This repository contains various cybersecurity tools for penetration testing and security assessments. These tools are intended for ethical use only and should be employed responsibly.
git clone https://github.com/venkys24/venkys_project_1.git
cd venkys_project_1
This project is licensed under the Apache 2.0 License. See the LICENSE file for details.
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
...
(Full license text here: https://www.apache.org/licenses/LICENSE-2.0)
---
A MAC Address Changer allows users to modify the MAC address of their device.
- Privacy & Anonymity: Prevents tracking by ISPs, advertisers, and hackers.
- Enhanced Security: Helps bypass blacklisting and prevents MAC-based attacks.
- Testing & Development: Useful for testing network configurations.
python3 mac.py -i eth0 -m 00:11:22:33:44:55
eth0
= Preferred interface for changing MAC00:11:22:33:44:55
= New MAC address
An ARP Spoofer manipulates the Address Resolution Protocol (ARP) to redirect network traffic.
- Ethical Hacking: Helps test network security vulnerabilities.
- Packet Sniffing & Traffic Monitoring: Used for network analysis.
- Defensive Security Measures: Helps train employees on ARP spoofing threats.
- Bypassing Network Restrictions: Can redirect personal traffic.
python3 arp1.py -t 192.168.5.133 -g 192.168.5.2
-t
= Target IP address-g
= Gateway address
Scans a network for active devices, open ports, and vulnerabilities.
- Network Security Testing
- Network Monitoring & Troubleshooting
- Asset Management
- Intrusion Detection
python3 netscan1.py
python3 netscan1.py 192.168.5.1/24
Automates login attempts using multiple username/password combinations.
- Password Security Testing
- Identifying Weak Authentication Mechanisms
- Penetration Testing
- Cybersecurity Awareness
python3 login_finder.py
python3 login_finder.py http://vulnweb/login.php
⚠ WARNING: Modify the code to specify the path to pwd.txt
before running.
Extracts input fields from web forms for analysis.
- Web Automation & Data Entry
- Security Auditing
- Competitive Intelligence
- Digital Document Processing
python3 vuln_aka-form_extract.py
⚠ WARNING: Edit the target URL in the code before running.
Identifies open ports and services on a target device.
- Network Security & Vulnerability Assessment
- System & Service Management
- Ethical Hacking
- Detecting Unauthorized Services
python3 port.py
python3 port.py 192.168.5.134
Extracts URLs from webpages and network traffic.
- Web Scraping & Data Collection
- Security Testing
- SEO Optimization
- Identifying Hidden & Vulnerable Endpoints
python3 spy_aka_fill_link_find.py
⚠ WARNING: Edit the target URL in the code before running.
Captures and analyzes network traffic.
- Intrusion Detection
- Troubleshooting & Performance Optimization
- Protocol & Traffic Analysis
- Penetration Testing
python3 packetsniff1.py
⚠ WARNING: Edit the target interface in the code before running. ⚠ WARNING: Run the ARP Spoofer first on the target device for better results.
Redirects a target’s DNS requests to a fake IP.
- Cybersecurity & Penetration Testing
- Web Filtering & Parental Control
- Network Traffic Redirection
- Education & Research
python3 dns.py
⚠ WARNING: Edit the target interface before running.
⚠ WARNING: Run the ARP Spoofer first for better results.
⚠ WARNING: Modify the blocked_domains.txt
file path in the code.
Encrypts and decrypts text using the Caesar cipher.
- Cryptography Basics
- Secure Simple Messages
- Programming & Algorithm Development
- Puzzle Games & Escape Rooms
python3 caeser.py
Alphabet Set: abcdefghijklmnopqrstuvwxyz0123456789
Detects and alerts users of Wi-Fi deauthentication attacks.
- Detecting & Preventing Wi-Fi Attacks
- Securing Wireless Networks
- Incident Response
- Penetration Testing
python3 deauthentication.py
Extracts and indexes data from websites.
- Search Engine Indexing & SEO Optimization
- Data Extraction & Market Research
- Cybersecurity & Web Monitoring
- Automating Web Tasks
python3 craw.py
⚠ WARNING: Edit the target URL in the code before running.
These tools are strictly for ethical hacking, penetration testing, and cybersecurity research. Unauthorized use against networks or systems without explicit permission is illegal and punishable by law. Use these tools responsibly.