Tactages Toolkit is a comprehensive suite of cybersecurity tools designed for network scanning, exploitation, traffic capture, brute-force attacks, packet filtering, communication testing, password cracking, SQL injection testing, web server scanning, and web application security auditing.
- Nmap – Network Scanning
- Metasploit Framework – Exploitation
- Wireshark – Traffic Capture
- Hydra – Brute Force Attacks
- Tshark – Packet Capture and Filtering
- Net-tools – Network Utilities
- Netcat – Network Communication
- John the Ripper – Password Cracking
- SQLMap – SQL Injection Testing
- Nikto – Web Server Scanning
- Burp Suite – Web Application Security Testing
Run the following command to install required Python packages:
pip install -r requirements.txtRun the main installer script:
python src/tactages.py- Python 3.x
- Pip
- Tkinter (for GUI)
- requirements.txt
If automatic installation fails, manually install the following tools:
- Nmap – Download
- Metasploit Framework – Download
- Wireshark – Download
- Hydra – Download
- Tshark – Download
- Net-tools – Download
- Netcat – Download
- John the Ripper – Download
- SQLMap – Download
- Nikto – Download
- Burp Suite – Download
Note: Ensure that all tools are added to your system’s PATH environment variable.
Run the toolkit using any of the following scripts:
python src/tactages.pyIf the above command does not work, try:
python src/main.pyor
python src/Console.pyTo launch the GUI version of the toolkit:
python src/GUI.pyThis project is licensed under the MIT License. Refer to the LICENSE file for details.
Contributions are highly encouraged. Please open an issue or submit a pull request to suggest enhancements or report bugs.
- Nmap (Network Scanning) – Detects hosts, open ports, and services on networks.
- Metasploit Framework (Exploitation) – Executes and validates exploits on vulnerable systems.
- Wireshark (Traffic Capture) – Analyzes real-time network traffic.
- Hydra (Brute Force) – Performs password cracking using multiple protocols.
- Tshark (Packet Capture & Filtering) – Command-line alternative to Wireshark for packet analysis.
- John the Ripper (Password Cracking) – Tests password strength and decodes hash values.
- Netcat (Network Communication) – Reads and writes data across TCP/UDP connections.
- SQLMap (SQL Injection Testing) – Automates SQL injection vulnerability detection.
- Nikto (Web Server Scanning) – Detects web server misconfigurations and outdated software.
- Burp Suite (Web Application Testing) – Intercepts and analyzes HTTP traffic to identify vulnerabilities.
- OWASP ZAP (Zed Attack Proxy) – Automated web application vulnerability scanner.
- Acunetix – Advanced web security scanner for SQLi, XSS, and configuration issues.
- Wapiti – Web app vulnerability scanner for SQLi, file inclusion, and XSS testing.
A huge thank you to everyone contributing to this project.
See more in CONTRIBUTERS.md.
Thank you all for your outstanding contributions. Let's keep innovating together.
For inquiries or collaboration, reach out to the project maintainer: Rohan Naagar