🛠 refactor: written full command

This commit is contained in:
eshanized
2025-01-16 06:40:55 +05:30
parent 58460bb434
commit 8351fd5e42

View File

@@ -12,315 +12,315 @@ export const tools: Tool[] = [
name: 'Nmap', name: 'Nmap',
description: 'Network exploration tool and security scanner', description: 'Network exploration tool and security scanner',
category: 'Information Gathering', category: 'Information Gathering',
command: 'nmap', command: 'sudo pacman -S nmap',
}, },
{ {
id: '2', id: '2',
name: 'Wireshark', name: 'Wireshark',
description: 'Network protocol analyzer for real-time packet capture', description: 'Network protocol analyzer for real-time packet capture',
category: 'Sniffing & Spoofing', category: 'Sniffing & Spoofing',
command: 'wireshark', command: 'sudo pacman -S wireshark',
}, },
{ {
id: '3', id: '3',
name: 'Metasploit', name: 'Metasploit',
description: 'Penetration testing framework', description: 'Penetration testing framework',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'msfconsole', command: 'sudo pacman -S metasploit',
}, },
{ {
id: '4', id: '4',
name: 'Burp Suite', name: 'Burp Suite',
description: 'Web vulnerability scanner and proxy tool', description: 'Web vulnerability scanner and proxy tool',
category: 'Web Applications', category: 'Web Applications',
command: 'burpsuite', command: 'sudo pacman -S burpsuite',
}, },
{ {
id: '5', id: '5',
name: 'Aircrack-ng', name: 'Aircrack-ng',
description: 'Complete suite for wireless network security assessment', description: 'Complete suite for wireless network security assessment',
category: 'Wireless Attacks', category: 'Wireless Attacks',
command: 'aircrack-ng', command: 'sudo pacman -S aircrack-ng',
}, },
{ {
id: '6', id: '6',
name: 'John the Ripper', name: 'John the Ripper',
description: 'Password cracker and hash analyzer', description: 'Password cracker and hash analyzer',
category: 'Password Attacks', category: 'Password Attacks',
command: 'john', command: 'sudo pacman -S john',
}, },
{ {
id: '7', id: '7',
name: 'Hydra', name: 'Hydra',
description: 'Brute-force password cracking tool', description: 'Brute-force password cracking tool',
category: 'Password Attacks', category: 'Password Attacks',
command: 'hydra', command: 'sudo pacman -S hydra',
}, },
{ {
id: '8', id: '8',
name: 'Nikto', name: 'Nikto',
description: 'Web server scanner for vulnerabilities', description: 'Web server scanner for vulnerabilities',
category: 'Web Applications', category: 'Web Applications',
command: 'nikto', command: 'sudo pacman -S nikto',
}, },
{ {
id: '9', id: '9',
name: 'Airgeddon', name: 'Airgeddon',
description: 'Multi-use bash script for wireless pentesting', description: 'Multi-use bash script for wireless pentesting',
category: 'Wireless Attacks', category: 'Wireless Attacks',
command: 'airgeddon', command: 'sudo pacman -S airgeddon',
}, },
{ {
id: '10', id: '10',
name: 'OWASP ZAP', name: 'OWASP ZAP',
description: 'Open-source web application security scanner', description: 'Open-source web application security scanner',
category: 'Web Applications', category: 'Web Applications',
command: 'zap', command: 'sudo pacman -S zap',
}, },
{ {
id: '11', id: '11',
name: 'Ettercap', name: 'Ettercap',
description: 'Comprehensive suite for man-in-the-middle attacks', description: 'Comprehensive suite for man-in-the-middle attacks',
category: 'Sniffing & Spoofing', category: 'Sniffing & Spoofing',
command: 'ettercap', command: 'sudo pacman -S ettercap',
}, },
{ {
id: '12', id: '12',
name: 'Kali Linux', name: 'Kali Linux',
description: 'Linux distribution with pre-installed security tools', description: 'Linux distribution with pre-installed security tools',
category: 'All', category: 'All',
command: 'kali', command: 'sudo pacman -S kali-linux',
}, },
{ {
id: '13', id: '13',
name: 'Netcat', name: 'Netcat',
description: 'Network utility for reading/writing network connections', description: 'Network utility for reading/writing network connections',
category: 'Information Gathering', category: 'Information Gathering',
command: 'nc', command: 'sudo pacman -S netcat',
}, },
{ {
id: '14', id: '14',
name: 'Netdiscover', name: 'Netdiscover',
description: 'Network discovery tool for locating devices on a network', description: 'Network discovery tool for locating devices on a network',
category: 'Information Gathering', category: 'Information Gathering',
command: 'netdiscover', command: 'sudo pacman -S netdiscover',
}, },
{ {
id: '15', id: '15',
name: 'SQLmap', name: 'SQLmap',
description: 'Automated SQL injection and database takeover tool', description: 'Automated SQL injection and database takeover tool',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'sqlmap', command: 'sudo pacman -S sqlmap',
}, },
{ {
