Skip to content

HI6Cypher/HI6ToolKit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

84 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

HI6ToolKit :|

Classes :

  • Sniff : Represents a Packet sniffing
  • DoS_SYN : Represents a SYN flooding attack
  • Listen : Represents a network listener

Usage :

  • raw code :

    https://raw.githubusercontent.com/HI6Cypher/HI6ToolKit/master/hi6toolkit.py

  • To Sniff packets :

    python hi6toolkit.py SNIFF -x [host/DEFAULT] -m [TCP/UDP/ICMP/ALL]
  • Example of a sniffed packet from CyG33k

    [*][66] Connection________[20230903190719]________
    
    IPv4 Packet :
    	Version : 4  Header Length : 20  Time of Service : 0
    	Total Length : 171  Identification : 3500  Flags : 2
    	Fragment Offset : 0  TTL : 128  Protocol : TCP
    	Checksum : 0x0  Source : 127.0.0.1  Destination : 127.0.0.1
    TCP Segment :
    	Source Port : 1202
    	Destination Port : 60321
    	Sequence : 2046406544
    	Ackknowledgement : 2596328933
    	Data Offset : 20
    	Flags :
    		URG:0  ACK:1  PSH:1
    		RST:0  SYN:0  FIN:0
    	Window : 2048
    	Checksum : 0x24c9
    	Urgent Pointer : 0
    	Raw Data :
    		\x04\xb2\xeb\xa1y\xf9\xaf\x90\x9a\xc0\xd5\xe5P\x18
            \x08\x00$\xc9\x00\x00{"time": "09/03/2023--19:07:1
            9", "sender": "127.0.0.1", "hostname": "HI6Cypher"
            , "host": "127.0.0.1", "message": "H3ll0 W0r1d"}
    
    
  • To launch a DoS attack(SYN FLOOD) :

    python hi6toolkit.py DOS -m [SYN] -x [host] -p [port] -r [rate]
  • Example of SYN flood (127.0.0.1) :

    
        █ [System] : [fuckOS]
        █ [Hostname] : [HI6Cypher]
        █ [Python] : [CPython 3.6.0]
    
        █ [GitHub] : [github.com/HI6Cypher]
        █ [Email] : [huaweisclu31@hotmail.com]
    
    
    Press anykey to continue...
    
    [+] ████████████████████████████████  100032 packets sent
    [+] All packets have sent
    [-] 39.73s
    
  • To sending HTTP request :

    python hi6toolkit.py HTTP -x [host] -p [port/default=80] -e [endpoint] -d -s(for https)
  • To start the network listener :

    python hi6toolkit.py LISTEN -m [TCP/UDP] -x [host] -p [port] -t [timeout]
  • To print information :

    python hi6toolkit.py INFO
  • Note : HI6ToolKit is a script, but it can use modular

    from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, Listen
  • Exception : To send TCP/IP packet we need raw socket with socket.IPPROTO_TCP that we have limitations :\ on raw socket in some Windows versions(7, XP, Vista, ,...) to more information visit Site.

    so DoS_SYN and just-tcp packetsniffer are limited to use non-windows(fuck microsoft) :\

    Another case is also noticeable here, and that is hi6toolkit.Sniff can't work properly! unless u put python in firewall-allowlist :).

GitHub : github.com/HI6Cypher :)

Email : huaweisclu31@hotmail.com :)

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages