🔍 OSINT
👁 Recon
🕷 Web
🐚 RevShell
⬆ Up/Down
🔑 Password
⬆️ PrivEsc
⚒️ Impacket
🔍 OSINT (Open Source Intelligence)
🌐 Target Information
Target (Domain/IP)
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. DNS Queries
2. Google Dorks
3. Email & User OSINT
👁 Reconnaissance & Nmap Scanning
🎯 Target Configuration
RHOST (IP)
RPORT
DOMAIN
USER
PASS
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. Nmap Scans (Complete Collection)
2. Nmap Scripts & Vuln Scanning
3. LDAP & AD Enumeration
4. Service Enumeration
🕷 Web Application Testing
🌍 Web Target
URL
Wordlist
LHOST
LPORT
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. Scanning & Enumeration
2. Fuzzing with ffuf
3. Web Shells (Kali paths)
🐚 Reverse Shells Generator
📡 Listener Configuration
LHOST
LPORT
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. Listeners
2. Connect Back Payloads
3. Reverse Shell Files (msfvenom)
⬆ File Transfer (Upload/Download)
📁 Transfer Configuration
LHOST
LPORT
FILENAME
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. Upload to Target
2. Download from Target
🔑 Password Cracking
🔐 Cracking Configuration
Hash File
Wordlist
RHOST
USER
RPORT
Generate
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
1. Hashcat (Local Hash Cracking)
2. John the Ripper (Local Hash Cracking)
3. Hydra (Online Service Cracking)
4. Ncrack (Online Service Cracking)
5. Hash Identification & Conversion
🔪 Privilege Escalation (Complete Scenarios)
⬆️ PrivEsc Configuration
LHOST
LPORT
RHOST
Update Placeholders
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
🐧 Linux - System Information
🐧 Linux - Users & Permissions
🐧 Linux - Network & Processes
🐧 Linux - Services & Cron Jobs
🐧 Linux - File Permissions (SUID/SGID/Capabilities)
🐧 Linux - Sudo Exploits (Complete Scenarios)
🐧 Linux - Kernel Exploits
🐧 Linux - Misc (NFS, Docker, LXD, Tunneling)
🪟 Windows - System Enumeration (CMD)
🪟 Windows - Software & Services (CMD)
🪟 Windows - PowerShell Enumeration
🪟 Windows - Service Exploits & Kernel
🪟 Windows - Token Impersonation (Potato Family)
🪟 Windows - Credentials & Registry Hunting
🪟 Windows - UAC Bypass & Persistence
🪟 Windows - Tools Download (PowerShell IEX Style)
⚒️ Complete Impacket Toolset (50 Tools)
🖥️ Impacket Connection Parameters
RHOST (Target IP)
DOMAIN
DC IP
USERNAME
PASSWORD
NTLM HASH (LM:NT)
🚀 Generate Impacket Commands (50 Tools)
📋 Click on any command to select it, then press Ctrl+C (or Cmd+C) to copy
💡
Dynamic DC-IP:
If you enter a value in DC IP field,
-dc-ip <your-ip>
will be automatically added to all compatible commands.
Complete Impacket Tools (50 Tools - One Command Per Tool)
🧰 Advanced Pentest Toolbox