|
| Command | Action | Works in |
|---|---|---|
/query |
Search β find tools instantly by keyword | Main menu |
t |
Tags β filter by osint, scanner, c2, cloud, mobile... | Main menu |
r |
Recommend β "I want to do X" β matching tools | Main menu |
? |
Help β quick reference card | Everywhere |
q |
Quit β exit from any depth | Everywhere |
97 |
Install All β batch install all tools in category | Category |
99 |
Back β return to previous menu | Everywhere |
| # | Category | Tools | # | Category | Tools | |
|---|---|---|---|---|---|---|
| 1 | π‘ Anonymously Hiding | 2 | 11 | π§° Exploit Framework | 4 | |
| 2 | π Information Gathering | 26 | 12 | π Reverse Engineering | 5 | |
| 3 | π Wordlist Generator | 7 | 13 | β‘ DDOS Attack | 5 | |
| 4 | πΆ Wireless Attack | 13 | 14 | π₯ RAT | 1 | |
| 5 | π§© SQL Injection | 7 | 15 | π₯ XSS Attack | 9 | |
| 6 | π£ Phishing Attack | 17 | 16 | πΌ Steganography | 4 | |
| 7 | π Web Attack | 20 | 17 | π’ Active Directory | 6 | |
| 8 | π§ Post Exploitation | 10 | 18 | β Cloud Security | 4 | |
| 9 | π΅ Forensics | 8 | 19 | π± Mobile Security | 3 | |
| 10 | π¦ Payload Creation | 8 | 20 | β¨ Other Tools | 24 |
- Network Map (nmap)
- Dracnmap
- Port scanning
- Host to IP
- Xerosploit
- RED HAWK
- ReconSpider
- IsItDown
- Infoga
- ReconDog
- Striker
- SecretFinder
- Shodanfy
- rang3r
- Breacher
- theHarvester β
- Amass β
- Masscan β
- RustScan β
- Holehe β
- Maigret β
- httpx β
- SpiderFoot β
- Subfinder β
- TruffleHog β
- Gitleaks β
- Cupp
- WordlistCreator
- Goblin WordGenerator
- Password list (1.4B)
- Hashcat β
- John the Ripper β
- haiti β
- WiFi-Pumpkin
- pixiewps
- Bluetooth Honeypot (bluepot)
- Fluxion
- Wifiphisher
- Wifite
- EvilTwin
- Fastssh
- Howmanypeople
- Airgeddon β
- hcxdumptool β
- hcxtools β
- Bettercap β
- Autophisher
- PyPhisher
- AdvPhishing
- Setoolkit
- SocialFish
- HiddenEye
- Evilginx3
- I-See-You
- SayCheese
- QR Code Jacking
- BlackEye
- ShellPhish
- Thanos
- QRLJacking
- Maskphish
- BlackPhish
- dnstwist
- Web2Attack
- Skipfish
- Sublist3r
- CheckURL
- Sub-Domain TakeOver
- Dirb
- Nuclei β
- ffuf β
- Feroxbuster β
- Nikto β
- wafw00f β
- Katana β
- Gobuster β
- Dirsearch β
- OWASP ZAP β
- testssl.sh β
- Arjun β
- Caido β
- mitmproxy β
- Vegile
- Chrome Keylogger
- pwncat-cs β
- Sliver β
- Havoc β
- PEASS-ng (LinPEAS/WinPEAS) β
- Ligolo-ng β
- Chisel β
- Evil-WinRM β
- Mythic β
- Autopsy
- Wireshark
- Bulk extractor
- Guymager
- Toolsley
- Volatility 3 β
- Binwalk β
- pspy β
- Androguard
- Apk2Gold
- JadX
- Ghidra β
- Radare2 β
- SteganoHide
- StegoCracker
- Whitespace
- BloodHound β
- NetExec (nxc) β
- Impacket β
- Responder β
- Certipy β
- Kerbrute β
- Prowler β
- ScoutSuite β
- Pacu β
- Trivy β
- Terminal Multiplexer (tilix)
- Crivo
Use the Tool Request template. Required: tool name, GitHub URL, category, OS, install command, reason. |
Use the PR template checklist. Required: class in |
Issues or PRs that don't follow the title format will be closed without review.
curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bashHandles everything β prerequisites, clone, venv, launcher. |
git clone https://github.com/Z4nzu/hackingtool.git
cd hackingtool
sudo python3 install.pyThen run: |
# Build
docker build -t hackingtool .
# Run (direct)
docker run -it --rm hackingtool
# Run (Compose β recommended)
docker compose up -d
docker exec -it hackingtool bash
# Dev mode (live source mount)
docker compose --profile dev up
docker exec -it hackingtool-dev bash
# Stop
docker compose down # stop container
docker compose down -v # also remove data volume| Dependency | Version | Needed for |
|---|---|---|
| Python | 3.10+ | Core |
| Go | 1.21+ | nuclei, ffuf, amass, httpx, katana, dalfox, gobuster, subfinder |
| Ruby | any | haiti, evil-winrm |
| Docker | any | Mythic, MobSF (optional) |
pip install -r requirements.txtIf this project helps you, consider buying me a coffee:
For authorized security testing only. Thanks to all original authors of the tools included in hackingtool.
Your favourite tool is not listed? Suggest it here
