/plugin marketplace add AKCODEZ/hackingtool-plugin
/plugin install hackingtool@hackingtool-marketplace
Then point Claude at a target:
"recon example.com"
"hunt the username johndoe"
"scan my repo for vulnerabilies"
"crack my own wifi before my neighbor does"
Claude picks the tools. You read the output.
Every tool invocation goes through ht_run.py, which:
Picks a backend: native (Linux/macOS), WSL (Windows + real distro), or Docker (anywhere Docker Desktop runs).
Maps known tools to purpose-built Docker images β fast pulls, clean ENTRYPOINTs, no apt install dance:
Category
Images
Port scanning
instrumentisto/nmap, ilyaglow/masscan, rustscan/rustscan
Subdomain recon
projectdiscovery/subfinder, caffix/amass, projectdiscovery/httpx
Vuln scanning
projectdiscovery/nuclei, projectdiscovery/katana
OSINT
megadose/holehe, soxoj/maigret, spiderfoot/spiderfoot, secsi/theharvester
Secrets
trufflesecurity/trufflehog, zricethezav/gitleaks
Web attack
secsi/ffuf, devopsworks/gobuster, drwetter/testssl.sh, 0xsauby/wafw00f
SQL injection
paoloo/sqlmap
Active Directory
rflathers/impacket, byt3bl33d3r/netexec
Phishing recon
elceef/dnstwist
Fallback
kalilinux/kali-rolling (for anything not in the override map)
Runs the command, auto-retries with elevated privileges on permission errors (native/WSL), and surfaces the actual tool output as structured JSON.
The π’/π‘ icons in the inventory below are quick indicators of how the tool usually behaves β π’ for "plug-and-play" invocations, π‘ for tools whose behavior depends on the backend and environment (adapter hardware, sudo config, etc.). Either way, the skill runs it and tells you what happened.
Current breakdown: 56 π’ Β· 127 π‘ Β· 183 total .
The plugin picks a backend automatically via ht_env.py:
Host
Backend
Linux / macOS native
bash -lc <cmd>
Windows + real WSL distro (Ubuntu, Kali, etc.)
wsl -d <distro> -- bash -lc <cmd>
Windows + Docker Desktop
docker run --rm <image> <args>
Anywhere Docker is running
Docker backend (preferred when available)
Docker images in the override map are pulled on first use and cached. ht_run.py <tool_id> --install runs the install commands for native/WSL when you need the binary on the host itself.
Legend: π’ plug-and-play Β· π‘ depends on backend / environment
183 tools total β π’ 56 plug-and-play Β· π‘ 127 environment-dependent
π‘ Anonymously Hiding (2)
Tool
What it does
Claude
Flags
Anonymously Surf
It automatically overwrites the RAM when the system shuts down
π‘
sudo
Multitor
How to stay in multi places at the same time.
π‘
sudo
π Information Gathering (26)
Tool
What it does
Claude
Flags
Amass (Attack Surface Mapping)
In-depth subdomain enumeration and attack surface mapping.
π’
β
Breacher
An advanced multithreaded admin panel finder written in python.
π‘
interactive
Dracnmap
Open source program using nmap to exploit the network and gather information.
π‘
sudo
Find Info Using Shodan
Get ports, vulnerabilities, information, banners.
π‘
β
Gitleaks (Git Secret Scanner)
Fast secret scanner for git repos β detects hardcoded passwords, API keys, tokens.
π’
β
Holehe (Email β Social Accounts)
Check if an email address is registered on 120+ websites.
π’
β
Host to IP
Resolve hostname to IP.
π‘
interactive
httpx (HTTP Toolkit)
Fast multi-purpose HTTP probing tool.
π’
β
Infoga - Email OSINT
Gathers email account information (ip, hostname, country) from public sources.
π’
β
IsItDown (Check Website Down/Up)
Check Website Is Online or Not.
π‘
β
Maigret (Username OSINT)
Collect a dossier on a person by username across 3000+ sites.
π’
β
Masscan (Fast Port Scanner)
Fastest internet port scanner β 10 million packets/sec.
