tools) | 17 | | 16 | [Steganography](#steganography-tools) | 4 | +| 7 | [Web Attack](#web-attack-tools) | 20 | | 17 | [Active Directory](#active-directory-tools) | 6 | +| 8 | [Post Exploitation](#post-exploitation-tools) | 10 | | 18 | [Cloud Security](#cloud-security-tools) | 4 | +| 9 | [Forensics](#forensic-tools) | 8 | | 19 | [Mobile Security](#mobile-security-tools) | 3 | +| 10 | [Payload Creation](#payload-creation-tools) | 8 | | 20 | [Other Tools](#other-tools) | 24 | + +
+ +
--- -## Anonymously Hiding Tools +
+

Anonymously Hiding Tools

+ - [Anonymously Surf](https://github.com/Und3rf10w/kali-anonsurf) - [Multitor](https://github.com/trimstray/multitor) +
+ +
+

Information Gathering Tools

-## Information Gathering Tools - [Network Map (nmap)](https://github.com/nmap/nmap) - [Dracnmap](https://github.com/Screetsec/Dracnmap) - Port scanning @@ -123,8 +148,11 @@ - [Subfinder](https://github.com/projectdiscovery/subfinder) ★ - [TruffleHog](https://github.com/trufflesecurity/trufflehog) ★ - [Gitleaks](https://github.com/gitleaks/gitleaks) ★ +
+ +
+

Wordlist Generator

-## Wordlist Generator - [Cupp](https://github.com/Mebus/cupp) - [WordlistCreator](https://github.com/Z4nzu/wlcreator) - [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator) @@ -132,8 +160,11 @@ - [Hashcat](https://github.com/hashcat/hashcat) ★ - [John the Ripper](https://github.com/openwall/john) ★ - [haiti](https://github.com/noraj/haiti) ★ +
+ +
+

Wireless Attack Tools

-## Wireless Attack Tools - [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3) - [pixiewps](https://github.com/wiire/pixiewps) - [Bluetooth Honeypot (bluepot)](https://github.com/andrewmichaelsmith/bluepot) @@ -147,8 +178,11 @@ - [hcxdumptool](https://github.com/ZerBea/hcxdumptool) ★ - [hcxtools](https://github.com/ZerBea/hcxtools) ★ - [Bettercap](https://github.com/bettercap/bettercap) ★ +
+ +
+

SQL Injection Tools

-## SQL Injection Tools - [Sqlmap](https://github.com/sqlmapproject/sqlmap) - [NoSqlMap](https://github.com/codingo/NoSQLMap) - [DSSS](https://github.com/stamparm/DSSS) @@ -156,8 +190,11 @@ - [Blisqy](https://github.com/JohnTroony/Blisqy) - [Leviathan](https://github.com/leviathan-framework/leviathan) - [SQLScan](https://github.com/Cvar1984/sqlscan) +
+ +
+

Phishing Attack Tools

-## Phishing Attack Tools - [Autophisher](https://github.com/CodingRanjith/autophisher) - [PyPhisher](https://github.com/KasRoudra/PyPhisher) - [AdvPhishing](https://github.com/Ignitetch/AdvPhishing) @@ -175,8 +212,11 @@ - [Maskphish](https://github.com/jaykali/maskphish) - [BlackPhish](https://github.com/iinc0gnit0/BlackPhish) - [dnstwist](https://github.com/elceef/dnstwist) +
+ +
+

Web Attack Tools

-## Web Attack Tools - [Web2Attack](https://github.com/santatic/web2attack) - Skipfish - [Sublist3r](https://github.com/aboul3la/Sublist3r) @@ -196,8 +236,11 @@ - [Arjun](https://github.com/s0md3v/Arjun) ★ - [Caido](https://github.com/caido/caido) ★ - [mitmproxy](https://github.com/mitmproxy/mitmproxy) ★ +
+ +
+

Post Exploitation Tools

-## Post Exploitation Tools - [Vegile](https://github.com/Screetsec/Vegile) - [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger) - [pwncat-cs](https://github.com/calebstewart/pwncat) ★ @@ -208,8 +251,11 @@ - [Chisel](https://github.com/jpillora/chisel) ★ - [Evil-WinRM](https://github.com/Hackplayers/evil-winrm) ★ - [Mythic](https://github.com/its-a-feature/Mythic) ★ +
+ +
+

Forensic Tools

-## Forensic Tools - Autopsy - Wireshark - [Bulk extractor](https://github.com/simsong/bulk_extractor) @@ -218,8 +264,11 @@ - [Volatility 3](https://github.com/volatilityfoundation/volatility3) ★ - [Binwalk](https://github.com/ReFirmLabs/binwalk) ★ - [pspy](https://github.com/DominicBreuker/pspy) ★ +
+ +
+

Payload Creation Tools

-## Payload Creation Tools - [The FatRat](https://github.com/Screetsec/TheFatRat) - [Brutal](https://github.com/Screetsec/Brutal) - [Stitch](https://nathanlopez.github.io/Stitch) @@ -228,31 +277,46 @@ - [Spycam](https://github.com/indexnotfound404/spycam) - [Mob-Droid](https://github.com/kinghacker0/Mob-Droid) - [Enigma](https://github.com/UndeadSec/Enigma) +
+ +
+

Exploit Framework

-## Exploit Framework - [RouterSploit](https://github.com/threat9/routersploit) - [WebSploit](https://github.com/The404Hacking/websploit) - [Commix](https://github.com/commixproject/commix) - [Web2Attack](https://github.com/santatic/web2attack) +
+ +
+

Reverse Engineering Tools

-## Reverse Engineering Tools - [Androguard](https://github.com/androguard/androguard) - [Apk2Gold](https://github.com/lxdvs/apk2gold) - [JadX](https://github.com/skylot/jadx) - [Ghidra](https://github.com/NationalSecurityAgency/ghidra) ★ - [Radare2](https://github.com/radareorg/radare2) ★ +
+ +
+

DDOS Attack Tools

-## DDOS Attack Tools - [DDoS Script](https://github.com/the-deepnet/ddos) - [SlowLoris](https://github.com/gkbrk/slowloris) - [Asyncrone](https://github.com/fatihsnsy/aSYNcrone) - [UFOnet](https://github.com/epsylon/ufonet) - [GoldenEye](https://github.com/jseidl/GoldenEye) +
+ +
+

Remote Administrator Tools (RAT)

-## Remote Administrator Tools (RAT) - [Pyshell](https://github.com/knassar702/pyshell) +
+ +
+

XSS Attack Tools

-## XSS Attack Tools - [DalFox](https://github.com/hahwul/dalfox) - [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER) - [Extended XSS Searcher](https://github.com/Damian89/extended-xss-search) @@ -262,32 +326,46 @@ - [XanXSS](https://github.com/Ekultek/XanXSS) - [XSStrike](https://github.com/UltimateHackers/XSStrike) - [RVuln](https://github.com/iinc0gnit0/RVuln) +
+ +
+

Steganography Tools

-## Steganography Tools - SteganoHide - [StegoCracker](https://github.com/W1LDN16H7/StegoCracker) - [Whitespace](https://github.com/beardog108/snow10) +
+ +
+

Active Directory Tools

-## Active Directory Tools - [BloodHound](https://github.com/BloodHoundAD/BloodHound) ★ - [NetExec (nxc)](https://github.com/Pennyw0rth/NetExec) ★ - [Impacket](https://github.com/fortra/impacket) ★ - [Responder](https://github.com/lgandx/Responder) ★ - [Certipy](https://github.com/ly4k/Certipy) ★ - [Kerbrute](https://github.com/ropnop/kerbrute) ★ +
+ +
+

Cloud Security Tools

-## Cloud Security Tools - [Prowler](https://github.com/prowler-cloud/prowler) ★ - [ScoutSuite](https://github.com/nccgroup/ScoutSuite) ★ - [Pacu](https://github.com/RhinoSecurityLabs/pacu) ★ - [Trivy](https://github.com/aquasecurity/trivy) ★ +
+ +
+

Mobile Security Tools

-## Mobile Security Tools - [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) ★ - [Frida](https://github.com/frida/frida) ★ - [Objection](https://github.com/sensepost/objection) ★ +
-## Other Tools +
+

