Skip to content

so1icitx/my-tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

My Tools

Overview

This repository showcases my personal projects.

Tools

so1dump: Packet Sniffer

  • Repository: https://github.com/so1icitx/packet_sniffer
  • Purpose: Captures and analyzes network packets (TCP, UDP, ICMP) on a specified interface to inspect traffic.
  • Features:
    • Parses packet details like source/destination IPs, ports, and protocol flags.
    • Supports output to JSON (structured format), CSV, or text files.
    • Optional hex dump of packet data for detailed inspection.
    • AbuseIPDB lookup for destination IP reputation (requires API key).
    • Quiet mode to suppress terminal output for automated workflows.
  • Use Case: Useful for debugging network issues or analyzing traffic in MITM scenarios.

so1map: Port Scanner

  • Repository: https://github.com/so1icitx/so1map
  • Purpose: Scans single IPs or subnets to identify open ports and running services.
  • Features:
    • Scans specified port ranges with multi-threading for speed.
    • Supports single IP (e.g., 192.168.1.1) or subnet (e.g., 192.168.1.0/24) scanning.
    • Outputs to JSON (structured format), CSV, or text files.
    • Quiet mode to save results without terminal output.
  • Use Case: Identifies potential entry points for security assessments, though open ports alone aren’t vulnerabilities without exploitable services.

so1scan: Domain Reconnaissance

  • Repository: https://github.com/so1icitx/so1scan
  • Purpose: Performs reconnaissance on a domain, gathering IP address, server type, HTTP security headers, VirusTotal reputation, and WHOIS data.
  • Features:
    • Resolves domain’s IP via DNS A record queries.
    • Identifies web server type (e.g., Apache, Nginx) from HTTP headers.
    • Analyzes security headers (CSP, HSTS, X-Frame-Options, CORS, X-Content-Type-Options, Referrer-Policy) with color-coded feedback (red for issues, green for secure).
    • Retrieves VirusTotal reputation score (requires API key).
    • Fetches WHOIS data (registrar, country, city, dates, abuse email).
    • Supports JSON or text output with customizable file names.
    • Quiet mode to suppress terminal output.
  • Use Case: Assesses a website’s configuration for potential misconfigurations (e.g., weak headers), though findings like missing headers require context to be reportable vulnerabilities.

so1fuzz: Web Directory Enumeration

  • Repository: https://github.com/so1icitx/so1fuzz
  • Purpose: Enumerates directories and files on a web server by fuzzing a target URL with a wordlist to discover valid paths.
  • Features:
    • Tests paths (e.g., /admin, /login) with multithreading (default: 100 threads) for speed.
    • Filters HTTP status codes (default: ignores 404) to focus on relevant results.
    • Captures response sizes to identify meaningful content.
    • Supports JSON, CSV, or text output with customizable file names.
    • Quiet mode to suppress terminal output.
    • Color-coded feedback (green for valid status codes) using colorama.
    • Reports total paths fuzzed and execution time.
  • Use Case: Identifies hidden or sensitive endpoints (e.g., /backup), though discovered paths need manual verification for exploitability.

ARP Spoofer

  • Repository: https://github.com/so1icitx/so1icitx-arp-spoofer
  • Purpose: Performs ARP spoofing for man-in-the-middle (MITM) attacks on local networks to intercept traffic.
  • Features: Redirects traffic by spoofing ARP tables, enabling packet inspection or modification.
  • Use Case: Tests network security in controlled environments, requiring explicit permission due to ethical concerns.

Hash Identifier

  • Repository: https://github.com/so1icitx/so1-hash-identifier
  • Purpose: Identifies hash types (e.g., MD5, SHA1) based on string patterns.
  • Features: Analyzes hash formats and suggests possible algorithms for cracking or verification.
  • Use Case: Assists in password recovery or security audits involving hashed data.

Network Scanner

MAC Spoofer

  • Repository: https://github.com/so1icitx/macso1i
  • Purpose: Changes a network interface’s MAC address to bypass filters or enhance anonymity.
  • Features: Temporarily modifies MAC addresses with minimal system impact.
  • Use Case: Tests network access controls or anonymizes device identity in controlled environments.

Learning Journey

Disclaimer

Use these tools responsibly and only on systems or networks you have permission to test. Unauthorized use may violate laws or terms of service, including those of bug bounty programs. Ensure compliance with ethical guidelines and handle findings securely.

About

my project portfolio

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published