Skip to content

Commit

Permalink
fix 404 bug
Browse files Browse the repository at this point in the history
update README
  • Loading branch information
dmdhrumilmistry committed Jun 5, 2022
1 parent 4dbd25b commit 46ee2bf
Show file tree
Hide file tree
Showing 2 changed files with 74 additions and 77 deletions.
147 changes: 72 additions & 75 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,12 @@
# PyHTools

<!-- Image Dim: 940x788 -->
![Image](https://github.com/dmdhrumilmistry/pyhtools/blob/main/.images/PyHTools.png?raw=true)
![Image](.images/PyHTools.png)

- Python Hacking Tools (PyHTools) (pht) is a collection of python written hacking tools consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, and reverse_backdoor along with website login bruteforce, scraper, web spider etc. PHT also includes malwares which are undetectable by the antiviruses.

![PHT Image](https://github.com/dmdhrumilmistry/pyhtools/blob/main/.images/Windows_CLI-main.png)
![PHT Image](.images/Windows_CLI-main.png)

- The tools provided are for educational purposes only. The developers are no way responsible for misuse of information and tools provided. All the information and tools are meant to help newbies to learn new concepts.
- The tools provided are for educational purposes only. The developers are no way responsible for misuse of information and tools provided. All the information and tools are meant to help newbies to learn new concepts.

- These tools are written in python3, refer installation to install/download tools and its dependencies.

Expand All @@ -17,7 +16,7 @@

### How To Videos

- Gain access to remote shell over the Internet using HTTP Backdoor
- Gain access to remote shell over the Internet using HTTP Backdoor

[![YT Thumbnail](https://img.youtube.com/vi/Wg-PiywAqyw/maxresdefault.jpg)](https://youtu.be/Wg-PiywAqyw)

Expand All @@ -26,125 +25,123 @@
1. Open terminal

2. Install git package

```bash
sudo apt install git python3 -y
```

3. clone the repository to your machine

```bash
git clone https://github.com/dmdhrumilmistry/pyhtools.git
```

4. Change directory

```bash
cd pyhtools
```

5. install requirements

```bash
python3 -m pip install -r requirements.txt
```

### Start PHTools

1. change to pyhtools directory
1. change to pyhtools directory

```bash
cd pyhtools
```

2. run pyhtools.py

```bash
python3 pyhtools.py
```

3. to get all the commands use `help`

```bash
pyhtools >> help
```

> There may be chances that pyfiglet or kamene will not be installed through requirements.txt, you can install manually using `pip3 install pyfiglet kamene`.
> If you're using Termux or windows, then use `pip` instead of `pip3`.
> If you're using Termux or windows, then use `pip` instead of `pip3`.
### Tools and Features

#### Attackers
- `For Networks`
- Network Scanner
- Mac changer
- ARP Spoofing
- DNS spoofing
- Downloads Replacer
- Network Jammer
- Pkt Sniffer
- Code Injector
- `For Websites`
- Login Guesser (Login Bruteforcer)
- Web Spider
- Web crawler (detects dirs | subdomains)
- Web Vulnerablity Scanner

#### Detectors
- ARP Spoof Detector
#### Malwares/Trojans/Payloads/Ransomwares/Worms
- Email Sender (reporter)
- Downloader
- Wireless Password Harvester
- Credential Harvester
- Keylogger (dlogs)
- Reverse Backdoors
- [TCP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/TCP)
- [HTTP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/HTTP)
- Download and Execute
- [Telegram Data Harvester](https://github.com/dmdhrumilmistry/pyhtools/blob/main/malwares/telegram_data_harvester/HowToUse.md)
- [DMSecRansomware](https://github.com/dmdhrumilmistry/pyhtools/blob/main/ransomwares/dmsec/HowToUse.md)
- [Telegram Remote Code Executor](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/TelegramRemoteCodeExecutor)
- DirCloner
#### Attackers

- `For Networks`
- Network Scanner
- Mac changer
- ARP Spoofing
- DNS spoofing
- Downloads Replacer
- Network Jammer
- Pkt Sniffer
- Code Injector
- `For Websites`
- Login Guesser (Login Bruteforcer)
- Web Spider
- Web crawler (detects dirs | subdomains)
- Web Vulnerablity Scanner

