- Sniff : Represents a Packet sniffing
- DoS_SYN : Represents a SYN flooding attack
- Listen : Represents a network listener
-
raw code :
https://raw.githubusercontent.com/HI6Cypher/HI6ToolKit/master/hi6toolkit.py
-
To Sniff packets :
python hi6toolkit.py SNIFF -x [host/DEFAULT] -m [TCP/UDP/ICMP/ALL]
-
Example of a sniffed packet from CyG33k
[*][66] Connection________[20230903190719]________ IPv4 Packet : Version : 4 Header Length : 20 Time of Service : 0 Total Length : 171 Identification : 3500 Flags : 2 Fragment Offset : 0 TTL : 128 Protocol : TCP Checksum : 0x0 Source : 127.0.0.1 Destination : 127.0.0.1 TCP Segment : Source Port : 1202 Destination Port : 60321 Sequence : 2046406544 Ackknowledgement : 2596328933 Data Offset : 20 Flags : URG:0 ACK:1 PSH:1 RST:0 SYN:0 FIN:0 Window : 2048 Checksum : 0x24c9 Urgent Pointer : 0 Raw Data : \x04\xb2\xeb\xa1y\xf9\xaf\x90\x9a\xc0\xd5\xe5P\x18 \x08\x00$\xc9\x00\x00{"time": "09/03/2023--19:07:1 9", "sender": "127.0.0.1", "hostname": "HI6Cypher" , "host": "127.0.0.1", "message": "H3ll0 W0r1d"}
-
To launch a DoS attack(SYN FLOOD) :
python hi6toolkit.py DOS -m [SYN] -x [host] -p [port] -r [rate]
-
Example of SYN flood (127.0.0.1) :
█ [System] : [fuckOS] █ [Hostname] : [HI6Cypher] █ [Python] : [CPython 3.6.0] █ [GitHub] : [github.com/HI6Cypher] █ [Email] : [huaweisclu31@hotmail.com] Press anykey to continue... [+] ████████████████████████████████ 100032 packets sent [+] All packets have sent [-] 39.73s
-
To sending HTTP request :
python hi6toolkit.py HTTP -x [host] -p [port/default=80] -e [endpoint] -d -s(for https)
-
To start the network listener :
python hi6toolkit.py LISTEN -m [TCP/UDP] -x [host] -p [port] -t [timeout]
-
To print information :
python hi6toolkit.py INFO
-
Note : HI6ToolKit is a script, but it can use modular
from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, Listen
-
Exception : To send TCP/IP packet we need raw socket with
socket.IPPROTO_TCP
that we have limitations :\ on raw socket in some Windows versions(7, XP, Vista, ,...) to more information visit Site.so DoS_SYN and just-tcp packetsniffer are limited to use non-windows(fuck microsoft) :\
Another case is also noticeable here, and that is
hi6toolkit.Sniff
can't work properly! unless u put python in firewall-allowlist :).
GitHub : github.com/HI6Cypher :)
Email : huaweisclu31@hotmail.com :)