diff --git a/README.md b/README.md
index 3f714cb..88e160d 100644
--- a/README.md
+++ b/README.md
@@ -2,101 +2,126 @@
-
+
**All-in-One Hacking Tool for Security Researchers & Pentesters**
-[](LICENSE)
-[](https://www.python.org/)
-[](#)
-[](#)
-[](https://github.com/Z4nzu/hackingtool/stargazers)
-[](https://github.com/Z4nzu/hackingtool/network/members)
-[](https://github.com/Z4nzu/hackingtool/issues)
-[](https://github.com/Z4nzu/hackingtool/commits/master)
+
+
+[](LICENSE)
+[](https://www.python.org/)
+[](#)
+[](#)
+
+[](https://github.com/Z4nzu/hackingtool/stargazers)
+[](https://github.com/Z4nzu/hackingtool/network/members)
+[](https://github.com/Z4nzu/hackingtool/issues)
+[](https://github.com/Z4nzu/hackingtool/commits/master)
-```
- 20 categories · 185+ tools · Linux & macOS · Rich terminal UI
-```
+
+
+20 Categories |
+185+ Tools |
+19 Tags |
+2 Platforms |
+
+
+
+
+
+
+
+
+
+
---
-## What's New in v2.0.0
+
+What's New in v2.0.0
-| | Change |
-|---|---|
-| **Python** | 3.10+ required — all Python 2 code removed |
-| **OS-aware** | Linux-only tools hidden automatically on macOS |
-| **Archived** | Unmaintained tools moved to a separate sub-menu |
-| **Paths** | All `os.chdir()` bugs fixed — tools install to `~/.hackingtool/tools/` |
-| **Root** | No more `sudo git clone` — installs to user home |
-| **New tools** | 22 modern tools added across 6 categories |
-| **UI** | Rich terminal UI with shared theme — single consistent console |
-| **Menus** | Iterative navigation — no more recursion stack overflow |
-| **Docker** | Builds locally — no unverified external images |
-| **Deps** | `requirements.txt` cleaned — removed unused flask/boxes/lolcat/requests |
-| **Search** | Type `/` or `s` to search 185+ tools by name, description, or keyword |
-| **Tags** | Type `t` to filter by tag — osint, web, c2, cloud, mobile, wireless, and 13 more |
-| **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools |
-| **Install status** | Each tool shows ✔ (installed) or ✘ (not installed) in the menu |
-| **Install all** | Option `97` in any category — install all tools at once |
-| **Update** | Each tool has an Update option — smart detection (git pull / pip upgrade / go install) |
-| **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — no manual clone needed |
-| **3 new categories** | Active Directory, Cloud Security, Mobile Security |
-| **35 new tools** | BloodHound, Sliver, Impacket, Frida, Prowler, Subfinder, Gobuster, and 28 more |
+
+|
+
+| | Feature | Description |
+|:---:|---|---|
+| **🐍** | **Python 3.10+** | All Python 2 code removed, modern syntax throughout |
+| **🖥** | **OS-aware menus** | Linux-only tools hidden automatically on macOS |
+| **📦** | **185+ tools** | 35 new modern tools added across 6 categories |
+| **🔍** | **Search** | Type `/` to search all tools by name, description, or keyword |
+| **🏷** | **Tag filter** | Type `t` to filter by 19 tags — osint, web, c2, cloud, mobile... |
+| **💡** | **Recommend** | Type `r` — "I want to scan a network" → shows relevant tools |
+| **✅** | **Install status** | ✔/✘ shown next to every tool — know what's ready |
+| **⚡** | **Install all** | Option `97` in any category — batch install at once |
+| **🔄** | **Smart update** | Each tool has Update — auto-detects git pull / pip upgrade / go install |
+| **📂** | **Open folder** | Jump into any tool's directory for manual inspection |
+| **🐳** | **Docker** | Builds locally — no unverified external images |
