Habu is a Python-based network hacking toolkit designed for educational purposes and learning network security concepts. The toolkit implements various network attack and reconnaissance techniques including: - ARP poisoning and network traffic sniffing capabilities - DHCP discovery and starvation attacks - Subdomain identification and enumeration - SSL/TLS certificate cloning functionality - TCP traffic analysis including sequence number and flag analysis - Username verification across social media platforms - Web technology stack identification and fingerprinting The tool is developed as an educational resource to demonstrate network security concepts and attack methodologies. It requires Python 3 and can be installed directly from the GitHub repository using pip. Habu provides practical implementations of common network security testing techniques in a single toolkit, making it suitable for security research, penetration testing training, and understanding network attack vectors.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.
Emulate offensive attack techniques in the cloud with a self-contained Go binary.
Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
A proof-of-concept tool that demonstrates automated MFA bypass techniques for Microsoft Outlook through browser automation and request interception.
A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.
A collection of scripts for Turbo Intruder, a penetration testing tool
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.