mirror of
https://github.com/Z4nzu/hackingtool
synced 2026-05-22 16:39:40 +00:00
New categories: - tools/active_directory.py: BloodHound, NetExec (nxc), Impacket, Responder, Certipy, Kerbrute (6 tools) - tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools) - tools/mobile_security.py: MobSF, Frida, Objection (3 tools) Existing categories expanded: - information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4) - web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun, Caido, mitmproxy (7) - post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel, Evil-WinRM, Mythic (7) - reverse_engineering.py: +Ghidra, Radare2 (2) - forensics.py: +pspy (1) - wireless_attack.py: +Bettercap (1) hackingtool.py: - Import 3 new category modules - Add 3 new entries to tool_definitions (AD, Cloud, Mobile) - Add 3 new instances to all_tools list - Categories: 17 -> 20, total tools: 150+ -> 185+ - Help overlay updated for new range (1-20, 21=Update)
42 lines
No EOL
1.6 KiB
Python
42 lines
No EOL
1.6 KiB
Python
from core import HackingTool
|
|
from core import HackingToolsCollection
|
|
|
|
|
|
class MobSF(HackingTool):
|
|
TITLE = "MobSF (Mobile Security Framework)"
|
|
DESCRIPTION = "All-in-one mobile app pentesting, malware analysis, and security assessment."
|
|
INSTALL_COMMANDS = [
|
|
"git clone https://github.com/MobSF/Mobile-Security-Framework-MobSF.git",
|
|
"cd Mobile-Security-Framework-MobSF && ./setup.sh",
|
|
]
|
|
RUN_COMMANDS = ["cd Mobile-Security-Framework-MobSF && ./run.sh"]
|
|
PROJECT_URL = "https://github.com/MobSF/Mobile-Security-Framework-MobSF"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Frida(HackingTool):
|
|
TITLE = "Frida (Dynamic Instrumentation)"
|
|
DESCRIPTION = "Dynamic instrumentation toolkit for runtime hooking on Android, iOS, Windows, macOS, Linux."
|
|
INSTALL_COMMANDS = ["pip install --user frida-tools"]
|
|
RUN_COMMANDS = ["frida --help"]
|
|
PROJECT_URL = "https://github.com/frida/frida"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class Objection(HackingTool):
|
|
TITLE = "Objection (Mobile Runtime Exploration)"
|
|
DESCRIPTION = "Runtime mobile exploration toolkit powered by Frida — no jailbreak/root required."
|
|
INSTALL_COMMANDS = ["pip install --user objection"]
|
|
RUN_COMMANDS = ["objection --help"]
|
|
PROJECT_URL = "https://github.com/sensepost/objection"
|
|
SUPPORTED_OS = ["linux", "macos"]
|
|
|
|
|
|
class MobileSecurityTools(HackingToolsCollection):
|
|
TITLE = "Mobile Security Tools"
|
|
DESCRIPTION = "Tools for Android/iOS application security testing and analysis."
|
|
TOOLS = [
|
|
MobSF(),
|
|
Frida(),
|
|
Objection(),
|
|
] |