+| **🚀** | **One-liner install** | `curl -sSL .../install.sh \| sudo bash` — zero manual steps |
+| **🏢** | **3 new categories** | Active Directory, Cloud Security, Mobile Security |
+
+ |
+
+
+
---
## Quick Commands
-| Command | What it does |
-|---|---|
-| `/` or `s` | Search all 185+ tools by name, description, or keyword |
-| `t` | Filter tools by tag (osint, scanner, c2, cloud, etc.) |
-| `r` | Recommend tools for a task ("scan a network", "crack passwords", ...) |
-| `?` | Quick help reference — works in every menu |
-| `q` | Quit from any menu level |
-| `97` | Install all tools in current category |
-| `99` | Go back to previous menu |
+
+
+| Command | Action | Works in |
+|:---:|---|:---:|
+| `/query` | **Search** — find tools instantly by keyword | Main menu |
+| `t` | **Tags** — filter by osint, scanner, c2, cloud, mobile... | Main menu |
+| `r` | **Recommend** — "I want to do X" → matching tools | Main menu |
+| `?` | **Help** — quick reference card | Everywhere |
+| `q` | **Quit** — exit from any depth | Everywhere |
+| `97` | **Install All** — batch install all tools in category | Category |
+| `99` | **Back** — return to previous menu | Everywhere |
+
+
---
-## Tool Categories
+
+Tool Categories
-| # | Category | Tools |
-|---|---|:---:|
-| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 |
-| 2 | [Information Gathering](#information-gathering-tools) | 26 |
-| 3 | [Wordlist Generator](#wordlist-generator) | 7 |
-| 4 | [Wireless Attack](#wireless-attack-tools) | 13 |
-| 5 | [SQL Injection](#sql-injection-tools) | 7 |
-| 6 | [Phishing Attack](#phishing-attack-tools) | 17 |
-| 7 | [Web Attack](#web-attack-tools) | 20 |
-| 8 | [Post Exploitation](#post-exploitation-tools) | 10 |
-| 9 | [Forensics](#forensic-tools) | 8 |
-| 10 | [Payload Creation](#payload-creation-tools) | 8 |
-| 11 | [Exploit Framework](#exploit-framework) | 4 |
-| 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 |
-| 13 | [DDOS Attack](#ddos-attack-tools) | 5 |
-| 14 | [RAT](#remote-administrator-tools-rat) | 1 |
-| 15 | [XSS Attack](#xss-attack-tools) | 9 |
-| 16 | [Steganography](#steganography-tools) | 4 |
-| 17 | [Active Directory](#active-directory-tools) | 6 |
-| 18 | [Cloud Security](#cloud-security-tools) | 4 |
-| 19 | [Mobile Security](#mobile-security-tools) | 3 |
-| 20 | [Other Tools](#other-tools) | 24 |
+
+
+| # | Category | Tools | | # | Category | Tools |
+|:---:|---|:---:|---|:---:|---|:---:|
+| 1 | [Anonymously Hiding](#anonymously-hiding-tools) | 2 | | 11 | [Exploit Framework](#exploit-framework) | 4 |
+| 2 | [Information Gathering](#information-gathering-tools) | 26 | | 12 | [Reverse Engineering](#reverse-engineering-tools) | 5 |
+| 3 | [Wordlist Generator](#wordlist-generator) | 7 | | 13 | [DDOS Attack](#ddos-attack-tools) | 5 |
+| 4 | [Wireless Attack](#wireless-attack-tools) | 13 | | 14 | [RAT](#remote-administrator-tools-rat) | 1 |
+| 5 | [SQL Injection](#sql-injection-tools) | 7 | | 15 | [XSS Attack](#xss-attack-tools) | 9 |
+| 6 | [Phishing Attack](#phishing-attack-tools) | 17 | | 16 | [Steganography](#steganography-tools) | 4 |
+| 7 | [Web Attack](#web-attack-tools) | 20 | | 17 | [Active Directory](#active-directory-tools) | 6 |
+| 8 | [Post Exploitation](#post-exploitation-tools) | 10 | | 18 | [Cloud Security](#cloud-security-tools) | 4 |
+| 9 | [Forensics](#forensic-tools) | 8 | | 19 | [Mobile Security](#mobile-security-tools) | 3 |
