- Overview
β οΈ Disclaimer- β¨ Features
- π Installation
- π οΈ Modules Overview
- π Usage Guide
- π§ Configuration
- π Project Structure
- π Security Guidelines
- π€ Contributing
- π License
HackerAI is an advanced, modular security assessment and ethical hacking toolkit designed for cybersecurity professionals, penetration testers, and security researchers. Built with Python 3.8+, it features an asynchronous engine for high-performance operations and includes comprehensive modules for reconnaissance, vulnerability assessment, exploitation, and post-exploitation.
- Asynchronous Engine: High-performance async/await architecture
- Modular Design: Independent, reusable components
- Advanced Evasion: WAF bypass, proxy rotation, Tor support
- Comprehensive Toolset: From reconnaissance to post-exploitation
- Professional Reporting: JSON-based reporting with export options
SECURITY DISCLAIMER
This tool is for EDUCATIONAL PURPOSES and AUTHORIZED security testing ONLY.
LEGAL USE ONLY:
β’ Use only on systems you OWN
β’ Use only with EXPLICIT WRITTEN PERMISSION
β’ Comply with all applicable LAWS and REGULATIONS
The developers are NOT RESPONSIBLE for any:
β’ Misuse or illegal use of this tool
β’ Damage caused by unauthorized testing
β’ Legal consequences of improper usage
By using this tool, you ACCEPT FULL RESPONSIBILITY for your actions.
## β¨ Features
### π **Reconnaissance & Intelligence**
- **Advanced Port Scanning**: Fast socket-based scanning with service fingerprinting
- **WAF Detection**: Cloudflare, Akamai, Imperva, AWS WAF, Sucuri detection
- **Subdomain Enumeration**: Async subdomain discovery
- **Network Scanning**: CIDR-based host discovery
- **Technology Detection**: CMS, frameworks, server technologies
### π― **Vulnerability Assessment**
- **Web Vulnerability Scanner**: SQLi, XSS, LFI, RCE, Command Injection
- **Security Header Analysis**: Missing security headers detection
- **Directory Bruteforce**: Intelligent wordlist selection
- **Auto-Exploitation**: SQLi, LFI, XSS, Command Injection, RCE
### β‘ **Attack Tools**
- **Advanced Stress Tester**: HTTP floods, Slowloris, SYN floods, UDP floods
- **Reverse Shell Generator**: 20+ shell types with evasion techniques
- **Payload Obfuscation**: Multiple encoding/encryption methods
- **Post-Exploitation**: System info gathering, privilege escalation checks
### π‘οΈ **Evasion & Anonymity**
- **Proxy Manager**: Rotating proxies with verification
- **Tor Integration**: Full Tor network support
- **User-Agent Rotation**: 50+ realistic user agents
- **Stealth Mode**: Advanced header manipulation
- **Packet Fragmentation**: Firewall evasion techniques
### π **Reporting & Management**
- **JSON Reporting**: Structured finding storage
- **Export Options**: TXT, JSON export formats
- **Session Management**: Persistent session handling
- **Real-time Statistics**: Attack performance metrics
- Python 3.8 or higher
- pip (Python package manager)
- Git (optional)
git clone https://github.com/nafis548/EthicalHackingTools.git
cd pythonattackStep 2: Install Dependencies
pip install -r requirements.txtOr install manually:
pip install aiohttp requests fake_useragent urllib3 colorama beautifulsoup4
For A shell(manually)
pip install aiohttp pip install requestspip install coloramapip install beautifulsoup4pip install urllib3 pip install fake_useragent Step 3: Run it
python3 main.pyOptional: Tor Setup (For Enhanced Anonymity)
# Ubuntu/Debian
sudo apt install tor
sudo systemctl start tor
# macOS
brew install tor
brew services start tor
# Windows
# Download from: https://www.torproject.org/download/main.py - Entry Point
Β· Tool initialization
Β· Dependency checking
Β· Disclaimer display
Β· Main menu launcher
scanner.py - Advanced Scanner Module
Β· Intelligent fingerprinting
Β· WAF detection
Β· Fast port scanning
Β· Technology stack analysis
Β· Vulnerability hint generation
reverse_shell.py - Reverse Shell Generator
Β· 20+ shell types (bash, python, powershell, PHP, etc.)
Β· Encryption/obfuscation (XOR, AES, RC4, Base64)
Β· Windows evasion (AMSI bypass, registry persistence)
Β· Linux evasion (fileless execution, cron persistence)
Β· Interactive handler with multi-session support
auto_exploit.py - Auto Exploitation Engine
Β· Payload obfuscation (10+ methods)
Β· Post-exploitation module
Β· Web shell deployment
Β· Advanced SQLi/LFI/XSS/RCE exploitation
Β· Evasion techniques integration
stress_tester.py - Advanced Stress Tester
Β· Async HTTP floods
Β· Slowloris attacks
Β· SYN/UDP floods
Β· Packet fragmentation
Β· Distributed attack simulation
Β· Custom HTTP methods support
proxy_manager.py - Proxy & Anonymity Manager
Β· Proxy rotation with verification
Β· Tor network integration
Β· User-agent database (50+ agents)
Β· Stealth mode headers
Β· Session management
menu.py - Interactive Menu System
Β· Color-coded interface
Β· Status display
Β· Settings management
Β· Report viewer with export options
config.py - Configuration
Β· Color schemes
Β· Global variables
Β· Default settings
Β· User agents list
utils.py - Utilities (Assumed)
Β· Common functions
Β· File operations
Β· Network utilities
Β· Reporting helper
Starting the Tool
python main.pyMain Menu Navigation
βββββββββββββββ[ SCANNING TOOLS ]βββββββββββββββ
[1] Advanced Reconnaissance
[2] Web Vulnerability Auditor
[3] Directory Bruteforce
[4] Subdomain Enumeration
[5] Network Scanner
βββββββββββββββ[ ATTACK TOOLS ]ββββββββββββββββ
[6] Advanced Stress Tester (Async)
[7] Reverse Shell Generator
[8] Auto-Exploit Module
βββββββββββββββ[ UTILITIES ]βββββββββββββββββββ
[S] Settings & Configuration
[R] View & Export Reports
[H] Help
[A] About HackerAI
[0] Exit Tool
Example Workflows
- Complete Security Assessment
1. Advanced Reconnaissance β Gather target information
2. Web Vulnerability Auditor β Scan for vulnerabilities
3. Auto-Exploit Module β Test exploitation
4. View Reports β Analyze findings- Reverse Shell Generation
1. Navigate to Reverse Shell Generator
2. Configure LHOST/LPORT
3. Select shell type
4. Copy generated payload
5. Start listener- Stress Testing (Authorized Only)
1. Navigate to Advanced Stress Tester
2. Enter target URL
3. Select attack type
4. Configure duration/concurrency
5. Start attackEdit config.py for Custom Settings:
# Network Settings
THREADS = 50 # Concurrent threads
TIMEOUT = 10 # Request timeout (seconds)
LHOST = "192.168.1.100" # Default listener IP
LPORT = 4444 # Default listener port
# Reporting
REPORT_FILE = "hackerai_scan_report.json"
# Colors (Customize UI)
R = "\033[31m" # Red
G = "\033[32m" # Green
Y = "\033[33m" # Yellow
B = "\033[34m" # Blue
C = "\033[36m" # Cyan
W = "\033[0m" # WhiteProxy Configuration
Enable in Settings Menu:
- Proxy Rotation: ON
- Tor Network: ON/OFF
- Stealth Mode: ON
- Auto-refresh: ON
Custom Wordlists
Add custom wordlists to:
Β· wordlists/directory.txt - Directory bruteforce Β· wordlists/subdomains.txt - Subdomain enumeration Β· user_agents.txt - Additional user agents
hackerai/
βββ main.py # Entry point
βββ config.py # Configuration & colors
βββ menu.py # Interactive menu system
βββ scanner.py # Advanced scanner module
βββ reverse_shell.py # Reverse shell generator
βββ auto_exploit.py # Auto exploitation engine
βββ stress_tester.py # Advanced stress tester
βββ proxy_manager.py # Proxy & anonymity manager
βββ utils.py # Utility functions
βββ requirements.txt # Dependencies
βββ README.md # This file
βββ reports/ # Generated reports
βββ sessions/ # Session data
βββ wordlists/ # Custom wordlists
β Authorized Testing Checklist
Β· Written permission obtained Β· Scope clearly defined Β· Legal compliance verified Β· Data backup completed Β· Emergency contacts listed Β· Testing window scheduled
β Prohibited Activities
Β· Testing without explicit authorization Β· Targeting critical infrastructure Β· Data theft or destruction Β· Denial of Service on production systems Β· Privacy violation or harassment
π Safe Testing Practices
- Use Lab Environments: Test in isolated networks
- Limit Impact: Use controlled, non-destructive techniques
- Document Everything: Keep detailed logs of all activities
- Respect Privacy: Avoid accessing personal data
- Follow Scope: Stay within authorized boundaries
We welcome contributions! Please follow these guidelines:
Reporting Issues
- Check existing issues
- Use the issue template
- Include steps to reproduce
- Provide error messages/logs
Code Contributions
- Fork the repository
- Create a feature branch
- Follow PEP 8 style guide
- Add tests if applicable
- Submit a pull request
Feature Requests
- Describe the use case
- Explain the benefit
- Suggest implementation approach
- Consider security implications
Educational Use Only License
This software is provided for educational purposes only. By using this software, you agree to:
- Use only for legitimate security testing on systems you own or have explicit permission to test
- Not use for any illegal or unauthorized activities
- Accept full responsibility for your actions
- Comply with all applicable laws and regulations
No Warranty
THIS SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND. The developers shall not be liable for any damages arising from the use of this software.
Copyright Notice
Β© 2024 HackerAI Development Team. All rights reserved for authorized educational use.
π¨ Emergency Contact & Responsible Disclosure
If you discover vulnerabilities using this tool:
- Do not exploit without authorization
- Document the finding responsibly
- Contact the system owner/administrator
- Follow responsible disclosure practices
π Support & Resources
Β· Documentation: GitHub Wiki Β· Community: Security Forums Β· Training: Cybersecurity Courses Β· Legal: Consult with legal counsel before testing
Remember: With great power comes great responsibility.
Stay ethical. Stay legal. Stay secure.
Made with β€οΈ by security professionals for security professionals# HackerAI - Advanced Security Assessment Toolkit v3.0
An advanced, modular security assessment and ethical hacking toolkit featuring asynchronous operations, comprehensive vulnerability scanning, reverse shell generation, stress testing, and advanced evasion techniques. For authorized educational use and security testing only.
πΉ Features: Async engine, WAF detection, proxy rotation, Tor support, 20+ reverse shells, auto-exploitation, intelligent scanning
πΉ Requirements: Python 3.8+, aiohttp, requests
πΉ License: Educational Use Only
πΉ Disclaimer: For authorized testing only. Use responsibly.
For requirements.txt:
aiohttp>=3.8.0
requests>=2.28.0
fake-useragent>=1.1.0
urllib3>=1.26.0
colorama>=0.4.6
beautifulsoup4>=4.12.0
Quick Start Command:
https://github.com/nafis548/EthicalHackingTools.git && cd pythonattack && pip install -r requirements.txt && python3 main.py