SEC-SUITE - Advanced Security Testing Toolkit v2.0
A comprehensive, multi-functional security testing toolkit designed for security professionals, penetration testers, and educational purposes. SEC-SUITE combines powerful password cracking capabilities with essential security tools in an intuitive interface.
๐ Whatโs New in v2.0
- Markov Chain Password Attacks - Advanced probabilistic password generation
- Brute Force Attacks - Configurable character sets and length ranges
- Modern Hash Support - bcrypt, scrypt, argon2 with proper salt handling
- Multi-threading - Dramatic performance improvements across all attacks
- Network Security Tools - Port scanner and network reconnaissance
- Advanced Keylogger - Stealth operation with window context capture
- Encoding Utilities - Multiple encoding/decoding schemes
- Interactive CLI - User-friendly menu-driven interface
- Hash Auto-detection - Smart hash type identification
- Professional Logging - Comprehensive activity tracking
๐ฆ Installation
Prerequisites
- Python 3.8 or higher
- pip (Python package manager)
Quick Setup
# Clone the repository
git clone https://github.com/gab-dev-7/sec-suite.git
cd sec-suite
# Install dependencies
pip install -r requirements.txt
# Run the interactive interface
python run.py
Manual Installation
# Install individual dependencies
pip install bcrypt>=3.2.0
pip install keyboard>=0.13.5
pip install scapy>=2.4.5
pip install argon2-cffi>=21.3.0
# Windows users may need:
pip install pywin32>=300
๐ฎ Interactive Interface (Recommended for Beginners)
Start the user-friendly menu system:
python run.py
Or alternatively:
python main.py interactive
Interactive Features:
- Number-based navigation - Simply type numbers to select options
- Clear menu hierarchy - Organized categories with breadcrumb navigation
- Input validation - Handles invalid inputs gracefully
- Visual feedback - Emojis, headers, and formatted output
- Back/Exit at every level - Never get stuck in menus
- Progress indicators - Real-time operation status
๐ ๏ธ Command-Line Usage (Advanced Users)
Password Cracking Tools
Dictionary Attack
python main.py crack -t <target_hash> -a sha256 -m dictionary -w data/rockyou.txt --threads 8
Markov Chain Attack
python main.py crack -t <target_hash> -a md5 -m markov -w data/rockyou.txt --max-passwords 50000
Brute Force Attack
python main.py crack -t <target_hash> -a sha1 -m bruteforce --charset "luds" --min-length 4 --max-length 6
Rainbow Table Attack
python main.py crack -t <target_hash> -m rainbow --rainbow-table my_table.rt
Security Tools
Network Port Scanner
# Scan single host
python main.py scan -t 192.168.1.1 -p 1-1000 --threads 50
# Scan network range
python main.py scan -t 192.168.1.0/24 -p 22,80,443,3389
Advanced Keylogger
# Basic keylogging
python main.py keylog -o keystrokes.txt
# Stealth mode with window capture
python main.py keylog -s --capture-window -o keylog.txt
# Timed operation (5 minutes)
python main.py keylog -d 300 -o session.txt
Encoding/Decoding Tools
# Base64 encode
python main.py encode -d "hello world" -o encode -e base64
# URL decode
python main.py encode -d "hello%20world" -o decode -e url
# Hex encode
python main.py encode -d "secret" -o encode -e hex
# HTML encode
python main.py encode -d "<script>alert('xss')</script>" -o encode -e html
Password Analysis & Utilities
Password Strength Analysis
# Single password
python main.py analyze -p "MyPassword123!"
