Skip to main content

Simplyfing the process of creating cybersecurity tools

Project description

SimplyHack

SimplyHack is currently under construction and is not completly ready for use yet! You may encounter many bugs while using SimplyHack, so feel free to report those to me on my Instagram. Instagram - Abhishek Dangat - @abhishek0.deb. Currently experimenting and planning.

Developed by - Abhishek Dangat

A guide on how to use

Installation

sudo apt update && sudo apt install python3-pip
pip3 install simplyhack

if this gives errors, try :-

sudo apt update && sudo apt install python3-pip
pip3 install simplyhack==0.0.7

[Reconnaissance]

Subdomain scanner

  • domain = domain name of the target. eg: (domain="example.com")
  • protocol = The protocol of the specified domain name. eg: (protocol="http" OR protocol="https")
  • wordlist = The wordlist of subdomains for scanning. eg: (wordlist="default" OR wordlist="somewordlistfile.txt")

Note: You should specify only on of the options for protocol and wordlist. For protocol, either specify protocol="http" or specify protocol="https". For wordlist, either specify wordlist="default" to use the default wordlist, but you have a wordlist of your own, specify wordlist="wordlistname.txt"

import simplyhack
# or use - from simplyhack import subdomain_scan

# IF you want to use the default wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="http/https", wordlist="default")

# OR if you want to specify your own wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="http/https", wordlist="wordlist.txt")

Discover hidden directories

  • domain = domain name of the target. eg: (domain="example.com")
  • wordlist = The wordlist of subdomains for scanning. eg: (wordlist="default" OR wordlist="somewordlistfile.txt")

Note: You should specify only on of the options for wordlist. Either specify wordlist="default" to use the default wordlist, or specify wordlist="wordlistname.txt" to use your own wordlist

import simplyhack
# or use - from simplyhack import directory_scan 

# If you want to use the default wordlist
simplyhack.directory_scan(domain="example.com", wordlist="default")

# if you want to specify your own wordlist
simplyhack.subdomain_scan(domain="example.com", protocol="http/https", wordlist="wordlist.txt")

DNS Lookup

import simplyhack
# or use - from simplyhack import dns_lookup

simplyhack.dns_lookup(url="example.com")

RDNS Lookup

import simplyhack
# or use - from simplyhack import reverse_dns_lookup

simplyhack.reverse_dns_lookup(ip="<target IPv4>")

Local Network Scanning

  • targetIP = The IPv4 address of the target machine. Either specify a single IPv4 (xxx.xxx.xxx.xxx) or use /24 to specify the entire network class (xxx.xxx.xxx.1/24)
import simplyhack
# or use - from simplyhack import local_scan

# to scan only the specified ip
simplyhack.local_scan(targetIP="xxx.xxx.xxx.xxx")

# to scan the entire network
simplyhack.local_scan(targetIP="xxx.xxx.xxx.1/24")

[Network Attacks]

MITM (ARP Spoofing)

  • routerIP = The IPv4 address of your router
  • targetIP = The IPv4 address of the victims device

Note: you can use the local scan functionality of simplyhack to get the IPv4 address of the victim's device and the router.

import simplyhack
# or use - from simplyhack import arp_spoof

simplyhack.arp_spoof(routerIP="<router IPv4>", targetIP="<target IPv4>")

Note: This will make your device the MITM and then you can run further attacks

MITM (Packet Sniffing)

  • interface = Your current interface

Note: To successfully sniff packets of the victim's device, you first need to be the Man In The Middle. For this to happen, use the ARP Spoof functionality 1st and then run the packet sniffer

import simplyhack
# or use - from simplyhack import sniff_packets

simplyhack.sniff_packets(interface="<your interface>")

This currently works only on the sites using HTTP. I will soon release a version that will work for all other protocols as well.

Local Network Scanning

Same as mentioned above

Network Defense

  • interface = Your current interface
import simplyhack
# or use - from simplyhack import detect_net_attacks

simplyhack.detect_net_attacks(interface="<your interface>")

MAC Changer (Bypass network restrictions)

  • interface = Your current network interface
  • new mac = The new mac address.
  • ischeck = To specify if you want to check if your devices MAC Address has changed or not.

Note: If you want a randomly generated MAC address as your new MAC, then specify rand, But if you want a specific new MAC address then specify the address xx:xx:xx:xx:xx:xx

Check out the Wiki page of MAC Address for more information

import simplyhack
# or use - from simplyhack import change_mac_address

# use rand to get a randomly generated MAC address or specify a new one
# new_mac="rand" for random MAC
# new_mac="xx:xx:xx:xx:xx:xx" for specific MAC

# Set ischeck to either TRUE or FALSE.
# ischeck="TRUE" will help you check if the MAC address is really changed
# ischeck="FALSE" will exit the script without checking

simplyhack.change_mac_address(interface="<Your Interface>", new_mac="rand OR <new MAC>", ischeck="TRUE/FALSE")

[Password Cracking (Dictionary attacks/Bruteforce attacks)]

Hash cracking

  • hash type = Type of the hash. available types: sha1, sha224, sha251, sha512, md5
  • passwordHash = The passwords in hashed format to crack
  • wordlist = wordlist of passwords

Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"

import simplyhack
# or use - from simplyhack import hash_crack

# for default wordlist
simplyhack.hash_crack(hash_type="sha1/sha224/sha256/sha512/md5", passwordHash="<Password Hash>", wordlist="default")

# for specified wordlist
simplyhack.hash_crack(hash_type="sha1/sha224/sha256/sha512/md5", passwordHash="<Password Hash>", wordlist="somewordlistfile.txt")

Cracking a password protected file's password

  • filetype = The extension of the file. Extensions currently available: (pdf, zip)
  • file path = The path of the file
  • wordlist = The password wordlist

Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"

import simplyhack
# or use - from simplyhack import crack_passprotected

# for default wordlist
simplyhack.crack_passprotected(filetype="<file type>", file_path="/xxx/xxx/xxx/file.zip/.pdf", wordlist="default")

# for specified wordlist
simplyhack.crack_passprotected(filetype="<file type>", file_path="/xxx/xxx/xxx/file.zip/.pdf", wordlist="somewordlistfile.txt")

Gmail password attack

  • target gmail = The targets Gmail address
  • wordlist = The password wordlist

Note: you can use the default wordlist by specifying wordlist="default" or if you want to specify a wordlist of your own then you can specify it like wordlist="somewordlistfile.txt"

import simplyhack
# or use - from simplyhack import gmail_brute

# for default wordlist
simplyhack.gmail_brute(target_gmail="example@gmail.com", wordlist="default")

# for specified wordlist
simplyhack.gmail_brute(target_gmail="example@gmail.com", wordlist="wordlist.txt")

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

simplyhack-0.0.8.tar.gz (11.5 kB view hashes)

Uploaded Source

Built Distribution

simplyhack-0.0.8-py3-none-any.whl (11.2 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page