A comprehensive collection of ethical hacking tools, CTF challenges, and cybersecurity utilities developed for the MO-IT143 course. This repository contains practical implementations of various security analysis tools including file readers, regex extractors, log analyzers, web parsers, cryptographic tools, and flag decoders.
MO-IT143_Ethical_hacking_snippets/
βββ README.md # This documentation
βββ requirements.txt # Python dependencies
βββ env/ # Virtual environment
βββ angie/ # Additional utilities
β βββ html_web_parser.py
β βββ web_parser_app.py
βββ main/ # Main application files
βββ WEEK-1/ # File handling and text analysis
β βββ CTF-W1_mystery_text_file.txt
β βββ fileReader.py
βββ WEEK-2/ # Regular expressions and pattern matching
β βββ file_handling_app.py
β βββ Regex_Info_Extractor.ipynb
β βββ regexExtractor.py
βββ WEEK-3/ # Log analysis and forensics
β βββ CTF-W3_expanded_access_logs.txt
β βββ log_analysis_tool.ipynb
β βββ W3-reflection.md
βββ WEEK-4/ # Web scraping and SQL injection testing
β βββ html_web_parser.py
β βββ sql_injection_tester.py
β βββ W4-reflection.md
β βββ web_parser_app.py
βββ WEEK-5&6/ # Cryptography and password security
β βββ CTF-W5-Milestone1_large_hashed_passwords.txt
β βββ CTF-W5-Milestone1_large_wordlist.txt
β βββ encoder-decoder.py
β βββ Hashing_Passwords.py
β βββ milestone1_cryptic_vault.py
β βββ W5_Practice_Activity_No1-Secret_Message_Encoder.md
β βββ W5_Practice_Activity_No2-Hashing_Passwords_with_SHA-256.md
βββ WEEK-7/ # Advanced flag decoding and forensics
β βββ CTF-W7_large_leaked_transactions.csv
β βββ MO-IT143_Week7_CTF_The_Hidden_Code_BSIT-S3101.py
β βββ W7-reflections.md
βββ WEEK-8/ # Web traffic analysis and HAR file forensics
β βββ CTF-W8_large_captured_web_traffic.har
β βββ PythonPoweredHARAnalysis.py
β βββ ctf_har_flag_extractor.py
β βββ packetSniffingTool.py
β βββ w8.md
βββ WEEK-9&10/ # GUI debugging and code analysis
βββ CTF-W9-Milestone 2.py
Open VS Code in the project folder:
- Open VS Code
- Go to
File>Open Folder...and selectMO-IT143_Ethical_Hacking_Snippets
Open a new terminal in VS Code:
- Go to
Terminal>New Terminal - The terminal should open in your project folder
Activate the virtual environment:
- Windows (cmd):
env\Scripts\activate
- Windows (PowerShell):
.\env\Scripts\Activate.ps1
- Git Bash or WSL:
source env/Scripts/activate
Install required packages:
pip install -r requirements.txtWeb traffic analysis and network forensics tool
cd WEEK-8
python PythonPoweredHARAnalysis.pyFeatures:
- π HAR File Analysis: Parse and analyze HTTP Archive files with 15,000+ requests
- π Session Token Extraction: Extract authentication tokens from API responses
- π― Flag Detection: Search for CTF flags hidden in network traffic
- π Data Visualization: Charts and statistics for traffic patterns
- π¨ Tabbed GUI Interface: Professional multi-tab interface for different analysis views
- π Request Replay: Replay network requests for testing
Use Cases:
- Digital forensics investigation
- API security analysis
- Session token extraction
- Network traffic pattern analysis
Advanced flag detection and decoding tool for CTF challenges
cd WEEK-7
python "MO-IT143 Week7 CTF_The Hidden Code BSIT-S3101.py"Features:
- π― Multi-format Detection: Automatically detects Base64 and hexadecimal encoding
- π Smart Flag Recognition: Searches for common CTF flag patterns
- π CSV Data Analysis: Processes large transaction datasets
- π¨ Modern GUI Interface: User-friendly tkinter-based interface
- π Real-time Progress: Progress tracking during analysis
- πΎ Export Results: Save findings to text files
Supported Flag Patterns:
flag{...}FLAG{...}CTF{...}cyboria{...}CYBORIA{...}- Generic
pattern{...}
Code debugging and logic analysis challenge
cd "WEEK-9&10"
python "CTF-W9-Milestone 2.py"Features:
- π Code Analysis: Debug Python GUI applications
- π§© Logic Flow Tracing: Understand code execution paths
- π― Flag Discovery: Find hidden flags through code debugging
- π¨ Interactive GUI: Test and validate code behavior
Learning Objectives:
- Code debugging techniques
- Understanding program flow
- GUI application testing