Other Tools

#### SocialMedia Bruteforce - [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force) @@ -330,114 +408,107 @@ #### Mix Tools - Terminal Multiplexer (tilix) - [Crivo](https://github.com/GMDSantana/crivo) +
--- ## Contributing — Add a New Tool + + + + + +
+ ### Open an Issue -> **Title format:** `[Tool Request] ToolName — Category` -> Example: `[Tool Request] Subfinder — Information Gathering` +> **Title:** `[Tool Request] ToolName — Category` -Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) issue template. -Required fields: tool name, GitHub URL, category, supported OS, install command, reason for inclusion. +Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) template. + +Required: tool name, GitHub URL, category, OS, install command, reason. + + ### Open a Pull Request -> **Title format:** `[New Tool] ToolName — Category` -> Example: `[New Tool] Subfinder — Information Gathering` +> **Title:** `[New Tool] ToolName — Category` -Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist. Key requirements: +Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist. -1. Add your class to the right `tools/*.py` file -2. Set `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL` -3. Set `SUPPORTED_OS` — `["linux"]` or `["linux", "macos"]` -4. Append the instance to `TOOLS` list in the collection at the bottom of the file -5. Test install + run locally before submitting +Required: class in `tools/*.py`, TITLE, DESCRIPTION, INSTALL/RUN commands, SUPPORTED_OS, test locally. -Issues or PRs that **don't follow the title format** will be closed without review. +
+ +> Issues or PRs that don't follow the title format will be closed without review. --- ## Installation + + + + + +
+ ### One-liner (recommended) ```bash curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bash ``` -This handles everything — installs prerequisites, clones the repo, sets up a venv, and creates the `hackingtool` command. +Handles everything — prerequisites, clone, venv, launcher. -### Manual install + + +### Manual ```bash git clone https://github.com/Z4nzu/hackingtool.git cd hackingtool -sudo python3 install.py # detects local source, copies instead of re-cloning +sudo python3 install.py ``` -Then run: -```bash -hackingtool -``` +Then run: `hackingtool` -## Docker +
-### Step 1 — Clone the repository - -```bash -git clone https://github.com/Z4nzu/hackingtool.git -cd hackingtool -``` - -### Step 2 — Build the image +
+

Docker

```bash +# Build docker build -t hackingtool . -``` -> First build takes a few minutes (Kali base + apt packages). Subsequent builds are fast thanks to BuildKit layer caching. - -### Step 3 — Run - -**Option A — Direct (no Compose):** -```bash +# Run (direct) docker run -it --rm hackingtool -``` -**Option B — With Docker Compose (recommended):** -```bash -# Start in background +# Run (Compose — recommended) docker compose up -d - -# Open an interactive shell docker exec -it hackingtool bash -# Then launch the tool inside the container -python3 hackingtool.py -``` - -**Option C — Dev mode (live source mount, changes reflected without rebuild):** -```bash +# Dev mode (live source mount) docker compose --profile dev up docker exec -it hackingtool-dev bash + +# Stop +docker compose down # stop container +docker compose down -v # also remove data volume ``` -### Stopping +
-```bash -docker compose down # stop and remove container -docker compose down -v # also remove the tools data volume -``` +### Requirements -## Requirements - -- Python 3.10+ -- Linux (Kali, Parrot, Ubuntu) or macOS -- Go 1.21+ *(for nuclei, ffuf, amass, httpx, katana, dalfox)* -- Ruby *(for haiti)* +| Dependency | Version | Needed for | +|---|---|---| +| Python | 3.10+ | Core | +| Go | 1.21+ | nuclei, ffuf, amass, httpx, katana, dalfox, gobuster, subfinder | +| Ruby | any | haiti, evil-winrm | +| Docker | any | Mythic, MobSF (optional) | ```bash pip install -r requirements.txt @@ -455,18 +526,24 @@ pip install -r requirements.txt --- +
+ ## Support If this project helps you, consider buying me a coffee: -Buy Me A Coffee +Buy Me A Coffee -## Social +

-[![Twitter](https://img.shields.io/twitter/url?color=%231DA1F2&label=follow&logo=twitter&logoColor=%231DA1F2&style=flat-square&url=https%3A%2F%2Ftwitter.com%2F_Zinzu07)](https://twitter.com/_Zinzu07) -[![GitHub](https://img.shields.io/badge/-GitHub-181717?style=flat-square&logo=github&link=https://github.com/Z4nzu/)](https://github.com/Z4nzu/) +[![Twitter](https://img.shields.io/badge/Twitter-Follow-1DA1F2?style=for-the-badge&logo=twitter&logoColor=white)](https://twitter.com/_Zinzu07) +[![GitHub](https://img.shields.io/badge/GitHub-Follow-181717?style=for-the-badge&logo=github&logoColor=white)](https://github.com/Z4nzu/) -> **Please don't use for illegal activity.** +
+ +> **For authorized security testing only.** > Thanks to all original authors of the tools included in hackingtool. Your favourite tool is not listed? [Suggest it here](https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md) + +