from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, HTTP_Listen
-
raw code :
https://raw.githubusercontent.com/HI6Cypher/HI6ToolKit/master/hi6toolkit.py
-
To Sniff packets :
python hi6toolkit.py SNIFF -x [host] -m [TCP/UDP/ICMP/ALL]
-
Example of a sniffed packet from CyG33k
[*][66] Connection________[20230903190719]________ IPv4 Packet : Version : 4 Header Length : 20 Time of Service : 0 Total Length : 171 Identification : 3500 Flags : 2 Fragment Offset : 0 TTL : 128 Protocol : TCP Checksum : 0x0 Source : 127.0.0.1 Destination : 127.0.0.1 TCP Segment : Source Port : 1202 Destination Port : 60321 Sequence : 2046406544 Ackknowledgement : 2596328933 Data Offset : 20 Flags : URG:0 ACK:1 PSH:1 RST:0 SYN:0 FIN:0 Window : 2048 Checksum : 0x24c9 Urgent Pointer : 0 Raw Data : \x04\xb2\xeb\xa1y\xf9\xaf\x90\x9a\xc0\xd5\xe5P\x18 \x08\x00$\xc9\x00\x00{"time": "09/03/2023--19:07:1 9", "sender": "127.0.0.1", "hostname": "HI6Cypher" , "host": "127.0.0.1", "message": "H3ll0 W0r1d"}
-
To launch a DoS attack(SYN FLOOD) :
python hi6toolkit.py DOS -m [SYN] -x [host] -p [port] -r [rate]
-
Example of SYN flood to (127.0.0.1) :
[System] : [fuckOS] [Hostname] : [HI6Cypher] [Python] : [CPython 3.6.0] [GitHub] : [github.com/HI6Cypher] [Email] : [[email protected]] Press anykey to continue... [+] //////////////////////////////// 100032 packets sent [+] All packets have sent [-] 39.73s
-
To sending HTTP request :
python hi6toolkit.py HTTP -x [host] -p [port] -e [endpoint] -s(for https)
-
To start the network listener :
python hi6toolkit.py LISTEN -m [TCP/UDP] -x [host] -p [port] -t [timeout] -b [buffer]
-
To print information :
python hi6toolkit.py INFO
-
Note : HI6ToolKit is a script, but it can use as module
from hi6toolkit import Sniff, DoS_SYN, HTTP_Request, HTTP_Listen serv = "www.example.com" http = HTTP_Request(host = serv, port = 80, end = "/", https = False) http.request() print(http.request_header, http.response_header, "\n\n", http.response)
#output GET / HTTP/1.1 Host: www.example.com User-Agent: HI6ToolKit Accept: */* Connection: close HTTP/1.1 200 OK Accept-Ranges: bytes Age: 315458 Cache-Control: max-age=604800 Content-Type: text/html; charset=UTF-8 Date: Mon, 03 Jun 2024 10:19:22 GMT Etag: "3147526947+gzip" Expires: Mon, 10 Jun 2024 10:19:22 GMT Last-Modified: Thu, 17 Oct 2019 07:18:26 GMT Server: ECAcc (dcd/7D4F) Vary: Accept-Encoding X-Cache: HIT Content-Length: 1256 Connection: close <!doctype html> <html> <head> <title>Example Domain</title> <meta charset="utf-8" /> <meta http-equiv="Content-type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> <style type="text/css"> body { background-color: #f0f0f2; margin: 0; padding: 0; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; } div { width: 600px; margin: 5em auto; padding: 2em; background-color: #fdfdff; border-radius: 0.5em; box-shadow: 2px 3px 7px 2px rgba(0,0,0,0.02); } a:link, a:visited { color: #38488f; text-decoration: none; } @media (max-width: 700px) { div { margin: 0 auto; width: auto; } } </style> </head> <body> <div> <h1>Example Domain</h1> <p>This domain is for use in illustrative examples in documents. You may use this domain in literature without prior coordination or asking for permission.</p> <p><a href="https://www.iana.org/domains/example">More information...</a></p> </div> </body> </html>
-
Exception : To send TCP/IP packet we need raw socket with
socket.IPPROTO_TCP
that we have limitations :\ on raw socket in some Windows versions(7, XP, Vista, ,...) to more information visit Siteso DoS_SYN and just-tcp packetsniffer are limited to use non-windows :\
Another case is also noticeable here, and that is
hi6toolkit.Sniff
can't work properly! unless u put python in firewall-allowlist :). -
Error :
ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self signed certificat
this error occurs for
ssl
inHTTP_Request
when user use-s
or--secure
and it can related to two things, "OS" or "Python Implementation"for "OS" stuff, is better to search around
cert.pem
etc. but about "Python Implementation", user should use latest python implementations(>=3.6) because paradigm ofssl
module varies in each python implementation
GitHub : github.com/HI6Cypher :)
Email : [email protected] :)