+| 10 | [Payload Creation](#payload-creation-tools) | 8 | | 20 | [Other Tools](#other-tools) | 24 |
+
+
+
+
---
-## Anonymously Hiding Tools
+
+Anonymously Hiding Tools
+
- [Anonymously Surf](https://github.com/Und3rf10w/kali-anonsurf)
- [Multitor](https://github.com/trimstray/multitor)
+
+
+
+Information Gathering Tools
-## Information Gathering Tools
- [Network Map (nmap)](https://github.com/nmap/nmap)
- [Dracnmap](https://github.com/Screetsec/Dracnmap)
- Port scanning
@@ -123,8 +148,11 @@
- [Subfinder](https://github.com/projectdiscovery/subfinder) ★
- [TruffleHog](https://github.com/trufflesecurity/trufflehog) ★
- [Gitleaks](https://github.com/gitleaks/gitleaks) ★
+
+
+
+Wordlist Generator
-## Wordlist Generator
- [Cupp](https://github.com/Mebus/cupp)
- [WordlistCreator](https://github.com/Z4nzu/wlcreator)
- [Goblin WordGenerator](https://github.com/UndeadSec/GoblinWordGenerator)
@@ -132,8 +160,11 @@
- [Hashcat](https://github.com/hashcat/hashcat) ★
- [John the Ripper](https://github.com/openwall/john) ★
- [haiti](https://github.com/noraj/haiti) ★
+
+
+
+Wireless Attack Tools
-## Wireless Attack Tools
- [WiFi-Pumpkin](https://github.com/P0cL4bs/wifipumpkin3)
- [pixiewps](https://github.com/wiire/pixiewps)
- [Bluetooth Honeypot (bluepot)](https://github.com/andrewmichaelsmith/bluepot)
@@ -147,8 +178,11 @@
- [hcxdumptool](https://github.com/ZerBea/hcxdumptool) ★
- [hcxtools](https://github.com/ZerBea/hcxtools) ★
- [Bettercap](https://github.com/bettercap/bettercap) ★
+
+
+
+SQL Injection Tools
-## SQL Injection Tools
- [Sqlmap](https://github.com/sqlmapproject/sqlmap)
- [NoSqlMap](https://github.com/codingo/NoSQLMap)
- [DSSS](https://github.com/stamparm/DSSS)
@@ -156,8 +190,11 @@
- [Blisqy](https://github.com/JohnTroony/Blisqy)
- [Leviathan](https://github.com/leviathan-framework/leviathan)
- [SQLScan](https://github.com/Cvar1984/sqlscan)
+
+
+
+Phishing Attack Tools
-## Phishing Attack Tools
- [Autophisher](https://github.com/CodingRanjith/autophisher)
- [PyPhisher](https://github.com/KasRoudra/PyPhisher)
- [AdvPhishing](https://github.com/Ignitetch/AdvPhishing)
@@ -175,8 +212,11 @@
- [Maskphish](https://github.com/jaykali/maskphish)
- [BlackPhish](https://github.com/iinc0gnit0/BlackPhish)
- [dnstwist](https://github.com/elceef/dnstwist)
+
+
+
+Web Attack Tools
-## Web Attack Tools
- [Web2Attack](https://github.com/santatic/web2attack)
- Skipfish
- [Sublist3r](https://github.com/aboul3la/Sublist3r)
@@ -196,8 +236,11 @@
- [Arjun](https://github.com/s0md3v/Arjun) ★
- [Caido](https://github.com/caido/caido) ★
- [mitmproxy](https://github.com/mitmproxy/mitmproxy) ★
+
+
+
+Post Exploitation Tools
-## Post Exploitation Tools
- [Vegile](https://github.com/Screetsec/Vegile)
- [Chrome Keylogger](https://github.com/UndeadSec/HeraKeylogger)
- [pwncat-cs](https://github.com/calebstewart/pwncat) ★
@@ -208,8 +251,11 @@
- [Chisel](https://github.com/jpillora/chisel) ★
- [Evil-WinRM](https://github.com/Hackplayers/evil-winrm) ★
- [Mythic](https://github.com/its-a-feature/Mythic) ★
+
+
+
+Forensic Tools
-## Forensic Tools
- Autopsy
- Wireshark
- [Bulk extractor](https://github.com/simsong/bulk_extractor)
@@ -218,8 +264,11 @@
- [Volatility 3](https://github.com/volatilityfoundation/volatility3) ★
- [Binwalk](https://github.com/ReFirmLabs/binwalk) ★
- [pspy](https://github.com/DominicBreuker/pspy) ★
+
+
+
+Payload Creation Tools
-## Payload Creation Tools
- [The FatRat](https://github.com/Screetsec/TheFatRat)
- [Brutal](https://github.com/Screetsec/Brutal)
- [Stitch](https://nathanlopez.github.io/Stitch)
@@ -228,31 +277,46 @@
- [Spycam](https://github.com/indexnotfound404/spycam)
- [Mob-Droid](https://github.com/kinghacker0/Mob-Droid)
- [Enigma](https://github.com/UndeadSec/Enigma)
+
+
+
+Exploit Framework
-## Exploit Framework
- [RouterSploit](https://github.com/threat9/routersploit)
- [WebSploit](https://github.com/The404Hacking/websploit)
- [Commix](https://github.com/commixproject/commix)
- [Web2Attack](https://github.com/santatic/web2attack)
+
+
+
+Reverse Engineering Tools
-## Reverse Engineering Tools
- [Androguard](https://github.com/androguard/androguard)
- [Apk2Gold](https://github.com/lxdvs/apk2gold)
- [JadX](https://github.com/skylot/jadx)
- [Ghidra](https://github.com/NationalSecurityAgency/ghidra) ★
- [Radare2](https://github.com/radareorg/radare2) ★
+
+
+
+DDOS Attack Tools
-## DDOS Attack Tools
- [DDoS Script](https://github.com/the-deepnet/ddos)
- [SlowLoris](https://github.com/gkbrk/slowloris)
- [Asyncrone](https://github.com/fatihsnsy/aSYNcrone)
- [UFOnet](https://github.com/epsylon/ufonet)
- [GoldenEye](https://github.com/jseidl/GoldenEye)
+
+
+
+Remote Administrator Tools (RAT)
-## Remote Administrator Tools (RAT)
- [Pyshell](https://github.com/knassar702/pyshell)
+
+
+
+XSS Attack Tools
-## XSS Attack Tools
- [DalFox](https://github.com/hahwul/dalfox)
- [XSS Payload Generator](https://github.com/capture0x/XSS-LOADER)
- [Extended XSS Searcher](https://github.com/Damian89/extended-xss-search)
@@ -262,32 +326,46 @@
- [XanXSS](https://github.com/Ekultek/XanXSS)
- [XSStrike](https://github.com/UltimateHackers/XSStrike)
- [RVuln](https://github.com/iinc0gnit0/RVuln)
+
+
+
+Steganography Tools
-## Steganography Tools
- SteganoHide
- [StegoCracker](https://github.com/W1LDN16H7/StegoCracker)
- [Whitespace](https://github.com/beardog108/snow10)
+
+
+
+Active Directory Tools
-## Active Directory Tools
- [BloodHound](https://github.com/BloodHoundAD/BloodHound) ★
- [NetExec (nxc)](https://github.com/Pennyw0rth/NetExec) ★
- [Impacket](https://github.com/fortra/impacket) ★
- [Responder](https://github.com/lgandx/Responder) ★
- [Certipy](https://github.com/ly4k/Certipy) ★
- [Kerbrute](https://github.com/ropnop/kerbrute) ★
+
+
+
+Cloud Security Tools
-## Cloud Security Tools
- [Prowler](https://github.com/prowler-cloud/prowler) ★
- [ScoutSuite](https://github.com/nccgroup/ScoutSuite) ★
- [Pacu](https://github.com/RhinoSecurityLabs/pacu) ★
- [Trivy](https://github.com/aquasecurity/trivy) ★
+
+
+
+Mobile Security Tools
-## Mobile Security Tools
- [MobSF](https://github.com/MobSF/Mobile-Security-Framework-MobSF) ★
- [Frida](https://github.com/frida/frida) ★
- [Objection](https://github.com/sensepost/objection) ★
+
-## Other Tools
+
+Other Tools
#### SocialMedia Bruteforce
- [AllinOne SocialMedia Attack](https://github.com/Matrix07ksa/Brute_Force)
@@ -330,114 +408,107 @@
#### Mix Tools
- Terminal Multiplexer (tilix)
- [Crivo](https://github.com/GMDSantana/crivo)
+
---
## Contributing — Add a New Tool
+
+
+|
+
### Open an Issue
-> **Title format:** `[Tool Request] ToolName — Category`
-> Example: `[Tool Request] Subfinder — Information Gathering`
+> **Title:** `[Tool Request] ToolName — Category`
-Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) issue template.
-Required fields: tool name, GitHub URL, category, supported OS, install command, reason for inclusion.
+Use the [Tool Request](.github/ISSUE_TEMPLATE/tool_request.md) template.
+
+Required: tool name, GitHub URL, category, OS, install command, reason.
+
+ |
+
### Open a Pull Request
-> **Title format:** `[New Tool] ToolName — Category`
-> Example: `[New Tool] Subfinder — Information Gathering`
+> **Title:** `[New Tool] ToolName — Category`
-Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist. Key requirements:
+Use the [PR template](.github/PULL_REQUEST_TEMPLATE.md) checklist.
-1. Add your class to the right `tools/*.py` file
-2. Set `TITLE`, `DESCRIPTION`, `INSTALL_COMMANDS`, `RUN_COMMANDS`, `PROJECT_URL`
-3. Set `SUPPORTED_OS` — `["linux"]` or `["linux", "macos"]`
-4. Append the instance to `TOOLS` list in the collection at the bottom of the file
-5. Test install + run locally before submitting
+Required: class in `tools/*.py`, TITLE, DESCRIPTION, INSTALL/RUN commands, SUPPORTED_OS, test locally.
-Issues or PRs that **don't follow the title format** will be closed without review.
+ |
+
+
+
+> Issues or PRs that don't follow the title format will be closed without review.
---
## Installation
+
+
+|
+
### One-liner (recommended)
```bash
curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bash
```
-This handles everything — installs prerequisites, clones the repo, sets up a venv, and creates the `hackingtool` command.
+Handles everything — prerequisites, clone, venv, launcher.
-### Manual install
+ |
+
+
+### Manual
```bash
git clone https://github.com/Z4nzu/hackingtool.git
cd hackingtool
-sudo python3 install.py # detects local source, copies instead of re-cloning
+sudo python3 install.py
```
-Then run:
-```bash
-hackingtool
-```
+Then run: `hackingtool`
-## Docker
+ |
+
+
-### Step 1 — Clone the repository
-
-```bash
-git clone https://github.com/Z4nzu/hackingtool.git
-cd hackingtool
-```
-
-### Step 2 — Build the image
+
+Docker
```bash
+# Build
docker build -t hackingtool .
-```
-> First build takes a few minutes (Kali base + apt packages). Subsequent builds are fast thanks to BuildKit layer caching.
-
-### Step 3 — Run
-
-**Option A — Direct (no Compose):**
-```bash
+# Run (direct)
docker run -it --rm hackingtool
-```
-**Option B — With Docker Compose (recommended):**
-```bash
-# Start in background
+# Run (Compose — recommended)
docker compose up -d
-
-# Open an interactive shell
docker exec -it hackingtool bash
-# Then launch the tool inside the container
-python3 hackingtool.py
-```
-
-**Option C — Dev mode (live source mount, changes reflected without rebuild):**
-```bash
+# Dev mode (live source mount)
docker compose --profile dev up
docker exec -it hackingtool-dev bash
+
+# Stop
+docker compose down # stop container
+docker compose down -v # also remove data volume
```
-### Stopping
+
-```bash
-docker compose down # stop and remove container
-docker compose down -v # also remove the tools data volume
-```
+### Requirements
-## Requirements
-
-- Python 3.10+
-- Linux (Kali, Parrot, Ubuntu) or macOS
-- Go 1.21+ *(for nuclei, ffuf, amass, httpx, katana, dalfox)*
-- Ruby *(for haiti)*
+| Dependency | Version | Needed for |
+|---|---|---|
+| Python | 3.10+ | Core |
+| Go | 1.21+ | nuclei, ffuf, amass, httpx, katana, dalfox, gobuster, subfinder |
+| Ruby | any | haiti, evil-winrm |
+| Docker | any | Mythic, MobSF (optional) |
```bash
pip install -r requirements.txt
@@ -455,18 +526,24 @@ pip install -r requirements.txt
---
+
+
## Support
If this project helps you, consider buying me a coffee:
-

+

-## Social
+
-[](https://twitter.com/_Zinzu07)
-[](https://github.com/Z4nzu/)
+[](https://twitter.com/_Zinzu07)
+[](https://github.com/Z4nzu/)
-> **Please don't use for illegal activity.**
+
+
+> **For authorized security testing only.**
> Thanks to all original authors of the tools included in hackingtool.
Your favourite tool is not listed? [Suggest it here](https://github.com/Z4nzu/hackingtool/issues/new?template=tool_request.md)
+
+