Total Enhanced Modules: 185
Categories: 13
All modules feature: Interactive parameters, automatic logging, vulnerability tracking
Security testing tools
| Module | Description | Parameters |
|---|---|---|
| Your Module Name | Detailed description of what this attack module does and its purpose | 5 |
Security testing tools
| Module | Description | Parameters |
|---|---|---|
| Active Directory Attack | Multi-vector Active Directory penetration testing with advanced exploitation tec... | 8 |
Database exploitation and data exfiltration
| Module | Description | Parameters |
|---|---|---|
| Database Exfil | NULLSEC Database Exfiltration - FULLY FUNCTIONAL | 5 |
| Shodan Search | ═══════════════════════════════════════════════════════════════════════ | 5 |
Reconnaissance and information gathering
| Module | Description | Parameters |
|---|---|---|
| Badusb | NULLSEC BadUSB Attack - bad-antics development | 3 |
| Cloud Attack | NULLSEC Cloud Infrastructure Attack Module | 3 |
| Cloud Enum | NULLSEC Cloud Enumeration Module | 3 |
| Gcp Enum | NULLSEC Google Cloud Enumeration Module | 3 |
Exploitation frameworks and vulnerability exploitation
| Module | Description | Parameters |
|---|---|---|
| 2Fa Bypass | NULLSEC 2FA Bypass Methods Module | 5 |
| Ai Attack | NULLSEC AI/ML Attack Module | 5 |
| Amsi Bypass | NULLSEC AMSI Bypass Module | 5 |
| Android Exploit | NULLSEC Android Exploitation Module | 5 |
| Anti Debug | NULLSEC Anti-Debugging Bypass Module | 5 |
| Anti Vm | NULLSEC Anti-VM Detection Bypass Module | 5 |
| Av Evasion | NULLSEC Antivirus Evasion Module | 5 |
| Azure Exploit | NULLSEC Azure Cloud Attacks Module | 5 |
| Bootloader Unlock | NULLSEC Bootloader Attacks Module | 5 |
| Captcha Bypass | NULLSEC CAPTCHA Bypass Module | 5 |
| Checkpoint Exploit | NULLSEC Checkpoint Testing Module | 5 |
| Cisco Asa Exploit | NULLSEC Cisco ASA Attacks Module | 5 |
| Citrix Attack | NULLSEC Citrix Exploitation Module | 5 |
| Confluence Exploit | NULLSEC Confluence Attacks Module | 5 |
| Container Exploit | NULLSEC Container Exploitation Module | 5 |
| Cors Exploit | NULLSEC CORS Misconfiguration Module | 5 |
| Couchdb Attack | NULLSEC CouchDB Testing Module | 5 |
| Csp Bypass | NULLSEC CSP Bypass Module | 5 |
| Deobfuscator | NULLSEC Code Deobfuscation Module | 5 |
| Deserialization | NULLSEC Deserialization Attacks Module | 5 |
| Dll Injection | NULLSEC DLL Injection Module | 5 |
| Docker Escape | NULLSEC Docker Container Escape Module | 5 |
| Edr Evasion | NULLSEC EDR Evasion Module | 5 |
| Exchange Exploit | NULLSEC Exchange Server Attacks Module | 5 |
| Firewall Bypass | NULLSEC Firewall Bypass Module | 5 |
| Firmware Extract | NULLSEC Firmware Extraction Module | 5 |
| Fortinet Exploit | NULLSEC FortiGate Exploitation Module | 5 |
| Gitlab Attack | NULLSEC GitLab Security Testing Module | 5 |
| Graphql Attack | NULLSEC GraphQL Exploitation Module | 5 |
| Grpc Exploit | NULLSEC gRPC Exploitation Module | 5 |
| Heap Spray | NULLSEC Heap Spraying Attacks Module | 5 |
| Ids Evasion | NULLSEC IDS/IPS Evasion Module | 5 |
| Jenkins Exploit | NULLSEC Jenkins Exploitation Module | 5 |
| Jira Exploit | NULLSEC Jira Exploitation Module | 5 |
| Juniper Attack | NULLSEC Juniper Exploitation Module | 5 |
| Jwt Attack | NULLSEC JWT Token Attacks Module | 5 |
| Kafka Attack | NULLSEC Apache Kafka Exploitation Module | 5 |
| Kernel Exploit | NULLSEC Kernel Exploitation Module | 5 |
| Kubernetes Exploit | NULLSEC Kubernetes Exploitation Module | 5 |
| Ldap Injection | NULLSEC LDAP Injection Module | 5 |
| Linux Privesc | NULLSEC Linux Privilege Escalation Module | 5 |
| Lorawan Exploit | NULLSEC LoRaWAN Attacks Module | 5 |
| Macos Exploit | NULLSEC macOS Attacks Module | 5 |
| Memcached | NULLSEC Memcached Amplification - bad-antics development | 5 |
| Memcached Attack | NULLSEC Memcached Attacks Module | 5 |
| Memory Exploit | NULLSEC Memory Exploitation Module | 5 |
| Metamorphic Gen | NULLSEC Metamorphic Engine Module | 5 |
| Mikrotik Attack | NULLSEC MikroTik Exploitation Module | 5 |
| Modbus Exploit | NULLSEC Modbus Exploitation Module | 5 |
| Mongodb Exploit | NULLSEC MongoDB Exploitation Module | 5 |
| Msf Launch | NULLSEC Framework - MSF Quick Launcher | 5 |
| Nas Attack | NULLSEC Generic NAS Testing Module | 5 |
| Neo4J Exploit | NULLSEC Neo4j Graph DB Attacks Module | 5 |
| Netgear Exploit | NULLSEC Netgear Router Attacks Module | 5 |
| Oauth Exploit | NULLSEC OAuth Attacks Module | 5 |
| Packer Detector | NULLSEC Packer Detection Module | 5 |
| Palo Alto Attack | NULLSEC Palo Alto Firewall Module | 5 |
| Pci Exploit | NULLSEC PCI Device Attacks Module | 5 |
| Polymorphic Gen | NULLSEC Polymorphic Malware Module | 5 |
| Printer Exploit | NULLSEC Printer Exploitation Module | 5 |
| Process Hollow | NULLSEC Process Hollowing Module | 5 |
| Protobuf Attack | NULLSEC Protocol Buffer Attacks Module | 5 |
| Qnap Exploit | NULLSEC QNAP NAS Exploitation Module | 5 |
| Quic Attack | NULLSEC QUIC Protocol Attacks Module | 5 |
| Race Condition | NULLSEC Race Condition Exploits Module | 5 |
| Redis Exploit | NULLSEC Redis Exploitation Module | 5 |
| Rop Chain | NULLSEC ROP Chain Builder Module | 5 |
| Saml Exploit | NULLSEC SAML Exploitation Module | 5 |
| Sandbox Escape | NULLSEC Sandbox Escape Module | 5 |
| Scada Exploit | NULLSEC SCADA Exploit - bad-antics development | 5 |
| Sharepoint Attack | NULLSEC SharePoint Testing Module | 5 |
| Shellcode Gen | NULLSEC Shellcode Generator Module | 5 |
| Sip Flood | NULLSEC SIP/VoIP Flooding Module | 5 |
| Smart Tv Exploit | NULLSEC Smart TV Testing Module | 5 |
| Sonicwall Attack | NULLSEC SonicWall Exploitation Module | 5 |
| Sso Attack | NULLSEC SSO Exploitation Module | 5 |
| Ssti Exploit | NULLSEC SSTI Exploitation Module | 5 |
| Subdomain Takeover | NULLSEC Subdomain Takeover Module | 5 |
| Synology Attack | NULLSEC Synology NAS Attacks Module | 5 |
| Template Injection | NULLSEC Template Injection Module | 5 |
| Thrift Exploit | NULLSEC Apache Thrift Testing Module | 5 |
| Thunderbolt Attack | NULLSEC Thunderbolt DMA Module | 5 |
| Token Manipulation | NULLSEC Token Manipulation Module | 5 |
| Uac Bypass | NULLSEC UAC Bypass Techniques Module | 5 |
| Ubiquiti Exploit | NULLSEC Ubiquiti Testing Module | 5 |
| Unpacker | NULLSEC Malware Unpacker Module | 5 |
| Usb Attack | NULLSEC USB Attacks (BadUSB) Module | 5 |
| Vmware Exploit | NULLSEC VMware ESXi Attacks Module | 5 |
| Voip Attack | NULLSEC VoIP Exploitation Module | 5 |
| Waf Bypass | NULLSEC WAF Bypass Techniques Module | 5 |
| Windows Exploit | NULLSEC Windows Exploitation Module | 5 |
| Xpath Injection | NULLSEC XPath Injection Module | 5 |
| Xxe Exploit | NULLSEC XXE Exploitation Module | 5 |
| Zero Day | NULLSEC Zero-Day Exploit - bad-antics development | 5 |
| Zwave Attack | NULLSEC Z-Wave Testing Module | 5 |
General purpose security tools
| Module | Description | Parameters |
|---|---|---|
| Check Enhancements | Check which modules are enhanced | 3 |
| Crypto Launder | NULLSEC Crypto Laundering - bad-antics development | 3 |
| Ransomware | NULLSEC Ransomware Simulation - Educational Testing Only | 3 |
| Satellite Hack | NULLSEC Satellite Hack - bad-antics development | 3 |
IoT, SCADA, ICS, and embedded device attacks
| Module | Description | Parameters |
|---|---|---|
| Bacnet Attack | NULLSEC BACnet Testing Module | 3 |
| Camera Hijack | NULLSEC Camera Hijack - bad-antics development | 3 |
| Iot Camera | NULLSEC IoT Camera Attacks Module | 3 |
| Plc Attack | NULLSEC PLC Attack - bad-antics development | 3 |
| Power Grid | NULLSEC Power Grid Attack - bad-antics development | 3 |
| Scada Attack | NULLSEC SCADA/ICS Testing Module | 3 |
| Water System | NULLSEC Water System Attack - bad-antics development | 3 |
Android and iOS mobile application security
| Module | Description | Parameters |
|---|---|---|
| Ios Attack | NULLSEC iOS Security Testing Module | 3 |
| Mobile Attack | NULLSEC Mobile Attack Module | 3 |
Network scanning, pivoting, and infrastructure attacks
| Module | Description | Parameters |
|---|---|---|
| Alarm Bypass | NULLSEC Alarm Bypass - bad-antics development | 4 |
| Apt Attack | NULLSEC APT Attack - bad-antics development | 4 |
| Atm Jackpot | NULLSEC ATM Jackpotting - bad-antics development | 4 |
| C2 Server | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Ddos | NULLSEC DDoS Attack - FULLY FUNCTIONAL | 4 |
| Dep Check | Dependency checker and auto-installer for NULLSEC modules | 4 |
| Dns Amplify | NULLSEC DNS Amplification - bad-antics development | 4 |
| Dns Poison | NULLSEC DNS Poisoning - bad-antics development | 4 |
| Dns Tunnel | NULLSEC DNS Tunneling Module | 4 |
| Enhance All Modules | NULLSEC Module Enhancement Script | 4 |
| Evidence Destroy | NULLSEC Evidence Destruction - bad-antics development | 4 |
| Fast Flux | NULLSEC Fast Flux Network - bad-antics development | 4 |
| Firmware Backdoor | NULLSEC Firmware Backdoor - bad-antics development | 4 |
| Identity Forge | NULLSEC Identity Forge - bad-antics development | 4 |
| Intrusion | NULLSEC Network Intrusion - bad-antics development | 4 |
| Lateral Movement | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Mitm Attack | NULLSEC MITM Attack - FULLY FUNCTIONAL | 4 |
| Network Pivot | NULLSEC Network Pivot Module | 4 |
| Nullsec Common | NULLSEC Common Functions & Integration | 4 |
| Persistence | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Physical Bypass | NULLSEC Physical Bypass - bad-antics development | 4 |
| Port Scanner | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Pretexting | NULLSEC Pretexting - bad-antics development | 4 |
| Process Injection | NULLSEC Process Injection Module | 4 |
| Rat Deploy | NULLSEC RAT Deploy - bad-antics development | 4 |
| S3 Bucket Finder | NULLSEC AWS S3 Bucket Scanner Module | 4 |
| Session Hijack | NULLSEC Session Hijack - bad-antics development | 4 |
| Slowloris | NULLSEC Slowloris DoS - bad-antics development | 4 |
| Token Impersonate | NULLSEC Token Impersonation Module | 4 |
| Tor Service | NULLSEC Tor Hidden Service - bad-antics development | 4 |
| Vishing | NULLSEC Vishing Attack - bad-antics development | 4 |
| Vlan Hop | NULLSEC VLAN Hopping - bad-antics development | 4 |
| Vpn Tunnel | NULLSEC VPN Tunnel - bad-antics development | 4 |
| Worm | NULLSEC Worm Deploy - bad-antics development | 4 |
Password cracking, hash attacks, and credential stuffing
| Module | Description | Parameters |
|---|---|---|
| Ad Attack Enhanced | NULLSEC Active Directory Attack Module - Enhanced Edition | 4 |
| Cryptominer | NULLSEC Cryptominer Deploy - bad-antics development | 4 |
| Dir Bruteforce | NULLSEC Directory Bruteforce - FULLY FUNCTIONAL | 4 |
| Golden Ticket | NULLSEC Golden Ticket - bad-antics development | 4 |
| Kerberoast | NULLSEC Kerberoast - bad-antics development | 4 |
| Keylogger | NULLSEC Keylogger - FULLY FUNCTIONAL | 4 |
| Pass Hash | NULLSEC Pass-the-Hash - bad-antics development | 4 |
| Password Crack | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Rootkit | NULLSEC Rootkit - FULLY FUNCTIONAL | 4 |
