Kali Linux

Hacc The Hub : Open Source Self-Hosted Cyber Security Learning Platform

Hacc The Hub is an open source project that provides cyber security

The Hacc The Hub system consists of 3 main parts:

  • Docker: containing all of the boxes creating the environment in which we’ll be learning on.
  • The backend: controlling Docker and responsible for starting/destroying individual box in the system and managing the networking that joins them into a unified system.
  • The frontend: GUI for the user to interact with the system via their web browser.

Built With

  • Flask-RESTX
  • Next.js

Getting Started

To get HaccTheHub up and running, you would need to setup the followings

Prerequisites

  • Docker (refer to Docker’s Documentation for setup)
  • Python 3 (Download) or just install python3 from your package manager.
  • Node.js 16 (Download) or use your package manager

Installation

  • Clone the repo

git clone https://github.com/J4FSec/HaccTheHub.git

  • Install dependencies for the backend

cd HaccTheHub/backend
python3 -m pip install -r requirements.txt

  • And dependencies for the frontend

cd ../client
npm install

Usage

  • Start up Docker
  • Start the backend

cd ../backend
python3 main.py

And the frontend

cd ../client
npm start

The WebUI should now be accessible via http://localhost:8080.

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

7 minutes ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

4 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

4 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

4 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

1 day ago