Commit 9b4b5236 authored by Hardik Zinzuvadiya's avatar Hardik Zinzuvadiya
Browse files

Add 35 new tools across 3 new + 6 existing categories

New categories:
- tools/active_directory.py: BloodHound, NetExec (nxc), Impacket,
  Responder, Certipy, Kerbrute (6 tools)
- tools/cloud_security.py: Prowler, ScoutSuite, Pacu, Trivy (4 tools)
- tools/mobile_security.py: MobSF, Frida, Objection (3 tools)

Existing categories expanded:
- information_gathering.py: +SpiderFoot, Subfinder, TruffleHog, Gitleaks (4)
- web_attack.py: +Gobuster, Dirsearch, OWASP ZAP, testssl.sh, Arjun,
  Caido, mitmproxy (7)
- post_exploitation.py: +Sliver, Havoc, PEASS-ng, Ligolo-ng, Chisel,
  Evil-WinRM, Mythic (7)
- reverse_engineering.py: +Ghidra, Radare2 (2)
- forensics.py: +pspy (1)
- wireless_attack.py: +Bettercap (1)

hackingtool.py:
- Import 3 new category modules
- Add 3 new entries to tool_definitions (AD, Cloud, Mobile)
- Add 3 new instances to all_tools list
- Categories: 17 -> 20, total tools: 150+ -> 185+
- Help overlay updated for new range (1-20, 21=Update)
parent d63df741
Loading
Loading
Loading
Loading
+12 −3
Original line number Diff line number Diff line
@@ -49,6 +49,9 @@ from tools.web_attack import WebAttackTools
from tools.wireless_attack import WirelessAttackTools
from tools.wordlist_generator import WordlistGeneratorTools
from tools.xss_attack import XSSAttackTools
from tools.active_directory import ActiveDirectoryTools
from tools.cloud_security import CloudSecurityTools
from tools.mobile_security import MobileSecurityTools

# ── Tool registry ──────────────────────────────────────────────────────────────

@@ -72,6 +75,9 @@ tool_definitions = [
    ("Remote Administrator Tools (RAT)",   "🖥 ", "Remote Admin (RAT)"),
    ("XSS Attack Tools",                   "💥",  "XSS Attack"),
    ("Steganography tools",                "🖼 ", "Steganography"),
    ("Active Directory Tools",             "🏢",  "Active Directory"),
    ("Cloud Security Tools",               "",  "Cloud Security"),
    ("Mobile Security Tools",              "📱",  "Mobile Security"),
    ("Other tools",                        "",  "Other Tools"),
    ("Update or Uninstall | Hackingtool",  "",  "Update / Uninstall"),
]
@@ -93,6 +99,9 @@ all_tools = [
    RemoteAdministrationTools(),
    XSSAttackTools(),
    SteganographyTools(),
    ActiveDirectoryTools(),
    CloudSecurityTools(),
    MobileSecurityTools(),
    OtherTools(),
    ToolManager(),
]
@@ -110,8 +119,8 @@ def show_help():
        Text.assemble(
            ("  Main menu\n", "bold white"),
            ("  ─────────────────────────────────────\n", "dim"),
            ("  1–17   ", "bold cyan"), ("open a category\n", "white"),
            ("  18     ", "bold cyan"), ("Update / Uninstall hackingtool\n", "white"),
            ("  1–20   ", "bold cyan"), ("open a category\n", "white"),
            ("  21     ", "bold cyan"), ("Update / Uninstall hackingtool\n", "white"),
            ("  ?      ", "bold cyan"), ("show this help\n", "white"),
            ("  q      ", "bold cyan"), ("quit hackingtool\n\n", "white"),
            ("  Inside a category\n", "bold white"),
@@ -210,7 +219,7 @@ def _build_header() -> Panel:
        ("  kernel  ›  ", info["kernel"][:34]),
        ("  user    ›  ", f"{info['user']} @ {info['host'][:20]}"),
        ("  ip      ›  ", info["ip"]),
        ("  tools   ›  ", f"{len(all_tools)} categories · 150+ modules"),
        ("  tools   ›  ", f"{len(all_tools)} categories · 185+ modules"),
        ("  session ›  ", info["time"]),
        ("", ""),
        ("  python  ›  ", f"{sys.version_info.major}.{sys.version_info.minor}.{sys.version_info.micro}"),
+75 −0
Original line number Diff line number Diff line
from core import HackingTool
from core import HackingToolsCollection


class BloodHound(HackingTool):
    TITLE = "BloodHound (AD Attack Paths)"
    DESCRIPTION = "Uses graph theory to reveal hidden attack paths in Active Directory/Azure environments."
    INSTALL_COMMANDS = [
        "pip install --user bloodhound",
        "sudo apt-get install -y neo4j",
    ]
    RUN_COMMANDS = ["bloodhound-python --help"]
    PROJECT_URL = "https://github.com/BloodHoundAD/BloodHound"
    SUPPORTED_OS = ["linux", "macos"]


class NetExec(HackingTool):
    TITLE = "NetExec — nxc (Network Pentesting)"
    DESCRIPTION = "Swiss army knife for pentesting Windows/AD networks. Successor to CrackMapExec."
    INSTALL_COMMANDS = ["pip install --user netexec"]
    RUN_COMMANDS = ["nxc --help"]
    PROJECT_URL = "https://github.com/Pennyw0rth/NetExec"
    SUPPORTED_OS = ["linux", "macos"]


class Impacket(HackingTool):
    TITLE = "Impacket (Network Protocol Tools)"
    DESCRIPTION = "Python classes for working with SMB, MSRPC, Kerberos, LDAP, and more."
    INSTALL_COMMANDS = ["pip install --user impacket"]
    RUN_COMMANDS = ["impacket-smbclient --help"]
    PROJECT_URL = "https://github.com/fortra/impacket"
    SUPPORTED_OS = ["linux", "macos"]


class Responder(HackingTool):
    TITLE = "Responder (LLMNR/NBT-NS Poisoner)"
    DESCRIPTION = "LLMNR/NBT-NS/MDNS poisoner with rogue authentication servers for credential capture."
    INSTALL_COMMANDS = ["git clone https://github.com/lgandx/Responder.git"]
    RUN_COMMANDS = ["cd Responder && sudo python3 Responder.py --help"]
    PROJECT_URL = "https://github.com/lgandx/Responder"
    SUPPORTED_OS = ["linux"]


class Certipy(HackingTool):
    TITLE = "Certipy (AD Certificate Abuse)"
    DESCRIPTION = "Active Directory Certificate Services enumeration and abuse tool."
    INSTALL_COMMANDS = ["pip install --user certipy-ad"]
    RUN_COMMANDS = ["certipy --help"]
    PROJECT_URL = "https://github.com/ly4k/Certipy"
    SUPPORTED_OS = ["linux", "macos"]


class Kerbrute(HackingTool):
    TITLE = "Kerbrute (Kerberos Brute Force)"
    DESCRIPTION = "Kerberos pre-auth brute-forcer for username enumeration and password spraying."
    REQUIRES_GO = True
    INSTALL_COMMANDS = [
        "go install github.com/ropnop/kerbrute@latest",
    ]
    RUN_COMMANDS = ["kerbrute --help"]
    PROJECT_URL = "https://github.com/ropnop/kerbrute"
    SUPPORTED_OS = ["linux", "macos"]


class ActiveDirectoryTools(HackingToolsCollection):
    TITLE = "Active Directory Tools"
    DESCRIPTION = "Tools for AD enumeration, attack path discovery, and credential attacks."
    TOOLS = [
        BloodHound(),
        NetExec(),
        Impacket(),
        Responder(),
        Certipy(),
        Kerbrute(),
    ]
 No newline at end of file
+51 −0
Original line number Diff line number Diff line
from core import HackingTool
from core import HackingToolsCollection


class Prowler(HackingTool):
    TITLE = "Prowler (Cloud Security Scanner)"
    DESCRIPTION = "Open-source security tool for AWS, Azure, GCP, and Kubernetes assessments."
    INSTALL_COMMANDS = ["pip install --user prowler"]
    RUN_COMMANDS = ["prowler --help"]
    PROJECT_URL = "https://github.com/prowler-cloud/prowler"
    SUPPORTED_OS = ["linux", "macos"]


class ScoutSuite(HackingTool):
    TITLE = "ScoutSuite (Multi-Cloud Auditing)"
    DESCRIPTION = "Multi-cloud security auditing tool for AWS, Azure, GCP, Alibaba, and Oracle."
    INSTALL_COMMANDS = ["pip install --user scoutsuite"]
    RUN_COMMANDS = ["scout --help"]
    PROJECT_URL = "https://github.com/nccgroup/ScoutSuite"
    SUPPORTED_OS = ["linux", "macos"]


class Pacu(HackingTool):
    TITLE = "Pacu (AWS Exploitation Framework)"
    DESCRIPTION = "AWS exploitation framework for offensive security testing of AWS environments."
    INSTALL_COMMANDS = ["pip install --user pacu"]
    RUN_COMMANDS = ["pacu --help"]
    PROJECT_URL = "https://github.com/RhinoSecurityLabs/pacu"
    SUPPORTED_OS = ["linux", "macos"]


class Trivy(HackingTool):
    TITLE = "Trivy (Container/K8s Scanner)"
    DESCRIPTION = "Comprehensive vulnerability scanner for containers, Kubernetes, IaC, and code."
    INSTALL_COMMANDS = [
        "curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sudo sh -s -- -b /usr/local/bin",
    ]
    RUN_COMMANDS = ["trivy --help"]
    PROJECT_URL = "https://github.com/aquasecurity/trivy"
    SUPPORTED_OS = ["linux", "macos"]


class CloudSecurityTools(HackingToolsCollection):
    TITLE = "Cloud Security Tools"
    DESCRIPTION = "Tools for cloud infrastructure security assessment and exploitation."
    TOOLS = [
        Prowler(),
        ScoutSuite(),
        Pacu(),
        Trivy(),
    ]
+13 −0
Original line number Diff line number Diff line
@@ -128,6 +128,18 @@ class Binwalk(HackingTool):
    PROJECT_URL = "https://github.com/ReFirmLabs/binwalk"


class Pspy(HackingTool):
    TITLE = "pspy (Process Monitor — No Root)"
    DESCRIPTION = "Monitor Linux processes without root — detects cron jobs, scheduled tasks, other users' commands."
    INSTALL_COMMANDS = [
        "curl -sSL https://github.com/DominicBreuker/pspy/releases/latest/download/pspy64 -o pspy",
        "chmod +x pspy",
    ]
    RUN_COMMANDS = ["./pspy --help"]
    PROJECT_URL = "https://github.com/DominicBreuker/pspy"
    SUPPORTED_OS = ["linux"]


class ForensicTools(HackingToolsCollection):
    TITLE = "Forensic tools"
    TOOLS = [
@@ -138,6 +150,7 @@ class ForensicTools(HackingToolsCollection):
        Toolsley(),
        Volatility3(),
        Binwalk(),
        Pspy(),
    ]

if __name__ == "__main__":
+42 −0
Original line number Diff line number Diff line
@@ -306,6 +306,44 @@ class Httpx(HackingTool):
    PROJECT_URL = "https://github.com/projectdiscovery/httpx"


class SpiderFoot(HackingTool):
    TITLE = "SpiderFoot (OSINT Automation)"
    DESCRIPTION = "Automates OSINT collection for threat intelligence and attack surface mapping."
    INSTALL_COMMANDS = ["pip install --user spiderfoot"]
    RUN_COMMANDS = ["spiderfoot -h"]
    PROJECT_URL = "https://github.com/smicallef/spiderfoot"


class Subfinder(HackingTool):
    TITLE = "Subfinder (Subdomain Enumeration)"
    DESCRIPTION = "Fast passive subdomain enumeration using multiple sources."
    REQUIRES_GO = True
    INSTALL_COMMANDS = [
        "go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest",
    ]
    RUN_COMMANDS = ["subfinder -h"]
    PROJECT_URL = "https://github.com/projectdiscovery/subfinder"


class TruffleHog(HackingTool):
    TITLE = "TruffleHog (Secret Scanner)"
    DESCRIPTION = "Find, verify, and analyze leaked credentials across git repos, S3 buckets, filesystems."
    INSTALL_COMMANDS = ["pip install --user trufflehog"]
    RUN_COMMANDS = ["trufflehog --help"]
    PROJECT_URL = "https://github.com/trufflesecurity/trufflehog"


class Gitleaks(HackingTool):
    TITLE = "Gitleaks (Git Secret Scanner)"
    DESCRIPTION = "Fast secret scanner for git repos — detects hardcoded passwords, API keys, tokens."
    REQUIRES_GO = True
    INSTALL_COMMANDS = [
        "go install github.com/gitleaks/gitleaks/v8@latest",
    ]
    RUN_COMMANDS = ["gitleaks --help"]
    PROJECT_URL = "https://github.com/gitleaks/gitleaks"


class InformationGatheringTools(HackingToolsCollection):
    TITLE = "Information gathering tools"
    TOOLS = [
@@ -331,6 +369,10 @@ class InformationGatheringTools(HackingToolsCollection):
        Holehe(),
        Maigret(),
        Httpx(),
        SpiderFoot(),
        Subfinder(),
        TruffleHog(),
        Gitleaks(),
    ]

if __name__ == "__main__":
Loading