| Stego | NULLSEC Steganography - bad-antics development | 4 |
Social engineering and phishing attacks
| Module | Description | Parameters |
|---|---|---|
| Social Engineering | NULLSEC Social Engineering - bad-antics development | 3 |
Web application testing and exploitation
| Module | Description | Parameters |
|---|---|---|
| Ai Poison | NULLSEC AI Poisoning - bad-antics development | 4 |
| Api Exploit | NULLSEC API Exploit - bad-antics development | 4 |
| Api Fuzzer | NULLSEC API Fuzzing & Testing Module | 4 |
| Cred Stuff | NULLSEC Credential Stuffing - bad-antics development | 4 |
| Darkweb Ops | NULLSEC Darkweb Operations - bad-antics development | 4 |
| Fileless | NULLSEC Fileless Malware - bad-antics development | 4 |
| Http2 Exploit | NULLSEC HTTP/2 Attacks Module | 4 |
| Http3 Attack | NULLSEC HTTP/3 Testing Module | 4 |
| Proxy Chain | NULLSEC Proxy Chain - bad-antics development | 4 |
| Smishing | NULLSEC Smishing Attack - bad-antics development | 4 |
| Supply Chain | NULLSEC Supply Chain Attack - bad-antics development | 4 |
| Watering Hole | NULLSEC Watering Hole Attack - bad-antics development | 4 |
| Web Exploit | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Webshell | NULLSEC Web Shell - bad-antics development | 4 |
| Websocket Attack | NULLSEC WebSocket Exploitation Module | 4 |
| Xss Attack | NULLSEC XSS Attack - FULLY FUNCTIONAL | 4 |
WiFi, Bluetooth, RFID, NFC, and wireless attacks
| Module | Description | Parameters |
|---|---|---|
| Bluetooth Attack | ▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓ | 4 |
| Nfc Attack | NULLSEC NFC Exploitation Module | 4 |
| Rf Jammer | NULLSEC RF Jammer - bad-antics development | 4 |
| Rfid Clone | NULLSEC RFID Cloning Module | 4 |
| Simulate | NULLSEC Attack Module Launcher | 4 |
| Wifi Deauth | NULLSEC WiFi Deauth - FULLY FUNCTIONAL | 4 |
| Zigbee Attack | NULLSEC ZigBee Attack - bad-antics development | 4 |
| Zigbee Exploit | NULLSEC Zigbee Attacks Module | 4 |
cd ~/nullsec
./nullsec-launcher.py
# Navigate to any module - automatically uses enhanced framework!cd ~/nullsec
python3 nullsec-launcher.py # Or use desktop icon
# All modules now have interactive parameter collectioncd ~/nullsec
python3 module-framework.py nullsecurity/<module>.sh nullsecurity/<module>.jsonEvery enhanced module includes:
- ✅ Rich Interactive Parameters - Smart prompts with validation
- ✅ Automatic Logging - All actions logged to
~/nullsec/logs/targets/[target]/ - ✅ Organized Output - Subdirectories for scans/, exploits/, credentials/, screenshots/
- ✅ Vulnerability Tracking - Auto-detection with severity levels
- ✅ Summary Reports - SUMMARY.md with findings and next steps
- ✅ Beautiful UI - Color-coded, formatted output
- ✅ Default Values - Suggested defaults for faster workflow
- ✅ Help Text - Descriptions and examples for every parameter
~/nullsec/logs/targets/
├── 192.168.1.100/
│ ├── SUMMARY.md
│ ├── port-scanner_20260114_153045.log
│ ├── scans/
│ ├── exploits/
│ ├── credentials/
│ └── screenshots/
└── example.com/
├── SUMMARY.md
└── xss-attack_20260114_154230.log
Modules use intelligent parameter types:
- IP Address - Validates IPv4/IPv6 addresses
- Port - Validates port numbers (1-65535)
- URL - Validates web URLs
- Domain - Validates domain names
- File - Validates file existence
- Choice - Numbered menu selection
- Boolean - Yes/No toggle
- String - Free text input
- MODULE_DEVELOPMENT_GUIDE.md - Developer guide for creating modules
- ENHANCED_FRAMEWORK_GUIDE.md - User guide for the framework
- MODULE_ENHANCEMENTS_SUMMARY.md - Overview of enhancements
All 185+ modules are now enhanced and ready for professional penetration testing!