Pinned Repositories
gatsby
Build blazing fast, modern apps and websites with React
hate-memes-detection-master
finds hate memes from facebook using deep learning
php-admin-panel
Simple Project with PHP contain : - Home Page - Contact Page with contact from - Admin Panel - Edit Pages - Edit Config
scanmaster
# scanless # created by shivroop This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [t1shopper](http://www.t1shopper.com/tools/port-scan/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] scanless, an online port scan scraper. optional arguments: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: hackertarget) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | t1shopper | http://www.t1shopper.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.1.3... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') >>> print(output['raw']) Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.065s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, { "port": "443", "state": "closed", "service": "https", "protocol": "tcp" } ] ``` ## Docker **Note from the repo author:** I did not create, nor do I maintain Docker support or the Dockerfile for scanless. It was a nice community addition. If it's broken please open an issue or submit a pull request and I'll take a look. Thank you! ### Build To build the Docker image, run: ```shell $ docker build -t scanless . ``` ### Usage To use the Docker image previously created, run the following with whichever options you want like `--help`: ``` $ docker run --rm -it scanless --help ``` If that long command is too troublesome, you can make an alias like so: `alias scanless="docker run --rm -it scanless"` and then run `scanless` as you would normally: ``` $ scanless --help $ scanless -l $ scanless -t scanme.nmap.org -s yougetsignal ```
scapy-masters
<p align="center"> <img src="doc/scapy_logo.png" width=200> </p> <!-- start_ppi_description --> # Scapy # created by shivroop [![Travis Build Status](https://travis-ci.com/secdev/scapy.svg?branch=master)](https://travis-ci.com/secdev/scapy) <!-- ignore_ppi --> [![AppVeyor Build status](https://ci.appveyor.com/api/projects/status/os03daotfja0wtp7/branch/master?svg=true)](https://ci.appveyor.com/project/secdev/scapy/branch/master) <!-- ignore_ppi --> [![Codecov Status](https://codecov.io/gh/secdev/scapy/branch/master/graph/badge.svg)](https://codecov.io/gh/secdev/scapy) <!-- ignore_ppi --> [![Codacy Badge](https://api.codacy.com/project/badge/Grade/30ee6772bb264a689a2604f5cdb0437b)](https://www.codacy.com/app/secdev/scapy) <!-- ignore_ppi --> [![PyPI Version](https://img.shields.io/pypi/v/scapy.svg)](https://pypi.python.org/pypi/scapy/) [![Python Versions](https://img.shields.io/pypi/pyversions/scapy.svg)](https://pypi.python.org/pypi/scapy/) [![License: GPL v2](https://img.shields.io/badge/License-GPL%20v2-blue.svg)](LICENSE) [![Join the chat at https://gitter.im/secdev/scapy](https://badges.gitter.im/secdev/scapy.svg)](https://gitter.im/secdev/scapy) <!-- ignore_ppi --> Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace `hping`, 85% of `nmap`, `arpspoof`, `arp-sk`, `arping`, `tcpdump`, `wireshark`, `p0f`, etc.). It also performs very well at a lot of other specific tasks that most other tools can't handle, like sending invalid frames, injecting your own 802.11 frames, combining techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected channel, ...), etc. Scapy supports Python 2.7 and Python 3 (3.4 to 3.8). It's intended to be cross platform, and runs on many different platforms (Linux, OSX, \*BSD, and Windows). ## Getting started Scapy is usable either as a **shell** or as a **library**. For further details, please head over to [Getting started with Scapy](https://scapy.readthedocs.io/en/latest/introduction.html), which is part of the documentation. ### Shell demo ![Scapy install demo](https://secdev.github.io/files/doc/animation-scapy-install.svg) Scapy can easily be used as an interactive shell to interact with the network. The following example shows how to send an ICMP Echo Request message to `github.com`, then display the reply source IP address: ```python sudo ./run_scapy Welcome to Scapy >>> p = IP(dst="github.com")/ICMP() >>> r = sr1(p) Begin emission: .Finished to send 1 packets. * Received 2 packets, got 1 answers, remaining 0 packets >>> r[IP].src '192.30.253.113' ``` ### Resources The [documentation](https://scapy.readthedocs.io/en/latest/) contains more advanced use cases, and examples. Other useful resources: - [Scapy in 20 minutes](https://github.com/secdev/scapy/blob/master/doc/notebooks/Scapy%20in%2015%20minutes.ipynb) - [Interactive tutorial](https://scapy.readthedocs.io/en/latest/usage.html#interactive-tutorial) (part of the documentation) - [The quick demo: an interactive session](https://scapy.readthedocs.io/en/latest/introduction.html#quick-demo) (some examples may be outdated) - [HTTP/2 notebook](https://github.com/secdev/scapy/blob/master/doc/notebooks/HTTP_2_Tuto.ipynb) - [TLS notebooks](https://github.com/secdev/scapy/blob/master/doc/notebooks/tls) ## [Installation](https://scapy.readthedocs.io/en/latest/installation.html) Scapy works without any external Python modules on Linux and BSD like operating systems. On Windows, you need to install some mandatory dependencies as described in [the documentation](http://scapy.readthedocs.io/en/latest/installation.html#windows). On most systems, using Scapy is as simple as running the following commands: ```bash git clone https://github.com/secdev/scapy cd scapy ./run_scapy ``` To benefit from all Scapy features, such as plotting, you might want to install Python modules, such as `matplotlib` or `cryptography`. See the [documentation](http://scapy.readthedocs.io/en/latest/installation.html) and follow the instructions to install them. <!-- stop_ppi_description --> ## Contributing Want to contribute? Great! Please take a few minutes to [read this](CONTRIBUTING.md)!
Simplesite-master
# created by shivroop # SimpleSite A simple demo website.
shivroop4444's Repositories
shivroop4444/scanmaster
# scanless # created by shivroop This is a Python 3 command-line utility and library for using websites that can perform port scans on your behalf. ## Supported Online Port Scanners * [hackertarget](https://hackertarget.com/nmap-online-port-scanner/) * [ipfingerprints](http://www.ipfingerprints.com/portscan.php) * [spiderip](https://spiderip.com/online-port-scan.php) * [standingtech](https://portscanner.standingtech.com/) * [t1shopper](http://www.t1shopper.com/tools/port-scan/) * [viewdns](http://viewdns.info/) * [yougetsignal](http://www.yougetsignal.com/tools/open-ports/) ## Install Do it up: ``` $ pip install scanless --user ``` ## CLI Usage ``` $ scanless --help usage: scanless [-h] [-v] [-t TARGET] [-s SCANNER] [-r] [-l] [-a] scanless, an online port scan scraper. optional arguments: -h, --help show this help message and exit -v, --version display the current version -t TARGET, --target TARGET ip or domain to scan -s SCANNER, --scanner SCANNER scanner to use (default: hackertarget) -r, --random use a random scanner -l, --list list scanners -a, --all use all the scanners -d, --debug debug mode (cli mode off & show network errors) $ scanless --list +----------------+--------------------------------------+ | Scanner Name | Website | +----------------+--------------------------------------+ | hackertarget | https://hackertarget.com | | ipfingerprints | https://www.ipfingerprints.com | | spiderip | https://spiderip.com | | standingtech | https://portscanner.standingtech.com | | t1shopper | http://www.t1shopper.com | | viewdns | https://viewdns.info | | yougetsignal | https://www.yougetsignal.com | +----------------+--------------------------------------+ $ scanless -t scanme.nmap.org -s spiderip Running scanless v2.1.3... spiderip: PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 25/tcp closed smtp 80/tcp open http 110/tcp closed pop3 143/tcp closed imap 443/tcp closed https 465/tcp closed smtps 993/tcp closed imaps 995/tcp closed pop3s 1433/tcp closed ms-sql-s 3306/tcp closed mysql 3389/tcp closed ms-wbt-server 5900/tcp closed vnc 8080/tcp closed http-proxy 8443/tcp closed https-alt ``` ## Library Usage ``` >>> import scanless >>> sl = scanless.Scanless() >>> output = sl.scan('scanme.nmap.org', scanner='hackertarget') >>> print(output['raw']) Starting Nmap 7.70 ( https://nmap.org ) at 2020-05-12 21:39 UTC Nmap scan report for scanme.nmap.org (45.33.32.156) Host is up (0.065s latency). Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f PORT STATE SERVICE 21/tcp closed ftp 22/tcp open ssh 80/tcp open http 443/tcp closed https Nmap done: 1 IP address (1 host up) scanned in 0.11 seconds >>> import json >>> print(json.dumps(output['parsed'], indent=2)) [ { "port": "21", "state": "closed", "service": "ftp", "protocol": "tcp" }, { "port": "22", "state": "open", "service": "ssh", "protocol": "tcp" }, { "port": "80", "state": "open", "service": "http", "protocol": "tcp" }, { "port": "443", "state": "closed", "service": "https", "protocol": "tcp" } ] ``` ## Docker **Note from the repo author:** I did not create, nor do I maintain Docker support or the Dockerfile for scanless. It was a nice community addition. If it's broken please open an issue or submit a pull request and I'll take a look. Thank you! ### Build To build the Docker image, run: ```shell $ docker build -t scanless . ``` ### Usage To use the Docker image previously created, run the following with whichever options you want like `--help`: ``` $ docker run --rm -it scanless --help ``` If that long command is too troublesome, you can make an alias like so: `alias scanless="docker run --rm -it scanless"` and then run `scanless` as you would normally: ``` $ scanless --help $ scanless -l $ scanless -t scanme.nmap.org -s yougetsignal ```
shivroop4444/scapy-masters