id: '16', id: '16',
name: 'Gobuster', name: 'Gobuster',
description: 'Directory and DNS busting tool for web enumeration', description: 'Directory and DNS busting tool for web enumeration',
category: 'Information Gathering', category: 'Information Gathering',
command: 'gobuster', command: 'sudo pacman -S gobuster',
}, },
{ {
id: '17', id: '17',
name: 'Nikto2', name: 'Nikto2',
description: 'Web scanner for vulnerabilities, similar to Nikto', description: 'Web scanner for vulnerabilities, similar to Nikto',
category: 'Web Applications', category: 'Web Applications',
command: 'nikto2', command: 'sudo pacman -S nikto2',
}, },
{ {
id: '18', id: '18',
name: 'The Harvester', name: 'The Harvester',
description: 'Information gathering tool for open-source intelligence (OSINT)', description: 'Information gathering tool for open-source intelligence (OSINT)',
category: 'Information Gathering', category: 'Information Gathering',
command: 'theharvester', command: 'sudo pacman -S theharvester',
}, },
{ {
id: '19', id: '19',
name: 'Social-Engineer Toolkit (SET)', name: 'Social-Engineer Toolkit (SET)',
description: 'Penetration testing framework for social engineering', description: 'Penetration testing framework for social engineering',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'setoolkit', command: 'sudo pacman -S setoolkit',
}, },
{ {
id: '20', id: '20',
name: 'Burp Suite Pro', name: 'Burp Suite Pro',
description: 'Advanced web vulnerability scanner with additional features', description: 'Advanced web vulnerability scanner with additional features',
category: 'Web Applications', category: 'Web Applications',
command: 'burpsuite_pro', command: 'sudo pacman -S burpsuite_pro',
}, },
{ {
id: '21', id: '21',
name: 'Beef', name: 'Beef',
description: 'The Browser Exploitation Framework for testing browser security', description: 'The Browser Exploitation Framework for testing browser security',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'beef', command: 'sudo pacman -S beef',
}, },
{ {
id: '22', id: '22',
name: 'Sn1per', name: 'Sn1per',
description: 'Automated pentesting tool for information gathering', description: 'Automated pentesting tool for information gathering',
category: 'Information Gathering', category: 'Information Gathering',
command: 'sn1per', command: 'sudo pacman -S sn1per',
}, },
{ {
id: '23', id: '23',
name: 'Responder', name: 'Responder',
description: 'Lateral movement tool for exploiting network protocols', description: 'Lateral movement tool for exploiting network protocols',
category: 'Sniffing & Spoofing', category: 'Sniffing & Spoofing',
command: 'responder', command: 'sudo pacman -S responder',
}, },
{ {
id: '24', id: '24',
name: 'Sublist3r', name: 'Sublist3r',
description: 'Subdomain enumeration tool for information gathering', description: 'Subdomain enumeration tool for information gathering',
category: 'Information Gathering', category: 'Information Gathering',
command: 'sublist3r', command: 'sudo pacman -S sublist3r',
}, },
{ {
id: '25', id: '25',
name: 'Hashcat', name: 'Hashcat',
description: 'Advanced password cracking tool', description: 'Advanced password cracking tool',
category: 'Password Attacks', category: 'Password Attacks',
command: 'hashcat', command: 'sudo pacman -S hashcat',
}, },
{ {
id: '26', id: '26',
name: 'Mimikatz', name: 'Mimikatz',
description: 'Windows credential dumper for obtaining passwords', description: 'Windows credential dumper for obtaining passwords',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'mimikatz', command: 'sudo pacman -S mimikatz',
}, },
{ {
id: '27', id: '27',
name: 'HashID', name: 'HashID',
description: 'Hash identifier tool for identifying hash types', description: 'Hash identifier tool for identifying hash types',
category: 'Password Attacks', category: 'Password Attacks',
command: 'hashid', command: 'sudo pacman -S hashid',
}, },
{ {
id: '28', id: '28',
name: 'BloodHound', name: 'BloodHound',
description: 'Active Directory enumeration tool for post-exploitation', description: 'Active Directory enumeration tool for post-exploitation',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'bloodhound', command: 'sudo pacman -S bloodhound',
}, },
{ {
id: '29', id: '29',
name: 'Lynis', name: 'Lynis',
description: 'Security auditing tool for Unix-based systems', description: 'Security auditing tool for Unix-based systems',
category: 'Information Gathering', category: 'Information Gathering',
command: 'lynis', command: 'sudo pacman -S lynis',
}, },
{ {
id: '30', id: '30',
name: 'Wfuzz', name: 'Wfuzz',
description: 'Web fuzzing tool for finding vulnerabilities in web apps', description: 'Web fuzzing tool for finding vulnerabilities in web apps',
category: 'Web Applications', category: 'Web Applications',
