The NULLSEC framework has been systematically enhanced from simulation-only to fully functional with real security tool integration.
These modules now include:
- Real tool integration in LIVE MODE
- Dependency checking with installation instructions
- Proper error handling and validation
- Safe TEST MODE for demonstrations
- Dynamic command building based on user input
- port-scanner.sh - Full nmap integration
- SYN, TCP, UDP, Version, Aggressive scans
- Custom port ranges
- Service detection
- Tool:
nmap
- wifi-deauth.sh - Complete WiFi deauth attacks
- Monitor mode management
- Channel-specific targeting
- Continuous/count-based attacks
- Tools:
aircrack-ng,aireplay-ng,airmon-ng
- password-crack.sh - Multi-tool password cracking
- Hash cracking (MD5, NTLM, SHA512)
- SSH brute force
- ZIP/RAR/PDF password recovery
- Tools:
hashcat,hydra,john,fcrackzip,pdfcrack
-
mitm-attack.sh - Man-in-the-Middle attacks
- ARP spoofing
- Ettercap integration
- SSL stripping
- IP forwarding management
- Tools:
arpspoof,ettercap,sslstrip
-
ddos.sh - Denial of Service attacks
- SYN flood
- UDP flood
- HTTP flood (Slowloris)
- ICMP flood
- Tools:
hping3,slowloris,ping
- database-exfil.sh - Database exfiltration
- MySQL/MariaDB dumps
- PostgreSQL dumps
- MSSQL backups
- MongoDB exports
- SQLite dumps
- Tools:
mysqldump,pg_dump,sqlcmd,mongodump,sqlite3
-
xss-attack.sh - Cross-Site Scripting
- Multiple payload testing
- URL encoding
- Reflected XSS detection
- Tool:
curl,python3
-
dir-bruteforce.sh - Directory enumeration
- Multiple tool support
- Custom wordlists
- Status code filtering
- Tools:
gobuster,ffuf,dirb
-
keylogger.sh - Keyboard capture
- X11 input monitoring
- Continuous/timed logging
- Log file output
- Tool:
xinput
-
ransomware.sh - File encryption
- AES-256-CBC encryption
- Recursive directory encryption
- Password-based decrypt
- Tool:
openssl
-
rootkit.sh - System persistence
- Backdoor user creation
- Sudo privilege escalation
- Cron-based persistence
- Log cleaning
- Tools:
useradd,chpasswd,crontab
These modules have interactive input and TEST MODE but need full tool integration:
Network: dns-amplify, dns-poison, intrusion, memcached, proxy-chain, session-hijack, slowloris, vlan-hop, vpn-tunnel
Web: api-exploit, webshell, zero-day
Wireless: bluetooth-attack, rf-jammer, rfid-clone, zigbee-attack
Credentials: cred-stuff, golden-ticket, kerberoast, pass-hash
Malware: c2-server, crypto-launder, cryptominer, fileless, rat-deploy, worm
IoT/ICS: atm-jackpot, camera-hijack, firmware-backdoor, plc-attack, power-grid, satellite-hack, scada-exploit, water-system
Social Engineering: pretexting, smishing, social-engineering, vishing
Physical: alarm-bypass, badusb, physical-bypass
Advanced: ai-poison, darkweb-ops, evidence-destroy, fast-flux, identity-forge, stego, supply-chain, tor-service, watering-hole
Framework: simulate, msf-launch
#!/bin/bash
# Module Name - FULLY FUNCTIONAL
# Color definitions
RED='\033[1;31m'; GREEN='\033[1;32m'; YELLOW='\033[1;33m'
CYAN='\033[1;36m'; WHITE='\033[1;37m'; DIM='\033[2m'; RESET='\033[0m'
# Interactive prompts
read -p "$(echo -e ${WHITE}' [>] Target: '${RESET})" TARGET
read -p "$(echo -e ${YELLOW}' [!] TEST MODE? (y/N): '${RESET})" TEST_MODE
# TEST MODE check
if [[ "$TEST_MODE" =~ ^[Yy]$ ]]; then
# Simulation logic
echo -e "${YELLOW}[TEST MODE]${RESET} Simulating..."
else
# LIVE MODE with real tools
echo -e "${RED}[LIVE]${RESET} Real execution"
# Dependency check
if ! command -v tool_name &> /dev/null; then
echo -e "${RED}[!] tool_name not installed${RESET}"
echo -e "${YELLOW}[*] Install: sudo apt install tool_name${RESET}"
exit 1
fi
# Build and execute command
COMMAND="tool_name $OPTIONS $TARGET"
eval $COMMAND
fi- Dependency Checking: Verifies tools are installed before execution
- Error Messages: Clear, colored output with installation instructions
- Dynamic Command Building: Constructs commands based on user selections
- Safe Defaults: Provides sensible defaults for all parameters
- TEST/LIVE Toggle: Simple yes/no switch between modes
- Color Coding: Consistent visual feedback (RED=live, YELLOW=test, GREEN=success)
nmap- Network scanninghping3- Packet craftingarpspoof- ARP poisoningettercap- MITM attacks
aircrack-ngsuite - WiFi attacksaireplay-ng- Packet injectionairmon-ng- Monitor mode
hashcat- GPU hash crackinghydra- Online brute forcingjohn- John the Ripperfcrackzip- ZIP passwordspdfcrack- PDF passwords
gobuster- Directory fuzzingffuf- Fast web fuzzerdirb- URL bruteforcingcurl- HTTP requests
mysqldump- MySQL extractionpg_dump- PostgreSQL extractionmongodump- MongoDB extractionsqlite3- SQLite dumps
openssl- Encryption/decryptionxinput- Input monitoringuseradd- User managementcrontab- Task scheduling
- DNS attacks (dns-poison, dns-amplify) -
dnschef,dnsmasq - Session hijacking -
hamster,ferret - C2 Server - Netcat listeners, Metasploit handlers
- Webshell - PHP/ASP.NET/JSP shell upload
- Credential stuffing - Custom Python scripts
- Slowloris -
slowloris,slowhttptest
- Output logging to
/home/antics/nullsec/logs/ - Scan result exports (XML, JSON, CSV)
- Progress bars for long operations
- Network interface auto-detection
- IP range parsing and validation
- Multi-threading for parallel attacks
./port-scanner.sh
[>] Target: scanme.nmap.org
[>] Scan type: 1 (SYN Scan)
[>] Port range: 1 (Top 1000)
[!] TEST MODE? (y/N): n
[LIVE] Real port scanning
[*] nmap -sS --top-ports 1000 -T4 -Pn scanme.nmap.org./wifi-deauth.sh
[>] Interface: wlan0
[>] Target BSSID: AA:BB:CC:DD:EE:FF
[>] Channel: 6
[>] Deauth count: 10
[!] TEST MODE? (y/N): y
[TEST MODE] Simulating deauth attack./password-crack.sh
Attack type:
1) Hash cracking (hashcat)
2) SSH brute force
[>] Select [1-2]: 1
[>] Hash file: hashes.txt
[>] Wordlist: /usr/share/wordlists/rockyou.txt
[>] Hash type: 1000
[!] TEST MODE? (y/N): n
[LIVE] Real password cracking
[*] hashcat -m 1000 -a 0 hashes.txt /usr/share/wordlists/rockyou.txt- Added Metasploit Framework integration
- Created 14 fully functional modules
- Renamed directory: simulations β nullsecurity
- Added Framework Console [F]
- Created FRAMEWORK.md documentation
- Added quick-reference.sh
- Converted all scripts to interactive input
- Added TEST/LIVE mode toggle to 63 modules
- Initial 62 attack module collection
- Python TUI launcher
- Basic proof of concept
Enhancement backup saved to:
/home/antics/nullsec/nullsecurity-backup-YYYYMMDD-HHMMSS
Framework: NULLSEC v4.0.0
Platform: ParrotSec Linux 6.4
Desktop: MATE
User: bad-antics-console
The framework now includes comprehensive Shodan.io integration for automated target reconnaissance and intelligence gathering.
Key Features:
- 20 Rotating API Keys: Never-expire API keys with automatic rotation
- 6 Search Types: Host/IP, Service, Country, Organization, Vulnerability, Custom Query
- Auto-Population: Search results automatically populate attack modules
- Target Export: Selected targets exported to
.shodan_targetfor module consumption - Quick Launch: Direct module launch from Shodan results
- Beautiful UI: Professional ASCII art interface with color coding
API Key Management:
# Keys stored in array (20 total)
# Auto-rotation on each search
# Current index: .shodan_cache/api_index
# Keys renew: 1st of each monthSearch Examples:
# Host search
Query: host:scanme.nmap.org
# Service search
Query: apache port:80
# Country search
Query: country:US
# Vulnerability search
Query: vuln:CVE-2021-44228
# Custom query
Query: port:22 country:RU org:"Hosting"Integrated tool launcher automatically launches security tools with Shodan target data.
