From 46ee2bf588fad0495f8e8c640c8bd210c09d599e Mon Sep 17 00:00:00 2001 From: Dhrumil Mistry <56185972+dmdhrumilmistry@users.noreply.github.com> Date: Sun, 5 Jun 2022 15:30:03 +0530 Subject: [PATCH] fix 404 bug update README --- README.md | 147 ++++++++++++------------ attackers/Websites/vuln_scanner/sqli.py | 4 +- 2 files changed, 74 insertions(+), 77 deletions(-) diff --git a/README.md b/README.md index 6885296..3713668 100644 --- a/README.md +++ b/README.md @@ -1,13 +1,12 @@ # PyHTools - -![Image](https://github.com/dmdhrumilmistry/pyhtools/blob/main/.images/PyHTools.png?raw=true) +![Image](.images/PyHTools.png) - Python Hacking Tools (PyHTools) (pht) is a collection of python written hacking tools consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, and reverse_backdoor along with website login bruteforce, scraper, web spider etc. PHT also includes malwares which are undetectable by the antiviruses. -![PHT Image](https://github.com/dmdhrumilmistry/pyhtools/blob/main/.images/Windows_CLI-main.png) +![PHT Image](.images/Windows_CLI-main.png) -- The tools provided are for educational purposes only. The developers are no way responsible for misuse of information and tools provided. All the information and tools are meant to help newbies to learn new concepts. +- The tools provided are for educational purposes only. The developers are no way responsible for misuse of information and tools provided. All the information and tools are meant to help newbies to learn new concepts. - These tools are written in python3, refer installation to install/download tools and its dependencies. @@ -17,7 +16,7 @@ ### How To Videos -- Gain access to remote shell over the Internet using HTTP Backdoor +- Gain access to remote shell over the Internet using HTTP Backdoor [![YT Thumbnail](https://img.youtube.com/vi/Wg-PiywAqyw/maxresdefault.jpg)](https://youtu.be/Wg-PiywAqyw) @@ -26,125 +25,123 @@ 1. Open terminal 2. Install git package + ```bash sudo apt install git python3 -y ``` - + 3. clone the repository to your machine + ```bash git clone https://github.com/dmdhrumilmistry/pyhtools.git ``` + 4. Change directory + ```bash cd pyhtools ``` 5. install requirements + ```bash python3 -m pip install -r requirements.txt ``` ### Start PHTools -1. change to pyhtools directory +1. change to pyhtools directory + ```bash cd pyhtools ``` + 2. run pyhtools.py + ```bash python3 pyhtools.py ``` + 3. to get all the commands use `help` + ```bash pyhtools >> help ``` > There may be chances that pyfiglet or kamene will not be installed through requirements.txt, you can install manually using `pip3 install pyfiglet kamene`. -> If you're using Termux or windows, then use `pip` instead of `pip3`. +> If you're using Termux or windows, then use `pip` instead of `pip3`. ### Tools and Features - #### Attackers - - - `For Networks` - - Network Scanner - - Mac changer - - ARP Spoofing - - DNS spoofing - - Downloads Replacer - - Network Jammer - - Pkt Sniffer - - Code Injector - - `For Websites` - - Login Guesser (Login Bruteforcer) - - Web Spider - - Web crawler (detects dirs | subdomains) - - Web Vulnerablity Scanner - - #### Detectors - - - ARP Spoof Detector - - #### Malwares/Trojans/Payloads/Ransomwares/Worms - - - Email Sender (reporter) - - Downloader - - Wireless Password Harvester - - Credential Harvester - - Keylogger (dlogs) - - Reverse Backdoors - - [TCP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/TCP) - - [HTTP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/HTTP) - - Download and Execute - - [Telegram Data Harvester](https://github.com/dmdhrumilmistry/pyhtools/blob/main/malwares/telegram_data_harvester/HowToUse.md) - - [DMSecRansomware](https://github.com/dmdhrumilmistry/pyhtools/blob/main/ransomwares/dmsec/HowToUse.md) - - [Telegram