Skip to content

BitJacker/BadHand

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

19 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Bad Hand v2.5

The Swiss Army Knife for Security Auditing

Python Version License Platform

Bad Hand is a comprehensive modular Python-based framework designed for conducting penetration tests on local networks and web applications. With 30 powerful tools organized into an intuitive command-line interface, it automates common scanning and testing processes while maintaining precision and ease of use.


πŸš€ Toolkit Overview

The project includes 30 specialized tools organized into independent modules for maximum efficiency:

🌐 Network Analysis & Attack

Tool Description
scan.py Active host discovery and comprehensive network mapping
deauther.py Wi-Fi client deauthentication for wireless security testing
udp_attak.py Network stress testing via UDP flood attacks
port_scanner.py Nmap-like port scanning to identify open services

πŸ” Web Application Security

Tool Description
xss_scanner.py Detects Cross-Site Scripting (XSS) vulnerabilities in web forms
sqli_scanner.py Comprehensive SQL Injection vulnerability scanner
rce_test.py Tests for Remote Code Execution (RCE) vulnerabilities
clickjacking_test.py Identifies clickjacking attack vectors
header_check.py Analyzes HTTP security headers for misconfigurations
robots_analyzer.py Examines robots.txt for hidden paths and misconfigurations
param_miner.py Discovers hidden URL parameters for testing

πŸ•΅οΈ OSINT & Reconnaissance

Tool Description
subdomain_enum.py Advanced subdomain enumeration for target expansion
dns_lookup.py Comprehensive DNS record enumeration and analysis
whois_recon.py Gathers WHOIS information for domain intelligence
reverse_ip.py Reverse IP lookup to find domains on shared hosting
cms_detector.py Identifies Content Management Systems (WordPress, Joomla, etc.)
cloud_finder.py Discovers exposed cloud storage buckets (AWS, Azure, GCP)
wp_scan.py WordPress-specific vulnerability scanner
js_extractor.py Extracts and analyzes JavaScript files for sensitive data
api_discovery.py Maps and discovers hidden API endpoints

πŸ”“ Authentication & Brute Force

Tool Description
credential_stuffing.py Tests login endpoints against credential databases
ssh_brute.py SSH protocol brute force authentication testing
ftp_brute.py FTP server credential brute forcing
dir_bruteforce.py Directory and file discovery through brute forcing

πŸ›‘οΈ SSL/TLS & Security

Tool Description
ssl_checker.py Validates SSL/TLS certificates and cipher configurations

πŸ”§ Utilities & Analysis

Tool Description
hash_id.py Identifies hash types (MD5, SHA1, SHA256, etc.)
ip_geo.py IP address geolocation and ASN lookup
mail_spoof.py Tests email spoofing vulnerabilities (SPF, DMARC, DKIM)
honeypot_det.py Detects potential honeypot systems
sub_takeover.py Identifies subdomain takeover vulnerabilities

πŸ› οΈ Installation

Prerequisites

  • Operating System: Linux (Kali Linux, Parrot OS, or Ubuntu recommended)
  • Python: Version 3.8 or higher
  • Privileges: Root/sudo access required for network-level tools

Quick Start

  1. Clone the Repository

    git clone https://github.com/BitJacker/BadHand.git
    cd BadHand
  2. Install Dependencies

    pip install -r requirements.txt
  3. Verify Installation

    python3 badhand.py

πŸ”Œ Usage

Running the Framework

Standard Mode:

python3 badhand.py

With Elevated Privileges (required for network tools):

sudo python3 badhand.py

Interactive Menu

Bad Hand features an intuitive menu-driven interface:

  1. Select a tool by entering its number (1-30)
  2. Read the tool description
  3. Confirm execution
  4. Provide required parameters (target IP, URL, wordlist, etc.)
  5. View results in real-time

Example Workflows

Network Reconnaissance:

# 1. Run Bad Hand
sudo python3 badhand.py

# 2. Select tool [3] NETWORK SCAN
# 3. Enter target: 192.168.1.0/24
# 4. View discovered hosts and services

Web Vulnerability Assessment:

# 1. Select tool [4] XSS SCANNER
# 2. Enter target: https://example.com
# 3. Review discovered vulnerabilities

Subdomain Discovery:

# 1. Select tool [10] SUBDOMAIN ENUM
# 2. Enter domain: example.com
# 3. Provide wordlist: /usr/share/wordlists/subdomains.txt
# 4. Analyze discovered subdomains

πŸ“ Project Structure

BadHand/
β”œβ”€β”€ badhand.py              # Main framework (interactive menu UI)
β”œβ”€β”€ requirements.txt        # Python dependencies
β”œβ”€β”€ LICENSE.txt             # License information
β”œβ”€β”€ README.md               # Project documentation
└── tool/                   # Tool modules directory
    β”œβ”€β”€ api_discovery.py
    β”œβ”€β”€ clickjacking_test.py
    β”œβ”€β”€ cloud_finder.py
    β”œβ”€β”€ cms_detector.py
    β”œβ”€β”€ credential_stuffing.py
    β”œβ”€β”€ deauther.py
    β”œβ”€β”€ dir_bruteforce.py
    β”œβ”€β”€ dns_lookup.py
    β”œβ”€β”€ ftp_brute.py
    β”œβ”€β”€ hash_id.py
    β”œβ”€β”€ header_check.py
    β”œβ”€β”€ honeypot_det.py
    β”œβ”€β”€ ip_geo.py
    β”œβ”€β”€ js_extractor.py
    β”œβ”€β”€ mail_spoof.py
    β”œβ”€β”€ param_miner.py
    β”œβ”€β”€ port_scanner.py
    β”œβ”€β”€ rce_test.py
    β”œβ”€β”€ reverse_ip.py
    β”œβ”€β”€ robots_analyzer.py
    β”œβ”€β”€ scan.py
    β”œβ”€β”€ sqli_scanner.py
    β”œβ”€β”€ ssh_brute.py
    β”œβ”€β”€ ssl_checker.py
    β”œβ”€β”€ subdomain_enum.py
    β”œβ”€β”€ sub_takeover.py
    β”œβ”€β”€ udp_attak.py
    β”œβ”€β”€ whois_recon.py
    β”œβ”€β”€ wp_scan.py
    └── xss_scanner.py

🎯 Key Features

  • βœ… 30 Specialized Tools - Comprehensive security testing suite
  • βœ… Modular Architecture - Easy to maintain and extend
  • βœ… User-Friendly Interface - Intuitive menu-driven navigation
  • βœ… Detailed Descriptions - Each tool includes usage guidance
  • βœ… Safe Input Handling - Built-in input sanitization
  • βœ… Color-Coded Output - Enhanced readability
  • βœ… Error Handling - Graceful failure management
  • βœ… Cross-Tool Workflow - Seamless integration between modules

πŸ“‹ Requirements

The framework requires the following Python packages:

requests>=2.28.0
scapy>=2.5.0
beautifulsoup4>=4.11.0
dnspython>=2.3.0
python-whois>=0.8.0
paramiko>=3.0.0
ftplib (standard library)
hashlib (standard library)
ssl (standard library)

Additional system requirements:

  • libpcap-dev (for packet capture)
  • Wireless adapter with monitor mode support (for WiFi tools)
  • nmap (optional, for enhanced scanning)

πŸ”’ Security Best Practices

  1. Always obtain written authorization before testing any system
  2. Use in isolated environments (home lab, VMs) for practice
  3. Respect rate limits to avoid service disruption
  4. Document findings professionally in security reports
  5. Never store credentials or sensitive data discovered during tests
  6. Follow responsible disclosure when reporting vulnerabilities

⚠️ Legal Disclaimer

IMPORTANT: Bad Hand is designed exclusively for authorized security testing and educational purposes.

Unauthorized access to computer systems is illegal. Use of this framework against targets without prior written consent violates laws including but not limited to:

  • Computer Fraud and Abuse Act (CFAA) - United States
  • Computer Misuse Act - United Kingdom
  • Similar legislation in other jurisdictions

By using Bad Hand, you agree to:

  • Obtain proper authorization before conducting any security tests
  • Comply with all applicable local, state, federal, and international laws
  • Accept full responsibility for your actions

The developer (BitJacker) assumes NO LIABILITY for:

  • Misuse of this toolkit
  • Damage caused by unauthorized testing
  • Legal consequences resulting from improper use

Use at your own risk. Stay legal, stay ethical.


🀝 Contributing

Contributions are welcome! Here's how you can help:

Reporting Bugs

  • Open an issue with detailed reproduction steps
  • Include system information and error messages
  • Suggest potential fixes if possible

Adding Features

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/NewTool)
  3. Follow the existing code structure
  4. Add documentation for new tools
  5. Test thoroughly
  6. Submit a pull request

Code Standards

  • Follow PEP 8 style guidelines
  • Include docstrings for functions
  • Add error handling
  • Sanitize user inputs
  • Comment complex logic

πŸ“š Documentation & Resources

Recommended Learning Resources


πŸ† Credits

Bad Hand is developed and maintained by BitJacker.

Special Thanks

  • The open-source security community
  • Contributors and testers
  • Tool developers whose work inspired this project

πŸ“œ License

This project is licensed under the MIT License - see the LICENSE.txt file for details.


πŸ“ž Contact


πŸ”„ Version History

v2.5 (Current)

  • Expanded to 30 specialized tools
  • Enhanced menu interface
  • Improved error handling
  • Added tool categorization
  • Better input sanitization

v1.0 (Initial Release)

  • 10 core security tools
  • Basic menu system
  • Foundation framework

Made with ❀️ for the security community

Remember: With great power comes great responsibility

⭐ Star this repository if you find it useful!

About

BadHand is a suite of tools for network testing and cybersecurity. It includes features for DDoS attacks, port scanning, and deauthentication attacks, designed for security professionals and ethical hackers. Use this suite to test your network's robustness and identify potential vulnerabilities in connected devices.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages