Welcome to the Ethical Hacking Python Projects repository! This repository contains a collection of simple Python programs aimed at helping you explore and learn various concepts related to ethical hacking and cybersecurity. Please note that these programs are meant for educational purposes only and should never be used for any illegal or unethical activities.
The repository currently includes the following Python projects:
Dive into our array of security tools tailored for educational and authorized use:
- ARP Spoofer 🕵️♂️: Spoofs ARP packets on a local network, enhancing network security awareness.
- BruteForce FTP 🔐: Script for brute-forcing FTP login credentials using a wordlist.
- BruteForce SSH 🔑: Tool to guess and try SSH login details using a list of passwords.
- Backdoor 💻: Allows Remote command execution on a target machine; use responsibly for testing purposes.
- Code Injector 📥: Demonstrates HTML code injection techniques, fostering a deeper understanding of web vulnerabilities.
- Deauther attack 📶: Forcing devices to disconnect from a network by sending de-authentication frames.
- DHCP Listener 📡: Captures DHCP packets on a Wi-Fi network and displays relevant information about the devices.
- DNS Spoofer 🌐: Spoofs DNS responses to redirect traffic, highlighting potential security loopholes.
- DNS Lookup Tool 🔍: Script to perform DNS lookups for a user-specified target domain and record types.
- Download Module 📤: Downloads files from URLs securely and efficiently for legitimate purposes.
- Email Bomber 📧: Sends multiple emails to a target address, emphasizing email security configurations.
- Execute and Send Email 📤: Sends emails with the output of command executions, promoting secure communication practices.
- Fake Wifi Beacon 🚥: Create fake access points and fooling nearby devices by sending valid beacon frames to the air.
- IP Scanner 🌐: Scans a range of IP addresses to discover active hosts, aiding network exploration.
- Keylogger 📝: Records keystrokes for educational purposes, enhancing awareness about potential security risks.
- MAC Address Changer 🔄: Modifies the MAC address of a network interface on Unix-like systems for increased anonymity.
- Packet Sniffer 📶: Captures and analyzes network packets, providing insights into network data flow.
- PDF Cracker 🔓: Decrypt password-protected PDF files.
- Phone finder 📞: Retrieves comprehensive details about phone numbers, including country, carrier, and validity.
- Proxy 🌐: mitmproxy overlay script enhances web security testing through header manipulation and overlay injection.
- Ransomware 💼: Simulation designed to demonstrate the mechanics of ransomware attacks, utilizing symmetric and asymmetric encryption techniques.
- Replace Downloads 🔄: Intercepts and replaces website downloads, ensuring secure file retrieval.
- Shodan API 🌐: A JavaScript script to search for instances of Damn Vulnerable Web Application (DVWA) on Shodan and check if default credentials work.
- Trojan 🦠: A malicious PDF executor that downloads and runs a malicious PDF file, emphasizing caution against potential threats.
- WiFi Password Extractor 🔑: Retrieves saved WiFi passwords from Windows network profiles and sends them by e-mail to a defined address.
- WiFi All OS password extractor 🗝️: Retrieves saved WiFi passwords from Windows, Linux & MacOs.
- **Win_Destructor 💀: illustration of the potential risks of running untrusted code on a Windows machine by showcasing the deletion of essential system files.
- ZIP File Password Cracker 🧩: Cracks password-protected ZIP files using a dictionary attack, facilitating authorized access to protected content.
Each project in this repository is contained in its own directory and includes a separate README file with instructions on how to run the Python program and understand its functionality. Before running any of the projects, please review the README and ensure you have the necessary permissions to perform the actions in your environment.
Please use these programs responsibly and ethically.
The intent behind these projects is solely educational, meant to help you grasp the fundamental concepts of ethical hacking and cybersecurity. Under no circumstances should you use these programs for any malicious or illegal activities. Unauthorized access to computer systems, networks, or any form of data breach is illegal and unethical.
If you have ideas to improve any of the projects or want to add new ones, we welcome your contributions! Please fork this repository, create a new branch, and submit a pull request with your changes.
If you encounter any issues with the projects or have questions related to ethical hacking and cybersecurity, feel free to open an issue on this repository. We'll do our best to assist you.
The creator of this repository bears no responsibility for any misuse or consequences arising from the use of the programs in this repository. By accessing and using these projects, you accept and acknowledge the risks associated with ethical hacking activities.
Happy learning and exploring the exciting world of ethical hacking!