This repository contains a collection of various small hacking tools developed in Python for educational purposes. The tools demonstrate basic concepts and techniques commonly used in network security, penetration testing, and ethical hacking. The goal of this project is to provide hands-on experience with cybersecurity tools and to help with learning security principles and practices.
These tools are for educational purposes only. Unauthorized access to computer systems, networks, and data is illegal and unethical. Use these tools only in a legal and responsible manner, with explicit permission from the system owner.
Below is a list of the tools included in this repository:
-
arp_spoofer
ARP Spoofing Tool to redirect traffic on the local network. -
arp_spoofer_Detector
Detects ARP Spoofing attacks in a local network. -
feef_framework
A simple framework to demonstrate basic techniques for phishing attacks. -
bypassing_HTTPS
A tool to bypass SSL/TLS certificate pinning for HTTPS traffic. -
Code_injector
Injects arbitrary code into a running process (use responsibly for educational purposes). -
controlling_keyboard
Simulates keyboard input to control the system remotely (use only on your own machine). -
dns_spoofer
DNS Spoofing tool to intercept and redirect DNS queries. -
file_interceptor
Intercepts file operations and monitors files being accessed or modified. -
key_logger
Simple keylogger to record keystrokes on the system. -
mac_address_changer
Changes the MAC address of the machine's network interface. -
mail_generator
Generates fake emails for testing and educational purposes. -
net_cut
Cuts or blocks network connections on a local network. -
network_scanner
A network scanner tool that detects active hosts and devices in the network. -
packaging
A basic packaging script to create standalone executables from Python code. -
packet_sniffer
Captures and analyzes network packets usingscapyor similar libraries. -
reverse_backdoor
A reverse shell backdoor tool to demonstrate how attackers can gain remote access (for educational purposes).
Each tool has its own usage instructions. Please refer to the individual tool's code or documentation for details on how to use them. Most tools require root/administrator privileges for full functionality.
Example of running a simple tool:
# For ARP Spoofing:
python arp_spoofer.pyYou may need to modify the configuration or specify IP addresses, network interfaces, etc., depending on the tool you're using.
Before running any of the tools, ensure you have the following installed:
Python 3.x
Necessary Python libraries for specific tools. You can install them via pip (e.g., scapy, requests, smtplib, etc.).
- Clone this repository to your local machine:
git clone https://github.com/yourusername/python-hacking-tools.git
cd python-hacking-tools- Install the required Python libraries (check each tool's dependencies):
pip install -r requirements.txtYou may need to manually install additional libraries depending on the tool (e.g., scapy, keyboard, etc.).
This repository is open for contribution. If you have new tools to add or improvements to existing tools, feel free to fork the repository, make changes, and submit a pull request.
Guidelines for contributing:
Ensure all code follows the basic Python PEP-8 style guide.
Add comments and documentation for all new functions and tools.
Test your tools on local systems and networks only, and ensure they don't cause any harm.
Notes
Educational Use Only:
This project was created strictly for educational purposes as part of the course
“Learn Python & Ethical Hacking From Scratch”, instructed by ZAID AL QURAISHI.
All tools and examples were developed to support learning, experimentation, and understanding of cybersecurity concepts.
Ethical & Legal Responsibility:
The content of this project is intended to be used only in safe, controlled environments such as personal systems or networks where explicit permission has been granted. Unauthorized access to systems, networks, or data is illegal and unethical.
Security Best Practices:
Always follow ethical hacking guidelines, respect local laws and regulations, and practice responsible use when working with security-related tools.