Skip to main content

Prerequisites

Before starting, ensure you have:

HackingTool Installed

Follow the Installation Guide if you havenโ€™t installed HackingTool yet

Root Access

You must run HackingTool with sudo privileges

Launching HackingTool

1

Start HackingTool

Open your terminal and run:
sudo hackingtool
On first launch, youโ€™ll be prompted to set an installation path for tools. Choose option 2 for the default path /home/hackingtool/ or option 1 to specify a custom directory.
2

View the Main Menu

Youโ€™ll see the HackingTool ASCII logo and main menu:
   โ–„โ–ˆ    โ–ˆโ–„       โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ  โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ    โ–„โ–ˆ   โ–„โ–ˆโ–„  โ–„โ–ˆ  โ–ˆโ–ˆโ–ˆโ–„โ–„โ–„โ–„      โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„           โ–ˆโ–ˆโ–ˆ      โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„   โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„   โ–„โ–ˆ       
  โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ โ–„โ–ˆโ–ˆโ–ˆโ–€ โ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆโ–ˆโ–€โ–€โ–€โ–ˆโ–ˆโ–„   โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ      โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ       
  โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–€    โ–ˆโ–ˆโ–ˆโ–โ–ˆโ–ˆโ–€   โ–ˆโ–ˆโ–ˆโ–Œ โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ    โ–ˆโ–€          โ–€โ–ˆโ–ˆโ–ˆโ–€โ–€โ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ       
 โ–„โ–ˆโ–ˆโ–ˆโ–„โ–„โ–„โ–„โ–ˆโ–ˆโ–ˆโ–„โ–„   โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ         โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€    โ–ˆโ–ˆโ–ˆโ–Œ โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ  โ–„โ–ˆโ–ˆโ–ˆ                 โ–ˆโ–ˆโ–ˆ   โ–€ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ       
โ–€โ–€โ–ˆโ–ˆโ–ˆโ–€โ–€โ–€โ–€โ–ˆโ–ˆโ–ˆโ–€  โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ        โ–€โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„    โ–ˆโ–ˆโ–ˆโ–Œ โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ โ–€โ–€โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–ˆโ–„           โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ       
  โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–„    โ–ˆโ–ˆโ–ˆโ–โ–ˆโ–ˆโ–„   โ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ          โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ       
  โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ โ–€โ–ˆโ–ˆโ–ˆโ–„ โ–ˆโ–ˆโ–ˆ  โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ   โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ          โ–ˆโ–ˆโ–ˆ     โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆ    โ–ˆโ–ˆโ–ˆ โ–ˆโ–ˆโ–ˆโ–Œ    โ–„ 
  โ–ˆโ–ˆโ–ˆ    โ–ˆโ–€      โ–ˆโ–ˆโ–ˆ    โ–ˆโ–€  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€    โ–ˆโ–ˆโ–ˆ   โ–€โ–ˆโ–€ โ–ˆโ–€    โ–€โ–ˆ   โ–ˆโ–€    โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€          โ–„โ–ˆโ–ˆโ–ˆโ–ˆโ–€    โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€   โ–€โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–€  โ–ˆโ–ˆโ–ˆโ–ˆโ–ˆโ–„โ–„โ–ˆโ–ˆ 

 https://github.com/Z4nzu/hackingtool | Version 1.1.0
 Please Don't Use For illegal Activity

โ•ญโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ HackingTool โ€” Main Menu โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
โ”‚                                                               โ”‚
โ”‚     0  ๐Ÿ›ก๏ธ  Anonymously Hiding Tools                          โ”‚
โ”‚     1  ๐Ÿ”  Information gathering tools                        โ”‚
โ”‚     2  ๐Ÿ“š  Wordlist Generator                                 โ”‚
โ”‚     3  ๐Ÿ“ถ  Wireless attack tools                              โ”‚
โ”‚     4  ๐Ÿงฉ  SQL Injection Tools                                โ”‚
โ”‚     5  ๐ŸŽฃ  Phishing attack tools                              โ”‚
โ”‚     6  ๐ŸŒ  Web Attack tools                                   โ”‚
โ”‚     7  ๐Ÿ”ง  Post exploitation tools                            โ”‚
โ”‚     8  ๐Ÿ•ต๏ธ  Forensic tools                                     โ”‚
โ”‚     9  ๐Ÿ“ฆ  Payload creation tools                             โ”‚
โ”‚    10  ๐Ÿงฐ  Exploit framework                                  โ”‚
โ”‚    11  ๐Ÿ”  Reverse engineering tools                          โ”‚
โ”‚    12  โšก  DDOS Attack Tools                                   โ”‚
โ”‚    13  ๐Ÿ–ฅ๏ธ  Remote Administrator Tools (RAT)                   โ”‚
โ”‚    14  ๐Ÿ’ฅ  XSS Attack Tools                                    โ”‚
โ”‚    15  ๐Ÿ–ผ๏ธ  Steganograhy tools                                 โ”‚
โ”‚    16  โœจ  Other tools                                         โ”‚
โ”‚    99  โ™ป๏ธ  Update or Uninstall | Hackingtool                  โ”‚
โ”‚                                                               โ”‚
โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ

Choose number and press Enter โ€” 99 to exit

Understanding the Interface

HackingTool uses a rich terminal UI with color-coded categories:

Menu Navigation

Type a number (0-16 or 99) and press Enter

Category Icons

Each category has a unique emoji for quick identification

Interactive Prompts

Follow on-screen prompts to install and configure tools

Tool Categories Overview

HackingTool organizes 100+ security tools into 17 tool categories:
NumberCategoryIconExample Tools
0Anonymously Hiding Tools๐Ÿ›ก๏ธAnonsurf, Multitor
1Information Gathering๐Ÿ”Nmap, ReconSpider, Sherlock
2Wordlist Generator๐Ÿ“šCupp, WordlistCreator
3Wireless Attack๐Ÿ“ถWiFi-Pumpkin, Wifiphisher, Wifite
4SQL Injection๐ŸงฉSQLMap, NoSQLMap
5Phishing Attack๐ŸŽฃSET, SocialFish, HiddenEye
6Web Attack๐ŸŒSkipfish, Sublist3r, Dirb
7Post Exploitation๐Ÿ”งVegile, HeraKeylogger
8Forensic Tools๐Ÿ•ต๏ธAutopsy, Wireshark, Volatility
9Payload Creation๐Ÿ“ฆTheFatRat, MSFvenom, Venom
10Exploit Framework๐ŸงฐRouterSploit, WebSploit, Commix
11Reverse Engineering๐Ÿ”Androguard, Apk2Gold, JadX
12DDOS AttackโšกSlowLoris, UFOnet, GoldenEye
13RAT Tools๐Ÿ–ฅ๏ธStitch, Pyshell
14XSS Attack๐Ÿ’ฅXSStrike, DalFox, XSpear
15Steganography๐Ÿ–ผ๏ธSteganoHide, StegoCracker
16Other ToolsโœจSocial media finders, hash crackers

Installing Your First Tool

Letโ€™s walk through installing Nmap, a popular network scanning tool:
1

Select Information Gathering

From the main menu, type 1 and press Enter to access Information Gathering tools:
Choose a tool to proceed: 1
2

Browse Available Tools

Youโ€™ll see a submenu with all information gathering tools:
โ•ญโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€ Information gathering tools โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฎ
โ”‚                                                           โ”‚
โ”‚   0  Network Map (nmap)                                   โ”‚
โ”‚   1  Dracnmap                                             โ”‚
โ”‚   2  Port scanning                                        โ”‚
โ”‚   3  Host to IP                                           โ”‚
โ”‚   4  Xerosploit                                           โ”‚
โ”‚   5  RED HAWK (All In One Scanning)                       โ”‚
โ”‚   6  ReconSpider (For All Scanning)                       โ”‚
โ”‚   7  IsItDown (Check Website Down/Up)                     โ”‚
โ”‚   8  Infoga - Email OSINT                                 โ”‚
โ”‚   9  ReconDog                                             โ”‚
โ”‚  10  Striker                                              โ”‚
โ”‚  11  SecretFinder (like API & etc)                        โ”‚
โ”‚  12  Find Info Using Shodan                               โ”‚
โ”‚  13  Port Scanner - rang3r (Python 2.7)                   โ”‚
โ”‚  14  Port Scanner - Ranger Reloaded (Python 3+)           โ”‚
โ”‚  15  Breacher                                             โ”‚
โ”‚  99  Back to Main Menu                                    โ”‚
โ”‚                                                           โ”‚
โ•ฐโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ•ฏ
3

Select Nmap

Type 0 to select Nmap:
Choose a tool to proceed: 0
HackingTool will:
  1. Check if Nmap is already installed
  2. Download and install Nmap if needed
  3. Display installation status
Most tools are cloned from GitHub repositories and installed automatically with their dependencies.
4

Verify Installation

After installation, you can verify Nmap is working:
nmap --version
Expected output:
Nmap version 7.94 ( https://nmap.org )
Platform: x86_64-pc-linux-gnu
Compiled with: liblua-5.3.6 openssl-3.0.11

Running Your First Scan

Now that Nmap is installed, letโ€™s perform a basic network scan:
Legal Notice: Only scan networks and systems you own or have explicit permission to test. Unauthorized scanning is illegal.
1

Scan Your Local Network

Identify devices on your local network:
sudo nmap -sn 192.168.1.0/24
Example Output:
Starting Nmap 7.94 ( https://nmap.org )
Nmap scan report for 192.168.1.1
Host is up (0.0012s latency).
MAC Address: AA:BB:CC:DD:EE:FF (Router Manufacturer)

Nmap scan report for 192.168.1.100
Host is up (0.023s latency).
MAC Address: 11:22:33:44:55:66 (Device Manufacturer)

Nmap done: 256 IP addresses (12 hosts up) scanned in 3.45 seconds
2

Perform a Port Scan

Scan common ports on a specific host:
sudo nmap -sV 192.168.1.100
Example Output:
Starting Nmap 7.94 ( https://nmap.org )
Nmap scan report for 192.168.1.100
Host is up (0.00055s latency).
Not shown: 997 closed ports
PORT    STATE SERVICE VERSION
22/tcp  open  ssh     OpenSSH 8.9p1 Ubuntu 3ubuntu0.1
80/tcp  open  http    Apache httpd 2.4.52
443/tcp open  ssl/http Apache httpd 2.4.52

Service detection performed. Please report any incorrect results.
Nmap done: 1 IP address (1 host up) scanned in 6.78 seconds
3

Save Scan Results

Export results to a file for documentation:
sudo nmap -sV -oN scan_results.txt 192.168.1.100
This creates scan_results.txt with the full scan output.

Exploring More Tools

Information Gathering Tools

Try these popular tools from the collection:
Purpose: Comprehensive reconnaissance and information gatheringInstallation: Select category 1 โ†’ ReconSpider optionFeatures:
  • Domain/IP information
  • WHOIS lookup
  • DNS records
  • Subdomain enumeration
  • Port scanning
Purpose: Discover subdomains of a target domainInstallation: Select category 6 (Web Attack tools) โ†’ SubDomain FinderBasic Usage:
sublist3r -d example.com
Example Output:
[*] Enumerating subdomains for example.com
[+] www.example.com
[+] mail.example.com
[+] blog.example.com
[+] api.example.com
Total Unique Subdomains Found: 4

Return to Main Menu

Type 99 in any submenu to return to the main menu

Exit HackingTool

Type 99 from the main menu to exit the application

Confirm Actions

After installing a tool, youโ€™ll be asked: โ€œReturn to main menu? [Y/n]โ€

View Tool Info

Most tools display their GitHub repository and description before installation

Working Directory

All tools are installed to your configured path (default: /home/hackingtool/):
cd /home/hackingtool/
ls -la
Directory Structure:
/home/hackingtool/
โ”œโ”€โ”€ nmap/
โ”œโ”€โ”€ sherlock/
โ”œโ”€โ”€ sublist3r/
โ”œโ”€โ”€ recon-ng/
โ”œโ”€โ”€ sqlmap/
โ””โ”€โ”€ ...
You can change the tool installation directory by editing ~/hackingtoolpath.txt or deleting it to be prompted again on next launch.

Common Workflows

Workflow 1: Reconnaissance Phase

1

Enable Anonymity

Category 0 โ†’ Anonsurf
anonsurf start
2

Gather Target Information

Category 1 โ†’ Nmap, ReconDog, or RED HAWK for initial recon
3

Enumerate Subdomains

Category 6 โ†’ Sublist3r for subdomain discovery
4

Search for Vulnerabilities

Category 4 โ†’ SQLMap for SQL injection testing Category 14 โ†’ XSStrike for XSS vulnerabilities

Workflow 2: Password Testing

1

Generate Wordlist

Category 2 โ†’ Cupp (Common User Passwords Profiler)
cupp -i  # Interactive mode
2

Use Wordlist

Apply the generated wordlist to brute force tools in Category 16

Workflow 3: Wireless Security Testing

1

Monitor Mode

Enable monitor mode on your wireless adapter
2

Launch Wifite

Category 3 โ†’ Wifite for automated WiFi attacks
sudo wifite
3

Capture Handshakes

Wifite automatically captures WPA handshakes
4

Crack Passwords

Use captured handshakes with wordlists from Category 2

Troubleshooting

Problem: Git clone or installation errorsSolutions:
  1. Check internet connectivity: ping github.com
  2. Verify you have git installed: git --version
  3. Ensure sufficient disk space: df -h
  4. Try manually cloning: cd /home/hackingtool && git clone [tool-url]
Problem: Command not found after installationSolutions:
  1. Navigate to tool directory: cd /home/hackingtool/[tool-name]
  2. Run directly: python3 tool.py or ./tool.sh
  3. Check dependencies: pip3 install -r requirements.txt
  4. Verify permissions: chmod +x tool.sh
Problem: Cannot write to directories or execute toolsSolution: Always run HackingTool with sudo:
sudo hackingtool

Best Practices

Always Get Authorization

Only test systems you own or have written permission to assess

Document Everything

Keep logs of all scans and tests for reporting

Use Anonymity Tools

Enable Anonsurf or VPN before testing (where appropriate)

Stay Updated

Regularly update HackingTool (option 99) for latest tools

Test in Lab First

Practice on your own lab environment before real assessments

Understand Each Tool

Read tool documentation before use - donโ€™t run blind

Next Steps

Explore Categories

Deep dive into all 17 tool categories and their capabilities

Advanced Usage

Learn advanced techniques and troubleshooting tips

Tool References

Complete list of all 100+ integrated security tools

Join Community

Contribute to the project and suggest new tools
Ethical Use Only: HackingTool is intended for security professionals, researchers, and students learning cybersecurity. Always follow responsible disclosure practices and applicable laws.

Build docs developers (and LLMs) love