CLI Tools

A collection of high-performance security & network tools.

SEC-SUITE - Advanced Security Testing Toolkit v2.0

A comprehensive, multi-functional security testing toolkit designed for security professionals, penetration testers, and educational purposes. SEC-SUITE combines powerful password cracking capabilities with essential security tools in an intuitive interface.

๐Ÿš€ Whatโ€™s New in v2.0

๐Ÿ“ฆ Installation

Prerequisites

Quick Setup

# Clone the repository
git clone https://github.com/gab-dev-7/sec-suite.git
cd sec-suite

# Install dependencies
pip install -r requirements.txt

# Run the interactive interface
python run.py

Manual Installation

# Install individual dependencies
pip install bcrypt>=3.2.0
pip install keyboard>=0.13.5
pip install scapy>=2.4.5
pip install argon2-cffi>=21.3.0

# Windows users may need:
pip install pywin32>=300

Start the user-friendly menu system:

python run.py

Or alternatively:

python main.py interactive

Interactive Features:

๐Ÿ› ๏ธ Command-Line Usage (Advanced Users)

Password Cracking Tools

Dictionary Attack

python main.py crack -t <target_hash> -a sha256 -m dictionary -w data/rockyou.txt --threads 8

Markov Chain Attack

python main.py crack -t <target_hash> -a md5 -m markov -w data/rockyou.txt --max-passwords 50000

Brute Force Attack

python main.py crack -t <target_hash> -a sha1 -m bruteforce --charset "luds" --min-length 4 --max-length 6

Rainbow Table Attack

python main.py crack -t <target_hash> -m rainbow --rainbow-table my_table.rt

Security Tools

Network Port Scanner

# Scan single host
python main.py scan -t 192.168.1.1 -p 1-1000 --threads 50

# Scan network range
python main.py scan -t 192.168.1.0/24 -p 22,80,443,3389

Advanced Keylogger

# Basic keylogging
python main.py keylog -o keystrokes.txt

# Stealth mode with window capture
python main.py keylog -s --capture-window -o keylog.txt

# Timed operation (5 minutes)
python main.py keylog -d 300 -o session.txt

Encoding/Decoding Tools

# Base64 encode
python main.py encode -d "hello world" -o encode -e base64

# URL decode
python main.py encode -d "hello%20world" -o decode -e url

# Hex encode
python main.py encode -d "secret" -o encode -e hex

# HTML encode
python main.py encode -d "<script>alert('xss')</script>" -o encode -e html

Password Analysis & Utilities

Password Strength Analysis

# Single password
python main.py analyze -p "MyPassword123!"

# Analyze password file
python main.py analyze -f passwords.txt

Password Hashing

# Hash a password
python main.py crack -p "mypassword" -a bcrypt

# Auto-detect hash type
python main.py crack -t "5e884898da28047151d0e56f8dc62927" -m dictionary

๐Ÿ”ง Tool Overview

Password Cracking Capabilities

1. Dictionary Attack

2. Markov Chain Attack

3. Brute Force Attack

4. Rainbow Table Attack

Supported Hash Algorithms

Algorithm Status Notes
MD5 โœ… Supported Fast but insecure
SHA-1 โœ… Supported Deprecated, use with caution
SHA-256 โœ… Supported Current standard
SHA-512 โœ… Supported High security
bcrypt โœ… Supported Modern, slow hashing
scrypt โœ… Supported Memory-hard function
argon2 โœ… Supported State-of-the-art

Security Tools

Network Scanner

Advanced Keylogger

Encoding/Decoding Utilities

๐Ÿ“ Project Structure

sec-suite/
โ”œโ”€โ”€ main.py                     # Main command-line interface
โ”œโ”€โ”€ run.py                      # Interactive mode launcher
โ”œโ”€โ”€ interactive_cli.py          # Interactive menu system
โ”œโ”€โ”€ cli.py                      # Legacy CLI interface
โ”œโ”€โ”€ requirements.txt            # Python dependencies
โ”‚
โ”œโ”€โ”€ attacks/                    # Password cracking modules
โ”‚   โ”œโ”€โ”€ dictionary.py           # Dictionary attack implementation
โ”‚   โ”œโ”€โ”€ markov.py               # Markov chain attack
โ”‚   โ”œโ”€โ”€ bruteforce.py           # Brute force attack
โ”‚   โ””โ”€โ”€ rainbow.py              # Rainbow table attack
โ”‚
โ”œโ”€โ”€ tools/                      # Security utilities
โ”‚   โ”œโ”€โ”€ keylogger.py            # Advanced keylogging
โ”‚   โ”œโ”€โ”€ network_scanner.py      # Port scanning
โ”‚   โ””โ”€โ”€ encoder.py              # Encoding/decoding
โ”‚
โ”œโ”€โ”€ utils/                      # Core utilities
โ”‚   โ”œโ”€โ”€ banner.py               # Application branding
โ”‚   โ”œโ”€โ”€ crypto.py               # Cryptographic functions
โ”‚   โ””โ”€โ”€ password_analyzer.py    # Strength analysis
โ”‚
โ”œโ”€โ”€ data/                       # Data files
โ”‚   โ””โ”€โ”€ rockyou.txt             # Example wordlist
โ”‚
โ””โ”€โ”€ docs/                       # Documentation
    โ””โ”€โ”€ examples/               # Usage examples

๐ŸŽฏ Advanced Usage Examples

Comprehensive Password Audit

# Step 1: Analyze password strength
python main.py analyze -f user_passwords.txt

# Step 2: Test against common hashes
python main.py crack -t "5d41402abc4b2a76b9719d911017c592" -m dictionary -w data/rockyou.txt

# Step 3: Brute force short passwords
python main.py crack -t "7c6a180b36896a0a8c02787eeafb0e4c" -m bruteforce --min-length 1 --max-length 4

Network Security Assessment

# Discover live hosts and open ports
python main.py scan -t 192.168.1.0/24 -p 21,22,23,80,443,3389

# Generate report of network services
python main.py scan -t 10.0.0.1-50 -p 1-1000 --threads 100

Password Hash Analysis

# Identify unknown hash types
python main.py crack -t "e10adc3949ba59abbe56e057f20f883e" -m dictionary

# Test multiple hash algorithms
for algo in md5 sha1 sha256 sha512; do
    python main.py crack -p "password123" -a $algo
done

โš™๏ธ Configuration

Custom Wordlists

Place your wordlist files in the data/ directory:

cp my_wordlist.txt data/
python main.py crack -t <hash> -m dictionary -w data/my_wordlist.txt

Thread Configuration

Adjust thread counts based on your system:

Logging

All operations are logged to sec-suite.log:

tail -f sec-suite.log  # Monitor real-time activity

โš ๏ธ IMPORTANT DISCLAIMER

SEC-SUITE is designed for:

โŒ PROHIBITED USES

Compliance Notice

Users are solely responsible for ensuring they have proper authorization before using these tools. The developers assume no liability for misuse of this software.

๐Ÿค Contributing

We welcome contributions! Please see our contributing guidelines:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Development Setup

git clone https://github.com/gab-dev-7/sec-suite.git
cd sec-suite
python -m venv venv
source venv/bin/activate  # Linux/Mac
# OR
venv\Scripts\activate    # Windows
pip install -r requirements.txt

๐Ÿ“ž Support


Remember: With great power comes great responsibility. Use SEC-SUITE ethically and legally! ๐Ÿ”

SEC-SUITE v2.0 - Advanced Security Testing Toolkit