This repository contains a list of cybersecurity tools written mostly in Python. The tools are divided into categories such as cryptography, flooding attacks, password attacks, scans, and web. The tools are meant to be used for educational purposes only.
To be added.
Tool | Description | Usage |
---|---|---|
SYN Flooder | A SYN Flooder is a type of DoS attack in which the attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. | python syn_flood.py -t <target_ip> -p <target_port> -c <count> |
ICMP Flooder | An ICMP Flooder is a type of DoS attack in which the attacker sends a succession of ICMP requests (ex. ping) to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. | python imcp_flood.py -t <target_ip> -c <count> |
Ping of Death | A Ping of Death is a type of DoS attack in which the attacker sends a ping packet larger than the maximum packet size allowed by the IP protocol. | python ping_of_death.py -t <target_ip> |
Fragmentation Attack | A Fragmentation Attack is a type of DoS attack in which the attacker sends a series of fragmented packets to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. | python fragmentation.py <target_ip> -s <src_ip> -p <port> -i <id> -t <type> -d <data> -f <fragsize> |
DoS Attack | A DoS Attack is a type of attack in which the attacker sends a succession of requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. | python Dos.py -t <target_ip> -c <count> |
DDoS Attack | A DDoS Attack is a type of attack in which the attacker sends a succession of requests to a target's system from multiple sources in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. | python3 DDoS.py -t <target_ip> -c <count> -T <threads> |
Tool | Description | Usage |
---|---|---|
SSH | An SSH Brute Force Attack is a type of attack in which the attacker tries to guess the password of an SSH server by trying different combinations of passwords. | python3 ssh_bruteforce.py <target> <username> <password_list> |
FTP | An FTP Brute Force Attack is a type of attack in which the attacker tries to guess the password of an FTP server by trying different combinations of passwords. | python3 ftp_bruteforce.py <target> <user> <dictionary> |
Telnet | A Telnet Brute Force Attack is a type of attack in which the attacker tries to guess the password of a Telnet server by trying different combinations of passwords. | python3 telnet_bruteforce.py <target> <user> <dictionary> |
MySQL | A MySQL Brute Force Attack is a type of attack in which the attacker tries to guess the password of a MySQL server by trying different combinations of passwords. | python3 mysql_bruteforce.py <host> <user> <dictionary> |
ZIP | A ZIP Brute Force Attack is a type of attack in which the attacker tries to guess the password of a ZIP file by trying different combinations of passwords. | python3 zip-crack.py -f <zipfile> -d <dictionary> |
A PDF Brute Force Attack is a type of attack in which the attacker tries to guess the password of a PDF file by trying different combinations of passwords. | python3 pdf_cracker.py <pdf_file> <dictionary_file> |
Tool | Description | Usage |
---|---|---|
Port Scanner | A Port Scanner is a tool that scans a target's system for open ports. | python3 port_scanner.py |
Tool | Description | Usage |
---|---|---|
Local File Inclusion Tester | A Local File Inclusion Tester is a tool that tests a target's system for Local File Inclusion vulnerabilities. | python3 lfi_test.py -t <URL> -f <Payload File> |
XSS Tester | A XSS Tester is a tool that tests a target's system for Cross-Site Scripting vulnerabilities. | python3 XSS_tester.py -u <URL> -f <Payload File> |
Tool | Description | Usage |
---|---|---|
Auto-Bounty | A simple bash script for automating basic pentesting tasks, like reconnaissance or vulnerability scanning. | sudo chmod +x Auto-Bounty.sh then ./Auto-Bounty.sh <URL> |
If you would like to contribute to this repository, please open an issue or a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
- LFI Payloads : Emad Shanab
- XSS Payloads : PayloadBox
If you want to contact me you can reach me at cherifjebali0301@gmail.com.