All Projects → EONRaider → Blackhat Python3

EONRaider / Blackhat Python3

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Blackhat Python3

Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (-46.4%)
Mutual labels:  network-programming, cybersecurity, network-security
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-96.62%)
Mutual labels:  cybersecurity, network-security
SuperLibrary
Information Security Library
Stars: ✭ 60 (-94.67%)
Mutual labels:  cybersecurity, network-security
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-91.2%)
Mutual labels:  cybersecurity, network-security
Network Intrusion Detection
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Stars: ✭ 303 (-73.07%)
Mutual labels:  cybersecurity, network-security
Pythoncode Tutorials
The Python Code Tutorials
Stars: ✭ 544 (-51.64%)
Mutual labels:  network-programming, network-security
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (-44.71%)
Mutual labels:  cybersecurity, network-security
Passhunt
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (-14.58%)
Mutual labels:  cybersecurity
Slowloris
Asynchronous Python implementation of SlowLoris DoS attack
Stars: ✭ 51 (-95.47%)
Mutual labels:  cybersecurity
Netscan2
active / passive network scanner
Stars: ✭ 27 (-97.6%)
Mutual labels:  cybersecurity
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
Stars: ✭ 867 (-22.93%)
Mutual labels:  cybersecurity
Grab.js
fast TCP banner grabbing with node.js
Stars: ✭ 33 (-97.07%)
Mutual labels:  cybersecurity
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-95.38%)
Mutual labels:  network-security
Citadelcore
Cross platform filtering HTTP/S proxy based on .NET Standard 2.0.
Stars: ✭ 28 (-97.51%)
Mutual labels:  network-programming
Zile
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61 (-94.58%)
Mutual labels:  cybersecurity
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.13%)
Mutual labels:  cybersecurity
Dfw1n Osint
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-94.4%)
Mutual labels:  cybersecurity
Pcapxray
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (-2.58%)
Mutual labels:  cybersecurity
Smersh
Smersh is a pentest oriented collaborative tool used to track the progress of your company's missions.
Stars: ✭ 43 (-96.18%)
Mutual labels:  cybersecurity
Recommendations for engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 39 (-96.53%)
Mutual labels:  cybersecurity

Python 3 "Black Hat Python" Source Code

Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.

Although many optimizations could have been implemented in the source code presented throughout the book, the code was left unaltered as much as possible so that such modifications can be applied by the reader as he sees fit. The code as it is needs some serious refactoring efforts ranging from docstrings to type hinting and exception handling, not to mention enhancements like context managers, but these issues by themselves may come to benefit the reader if he has the intention of implementing them. It also presents many bugs originating from indentation that have been corrected if fatal errors were to be avoided during runtime.

A conversion similar to this one has been made available by myself on the source code of the book "Violent Python", by TJ O'Connor. Check it out here if you haven't done it yet.

Usage

Simply choose a directory (DIR) in which to clone the project using git clone, create a new virtual environment or venv for it (recommended ) and install the requirements using pip install.

[email protected]:~/DIR$ git clone https://github.com/EONRaider/blackhat-python3
[email protected]:~/DIR$ python3 -m venv venv
[email protected]:~/DIR$ source venv/bin/activate
(venv) [email protected]:~/DIR$ pip install -r requirements.txt

Notes

  • The book was made available in its entirety by Internet Archive, right here.
  • Some listings presented on the book were missing from the author's code repository available from "no starch press" website and were added to their respective chapters. A more accurate naming convention has been applied to the files as necessary in order to relate them to the code presented in the book.
  • Minor bugs that generated warnings by the interpreter have been fixed throughout the code without altering its characteristics.
  • Auxiliary files that were required to make the code work were added to their respective chapters.
  • As a personal side-note, it could have been possible for the author to have written cleaner code without jeopardizing the quickness of implementation that is required for ethical hacking engagements. Why he opted for not doing so remains of unknown reason.

Refactoring

Critical bug fixes that had to be made in order to properly implement the source code and avoid fatal errors:

  • chapter02/bh_sshserver.py required the RSA key contained in the test_rsa.key file, now included in the corresponding directory.
  • chapter03/sniffer_ip_header_decode.py & sniffer_with_icmp.py & scanner.py all had serious problems in the definition of IP packet sizes and portability between 32/64-bit systems due to problems in the implementation of structs. More about these issues on this thread on Stack Overflow.
  • chapter03/scanner.py used the netaddr library, which is not maintained anymore and presents many incompatibilities with Python 3. For that reason the code has been refactored and now uses the ipaddress library from Stdlib.
  • chapter04/arper.py & mail_sniffer.py used the scapy library, which is not compatible with Python 3. For that reason the code has been refactored and now uses the kamene library.
  • chapter04/pic_carver.py now uses the opencv-python library instead of cv2. The "cv2.cv" module was deprecated and has been replaced. The parameter "cv2.cv.CV_HAAR_SCALE_IMAGE" from the original code was replaced by "cv2.CASCADE_SCALE_IMAGE" because of this commit.
  • chapter05/content_bruter.py required a wordlist to work. It has been added to the chapter under all.txt
  • chapter05/joomla_killer.py required a wordlist to work. It has been added to the chapter under cain.txt
  • chapter06/bhp_bing.py & bhp_fuzzer.py & bhp_wordlist.py have been reformatted to comply with PEP8, though some warnings will still be triggered due to the necessity to conform class names to camel-casing in this specific application on Burp Suite.
  • chapter06/jython-standalone-2.7.2.jar is available as a more updated version of the file relative to the one presented in the book.
  • chapter07/git_trojan.py was refactored to replace the imp library (now deprecated) for types. A subdirectory structure with the necessary configuration files has been implemented as instructed in the book. The "trojan_config" variable was missing the relative path to the config subdirectory. A call to "to_tree()" method was added to line 60 in order to avoid an AttributeError exception generated by the original code. Instructions on how to generate an access token instead of using one's password in case 2FA is being used were included as comments.
  • chapter08/keylogger.py requires the PyHook library to work. A wheel file has been included with the 1.6.2 version. If necessary, other versions can be downloaded from here.
  • chapter09/ie_exfil.py threw errors due to the handling of the plaintext variable (which can appear as a string or as a binary string) when handed over to the "encrypt_string" function. Additionally, the use of the base64 library was corrected. Contribution from Enraged at this commit.

Contributing

As a matter of common sense, first try to discuss the change you wish to make to this repository via an issue.

  1. Ensure the modifications you wish to introduce actually lead to a pull request. The change of one line or two should be requested through an issue instead.
  2. If necessary, update the README.md file with details relative to changes to the project structure.
  3. Make sure the commit messages that include the modifications follow a standard. If you don't know how to proceed, here is a great reference on how to do it.
  4. Your request will be reviewed as soon as possible (usually within 48 hours).
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].