Simplyfing the process of creating cybersecurity tools
Project description
SimplyHack
SimplyHack is currently under construction and is not completly ready for use yet! You may encounter many bugs while using SimplyHack, so feel free to report those to me on my Instagram. Instagram - Abhishek Dangat - @abhishek0.deb. Currently experimenting and planning.
Developed by - Abhishek Dangat
A guide on how to use
Installation
sudo apt update && sudo apt install python3-pip
pip3 install simplyhack
if this gives errors, try :-
sudo apt update && sudo apt install python3-pip
pip3 install simplyhack==0.0.7
[Reconnaissance]
Subdomain scanner
- domain = domain name of the target. eg: (domain="example.com")
- protocol = The protocol of the specified domain name. eg: (protocol="http" OR protocol="https")
- wordlist = The wordlist of subdomains for scanning. eg: (wordlist="default" OR wordlist="somewordlistfile.txt")
Note: You should specify only on of the options for protocol and wordlist For protocol, either specify
protocol="http"
or specifyprotocol="https"
For wordlist, either specifywordlist="default"
to use the default wordlist, but you have a wordlist of your own, specifywordlist="wordlistname.txt"
import simplyhack
# or use - from simplyhack import subdomain_scan
# IF you want to use the default wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="https/https", wordlist="default")
# OR if you want to specify your own wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="http/https", wordlist="wordlist.txt")
Discover hidden directories
- domain = domain name of the target. eg: (domain="example.com")
- wordlist = The wordlist of subdomains for scanning. eg: (wordlist="default" OR wordlist="somewordlistfile.txt")
Note: You should specify only on of the options for wordlist For wordlist, either specify
wordlist="default"
to use the default wordlist, but you have a wordlist of your own, specifywordlist="wordlistname.txt"
import simplyhack
# or use - from simplyhack import directory_scan
# If you want to use the default wordlist
simplyhack.directory_scan(domain="example.com", wordlist="default")
# if you want to specify your own wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="http/https", wordlist="wordlist.txt")
DNS Lookup
import simplyhack
# or use - from simplyhack import dns_lookup
simplyhack.dns_lookup(url="example.com")
RDNS Lookup
import simplyhack
# or use - from simplyhack import reverse_dns_lookup
simplyhack.reverse_dns_lookup(ip="<target IPv4>")
Local Network Scanning
- targetIP = The IPv4 address of the target machine (xxx.xxx.xxx.xxx) or use /24 to specify the entire network class (xxx.xxx.xxx.1/24)
import simplyhack
# or use - from simplyhack import local_scan
# to scan only the specified ip
simplyhack.local_scan(targetIP="xxx.xxx.xxx.xxx")
# to scan the entire network
simplyhack.local_scan(targetIP="xxx.xxx.xxx.1/24")
[Network Attacks]
MITM (ARP Spoofing)
- routerIP = The IPv4 address of your router
- targetIP = The IPv4 address of the victims device
Note: you can use the local scan functionality of simplyhack to get the IPv4 address of the victims device
import simplyhack
# or use - from simplyhack import arp_spoof
simplyhack.arp_spoof(routerIP="<router IPv4>", targetIP="<target IPv4>")
Note: This will make your device the MITM and then you can run further attacks
MITM (Packet Sniffing)
- interface = Your current interface
Note: To successfully sniff packets of the victim's device, you first need to be the Man In The Middle. For this to happen, use the ARP Spoof functionality 1st and then run the packet sniffer
import simplyhack
# or use - from simplyhack import sniff_packets
simplyhack.sniff_packets(interface="<your interface>")
Local Network Scanning
Same as mentioned above
Network Defense
- interface = Your current interface
import simplyhack
# or use - from simplyhack import detect_net_attacks
simplyhack.detect_net_attacks(interface="<your interface>")
MAC Changer (Bypass network restrictions)
- interface = Your current network interface
- new mac = The new mac address.
- ischeck = To specify if you want to check if your devices MAC Address has changed or not.
Note: If you want a randomly generated MAC address as your new MAC, then specify rand, But if you want a specific new MAC address then specify the address xx:xx:xx:xx:xx:xx
Check out the Wiki page of MAC Address for more information
import simplyhack
# or use - from simplyhack import change_mac_address
# use rand to get a randomly generated MAC address or specify a new one
# new_mac="rand" for random MAC
# new_mac="xx:xx:xx:xx:xx:xx" for specific MAC
# Set ischeck to either TRUE or FALSE.
# ischeck="TRUE" will help you check if the MAC address is really changed
# ischeck="FALSE" will exit the script without checking
simplyhack.change_mac_address(interface="<Your Interface>", new_mac="rand OR <new MAC>", ischeck="TRUE/FALSE")
[Password Cracking (Dictionary attacks/Bruteforce attacks)]
Hash cracking
- hash type = Type of the hash. available types: sha1, sha224, sha251, sha512, md5
- passwordHash = The passwords in hashed format to crack
- wordlist = wordlist of passwords
Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"
import simplyhack
# or use - from simplyhack import hash_crack
# for default wordlist
simplyhack.hash_crack(hash_type="sha1/sha224/sha256/sha512/md5", passwordHash="<Password Hash>", wordlist="default")
# for specified wordlist
simplyhack.hash_crack(hash_type="sha1/sha224/sha256/sha512/md5", passwordHash="<Password Hash>", wordlist="somewordlistfile.txt")
Cracking a password protected file's password
- filetype = The extension of the file. Extensions currently available: (pdf, zip)
- file path = The path of the file
- wordlist = The password wordlist
Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"
import simplyhack
# or use - from simplyhack import crack_passprotected
# for default wordlist
simplyhack.crack_passprotected(filetype="<file type>", file_path="/xxx/xxx/xxx/file.zip/.pdf", wordlist="default")
# for specified wordlist
simplyhack.crack_passprotected(filetype="<file type>", file_path="/xxx/xxx/xxx/file.zip/.pdf", wordlist="somewordlistfile.txt")
Gmail password attack
- target gmail = The targets Gmail address
- wordlist = The password wordlist
Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"
import simplyhack
# or use - from simplyhack import gmail_brute
# for default wordlist
simplyhack.gmail_brute(target_gmail="example@gmail.com", wordlist=="default")
# for specified wordlist
simplyhack.gmail_brute(target_gmail="example@gmail.com", wordlist="wordlist.txt")
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for simplyhack-0.0.7-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 81abe47ee739ee172e52eaaaee0db68b8260a200bbf7bda5ae36e84c3d706537 |
|
MD5 | 7457953657bf6beb3166099a8d87153b |
|
BLAKE2b-256 | 0bb1c46329868167d3570838df3d4549244cf97443e116340a18399b1c99a5d2 |