Tactages Toolkit is a comprehensive suite of tools for network scanning, exploitation, traffic capture, brute force attacks, packet capture and filtering, network communication, password cracking, SQL injection testing, web server scanning, and web application security testing.
- Nmap: Network Scanning
- Metasploit Framework: Exploitation
- Wireshark: Traffic Capture
- Hydra: Brute Force
- Tshark: Packet Capture and Filtering
- Net-tools: Network Utilities
- Netcat: Network Communication
- John the Ripper: Password Cracking
- SQLMap: SQL Injection Testing
- Nikto: Web Server Scanning
- Burp Suite: Web Application Security Testing
Install the required Python packages using pip:
pip install -r requirements.txt
Run the install_tools.py
script to install tools for the toolkit via the command line:
python src/tactages.py
- Python 3.x
- Pip
- Tkinter (for GUI)
- ForMore
Please install the following tools manually:
- Nmap: Download
- Metasploit Framework: Download
- Wireshark: Download
- Hydra: Download
- Tshark: Download
- Net-tools: Download
- Netcat: Download
- John the Ripper: Download
- SQLMap: Download
- Nikto: Download
- Burp Suite: Download
Ensure that the tools are added to your system's PATH.
Install the required Python packages using pip:
pip install -r requirements.txt
Run the tactages.py
script to use the toolkit via the command line:
python src/tactages.py
If can't work properly
Run the main.py
script to use the toolkit via the command line:
python src/main.py
Run the Console.py
script to use the toolkit via the command line:
python src/Console.py
Run the GUI.py
script to use the toolkit via the graphical user interface:
python src/GUI.py
This project is licensed under the MIT License. See the LICENSE file for details.
Contributions are welcome! Please open an issue or submit a pull request for any improvements or bug fixes.
-
Nmap (Network Scanning)
Nmap is a network scanning tool used to discover devices and services on a network. It can be used to identify open ports, discover devices, and map networks. -
Metasploit (Exploitation)
Metasploit is a powerful framework for exploiting vulnerabilities in systems. It allows penetration testers to use known exploits against remote systems and validate security flaws. -
Wireshark (Traffic Capture)
Wireshark is a network protocol analyzer that captures and inspects network traffic in real time. It's used for network troubleshooting, protocol analysis, and security testing. -
Hydra (Brute Force)
Hydra is a fast network logon cracker that supports many protocols, including HTTP, FTP, and SSH. It's commonly used in brute-force attacks to break weak passwords. -
Utils (Packet Capture and Filtering)
A general term for tools that capture and filter packets on a network, such as tcpdump, which allows users to capture and analyze network traffic in real time. -
John the Ripper (Password Cracking)
John the Ripper is a password cracking software that is used to test the strength of passwords. It can crack password hashes in various formats. -
Netcat (Network Communication)
Netcat is a networking utility used for reading and writing data across network connections. It is used for debugging and testing network connections. -
SQLMap (SQL Injection Testing)
SQLMap is an automated tool for detecting and exploiting SQL injection flaws in web applications. It supports a wide range of databases and is used to perform database enumeration and take control of databases. -
Nikto (Web Server Scanning)
Nikto is a web server scanner that checks for various vulnerabilities in web servers, including outdated software, security misconfigurations, and known exploits. -
Burp Suite (Web Application Security Testing)
Burp Suite is a comprehensive platform for web application security testing. It includes tools for scanning web applications for vulnerabilities, such as SQL injection, cross-site scripting (XSS), and others. It is widely used for penetration testing of web applications.
-
OWASP ZAP (Zed Attack Proxy)
A tool for finding security vulnerabilities in web applications. It provides automated scanners and various tools to help penetration testers and security experts assess the security of web apps. -
Acunetix
An automated web application security scanner that detects and reports on a wide range of vulnerabilities including SQL injection, XSS, and more. -
Wapiti
A web application vulnerability scanner that allows you to audit the security of your web applications. It supports a wide range of vulnerabilities like file inclusion, SQL injection, and XSS.
We want to give a huge shoutout to everyone who has contributed to the project! Your hard work and dedication help make this repo better every day.
For More
Thank you all for your amazing contributions! Let's keep building together.
For any inquiries, please contact the project maintainer at Rohan.