Skip to content

This repository, EthicalHackingTools, is a curated collection of scripts and tools designed for security researchers and penetration testers. It serves as a central hub for various utilities used in ethical hacking, ranging from reconnaissance to vulnerability assessment.

License

Notifications You must be signed in to change notification settings

nafis548/EthicalHackingTools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

19 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ HackerAI - Advanced Security Assessment Toolkit v3.0

Python License Version Platform

πŸ“– Table of Contents

🎯 Overview

HackerAI is an advanced, modular security assessment and ethical hacking toolkit designed for cybersecurity professionals, penetration testers, and security researchers. Built with Python 3.8+, it features an asynchronous engine for high-performance operations and includes comprehensive modules for reconnaissance, vulnerability assessment, exploitation, and post-exploitation.

Key Highlights:

  • Asynchronous Engine: High-performance async/await architecture
  • Modular Design: Independent, reusable components
  • Advanced Evasion: WAF bypass, proxy rotation, Tor support
  • Comprehensive Toolset: From reconnaissance to post-exploitation
  • Professional Reporting: JSON-based reporting with export options

⚠️ DISCLAIMER

                        SECURITY DISCLAIMER     

This tool is for EDUCATIONAL PURPOSES and AUTHORIZED security testing ONLY.

LEGAL USE ONLY:
β€’ Use only on systems you OWN
β€’ Use only with EXPLICIT WRITTEN PERMISSION
β€’ Comply with all applicable LAWS and REGULATIONS

The developers are NOT RESPONSIBLE for any:
β€’ Misuse or illegal use of this tool
β€’ Damage caused by unauthorized testing
β€’ Legal consequences of improper usage

By using this tool, you ACCEPT FULL RESPONSIBILITY for your actions.


## ✨ Features

### πŸ” **Reconnaissance & Intelligence**
- **Advanced Port Scanning**: Fast socket-based scanning with service fingerprinting
- **WAF Detection**: Cloudflare, Akamai, Imperva, AWS WAF, Sucuri detection
- **Subdomain Enumeration**: Async subdomain discovery
- **Network Scanning**: CIDR-based host discovery
- **Technology Detection**: CMS, frameworks, server technologies

### 🎯 **Vulnerability Assessment**
- **Web Vulnerability Scanner**: SQLi, XSS, LFI, RCE, Command Injection
- **Security Header Analysis**: Missing security headers detection
- **Directory Bruteforce**: Intelligent wordlist selection
- **Auto-Exploitation**: SQLi, LFI, XSS, Command Injection, RCE

### ⚑ **Attack Tools**
- **Advanced Stress Tester**: HTTP floods, Slowloris, SYN floods, UDP floods
- **Reverse Shell Generator**: 20+ shell types with evasion techniques
- **Payload Obfuscation**: Multiple encoding/encryption methods
- **Post-Exploitation**: System info gathering, privilege escalation checks

### πŸ›‘οΈ **Evasion & Anonymity**
- **Proxy Manager**: Rotating proxies with verification
- **Tor Integration**: Full Tor network support
- **User-Agent Rotation**: 50+ realistic user agents
- **Stealth Mode**: Advanced header manipulation
- **Packet Fragmentation**: Firewall evasion techniques

### πŸ“Š **Reporting & Management**
- **JSON Reporting**: Structured finding storage
- **Export Options**: TXT, JSON export formats
- **Session Management**: Persistent session handling
- **Real-time Statistics**: Attack performance metrics

πŸš€ Installation

Prerequisites

  • Python 3.8 or higher
  • pip (Python package manager)
  • Git (optional)

Step 1: Clone Repository

git clone https://github.com/nafis548/EthicalHackingTools.git
cd pythonattack

Step 2: Install Dependencies

pip install -r requirements.txt

Or install manually:

pip install aiohttp requests fake_useragent urllib3 colorama beautifulsoup4

For A shell(manually)

pip install aiohttp 
pip install requests
pip install colorama
pip install beautifulsoup4
pip install urllib3 
pip install fake_useragent 

Step 3: Run it

python3 main.py

Use vpn on ios

Use tor on android

Optional: Tor Setup (For Enhanced Anonymity)

