https://github.com/x4nth055/ethical-hacking-tools-python
Python programs & tools built in the Ethical Hacking with Python EBook
https://github.com/x4nth055/ethical-hacking-tools-python
email-extractor ethical-hacking ethical-hacking-tools forensics-investigations information-gathering malware-development network-security packet-manipulation password-cracker scapy
Last synced: 3 months ago
JSON representation
Python programs & tools built in the Ethical Hacking with Python EBook
- Host: GitHub
- URL: https://github.com/x4nth055/ethical-hacking-tools-python
- Owner: x4nth055
- License: mit
- Created: 2022-07-27T10:21:38.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2024-07-17T00:30:36.000Z (about 1 year ago)
- Last Synced: 2025-06-16T11:06:57.829Z (4 months ago)
- Topics: email-extractor, ethical-hacking, ethical-hacking-tools, forensics-investigations, information-gathering, malware-development, network-security, packet-manipulation, password-cracker, scapy
- Language: Python
- Homepage: https://www.thepythoncode.com/ethical-hacking-with-python-ebook
- Size: 9.2 MB
- Stars: 114
- Watchers: 9
- Forks: 45
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Tools & Scripts Built in the [Ethical Hacking with Python EBook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook)
The tools and scripts are built in the [Ethical Hacking with Python Ebook](https://www.thepythoncode.com/ethical-hacking-with-python-ebook).
More Python programs will be added to this repository as the book will be constantly improved and enriched.
Each of the tools and scripts is in a separate folder containing the `requirements.txt` to be installed via the following command:
```
pip install -r requirements.txt
```
The tools and scripts are:
## Chapter 1: [Information Gathering](chapter-1/)
- [Extracting Domain Name Info & Subdomain Scanner](chapter-1/domain-names/)
- [Reverse DNS Lookup](chapter-1/reverse-dns-lookup/)
- [Geolocating IP Addresses](chapter-1/geolocation/)
- [Port Scanning](chapter-1/port-scanning/)
- [Username Search Tool](chapter-1/username-search-tool/)
- [Bluetooth Scanner](chapter-1/bluetooth-scanner/)
## Chapter 2: [Building Malware](chapter-2/)
- [Making a Ransomware](chapter-2/ransomware/)
- [Making a Keylogger](chapter-2/keylogger/)
- [Making a Fork Bomb](chapter-2/fork-bomb/)
- [Making a Reverse Shell](chapter-2/simple-reverse-shell/)
- [Making an Advanced Reverse Shell](chapter-2/advanced-reverse-shell/)
- [Making Malware Persistence](chapter-2/persistent-malware/)
## Chapter 3: [Building Password Crackers](chapter-3/)
- [Wordlist Generator](chapter-3/wordlist-generator/)
- [Locking PDF/ZIP Files with Passwords](chapter-3/locking-files/)
- [Cracking ZIP Files](chapter-3/cracking/zip-cracker/)
- [Cracking PDF Files](chapter-3/cracking/pdf-cracker/)
- [Bruteforcing SSH Servers](chapter-3/cracking/bruteforce-ssh/)
- [Bruteforcing FTP Servers](chapter-3/cracking/bruteforce-ftp/)
- [Cryptographic Hashes](chapter-3/cracking/hash-cracker/)
- [Making a Password Generator](chapter-3/passwordgenerator/)
- [Checking Password Strength](chapter-3/password-evaluator/)
## Chapter 4: [Forensic Investigations](chapter-4/)
- [Extracting Metadata from Files](chapter-4/extract-metadata-from-files/)
- [Extracting PDF Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Image Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Audio/Video Metadata](chapter-4/extract-metadata-from-files/)
- [Extracting Docx Metadata](chapter-4/extract-metadata-from-files/)
- [Removing Metadata from Files](chapter-4/remove-metadata/)
- [Removing Metadata from PDF Files](chapter-4/remove-metadata/)
- [Removing Metadata from Image Files](chapter-4/remove-metadata/)
- [Removing Metadata from Audio/Video Files](chapter-4/remove-metadata/)
- [Removing Metadata from Docx Files](chapter-4/remove-metadata/)
- [Extracting Passwords from Chrome Browser](chapter-4/extract-chrome-data/)
- [Extracting Cookies from Chrome Browser](chapter-4/extract-chrome-data/)
- [Hiding Data in Images](chapter-4/steganography/)
- [Verifying File Integrity](chapter-4/file-integrity/)
- [Changing your MAC Address](chapter-4/mac-address-changer/)
- [Extracting Saved Wi-Fi Passwords](chapter-4/extract-wifi-passwords/)
- [Generating Fake Data](chapter-4/fake-data-generation/)
## Chapter 5: [Packet Manipulation using Scapy](chapter-5/)
- [DHCP Listener](chapter-5/dhcp-listener/)
- [Network Scanner](chapter-5/network-scanner/)
- [Wi-Fi Scanner](chapter-5/wifi-scanner/)
- [SYN Flooding Attack](chapter-5/syn-flood)
- [Creating Fake Access Points](chapter-5/fake-access-points/)
- [Disconnecting Devices](chapter-5/disconnect-devices/)
- [ARP Spoofing](chapter-5/arp-spoof/)
- [Detecting ARP Spoofing](chapter-5/detect-arp-spoof/)
- [DNS Spoofing](chapter-5/dns-spoof/)
- [Sniffing HTTP Packets](chapter-5/sniff-http-packets/)
- [Injecting Code into HTTP Responses](chapter-5/inject-code-onto-http/)
- [Advanced Network Scanner](chapter-5/advanced-network-scanner/)
## Chapter 6: [Extracting Email Addresses from the Web](chapter-6/)
- [Building a Simple Email Extractor](chapter-6/email-spider/)
- [Building an Advanced Email Spider](chapter-6/email-spider/)