A comprehensive cybersecurity toolkit built with Python and Tkinter, designed for security professionals, ethical hackers, and cybersecurity enthusiasts. This all-in-one application provides essential tools for hashing, string manipulation, file encryption, and cryptographic operations.
Below are some screenshots of the Hacking Toolkit, highlighting its intuitive interface and robust features.
Main Menu
The main dashboard of Hacking Toolkit provides a clean and modern interface, allowing users to quickly access all available tools. Each panel is clearly labeled, and navigation is seamless, ensuring that both beginners and professionals can find and use features with ease. The design emphasizes usability, with quick access buttons and helpful tooltips throughout.
Hash Panel
The Hash Panel supports multiple hashing algorithms including MD5, SHA1, SHA256, and SHA512. Users can hash both text and files, with instant results displayed in a user-friendly format. One-click copy functionality and a built-in file browser make it easy to generate and use hash values for integrity checks, password storage, or digital signatures.
Strings Panel
This panel offers advanced string manipulation tools, including simultaneous comparison of up to five strings, and conversion between text, hexadecimal, bytes, and binary formats. The interactive results area allows users to copy any output with a single click, streamlining workflows for encoding, decoding, and data analysis tasks.
F-Crypt Panel
The F-Crypt Panel provides secure file encryption and decryption using industry-standard algorithms. Users can generate strong 256-bit or 512-bit keys, manage key storage, and perform file operations with clear status feedback. The workflow is designed to be straightforward, making strong encryption accessible to all users without sacrificing security.
- Multiple Hashing Algorithms: Support for MD5, SHA1, SHA256, and SHA512
- Text Hashing: Hash any text string with your chosen algorithm
- File Hashing: Generate hash checksums for files of any size
- Click-to-Copy: One-click copying of hash values to clipboard
- File Selection: Built-in file browser for easy file selection
- String Comparison: Compare up to 5 strings simultaneously to check for similarities
- Format Conversion: Convert strings to multiple formats:
- Hexadecimal: String to hex representation
- Bytes: String to byte values
- Bits: String to binary representation
- Hex Decoder: Convert hexadecimal back to integers and strings
- Interactive Results: Click any result to copy it to clipboard
- Advanced Encryption: Secure file encryption using industry-standard algorithms
- Key Generation: Generate 256-bit and 512-bit encryption keys
- File Operations:
- Encrypt files with custom or generated keys
- Decrypt previously encrypted files
- Key management and storage
- User-Friendly Interface: Simple encrypt/decrypt workflow with status feedback
- Intuitive Navigation: Clean, modern interface with easy panel switching
- Clipboard Integration: Seamless copying of results to system clipboard
- Error Handling: Comprehensive error management with user feedback
- Cross-Panel Navigation: Quick access buttons between different tools
Download the compiled executable from the releases section:
- Go to Releases
- Download the latest
.exefile - Run the executable - no installation required!
Note
I am going to publish the release soon ๐
If you want to run from source or contribute:
# Clone the repository
git clone https://github.com/yourusername/hacking-toolkit.git
cd hacking-toolkit
# Install dependencies
pip install -r requirements.txt
# Run the application
python app.py- Operating System: Windows 10/11 (64-bit)
- RAM: Minimum 2GB
- Storage: 100MB free space
- Python: 3.7+ (if running from source)
- Launch the application
- Choose your desired tool from the main menu:
- Hash: For file and text hashing operations
- Strings: For string manipulation and comparison
- F-Crypt: For file encryption/decryption
- Sub-Domber: Coming soon!
-
For Text Hashing:
- Enter your text in the input field
- Click the desired algorithm button (MD5, SHA1, SHA256, SHA512)
- Click the result to copy to clipboard
-
For File Hashing:
- Click "Select File" to choose your file
- Click the desired algorithm button
- The hash will appear below - click to copy
-
String Comparison:
- Enter up to 5 strings in the input fields
- Click "Check" to see if they're similar
- Result shows "True" or "False"
-
String Conversion:
- Enter text in the conversion field
- Click "Convert" to see Hex, Bytes, and Bits representations
- Click any result to copy to clipboard
-
Hex Conversion:
- Enter hex values in the hex input field
- Automatically converts to Integer and String
- Click results to copy
-
Generate Encryption Key:
- Click "256 Bit" or "512 Bit" to generate a key
- Click "Copy to Entry" to use the generated key
-
Encrypt Files:
- Select file using "Select File" button
- Enter or generate encryption key
- Click "Encrypt" - encrypted file will be saved
-
Decrypt Files:
- Select the encrypted file
- Enter the correct encryption key
- Click "Decrypt" to restore original file
- Frontend: Tkinter with custom styling and assets
- Backend: Modular Python scripts for each functionality
- File Structure:
โโโ app.py # Main application file โโโ Scripts/ โ โโโ Hash.py # Hashing algorithms โ โโโ Strings.py # String manipulation โ โโโ Baval.py # Encryption/decryption โโโ assets/ # UI assets and images
app: Main application class handling UI and navigationgethash(): Text hashing functionalitygetfilehash(): File hashing functionalitystr_conversion(): String format conversionhex_conversion(): Hexadecimal conversionencrypt_file()/decrypt_file(): File encryption operations
- Fork the repository
- Create a feature branch (
git checkout -b feature/AmazingFeature) - Commit your changes (
git commit -m 'Add some AmazingFeature') - Push to the branch (
git push origin feature/AmazingFeature) - Open a Pull Request
tkinter # GUI framework
pathlib # File path handling
hashlib # Hashing algorithms
cryptography # Encryption operationsThis tool is designed for educational purposes and authorized security testing only. Users are responsible for ensuring they have proper authorization before using these tools on any systems or files. The developers are not responsible for any misuse of this software.
- Sub-Domber Panel: Subdomain enumeration tool
- Linux/Mac Support: Cross-platform compatibility
- Advanced Encryption: Additional encryption algorithms
- Batch Operations: Process multiple files simultaneously
- Plugin System: Extensible architecture for custom tools
- Dark/Light Theme: UI theme options
Having issues? Here's how to get help:
- Check the Issues page for known problems
- Create a new issue with:
- Detailed description of the problem
- Steps to reproduce
- System information
- Screenshots (if applicable)
This project is licensed under the MIT License - see the LICENSE file for details.
- Built with Python and Tkinter
- Icons and UI elements designed for modern cybersecurity workflows
- Inspired by the need for consolidated security tools
โญ If you find this tool useful, please consider starring the repository!
Made with โค๏ธ for the cybersecurity community