- Anonymously Hiding Tools
- Information gathering tools
- Wordlist Generator
- Wireless attack tools
- SQL Injection Tools
- Phishing attack tools
- Web Attack tools
- Post exploitation tools
- Forensic tools
- Payload creation tools
- Exploit framework
- Reverse engineering tools
- DDOS Attack Tools
- Remote Administrator Tools (RAT)
- XSS Attack Tools
- Steganograhy tools
- Other tools
- Network Map (nmap)
- Dracnmap
- Port scanning
- Host to IP
- Xerosploit
- RED HAWK (All In One Scanning)
- ReconSpider(For All Scanning)
- IsItDown (Check Website Down/Up)
- Infoga - Email OSINT
- ReconDog
- Striker
- SecretFinder (like API & etc)
- Find Info Using Shodan
- Port Scanner - rang3r (Python 2.7)
- Port Scanner - Ranger Reloaded (Python 3+)
- Breacher
- WiFi-Pumpkin
- pixiewps
- Bluetooth Honeypot GUI Framework
- Fluxion
- Wifiphisher
- Wifite
- EvilTwin
- Fastssh
- Howmanypeople
- Sqlmap tool
- NoSqlMap
- Damn Small SQLi Scanner
- Explo
- Blisqy - Exploit Time-based blind-SQL injection
- Leviathan - Wide Range Mass Audit Toolkit
- SQLScan
- Setoolkit
- SocialFish
- HiddenEye
- Evilginx2
- I-See_You(Get Location using phishing attack)
- SayCheese (Grab target's Webcam Shots)
- QR Code Jacking
- ShellPhish
- BlackPhish
- Web2Attack
- Skipfish
- SubDomain Finder
- CheckURL
- Blazy(Also Find ClickJacking)
- Sub-Domain TakeOver
- Dirb
- Autopsy
- Wireshark
- Bulk extractor
- Disk Clone and ISO Image Acquire
- Toolsley
- DalFox(Finder of XSS)
- XSS Payload Generator
- Extended XSS Searcher and Finder
- XSS-Freak
- XSpear
- XSSCon
- XanXSS
- Advanced XSS Detection Suite
- RVuln
- Cyclops
- SteganoHide
- StegnoCracker
- StegoCracker
- Whitespace
- Keydroid
- MySMS
- Lockphish (Grab target LOCK PIN)
- DroidCam (Capture Image)
- EvilApp (Hijack Session)
- HatCloud(Bypass CloudFlare for IP)
- Find SocialMedia By Facial Recognation System
- Find SocialMedia By UserName
- Sherlock
- SocialScan | Username or Email
git clone https://github.com/engineseller/hackingtool.git
chmod -R 755 hackingtool
cd hackingtool
sudo pip3 install -r requirements.txt
bash install.sh
sudo hackingtool
# Pull the latest images
docker compose pull
# Start the services (in detached mode)
docker compose up -d
# Stop the services
# docker compose down -v
- If need open other ports you can edit the docker-compose.yml file
- Volumes are mounted in the container to persist data and can share files between the host and the container