π‘
sudo
Network Map (nmap)
Free utility for network discovery and security auditing.
π‘
sudo
Port Scanner - rang3r
Python script for multi-threaded port scanning.
π‘
interactive
Port scanning
Basic port scan wrapper.
π‘
interactive
ReconDog
ReconDog Information Gathering Suite.
π‘
sudo
ReconSpider (For All Scanning)
Advanced OSINT Framework for IPs, Emails, Websites, Organizations.
π‘
sudo
RED HAWK (All In One Scanning)
All in one tool for Information Gathering and Vulnerability Scanning.
π’
β
RustScan (Modern Port Scanner)
Scans all 65k ports in 3 seconds, passes results to nmap automatically.
π‘
sudo
SecretFinder (like API & etc)
Python script for finding sensitive data like API keys.
π‘
sudo
SpiderFoot (OSINT Automation)
Automates OSINT collection for threat intelligence and attack surface mapping.
π’
β
Striker
Recon & Vulnerability Scanning Suite.
π‘
interactive
Subfinder (Subdomain Enumeration)
Fast passive subdomain enumeration using multiple sources.
π’
β
theHarvester (OSINT)
Gather emails, names, subdomains, IPs and URLs from public sources.
π’
β
TruffleHog (Secret Scanner)
Find, verify, and analyze leaked credentials across git repos, S3 buckets, filesystems.
π’
β
Xerosploit
Penetration testing toolkit to perform MITM attacks.
π‘
sudo
π Wordlist Generator (7)
πΆ Wireless Attack (13)
Tool
What it does
Claude
Flags
Airgeddon
Multi-use bash script for auditing wireless networks.
π‘
sudo hw
Bettercap
Swiss army knife for WiFi, BLE, HID, and Ethernet recon and MITM.
π‘
sudo hw
Bluetooth Honeypot (bluepot)
Bluetooth receiver honeypot.
π‘
sudo hw
EvilTwin
Evil Twin attack via fake page and fake Access Point.
π‘
sudo hw
Fastssh
Multi-threaded scan and brute force against SSH.
π‘
sudo hw
Fluxion
Remake of linset β automated MITM wifi attack.
π‘
interactive sudo hw
hcxdumptool
Capture packets and PMKID hashes from WLAN devices.
π‘
sudo hw
hcxtools
Convert captured WLAN packets to hashcat/JtR-compatible format.
π‘
sudo hw
Howmanypeople
Count people around you by monitoring wifi signals.
π‘
sudo hw
pixiewps
Brute force offline WPS pin (pixie-dust attack).
π‘
sudo hw long
WiFi-Pumpkin
Rogue AP framework for creating fake networks.
π‘
sudo hw
Wifiphisher
Rogue Access Point framework for red team engagements.
π‘
sudo hw
Wifite
Automated wireless attack tool.
π‘
sudo hw
Tool
What it does
Claude
Flags
Blisqy
Find time-based blind SQL injections on HTTP headers.
π‘
β
DSSS
Damn Small SQLi Scanner β GET and POST parameters.
π‘
β
Explo
Describe web security issues in human and machine readable format.
π‘
β
Leviathan
Mass audit toolkit β service discovery, brute force, SQLi detection.
π’
β
NoSqlMap
Audit and automate injection attacks on NoSQL databases.
π’
β
Sqlmap
Automate detection and exploitation of SQL injection flaws.
π‘
interactive
SQLScan
Quick web scanner to find SQL injection points.
π‘
sudo
π£ Phishing Attack (17)
Tool
What it does
Claude
Flags
AdvPhishing
Advance Phishing Tool β OTP phishing.
π‘
sudo
Autophisher
Automated Phishing Toolkit.
π‘
sudo
BlackEye
Phishing tool with 38 website templates.
π‘
sudo
BlackPhish
Phishing toolkit.
π‘
sudo
dnstwist
Domain name permutation engine β typosquatting and brand impersonation.
π’
β
Evilginx3
MITM attack framework for phishing login credentials.
π‘
sudo
HiddenEye
Modern phishing tool with multi-tunnelling.
π‘
sudo
I-See-You
Find the exact location of a target via social engineering.
π‘
sudo
Maskphish
Hide phishing URL under a normal looking URL.
π‘
sudo
Pyphisher
Easy to use phishing tool with 77 website templates.
π‘
sudo
QR Code Jacking
QR Code Jacking (Any Website).
π‘
sudo
QRLJacking
Session hijacking against QR-code-based login.
π‘
sudo
SayCheese
Grab webcam shots from target via malicious link.
π‘
sudo
Setoolkit
Social-Engineer Toolkit.
π‘
sudo
ShellPhish
Phishing tool for 18 social media.
π‘
sudo
SocialFish
Automated Phishing Tool & Information Collector.
π‘
sudo
Thanos
Browser to Browser Phishing toolkit.
π‘
sudo
Tool
What it does
Claude
Flags
Arjun
HTTP parameter discovery β finds hidden GET/POST parameters.
π’
β
Blazy
Modern login page bruteforcer (also clickjacking).
π‘
archived
Caido
Lightweight web security auditing toolkit β Burp alternative in Rust.
π‘
sudo
CheckURL
Detect evil URLs that use IDN Homograph Attack.
π’
β
Dirb
Web Content Scanner β existing and hidden Web Objects.
π‘
interactive sudo
Dirsearch
Web path brute-forcing β directories and files on web servers.
π’
β
Feroxbuster
Fast, recursive content discovery tool in Rust.
π‘
sudo long
ffuf
Fast web fuzzer β content, parameter, vhost discovery.
π’
long
Gobuster
Directory/file, DNS, and vhost brute-forcing in Go.
π’
β
Katana
Next-generation crawling and spidering framework.
π’
β
mitmproxy
Interactive TLS-capable intercepting HTTP proxy.
π’
β
Nikto
Scan web servers for dangerous files, outdated software, misconfig.
π‘
sudo
Nuclei
Fast, template-based vulnerability scanner used by 50k+ teams.
π’
β
OWASP ZAP
Full-featured web application security scanner.
π‘
sudo gui
Skipfish
Automated active web application security reconnaissance.
π‘
sudo
Sub-Domain TakeOver
Sub-domain takeover scanner.
π‘
β
Sublist3r
Enumerate subdomains of websites using OSINT.
π‘
sudo
testssl.sh
Check TLS/SSL ciphers, protocols, and cryptographic flaws.
π’
β
wafw00f
Fingerprint and identify Web Application Firewalls (WAF).
π’
β
Web2Attack
Web hacking framework with tools and exploits.
π‘
sudo
π§ Post Exploitation (10)
Tool
What it does
Claude
Flags
Chisel
Fast TCP/UDP tunnel over HTTP β pivoting and port forwarding.
π’
β
Chrome Keylogger
Hera Chrome Keylogger.
π‘
sudo
Evil-WinRM
Ultimate WinRM shell for Windows pentesting.
π’
β
Havoc
Modern post-exploitation C2 framework with EDR evasion.
π’
β
Ligolo-ng
Advanced tunneling/pivoting via TUN interfaces.
π’
β
Mythic
Collaborative multi-payload C2 platform for red team ops.
π‘
sudo
PEASS-ng (LinPEAS/WinPEAS)
Privilege escalation enumeration for Linux and Windows.
π’
β
pwncat-cs
Post-exploitation platform β manages reverse/bind shells.
π’
β
Sliver
Cross-platform adversary emulation / red team C2.
π‘
sudo
Vegile (Ghost In The Shell)
Set up backdoor/rootkits when a backdoor is already set up.
π‘
sudo
Tool
What it does
Claude
Flags
Autopsy
Forensic investigation platform.
π‘
sudo gui
Binwalk
Analyze, reverse engineer, and extract firmware images.
π’
β
Bulk extractor
Extract useful information without parsing the file system.
π‘
β
Guymager (Disk Clone / ISO)
Free forensic imager for media acquisition.
π‘
sudo
pspy
Monitor Linux processes without root β cron jobs, scheduled tasks.
