An open API service indexing awesome lists of open source software.

https://github.com/x4nth055/ethical-hacking-tools-python

Python programs & tools built in the Ethical Hacking with Python EBook
https://github.com/x4nth055/ethical-hacking-tools-python

email-extractor ethical-hacking ethical-hacking-tools forensics-investigations information-gathering malware-development network-security packet-manipulation password-cracker scapy

Last synced: 3 months ago
JSON representation

Python programs & tools built in the Ethical Hacking with Python EBook

Awesome Lists containing this project

README

          

# Tools & Scripts Built in the [Ethical Hacking with Python EBook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook)

The tools and scripts are built in the [Ethical Hacking with Python Ebook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook).

More Python programs will be added to this repository as the book will be constantly improved and enriched.

Each of the tools and scripts is in a separate folder containing the `requirements.txt` to be installed via the following command:
```
pip install -r requirements.txt
```
The tools and scripts are:
## Chapter 1: [Information Gathering](chapter-1/)
- [Extracting Domain Name Info & Subdomain Scanner](chapter-1/domain-names/)
- [Reverse DNS Lookup](chapter-1/reverse-dns-lookup/)
- [Geolocating IP Addresses](chapter-1/geolocation/)
- [Port Scanning](chapter-1/port-scanning/)
- [Username Search Tool](chapter-1/username-search-tool/)
- [Bluetooth Scanner](chapter-1/bluetooth-scanner/)
## Chapter 2: [Building Malware](chapter-2/)
- [Making a Ransomware](chapter-2/ransomware/)
- [Making a Keylogger](chapter-2/keylogger/)
- [Making a Fork Bomb](chapter-2/fork-bomb/)
- [Making a Reverse Shell](chapter-2/simple-reverse-shell/)
- [Making an Advanced Reverse Shell](chapter-2/advanced-reverse-shell/)
- [Making Malware Persistence](chapter-2/persistent-malware/)
## Chapter 3: [Building Password Crackers](chapter-3/)
- [Wordlist Generator](chapter-3/wordlist-generator/)
- [Locking PDF/ZIP Files with Passwords](chapter-3/locking-files/)
- [Cracking ZIP Files](chapter-3/cracking/zip-cracker/)
- [Cracking PDF Files](chapter-3/cracking/pdf-cracker/)
- [Bruteforcing SSH Servers](chapter-3/cracking/bruteforce-ssh/)
- [Bruteforcing FTP Servers](chapter-3/cracking/bruteforce-ftp/)
- [Cryptographic Hashes](chapter-3/cracking/hash-cracker/)
- [Making a Password Generator](chapter-3/passwordgenerator/)
- [Checking Password Strength](chapter-3/password-evaluator/)
## Chapter 4: [Forensic Investigations](chapter-4/)
- [Extracting Metadata from Files](chapter-4/extract-metadata-from-files/)
- [Extracting PDF Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Image Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Audio/Video Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Docx Metadata](chapter-4/extract-metadata-from-files/)
- [Removing Metadata from Files](chapter-4/remove-metadata/)
- [Removing Metadata from PDF Files](chapter-4/remove-metadata/)
- [Removing Metadata from Image Files](chapter-4/remove-metadata/)
- [Removing Metadata from Audio/Video Files](chapter-4/remove-metadata/)
- [Removing Metadata from Docx Files](chapter-4/remove-metadata/)
- [Extracting Passwords from Chrome Browser](chapter-4/extract-chrome-data/)
- [Extracting Cookies from Chrome Browser](chapter-4/extract-chrome-data/)
- [Hiding Data in Images](chapter-4/steganography/)
- [Verifying File Integrity](chapter-4/file-integrity/)
- [Changing your MAC Address](chapter-4/mac-address-changer/)
- [Extracting Saved Wi-Fi Passwords](chapter-4/extract-wifi-passwords/)
- [Generating Fake Data](chapter-4/fake-data-generation/)
## Chapter 5: [Packet Manipulation using Scapy](chapter-5/)
- [DHCP Listener](chapter-5/dhcp-listener/)
- [Network Scanner](chapter-5/network-scanner/)
- [Wi-Fi Scanner](chapter-5/wifi-scanner/)
- [SYN Flooding Attack](chapter-5/syn-flood)
- [Creating Fake Access Points](chapter-5/fake-access-points/)
- [Disconnecting Devices](chapter-5/disconnect-devices/)
- [ARP Spoofing](chapter-5/arp-spoof/)
- [Detecting ARP Spoofing](chapter-5/detect-arp-spoof/)
- [DNS Spoofing](chapter-5/dns-spoof/)
- [Sniffing HTTP Packets](chapter-5/sniff-http-packets/)
- [Injecting Code into HTTP Responses](chapter-5/inject-code-onto-http/)
- [Advanced Network Scanner](chapter-5/advanced-network-scanner/)
## Chapter 6: [Extracting Email Addresses from the Web](chapter-6/)
- [Building a Simple Email Extractor](chapter-6/email-spider/)
- [Building an Advanced Email Spider](chapter-6/email-spider/)