EthicalHackingTools
This repository, EthicalHackingTools, is a curated collection of scripts and tools designed for security researchers and penetration testers. It serves as a central hub for various utilities used in ethical hacking, ranging from reconnaissance to vulnerability assessment.
Install / Use
/learn @Quincunx33/EthicalHackingToolsREADME
🛡️ HackerAI - Advanced Security Assessment Toolkit v3.0(new verson comming )
📖 Table of Contents
- Overview
- ⚠️ Disclaimer
- ✨ Features
- 🚀 Installation
- 🛠️ Modules Overview
- 📊 Usage Guide
- 🔧 Configuration
- 📁 Project Structure
- 🔐 Security Guidelines
- 🤝 Contributing
- 📄 License
🎯 Overview
HackerAI is an advanced, modular security assessment and ethical hacking toolkit designed for cybersecurity professionals, penetration testers, and security researchers. Built with Python 3.8+, it features an asynchronous engine for high-performance operations and includes comprehensive modules for reconnaissance, vulnerability assessment, exploitation, and post-exploitation.
Key Highlights:
- Asynchronous Engine: High-performance async/await architecture
- Modular Design: Independent, reusable components
- Advanced Evasion: WAF bypass, proxy rotation, Tor support
- Comprehensive Toolset: From reconnaissance to post-exploitation
- Professional Reporting: JSON-based reporting with export options
⚠️ DISCLAIMER
SECURITY DISCLAIMER
This tool is for EDUCATIONAL PURPOSES and AUTHORIZED security testing ONLY.
LEGAL USE ONLY:
• Use only on systems you OWN
• Use only with EXPLICIT WRITTEN PERMISSION
• Comply with all applicable LAWS and REGULATIONS
The developers are NOT RESPONSIBLE for any:
• Misuse or illegal use of this tool
• Damage caused by unauthorized testing
• Legal consequences of improper usage
By using this tool, you ACCEPT FULL RESPONSIBILITY for your actions.
## ✨ Features
### 🔍 **Reconnaissance & Intelligence**
- **Advanced Port Scanning**: Fast socket-based scanning with service fingerprinting
- **WAF Detection**: Cloudflare, Akamai, Imperva, AWS WAF, Sucuri detection
- **Subdomain Enumeration**: Async subdomain discovery
- **Network Scanning**: CIDR-based host discovery
- **Technology Detection**: CMS, frameworks, server technologies
### 🎯 **Vulnerability Assessment**
- **Web Vulnerability Scanner**: SQLi, XSS, LFI, RCE, Command Injection
- **Security Header Analysis**: Missing security headers detection
- **Directory Bruteforce**: Intelligent wordlist selection
- **Auto-Exploitation**: SQLi, LFI, XSS, Command Injection, RCE
### ⚡ **Attack Tools**
- **Advanced Stress Tester**: HTTP floods, Slowloris, SYN floods, UDP floods
- **Reverse Shell Generator**: 20+ shell types with evasion techniques
- **Payload Obfuscation**: Multiple encoding/encryption methods
- **Post-Exploitation**: System info gathering, privilege escalation checks
### 🛡️ **Evasion & Anonymity**
- **Proxy Manager**: Rotating proxies with verification
- **Tor Integration**: Full Tor network support
- **User-Agent Rotation**: 50+ realistic user agents
- **Stealth Mode**: Advanced header manipulation
- **Packet Fragmentation**: Firewall evasion techniques
### 📊 **Reporting & Management**
- **JSON Reporting**: Structured finding storage
- **Export Options**: TXT, JSON export formats
- **Session Management**: Persistent session handling
- **Real-time Statistics**: Attack performance metrics
🚀 Installation
Prerequisites
- Python 3.8 or higher
- pip (Python package manager)
- Git (optional)
Step 1: Clone Repository
git clone https://github.com/Quincunx33/EthicalHackingTools.git
cd pythonattack
Step 2: Install Dependencies
pip install -r requirements.txt
Or install manually:
pip install aiohttp requests fake_useragent urllib3 colorama beautifulsoup4
For A shell(manually)
pip install aiohttp
pip install requests
pip install colorama
pip install beautifulsoup4
pip install urllib3
pip install fake_useragent
Step 3: Run it
python3 main.py
Use vpn on ios
Use tor on android
Optional: Tor Setup (For Enhanced Anonymity)
# Ubuntu/Debian
sudo apt install tor
sudo systemctl start tor
# macOS
brew install tor
brew services start tor
# Windows
# Download from: https://www.torproject.org/download/
🛠️ Modules Overview
main.py - Entry Point
· Tool initialization
· Dependency checking
· Disclaimer display
· Main menu launcher
scanner.py - Advanced Scanner Module
· Intelligent fingerprinting
· WAF detection
· Fast port scanning
· Technology stack analysis
· Vulnerability hint generation
reverse_shell.py - Reverse Shell Generator
· 20+ shell types (bash, python, powershell, PHP, etc.)
· Encryption/obfuscation (XOR, AES, RC4, Base64)
· Windows evasion (AMSI bypass, registry persistence)
· Linux evasion (fileless execution, cron persistence)
· Interactive handler with multi-session support
auto_exploit.py - Auto Exploitation Engine
· Payload obfuscation (10+ methods)
· Post-exploitation module
· Web shell deployment
· Advanced SQLi/LFI/XSS/RCE exploitation
· Evasion techniques integration
stress_tester.py - Advanced Stress Tester
· Async HTTP floods
· Slowloris attacks
· SYN/UDP floods
· Packet fragmentation
· Distributed attack simulation
· Custom HTTP methods support
proxy_manager.py - Proxy & Anonymity Manager
· Proxy rotation with verification
· Tor network integration
· User-agent database (50+ agents)
· Stealth mode headers
· Session management
menu.py - Interactive Menu System
· Color-coded interface
· Status display
· Settings management
· Report viewer with export options
config.py - Configuration
· Color schemes
· Global variables
· Default settings
· User agents list
utils.py - Utilities (Assumed)
· Common functions
· File operations
· Network utilities
· Reporting helper
📊 Usage Guide
Starting the Tool
python main.py
Main Menu Navigation
━━━━━━━━━━━━━━━[ SCANNING TOOLS ]━━━━━━━━━━━━━━━
[1] Advanced Reconnaissance
[2] Web Vulnerability Auditor
[3] Directory Bruteforce
[4] Subdomain Enumeration
[5] Network Scanner
━━━━━━━━━━━━━━━[ ATTACK TOOLS ]━━━━━━━━━━━━━━━━
[6] Advanced Stress Tester (Async)
[7] Reverse Shell Generator
[8] Auto-Exploit Module
━━━━━━━━━━━━━━━[ UTILITIES ]━━━━━━━━━━━━━━━━━━━
[S] Settings & Configuration
[R] View & Export Reports
[H] Help
[A] About HackerAI
[0] Exit Tool
Example Workflows
- Complete Security Assessment
1. Advanced Reconnaissance → Gather target information
2. Web Vulnerability Auditor → Scan for vulnerabilities
3. Auto-Exploit Module → Test exploitation
4. View Reports → Analyze findings
- Reverse Shell Generation
1. Navigate to Reverse Shell Generator
2. Configure LHOST/LPORT
3. Select shell type
4. Copy generated payload
5. Start listener
- Stress Testing (Authorized Only)
1. Navigate to Advanced Stress Tester
2. Enter target URL
3. Select attack type
4. Configure duration/concurrency
5. Start attack
🔧 Configuration
Edit config.py for Custom Settings:
# Network Settings
THREADS = 50 # Concurrent threads
TIMEOUT = 10 # Request timeout (seconds)
LHOST = "0.0.0.0" # Default listener IP
LPORT = 4444 # Default listener port
# Reporting
REPORT_FILE = "hackerai_scan_report.json"
# Colors (Customize UI)
R = "\033[31m" # Red
G = "\033[32m" # Green
Y = "\033[33m" # Yellow
B = "\033[34m" # Blue
C = "\033[36m" # Cyan
W = "\033[0m" # White
Proxy Configuration
Enable in Settings Menu:
- Proxy Rotation: ON
- Tor Network: ON/OFF
- Stealth Mode: ON
- Auto-refresh: ON
Custom Wordlists
Add custom wordlists to:
· wordlists/directory.txt - Directory bruteforce · wordlists/subdomains.txt - Subdomain enumeration · user_agents.txt - Additional user agents
📁 Project Structure
hackerai/
├── main.py # Entry point
├── config.py # Configuration & colors
├── menu.py # Interactive menu system
├── scanner.py # Advanced scanner module
├── reverse_shell.py # Reverse shell generator
├── auto_exploit.py # Auto exploitation engine
├── stress_tester.py # Advanced stress tester
├── proxy_manager.py # Proxy & anonymity manager
├── utils.py # Utility functions
├── requirements.txt # Dependencies
├── README.md # This file
├── reports/ # Generated reports
├── sessions/ # Session data
└── wordlists/ # Custom wordlists
🔐 Security Guidelines
✅ Authorized Testing Checklist
· Written permission obtained · Scope clearly defined · Legal compliance verified · Data backup completed · Emergency contacts listed · Testing window scheduled
⛔ Prohibited Activities
· Testing without explicit authorization · Targeting critical infrastructure · Data theft or destruction · Denial of Service on production systems · Privacy violation or harassment
🔒 Safe Testing Practices
- Use Lab Environments: Test in isolated networks
- Limit Impact: Use controlled, non-destructive techniques
- Document Everything: Ke
