Bad Hand is a comprehensive modular Python-based framework designed for conducting penetration tests on local networks and web applications. With 30 powerful tools organized into an intuitive command-line interface, it automates common scanning and testing processes while maintaining precision and ease of use.
The project includes 30 specialized tools organized into independent modules for maximum efficiency:
| Tool | Description |
|---|---|
scan.py |
Active host discovery and comprehensive network mapping |
deauther.py |
Wi-Fi client deauthentication for wireless security testing |
udp_attak.py |
Network stress testing via UDP flood attacks |
port_scanner.py |
Nmap-like port scanning to identify open services |
| Tool | Description |
|---|---|
xss_scanner.py |
Detects Cross-Site Scripting (XSS) vulnerabilities in web forms |
sqli_scanner.py |
Comprehensive SQL Injection vulnerability scanner |
rce_test.py |
Tests for Remote Code Execution (RCE) vulnerabilities |
clickjacking_test.py |
Identifies clickjacking attack vectors |
header_check.py |
Analyzes HTTP security headers for misconfigurations |
robots_analyzer.py |
Examines robots.txt for hidden paths and misconfigurations |
param_miner.py |
Discovers hidden URL parameters for testing |
| Tool | Description |
|---|---|
subdomain_enum.py |
Advanced subdomain enumeration for target expansion |
dns_lookup.py |
Comprehensive DNS record enumeration and analysis |
whois_recon.py |
Gathers WHOIS information for domain intelligence |
reverse_ip.py |
Reverse IP lookup to find domains on shared hosting |
cms_detector.py |
Identifies Content Management Systems (WordPress, Joomla, etc.) |
cloud_finder.py |
Discovers exposed cloud storage buckets (AWS, Azure, GCP) |
wp_scan.py |
WordPress-specific vulnerability scanner |
js_extractor.py |
Extracts and analyzes JavaScript files for sensitive data |
api_discovery.py |
Maps and discovers hidden API endpoints |
| Tool | Description |
|---|---|
credential_stuffing.py |
Tests login endpoints against credential databases |
ssh_brute.py |
SSH protocol brute force authentication testing |
ftp_brute.py |
FTP server credential brute forcing |
dir_bruteforce.py |
Directory and file discovery through brute forcing |
| Tool | Description |
|---|---|
ssl_checker.py |
Validates SSL/TLS certificates and cipher configurations |
| Tool | Description |
|---|---|
hash_id.py |
Identifies hash types (MD5, SHA1, SHA256, etc.) |
ip_geo.py |
IP address geolocation and ASN lookup |
mail_spoof.py |
Tests email spoofing vulnerabilities (SPF, DMARC, DKIM) |
honeypot_det.py |
Detects potential honeypot systems |
sub_takeover.py |
Identifies subdomain takeover vulnerabilities |
- Operating System: Linux (Kali Linux, Parrot OS, or Ubuntu recommended)
- Python: Version 3.8 or higher
- Privileges: Root/sudo access required for network-level tools
-
Clone the Repository
git clone https://github.com/BitJacker/BadHand.git cd BadHand -
Install Dependencies
pip install -r requirements.txt
-
Verify Installation
python3 badhand.py
Standard Mode:
python3 badhand.pyWith Elevated Privileges (required for network tools):
sudo python3 badhand.pyBad Hand features an intuitive menu-driven interface:
- Select a tool by entering its number (1-30)
- Read the tool description
- Confirm execution
- Provide required parameters (target IP, URL, wordlist, etc.)
- View results in real-time
Network Reconnaissance:
# 1. Run Bad Hand
sudo python3 badhand.py
# 2. Select tool [3] NETWORK SCAN
# 3. Enter target: 192.168.1.0/24
# 4. View discovered hosts and servicesWeb Vulnerability Assessment:
# 1. Select tool [4] XSS SCANNER
# 2. Enter target: https://example.com
# 3. Review discovered vulnerabilitiesSubdomain Discovery:
# 1. Select tool [10] SUBDOMAIN ENUM
# 2. Enter domain: example.com
# 3. Provide wordlist: /usr/share/wordlists/subdomains.txt
# 4. Analyze discovered subdomainsBadHand/
βββ badhand.py # Main framework (interactive menu UI)
βββ requirements.txt # Python dependencies
βββ LICENSE.txt # License information
βββ README.md # Project documentation
βββ tool/ # Tool modules directory
βββ api_discovery.py
βββ clickjacking_test.py
βββ cloud_finder.py
βββ cms_detector.py
βββ credential_stuffing.py
βββ deauther.py
βββ dir_bruteforce.py
βββ dns_lookup.py
βββ ftp_brute.py
βββ hash_id.py
βββ header_check.py
βββ honeypot_det.py
βββ ip_geo.py
βββ js_extractor.py
βββ mail_spoof.py
βββ param_miner.py
βββ port_scanner.py
βββ rce_test.py
βββ reverse_ip.py
βββ robots_analyzer.py
βββ scan.py
βββ sqli_scanner.py
βββ ssh_brute.py
βββ ssl_checker.py
βββ subdomain_enum.py
βββ sub_takeover.py
βββ udp_attak.py
βββ whois_recon.py
βββ wp_scan.py
βββ xss_scanner.py
- β 30 Specialized Tools - Comprehensive security testing suite
- β Modular Architecture - Easy to maintain and extend
- β User-Friendly Interface - Intuitive menu-driven navigation
- β Detailed Descriptions - Each tool includes usage guidance
- β Safe Input Handling - Built-in input sanitization
- β Color-Coded Output - Enhanced readability
- β Error Handling - Graceful failure management
- β Cross-Tool Workflow - Seamless integration between modules
The framework requires the following Python packages:
requests>=2.28.0
scapy>=2.5.0
beautifulsoup4>=4.11.0
dnspython>=2.3.0
python-whois>=0.8.0
paramiko>=3.0.0
ftplib (standard library)
hashlib (standard library)
ssl (standard library)
Additional system requirements:
libpcap-dev(for packet capture)- Wireless adapter with monitor mode support (for WiFi tools)
nmap(optional, for enhanced scanning)
- Always obtain written authorization before testing any system
- Use in isolated environments (home lab, VMs) for practice
- Respect rate limits to avoid service disruption
- Document findings professionally in security reports
- Never store credentials or sensitive data discovered during tests
- Follow responsible disclosure when reporting vulnerabilities
IMPORTANT: Bad Hand is designed exclusively for authorized security testing and educational purposes.
Unauthorized access to computer systems is illegal. Use of this framework against targets without prior written consent violates laws including but not limited to:
- Computer Fraud and Abuse Act (CFAA) - United States
- Computer Misuse Act - United Kingdom
- Similar legislation in other jurisdictions
By using Bad Hand, you agree to:
- Obtain proper authorization before conducting any security tests
- Comply with all applicable local, state, federal, and international laws
- Accept full responsibility for your actions
The developer (BitJacker) assumes NO LIABILITY for:
- Misuse of this toolkit
- Damage caused by unauthorized testing
- Legal consequences resulting from improper use
Use at your own risk. Stay legal, stay ethical.
Contributions are welcome! Here's how you can help:
- Open an issue with detailed reproduction steps
- Include system information and error messages
- Suggest potential fixes if possible
- Fork the repository
- Create a feature branch (
git checkout -b feature/NewTool) - Follow the existing code structure
- Add documentation for new tools
- Test thoroughly
- Submit a pull request
- Follow PEP 8 style guidelines
- Include docstrings for functions
- Add error handling
- Sanitize user inputs
- Comment complex logic
- GitHub Repository: https://github.com/BitJacker/BadHand
- Issue Tracker: Report bugs and request features
- Wiki: Detailed tool documentation and tutorials (coming soon)
Bad Hand is developed and maintained by BitJacker.
- The open-source security community
- Contributors and testers
- Tool developers whose work inspired this project
This project is licensed under the MIT License - see the LICENSE.txt file for details.
- Developer: BitJacker
- GitHub: @BitJacker
- Issues: GitHub Issues
- Expanded to 30 specialized tools
- Enhanced menu interface
- Improved error handling
- Added tool categorization
- Better input sanitization
- 10 core security tools
- Basic menu system
- Foundation framework
Made with β€οΈ for the security community
Remember: With great power comes great responsibility
β Star this repository if you find it useful!