Requirements • How To • Tools • Credits
This repo is an addition to my previous repo /Malware-Dev-and-Network-Exploitation-Tools. It brings mostly NEW tools to use in a penetration test, as well as Burp Suite extensions.
- It is recommended to use the tools in this repository with virtual environments. This keeps your projects and its dependencies separate from your main Python installation.
$ sudo apt-get install python3-venv
$ sudo mkdir myvirtualenvfolder
$ cd myvirtualenvfolder
~/myvirtualenvfolder$ python3 -m venv virtualv
~/myvirtualenfolderv$ source virtualv/bin/activate
(virtualv) ~/myvirtualenvfolder$ python
-
An IDE: VS Code (suggested)
apt-get install codeor download it here -
Python 3.6 or higher. Installation depends on your OS, if you need help, click here
- Download the repo:
$ sudo git clone https://github.com/crake7/Network-Pen-Test-Tools.git - Have a look at the Tools section below to check the programs in each folder.
- Each folder has a README.md file that provides additional information for each tool.
-
Program Name Description arper.pyYour good ol' ARP cache poisoner with host discovery functionality. netcat.pySimple client-server socket tool to run a shell, upload files and execute a command (Netcat-friendly). proxy.pyTCP proxy to forward and modify traffic, or assess network-based software. tcp-client.pyBasic TCP client to test for services, fuzz, or perform any number of other tasks. tcp-server.pyTCP server to write command shells or crafting a proxy. udp-client.pyBasic UDP client to test for services, fuzz, or perform any number of other tasks. -
Program Name Description rforward.pyReverse SSH tunneling using Paramiko's demo file with slight modifications. ssh_cmd.pyAvoid dectection making a connection to a SSH server and run a single command. ssh_rcmd.pyReverse SSH client. It receives commands from an SSH server. Useful for Windows clients. ssh_server.pyReverse SSH server. It sends commands to the SSH client( ssh_rcmd.py). Useful for Windows clients. -
Program Name Description host-scanner.pyUDP host discovery (compatible with Windows/Linux) scapy-mailsniffer.pySniffs traffic and steals email credentials (SMTP, POP3, IMAP). sniffer.pyReads a single raw packet (compatible with Windows/Linux) sniffer_ip_header_decode.pyIP Packet sniffer (compatible with Windows/Linux) -
Program Name Description cryptor.pyEncrypts data and saves it into a file / Decrypts data from a file. email_exfil.pyEncrypts data and sends it out in an email. (compatible with Windows/Linux) transmit_exfil.pyEncrypts a file and sends it out via file transfer (compatible with Windows/Linux) paste_exfil.pyEncrypts data and posts it in Pastebin (compatible with Windows/Linux) exfil.pyEncrypts, decrypts and exilfrates data via email, file transfer or Pastebin. (compatible with Windows/Linux) -
Program Name Description vulnerable_service.pyFramework to install a potentially vulnerable service. process_monitor.pyTracks process creation and execution. (No API hooking) proc_privileges_monitor.pyTracks process creation, execution and its privileges. file_monitor.pyMonitors any changes in the Windows temporary directories. code_injector.pyMonitors any new files in a specified directory, injects code into them and spawns a reverse shell.
This repo was created while reading the amazing book: Black Hat Python 2 by Justin Seitz and Tim Arnold.
Writers and contributors take NO responsibility and/or liability for how you choose to use any of the source code available here. By using any of the files available in this repository, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again, ALL files available here are for EDUCATION and/or RESEARCH purposes ONLY.
The code is licensed under the MIT License.