HackingTool: One Terminal Access to 185+ Penetration Testing Tools (50K+ Stars)
HackingTool is an open‑source all‑in‑one penetration‑testing toolbox that bundles over 185 security tools into a single interactive terminal menu, offering quick one‑command installation, Docker support, and categorized modules that streamline red‑team workflows.
What is HackingTool
HackingTool is an open‑source All‑in‑One penetration‑testing toolbox maintained by GitHub user Z4nzu. It does not implement its own tools; instead it wraps more than 185 mature security tools into an interactive terminal menu.
Installation is a single command:
curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bash. After installation, running hackingtool launches the menu.
Feature Modules
Information Gathering (26 tools)
Includes Nmap, theHarvester, Amass, Masscan, RustScan, SpiderFoot, plus TruffleHog and Gitleaks for scanning GitHub repositories.
Web Attacks (20 tools)
Includes Nuclei, ffuf, Feroxbuster, OWASP ZAP, Nikto, and mitmproxy.
Wireless Attacks (13 tools)
Includes WiFi‑Pumpkin, Fluxion, Wifiphisher, Wifite, Airgeddon, Bettercap.
Phishing (17 tools)
Includes Social Engineering Toolkit (SET), Evilginx3, SocialFish, HiddenEye; Evilginx3 can bypass many two‑factor authentication mechanisms.
SQL Injection (7 tools)
Includes sqlmap, NoSQLMap, DSSS, Leviathan.
Post‑Exploitation (10 tools)
Includes Vegile, pwncat‑cs, Sliver, Havoc, PEASS‑ng (LinPEAS/WinPEAS), Ligolo‑ng, Chisel, Evil‑WinRM.
Why Red Teams Like It
Four main reasons: (1) One‑command deployment saves setup time; (2) Clear classification into 20 categories with searchable menu, tag filtering, and recommendation mode; (3) Docker support for isolated environments; (4) Recent additions for AD domain penetration, cloud security, and mobile security reflect current threat trends.
Installation & Docker
Quick Install
# One‑click install
curl -sSL https://raw.githubusercontent.com/Z4nzu/hackingtool/master/install.sh | sudo bash
# Or manual
git clone https://github.com/Z4nzu/hackingtool.git
cd hackingtool
sudo python3 install.py
# Start
hackingtoolDocker Run
# Build
docker build -t hackingtool .
# Run
docker run -it --rm hackingtool
# Docker Compose
docker compose up -d
docker exec -it hackingtool bashRed‑Team Evaluation
Pros
Zero‑threshold deployment: one command installs the entire arsenal.
Broad tool coverage: 185+ tools span the full penetration‑testing lifecycle.
Clear categorization: 20 modules aligned with testing phases, easy for beginners.
Continuous updates: new AD, cloud, and mobile security modules.
Community validation: over 50 K stars on GitHub.
Cons
Tools are third‑party wrappers; version updates may lag.
Some dependencies require Python 3.10+, Go 1.21+, Ruby, etc.
Menu‑driven interface may limit depth for advanced users.
Certain features (wireless attacks, sniffing) need root privileges.
Conclusion
HackingTool does not create new exploits; it packages existing high‑quality tools into a unified framework, reducing deployment effort for security practitioners. For red teams, rapid provisioning on a fresh machine can noticeably shorten information‑gathering and vulnerability‑scanning phases. Beginners can use the menu to explore the security‑tool ecosystem, but the real value still lies in understanding the underlying methodologies.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Black & White Path
We are the beacon of the cyber world, a stepping stone on the road to security.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
