███▄ █ █ ██ ██▓ ██▓ ██████ ▓█████ ▄████▄
██ ▀█ █ ██ ▓██▒▓██▒ ▓██▒ ▒██ ▒ ▓█ ▀ ▒██▀ ▀█
▓██ ▀█ ██▒▓██ ▒██░▒██░ ▒██░ ░ ▓██▄ ▒███ ▒▓█ ▄
▓██▒ ▐▌██▒▓▓█ ░██░▒██░ ▒██░ ▒ ██▒▒▓█ ▄ ▒▓▓▄ ▄██▒
▒██░ ▓██░▒▒█████▓ ░██████▒░██████▒▒██████▒▒░▒████▒▒ ▓███▀ ░
░ ▒░ ▒ ▒ ░▒▓▒ ▒ ▒ ░ ▒░▓ ░░ ▒░▓ ░▒ ▒▓▒ ▒ ░░░ ▒░ ░░ ░▒ ▒ ░
░ ░░ ░ ▒░░░▒░ ░ ░ ░ ░ ▒ ░░ ░ ▒ ░░ ░▒ ░ ░ ░ ░ ░ ░ ▒
░ ░ ░ ░░░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
█░░░░░░░░░░░░░░░ F R A M E W O R K ░░░░░░░░░░░░░░░░░░░░░░░█
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
bad-antics
The unified command center for all NullSec security tools
NullSec Framework is a modular penetration testing and security research framework that integrates all NullSec tools into a cohesive environment. It provides a unified interface for reconnaissance, exploitation, forensics, and post-exploitation activities.
- 🎯 Unified Interface - Single CLI for all NullSec modules
- 📦 Module System - Easy integration of new tools
- 🔧 Auto-Configuration - Detects and configures available tools
- 📊 Session Management - Track targets, findings, and artifacts
- 🔄 Workflow Automation - Chain modules for complex operations
- 📝 Reporting - Generate detailed assessment reports
| Tool | Language | Description |
|---|---|---|
| nullsec-recon | Go, Rust, Python | Active/passive reconnaissance toolkit |
| nullsec-portscan | Elixir | Lightning-fast async port scanner |
| nullsec-sniffer | Clojure | Network packet analyzer |
| Tool | Language | Description |
|---|---|---|
| nullsec-exploit | Python, C, Rust | Exploit development toolkit |
| nullsec-injector | Odin | Process memory injector |
| nullsec-web | TypeScript, Python | Web application security |
| Tool | Language | Description |
|---|---|---|
| nullsec-crypto | Rust, Python, C, Crystal | Cryptographic analysis toolkit |
| nullsec-hashwitch | Julia | High-performance hash cracker |
| Tool | Language | Description |
|---|---|---|
| nullsec-forensics | Go, Python, Rust | Digital forensics toolkit |
| nullsec-logwipe | Scala | Log analysis and manipulation |
| Tool | Language | Description |
|---|---|---|
| nullsec-stealth | Crystal, Lua, D, Haskell, V | Anti-detection toolkit |
| nullsec-cloaker | Erlang | Process and file cloaking |
| Tool | Language | Description |
|---|---|---|
| nullsec-beacon | OCaml | Lightweight beacon system |
| nullsec-keysniff | F# | Keyboard event monitor |
| Tool | Language | Description |
|---|---|---|
| nullsec-wifi | Kotlin, Java | WiFi security toolkit |
| nullsec-bluetooth | Kotlin, Java | Bluetooth security toolkit |
| Tool | Language | Description |
|---|---|---|
| nullsec-android | Kotlin, Java | Android security toolkit |
| nullsec-ios | Swift, Objective-C | iOS security toolkit |
# Clone framework
git clone https://github.com/bad-antics/nullsec-framework.git
cd nullsec-framework
# Install dependencies
pip install -r requirements.txt
# Initialize framework
./nullsec init
# Auto-detect and configure modules
./nullsec setup --auto# Start interactive shell
./nullsec console
# List available modules
nullsec> modules list
# Load a module
nullsec> use recon/portscan
# Set options
nullsec> set target 192.168.1.0/24
nullsec> set ports 1-1000
# Run module
nullsec> run
# Generate report
nullsec> report html output.html# Install a module
./nullsec module install nullsec-beacon
# Update all modules
./nullsec module update --all
# Create new module
./nullsec module create my-tool --language python
# List installed modules
./nullsec module list --installed# ~/.nullsec/config.yaml
framework:
workspace: ~/nullsec-workspace
auto_save: true
verbose: false
modules:
path: ~/.nullsec/modules
auto_load: true
database:
type: sqlite
path: ~/.nullsec/data.db
reporting:
default_format: html
include_screenshots: trueThe framework supports modules written in 30+ programming languages:
| Category | Languages |
|---|---|
| Systems | Rust, Go, C, C++, Zig, Odin, D, V |
| Scripting | Python, Ruby, Lua, Perl |
| JVM | Kotlin, Java, Scala, Clojure |
| Functional | Haskell, OCaml, F#, Erlang, Elixir |
| Web | TypeScript, JavaScript |
| Apple | Swift, Objective-C |
| Other | Nim, Crystal, Julia |
nullsec-framework/
├── nullsec # Main entry point
├── core/ # Framework core
│ ├── console.py # Interactive console
│ ├── module.py # Module management
│ ├── session.py # Session handling
│ └── config.py # Configuration
├── modules/ # Module directory
│ ├── recon/
│ ├── exploit/
│ ├── forensics/
│ └── ...
├── lib/ # Shared libraries
├── data/ # Data files
└── docs/ # Documentation
# modules/my_module/my_module.py
from nullsec.core.module import Module
class MyModule(Module):
name = "my_module"
description = "My custom module"
author = "bad-antics"
options = {
"target": {"required": True, "description": "Target address"},
"port": {"required": False, "default": 80, "description": "Port number"}
}
def run(self):
target = self.options["target"]
self.log_info(f"Running against {target}")
# Module logic here
return self.results- NullSec Linux - Security-focused Linux distribution
- NullSec Docs - Documentation and tutorials
- NullSec Themes - Terminal and editor themes
- Discord: discord.gg/killers
- GitHub: @bad-antics
This framework is intended for authorized security testing and educational purposes only. Users are responsible for obtaining proper authorization before testing any systems. Unauthorized access to computer systems is illegal.
NullSec Proprietary License
bad-antics - NullSec Security Team
The unified penetration testing platform