Skip to content

PyHT is an all-in-one graphical toolkit written in Python for ethical hacking, penetration testing, and cybersecurity learning. It provides a clean and easy-to-use interface for executing common attack techniques, network analysis, system manipulation, and data extraction, all from a single platform.

Notifications You must be signed in to change notification settings

Py-Us3r/PyHT-Python-Hacking-Toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PyHT-Python-Hacking-Toolkit

PyHT Logo

⚠️ Legal Notice

This software is designed for:

  • Cybersecurity training
  • Red team exercises
  • Security research
  • Personal lab experiments

Any use on systems without explicit permission from the owner is unauthorized and may violate:

  • Computer Misuse Acts
  • Data Protection Regulations (e.g., GDPR)
  • Criminal Codes

Use responsibly. You are solely responsible for your actions.

Installation (Only Debian)

sudo apt update && sudo apt upgrade -y && sudo apt install python3-pip python3-tk macchanger git -y
git clone https://github.com/Py-Us3r/PyHT-Python-Hacking-Toolkit.git
cd PyHT-Python-Hacking-Toolkit
sudo pip3 install -r requirements.txt --break-system-packages
sudo python3 main.py

Port Scanner

This tool allows you to scan ports on a target IP address using a user-friendly graphical interface built with customtkinter.

ARP Scanner

This module scans the local network using ARP (Address Resolution Protocol) to identify connected devices. It retrieves their IP address, MAC address, and manufacturer information via an external API.

MAC Changer

This module provides a graphical interface to manage the MAC address of network interfaces, allowing you to:

  • Check the current MAC address of a selected interface.
  • Change the MAC address to a new user-specified value.
  • Restore the original MAC address at any time.

ARP Spoofing / Poisoning

This module allows you to perform ARP Poisoning attacks through a graphical interface, making it easier to test and demonstrate man-in-the-middle (MITM) scenarios in controlled environments.

ARP Flooding

This module allows you to perform ARP flooding attacks through a graphical interface, making it easier to test and demonstrate network disruption and denial-of-service scenarios in controlled environments.It launch of continuous ARP flood packets to overwhelm them, with real-time feedback and control to start or stop the attack safely.

Sniffer

This module provides a graphical packet sniffer that allows you to monitor and analyze network traffic in real time. Designed for use in authorized environments, it supports three distinct sniffing modes:

🔍 Modes:

  • Normal Sniffing: Captures and displays a live summary of all network packets on the selected interface.

  • DNS Sniffing: Filters and displays only DNS queries (UDP port 53), allowing users to see domain requests made by the system. Common domains like Google or Bing are ignored for clarity.

  • HTTP Sniffing: Captures HTTP requests, shows visited URLs, and scans raw packet data for potential credential keywords such as pass, login, or user.

Command & Control (C2)

Category Command Name Description
🧬 Persistence Set Persistent Adds a registry key to auto-start on user login.
🖥️ Remote Access Remote Desktop Deploys VNC server (UltraVNC) + ngrok tunnel for remote GUI access.
🧪 System Stress Test Powershell Bomb Infinite PowerShell process spawner. Use only in lab.
Disk Bomb Fills disk space with hidden 50MB files. Use only in lab.
💻 System Control Reboot System Reboots the remote machine immediately.
Shutdown System Shuts down the system immediately.
Set Reboot Persistent Adds script to force reboot on each user login.
🌍 Reconnaissance Get Location Retrieves IP-based geolocation info.
Get Clipboard Displays current clipboard content.
⌨️ Keystroke Capture Keylogger Installs keylogger that emails captured keys.
📸 Visual Interaction Make Screenshot Takes a screenshot and sends via email.
Show pop-up window Displays a custom message box on the remote system.
Voice Message Converts text to voice and plays it on the target system.
🔐 Password Recovery Firefox Passwords Extracts saved passwords from Firefox.
Chrome / Edge / etc. Passwords Extracts saved passwords from Chromium-based browsers.
📦 Python Utilities Install Python Downloads and installs Python 3 silently if not available.
🔒 File Encryption Encrypt File(s) Encrypts specified files using Python script and fixed key.
Encrypt All Files Recursively encrypts user documents (txt, docx, pdf, etc.).
Encrypt All Files with Alert Same as above + warning pop-up and voice message.
List Encrypted File(s) Displays a log of previously encrypted files.
Decrypt File(s) Decrypts previously encrypted files using the same key.

About

PyHT is an all-in-one graphical toolkit written in Python for ethical hacking, penetration testing, and cybersecurity learning. It provides a clean and easy-to-use interface for executing common attack techniques, network analysis, system manipulation, and data extraction, all from a single platform.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •