mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-23 00:49:59 +00:00
New categories: - tools/active_directory.py: BloodHound, NetExec (nxc), Impacket, Responder, Certipy, Kerbrute (6 tools) - tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools) - tools/mobile_security.py: MobSF, Frida, Objection (3 tools) Existing categories expanded: - information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4) - web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun, Caido, mitmproxy (7) - post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel, Evil-WinRM, Mythic (7) - reverse_engineering.py: +Ghidra, Radare2 (2) - forensics.py: +pspy (1) - wireless_attack.py: +Bettercap (1) hackingtool.py: - Import 3 new category modules - Add 3 new entries to tool_definitions (AD, Cloud, Mobile) - Add 3 new instances to all_tools list - Categories: 17 -> 20, total tools: 150+ -> 185+ - Help overlay updated for new range (1-20, 21=Update)
75 lines
No EOL
2.7 KiB
Python
75 lines
No EOL
2.7 KiB
Python
from core import HackingTool
|
|
from core import HackingToolsCollection
|
|
|
|
|
|
class BloodHound(HackingTool):
|
|
TITLE = "BloodHound (AD Attack Paths)"
|
|
DESCRIPTION = "Uses graph theory to reveal hidden attack paths in Active Directory/Azure environments."
|
|
INSTALL_COMMANDS = [
|
|
"pip install --user bloodhound",
|
|
"sudo apt-get install -y neo4j",
|
|
]
|
|
RUN_COMMANDS = ["bloodhound-python --help"]
|
|
PROJECT_URL = "https://github.com/BloodHoundAD/BloodHound"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class NetExec(HackingTool):
|
|
TITLE = "NetExec — nxc (Network Pentesting)"
|
|
DESCRIPTION = "Swiss army knife for pentesting Windows/AD networks. Successor to CrackMapExec."
|
|
INSTALL_COMMANDS = ["pip install --user netexec"]
|
|
RUN_COMMANDS = ["nxc --help"]
|
|
PROJECT_URL = "https://github.com/Pennyw0rth/NetExec"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Impacket(HackingTool):
|
|
TITLE = "Impacket (Network Protocol Tools)"
|
|
DESCRIPTION = "Python classes for working with SMB, MSRPC, Kerberos, LDAP, and more."
|
|
INSTALL_COMMANDS = ["pip install --user impacket"]
|
|
RUN_COMMANDS = ["impacket-smbclient --help"]
|
|
PROJECT_URL = "https://github.com/fortra/impacket"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Responder(HackingTool):
|
|
TITLE = "Responder (LLMNR/NBT-NS Poisoner)"
|
|
DESCRIPTION = "LLMNR/NBT-NS/MDNS poisoner with rogue authentication servers for credential capture."
|
|
INSTALL_COMMANDS = ["git clone https://github.com/lgandx/Responder.git"]
|
|
RUN_COMMANDS = ["cd Responder && sudo python3 Responder.py --help"]
|
|
PROJECT_URL = "https://github.com/lgandx/Responder"
|
|
SUPPORTED_OS = ["linux"]
|
|
|
|
|
|
class Certipy(HackingTool):
|
|
TITLE = "Certipy (AD Certificate Abuse)"
|
|
DESCRIPTION = "Active Directory Certificate Services enumeration and abuse tool."
|
|
INSTALL_COMMANDS = ["pip install --user certipy-ad"]
|
|
RUN_COMMANDS = ["certipy --help"]
|
|
PROJECT_URL = "https://github.com/ly4k/Certipy"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Kerbrute(HackingTool):
|
|
TITLE = "Kerbrute (Kerberos Brute Force)"
|
|
DESCRIPTION = "Kerberos pre-auth brute-forcer for username enumeration and password spraying."
|
|
REQUIRES_GO = True
|
|
INSTALL_COMMANDS = [
|
|
"go install github.com/ropnop/kerbrute@latest",
|
|
]
|
|
RUN_COMMANDS = ["kerbrute --help"]
|
|
PROJECT_URL = "https://github.com/ropnop/kerbrute"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class ActiveDirectoryTools(HackingToolsCollection):
|
|
TITLE = "Active Directory Tools"
|
|
DESCRIPTION = "Tools for AD enumeration, attack path discovery, and credential attacks."
|
|
TOOLS = [
|
|
BloodHound(),
|
|
NetExec(),
|
|
Impacket(),
|
|
Responder(),
|
|
Certipy(),
|
|
Kerbrute(),
|
|
] |