{"id":20778270,"url":"https://github.com/mustafadalga/code-injector","last_synced_at":"2025-04-30T18:43:25.979Z","repository":{"id":126220527,"uuid":"195135688","full_name":"mustafadalga/code-injector","owner":"mustafadalga","description":"Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enjekte ederek manipüle etmenize yarayan bir script.","archived":false,"fork":false,"pushed_at":"2020-06-24T10:39:32.000Z","size":21,"stargazers_count":19,"open_issues_count":0,"forks_count":2,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-03-30T18:51:10.352Z","etag":null,"topics":["code-injection","cyber-security","cyber-threat-intelligence","cybersecurity","exploit","hacker","hacking","hacking-code","hacking-tool","hacking-tools","hackingtools","python","python-3","python-script","python3","web-hackathon","web-hacking","website-hacking"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/mustafadalga.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-07-03T22:49:37.000Z","updated_at":"2025-01-23T14:47:54.000Z","dependencies_parsed_at":"2023-08-14T13:16:05.908Z","dependency_job_id":null,"html_url":"https://github.com/mustafadalga/code-injector","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mustafadalga%2Fcode-injector","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mustafadalga%2Fcode-injector/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mustafadalga%2Fcode-injector/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/mustafadalga%2Fcode-injector/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/mustafadalga","download_url":"https://codeload.github.com/mustafadalga/code-injector/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":251764660,"owners_count":21640112,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["code-injection","cyber-security","cyber-threat-intelligence","cybersecurity","exploit","hacker","hacking","hacking-code","hacking-tool","hacking-tools","hackingtools","python","python-3","python-script","python3","web-hackathon","web-hacking","website-hacking"],"created_at":"2024-11-17T13:20:33.468Z","updated_at":"2025-04-30T18:43:25.970Z","avatar_url":"https://github.com/mustafadalga.png","language":"Python","readme":"```\n _____           _        _____      _           _\n/  __ \\         | |      |_   _|    (_)         | |\n| /  \\/ ___   __| | ___    | | _ __  _  ___  ___| |_ ___  _ __\n| |    / _ \\ / _` |/ _ \\   | || '_ \\| |/ _ \\/ __| __/ _ \\| '__|\n| \\__/\\ (_) | (_| |  __/  _| || | | | |  __/ (__| || (_) | |\n \\____/\\___/ \\__,_|\\___|  \\___/_| |_| |\\___|\\___|\\__\\___/|_|\n                                   _/ |\n                                  |__/\n```\n\n## Açıklama\n**Aynı ağ içerisinde , ARP Spoofing saldırısı yapılmış hedef bilgisayarın ziyaret ettiği , HTTP protokolünü kullanan web sitelerine kod enjekte ederek manipüle etmenize yarayan bir script.**\n\n\n\u003chr\u003e\n\n\n### Kurulum\n* Linux için kurulum\n```\n  sudo pip install -r requirements.txt\n```\n\n\u003chr\u003e\n\n### Kullanım\n **Code İnjector**'u test edebilmek için [bu](https://github.com/mustafadalga/ARP-poisoning-packet-sniffer) script ile ARP Spoof saldırısı yapabilirsiniz.\n\n* Linux için kullanım\n\n```\n python codeInjector.py --kod ' Injection Kodu '\n```\n\n* Örnek kullanımlar\n\n```\npython codeInjector.py --kod '\u003cscript\u003ealert(\"This is a test:04.06.2019\");\u003c/script\u003e'\npython codeInjector.py --kod '\u003ch1 style=\"color:lime;background:#000\" align=\"center\"\u003eThis is a test\u003c/h1\u003e'\n```\n\n### Notlar\n* Python versiyonu:3.7.2\n* Sadece linux işletim sisteminde test edilmiştir.\n* Sadece http protokolü kullanan web sitelerine karşı çalışır.\n\n\n\n### Örnek Gösterim - Sanal Makine üzerinde\n* Hedef bilgisayar -  Windows 8 \n\n\n![1](https://user-images.githubusercontent.com/25087769/60630316-4f5b0880-9e02-11e9-880d-f314f5f6669e.PNG)\n\n\u003chr\u003e\n\n\n![2](https://user-images.githubusercontent.com/25087769/60630317-4f5b0880-9e02-11e9-982f-06932044dda1.PNG)\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmustafadalga%2Fcode-injector","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmustafadalga%2Fcode-injector","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmustafadalga%2Fcode-injector/lists"}