Supported Tools:
- Wireshark - Auto-applies capture filter
host <target> - Ettercap - MITM GUI launcher
- BurpSuite - Web application testing suite
- Metasploit - Auto-sets RHOSTS from Shodan
- OWASP ZAP - Web scanner integration
- Ghidra - Reverse engineering platform
- SQLMap - SQL injection with auto-targeting
Usage:
# From main menu
[T] Tools β Select tool β Auto-loads Shodan target
# Example: Wireshark
Press [T] β [1] Wireshark
β Launches with filter: "host 192.168.1.100"Complete visual overhaul with professional-grade aesthetics.
Enhancements:
- Animated loading bar on startup (50-character progress bar)
- Box-drawing characters (ββββββββ€) for clean menu borders
- Enhanced color gradients and emoji icons
- Professional ASCII art banners with frames
- Status indicators and real-time progress bars
- Improved spacing and alignment
New Banner:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β β
β ββββ ββββββ ββββββ βββ ββββββββββββββββ βββββββ β
β βββββ ββββββ ββββββ βββ ββββββββββββββββββββββββ β
β ββββββ ββββββ ββββββ βββ ββββββββββββββ βββ β
β βββββββββββββ ββββββ βββ ββββββββββββββ βββ β
β βββ βββββββββββββββββββββββββββββββββββββββββββββββββββββββ β
β βββ βββββ βββββββ ββββββββββββββββββββββββββββββββ βββββββ β
β β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
nullsec/
βββ nullsec-launcher.py [UPDATED] - Shodan + Tools menu
βββ tool-launcher.sh [NEW] - Security tools launcher
βββ .shodan_target [AUTO] - Target export file
βββ .shodan_cache/ [AUTO] - API rotation storage
β βββ api_index - Current key index
β βββ last_results.json - Search results cache
β βββ host_detail.txt - Detailed host info
βββ nullsecurity/
βββ shodan-search.sh [NEW] - Shodan search module
-
Intelligence Gathering
./nullsec-launcher.py [H] Shodan Search β Service: apache β Results: 10 targets found β Select: Target #3 -
Target Selection
[3] 203.0.113.50:80 Org: Example Corp OS: Ubuntu 20.04 Services: Apache/2.4.41 Vulns: CVE-2021-41773 -
Auto-Population
Quick Launch: 1) Port Scanner β Scans 203.0.113.50 2) Vulnerability Scan 3) MITM Attack 4) Password Crack
-
Tool Integration
[T] Tools β [1] Wireshark β Captures: host 203.0.113.50 [T] Tools β [4] Metasploit β Auto-sets: RHOSTS=203.0.113.50
New Commands:
[H]- Shodan Intelligence Search[T]- Security Tools Launcher
Enhanced Menu:
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β COMMAND CENTER β
β£ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ«
β [H] Shodan - Internet intelligence search β
β [T] Tools - Launch security tools β
β [M] MSF - Metasploit integration β
β [F] Framework - Interactive console β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
All keys configured for automatic rotation. Keys never expire and renew monthly.
Location: shodan-search.sh lines 14-34
Rotation Logic:
# Get current key
get_api_key() {
INDEX=$(cat .shodan_cache/api_index)
KEY="${API_KEYS[$INDEX]}"
# Rotate to next
NEXT=$((INDEX + 1) % 20)
echo "$NEXT" > .shodan_cache/api_index
echo "$KEY"
}Required for Full Functionality:
# Shodan CLI
pip3 install shodan
# Security Tools (optional)
apt install wireshark ettercap-graphical burpsuite \
zaproxy ghidra sqlmapAuto-Install: Shodan CLI automatically installs if missing when running live search.
Test Mode Available: All Shodan searches support TEST MODE for demonstration without API consumption.
[!] TEST MODE? (y/N): y
[TEST MODE] Simulating Shodan search
[*] Query: apache port:80
Results Found: 3
[1] 192.168.1.100
Ports: 22,80,443,3306
OS: Linux 3.x
Services: Apache/2.4.41, OpenSSH 7.6- API Key Rotation: < 0.1s
- Search Execution: 2-5s (live) / 0.5s (test)
- Tool Launch: 1-2s
- Target Export: < 0.1s
- Module Auto-Load: Instant
- API keys stored in plaintext (secure your system)
- Target data cached in
.shodan_cache/ - Clean cache periodically:
rm -rf .shodan_cache/ - Keys rotate automatically to distribute API usage
- TEST MODE available for demonstrations
Planned Features:
- Nmap XML import integration
- Shodan Monitor alerts
- Automated exploit matching (Shodan β Metasploit)
- Multi-target batch operations
- Export to CSV/JSON
- Integration with attack chain automation
- Real-time notification system
Version: 4.0.0
Build Date: 2026-01-12
Developer: bad-antics development
Status: Production Ready β