Welcome to the Networks Penetration Testing repository. This repository contains a collection of tools implemented in Python to assist in the field of network penetration testing and offensive security tests. Below is an overview of the tools included in this repository.
- ARP Spoofing Tool
- ARP Spoofing Detection Tool
- Downloads Redirection Tool
- DNS Spoofing Tool
- HTTP Packet Sniffing Tool
- HTTP Code Injector Tool
- Network Scanner Python Script
- NetCut Tool
- Mac Changer Python Script
- Additional Tools
- Installation
- Usage
- Contributing
- License
- Disclaimer
This tool allows you to intercept and modify network traffic between two hosts by poisoning their ARP caches with forged ARP requests and replies.
Detects ARP spoofing attacks on your network by monitoring ARP requests and replies for suspicious activity.
Redirects downloads on the network to a different source, allowing you to replace downloaded files with malicious versions.
Performs DNS spoofing attacks by intercepting DNS queries and responding with forged DNS replies, redirecting traffic to malicious sites.
Captures and analyzes HTTP packets on the network, allowing you to monitor and manipulate HTTP traffic.
Injects arbitrary code into HTTP responses, enabling you to modify web pages and inject malicious scripts.
Scans the network to discover active hosts, open ports, and running services, providing a detailed map of the network.
Allows you to cut off network access for specific devices on a network by sending forged ARP requests.
Changes the MAC address of your network interface, allowing you to anonymize your network presence.
The repository contains many more tools aimed at various aspects of network penetration testing and offensive security. Explore the codebase to discover all available functionalities.
To install the tools in this repository, clone the repository and install the required dependencies:
git clone https://github.com/Saalehh/Networks-Penetration-Testing.git
cd Networks-Penetration-Testing
Each tool has its own requirements to install them:
cd tool/directory/path
pip install -r requirements.txt
Each tool in this repository comes with its own usage instructions and command-line options. Refer to the README files within each tool's directory for detailed information on how to run and utilize each tool effectively.
Contributions are welcome! If you have a tool or feature you would like to add, please fork the repository, create a new branch, and submit a pull request. Ensure that your code follows the project's coding standards and includes appropriate documentation.
This project is licensed under the MIT License. See the LICENSE file for more details.
These tools are provided for educational purposes only. Unauthorized use of these tools against any network without explicit permission is illegal and unethical. The authors and contributors of this repository are not responsible for any misuse or damage caused by these tools. Always obtain proper authorization before performing any penetration testing or security assessments. Use responsibly and ethically.