The Hackfunc Project is a comprehensive suite of cybersecurity tools and libraries designed to empower security researchers, penetration testers, and bug bounty hunters. It automates essential tasks in:
- 🕵️♂️ Reconnaissance
- 🔍 Vulnerability Scanning
- 🔐 Cryptography
- 📊 Blockchain Analysis
- 🌐 Network Security
Each module is crafted for flexibility, allowing seamless integration into larger security frameworks or independent use.
- 🔐 Cryptography Module: Secure data encryption, key generation, and hashing algorithms (RSA, AES, HMAC).
- 📊 Blockchain Module: Smart contract vulnerability analysis and blockchain data interaction.
- 🌐 Infoga Module: Domain and subdomain information gathering (WHOIS, SSL, etc.).
- 🛡️ Vuln Module: Web application vulnerability scanning (SQL injection, XSS, CSRF).
- 🌍 Network Scans Module: Comprehensive network reconnaissance tools (Nmap, Masscan, traceroute).
The project is organized into modules, each targeting a specific cybersecurity domain:
hackfunc/
│
├── cryptography/ # Cryptographic functions (e.g., AES, RSA, HMAC)
│
├── blockchain/ # Blockchain analysis tools (e.g., smart contract analysis, etc.)
│
├── infoga/ # Information gathering (e.g., WHOIS, subdomain enumeration, etc.)
│
├── vuln/ # Vulnerability scanning (e.g., SQL injection, XSS, Command Injection, SSRF, etc.)
│
├── network_scans/ # Network scanning tools (e.g., Nmap, Masscan, traceroute, etc.)
│
└── utils/ # Utility functions (e.g., logging, argument parsing, etc.)
- Key generation, encryption, and decryption using algorithms like AES, RSA, and HMAC.
- Tools for auditing smart contracts and analyzing token transfers.
- Domain-related information gathering, including WHOIS and SSL details.
- Automated scans for web application vulnerabilities like SQL injection and XSS.
- Network scanning tools for port scanning, service enumeration, and diagnostics.
To get started with Hackfunc, follow these steps:
-
Clone the repository:
git clone https://github.com/yourusername/hackfunc.git cd hackfunc
-
Install dependencies:
pip install -r requirements.txt
-
Set up your environment:
- Ensure external tools (e.g., Nmap, Masscan) are installed.
- Set up necessary API keys or credentials for services like Shodan, Infoga.
Each module can be executed independently or integrated into other scripts. Here are some examples:
- Encrypting a file:
from hackfunc.cryptography import AdvancedCryptography crypto = AdvancedCryptography() crypto.encrypt_file('path/to/file.txt', key='your_secret_key')
- Analyze a smart contract:
from hackfunc.blockchain import BlockchainHacker hacker = BlockchainHacker() vulnerabilities = await hacker.analyze_smart_contract('0xContractAddress') print(vulnerabilities)
- Perform a WHOIS lookup:
import whois domain_info = whois.whois('example.com') print(domain_info)
- Scan for vulnerabilities:
from hackfunc.vuln import VulnerabilityScanner scanner = VulnerabilityScanner('http://example.com') scanner.sql_injection_check()
- Perform a Nmap scan:
from hackfunc.network_scans import nmap_scan results = nmap_scan('192.168.1.1', ['TCP_SYN_SCAN', 'SERVICE_VERSION_INTENSITY']) print(results)
- 🔑 API Key Management: Store keys securely using environment variables or configuration files.
⚠️ Error Handling: Implement error handling for network issues or API errors.- 🔄 Update Dependencies: Regularly update libraries and tools.
- ⚖️ Legal Compliance: Obtain permission before scanning or gathering information from external systems.
- This project is licensed under the MIT License - see the LICENSE file for details.