#### Detectors

- ARP Spoof Detector

#### Malwares/Trojans/Payloads/Ransomwares/Worms

- Email Sender (reporter)
- Downloader
- Wireless Password Harvester
- Credential Harvester
- Keylogger (dlogs)
- Reverse Backdoors
- [TCP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/TCP)
- [HTTP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/HTTP)
- Download and Execute
- [Telegram Data Harvester](https://github.com/dmdhrumilmistry/pyhtools/blob/main/malwares/telegram_data_harvester/HowToUse.md)
- [DMSecRansomware](https://github.com/dmdhrumilmistry/pyhtools/blob/main/ransomwares/dmsec/HowToUse.md)
- [Telegram Remote Code Executor](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/TelegramRemoteCodeExecutor)
- DirCloner

> **NOTE:** Do not upload/send/report malwares to anti virus services such as `VirusTotal`. This will make program detectable
### Dependencies

**`PHT`** requires following programs/scripts to run properly -
- `Python`
- `subprocess`
- `scapy`
- `kamene`
- `pyfiglet`
- `argparse`
- `re`
- `sys`
- `os`
- `shutil`
- `pyinstaller`


- `Python`
- `subprocess`
- `scapy`
- `kamene`
- `pyfiglet`
- `argparse`
- `re`
- `sys`
- `os`
- `shutil`
- `pyinstaller`

> **NOTE:** most of the modules are pre-installed, still to ensure the proper working of scripts, user should install the required modules using pip
### How to Package a Trojan

- [View How to create a Trojan](https://github.com/dmdhrumilmistry/hacking_tools/blob/master/malwares/Trojans/HowToCreateTrojanPackage.md)


### Have any Ideas 💡 or issue

- Create an issue
- Fork the repo, update script and create a Pull Request

### Connect With Me

<p align ="center">
<table>
<tr>
<td><a hrf = "https://github.com/dmdhrumilmistry" target="_blank"><img src = "https://img.shields.io/badge/Github-dmdhrumilmistry-333"></a></td>
<td><a href = "https://www.instagram.com/dmdhrumilmistry/" target="_blank"><img src = "https://img.shields.io/badge/Instagram-dmdhrumilmistry-833ab4"></a></td>
<td><a href = "https://twitter.com/dmdhrumilmistry" target="_blank"><img src = "https://img.shields.io/badge/Twitter-dmdhrumilmistry-4078c0"></a></td>
</tr>
<tr>
<td><a href = "https://www.youtube.com/channel/UChbjrRvbzgY3BIomUI55XDQ" target="_blank"><img src = "https://img.shields.io/badge/YouTube-Dhrumil%20Mistry-critical"></a></td>
<td><a href = "https://dhrumilmistrywrites.blogspot.com/ " target="_blank"><img src = "https://img.shields.io/badge/Blog-Dhrumil%20Mistry-bd2c00"></a></td>
<td><a href = "https://www.linkedin.com/in/dmdhrumilmistry/" target="_blank"><img src = "https://img.shields.io/badge/LinkedIn-Dhrumil%20Mistry-4078c0"></a></td>
</table>
</p>

||Platforms||
|:-:|:-:|:-:|
|[![GitHub](https://img.shields.io/badge/Github-dmdhrumilmistry-333)](https://github.com/dmdhrumilmistry)|[![LinkedIn](https://img.shields.io/badge/LinkedIn-Dhrumil%20Mistry-4078c0)](https://linkedin.com/in/dmdhrumilmistry)|[![Twitter](https://img.shields.io/badge/Twitter-dmdhrumilmistry-4078c0)](https://twitter.com/dmdhrumilmistry)|
|[![Instagram](https://img.shields.io/badge/Instagram-dmdhrumilmistry-833ab4)](https://instagram.com/dmdhrumilmistry/)|[![Blog](https://img.shields.io/badge/Blog-Dhrumil%20Mistry-bd2c00)](https://dhrumilmistrywrites.blogspot.com/)|[![Youtube](https://img.shields.io/badge/YouTube-Dhrumil%20Mistry-critical)](https://www.youtube.com/channel/UChbjrRvbzgY3BIomUI55XDQ)|
4 changes: 2 additions & 2 deletions attackers/Websites/vuln_scanner/sqli.py
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ def is_vulnerable(url: str) -> bool:
response = get(url=url)
content = response.content.lower()

if response.status_code != 200 or b'error' in content or b'on line' in content or b'at line' in content:
if response.status_code not in (200, 404) or b'error' in content or b'on line' in content or b'at line' in content:
return True

return False
Expand All @@ -54,7 +54,7 @@ def enumerate_tests(url):
payload_url = url + payload

if is_vulnerable(payload_url):
print(f'[URL] {payload_url}')
print(f'[URL] "{payload_url}"')
print(f'[PAYLOAD] {payload}')
print('-'*40)
vuln_links += 1
Expand Down

0 comments on commit 46ee2bf

Please sign in to comment.