Skip to content

HI6Cypher/HI6ToolKit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

HI6ToolKit :|

Classes :

from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, Listen

Usage :

  • raw code :

    https://raw.githubusercontent.com/HI6Cypher/HI6ToolKit/master/hi6toolkit.py

  • To Sniff packets :

    python hi6toolkit.py SNIFF -x [host/DEFAULT] -m [TCP/UDP/ICMP/ALL]
  • Example of a sniffed packet from CyG33k

    [*][66] Connection________[20230903190719]________
    
    IPv4 Packet :
    	Version : 4  Header Length : 20  Time of Service : 0
    	Total Length : 171  Identification : 3500  Flags : 2
    	Fragment Offset : 0  TTL : 128  Protocol : TCP
    	Checksum : 0x0  Source : 127.0.0.1  Destination : 127.0.0.1
    TCP Segment :
    	Source Port : 1202
    	Destination Port : 60321
    	Sequence : 2046406544
    	Ackknowledgement : 2596328933
    	Data Offset : 20
    	Flags :
    		URG:0  ACK:1  PSH:1
    		RST:0  SYN:0  FIN:0
    	Window : 2048
    	Checksum : 0x24c9
    	Urgent Pointer : 0
    	Raw Data :
    		\x04\xb2\xeb\xa1y\xf9\xaf\x90\x9a\xc0\xd5\xe5P\x18
            \x08\x00$\xc9\x00\x00{"time": "09/03/2023--19:07:1
            9", "sender": "127.0.0.1", "hostname": "HI6Cypher"
            , "host": "127.0.0.1", "message": "H3ll0 W0r1d"}
    
    
  • To launch a DoS attack(SYN FLOOD) :

    python hi6toolkit.py DOS -m [SYN] -x [host] -p [port] -r [rate]
  • Example of SYN flood (127.0.0.1) :

    
         [System] : [fuckOS]
         [Hostname] : [HI6Cypher]
         [Python] : [CPython 3.6.0]
    
         [GitHub] : [github.com/HI6Cypher]
         [Email] : [huaweisclu31@hotmail.com]
    
    
    Press anykey to continue...
    
    [+] ////////////////////////////////  100032 packets sent
    [+] All packets have sent
    [-] 39.73s
    
  • To sending HTTP request :

    python hi6toolkit.py HTTP -x [host] -p [port/default=80] -e [endpoint] -d -s(for https)
  • To start the network listener :

    python hi6toolkit.py LISTEN -m [TCP/UDP] -x [host] -p [port] -t [timeout] -b [buffer]
  • To print information :

    python hi6toolkit.py INFO
  • Note : HI6ToolKit is a script, but it can use as module

    from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, Listen
    
    serv = "www.example.com"
    
    http = HTTP_Request(host = serv, port = 80, end = "/", decode = 1, https = 0)
    http.request()
    
    print(http.request_header, http.response_header, "\n\n", http.response)
    #output
    
    GET / HTTP/1.1
    Host: www.example.com
    User-Agent: HI6ToolKit
    Accept: */*
    Connection: close
    
    HTTP/1.1 200 OK
    Accept-Ranges: bytes
    Age: 315458
    Cache-Control: max-age=604800
    Content-Type: text/html; charset=UTF-8
    Date: Mon, 03 Jun 2024 10:19:22 GMT
    Etag: "3147526947+gzip"
    Expires: Mon, 10 Jun 2024 10:19:22 GMT
    Last-Modified: Thu, 17 Oct 2019 07:18:26 GMT
    Server: ECAcc (dcd/7D4F)
    Vary: Accept-Encoding
    X-Cache: HIT
    Content-Length: 1256
    Connection: close 
    
     <!doctype html>
    <html>
    <head>
        <title>Example Domain</title>
    
        <meta charset="utf-8" />
        <meta http-equiv="Content-type" content="text/html; charset=utf-8" />
        <meta name="viewport" content="width=device-width, initial-scale=1" />
        <style type="text/css">
        body {
            background-color: #f0f0f2;
            margin: 0;
            padding: 0;
            font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif;
            
        }
        div {
            width: 600px;
            margin: 5em auto;
            padding: 2em;
            background-color: #fdfdff;
            border-radius: 0.5em;
            box-shadow: 2px 3px 7px 2px rgba(0,0,0,0.02);
        }
        a:link, a:visited {
            color: #38488f;
            text-decoration: none;
        }
        @media (max-width: 700px) {
            div {
                margin: 0 auto;
                width: auto;
            }
        }
        </style>    
    </head>
    
    <body>
    <div>
        <h1>Example Domain</h1>
        <p>This domain is for use in illustrative examples in documents. You may use this
        domain in literature without prior coordination or asking for permission.</p>
        <p><a href="https://www.iana.org/domains/example">More information...</a></p>
    </div>
    </body>
    </html>
  • Exception : To send TCP/IP packet we need raw socket with socket.IPPROTO_TCP that we have limitations :\ on raw socket in some Windows versions(7, XP, Vista, ,...) to more information visit Site

    so DoS_SYN and just-tcp packetsniffer are limited to use non-windows :\

    Another case is also noticeable here, and that is hi6toolkit.Sniff can't work properly! unless u put python in firewall-allowlist :).

  • Error :

    ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificat

    this error occurs for ssl in HTTP_Request when user use -s or --secure and it can related to two things, "OS" or "Python Implementation"

    for "OS" stuff, is better to search around cert.pem etc. but about "Python Implementation", user should use latest python implementations(>=3.6) because paradigm of ssl module varies in each python implementation

GitHub : github.com/HI6Cypher :)

Email : huaweisclu31@hotmail.com :)

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages