{"id":15640274,"url":"https://github.com/x4nth055/ethical-hacking-tools-python","last_synced_at":"2025-07-08T20:32:36.797Z","repository":{"id":100511855,"uuid":"518409818","full_name":"x4nth055/ethical-hacking-tools-python","owner":"x4nth055","description":"Python programs \u0026 tools built in the Ethical Hacking with Python EBook","archived":false,"fork":false,"pushed_at":"2024-07-17T00:30:36.000Z","size":9642,"stargazers_count":114,"open_issues_count":3,"forks_count":45,"subscribers_count":9,"default_branch":"main","last_synced_at":"2025-06-16T11:06:57.829Z","etag":null,"topics":["email-extractor","ethical-hacking","ethical-hacking-tools","forensics-investigations","information-gathering","malware-development","network-security","packet-manipulation","password-cracker","scapy"],"latest_commit_sha":null,"homepage":"https://www.thepythoncode.com/ethical-hacking-with-python-ebook","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/x4nth055.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-07-27T10:21:38.000Z","updated_at":"2025-06-14T18:44:50.000Z","dependencies_parsed_at":"2024-10-23T05:09:20.679Z","dependency_job_id":null,"html_url":"https://github.com/x4nth055/ethical-hacking-tools-python","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/x4nth055/ethical-hacking-tools-python","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x4nth055%2Fethical-hacking-tools-python","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x4nth055%2Fethical-hacking-tools-python/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x4nth055%2Fethical-hacking-tools-python/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x4nth055%2Fethical-hacking-tools-python/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/x4nth055","download_url":"https://codeload.github.com/x4nth055/ethical-hacking-tools-python/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/x4nth055%2Fethical-hacking-tools-python/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":264343786,"owners_count":23593790,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["email-extractor","ethical-hacking","ethical-hacking-tools","forensics-investigations","information-gathering","malware-development","network-security","packet-manipulation","password-cracker","scapy"],"created_at":"2024-10-03T11:33:32.090Z","updated_at":"2025-07-08T20:32:36.774Z","avatar_url":"https://github.com/x4nth055.png","language":"Python","readme":"# Tools \u0026 Scripts Built in the [Ethical Hacking with Python EBook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook)\n\nThe tools and scripts are built in the [Ethical Hacking with Python Ebook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook).\n\nMore Python programs will be added to this repository as the book will be constantly improved and enriched.\n\nEach of the tools and scripts is in a separate folder containing the `requirements.txt` to be installed via the following command:\n```\npip install -r requirements.txt\n```\nThe tools and scripts are:\n## Chapter 1: [Information Gathering](chapter-1/)\n- [Extracting Domain Name Info \u0026 Subdomain Scanner](chapter-1/domain-names/)\n- [Reverse DNS Lookup](chapter-1/reverse-dns-lookup/)\n- [Geolocating IP Addresses](chapter-1/geolocation/)\n- [Port Scanning](chapter-1/port-scanning/)\n- [Username Search Tool](chapter-1/username-search-tool/)\n- [Bluetooth Scanner](chapter-1/bluetooth-scanner/)\n## Chapter 2: [Building Malware](chapter-2/)\n- [Making a Ransomware](chapter-2/ransomware/)\n- [Making a Keylogger](chapter-2/keylogger/)\n- [Making a Fork Bomb](chapter-2/fork-bomb/)\n- [Making a Reverse Shell](chapter-2/simple-reverse-shell/)\n- [Making an Advanced Reverse Shell](chapter-2/advanced-reverse-shell/)\n- [Making Malware Persistence](chapter-2/persistent-malware/)\n## Chapter 3: [Building Password Crackers](chapter-3/)\n- [Wordlist Generator](chapter-3/wordlist-generator/)\n- [Locking PDF/ZIP Files with Passwords](chapter-3/locking-files/)\n- [Cracking ZIP Files](chapter-3/cracking/zip-cracker/)\n- [Cracking PDF Files](chapter-3/cracking/pdf-cracker/)\n- [Bruteforcing SSH Servers](chapter-3/cracking/bruteforce-ssh/)\n- [Bruteforcing FTP Servers](chapter-3/cracking/bruteforce-ftp/)\n- [Cryptographic Hashes](chapter-3/cracking/hash-cracker/)\n- [Making a Password Generator](chapter-3/passwordgenerator/)\n- [Checking Password Strength](chapter-3/password-evaluator/)\n## Chapter 4: [Forensic Investigations](chapter-4/)\n- [Extracting Metadata from Files](chapter-4/extract-metadata-from-files/)\n    - [Extracting PDF Metadata](chapter-4/extract-metadata-from-files/)\n    - [Extracting Image Metadata](chapter-4/extract-metadata-from-files/)\n    - [Extracting Audio/Video Metadata](chapter-4/extract-metadata-from-files/)\n    - [Extracting Docx Metadata](chapter-4/extract-metadata-from-files/)\n- [Removing Metadata from Files](chapter-4/remove-metadata/)\n    - [Removing Metadata from PDF Files](chapter-4/remove-metadata/)\n    - [Removing Metadata from Image Files](chapter-4/remove-metadata/)\n    - [Removing Metadata from Audio/Video Files](chapter-4/remove-metadata/)\n    - [Removing Metadata from Docx Files](chapter-4/remove-metadata/)\n- [Extracting Passwords from Chrome Browser](chapter-4/extract-chrome-data/)\n- [Extracting Cookies from Chrome Browser](chapter-4/extract-chrome-data/)\n- [Hiding Data in Images](chapter-4/steganography/)\n- [Verifying File Integrity](chapter-4/file-integrity/)\n- [Changing your MAC Address](chapter-4/mac-address-changer/)\n- [Extracting Saved Wi-Fi Passwords](chapter-4/extract-wifi-passwords/)\n- [Generating Fake Data](chapter-4/fake-data-generation/)\n## Chapter 5: [Packet Manipulation using Scapy](chapter-5/)\n- [DHCP Listener](chapter-5/dhcp-listener/)\n- [Network Scanner](chapter-5/network-scanner/)\n- [Wi-Fi Scanner](chapter-5/wifi-scanner/)\n- [SYN Flooding Attack](chapter-5/syn-flood)\n- [Creating Fake Access Points](chapter-5/fake-access-points/)\n- [Disconnecting Devices](chapter-5/disconnect-devices/)\n- [ARP Spoofing](chapter-5/arp-spoof/)\n- [Detecting ARP Spoofing](chapter-5/detect-arp-spoof/)\n- [DNS Spoofing](chapter-5/dns-spoof/)\n- [Sniffing HTTP Packets](chapter-5/sniff-http-packets/)\n- [Injecting Code into HTTP Responses](chapter-5/inject-code-onto-http/)\n- [Advanced Network Scanner](chapter-5/advanced-network-scanner/)\n## Chapter 6: [Extracting Email Addresses from the Web](chapter-6/)\n- [Building a Simple Email Extractor](chapter-6/email-spider/)\n- [Building an Advanced Email Spider](chapter-6/email-spider/)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fx4nth055%2Fethical-hacking-tools-python","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fx4nth055%2Fethical-hacking-tools-python","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fx4nth055%2Fethical-hacking-tools-python/lists"}