Skip to content

Usage Guide

hatiyar is a security toolkit designed for penetration testing, vulnerability assessment, and security research.

Find security modules by keyword:

Terminal window
# Search for Grafana vulnerabilities
hatiyar search grafana
# Find all 2021 CVEs
hatiyar search CVE-2021
# Search by vulnerability type
hatiyar search traversal

Check module details before running:

Terminal window
# View module info
hatiyar run cve.cve_2021_43798 --info
# Or by CVE ID
hatiyar run CVE-2021-43798 --info

This displays:

  • Module name and description
  • Author information
  • Required and optional parameters
  • Current option values

Execute a module with required options:

Terminal window
# Run Grafana path traversal exploit
hatiyar run cve.cve_2021_43798 \
--set RHOST=target.example.com \
--set PLUGIN=grafana
# Run with custom port and file
hatiyar run cve.cve_2021_43798 \
--set RHOST=192.168.1.100 \
--set RPORT=3000 \
--set PLUGIN=grafana \
--set FILE=/etc/passwd

Launch the interactive shell for advanced usage:

Terminal window
hatiyar shell

Shell commands:

  • ls - List all modules
  • ls cve - List CVE modules
  • search <query> - Search modules
  • use <module> - Load a module
  • show options - Display module options
  • set <option> <value> - Set an option
  • run - Execute the module
  • help - Show help
  • exit - Exit the shell

Start the web dashboard:

Terminal window
# Default (0.0.0.0:8000)
hatiyar serve
# Custom port
hatiyar serve --port 8080
# Localhost only
hatiyar serve --host 127.0.0.1
# Development mode with auto-reload
hatiyar serve --reload

Access the dashboard at: http://localhost:8000

Terminal window
--version, -v Show version and exit
--help Show help message

Search for modules by keyword:

Terminal window
hatiyar search <query>

Searches across:

  • Module names
  • Descriptions
  • CVE IDs
  • Categories
  • Authors

Execute a module:

Terminal window
hatiyar run <module> [OPTIONS]

Options:

  • --set KEY=VALUE - Set module options (can be used multiple times)
  • --info - Show module information before running
  • --help - Show command help

Examples:

Terminal window
# Show info first
hatiyar run CVE-2021-43798 --info
# Run with options
hatiyar run cve.cve_2021_43798 \
--set RHOST=example.com \
--set PLUGIN=grafana
# Multiple options
hatiyar run cve.cve_2021_42013 \
--set RHOST=apache.local \
--set RPORT=8080 \
--set FILE=/etc/passwd

Start interactive shell:

Terminal window
hatiyar shell

Start web server:

Terminal window
hatiyar serve [OPTIONS]

Options:

  • --host - Bind host address (default: 0.0.0.0)
  • --port - Bind port number (default: 8000)
  • --reload - Enable auto-reload for development

Display system information:

Terminal window
hatiyar info

Shows:

  • Version
  • Module statistics by category
  • Python version
  • Platform information

Exploit modules for known vulnerabilities:

Terminal window
# List all CVE modules
hatiyar shell
hatiyar> ls cve
# Search for specific CVE
hatiyar search CVE-2021-43798

Information gathering and reconnaissance tools:

Terminal window
hatiyar search enumeration

Cloud platform security assessments (AWS, Azure, GCP):

Terminal window
hatiyar search cloud

Platform-specific security tools:

Terminal window
hatiyar search platforms
Terminal window
# Step 1: Search for the vulnerability
hatiyar search grafana
# Step 2: View module details
hatiyar run cve.cve_2021_43798 --info
# Step 3: Run with required options
hatiyar run cve.cve_2021_43798 \
--set RHOST=target.com \
--set PLUGIN=grafana
Terminal window
# Start shell
hatiyar shell
# Inside shell:
hatiyar> search grafana
hatiyar> use cve.cve_2021_43798
hatiyar> show options
hatiyar> set RHOST target.example.com
hatiyar> set PLUGIN grafana
hatiyar> run
Terminal window
# Run by CVE ID instead of module path
hatiyar run CVE-2021-43798 --info
hatiyar run CVE-2021-43798 --set RHOST=target.com --set PLUGIN=grafana

Most modules support these common options:

  • RHOST - Target hostname or IP (usually required)
  • RPORT - Target port number
  • SCHEME - Protocol scheme (http/https)
  • TIMEOUT - Request timeout in seconds
  • VERIFY_SSL - Verify SSL certificates (True/False)
  • USER_AGENT - Custom User-Agent string

Check module info to see specific options:

Terminal window
hatiyar run <module> --info
  1. Always check module info first: Use --info to understand required options
  2. Use CVE IDs for quick access: hatiyar run CVE-2021-43798 instead of full path
  3. Search before running: Find the right module with hatiyar search
  4. Use shell for exploration: Interactive shell is great for discovering modules
  5. Web interface for documentation: Use hatiyar serve to browse modules visually
Terminal window
# List available modules
hatiyar search .
# Or use shell
hatiyar shell
hatiyar> ls
Terminal window
# Check required options
hatiyar run <module> --info

The module info shows which options are required (marked as “Yes” in the Required column).

Make sure hatiyar is properly installed:

Terminal window
# Check version
hatiyar --version
# Reinstall if needed
pip install -e .
Terminal window
# Main help
hatiyar --help
# Command-specific help
hatiyar run --help
hatiyar search --help
hatiyar shell --help
hatiyar serve --help

Check your hatiyar version:

Terminal window
hatiyar --version
hatiyar info