Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/r3dhulk/python-for-ethical-hacking
Build tools for hacking ethically using python.
https://github.com/r3dhulk/python-for-ethical-hacking
ceh cehv10 cehv11 cyber-security cybersecurity data ethical ethical-hacking ethical-hacking-tools hackerrank hacking pentest pentest-tool pentesting pentesting-tools python python-for-ethical-hacker python-for-everybody python3 security
Last synced: 2 days ago
JSON representation
Build tools for hacking ethically using python.
- Host: GitHub
- URL: https://github.com/r3dhulk/python-for-ethical-hacking
- Owner: R3DHULK
- License: mit
- Created: 2022-10-23T19:32:01.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-01-12T18:32:44.000Z (10 months ago)
- Last Synced: 2024-05-16T01:14:02.306Z (6 months ago)
- Topics: ceh, cehv10, cehv11, cyber-security, cybersecurity, data, ethical, ethical-hacking, ethical-hacking-tools, hackerrank, hacking, pentest, pentest-tool, pentesting, pentesting-tools, python, python-for-ethical-hacker, python-for-everybody, python3, security
- Language: Python
- Homepage:
- Size: 8.4 MB
- Stars: 24
- Watchers: 2
- Forks: 10
- Open Issues: 0
-
Metadata Files:
- Readme: README.MD
- License: LICENSE.MD
Awesome Lists containing this project
README
Python For Ethical Hacking
#
๐ด Also Check out My Bash For Ethical Hackers Project
#
Author :
Sumalya Chatterjee
#
#
What is Ethical Hacking?
The term hacking goes a long way back. To be exact, it all started at the Railroad Club of MIT, where both the term โhackingโ and โhackerโ were first coined. Itโs been almost 50 years now, and hacking has evolved into a discipline in the current day and age. With the increase in awareness regarding data protection and data privacy, hacking has been deemed as an illegal activity today. If caught, thereโs a good chance that you will be prosecuted for quite some time depending on the degree of harm caused.
None the less, to protect themselves from hackers of all sorts, employment of Ethical Hackers has become a common practice amongst organizations. Ethical hackers are given the responsibility of finding and fixing security flaws for a certain organization before black hat hackers find them.
#
What is Python?
Python is a general-purpose scripting language that has gained immense popularity amongst professionals and beginners for its simplicity and powerful libraries. Python is insanely versatile and can be used for almost any kind of programming. From building small scale scripts that are meant to do banal tasks, to large scale system applications โ Python can be used anywhere and everywhere. In fact, NASA actually uses Python for programming their equipment and space machinery.
Python can also be used to process text, display numbers or images, solve scientific equations, and save data. In short, Python is used behind the scenes to process a lot of elements you might need or encounter on your devices.
#
Why Python?
Python has gained its popularity mostly because of its super powerful yet easy to use libraries. Sure Python has awesome readability and it is really simple and all but nothing really beats the fact your job as a developer is made super simple with these libraries. These libraries find uses in all sorts of domains, for example, artificial intelligence has Pytorch and Tensorflow while Data Science has Pandas, Scapy, Numpy, Matplotlib.
#
Why hackers should learn Python for pen testing
Python is used among hacking professionals for its powerful and user-friendly libraries. It provides readability and simplicity, which can help you complete your tasks more quickly and easily. Python libraries are also used for code-cracking, decoding, network scanning, and even network attacks.
#
Python Libraries for Ethical Hacking
Python is vastly popular because of its super-powerful yet easy-to-use libraries that are easily available to developers. Despite the fact that Python comes with minimal syntax and awesome readability, but nothing beats the fact that developerโs lives get really simple with these libraries which are available in all sorts of domains, for example, artificial intelligence has PI touch intensive loop while data science has pandas, NumPy, matplotlib, and so on. Here are some of the top 7 Python libraries used for hacking and each one has its unique identification and function.
1. Requests
The requests library helps one to allow HTTP requests to be more user-friendly. It returns responsive objects including data of status, encoding, and content. It is a module that can be used to send all kinds of HTTP requests it is very easy to use and has features like passing parameters in the URL and passing custom headers as well. It is a human-friendly HTTP library as it also suggests on the official documentation page as well and it is one of the most downloaded Python libraries with more than 400,000 downloads every day. Python requests are so popular because developers donโt have to manually add the queries to the URLs and form encode post data and that is reason enough to use Python requests.
2. Cryptography
Cryptography is a library that helps with encryption as well as the description of sets of data. The library includes primitives supported by Python 3.3+, Python 2.6-2.7. Cryptography involves the amalgamation of two layers that is, namely safe cryptographic recipes that require minimum configuration choices. While another one is low-level cryptography which is most dangerous and can be used incorrectly. This python library helps to secure information with the help of effectively developed codes. Cryptography includes the generation of random numbers, digital signatures, hashing, stream ciphers, and hashing.
3. Python-Nmap
Nmap is a typical network scanner tool using IP packets for the identification of devices on a network and information regarding operating systems. With the use of the Nmap port scanner, this library helps the system administrators automate the task for scanning reports supporting the Nmap scripts outputs. Nmap helps to identify and discover hosts on networks and detects the version number, application name functioning on any remote devices.
4. Impacket
The library consists of Python scripts that aids with working on network protocols, it ensures low-level programming access to other packets along with the implementation of the protocols. Packets can be made out of raw data, and the API makes deep hierarchies protocols work efficiently. Impacketโs goal is to make tasks easier for programmers so that they can work under a framework while abiding by some custom protocols.
5. Scapy
The tool to manipulate network packets, helping with discovering networks, probing, tracing, routing, and scanning. Scapy includes diverse functionalities apart from packet sniffing and can be customized as peruse. It can be run on Linux, Mac OS, and windows. It presents decoded packets with the interpretation depending on the user. Scapy works to bring semblance between high leveled protocols and low-level networks programming.
6. RawSocketPy
A layer 2 python library that encourages communication with MAC addresses. One can create custom-made WiFi communication using rawsocketpy. A non-simultaneous server with an uptight capability with no encryption needs an MTU of 1500. Rawsocketpy does not involve transmission control protocol or user datagram protocol.
7. Pylibnet
A libnet packet injection library ensures functionality for sending packets, presentation of libcap traces along with having a python API for libnet packets. These are some of the python libraries holding an efficacy under ethical hacking. Python language is used by tech companies because of its versatility and secure algorithms. Python gained much popularity in the last few decades. It has been used by a lot of developers, hackers of big companies because of its easy-to-understand and general-purpose syntax that can be applied to a large number of programming domains. There are countless python libraries available on the web, but the ones listed above are best suited for ethical hacking.
#
This Repo Has Sub-repos ๐๐๐ JUST CLICK ON IT ====>
## 01. [Admin Panel Finder](https://github.com/R3DHULK/is-this-your-admin)
## 02. [Arp Spoofing](https://github.com/R3DHULK/mission-arp)
## 03. [Arp Spoofing Detection](https://github.com/R3DHULK/mission-arp)
## 04. [Banner Grabber](https://github.com/R3DHULK/BannerGrab)
## 05. [BruteForce SSH](https://github.com/R3DHULK/bruteforce_ssh)
## 06. [Target: Chrome ](https://github.com/R3DHULK/targetting-chrome)
## 07. [DDOS](https://github.com/R3DHULK/HULK)
## 08. [Malware In Python](https://github.com/R3DHULK/malware-in-python)
## 09. [Image Exif Tool](https://github.com/R3DHULK/exif)
## 10. [Image Exifs Remover](https://github.com/R3DHULK/exif)
## 11. [PDF Exif Tool](https://github.com/R3DHULK/pdf-exif)
## 12. [Fake Mail](https://github.com/R3DHULK/fakemail)
## 13. [Keylogger](https://github.com/R3DHULK/keylogger-in-python)
## 14. [Password Sniffer](https://github.com/R3DHULK/passwordsniffer)
## 15. [File Monitor](https://github.com/R3DHULK/watchdog)
## 16. [Get Wifi-Password](https://github.com/R3DHULK/get_wifipass)
## 17. [System Information Gathering](https://github.com/R3DHULK/get-system-information)
## 18. [IP Scanner](https://github.com/R3DHULK/ip-scanner)
## 19. [Gmail Hacking](https://github.com/R3DHULK/ip-scanner)
## 20. [Network Monitoring](https://github.com/R3DHULK/all-about-network)
## 21. [Network Scanner](https://github.com/R3DHULK/ip-scanner)
## 22. [Port Scanner](https://github.com/R3DHULK/HulkScanner)
## 23. [Random Password And Token Generator](https://github.com/R3DHULK/password_and_token-generator)
## 24. [Shut Down My PC (For Windows Users Only)](https://github.com/R3DHULK/shut-my-pc-down)
## 25. [Shodan](https://github.com/R3DHULK/utilise_SHODAN-API)
## 26. [Sql Injection Detection](https://github.com/R3DHULK/sql-injection-detector)
## 27. [Steganography](https://github.com/R3DHULK/steganography)
## 28. [Subdomain Finder](https://github.com/R3DHULK/find-subdomains)
## 29. [Wifi DDoS Attack](https://github.com/R3DHULK/target-wifi)
## 30. [XSS Vulnerability Scanner](https://github.com/R3DHULK/xss-police)
## 31. [TCP Scanner](https://github.com/R3DHULK/HulkScanner)
## 32. [BruteForce Password](https://github.com/R3DHULK/bruteforce-password)
## 33. [Linux Password Cracker](https://github.com/R3DHULK/linux-pass-cracker)
## 34. [Bad USB](https://github.com/R3DHULK/bad-usb)
## 35. [Fake Details Generator](https://github.com/R3DHULK/lets-fake-it)
## 36. [Password Sniffer](https://github.com/R3DHULK/passwordsniffer)
## 37. [PwnKit Exploit](https://github.com/R3DHULK/Pwnkit-exploit)
## 38. [Mac Address Changer](https://github.com/R3DHULK/Mac-Changer)
## 39. [Anonymity Checker](https://github.com/R3DHULK/am-i-anonymous)
#Git Installation :
```
sudo apt install gitsudo apt install python
git clone https://github.com/R3DHULK/python-for-ethical-hacking
cd python-for-ethical-hacking
python -m pip install -r requirements.txt
sudo python
```#
Found Issues??
Post Your Issues
In Future Releases Founded Bugs Will Be Resolved And Many Other Tools Will Be Added ๐๐๐๐
#
Show Support ๐๐๐