- CTF problem-solving strategies
Pattern matching and data extraction tool
cd WEEK-2
# For Jupyter Notebook
jupyter notebook Regex_Info_Extractor.ipynb
# For Python script
python regexExtractor.pySecurity log analysis and forensics
cd WEEK-3
jupyter notebook log_analysis_tool.ipynbWeb scraping and security testing tools
cd WEEK-4
python web_parser_app.py
python sql_injection_tester.pyEncryption, decryption, and password security
cd "WEEK-5&6"
python encoder-decoder.py
python "Hashing Passwords.py"
python milestone1_cryptic_vault.py- File Reader: Basic file handling and text analysis
- Mystery Text Decoder: CTF challenge for hidden content
- Regex Extractor: Advanced regular expression pattern matching
- Data Validation: Input validation and sanitization tools
- Access Log Analyzer: Web server log analysis
- Security Event Detection: Anomaly detection in logs
- Traffic Pattern Analysis: Network behavior analysis
- HTML Parser: Web content extraction and analysis
- SQL Injection Tester: Database security assessment
- Web Vulnerability Scanner: Automated security testing
- Message Encoder/Decoder: Various encoding schemes
- Password Hasher: SHA-256 and other hashing algorithms
- Cryptic Vault: Advanced encryption challenges
- Flag Decoder: Multi-format encoded data analysis
- Transaction Forensics: Financial data investigation
- Pattern Recognition: AI-assisted flag detection
- HAR File Analyzer: HTTP Archive file forensics
- Session Token Extractor: Authentication token analysis
- Network Traffic Inspector: Web traffic pattern analysis
- Request Replay Tool: HTTP request testing and validation
- GUI Debugger: Interactive code debugging challenges
- Logic Flow Analysis: Program execution path tracing
- Code CTF Solutions: Debugging-based flag discovery
- OS: Windows 10/11, macOS 10.14+, or Linux
- Python: 3.8 or higher
- Memory: 4GB RAM minimum (8GB recommended for large datasets)
- Storage: 500MB free space
pandas>=2.2.3
tkinter (built-in)
numpy>=1.24.0
matplotlib>=3.7.0
seaborn>=0.12.0
requests>=2.31.0
beautifulsoup4>=4.13.4
jupyter>=1.0.0
pyperclip>=1.8.2
cryptography>=44.0.2
- Week 1:
CTF-W1_mystery_text_file.txt- Text analysis challenge - Week 3:
CTF-W3_expanded_access_logs.txt- Log forensics - Week 5:
CTF-W5-Milestone1_large_hashed_passwords.txt- Password cracking - Week 5:
CTF-W5-Milestone1_large_wordlist.txt- Dictionary attacks - Week 7:
CTF-W7_large_leaked_transactions.csv- Financial forensics - Week 8:
CTF-W8_large_captured_web_traffic.har- Web traffic analysis - Week 9&10:
CTF-W9-Milestone 2.py- GUI debugging challenge
- Use the appropriate tool for each week's challenge
- Check for multiple encoding layers
- Look for patterns in data structure
- Consider steganography techniques
- Validate findings with multiple methods
ModuleNotFoundError:
# Ensure virtual environment is activated
env\Scripts\activate
pip install -r requirements.txtGUI Not Appearing:
- Check Python tkinter installation
- Verify display settings on remote systems
- Run in local environment if using SSH
Large File Processing:
- Increase system memory allocation
- Process files in chunks
- Use streaming methods for CSV files
Permission Errors:
- Run terminal as administrator (Windows)
- Check file permissions
- Ensure write access to output directories
- Large Datasets: Use pandas chunking for files >100MB
- Memory Usage: Monitor RAM usage during analysis
- Processing Speed: Enable multiprocessing for CPU-intensive tasks
- File Forensics: Digital evidence analysis techniques
- Pattern Recognition: Advanced regex and data mining
- Web Security: Vulnerability assessment and testing
- Cryptanalysis: Encryption/decryption methodologies
- Log Analysis: Security incident investigation
- CTF Methodologies: Competitive cybersecurity techniques
- Python programming for security applications
- GUI development with tkinter
- Data analysis with pandas and numpy
- Web scraping and parsing
- Cryptographic implementations
- Digital forensics techniques
This is an educational project for MO-IT143. Contributions should follow academic integrity guidelines.
