The Hackfunc Project is a comprehensive suite of cybersecurity tools and libraries designed to empower security researchers, penetration testers, and bug bounty hunters. It automates essential tasks in:
- 🕵️♂️ Reconnaissance
- 🔍 Vulnerability Scanning
- 🔐 Cryptography
- 📊 Blockchain Analysis
- 🌐 Network Security
Each module is crafted for flexibility, allowing seamless integration into larger security frameworks or independent use.
- 🔐 Cryptography Module: Secure data encryption, key generation, and hashing algorithms (RSA, AES, HMAC).
- 📊 Blockchain Module: Smart contract vulnerability analysis and blockchain data interaction.
- 🌐 Infoga Module: Domain and subdomain information gathering (WHOIS, SSL, etc.).
- 🛡️ Vuln Module: Web application vulnerability scanning (SQL injection, XSS, CSRF).
- 🌍 Network Scans Module: Comprehensive network reconnaissance tools (Nmap, Masscan, traceroute).
The project is organized into modules, each targeting a specific cybersecurity domain:
hackfunc/
│
├── cryptography/       # Cryptographic functions (e.g., AES, RSA, HMAC)
│
├── blockchain/         # Blockchain analysis tools (e.g., smart contract analysis, etc.)
│
├── infoga/             # Information gathering (e.g., WHOIS, subdomain enumeration, etc.)
│
├── vuln/               # Vulnerability scanning (e.g., SQL injection, XSS, Command Injection, SSRF, etc.)
│
├── network_scans/      # Network scanning tools (e.g., Nmap, Masscan, traceroute, etc.)
│
└── utils/              # Utility functions (e.g., logging, argument parsing, etc.)
- Key generation, encryption, and decryption using algorithms like AES, RSA, and HMAC.
- Tools for auditing smart contracts and analyzing token transfers.
- Domain-related information gathering, including WHOIS and SSL details.
- Automated scans for web application vulnerabilities like SQL injection and XSS.
- Network scanning tools for port scanning, service enumeration, and diagnostics.
To get started with Hackfunc, follow these steps:
- 
Clone the repository: git clone https://github.com/yourusername/hackfunc.git cd hackfunc
- 
Install dependencies: pip install -r requirements.txt 
- 
Set up your environment: - Ensure external tools (e.g., Nmap, Masscan) are installed.
- Set up necessary API keys or credentials for services like Shodan, Infoga.
 
Each module can be executed independently or integrated into other scripts. Here are some examples:
- Encrypting a file:
from hackfunc.cryptography import AdvancedCryptography crypto = AdvancedCryptography() crypto.encrypt_file('path/to/file.txt', key='your_secret_key') 
- Analyze a smart contract:
from hackfunc.blockchain import BlockchainHacker hacker = BlockchainHacker() vulnerabilities = await hacker.analyze_smart_contract('0xContractAddress') print(vulnerabilities) 
- Perform a WHOIS lookup:
import whois domain_info = whois.whois('example.com') print(domain_info) 
- Scan for vulnerabilities:
from hackfunc.vuln import VulnerabilityScanner scanner = VulnerabilityScanner('http://example.com') scanner.sql_injection_check() 
- Perform a Nmap scan:
from hackfunc.network_scans import nmap_scan results = nmap_scan('192.168.1.1', ['TCP_SYN_SCAN', 'SERVICE_VERSION_INTENSITY']) print(results) 
- 🔑 API Key Management: Store keys securely using environment variables or configuration files.
- ⚠️ Error Handling: Implement error handling for network issues or API errors.
- 🔄 Update Dependencies: Regularly update libraries and tools.
- ⚖️ Legal Compliance: Obtain permission before scanning or gathering information from external systems.
- This project is licensed under the MIT License - see the LICENSE file for details.