CLI Tools

A collection of high-performance security & network tools.

SEC-SUITE

SEC-SUITE is a comprehensive security toolkit designed for professionals, penetration testers, and educators. It unifies powerful password auditing capabilities with essential network reconnaissance tools in a single, modular interface.

Whether you prefer a CLI for ease of use or Raw Terminal Commands for automation, SEC-SUITE adapts to your workflow.


๐Ÿš€ Key Features

Category Capabilities
๐Ÿ” Password Attacks Markov Chain (Probabilistic), Brute Force (Configurable), Dictionary (Multi-threaded), Rainbow Table
โšก Performance Multi-threading across all modules, Smart Hash Auto-detection
๐Ÿ›ก๏ธ Modern Hashes Support for Argon2, Bcrypt, Scrypt, SHA-256/512, MD5, and more
๐Ÿ“ก Network Ops Multi-threaded Port Scanner, Service Discovery, CIDR support
๐Ÿ› ๏ธ Utilities Encoding/Decoding (Base64, Hex, URL, HTML), Password Strength Analyzer

๐Ÿ“– A Guide for Beginners

What is SEC-Suite?

SEC-Suite is a free, open-source tool for security testing. Itโ€™s a command-line interface (CLI) tool, which means you interact with it using text commands in a terminal. Think of it as a smart assistant for security tasks. Itโ€™s built in Python and is meant for ethical and educational use only.

Core Concepts Simplified


๐Ÿ“ฆ Quick Start

Prerequisites

Installation & Setup

  1. Clone the repository
git clone https://github.com/gab-dev-7/sec-suite.git
cd sec-suite
  1. Install dependencies
poetry install
  1. Activate the environment (Important!)
poetry shell

Note: This command enters the virtual environment. You can now run the commands below without poetry run.


If you are new to the tool or prefer a visual menu, start here:

python run.py

๐Ÿ› ๏ธ CLI Usage (Advanced)

(Ensure you have run poetry shell first)

1. Password Cracking

๐Ÿ“– Dictionary Attack

Traditional wordlist-based recovery. Automatically downloads rockyou.txt if missing.

python main.py crack -t <HASH> -a sha256 -m dictionary
๐Ÿง  Markov Chain Attack (New in v2.0)

Probabilistic generation using machine learning models trained on real password databases.

python main.py crack -t <HASH> -a md5 -m markov --max-passwords 50000
๐Ÿ”ข Brute Force

Exhaustive search with custom character sets (l=lower, u=upper, d=digits, s=special).

# Brute force a SHA1 hash, length 4-6, lowercase + digits
python main.py crack -t <HASH> -a sha1 -m bruteforce --charset "ld" --min-length 4 --max-length 6
๐ŸŒˆ Rainbow Table

Instant lookup using precomputed tables.

python main.py crack -t <HASH> -m rainbow --rainbow-table my_table.rt

2. Network Reconnaissance

# Scan a single IP
python main.py scan -t 192.168.1.5 -p 1-1000 --threads 50

# Scan a subnet (CIDR)
python main.py scan -t 192.168.1.0/24 -p 22,80,443

3. Utilities & Encoders

# Analyze password strength
python main.py analyze -p "Sup3rS3cr3t!"

# Base64 Encode
python main.py encode -d "hello world" -e base64 -o encode

# URL Decode
python main.py encode -d "hello%20world" -e url -o decode

โš™๏ธ Configuration

Project Structure

sec-suite/
โ”œโ”€โ”€ attacks/          # Modular attack implementations
โ”œโ”€โ”€ tools/            # Network scanner and Encoders
โ”œโ”€โ”€ utils/            # Core logic (Hash detection, Logging)
โ”œโ”€โ”€ data/             # Wordlists (auto-downloads rockyou.txt)
โ””โ”€โ”€ main.py           # CLI Entry point

Custom Wordlists

SEC-SUITE uses data/rockyou.txt by default. To use your own:

  1. Place the file in the data/ directory.
  2. Run with the -w flag:
python main.py crack ... -w data/my_custom_list.txt

Logging

All operations are logged to sec-suite.log. Use this for debugging or audit trails.

tail -f sec-suite.log

SEC-SUITE is strictly for educational purposes, authorized security research, and personal auditing.

The developers assume no liability and are not responsible for any misuse or damage caused by this program. By using SEC-SUITE, you agree to these terms.


๐Ÿค Contributing

We welcome contributions!

  1. Fork the repository.
  2. Create a feature branch (git checkout -b feature/AmazingFeature).
  3. Commit your changes (git commit -m 'Add AmazingFeature').
  4. Push to the branch (git push origin feature/AmazingFeature).
  5. Open a Pull Request.