<p align="center"> <img src="doc/scapy_logo.png" width=200> </p> <!-- start_ppi_description --> # Scapy # created by shivroop [![Travis Build Status](https://travis-ci.com/secdev/scapy.svg?branch=master)](https://travis-ci.com/secdev/scapy) <!-- ignore_ppi --> [![AppVeyor Build status](https://ci.appveyor.com/api/projects/status/os03daotfja0wtp7/branch/master?svg=true)](https://ci.appveyor.com/project/secdev/scapy/branch/master) <!-- ignore_ppi --> [![Codecov Status](https://codecov.io/gh/secdev/scapy/branch/master/graph/badge.svg)](https://codecov.io/gh/secdev/scapy) <!-- ignore_ppi --> [![Codacy Badge](https://api.codacy.com/project/badge/Grade/30ee6772bb264a689a2604f5cdb0437b)](https://www.codacy.com/app/secdev/scapy) <!-- ignore_ppi --> [![PyPI Version](https://img.shields.io/pypi/v/scapy.svg)](https://pypi.python.org/pypi/scapy/) [![Python Versions](https://img.shields.io/pypi/pyversions/scapy.svg)](https://pypi.python.org/pypi/scapy/) [![License: GPL v2](https://img.shields.io/badge/License-GPL%20v2-blue.svg)](LICENSE) [![Join the chat at https://gitter.im/secdev/scapy](https://badges.gitter.im/secdev/scapy.svg)](https://gitter.im/secdev/scapy) <!-- ignore_ppi --> Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace `hping`, 85% of `nmap`, `arpspoof`, `arp-sk`, `arping`, `tcpdump`, `wireshark`, `p0f`, etc.). It also performs very well at a lot of other specific tasks that most other tools can't handle, like sending invalid frames, injecting your own 802.11 frames, combining techniques (VLAN hopping+ARP cache poisoning, VoIP decoding on WEP protected channel, ...), etc. Scapy supports Python 2.7 and Python 3 (3.4 to 3.8). It's intended to be cross platform, and runs on many different platforms (Linux, OSX, \*BSD, and Windows). ## Getting started Scapy is usable either as a **shell** or as a **library**. For further details, please head over to [Getting started with Scapy](https://scapy.readthedocs.io/en/latest/introduction.html), which is part of the documentation. ### Shell demo ![Scapy install demo](https://secdev.github.io/files/doc/animation-scapy-install.svg) Scapy can easily be used as an interactive shell to interact with the network. The following example shows how to send an ICMP Echo Request message to `github.com`, then display the reply source IP address: ```python sudo ./run_scapy Welcome to Scapy >>> p = IP(dst="github.com")/ICMP() >>> r = sr1(p) Begin emission: .Finished to send 1 packets. * Received 2 packets, got 1 answers, remaining 0 packets >>> r[IP].src '192.30.253.113' ``` ### Resources The [documentation](https://scapy.readthedocs.io/en/latest/) contains more advanced use cases, and examples. Other useful resources: - [Scapy in 20 minutes](https://github.com/secdev/scapy/blob/master/doc/notebooks/Scapy%20in%2015%20minutes.ipynb) - [Interactive tutorial](https://scapy.readthedocs.io/en/latest/usage.html#interactive-tutorial) (part of the documentation) - [The quick demo: an interactive session](https://scapy.readthedocs.io/en/latest/introduction.html#quick-demo) (some examples may be outdated) - [HTTP/2 notebook](https://github.com/secdev/scapy/blob/master/doc/notebooks/HTTP_2_Tuto.ipynb) - [TLS notebooks](https://github.com/secdev/scapy/blob/master/doc/notebooks/tls) ## [Installation](https://scapy.readthedocs.io/en/latest/installation.html) Scapy works without any external Python modules on Linux and BSD like operating systems. On Windows, you need to install some mandatory dependencies as described in [the documentation](http://scapy.readthedocs.io/en/latest/installation.html#windows). On most systems, using Scapy is as simple as running the following commands: ```bash git clone https://github.com/secdev/scapy cd scapy ./run_scapy ``` To benefit from all Scapy features, such as plotting, you might want to install Python modules, such as `matplotlib` or `cryptography`. See the [documentation](http://scapy.readthedocs.io/en/latest/installation.html) and follow the instructions to install them. <!-- stop_ppi_description --> ## Contributing Want to contribute? Great! Please take a few minutes to [read this](CONTRIBUTING.md)!
shivroop4444/gatsby
Build blazing fast, modern apps and websites with React
shivroop4444/hate-memes-detection-master
finds hate memes from facebook using deep learning
shivroop4444/php-admin-panel
Simple Project with PHP contain : - Home Page - Contact Page with contact from - Admin Panel - Edit Pages - Edit Config
shivroop4444/Simplesite-master
# created by shivroop # SimpleSite A simple demo website.