EthHackX is a Python-based framework designed to streamline common tasks in ethical hacking and penetration testing workflows. It provides an interactive command-line interface (CLI) to guide users through reconnaissance, scanning, basic exploitation, and reporting.
This tool is intended for educational and authorized security testing purposes ONLY. Using EthHackX against systems or networks without explicit permission from the owner is illegal and unethical. The author (AnonAmit) is not responsible for any misuse or damage caused by this tool. Always ensure you have proper authorization before performing any security testing.
-
Clone the repository:
git clone https://github.com/AnonAmit/EthHackX.git # Replace with your actual repo URL cd EthHackX
-
Create a virtual environment (recommended):
python -m venv venv source venv/bin/activate # On Windows use `venv\Scripts\activate`
-
Install Python dependencies:
pip install -r requirements.txt
-
Install Required External Tools: EthHackX relies on several external command-line tools. You MUST install these tools and ensure they are available in your system's PATH for the corresponding modules to function correctly.
- Reconnaissance:
nmap
: Network scanning (Required for Active Recon)subfinder
: Subdomain enumeration (Required for Passive Recon)whois
: WHOIS lookups (Optional, can use Python library as fallback)dig
/nslookup
: DNS lookups (Usually pre-installed)
- Scanning:
nikto
: Web server scannernuclei
: Vulnerability scannersslscan
: SSL/TLS scannerwpscan
: WordPress scanner (Requires Ruby and WPScan installation)
- Exploitation:
sqlmap
: SQL injection tool
Installation methods vary by operating system (e.g.,
apt
,yum
,brew
,pacman
, manual download). Please refer to the official documentation for each tool. - Reconnaissance:
Run the tool using:
python ethhackx.py
Follow the interactive prompts:
- Enter the target domain or IP address.
- Choose a module from the main menu (Recon, Scan, Exploit, Post-Exploit, Auto Attack, Utilities, Report).
- Follow the sub-menus within each module.
- Results are saved automatically in the
results/
directory. - Logs are saved in the
logs/
directory.
Headless Mode (Auto Attack Only):
To run the automated sequence non-interactively against a target:
python ethhackx.py --target <your_target> --headless
feel free to contribute
This project is licensed under the MIT License - see the LICENSE file for details.
ethhackx/
├── ethhackx.py # Main entry point
├── requirements.txt # Python dependencies
├── Project-TO-DO-List.txt # Development task list
├── README.md # This file
├── logs/ # Directory for log files
│ └── .gitkeep
├── reports/ # Directory for generated reports
│ └── .gitkeep
├── ethhackx/ # Main package directory
│ ├── __init__.py
│ ├── core/ # Core components (CLI, config, logging, etc.)
│ │ ├── __init__.py
│ │ ├── cli.py
│ │ ├── config.py
│ │ ├── executor.py
│ │ ├── logger.py
│ │ └── storage.py
│ ├── modules/ # Functional modules
│ │ ├── __init__.py
│ │ ├── auto.py
│ │ ├── exploit.py
│ │ ├── post_exploit.py
│ │ ├── recon.py
│ │ ├── report.py
│ │ ├── scan.py
│ │ └── utils_mod.py
│ └── utils/ # General utility functions
│ └── __init__.py
└── tests/ # Unit and integration tests (optional)
└── __init__.py