Educational use only. See course guidelines for usage restrictions.
For technical issues or questions:
- Check the troubleshooting section
- Review course materials
- Contact course instructor
- Check Python documentation for specific modules
Author: MO-IT143 Student
Course: Ethical Hacking and Cybersecurity
Last Updated: October 10, 2025
The following Gantt chart visualizes the development timeline and learning progression throughout the MO-IT143 Ethical Hacking course:
gantt
title MO-IT143 Ethical Hacking - Course Timeline & Development Progress
dateFormat YYYY-MM-DD
axisFormat %b %d
excludes weekends
section Course Foundation
Course Introduction :done, intro, 2025-01-15, 2d
Environment Setup :done, setup, after intro, 3d
section Week 1 - File Analysis
File Handling Fundamentals :done, w1_theory, 2025-01-20, 2d
Mystery Text File CTF :done, w1_ctf, after w1_theory, 2d
File Reader Development :done, w1_dev, after w1_ctf, 3d
Week 1 Assessment :done, w1_assess, after w1_dev, 1d
section Week 2 - Pattern Matching
Regex Theory & Concepts :done, w2_theory, 2025-01-27, 2d
Regex Extractor GUI :done, w2_gui, after w2_theory, 3d
File Handling App :done, w2_app, after w2_gui, 2d
Jupyter Notebook Lab :done, w2_lab, after w2_app, 2d
Week 2 Deliverables :done, w2_deliver, after w2_lab, 1d
section Week 3 - Log Forensics
Log Analysis Fundamentals :done, w3_theory, 2025-02-03, 2d
Access Log Investigation :done, w3_ctf, after w3_theory, 2d
Analysis Tool Development :done, w3_tool, after w3_ctf, 3d
Security Event Detection :done, w3_detection, after w3_tool, 2d
Week 3 Reflection :done, w3_reflect, after w3_detection, 1d
section Week 4 - Web Security
Web Scraping Techniques :done, w4_theory, 2025-02-10, 2d
HTML Parser Implementation :done, w4_parser, after w4_theory, 3d
SQL Injection Testing :done, w4_sql, after w4_parser, 3d
Web Security Assessment :done, w4_security, after w4_sql, 2d
Week 4 Documentation :done, w4_docs, after w4_security, 1d
section Week 5-6 - Cryptography
Cryptographic Foundations :done, w5_theory, 2025-02-17, 3d
Encoder-Decoder Tool :done, w5_encoder, after w5_theory, 3d
Password Hashing System :done, w5_hash, after w5_encoder, 3d
Cryptic Vault Challenge :done, w5_vault, after w5_hash, 4d
Milestone 1 CTF :done, w5_ctf, after w5_vault, 3d
Cryptography Assessment :done, w5_assess, after w5_ctf, 2d
section Week 7 - Advanced Forensics
Digital Forensics Theory :done, w7_theory, 2025-03-03, 2d
Transaction Data Analysis :done, w7_analysis, after w7_theory, 2d
Flag Decoder Development :done, w7_decoder, after w7_analysis, 4d
Multi-Format Encoding :done, w7_encoding, after w7_decoder, 2d
CTF Challenge Solution :done, w7_ctf, after w7_encoding, 3d
Final Implementation :done, w7_final, after w7_ctf, 2d
Week 7 Reflection :done, w7_reflect, after w7_final, 1d
section Week 8 - Web Traffic Analysis
HAR File Format Study :done, w8_theory, 2025-03-10, 2d
Network Traffic Analysis :done, w8_analysis, after w8_theory, 2d
HAR Analyzer Development :done, w8_analyzer, after w8_analysis, 4d
Session Token Extraction :done, w8_tokens, after w8_analyzer, 2d
CTF Traffic Investigation :done, w8_ctf, after w8_tokens, 3d
Request Replay Features :done, w8_replay, after w8_ctf, 2d
Week 8 Documentation :done, w8_docs, after w8_replay, 1d
section Week 9-10 - Code Debugging & Final Projects
Debugging Fundamentals :done, w9_theory, 2025-03-17, 2d
GUI Code Analysis :done, w9_analysis, after w9_theory, 2d
Logic Flow Tracing :done, w9_debug, after w9_analysis, 3d
CTF Debugging Challenge :done, w9_ctf, after w9_debug, 2d
Final Project Integration :done, w9_integration, after w9_ctf, 3d
Course Completion Review :done, w9_review, after w9_integration, 2d
section Project Milestones
Environment Configured :milestone, m1, 2025-01-18, 0d
First CTF Solved :milestone, m2, 2025-01-24, 0d
GUI Applications Ready :milestone, m3, 2025-02-01, 0d
Log Analysis Complete :milestone, m4, 2025-02-08, 0d
Web Security Tools Done :milestone, m5, 2025-02-15, 0d
Crypto Milestone 1 :milestone, m6, 2025-03-01, 0d
Flag Decoder Released :milestone, m7, 2025-03-10, 0d
HAR Analyzer Complete :milestone, m8, 2025-03-17, 0d
Course Completion :milestone, final, 2025-03-24, 0d
section Documentation
README Development :done, docs_readme, 2025-01-15, 2025-10-10
Code Documentation :done, docs_code, 2025-02-01, 2025-10-10
Weekly Reflections :done, docs_reflect, 2025-01-20, 2025-10-10
Final Project Report :done, docs_final, 2025-03-10, 1w
- π Course Duration: January 15 - March 24, 2025 (10 weeks)
- π― Active Phase: Course Completed - All weeks finished
- π Milestones Achieved: 9 out of 9 major milestones completed
- π Progress Status: 100% complete
| Week | Focus Area | Key Deliverables | Status |
|---|---|---|---|
| Week 1 | File Analysis | File Reader, Mystery Text CTF | β Complete |
| Week 2 | Pattern Matching | Regex Extractor, GUI Applications | β Complete |
| Week 3 | Log Forensics | Access Log Analysis, Security Detection | β Complete |
| Week 4 | Web Security | HTML Parser, SQL Injection Tester | β Complete |
| Week 5-6 | Cryptography | Encoder/Decoder, Password Hashing, Cryptic Vault | β Complete |
| Week 7 | Advanced Forensics | Flag Decoder, Transaction Analysis | β Complete |
| Week 8 | Web Traffic Analysis | HAR Analyzer, Session Token Extraction | β Complete |
| Week 9-10 | Code Debugging | GUI Debugger, Logic Flow Analysis | β Complete |
- β Week 1: File Analysis (Complete)
- β Week 2: Pattern Matching (Complete)
- β Week 3: Log Forensics (Complete)
- β Week 4: Web Security (Complete)
- β Week 5-6: Cryptography (Complete)
- β Week 7: Advanced Forensics (Complete)
- β Week 8: Web Traffic Analysis (Complete)
- β Week 9-10: Code Debugging & Final Projects (Complete)