A comprehensive suite of security and network testing tools in a user-friendly interface.
Follow these steps to install and launch the toolkit:
- Clone the repository:
git clone -b Tool-Development https://github.com/Hardhat-Enterprises/AppAttack.git
- Enter the tools directory:
cd AppAttack/appAttack_tools - Make the installer executable:
chmod +x install.sh
- Run the installer:
sudo ./install.sh
- Launch the toolkit:
appAttack_toolkit
Streamline testing and installation when adding or updating features:
- Ensure the main script is executable:
chmod +x main.sh
- Quick test without reinstall:
./main.sh
- Full reinstall to validate the installer:
- Remove previous install:
sudo rm -rf /opt/appAttack_toolkit sudo rm /usr/local/bin/appAttack_toolkit
- Re-run the installer:
sudo ./install.sh
- Remove previous install:
- Start the toolkit:
appAttack_toolkit
- The script checks for and downloads dependencies.
- When prompted, choose to update (y) or skip (n).
- Select the desired tool from the menu.
- Provide the path to the target directory or network.
- View the results in the output file (e.g.,
~/appAttack_results.txt).
- MobSF (Mobile Security Framework): An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
This feature allows you to perform dynamic analysis of Android applications by running them in an Android Emulator and intercepting their traffic with mitmproxy.
- Android Emulator: An Android Virtual Device (AVD) is created to provide a virtual environment for running Android applications.
- mitmproxy: A free and open-source interactive HTTPS proxy that allows you to intercept, inspect, modify, and replay the network traffic of the application.
The toolkit automates the process of starting the emulator, configuring it to use mitmproxy, and installing the mitmproxy certificate.
This feature allows you to track changes in your security posture over time.
Each scan is saved with a timestamp, creating a historical record of your scan results.
The delta report feature allows you to compare two scan reports and see the differences between them. This is useful for identifying new and fixed vulnerabilities.
The trend analysis feature allows you to see how your security posture has changed over time. This is useful for identifying trends and patterns in your vulnerabilities.
This workflow automates the process of mobile application security testing by chaining together several tools:
-
Android Emulator: Starts the Android Emulator.
-
APK Installation: Installs the specified APK file on the emulator.
-
mitmproxy: Starts mitmproxy to intercept and analyze network traffic.
-
MobSF: Runs a static analysis scan on the APK file. This workflow automates the process of web application footprinting by chaining together three powerful tools: subfinder, httpx, and nmap.
-
subfinder: Discovers subdomains for the target domain.
-
httpx: Probes the discovered subdomains to identify live hosts.
-
nmap: Scans the live hosts to identify open ports and services.
The output of the workflow is saved in the footprinting_logs directory, with separate files for the subdomains, live hosts, and nmap scan results.
- osv-scanner: Scan dependencies against the Open Source Vulnerability DB.
- Snyk: Find and fix vulnerabilities in code, dependencies, containers, and IaC.
- Brakeman: Static analysis for Ruby on Rails security issues.
- Nmap: Host discovery, port scanning, and network auditing.
- Nikto: Web server scanner for vulnerabilities and misconfigurations.
- OWASP ZAP: Automated web app security testing.
- Aircrack-ng: WEP/WPA PSK cracking and packet replay attacks.
- Bettercap: Wi-Fi, BLE, HID, and Ethernet reconnaissance.
- Binwalk: Firmware analysis and extraction.
- Hashcat: High-performance password recovery.
- Miranda: UPnP device attack framework.
- Ncrack: Network authentication cracking.
- Reaver: Brute-force WPS PIN attacks.
- Scapy: Packet crafting, decoding, and forging.
- Umap: WAN-based UPnP exploitation.
- Wifiphisher: Rogue AP framework for MiTM attacks.
- Wireshark: Network packet capture and analysis.
- Gobuster: Directory and DNS brute-forcing tool.
- API Reconnaissance: Chain Dredd → nmap → nikto for focused API scanning.
The Dynamic Workflow Builder allows you to create custom workflows by chaining together the available tools. You can pass the output of one tool as input to the next, allowing for powerful and flexible automation.
-
Select "Dynamic Workflow Builder" from the "Automated Processes" menu.
-
Select "Create a new workflow".
-
Select the tools you want to add to the workflow in the desired order.
-
For each tool, enter the required arguments. To use the output of a previous tool as an argument, use the following placeholder syntax:
{{tool_name.output.field_name}}For example, to use the IP address and port from the output of an
nmapscan in aniktoscan, you would enter the following arguments fornikto:-h {{nmap.output.parsed_data.host}} -p {{nmap.output.parsed_data.open_ports[0].port}} -
Once you have added all the tools to your workflow, you can choose to execute it immediately or save it for later use.
- The output-to-input mapping currently only works with tools that produce a JSON output.
- The placeholder syntax is limited to simple field access. More complex queries are not yet supported.
For further assistance or to contribute, please open an issue or pull request.