# Ubuntu/Debian
sudo apt install tor
sudo systemctl start tor

# macOS
brew install tor
brew services start tor

# Windows
# Download from: https://www.torproject.org/download/

πŸ› οΈ Modules Overview

main.py - Entry Point

Β· Tool initialization
Β· Dependency checking
Β· Disclaimer display
Β· Main menu launcher

scanner.py - Advanced Scanner Module

Β· Intelligent fingerprinting
Β· WAF detection
Β· Fast port scanning
Β· Technology stack analysis
Β· Vulnerability hint generation

reverse_shell.py - Reverse Shell Generator

Β· 20+ shell types (bash, python, powershell, PHP, etc.)
Β· Encryption/obfuscation (XOR, AES, RC4, Base64)
Β· Windows evasion (AMSI bypass, registry persistence)
Β· Linux evasion (fileless execution, cron persistence)
Β· Interactive handler with multi-session support

auto_exploit.py - Auto Exploitation Engine

Β· Payload obfuscation (10+ methods)
Β· Post-exploitation module
Β· Web shell deployment
Β· Advanced SQLi/LFI/XSS/RCE exploitation
Β· Evasion techniques integration

stress_tester.py - Advanced Stress Tester

Β· Async HTTP floods
Β· Slowloris attacks
Β· SYN/UDP floods
Β· Packet fragmentation
Β· Distributed attack simulation
Β· Custom HTTP methods support

proxy_manager.py - Proxy & Anonymity Manager

Β· Proxy rotation with verification
Β· Tor network integration
Β· User-agent database (50+ agents)
Β· Stealth mode headers
Β· Session management

menu.py - Interactive Menu System

Β· Color-coded interface
Β· Status display
Β· Settings management
Β· Report viewer with export options

config.py - Configuration

Β· Color schemes
Β· Global variables
Β· Default settings
Β· User agents list

utils.py - Utilities (Assumed)

Β· Common functions
Β· File operations
Β· Network utilities
Β· Reporting helper

πŸ“Š Usage Guide

Starting the Tool

python main.py

Main Menu Navigation

━━━━━━━━━━━━━━━[ SCANNING TOOLS ]━━━━━━━━━━━━━━━
  [1] Advanced Reconnaissance
  [2] Web Vulnerability Auditor
  [3] Directory Bruteforce
  [4] Subdomain Enumeration
  [5] Network Scanner

━━━━━━━━━━━━━━━[ ATTACK TOOLS ]━━━━━━━━━━━━━━━━
  [6] Advanced Stress Tester (Async)
  [7] Reverse Shell Generator
  [8] Auto-Exploit Module

━━━━━━━━━━━━━━━[ UTILITIES ]━━━━━━━━━━━━━━━━━━━
  [S] Settings & Configuration
  [R] View & Export Reports
  [H] Help
  [A] About HackerAI
  [0] Exit Tool

Example Workflows

  1. Complete Security Assessment
1. Advanced Reconnaissance β†’ Gather target information
2. Web Vulnerability Auditor β†’ Scan for vulnerabilities
3. Auto-Exploit Module β†’ Test exploitation
4. View Reports β†’ Analyze findings
  1. Reverse Shell Generation
1. Navigate to Reverse Shell Generator
2. Configure LHOST/LPORT
3. Select shell type
4. Copy generated payload
5. Start listener
  1. Stress Testing (Authorized Only)
1. Navigate to Advanced Stress Tester
2. Enter target URL
3. Select attack type
4. Configure duration/concurrency
5. Start attack

πŸ”§ Configuration

Edit config.py for Custom Settings:

# Network Settings
THREADS = 50              # Concurrent threads
TIMEOUT = 10              # Request timeout (seconds)
LHOST = "192.168.1.100"   # Default listener IP
LPORT = 4444              # Default listener port

# Reporting
REPORT_FILE = "hackerai_scan_report.json"

# Colors (Customize UI)
R = "\033[31m"   # Red
G = "\033[32m"   # Green
Y = "\033[33m"   # Yellow
B = "\033[34m"   # Blue
C = "\033[36m"   # Cyan
W = "\033[0m"    # White

Proxy Configuration

Enable in Settings Menu:

  1. Proxy Rotation: ON
  2. Tor Network: ON/OFF
  3. Stealth Mode: ON
  4. Auto-refresh: ON

Custom Wordlists

Add custom wordlists to:

Β· wordlists/directory.txt - Directory bruteforce Β· wordlists/subdomains.txt - Subdomain enumeration Β· user_agents.txt - Additional user agents

