HackerCMD is a multi-functional command-line tool designed for ethical hackers, penetration testers, and cybersecurity enthusiasts. It supports a variety of features like network scanning, vulnerability scanning, DNS lookups, SSL certificate retrieval, banner grabbing, brute-forcing subdomains, password strength checking, and more.
Thanks to these amazing people:
--
- IP scanning
- Hash generation (supports multiple hashing algorithms)
- Password strength checking
- DNS lookups and reverse DNS
- Ping and traceroute tools
- WHOIS information retrieval
- Geolocation lookup for IP addresses
- Network information retrieval
- HTTP header fetching
- SSL certificate information
- Shodan search integration
- DNS brute-forcing subdomains
- Nmap port scanning
- FTP and SMTP banner grabbing
- Vulnerability scanning (XSS, SQL injection)
- Clone the repository:
git clone https://github.com/Hackers-Taskforce/HackerCMD.git cd HackerCMD
Install dependencies:
pip install -r requirements.txt
python hackercmd.py [command] [options]
-
scan - Scan IP for open ports
- Usage:
python hackercmd.py scan [IP] --ports [port1] [port2] ...
- Description: Scan a target IP for open ports.
- Example:
python hackercmd.py scan 192.168.1.1 --ports 80 443 22
- Usage:
-
hash - Generate a hash of the provided data
- Usage:
python hackercmd.py hash [data] --algorithm [hash_algorithm]
- Description: Generate a hash from the given data using a specified algorithm (default is SHA256).
- Example:
python hackercmd.py hash "hello world" --algorithm sha256
- Usage:
-
password - Check password strength
- Usage:
python hackercmd.py password [password]
- Description: Check the strength of a password (returns a score from 1 to 5).
- Example:
python hackercmd.py password "StrongPass123!"
- Usage:
-
dns - DNS lookup for a domain
- Usage:
python hackercmd.py dns [domain]
- Description: Get DNS 'A' records for a domain.
- Example:
python hackercmd.py dns example.com
- Usage:
-
reverse - Reverse DNS lookup
- Usage:
python hackercmd.py reverse [IP]
- Description: Perform a reverse DNS lookup on an IP address.
- Example:
python hackercmd.py reverse 8.8.8.8
- Usage:
-
ping - Ping an IP address
- Usage:
python hackercmd.py ping [IP]
- Description: Ping an IP address to check its reachability.
- Example:
python hackercmd.py ping 192.168.1.1
- Usage:
-
traceroute - Perform a traceroute to a target
- Usage:
python hackercmd.py traceroute [target]
- Description: Perform a traceroute to an IP or domain.
- Example:
python hackercmd.py traceroute example.com
- Usage:
-
whois - WHOIS lookup for a domain or IP
- Usage:
python hackercmd.py whois [domain_or_IP]
- Description: Retrieve WHOIS information for a domain or IP.
- Example:
python hackercmd.py whois example.com
- Usage:
-
geolocation - Get geolocation information for an IP address
- Usage:
python hackercmd.py geolocation [IP]
- Description: Retrieve geolocation information for an IP address.
- Example:
python hackercmd.py geolocation 8.8.8.8
- Usage:
-
network - Retrieve local network information
- Usage:
python hackercmd.py network
- Description: Display local network information such as IP configuration.
- Example:
python hackercmd.py network
- Usage:
-
headers - Fetch HTTP headers from a URL
- Usage:
python hackercmd.py headers [URL]
- Description: Retrieve HTTP response headers for a specified URL.
- Example:
python hackercmd.py headers http://example.com
- Usage:
-
ssl - Retrieve SSL certificate information for a domain
- Usage:
python hackercmd.py ssl [domain]
- Description: Retrieve SSL certificate details for a domain.
- Example:
python hackercmd.py ssl example.com
- Usage:
-
shodan - Search Shodan for devices or services
- Usage:
python hackercmd.py shodan [API_KEY] [query]
- Description: Use Shodan API to search for devices or services based on a query.
- Example:
python hackercmd.py shodan YOUR_API_KEY apache
- Usage:
-
dns_brute - Brute-force DNS subdomains using a wordlist
- Usage:
python hackercmd.py dns_brute [domain] [wordlist]
- Description: Brute-force subdomains for a domain using a wordlist.
- Example:
python hackercmd.py dns_brute example.com wordlist.txt
- Usage:
-
nmap - Run an Nmap scan on a target
- Usage:
python hackercmd.py nmap [target]
- Description: Perform an Nmap port scan on the given target (scans ports 1-1024).
- Example:
python hackercmd.py nmap 192.168.1.1
- Usage:
-
ftp_banner - Grab FTP banner from an IP address
- Usage:
python hackercmd.py ftp_banner [IP]
- Description: Grab the FTP banner from a given IP address.
- Example:
python hackercmd.py ftp_banner 192.168.1.1
- Usage:
-
smtp_banner - Grab SMTP banner from an IP address
- Usage:
python hackercmd.py smtp_banner [IP]
- Description: Grab the SMTP banner from a given IP address.
- Example:
python hackercmd.py smtp_banner 192.168.1.1
- Usage:
-
xss_scan - Scan a website for XSS vulnerabilities
- Usage:
python hackercmd.py xss_scan [URL]
- Description: Scan a website for potential XSS vulnerabilities.
- Example:
python hackercmd.py xss_scan http://example.com
- Usage:
-
sql_scan - Scan a website for SQL Injection vulnerabilities
- Usage:
python hackercmd.py sql_scan [URL]
- Description: Scan a website for potential SQL injection vulnerabilities.
- Example:
python hackercmd.py sql_scan http://example.com
- Usage:
-
-h Shows a list of the commands to use.
- Usage
python hackercmd.py -h
- Usage
-
base54 Encode and Decode
- Encode Usage
python hackercmd.py encode "hello world"
- Decode Usage
python hackercmd.py decode aGVsbG8gd29ybGQ=
- Decode Usage
- Encode Usage
- Python 3.x
- Dependencies listed in requirements.txt
requests
nmap
shodan
ftplib
smtplib
python-whois
dnsresolver
ipwhois
colorama
This tool is intended for ethical use only. Use it responsibly and ensure you have permission before scanning or interacting with any target. Unauthorized access or attacks on networks and systems are illegal and unethical.