Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit18b6ac7

Browse files
committed
added READMEs and dns spoof
1 parente189864 commit18b6ac7

File tree

18 files changed

+225
-19
lines changed

18 files changed

+225
-19
lines changed

‎README.md‎

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,18 @@
1-
#pythoncode-tutorials
2-
PythonCode Tutorials
1+
#Python Code Tutorials
2+
This is a repository of all the tutorials of[The Python Code](https://www.thepythoncode.com) website.
3+
##List of Content
4+
-###[Ethical Hacking](https://www.thepythoncode.com/topic/ethical-hacking)
5+
-###[Scapy](https://www.thepythoncode.com/topic/scapy)
6+
-[Building an ARP Spoofer](https://www.thepythoncode.com/article/building-arp-spoofer-using-scapy). ([code](scapy/arp-spoofer))
7+
-[Detecting ARP Spoof attacks](https://www.thepythoncode.com/article/detecting-arp-spoof-attacks-using-scapy). ([code](scapy/arp-spoof-detector))
8+
- DHCP Listener script. ([code](scapy/dhcp_listener))
9+
-[Fake Access Point Generator](https://www.thepythoncode.com/article/create-fake-access-points-scapy). ([code](scapy/fake-access-point))
10+
-[Simple Network Scanner](https://www.thepythoncode.com/article/building-network-scanner-using-scapy). ([code](scapy/network-scanner))
11+
-[Writing a DNS Spoofer](https://www.thepythoncode.com/article/make-dns-spoof-python). ([code](scapy/dns-spoof))
12+
-[Writing a Keylogger in Python from Scratch](https://www.thepythoncode.com/article/write-a-keylogger-python). ([code](ethical-hacking/keylogger))
13+
-[Making a Port Scanner using sockets in Python](https://www.thepythoncode.com/article/make-port-scanner-python). ([code](ethical-hacking/port_scanner))
14+
15+
-###[Machine Learning](https://www.thepythoncode.com/topic/machine-learning)
16+
-[Building a Speech Emotion Recognizer using Scikit-learn](https://www.thepythoncode.com/article/building-a-speech-emotion-recognizer-using-sklearn). ([code](machine-learning/speech-emotion-recognition))
17+
-[Top 8 Python Libraries For Data Scientists and Machine Learning Engineers](https://www.thepythoncode.com/article/top-python-libraries-for-data-scientists).
18+
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
#[Writing a Keylogger in Python from Scratch](https://www.thepythoncode.com/article/write-a-keylogger-python)
2+
To run this:
3+
-`pip3 install -r requirements.txt`
4+
- Fresh Gmail Account, check this[tutorial](https://www.thepythoncode.com/article/write-a-keylogger-python) to set it up.
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
keyboard
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
#[Making a Port Scanner using sockets in Python](https://www.thepythoncode.com/article/make-port-scanner-python)
2+
To run simple port scanner:
3+
```
4+
python simple_port_scanner.py
5+
```
6+
To run fast port scanner:
7+
-
8+
```
9+
python fast_port_scanner --help
10+
```
11+
**Output:**
12+
```
13+
usage: fast_port_scanner.py [-h] [--ports PORT_RANGE] host
14+
15+
Simple port scanner
16+
17+
positional arguments:
18+
host Host to scan.
19+
20+
optional arguments:
21+
-h, --help show this help message and exit
22+
--ports PORT_RANGE, -p PORT_RANGE
23+
Port range to scan, default is 1-65535 (all ports)
24+
```
25+
For example, if you want to scan the ports from 1 to 1024 of your router (**192.168.1.1**):
26+
```
27+
python3 fast_port_scanner.py 192.168.1.1 --ports 1-1024
28+
```

‎scapy/arp-spoof-detector/README.md‎

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
#[Detecting ARP Spoof attacks](https://www.thepythoncode.com/article/detecting-arp-spoof-attacks-using-scapy)
2+
to run this:
3+
-`pip3 install -r requirements.txt`
4+
-
5+
```
6+
python3 detect_arpspoof.py wlan0
7+
```
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
scapy

‎scapy/arp-spoofer/README.md‎

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
#[Building an ARP Spoofer](https://www.thepythoncode.com/article/building-arp-spoofer-using-scapy)
2+
to run this:
3+
-`pip3 install -r requirements.txt`
4+
-
5+
```
6+
python3 arp_spoof.py --help
7+
```
8+
**Output**:
9+
```
10+
usage: arp_spoof.py [-h] [-v] target host
11+
12+
ARP spoof script
13+
14+
positional arguments:
15+
target Victim IP Address to ARP poison
16+
host Host IP Address, the host you wish to intercept packets for
17+
(usually the gateway)
18+
19+
optional arguments:
20+
-h, --help show this help message and exit
21+
-v, --verbose verbosity, default is True (simple message each second)
22+
```
23+
For instance, if you want to spoof **192.168.1.2** and the gateway is **192.168.1.1**:
24+
```
25+
python3 arp_spoof 192.168.1.2 192.168.1.1 --verbose
26+
```
-2.37 KB
Binary file not shown.

‎scapy/arp-spoofer/requirements.txt‎

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
scapy

‎scapy/dhcp_listener/README.md‎

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
#Listening for new Connected Devices in the Network using DHCP
2+
to run this:
3+
-`pip3 install -r requirements.txt`
4+
-
5+
```
6+
python3 dhcp_listener.py
7+
```

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp