Skip to content

HackMap — a local pentest mapping tool with real-time command execution, persistent history per target, visual attack paths, and one-click PDF reporting. Run on localhost only. No auth. Pure power.

License

Notifications You must be signed in to change notification settings

DotNetRussell/hackmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HackMap 🗺️

Visual attack graph + live command execution for red teamers

HackMap is a lightweight, local-first pentest mapping tool that combines an interactive Cytoscape graph with real-time shell command execution and persistent command history — all in one clean interface.

Features

  • Track multiple workspaces at once
  • Export graph data for easy backup and sharing
  • Interactive drag-and-drop attack graph
  • Visual connection paths (RDP, WinRM, SMB, etc.)
  • Per-node command execution with real-time streaming output
  • Command history persisted per target (with timestamps)
  • "Owned" flag with skull indicator
  • One-click PDF engagement report export
  • Very light weight, zero authentication by design
  • No dependencies beyond Python 3 + Flask

Screenshot

Easily generate network diagrams using nodes

HackMap in action HackMap in action HackMap in action

Each node has contextual notes as well as the ability to tie shell commands directly to the node for tracking

HackMap in action

Generate a report that dumps out all the raw node data for more organized report writing

HackMap in action

About

HackMap — a local pentest mapping tool with real-time command execution, persistent history per target, visual attack paths, and one-click PDF reporting. Run on localhost only. No auth. Pure power.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published