Welcome to "My Tools," a repository showcasing my personal projects and tools developed for pentesting, network analysis, and programming exploration.
This collection includes tools I’ve built. Each tool is hosted on its own GitHub repository, linked below with brief descriptions.
- Repository: https://github.com/so1icitx/so1icitx-arp-spoofer
- Purpose: A tool for performing ARP spoofing attacks to enable man-in-the-middle (MITM) capabilities. Useful for intercepting network traffic on local networks.
- Features: Spoofs ARP tables to redirect traffic through the attacker's machine.
- Use Case: Network security testing and educational purposes.
- Repository: https://github.com/so1icitx/so1-hash-identifier
- Purpose: Identifies the type of hash (e.g., MD5, SHA1) based on its format or characteristics.
- Features: Analyzes hash strings and suggests possible algorithms.
- Use Case: Precursor to hash cracking during CTFs or pentests.
- Repository: https://github.com/so1icitx/so1ic-network-scanner
- Purpose: Scans networks to discover live hosts, open ports, and services.
- Features: Likely includes basic port scanning and host discovery functionalities.
- Use Case: Reconnaissance phase of pentesting engagements.
- Repository: https://github.com/so1icitx/macso1i
- Purpose: A MAC address spoofer to change the network interface’s MAC address.
- Features: Allows temporary MAC address modification for anonymity or bypassing MAC-based filters.
- Use Case: Evading network restrictions or testing MAC filtering security.
- Repository: https://github.com/so1icitx/so1icitx-programming-journey
- Purpose: A personal log of my programming learning process, including projects, exercises, and notes.
- Features: Documents my growth in coding skills, likely with examples in various languages.
- Use Case: Inspiration for others and a reference for my own progress.
- Feedback: Suggestions or bug reports? Send me an email at '[email protected]'.
- Collaboration: Feel free to fork and submit pull requests with improvements!
- New Tools: I’ll update this README as I develop more tools—stay tuned!