Usage Guide
hatiyar is a security toolkit designed for penetration testing, vulnerability assessment, and security research.
Quick Start
Section titled “Quick Start”1. Search for Modules
Section titled “1. Search for Modules”Find security modules by keyword:
# Search for Grafana vulnerabilitieshatiyar search grafana
# Find all 2021 CVEshatiyar search CVE-2021
# Search by vulnerability typehatiyar search traversal2. View Module Information
Section titled “2. View Module Information”Check module details before running:
# View module infohatiyar run cve.cve_2021_43798 --info
# Or by CVE IDhatiyar run CVE-2021-43798 --infoThis displays:
- Module name and description
- Author information
- Required and optional parameters
- Current option values
3. Run a Module
Section titled “3. Run a Module”Execute a module with required options:
# Run Grafana path traversal exploithatiyar run cve.cve_2021_43798 \ --set RHOST=target.example.com \ --set PLUGIN=grafana
# Run with custom port and filehatiyar run cve.cve_2021_43798 \ --set RHOST=192.168.1.100 \ --set RPORT=3000 \ --set PLUGIN=grafana \ --set FILE=/etc/passwd4. Interactive Shell
Section titled “4. Interactive Shell”Launch the interactive shell for advanced usage:
hatiyar shellShell commands:
ls- List all modulesls cve- List CVE modulessearch <query>- Search modulesuse <module>- Load a moduleshow options- Display module optionsset <option> <value>- Set an optionrun- Execute the modulehelp- Show helpexit- Exit the shell
5. Web Interface
Section titled “5. Web Interface”Start the web dashboard:
# Default (0.0.0.0:8000)hatiyar serve
# Custom porthatiyar serve --port 8080
# Localhost onlyhatiyar serve --host 127.0.0.1
# Development mode with auto-reloadhatiyar serve --reloadAccess the dashboard at: http://localhost:8000
Command Reference
Section titled “Command Reference”Global Options
Section titled “Global Options”--version, -v Show version and exit--help Show help messageCommands
Section titled “Commands”search
Section titled “search”Search for modules by keyword:
hatiyar search <query>Searches across:
- Module names
- Descriptions
- CVE IDs
- Categories
- Authors
Execute a module:
hatiyar run <module> [OPTIONS]Options:
--set KEY=VALUE- Set module options (can be used multiple times)--info- Show module information before running--help- Show command help
Examples:
# Show info firsthatiyar run CVE-2021-43798 --info
# Run with optionshatiyar run cve.cve_2021_43798 \ --set RHOST=example.com \ --set PLUGIN=grafana
# Multiple optionshatiyar run cve.cve_2021_42013 \ --set RHOST=apache.local \ --set RPORT=8080 \ --set FILE=/etc/passwdStart interactive shell:
hatiyar shellStart web server:
hatiyar serve [OPTIONS]Options:
--host- Bind host address (default: 0.0.0.0)--port- Bind port number (default: 8000)--reload- Enable auto-reload for development
Display system information:
hatiyar infoShows:
- Version
- Module statistics by category
- Python version
- Platform information
Module Types
Section titled “Module Types”CVE Modules
Section titled “CVE Modules”Exploit modules for known vulnerabilities:
# List all CVE moduleshatiyar shellhatiyar> ls cve
# Search for specific CVEhatiyar search CVE-2021-43798Enumeration Modules
Section titled “Enumeration Modules”Information gathering and reconnaissance tools:
hatiyar search enumerationCloud Modules
Section titled “Cloud Modules”Cloud platform security assessments (AWS, Azure, GCP):
hatiyar search cloudPlatform Modules
Section titled “Platform Modules”Platform-specific security tools:
hatiyar search platformsWorkflow Examples
Section titled “Workflow Examples”Example 1: Running a CVE Exploit
Section titled “Example 1: Running a CVE Exploit”# Step 1: Search for the vulnerabilityhatiyar search grafana
# Step 2: View module detailshatiyar run cve.cve_2021_43798 --info
# Step 3: Run with required optionshatiyar run cve.cve_2021_43798 \ --set RHOST=target.com \ --set PLUGIN=grafanaExample 2: Interactive Shell Workflow
Section titled “Example 2: Interactive Shell Workflow”# Start shellhatiyar shell
# Inside shell:hatiyar> search grafanahatiyar> use cve.cve_2021_43798hatiyar> show optionshatiyar> set RHOST target.example.comhatiyar> set PLUGIN grafanahatiyar> runExample 3: Using CVE ID Directly
Section titled “Example 3: Using CVE ID Directly”# Run by CVE ID instead of module pathhatiyar run CVE-2021-43798 --infohatiyar run CVE-2021-43798 --set RHOST=target.com --set PLUGIN=grafanaModule Options
Section titled “Module Options”Most modules support these common options:
Network Options
Section titled “Network Options”RHOST- Target hostname or IP (usually required)RPORT- Target port numberSCHEME- Protocol scheme (http/https)
Request Options
Section titled “Request Options”TIMEOUT- Request timeout in secondsVERIFY_SSL- Verify SSL certificates (True/False)USER_AGENT- Custom User-Agent string
Module-Specific Options
Section titled “Module-Specific Options”Check module info to see specific options:
hatiyar run <module> --infoTips and Best Practices
Section titled “Tips and Best Practices”- Always check module info first: Use
--infoto understand required options - Use CVE IDs for quick access:
hatiyar run CVE-2021-43798instead of full path - Search before running: Find the right module with
hatiyar search - Use shell for exploration: Interactive shell is great for discovering modules
- Web interface for documentation: Use
hatiyar serveto browse modules visually
Troubleshooting
Section titled “Troubleshooting”Module not found
Section titled “Module not found”# List available moduleshatiyar search .
# Or use shellhatiyar shellhatiyar> lsMissing required options
Section titled “Missing required options”# Check required optionshatiyar run <module> --infoThe module info shows which options are required (marked as “Yes” in the Required column).
Command not found
Section titled “Command not found”Make sure hatiyar is properly installed:
# Check versionhatiyar --version
# Reinstall if neededpip install -e .Getting Help
Section titled “Getting Help”# Main helphatiyar --help
# Command-specific helphatiyar run --helphatiyar search --helphatiyar shell --helphatiyar serve --helpVersion Information
Section titled “Version Information”Check your hatiyar version:
hatiyar --versionhatiyar info