A collection of security tools for educational purposes and authorized penetration testing
Extract saved WiFi passwords from Windows systems. Useful for recovering lost credentials on authorized systems.
WiFi Extraction Demo
import subprocess
import re
import json
def get_wifi_profiles():
profiles_data = subprocess.check_output(
['netsh', 'wlan', 'show', 'profiles']
).decode('utf-8', errors='ignore')
profiles = re.findall(r"All User Profile\s*:\s*(.*)", profiles_data)
return [profile.strip() for profile in profiles]
Discover active devices on your network using ARP requests. Essential for network mapping and security audits.
Network Scanning Demo
import scapy.all as scapy
def scan_network(ip_range):
arp_request = scapy.ARP(pdst=ip_range)
broadcast = scapy.Ether(dst="ff:ff:ff:ff:ff:ff")
arp_request_broadcast = broadcast/arp_request
answered = scapy.srp(arp_request_broadcast,
timeout=2,
verbose=False)[0]
devices = []
for element in answered:
devices.append({
"ip": element[1].psrc,
"mac": element[1].hwsrc
})
return devices
Advanced multi-threaded port scanner with service detection and banner grabbing capabilities.
Port Scanning Demo
import socket
import threading
import queue
class PortScanner:
def __init__(self, target, threads=100):
self.target = target
self.threads = threads
self.open_ports = []
self.queue = queue.Queue()
def port_scan(self, port):
try:
sock = socket.socket(socket.AF_INET,
socket.SOCK_STREAM)
sock.settimeout(1)
result = sock.connect_ex((self.target, port))
if result == 0:
self.open_ports.append(port)
sock.close()
except:
pass
Network traffic analyzer for monitoring and analyzing packets on your network interface.
Packet Analysis Demo
from scapy.all import sniff
from scapy.layers import http
def process_packet(packet):
if packet.haslayer(http.HTTPRequest):
host = packet[http.HTTPRequest].Host.decode()
path = packet[http.HTTPRequest].Path.decode()
print(f"[HTTP] {host}{path}")
if packet.haslayer(scapy.Raw):
load = packet[scapy.Raw].load.decode(
'utf-8', errors='ignore')
if 'password' in load.lower():
print("[!] Possible credentials found")
git clone https://github.com/gaut1ham/cybersecurity-tools.git
cd cybersecurity-tools
# Install required packages
pip install -r requirements.txt
# Or install individually
pip install scapy==2.5.0
pip install requests==2.31.0
pip install colorama==0.4.6
# Linux requires special permissions
sudo setcap cap_net_raw+eip $(readlink -f $(which python3))
# Or run with sudo
sudo python3 network_scanner.py
# Run as Administrator for WiFi extraction
# Right-click CMD/PowerShell → "Run as administrator"
python wifi_extractor.py
# Test WiFi extractor
python wifi_extractor.py --test
# Test network scanner
python network_scanner.py --help
# Check all dependencies
python -c "import scapy; print('Scapy installed successfully')"
# Basic usage
python wifi_extractor.py
# Save output to file
python wifi_extractor.py --output wifi_passwords.json
# Extract specific profile
python wifi_extractor.py --profile "HomeWiFi"
# Scan local network
python network_scanner.py -t 192.168.1.0/24
# Scan with specific interface
python network_scanner.py -t 192.168.1.0/24 -i eth0
# Save results
python network_scanner.py -t 192.168.1.0/24 -o scan_results.txt
# Fast scan (no hostname resolution)
python network_scanner.py -t 192.168.1.0/24 --fast
# Basic port scan
python port_scanner.py 192.168.1.1
# Custom port range
python port_scanner.py 192.168.1.1 -p 1-1000
# Specific ports
python port_scanner.py 192.168.1.1 -p 22,80,443,8080
# Increase threads for faster scan
python port_scanner.py 192.168.1.1 -t 500 -p 1-65535
# Save results
python port_scanner.py 192.168.1.1 -o port_scan_results.json
# Basic packet capture
sudo python packet_sniffer.py
# Specify interface
sudo python packet_sniffer.py -i eth0
# Use BPF filter
sudo python packet_sniffer.py -f "tcp port 80"
sudo python packet_sniffer.py -f "udp port 53"
sudo python packet_sniffer.py -f "host 192.168.1.100"
# Limit number of packets
sudo python packet_sniffer.py -c 100 -o captured_packets.pcap
# Verbose output
sudo python packet_sniffer.py -v
Multi-threaded and optimized for speed
ports scanned per second
Built with security best practices
external dependencies for core functions
Well-documented and modular
code coverage with comments
Accurate detection and analysis
accuracy in network discovery
Performance metrics from testing on local network:
Network Size: 254 IP addresses
Scan Time: 2.3 seconds
Accuracy: 99.8%
CPU Usage: 15-20%
Memory Usage: 50-80 MB
Target: 1000 ports
Threads: 100
Scan Time: 8.5 seconds
Open Ports Detected: 3/3
False Positives: 0%
Contributions are welcome! Please follow these steps:
Click the "Fork" button at the top right of the GitHub page.
git checkout -b feature/AmazingFeature
Ensure your code follows PEP 8 style guidelines and includes proper documentation.
# Run tests
python -m pytest tests/
# Check code style
python -m py_compile your_script.py
flake8 your_script.py
Create a detailed PR describing your changes and their purpose.
Copyright (c) 2024 Gaut1ham
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
Note: This license applies only to the software code. The use of these tools for unauthorized testing or malicious purposes is strictly prohibited and may violate laws in your jurisdiction.