
hackerEnv is an automation tool that quickly and easily sweeps IPs and scan ports, vulnerabilities, and exploit them. Then, it hands you an interactive shell for further testing. Also, it generates HTML and Docx reports. It uses other tools such as Nmap, Nikto, Metasploit and hydra. Works in Kali Linux and Parrot OS. Do not run it in Qterminal, works in gnome-terminal, terminator, and tmux. I am adding features and vulnerabilities exploits consistently. Also, soon there will be a GUI version. This tool was NOT coded by a professional, "I do not know what I am doing". By running this program, you are agreeing on NOT running it against any public, corporate or unauthorized networks. Performed only when you have the authorization to do. Greetz to @R2k4n
Update Kali/Parrot
apt update; apt upgrade -y
Download hackerEnv
cd /opt/
git clone https://github.com/abdulr7mann/hackerEnv.git
cd /opt/hackerEnv
chmod +x hackerEnv
If you want to use it anywhere on the system, create a shortcut using:
ln -s /opt/hackerEnv/hackerEnv /usr/local/bin/
Usage:
Usage:
hackerEnv <flag> <argument>
Examples:
hackerEnv -t 10.10.10.10
hackerEnv -t "10.10.10.10\n20.20.20.20"
hackerEnv -t 10.10.10.10 -i eth0
hackerEnv -i eth0 -s 24
hackerEnv -s 24
Flages:
hackerEnv -h, --help Display this help message.
hackerEnv --update Update tool.
hackerEnv Scan the entire network.
hackerEnv -t Pass a specific target's IP.
hackerEnv -t Pass mutipule targets' IPs e.g. hackerEnv -t "10.10.10.10\n20.20.20.20"
hackerEnv -i To specify an interface.
hackerEnv -a Pass attacker's IP.
hackerEnv -s To specify subNetwork 24 or 23 etc. exclude /
hackerEnv -e, --aggressive Enable aggressive port scan
hackerEnv -oA genetrate report in HTML and DOCX format
Visit page: https://github.com/abdulr7mann/hackerEnv
In Gnome terminal
In tmux
Report
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky