๐ Arsenal: A Collection of Hacking and Cybersecurity Tools Welcome to the Arsenal repository. This is a personal collection of custom-built tools and scripts developed for penetration testing, red teaming, and cybersecurity research. The goal of this project is to automate repetitive tasks, explore different attack vectors, and build a professional-grade toolkit that demonstrates a deep understanding of offensive security principles.
All tools in this repository are intended for educational purposes only and must be used in a legal and ethical manner with explicit, written permission from the asset owner.
๐ ๏ธ Tools Here is a list of the current tools available in this repository, each with its own purpose and documentation.
- ECHO: Subdomain Enumeration Tool Description: A highly efficient and customizable subdomain enumeration tool. It leverages asynchronous I/O to perform rapid dictionary-based scans and identifies live subdomains, providing a crucial first step in any web application penetration test.
Location: ECHO_SUBDOMAIN_FINDER/
Usage Example:
python3 ECHO_SUBDOMAIN_FINDER/goat_tool.py -d ecorp.local
python3 ECHO_SUBDOMAIN_FINDER/goat_tool.py -df targets.txt -c 100
python3 ECHO_SUBDOMAIN_FINDER/goat_tool.py -d ecorp.local -o results/ecorp_subs.txt
๐ Getting Started To get these tools running on your machine, follow these simple steps.
Clone the Repository:
git clone https://github.com/snehil00121/Arsenal.git cd Arsenal
Install Dependencies: Each tool has its own dependencies. The primary ones are listed in the requirements.txt file.
pip3 install -r requirements.txt --break-system-packages
Explore the Tools: Navigate to each tool's folder to find specific instructions and documentation.
๐จโ๐ป Created by Mr0x00 This repository is maintained and developed by Mr0x00. All tools are a reflection of my learning and practical experience in offensive security. Feel free to explore, learn, and adapt these tools for your own ethical hacking journey.