πŸ“ Project Structure

hackerai/
β”œβ”€β”€ main.py                 # Entry point
β”œβ”€β”€ config.py              # Configuration & colors
β”œβ”€β”€ menu.py                # Interactive menu system
β”œβ”€β”€ scanner.py             # Advanced scanner module
β”œβ”€β”€ reverse_shell.py       # Reverse shell generator
β”œβ”€β”€ auto_exploit.py        # Auto exploitation engine
β”œβ”€β”€ stress_tester.py       # Advanced stress tester
β”œβ”€β”€ proxy_manager.py       # Proxy & anonymity manager
β”œβ”€β”€ utils.py              # Utility functions
β”œβ”€β”€ requirements.txt       # Dependencies
β”œβ”€β”€ README.md             # This file
β”œβ”€β”€ reports/              # Generated reports
β”œβ”€β”€ sessions/             # Session data
└── wordlists/            # Custom wordlists

πŸ” Security Guidelines

βœ… Authorized Testing Checklist

Β· Written permission obtained Β· Scope clearly defined Β· Legal compliance verified Β· Data backup completed Β· Emergency contacts listed Β· Testing window scheduled

β›” Prohibited Activities

Β· Testing without explicit authorization Β· Targeting critical infrastructure Β· Data theft or destruction Β· Denial of Service on production systems Β· Privacy violation or harassment

πŸ”’ Safe Testing Practices

  1. Use Lab Environments: Test in isolated networks
  2. Limit Impact: Use controlled, non-destructive techniques
  3. Document Everything: Keep detailed logs of all activities
  4. Respect Privacy: Avoid accessing personal data
  5. Follow Scope: Stay within authorized boundaries

🀝 Contributing

We welcome contributions! Please follow these guidelines:

Reporting Issues

  1. Check existing issues
  2. Use the issue template
  3. Include steps to reproduce
  4. Provide error messages/logs

Code Contributions

  1. Fork the repository
  2. Create a feature branch
  3. Follow PEP 8 style guide
  4. Add tests if applicable
  5. Submit a pull request

Feature Requests

  1. Describe the use case
  2. Explain the benefit
  3. Suggest implementation approach
  4. Consider security implications

πŸ“„ License

Educational Use Only License

This software is provided for educational purposes only. By using this software, you agree to:

  1. Use only for legitimate security testing on systems you own or have explicit permission to test
  2. Not use for any illegal or unauthorized activities
  3. Accept full responsibility for your actions
  4. Comply with all applicable laws and regulations

No Warranty

THIS SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND. The developers shall not be liable for any damages arising from the use of this software.

Copyright Notice

Β© 2024 HackerAI Development Team. All rights reserved for authorized educational use.


🚨 Emergency Contact & Responsible Disclosure

If you discover vulnerabilities using this tool:

  1. Do not exploit without authorization
  2. Document the finding responsibly
  3. Contact the system owner/administrator
  4. Follow responsible disclosure practices

πŸ“ž Support & Resources

Β· Documentation: GitHub Wiki Β· Community: Security Forums Β· Training: Cybersecurity Courses Β· Legal: Consult with legal counsel before testing


Remember: With great power comes great responsibility.

Stay ethical. Stay legal. Stay secure.

Made with ❀️ by security professionals for security professionals
# HackerAI - Advanced Security Assessment Toolkit v3.0

An advanced, modular security assessment and ethical hacking toolkit featuring asynchronous operations, comprehensive vulnerability scanning, reverse shell generation, stress testing, and advanced evasion techniques. For authorized educational use and security testing only.

πŸ”Ή Features: Async engine, WAF detection, proxy rotation, Tor support, 20+ reverse shells, auto-exploitation, intelligent scanning
πŸ”Ή Requirements: Python 3.8+, aiohttp, requests
πŸ”Ή License: Educational Use Only
πŸ”Ή Disclaimer: For authorized testing only. Use responsibly.

For requirements.txt:

aiohttp>=3.8.0
requests>=2.28.0
fake-useragent>=1.1.0
urllib3>=1.26.0
colorama>=0.4.6
beautifulsoup4>=4.12.0

Quick Start Command:

https://github.com/nafis548/EthicalHackingTools.git && cd pythonattack && pip install -r requirements.txt && python3 main.py

About

This repository, EthicalHackingTools, is a curated collection of scripts and tools designed for security researchers and penetration testers. It serves as a central hub for various utilities used in ethical hacking, ranging from reconnaissance to vulnerability assessment.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages