Skip to content

MAHAKAL Framework πŸ”± is a professional-grade terminal-based cybersecurity suite built for recon, cracking, web auditing, and anonymity β€” combining tools like Nmap, SQLMap, Hashcat, and more into one powerful modular CLI shell.

License

Notifications You must be signed in to change notification settings

0warn/Mahakal-Framework

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

25 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ”± MAHAKAL FRAMEWORK πŸ”±

Badge


A powerful πŸ” cybersecurity terminal framework
Built for Hackers, Red Teamers, and Cyber Warriors πŸ’€

πŸ› οΈ Created By: 0warn


βš”οΈ Overview

MAHAKAL is a modular, interactive, and professional-grade Linux terminal framework designed to unify reconnaissance, vulnerability scanning, cracking, system auditing, and anonymity into a single command-line interface.

🎯 Ideal for:

  • 🧠 Ethical Hackers
  • πŸ•΅οΈ Red/Blue/Purple Teamers
  • πŸ”¬ Security Analysts
  • 🧰 Penetration Testers

✨ Key Features

Type Tools Integrated
🧠 AI Assistant Local AI CLI support (cd ai). You can install ai from the tool (HERE YOU CAN INSTALL AI USING intdeb OR intarch IN MAHAKAL SCRIPT)
🌐 Recon Tools nmap, whatweb, subfinder, dnsrecon, whois, shodan, etc.
πŸ’£ Web Scanners wpscan, nikto, ffuf, gobuster
πŸ”“ Cracking Tools hydra, john, hashcat, medusa
πŸ§ͺ Injection Tools sqlmap
⚑ Port Scanners masscan, unicornscan
πŸ›‘οΈ System Hardening ufw, fail2ban, inxi
πŸ•ΆοΈ Anonymity Setup Optional install: torctl, kali-anonsurf
πŸ“š Command Logger Logs saved to /var/log/mahakal.log

πŸš€ Installation

git clone https://github.com/0warn/Mahakal-Framework
cd Mahakal-Framework
chmod +x setup.sh
sudo ./setup.sh

🧩 During setup:

  • 🧠 Auto-detects your Linux distro

  • πŸ“¦ Installs all required tools

  • πŸ”§ Offers system-wide install (via /usr/local/bin)

  • πŸ•ΆοΈ Asks if you want to install:

    • torctl (for Arch-based)
    • kali-anonsurf (for Debian-based)

  • If you getting shodan not found error then for debian based distro install python3-shodan and for arch based distro install python-shodan.
  • One more thing before runt shodan commands you have to give it your api key. You can finde it on here -> shodan First signup if you have no account then go to account -> there you can see on Overview section -> API KEY just click on show and copy that. Then go to your terminal and type shodan init <paste your api key>. You fix your issue.
  • If you getting tgpt command not found errot then just install from mahakal -> cd ai -> Then for debian intdeb and for arch or arch based distro intarch.

πŸ’» Supported OS

Distro Status
Kali Linux βœ… Supported
Ubuntu / Debian βœ… Supported
Linux Mint βœ… Supported
Arch / Garuda / Athena os βœ… Supported
Parrot OS βœ… Supported

🧠 Using MAHAKAL

After install:

mahakal (If you install system wide)
  or
chmod +x mahakal.sh 
sudo ./mahakal.sh (For manual usecase)

You’ll be dropped into a futuristic hacker CLI. Use commands like:

cd nmap
ls
quick 192.168.1.1
cd ..
cd hashcat
ls

🟒 mip β€” Show public IP 🟒 cd toolname β€” Enter module 🟒 ls β€” See commands 🟒 help β€” Global guide πŸ”΄ exit β€” Quit framework


πŸ“ Modules Available

πŸ“ ai         - Chat with AI module ( INSTALL AI USING `intdeb` OR `intarch` USING SCRIPT)
πŸ“ nmap       - Network scanner
πŸ“ css        - Check system status
πŸ“ anony      - Anonymity controls
πŸ“ curl       - Curl use for recon purpose
πŸ“ whatweb    - Website tech fingerprinting
πŸ“ wpscan     - WordPress vulnerability scanner
πŸ“ wafw00f    - WAFW00F for web application firewall detection 
πŸ“ subfinder  - Subdomain enumeration
πŸ“ dnsrecon   - DNS recon
πŸ“ dnsenum    - DNS enum
πŸ“ httprobe   - HTTP probing tool
πŸ“ mip        - Show your public IP address
πŸ“ whois      - Perform a WHOIS lookup
πŸ“ amass      - Amass for DNS enumeration
πŸ“ hydra      - Login brute-forcer
πŸ“ medusa     - Parallel password bruteforcer
πŸ“ gobuster   - Directory brute-forcing
πŸ“ hashcat    - Hash cracking
πŸ“ john       - Password cracker
πŸ“ nikto      - Web server scanner
πŸ“ masscan    - High-speed port scanner
πŸ“ ffuf       - Fuzzing URLs
πŸ“ unic       - Unicornscan for network scanning
πŸ“ enumli     - Linux enumeration
πŸ“ sqlmap     - SQL Injection automation
πŸ“ ufw        - Uncomplicated firewall management
πŸ“ shodan     - Shodan for searching the internet

πŸ“¦ Log & History

  • πŸ“ Logs are saved to: /var/log/mahakal.log
  • πŸ“ Command history: /var/.mahakal_command_history

πŸ” Legal Disclaimer

MAHAKAL Framework is intended for educational and lawful penetration testing use only. The user is fully responsible for any misuse. Unauthorized attacks are illegal. By using this tool, you agree to use it only on systems you own or are authorized to test.


πŸ“œ License

MIT License β€” Free to use, modify, and distribute with credit.

🧠 Dev Notes

  • Developed entirely in Bash
  • Requires root/sudo for some operations
  • Terminal color-coded and interactive interface

image


πŸ•‰οΈ Jai Mahakal πŸ•‰οΈ

β€œThe destroyer of ignorance. The protector of truth.” This framework is built in the spirit of Lord Shiva β€” destroyer of evil, guardian of wisdom.


⚑ Built with ❀️ by 0warn ⚑
Indian Cybersecurity Engineer β€’ Red Team β€’ Blue Team β€’ Sanatani
[*] Can i get a star (⭐) & follow (πŸ””) for my work ?

About

MAHAKAL Framework πŸ”± is a professional-grade terminal-based cybersecurity suite built for recon, cracking, web auditing, and anonymity β€” combining tools like Nmap, SQLMap, Hashcat, and more into one powerful modular CLI shell.

Topics

Resources

License

Stars

Watchers

Forks

Languages