Skip to content

Preventnetworkhacking/oyshell

 
 

Repository files navigation

🐚 OyShell

Network Security Research Toolkit
An Oystra security research project


⚠️ Legal Disclaimer

OyShell is designed for authorized security testing and research ONLY.

By using this software, you agree that:

  • You have explicit written permission to test the target systems
  • You will not use this tool for malicious purposes
  • You understand that unauthorized network attacks are illegal under laws like the CFAA
  • You accept full responsibility for your actions

Responsible Disclosure: If you discover vulnerabilities using OyShell, please report them responsibly to the affected parties.


🎯 Purpose

OyShell is a network stress-testing and security research toolkit. It helps security professionals:

  • Test resilience of networks and services against DoS conditions
  • Understand how various network protocols behave under load
  • Identify potential weaknesses in defensive configurations
  • Train defensive teams (blue teams) with realistic scenarios

🔧 Features

Module Protocol Use Case
l3 ICMP Ping flood testing
l4 TCP/UDP Transport layer stress tests
l7 HTTP Application layer testing
wifi IEEE 802.11 Wireless deauth testing
bl L2CAP Bluetooth device testing
arp ARP ARP spoofing detection
scanner TCP/ICMP Network reconnaissance

📦 Installation

Quick Install (Linux)

git clone https://github.com/Preventnetworkhacking/oyshell.git
cd oyshell
pip install -r requirements.txt
python main.py

Docker (Recommended)

docker build -t oyshell .
docker run -it --net=host oyshell

System-Wide Install

sudo ./install.sh
oyshell  # Run from anywhere

🚀 Quick Start

# Start OyShell
python main.py

# Inside OyShell:
OyShell> l4          # Load Layer 4 module
OyShell/l4> help     # Show available commands
OyShell/l4> ip <target>
OyShell/l4> port 80
OyShell/l4> threads 10
OyShell/l4> run

📋 Requirements

  • Python 3.10+
  • Linux (recommended) or macOS
  • Root/sudo for certain modules (wifi, arp)

Dependencies

urllib3>=2.0.0
python-nmap>=0.7.1
Flask>=3.0.0
requests>=2.31.0
scapy>=2.5.0

🏗️ Project Structure

oyshell/
├── main.py              # Entry point
├── oyshell_core/        # Core modules
│   ├── main.py
│   ├── CLIF_Framework/  # CLI framework
│   └── modules/
│       ├── l3/          # ICMP module
│       ├── l4/          # TCP/UDP module
│       ├── l7/          # HTTP module
│       ├── wifi/        # Wireless module
│       ├── bl/          # Bluetooth module
│       ├── arp/         # ARP module
│       ├── scanner/     # Network scanner
│       └── server/      # Distributed server
├── Dockerfile
├── requirements.txt
└── README.md

🤝 Contributing

  1. Fork the repository
  2. Create a feature branch
  3. Submit a pull request

Please ensure all contributions maintain the tool's ethical focus on security research.


📜 License

MIT License - see LICENSE


🔗 Links


🛡️ Built for defense, not offense 🛡️

About

OyShell - Network Security Research Toolkit. An Oystra security research project for authorized penetration testing.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages

  • Python 92.4%
  • Shell 7.0%
  • Dockerfile 0.6%