Remote Code Executor](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/TelegramRemoteCodeExecutor) - - DirCloner - +#### Attackers + +- `For Networks` + - Network Scanner + - Mac changer + - ARP Spoofing + - DNS spoofing + - Downloads Replacer + - Network Jammer + - Pkt Sniffer + - Code Injector +- `For Websites` + - Login Guesser (Login Bruteforcer) + - Web Spider + - Web crawler (detects dirs | subdomains) + - Web Vulnerablity Scanner + +#### Detectors + +- ARP Spoof Detector + +#### Malwares/Trojans/Payloads/Ransomwares/Worms + +- Email Sender (reporter) +- Downloader +- Wireless Password Harvester +- Credential Harvester +- Keylogger (dlogs) +- Reverse Backdoors + - [TCP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/TCP) + - [HTTP](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/reverse_backdoor/HTTP) +- Download and Execute +- [Telegram Data Harvester](https://github.com/dmdhrumilmistry/pyhtools/blob/main/malwares/telegram_data_harvester/HowToUse.md) +- [DMSecRansomware](https://github.com/dmdhrumilmistry/pyhtools/blob/main/ransomwares/dmsec/HowToUse.md) +- [Telegram Remote Code Executor](https://github.com/dmdhrumilmistry/pyhtools/tree/main/malwares/TelegramRemoteCodeExecutor) +- DirCloner + > **NOTE:** Do not upload/send/report malwares to anti virus services such as `VirusTotal`. This will make program detectable - ### Dependencies **`PHT`** requires following programs/scripts to run properly - - - `Python` - - `subprocess` - - `scapy` - - `kamene` - - `pyfiglet` - - `argparse` - - `re` - - `sys` - - `os` - - `shutil` - - `pyinstaller` - + +- `Python` + - `subprocess` + - `scapy` + - `kamene` + - `pyfiglet` + - `argparse` + - `re` + - `sys` + - `os` + - `shutil` + - `pyinstaller` + > **NOTE:** most of the modules are pre-installed, still to ensure the proper working of scripts, user should install the required modules using pip - ### How to Package a Trojan - [View How to create a Trojan](https://github.com/dmdhrumilmistry/hacking_tools/blob/master/malwares/Trojans/HowToCreateTrojanPackage.md) - ### Have any Ideas 💡 or issue - Create an issue - Fork the repo, update script and create a Pull Request - + ### Connect With Me -

- - - - - - - - - - -
-

- +||Platforms|| +|:-:|:-:|:-:| +|[![GitHub](https://img.shields.io/badge/Github-dmdhrumilmistry-333)](https://github.com/dmdhrumilmistry)|[![LinkedIn](https://img.shields.io/badge/LinkedIn-Dhrumil%20Mistry-4078c0)](https://linkedin.com/in/dmdhrumilmistry)|[![Twitter](https://img.shields.io/badge/Twitter-dmdhrumilmistry-4078c0)](https://twitter.com/dmdhrumilmistry)| +|[![Instagram](https://img.shields.io/badge/Instagram-dmdhrumilmistry-833ab4)](https://instagram.com/dmdhrumilmistry/)|[![Blog](https://img.shields.io/badge/Blog-Dhrumil%20Mistry-bd2c00)](https://dhrumilmistrywrites.blogspot.com/)|[![Youtube](https://img.shields.io/badge/YouTube-Dhrumil%20Mistry-critical)](https://www.youtube.com/channel/UChbjrRvbzgY3BIomUI55XDQ)| diff --git a/attackers/Websites/vuln_scanner/sqli.py b/attackers/Websites/vuln_scanner/sqli.py index e2316b5..d11b581 100644 --- a/attackers/Websites/vuln_scanner/sqli.py +++ b/attackers/Websites/vuln_scanner/sqli.py @@ -34,7 +34,7 @@ def is_vulnerable(url: str) -> bool: response = get(url=url) content = response.content.lower() - if response.status_code != 200 or b'error' in content or b'on line' in content or b'at line' in content: + if response.status_code not in (200, 404) or b'error' in content or b'on line' in content or b'at line' in content: return True return False @@ -54,7 +54,7 @@ def enumerate_tests(url): payload_url = url + payload if is_vulnerable(payload_url): - print(f'[URL] {payload_url}') + print(f'[URL] "{payload_url}"') print(f'[PAYLOAD] {payload}') print('-'*40) vuln_links += 1