#red-teaming #hacking #crates-io #recon #port-scanning #reconnaissance #security #redteam

bin+lib hacktools

A suite library for Red Teams and Hacking consisting of functions for network scanning and web recon trying to get and see through security flaws and exploitation

6 releases (2 stable)

1.1.0 Nov 22, 2023
1.0.0 Jul 27, 2023
0.1.3 Jul 20, 2023

#1 in #hackers

Download history 7/week @ 2023-11-11 27/week @ 2023-11-18 20/week @ 2023-11-25 19/week @ 2023-12-02 6/week @ 2023-12-09 13/week @ 2023-12-23 1/week @ 2024-01-06 1/week @ 2024-01-20 13/week @ 2024-01-27 6/week @ 2024-02-03 21/week @ 2024-02-10 136/week @ 2024-02-17

176 downloads per month

MIT license

22KB
310 lines

hacktools

A crate for rust consisting of functions that can be used by red teamers and hackers alike.

Functions

At the moment there is little functions but more will be on the way.

The first is the "scan" function which is at the moment a system call that uses nmap to scan the port.

You can use in your code like:

use hacktools::nmap_scan;

fn main() {
  nmap_scan("IP", Port);
}
//It only scans one port at a time as to be quiter. I will work more on this though

The second is the "dirf" function which I have created to try to be like the popular kali command dirb.

You can use it like:

use hacktools::dirf;

fn main() {
  dirf("https://example.com", "wordlist.txt");
}

The get function is for you to use on something like a blocked docker container and other things.

It can be used like:

use hacktools::get;

fn main() {
  get("cat", &["/etc/passwd"])?;
  //using this function in the &[] use another comma and "" for each space in your command.
}

The next function is the "shell" command which can be used to generate and execute shellcode.

Will be used as:

use hacktools::{shell, tools::execute_shellcode}
fn main() {
  shell("string", execute_shellcode);
  //When ran execute_shellcode will ask you what file path to run on.
}

The scan function unlike the "nmap_scan" can scan a port without the nmap command and is blazingly fast. It has no version detection but will be useful to get ports in bulk.

You will use it like:

use hacktools::scan;
use std::time::Duration;
fn main() {
  scan("127.0.0.1", 80..81, Duration::new(5, 0));
}
//you can scan multiple by doing something like 0..255 but if you want only one port remember to do the port number .. one number after.
//To be helpful using the Colorized package I have added color red for closed green for open so your not stuck looking through all ports.

The function "press_scan" which is used to open a wordpress site and use common hidden urls for recon.

Will be used as:

use hacktools::press_scan;
fn main() {
  press_scan("https://wordpress.com", 0);
/* Options 0-8:
   "/wordpress/xmlrpc.php",
    "/wp-content/uploads/",
    "wp-json/wp/v2/users",
    "/wp-json/wp/v2/users/1",
    "/wp-json/?rest_route=/wp/v2/users/",
    "/wp-json/?rest_route=/wp/v2/users/1",
    "/?author=1",
    "/wp-login.php",
    "/wp-config.PhP"
*/
}

There is now also "forbid()". This allows you to check alternate pathways for a 403 forbidden.

This is the garbage port to rust from iamj0ker's very useful shell script.

You can use like:

use hacktools::forbid;
fn main() {
       forbid("http://example.com", "secret");
}

"Msf" is a fast way to use msfvenom for quick shellcode and exploits through metasploit.

Use case:

use hacktools::msf;
 fn main() -> Result<(), io::Error> {
     msf("exploit", "ip", port, "encode type", iterationTimes , "format", "Name of File");
     //format is for what it is etc: Rust, Python, C
     Ok(())
 }

The next we have is msflist() which can be used to list the encodings, and formats.

Usage:

use hacktools::msflist;
fn main -> Result<(), io::Error> {
  msflist("Encoders");
  Ok(())
}

Reminder

please remember that at this time this is very unfinished and I will be adding to this.

I know you all have ideas so please don't hesitate to tell me.

Dependencies

~27–44MB
~814K SLoC