Skip to content
No description, website, or topics provided.
Branch: master
Clone or download
Latest commit dd7efb2 Jan 25, 2020
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Update FUNDING.yml Jan 25, 2020
logo Add files via upload Dec 18, 2019
shtaklatanemoosaizmuknesh HTTP Login Sniff module Dec 5, 2019
LICENSE HTTP Login Sniff module Dec 5, 2019 Update Dec 18, 2019
kosaka.txt Create kosaka.txt Dec 5, 2019 HTTP Login Sniff module Dec 5, 2019 Update Dec 5, 2019

Shtaklatanemoosaizmuknesh Python 2.7.17


For Kali Linux 2019.4 > Python 2.7.17


  • Need packages
pip3 install -r kosaka.txt


  • Change the path of the pip3 env to pip into a bin directory it depends from where is your already installed pip3!

  • Check

whereis pip3
  • Soft link
ln -s /usr/bin/pip3 /usr/bin/pip
  • Installing the module "shtaklatanemoosaizmuknesh"
python -m pip install -i shtaklatanemoosaizmuknesh
  • test
>>> from shtaklatanemoosaizmuknesh import shtaklatanemoosaizmuknesh
  • or
from shtaklatanemoosaizmuknesh import shtaklatanemoosaizmuknesh
print("Yeah you are a samurai ;)")
  • then
git clone

cd maachujdo/maachujdo_module/

python3 -t>target -g>gateway

Uninstall the module

pip uninstall shtaklatanemoosaizmuknesh

  • link:


The dependencies are for Python3 but this module is using Python2 because I combined packages from Python 3 with Python 2. However, Python 2 can use packages from Python 3 without any problems when they are implementing in his own environment!


Do not use pip for this module, this is tested only on Kali Linux 2019.4. This module is only for advanced users and his only for penetration testing in the network!

  • Do not do this anywhere in the network, if you decide to do it, you will do that on your own risk!

BR nu11secur1ty

Understanding of Web Protocols - HTTP and HTTPS

Do you know that 68% of internet users believe that current laws for protecting their rights are not good enough?

Every time Google introduces a new preference, the internet takes/ is forced to note. Something similar happened when Google announced that websites with SSL Certificate / HTTPS protocol will be preferred in search engine results. I will try to cover the fundamentals of HTTP and HTTPS protocols

Before we dive deeper into understanding about HTTP and HTTPS protocol, let’s try to understand the meaning of the word protocol.

What is HTTP?

HTTP is Hypertext transfer protocol. Simply put - Rules to sending and receiving text-based messages. As we all know, computers work in a language of 1's and 0's i.e. Binary language. Therefore, potentially every set of 1's and 0's construct something, it could be a word.

Let's say I want to write 'a'. Now, if 0 stands for 'a', 1 stands for 'b', and 01 stands for 'c', I can infer that a combination of 0's and 1's can construct a word as well. In this case, the text is already constructed and is being sent on the wire. The computer works on many languages - pure binary, text and some other formats like byte codes. Here, what is being transferred is text. I am emphasizing on 'text' because this text is interpreted by the browser and the moment browser interprets it, it becomes hypertext, and the protocol that transfers the text is referred to as hypertext transfer protocol - HTTP.

Using HTTP, you can definitely transfer images and text and even sound, but not videos.

What is HTTPS?

Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for 'Secure'. It means all communications between your browser and the website are encrypted. HTTPS is often used to protect highly confidential online transactions like online banking and online shopping order forms.

What is the importance of HTTPS?

We agreed upon the fact that what is being transferred from one point to another is text. To understand why HTTPS protocol, we first should know how wi-fi routers function.Let's say you are at an airport and you are connecting to the wi-fi which is the property of a third party. Now, when you are communicating over HTTP, the text is being transferred by their router. And if I go to a low version of the router, I can comfortably check and read the text that is being transferred. There could be a password that I can use to login to your bank site and do a fraudulent transaction!. Point being - this is fundamentally insecure. This is called the man in the middle attack.

And this why do we need https when HTTP seems to suffice.

  • Encryption and Encryption Levels

Encryption is simple terms is a hiding information. There are various ways to do so. You must have heard these terms - 128 bit encrypt HTTPS and 64 bit encrypt HTTPS. 128-bit Encrypt is a high encryption technique and it's very difficult to decrypt (decode). In the case of HTTPS when the data is being transferred on the wires, the man in the middle may still know what is being transferred, but can not make sense out of it as the data is encrypted. Only the browser will decrypt it and show it, and the server will decrypt it and use it for transactions.

For the curious one’s - There also happens to be a movie on encryption, Imitation Games. The entire plot of the movie was based on decrypting the German codes, which were to reform the entire course of the war. Those codes were very difficult to decrypt, but how Alan Turing finally does it. How does this happens when you request to open a site in a browser?

To understand this, let us imagine that there is one Server that resides somewhere serving all the request for one domain. Now, when I type, it's a server that I am connecting to, taking data from and rendering it in the browser.

To simplify further, imagine a domain name being broadcasted from one server. There resides one machine somewhere connected to the internet and the moment you say in your browser, you connect to that machine, pick data from that machine and show it in the browser. If you have saved your picture, it gets uploaded to that machine. Now, if you want to see that picture, you go to, which transfers the picture from the machine to the browser to be shown to you.

This process cannot be completed if I am not able to reach that particular machine. For this to happen, every machine has an address (the way we have a mobile number), it is called the IP address and every domain has an IP map. The moment you enter this user-friendly URL -, it converts this username into IP and connects to the router to reach out to that particular service line associated with this URL. Once it reaches to the server, it raises a request of what is needed. It is represented as '', helping the user understand the request made by him. As a result, the server gives him the results according to your request, which gets rendered to the browser. Now, to save our data from such attacks, we need to encrypt that data.


This is the point of SSL, to prevent this kind of unauthorized snooping. To authorize your proxy you need to tell the device to trust the proxy certificate, and tell the device clients to trust your certificate or use the devices private key, which it sounds like you don't have access to. For more information:

understanding of scapy:



BR nu11secu1rty:

You can’t perform that action at this time.