command: 'wfuzz', command: 'sudo pacman -S wfuzz',
}, },
{ {
id: '31', id: '31',
name: 'Cobalt Strike', name: 'Cobalt Strike',
description: 'Adversary simulation software for penetration testers', description: 'Adversary simulation software for penetration testers',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'cobaltstrike', command: 'sudo pacman -S cobaltstrike',
}, },
{ {
id: '32', id: '32',
name: 'Shodan', name: 'Shodan',
description: 'Search engine for Internet-connected devices', description: 'Search engine for Internet-connected devices',
category: 'Information Gathering', category: 'Information Gathering',
command: 'shodan', command: 'sudo pacman -S shodan',
}, },
{ {
id: '33', id: '33',
name: 'CloudBrute', name: 'CloudBrute',
description: 'Brute force cloud storage services', description: 'Brute force cloud storage services',
category: 'Password Attacks', category: 'Password Attacks',
command: 'cloudbrute', command: 'sudo pacman -S cloudbrute',
}, },
{ {
id: '34', id: '34',
name: 'FuzzBunch', name: 'FuzzBunch',
description: 'A penetration testing framework developed by the NSA', description: 'A penetration testing framework developed by the NSA',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'fuzzbunch', command: 'sudo pacman -S fuzzbunch',
}, },
{ {
id: '35', id: '35',
name: 'PowerSploit', name: 'PowerSploit',
description: 'A PowerShell-based exploitation framework', description: 'A PowerShell-based exploitation framework',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'powersploit', command: 'sudo pacman -S powersploit',
}, },
{ {
id: '36', id: '36',
name: 'Powershell Empire', name: 'Powershell Empire',
description: 'Post-exploitation and agent-based framework', description: 'Post-exploitation and agent-based framework',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'empire', command: 'sudo pacman -S empire',
}, },
{ {
id: '37', id: '37',
name: 'Reaver', name: 'Reaver',
description: 'Wi-Fi Protected Setup (WPS) attack tool', description: 'Wi-Fi Protected Setup (WPS) attack tool',
category: 'Wireless Attacks', category: 'Wireless Attacks',
command: 'reaver', command: 'sudo pacman -S reaver',
}, },
{ {
id: '38', id: '38',
name: 'Kismet', name: 'Kismet',
description: 'Wireless network detector, sniffer, and intrusion detection system', description: 'Wireless network detector, sniffer, and intrusion detection system',
category: 'Wireless Attacks', category: 'Wireless Attacks',
command: 'kismet', command: 'sudo pacman -S kismet',
}, },
{ {
id: '39', id: '39',
name: 'Nikto3', name: 'Nikto3',
description: 'Web server scanner that identifies vulnerabilities', description: 'Web server scanner that identifies vulnerabilities',
category: 'Web Applications', category: 'Web Applications',
command: 'nikto3', command: 'sudo pacman -S nikto3',
}, },
{ {
id: '40', id: '40',
name: 'Scapy', name: 'Scapy',
description: 'Network manipulation tool for penetration testing', description: 'Network manipulation tool for penetration testing',
category: 'Sniffing & Spoofing', category: 'Sniffing & Spoofing',
command: 'scapy', command: 'sudo pacman -S scapy',
}, },
{ {
id: '41', id: '41',
name: 'SSLScan', name: 'SSLScan',
description: 'SSL scanner for finding vulnerabilities in SSL implementations', description: 'SSL scanner for finding vulnerabilities in SSL implementations',
category: 'Web Applications', category: 'Web Applications',
command: 'sslscan', command: 'sudo pacman -S sslscan',
}, },
{ {
id: '42', id: '42',
name: 'Gophish', name: 'Gophish',
description: 'Open-source phishing framework for social engineering testing', description: 'Open-source phishing framework for social engineering testing',
category: 'Social Engineering', category: 'Social Engineering',
command: 'gophish', command: 'sudo pacman -S gophish',
}, },
{ {
id: '43', id: '43',
name: 'Empire', name: 'Empire',
description: 'Post-exploitation framework with PowerShell agents', description: 'Post-exploitation framework with PowerShell agents',
category: 'Exploitation Tools', category: 'Exploitation Tools',
command: 'empire', command: 'sudo pacman -S empire',
}, },
{ {
id: '44', id: '44',
name: 'Pipal', name: 'Pipal',
description: 'Password analysis tool to identify weak passwords', description: 'Password analysis tool to identify weak passwords',
category: 'Password Attacks', category: 'Password Attacks',
command: 'pipal', command: 'sudo pacman -S pipal',
}, },
{ {
id: '45', id: '45',
name: 'Rekall', name: 'Rekall',
description: 'Forensic memory analysis tool for investigating malware', description: 'Forensic memory analysis tool for investigating malware',
category: 'Forensics', category: 'Forensics',
command: 'rekall', command: 'sudo pacman -S rekall',
}, },
]; ];