π’
β
Toolsley
Ten-plus useful tools for investigation.
π‘
β
Volatility 3
World's most widely used memory forensics framework.
π‘
interactive
Wireshark
Network capture and analyzer.
π‘
sudo gui
π¦ Payload Creation (8)
Tool
What it does
Claude
Flags
Brutal
Toolkit for payloads, powershell attacks, HID attacks.
π‘
sudo
Enigma
Multiplatform payload dropper.
π‘
sudo
Mob-Droid
Generate metasploit payloads easily.
π‘
sudo
MSFvenom Payload Creator
Wrapper to generate multiple types of payloads.
π‘
sudo
Spycam
Win32 payload that captures webcam images every minute.
π’
β
Stitch
Cross Platform Python Remote Administrator Tool.
π‘
sudo
The FatRat
Backdoor/payload generation that can bypass most AV.
π‘
sudo
Venom Shellcode Generator
Exploits apache2 to deliver LAN payloads via fake webpages.
π‘
sudo
π§° Exploit Framework (3)
Tool
What it does
Claude
Flags
Commix
Automated OS command injection and exploitation tool.
π‘
interactive sudo
RouterSploit
Exploitation framework dedicated to embedded devices.
π‘
sudo
WebSploit
Advanced MITM framework.
π‘
sudo
π Reverse Engineering (5)
Tool
What it does
Claude
Flags
Androguard
Reverse engineering and malware analysis of Android apps.
π‘
sudo
Apk2Gold
CLI tool for decompiling Android apps to Java.
π‘
interactive sudo
Ghidra
NSA's software reverse engineering framework.
π‘
sudo gui
JadX
Dex to Java decompiler.
π‘
sudo
Radare2
Portable UNIX-like reverse engineering framework.
π’
β
Tool
What it does
Claude
Flags
Asyncrone (SYN Flood)
C-based multifunction SYN Flood weapon.
π‘
interactive sudo long
DDoS Script
DDoS attack script β 36+ methods.
π‘
interactive sudo long
GoldenEye
Python3 stress testing app.
π‘
interactive long
SaphyraDDoS
Python DDoS script.
π‘
interactive long
SlowLoris
HTTP Denial of Service attack.
π‘
interactive sudo long
UFOnet
P2P cryptographic disruptive toolkit for DoS/DDoS.
π‘
gui long
Tool
What it does
Claude
Flags
Pyshell
RAT with file upload/download.
π’
β
Tool
What it does
Claude
Flags
XSStrike
Python-based XSS detection and exploitation tool.
π‘
sudo
DalFox
XSS scanning and parameter analysis tool.
π‘
sudo
Extended XSS Searcher
Extended XSS searcher and finder.
π‘
interactive
RVuln
Multi-threaded web vulnerability scanner in Rust.
π‘
sudo
XanXSS
Reflected XSS searching tool with template-based payloads.
π‘
β
XSpear
XSS scanner built on Ruby Gems.
π’
β
XSS Payload Generator
XSS payload generator, scanner, and dork finder.
π‘
sudo
XSS-Freak
XSS scanner written in Python 3.
π‘
sudo
XSSCon
XSS scanner.
π‘
interactive sudo
Tool
What it does
Claude
Flags
SteganoHide
Hide/retrieve data in image or audio files.
π‘
interactive sudo
StegnoCracker
Brute force hidden data inside files.
π‘
interactive long
StegoCracker
Hide and retrieve data in image or audio files.
π‘
sudo
Whitespace
Steganography via whitespace and unicode.
π‘
sudo
π’ Active Directory (6)
Tool
What it does
Claude
Flags
BloodHound
Graph theory to reveal hidden attack paths in AD/Azure.
π‘
sudo
Certipy
Active Directory Certificate Services enumeration and abuse.
π’
β
Impacket
Python classes for SMB, MSRPC, Kerberos, LDAP.
π’
β
Kerbrute
Kerberos pre-auth brute-forcer β enumeration and spraying.
π’
β
NetExec (nxc)
Swiss army knife for Windows/AD pentesting β CrackMapExec successor.