# Analyze password file
python main.py analyze -f passwords.txt
Password Hashing
# Hash a password
python main.py crack -p "mypassword" -a bcrypt
# Auto-detect hash type
python main.py crack -t "5e884898da28047151d0e56f8dc62927" -m dictionary
๐ง Tool Overview
Password Cracking Capabilities
1. Dictionary Attack
- Description: Traditional wordlist-based password recovery
- Features:
- Multi-threaded processing
- Support for large wordlists
- Progress tracking
- Custom wordlist support
- Best For: Common passwords, dictionary words
2. Markov Chain Attack
- Description: Probability-based password generation using machine learning
- Features:
- Trains on real password databases
- Generates realistic password candidates
- Configurable generation limits
- Multi-threaded execution
- Best For: Pattern-based passwords, human-generated passwords
3. Brute Force Attack
- Description: Exhaustive character combination testing
- Features:
- Configurable character sets:
l- lowercase lettersu- uppercase lettersd- digitss- special characters
- Custom length ranges
- Progress estimation
- Early termination on success
- Configurable character sets:
- Best For: Short passwords, known character sets
4. Rainbow Table Attack
- Description: Precomputed hash lookup tables
- Features:
- Instant password recovery for known hashes
- Support for custom rainbow tables
- Multiple table formats
- Best For: Fast recovery of common hashes
Supported Hash Algorithms
| Algorithm | Status | Notes |
|---|---|---|
| MD5 | โ Supported | Fast but insecure |
| SHA-1 | โ Supported | Deprecated, use with caution |
| SHA-256 | โ Supported | Current standard |
| SHA-512 | โ Supported | High security |
| bcrypt | โ Supported | Modern, slow hashing |
| scrypt | โ Supported | Memory-hard function |
| argon2 | โ Supported | State-of-the-art |
Security Tools
Network Scanner
- Multi-threaded port scanning
- CIDR notation support
- Custom port ranges
- Host discovery
- Service detection
Advanced Keylogger
- Keystroke logging with timestamps
- Window title capture
- Stealth mode operation
- Timed execution
- Ethical usage warnings
Encoding/Decoding Utilities
- Base64 encoding/decoding
- URL encoding/decoding
- HTML entity encoding/decoding
- Hexadecimal encoding/decoding
๐ Project Structure
sec-suite/
โโโ main.py # Main command-line interface
โโโ run.py # Interactive mode launcher
โโโ interactive_cli.py # Interactive menu system
โโโ cli.py # Legacy CLI interface
โโโ requirements.txt # Python dependencies
โ
โโโ attacks/ # Password cracking modules
โ โโโ dictionary.py # Dictionary attack implementation
โ โโโ markov.py # Markov chain attack
โ โโโ bruteforce.py # Brute force attack
โ โโโ rainbow.py # Rainbow table attack
โ
โโโ tools/ # Security utilities
โ โโโ keylogger.py # Advanced keylogging
โ โโโ network_scanner.py # Port scanning
โ โโโ encoder.py # Encoding/decoding
โ
โโโ utils/ # Core utilities
โ โโโ banner.py # Application branding
โ โโโ crypto.py # Cryptographic functions
โ โโโ password_analyzer.py # Strength analysis
โ
โโโ data/ # Data files
โ โโโ rockyou.txt # Example wordlist
โ
โโโ docs/ # Documentation
โโโ examples/ # Usage examples
๐ฏ Advanced Usage Examples
Comprehensive Password Audit
# Step 1: Analyze password strength
python main.py analyze -f user_passwords.txt
# Step 2: Test against common hashes
python main.py crack -t "5d41402abc4b2a76b9719d911017c592" -m dictionary -w data/rockyou.txt
# Step 3: Brute force short passwords
python main.py crack -t "7c6a180b36896a0a8c02787eeafb0e4c" -m bruteforce --min-length 1 --max-length 4
Network Security Assessment
# Discover live hosts and open ports
python main.py scan -t 192.168.1.0/24 -p 21,22,23,80,443,3389
# Generate report of network services
python main.py scan -t 10.0.0.1-50 -p 1-1000 --threads 100
Password Hash Analysis
# Identify unknown hash types
python main.py crack -t "e10adc3949ba59abbe56e057f20f883e" -m dictionary
# Test multiple hash algorithms
for algo in md5 sha1 sha256 sha512; do
python main.py crack -p "password123" -a $algo
done
โ๏ธ Configuration
Custom Wordlists
Place your wordlist files in the data/ directory:
cp my_wordlist.txt data/
python main.py crack -t <hash> -m dictionary -w data/my_wordlist.txt
Thread Configuration
Adjust thread counts based on your system:
- Dictionary attacks: 4-8 threads
- Brute force: 2-4 threads per length
- Network scanning: 50-100 threads
- Markov attacks: 4-8 threads
Logging
All operations are logged to sec-suite.log:
tail -f sec-suite.log # Monitor real-time activity
๐ Legal & Ethical Usage
โ ๏ธ IMPORTANT DISCLAIMER
SEC-SUITE is designed for:
- โ Educational purposes and security research
- โ Authorized penetration testing
- โ Personal security auditing (your own systems)
- โ Academic research and learning
โ PROHIBITED USES
- Unauthorized testing of systems you donโt own
- Malicious hacking activities
- Password cracking without explicit permission
- Any illegal cybersecurity activities
Compliance Notice
Users are solely responsible for ensuring they have proper authorization before using these tools. The developers assume no liability for misuse of this software.
๐ค Contributing
We welcome contributions! Please see our contributing guidelines:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
Development Setup
git clone https://github.com/gab-dev-7/sec-suite.git
cd sec-suite
python -m venv venv
source venv/bin/activate # Linux/Mac
# OR
venv\Scripts\activate # Windows
pip install -r requirements.txt
๐ Support
- GitHub Issues: Report bugs or request features
- Documentation: Check the
docs/directory for detailed guides - Community: Share experiences and tips with other users
Remember: With great power comes great responsibility. Use SEC-SUITE ethically and legally! ๐
SEC-SUITE v2.0 - Advanced Security Testing Toolkit