mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-22 08:28:57 +00:00
Header: - Consolidate badges into 2 clean rows instead of 4 sparse rows - Row 1: flat-square badges (license, python, version, stars, forks, issues, last commit) — compact, inline, no awkward gaps - Row 2: for-the-badge stat pills (20 Categories, 185+ Tools, 19 Tags, Linux|Kali|Parrot|macOS) — single row, removes duplicate Platform badge - CTA buttons tightened with consistent spacing Category headings: - Add emoji to every ## category heading throughout the README (matching the index table emojis) Support section: - Left-aligned instead of centered - Social split into its own heading Also removes all <details>/<summary> collapse wrappers — all sections are plain visible as requested
18 KiB
18 KiB
What's New in v2.0.0
|
Quick Commands
| Command | Action | Works in |
|---|---|---|
/query |
Search — find tools instantly by keyword | Main menu |
t |
Tags — filter by osint, scanner, c2, cloud, mobile... | Main menu |
r |
Recommend — "I want to do X" → matching tools | Main menu |
? |
Help — quick reference card | Everywhere |
q |
Quit — exit from any depth | Everywhere |
97 |
Install All — batch install all tools in category | Category |
99 |
Back — return to previous menu | Everywhere |
Tool Categories
| # | Category | Tools | # | Category | Tools | |
|---|---|---|---|---|---|---|
| 1 | 🛡 Anonymously Hiding | 2 | 11 | 🧰 Exploit Framework | 4 | |
| 2 | 🔍 Information Gathering | 26 | 12 | 🔁 Reverse Engineering | 5 | |
| 3 | 📚 Wordlist Generator | 7 | 13 | ⚡ DDOS Attack | 5 | |
| 4 | 📶 Wireless Attack | 13 | 14 | 🖥 RAT | 1 | |
| 5 | 🧩 SQL Injection | 7 | 15 | 💥 XSS Attack | 9 | |
| 6 | 🎣 Phishing Attack | 17 | 16 | 🖼 Steganography | 4 | |
| 7 | 🌐 Web Attack | 20 | 17 | 🏢 Active Directory | 6 | |
| 8 | 🔧 Post Exploitation | 10 | 18 | ☁ Cloud Security | 4 | |
| 9 | 🕵 Forensics | 8 | 19 | 📱 Mobile Security | 3 | |
| 10 | 📦 Payload Creation | 8 | 20 | ✨ Other Tools | 24 |
🛡 Anonymously Hiding Tools
🔍 Information Gathering Tools
- Network Map (nmap)
- Dracnmap
- Port scanning
- Host to IP
- Xerosploit
- RED HAWK
- ReconSpider
- IsItDown
- Infoga
- ReconDog
- Striker
- SecretFinder
- Shodanfy
- rang3r
- Breacher
- theHarvester ★
- Amass ★
- Masscan ★
- RustScan ★
- Holehe ★
- Maigret ★
- httpx ★
- SpiderFoot ★
- Subfinder ★
- TruffleHog ★
- Gitleaks ★
📚 Wordlist Generator
📶 Wireless Attack Tools
- WiFi-Pumpkin
- pixiewps
- Bluetooth Honeypot (bluepot)
- Fluxion
- Wifiphisher
- Wifite
- EvilTwin
- Fastssh
- Howmanypeople
- Airgeddon ★
- hcxdumptool ★
- hcxtools ★
- Bettercap ★
🧩 SQL Injection Tools
🎣 Phishing Attack Tools
- Autophisher
- PyPhisher
- AdvPhishing
- Setoolkit
- SocialFish
- HiddenEye
- Evilginx3
- I-See-You
- SayCheese
- QR Code Jacking
- BlackEye
- ShellPhish
- Thanos
- QRLJacking
- Maskphish
- BlackPhish
- dnstwist
🌐 Web Attack Tools
- Web2Attack
- Skipfish
- Sublist3r
- CheckURL
- Sub-Domain TakeOver
- Dirb
- Nuclei ★
- ffuf ★
- Feroxbuster ★
- Nikto ★
- wafw00f ★
- Katana ★
- Gobuster ★
- Dirsearch ★
- OWASP ZAP ★
- testssl.sh ★
- Arjun ★
- Caido ★
- mitmproxy ★
🔧 Post Exploitation Tools
- Vegile
- Chrome Keylogger
- pwncat-cs ★
- Sliver ★
- Havoc ★
- PEASS-ng (LinPEAS/WinPEAS) ★
- Ligolo-ng ★
- Chisel ★
- Evil-WinRM ★
- Mythic ★
🕵 Forensic Tools
- Autopsy
- Wireshark
- Bulk extractor
- Guymager
- Toolsley
- Volatility 3 ★
- Binwalk ★
- pspy ★
📦 Payload Creation Tools
🧰 Exploit Framework
🔁 Reverse Engineering Tools
⚡ DDOS Attack Tools
🖥 Remote Administrator Tools (RAT)
💥 XSS Attack Tools
🖼 Steganography Tools
- SteganoHide
- StegoCracker
- Whitespace
🏢 Active Directory Tools
- BloodHound ★
- NetExec (nxc) ★
- Impacket ★
- Responder ★
- Certipy ★
- Kerbrute ★
☁ Cloud Security Tools
- Prowler ★
- ScoutSuite ★
- Pacu ★
- Trivy ★
📱 Mobile Security Tools
✨ Other Tools
SocialMedia Bruteforce
Android Hacking Tools
IDN Homograph Attack
Email Verify Tools
Hash Cracking Tools
Wifi Deauthenticate
SocialMedia Finder
Payload Injector
Web Crawling
Mix Tools
- Terminal Multiplexer (tilix)
- Crivo
Contributing — Add a New Tool
Open an Issue
Use the Tool Request template. Required: tool name, GitHub URL, category, OS, install command, reason. |
Open a Pull Request
Use the PR template checklist. Required: class in |
Issues or PRs that don't follow the title format will be closed without review.
Installation
One-liner (recommended)Handles everything — prerequisites, clone, venv, launcher. |
ManualThen run: |
Docker
# Build
docker build -t hackingtool .
# Run (direct)
docker run -it --rm hackingtool
# Run (Compose — recommended)
docker compose up -d
docker exec -it hackingtool bash
# Dev mode (live source mount)
docker compose --profile dev up
docker exec -it hackingtool-dev bash
# Stop
docker compose down # stop container
docker compose down -v # also remove data volume
Requirements
| Dependency | Version | Needed for |
|---|---|---|
| Python | 3.10+ | Core |
| Go | 1.21+ | nuclei, ffuf, amass, httpx, katana, dalfox, gobuster, subfinder |
| Ruby | any | haiti, evil-winrm |
| Docker | any | Mythic, MobSF (optional) |
pip install -r requirements.txt
Star History
Support
If this project helps you, consider buying me a coffee:
Social
For authorized security testing only. Thanks to all original authors of the tools included in hackingtool.
Your favourite tool is not listed? Suggest it here