π’
β
Responder
LLMNR/NBT-NS/MDNS poisoner for credential capture.
π‘
sudo
Tool
What it does
Claude
Flags
Pacu
AWS exploitation framework for offensive security testing.
π’
β
Prowler
Security tool for AWS, Azure, GCP, Kubernetes.
π’
β
ScoutSuite
Multi-cloud security auditing tool.
π’
β
Trivy
Vulnerability scanner for containers, Kubernetes, IaC.
π‘
sudo
Tool
What it does
Claude
Flags
Frida
Dynamic instrumentation toolkit for runtime hooking.
π’
β
MobSF
All-in-one mobile app pentesting and malware analysis.
π’
β
Objection
Runtime mobile exploration powered by Frida.
π’
β
Tool
What it does
Claude
Flags
HatCloud
Ruby tool to bypass CloudFlare and discover real IP.
π‘
interactive
Tool
What it does
Claude
Flags
DroidCam (Capture Image)
Grab front camera snap using a link.
π‘
sudo
EvilApp
Android App that hijacks authenticated sessions in cookies.
π’
β
Keydroid
Android Keylogger + Reverse Shell.
π’
β
Lockphish
Lock-screen phishing.
π’
β
MySMS
Android App that hacks SMS through WAN.
π’
β
Tool
What it does
Claude
Flags
Knockmail
Verify if an email exists.
π‘
sudo
Tool
What it does
Claude
Flags
Hash Buster
Hash cracking via public hash databases.
π’
β
Tool
What it does
Claude
Flags
EvilURL
Unicode evil domains for IDN Homograph Attack.
π’
β
Tool
What it does
Claude
Flags
Crivo
Extract and filter URLs, IPs, domains, and subdomains.
π‘
β
Terminal Multiplexer
Tilix β tiling terminal emulator.
π‘
sudo
π Payload Injection (2)
Tool
What it does
Claude
Flags
Debinject
Inject malicious code into *.debs.
π’
β
Pixload
Image Payload Creating tools.
π‘
sudo
π Social Media Finder (4)
Tool
What it does
Claude
Flags
Gospider
Fast web spider written in Go.
π‘
sudo
Tool
What it does
Claude
Flags
KawaiiDeauther
Pentest toolkit for wifi deauthentication.
π‘
sudo hw
WifiJammer-NG
Continuously jam all wifi clients and APs within range.
π‘
sudo hw
Refreshing the tool index
When upstream hackingtool adds tools, regenerate data/tools.json and the README table:
python ${CLAUDE_PLUGIN_ROOT}/scripts/ht_index.py --hackingtool-path /path/to/hackingtool
python ${CLAUDE_PLUGIN_ROOT}/scripts/build_readme_table.py > new_table.md
If hackingtool is a sibling directory of this repo, --hackingtool-path isn't needed β the script auto-detects.
hackingtool-plugin/
βββ .claude-plugin/
β βββ marketplace.json # marketplace entry
βββ images/ # screenshots + logo
βββ README.md # this file
βββ plugins/hackingtool/
βββ .claude-plugin/plugin.json
βββ data/tools.json # generated index
βββ scripts/
β βββ ht_index.py # (dev) regenerate tools.json
β βββ build_readme_table.py # (dev) regenerate the table above
β βββ ht_search.py # query index
β βββ ht_env.py # detect backend
β βββ ht_run.py # backend-aware tool runner
βββ skills/pentest/
βββ SKILL.md
βββ reference/
βββ workflows.md
βββ runtime-fallbacks.md
Python 3.10+ required.
No async tool streaming. Long-running tools block until they finish or timeout.
Docker backend pulls kalilinux/kali-rolling on first use.
Capability flags are heuristics. If you find a mis-tagged tool, fix it in data/tools.json or open an issue.
Upstream toolkit: Z4nzu/hackingtool β all tool metadata, categorization, and screenshots originate from this project.
Plugin wrapper: ariacodez (AKCodez on GitHub).
MIT. Upstream Z4nzu/hackingtool is also MIT-licensed.
For authorized security testing, bug bounty, CTFs, and research only.