Repository: LasCC/HackTools Branch: master Commit: 8a29a026bd3a Files: 49 Total size: 328.8 KB Directory structure: gitextract_xj8a5qaj/ ├── .babelrc ├── .gitignore ├── README.md ├── package.json ├── src/ │ ├── App.tsx │ ├── assets/ │ │ ├── css/ │ │ │ └── style.css │ │ ├── data/ │ │ │ ├── Encoder.json │ │ │ ├── Format.json │ │ │ ├── Payloads.json │ │ │ ├── Platform.json │ │ │ └── RevShell.json │ │ └── img/ │ │ └── icons/ │ │ └── iconfont.js │ ├── components/ │ │ ├── AboutUs.tsx │ │ ├── LayoutApp.tsx │ │ ├── encoding/ │ │ │ ├── DataEncoding.tsx │ │ │ ├── Hashing.tsx │ │ │ ├── HexEncode.tsx │ │ │ └── URLEncode.tsx │ │ ├── file_transfer/ │ │ │ ├── File_transfer.tsx │ │ │ └── ObfuscatedFiles.tsx │ │ ├── http_utils/ │ │ │ └── HTTP-Utils.tsx │ │ ├── linux/ │ │ │ ├── LinuxCommands.tsx │ │ │ ├── MSFBuilder.tsx │ │ │ ├── PowershellCommands.tsx │ │ │ ├── ReverseShell.tsx │ │ │ └── TtySpawnShell.tsx │ │ ├── notepad/ │ │ │ └── Notepad.tsx │ │ ├── rss/ │ │ │ ├── BugsCX.tsx │ │ │ ├── CVESearch.tsx │ │ │ ├── Cisco.tsx │ │ │ ├── CxsecurityChoose.tsx │ │ │ ├── DorksCX.tsx │ │ │ ├── ExploitCX.tsx │ │ │ ├── ExploitDB.tsx │ │ │ └── FeedRSS.tsx │ │ ├── types/ │ │ │ ├── EchoFileName.ts │ │ │ ├── Ipv4TcpCacheState.ts │ │ │ ├── MSFBuilder.ts │ │ │ └── ObfuscatedFile.ts │ │ └── web/ │ │ ├── LFI.tsx │ │ ├── PhpReverseShell.tsx │ │ ├── SqlInjection.tsx │ │ └── XSS.tsx │ ├── devtools/ │ │ ├── devtools.html │ │ └── devtools.js │ ├── index.html │ └── manifest.json ├── tsconfig.json └── webpack.config.js ================================================ FILE CONTENTS ================================================ ================================================ FILE: .babelrc ================================================ { "presets": [ [ "@babel/preset-env", { "modules": false } ], "@babel/preset-react" ], "plugins": [ "react-hot-loader/babel" ] } ================================================ FILE: .gitignore ================================================ /.git /node_modules /dist .DS_Store yarn.lock package-lock.json yarn-error.log .scannerwork .vscode .idea .github pnpm-lock.yaml bundle*.zip ================================================ FILE: README.md ================================================
--- >[!NOTE] >Psst... Loved HackTools? 👀 > >Check out [Penflow](https://github.com/rb-x/penflow) - our new security testing companion! >Try it at [map.penflow.sh](https://map.penflow.sh) 🚀 >[!NOTE] >Dear Users, > >We're excited to announce a major revamp of our app! Due to recent changes and multiple complications with the browser extension environment, we have decided to develop HackTools as a web application moving forward. > >To keep you engaged, we have uploaded our latest browser extension build alpha at this link: [https://hacktools.sh](https://hacktools.sh/) > >Stay tuned for exciting new features and improvements coming soon! > >Thank you for your support. --- ### The all-in-one browser extension for **offensive security professionals** HackTools, is a web extension facilitating your **web application penetration tests**, it includes **cheat sheets** as well as all the **tools** used during a test such as XSS payloads, Reverse shells and much more. With the extension you **no longer need to search for payloads in different websites** or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12. ### Current functions - Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat) - Shell Spawning (TTY Shell Spawning) - XSS Payloads - Basic SQLi payloads - Local file inclusion payloads (LFI) - Base64 Encoder / Decoder - Hash Generator (MD5, SHA1, SHA256, SHA512, SM3) - Useful Linux commands (Port Forwarding, SUID) - Various method of data exfiltration and download from a remote machine #### Command Palette With the new version of the extension, a command panel has been added in order to facilitate the use of the experience. The command panel allows you to access all the functions of the extension in a few keystrokes. To open the command palette, you can use the shortcut CTRL + K or ⌘ + K on macOS. - You can use the ↑ and ↓ arrow keys to navigate through the different commands. - Enter to validate your choice. - ⌘ + L to toggle the dark theme. - CTRL + ALT + 1,2,3,4 to switch between the different tabs. ## Preview
Then click on the **load unpacked** button in the top left corner
Once you clicked on the button you just need to select the **dist folder** and that's it ! 🎉
## Authors
👤 **Ludovic COULON** & **Riadh BOUCHAHOUA**
## Show your support
You can give a ⭐️ if this project helped you !
Note that this project is maintained, developed and made available for **free**, you can offer us a coffee, it will be very **encouraging and greatly appreciated** 😊
Cryptographic Hash Algorithm : {hashname}
{fileDownload}
{fileDownloadAsync}
{fileLessIEX}
{fileLessIEXPipe}
{InvokeWebRequest}
{iwr}
sudo impacket-smbserver share -smb2support /tmp/smb_share
{copyFromSmb}
sudo impacket-smbserver share -smb2support /tmp/smbshare -user johnDoe -password Sup3rP@ssw0rd!
{mountShareWithPasswords}
sudo pip3 install pyftpdlib
sudo python3 -m pyftpdlib --port 21
{DownloadFromFTP}
{scriptFTP}
sudo python3 -m pyftpdlib --port 21 --write
{powershellFTPUpload}
{scriptUploadFTP}