A comprehensive cybersecurity toolkit designed for ethical security testing, penetration testing, and digital forensics. Built with β€οΈ by 516 Hackers community.
This toolkit is for authorized security testing only.
- You MUST have explicit permission to test any system
- Unauthorized use is illegal and unethical
- Users are solely responsible for their actions
- Educational purposes only
- Kali Linux (Recommended) or Termux (Android)
- Basic terminal knowledge
- Legal authorization for testing
Open a terminal and run:
- Clone the repo
git clone https://github.com/516hackers/cybertoolkit.git
cd cybertoolkit
- Make installer scripts executable
chmod +x scripts/*.sh
- Run the automated installer
./scripts/install-all.sh
This will install common tools and make the toolkit ready to use.
- Clone the repo:
git clone https://github.com/516hackers/cybertoolkit.git
cd cybertoolkit
- Make helper scripts executable:
chmod +x scripts/*.sh
chmod +x tools/**/*.sh
chmod +x tools/**/*.py
- Run the environment checker:
./scripts/check-env.sh

- Show list of available tools:
./scripts/list-tools.sh
- Quick access menu:
./scripts/tools-quick.sh
- Run a tool wrapper (example: whois):
./tools/reconnaissance/whois-wrapper.sh example.com
# Update system
sudo apt update && sudo apt upgrade -y
# Install core tools
sudo apt install -y whois nmap masscan nikto gobuster dirb john python3 python3-pip
# Install Python tools
pip3 install theharvester pdfplumber Pillow requests
# Update packages
pkg update && pkg upgrade -y
# Install core tools
pkg install -y whois nmap python
# Install Python tools
pip install theharvester pdfplumber Pillow requests
# Install Go if not present
sudo apt install golang-go # Kali
pkg install golang # Termux
# Install Go-based tools
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
go install github.com/ffuf/ffuf@latest
Tool | Description | Usage |
---|---|---|
WHOIS | Domain registration lookup | ./tools/reconnaissance/whois-wrapper.sh example.com |
Subfinder | Subdomain discovery | ./tools/reconnaissance/subfinder-wrapper.sh example.com |
theHarvester | OSINT email & subdomain gathering | ./tools/reconnaissance/theHarvester/run_theharvester.py -d example.com -b all |
Tool | Description | Usage |
---|---|---|
Nmap | Network discovery & security auditing | ./tools/network/nmap-wrapper.sh 192.168.1.1 quick |
Masscan | Mass port scanning | ./tools/network/masscan-wrapper.sh 192.168.1.0/24 1-1000 |
Tool | Description | Usage |
---|---|---|
Gobuster | Directory/file brute forcing | ./tools/web/gobuster-wrapper.sh dir http://example.com |
FFUF | Fast web fuzzer | ./tools/web/ffuf-wrapper.sh http://example.com/FUZZ wordlists/common.txt |
Nikto | Web server scanner | ./tools/vulnerability/nikto-wrapper.sh http://example.com |
Tool | Description | Usage |
---|---|---|
Nuclei | Template-based vulnerability scanning | ./tools/vulnerability/nuclei-wrapper.sh http://example.com |
Nikto | Comprehensive web server scan | ./tools/vulnerability/nikto-wrapper.sh http://example.com |
Tool | Description | Usage |
---|---|---|
John the Ripper | Password cracking | ./tools/password/john-wrapper.sh hashes.txt |
Tool | Description | Usage |
---|---|---|
Metadata Extractor | File metadata analysis | ./tools/analysis/metadata-extractor.py document.pdf |
OSINT Lookup | Multi-source intelligence gathering | ./tools/utils/osint_lookup.py example.com |
# Verify your environment
./scripts/check-env.sh
# Expected output:
# β
Platform: Kali Linux
# β
Tools: whois, nmap, nikto, python3
# β Missing: subfinder, nuclei (install with Go)
# Start with domain reconnaissance
./tools/reconnaissance/whois-wrapper.sh example.com
./tools/reconnaissance/subfinder-wrapper.sh example.com
./tools/reconnaissance/theHarvester/run_theharvester.py -d example.com -b google,bing
# Quick network scan
./tools/network/nmap-wrapper.sh 192.168.1.1 quick
# Comprehensive scan
./tools/network/nmap-wrapper.sh 192.168.1.1 full
# UDP scan
./tools/network/nmap-wrapper.sh 192.168.1.1 udp
# Directory brute forcing
./tools/web/gobuster-wrapper.sh dir http://example.com
# Vulnerability scanning
./tools/vulnerability/nikto-wrapper.sh http://example.com
./tools/vulnerability/nuclei-wrapper.sh http://example.com
# Extract metadata from files
./tools/analysis/metadata-extractor.py suspect_file.jpg -o report.json
# OSINT gathering
./tools/utils/osint_lookup.py target@example.com -t email -o osint_report.json
cybertoolkit/
βββ tools/ # All security tools
β βββ reconnaissance/ # Information gathering
β βββ network/ # Network scanning
β βββ web/ # Web application testing
β βββ vulnerability/ # Vulnerability assessment
β βββ password/ # Password security
β βββ analysis/ # Digital forensics
β βββ utils/ # Utility tools
βββ scripts/ # Installation & setup
βββ logs/ # Activity logs (gitignored)
βββ templates/ # Report templates
βββ tests/ # Test scripts
βββ docs/ # Documentation
- Automatic Logging: All activities logged with timestamps
- Legal Compliance: Built-in consent requirements
- Platform Detection: Automatic Kali/Termux support
- Error Handling: Comprehensive tool availability checks
- Ethical Focus: Educational and authorized use only
All tool activities are automatically logged:
# Logs are stored in logs/ directory
ls logs/
# whois_20231201_143022.log
# nmap_20231201_143125.log
# nikto_20231201_143230.log
cd docker
docker build -t cybertoolkit .
docker run -it --rm -v $(pwd):/workspace cybertoolkit
# Open in VS Code with Dev Containers extension
code .
# Reopen in container when prompted
We welcome ethical contributions! Please read our contributing guidelines:
- Fork the repository
- Create a feature branch
- Add your tool with proper documentation
- Test on both Kali and Termux
- Submit a pull request
Tool not found:
# Check installation
./scripts/check-env.sh
# Install missing tools
./scripts/install-all.sh
Permission denied:
chmod +x scripts/*.sh
chmod +x tools/**/*.sh
Python import errors:
pip3 install -r tools/reconnaissance/theHarvester/requirements.txt
Termux Limitations:
- Some tools may require root access
- GPU acceleration not available for hashcat
- Limited port scanning capabilities
Kali Linux:
- Run as root for some network operations
- Use
sudo
where required - Pre-installed tools available
This project is licensed under the MIT License - see the LICENSE.md file for details.
- 516 Hackers Community - For collaboration and testing
- Kali Linux Team - For the amazing penetration testing platform
- Termux Developers - For bringing Linux to Android
- Open Source Tools - All the amazing security tools we wrap
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Documentation: Docs
If you find this project useful, please give it a star! β
Remember: With great power comes great responsibility. Always hack ethically!
Built with β€οΈ by 516 Hackers - Promoting ethical security research worldwide