Skip to content

Handy Python Network Tools to use during penetration test engagements.

Notifications You must be signed in to change notification settings

crake7/Network-Pen-Test-Tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Ethical Hacking: Tools 2.0

An NEW assortment of Penetration Testing tools written in Python 3.

RequirementsHow ToToolsCredits


Are you looking for additional crafted tools to use during a penetration test?

This repo is an addition to my previous repo /Malware-Dev-and-Network-Exploitation-Tools. It brings mostly NEW tools to use in a penetration test, as well as Burp Suite extensions.

Requirements

  • It is recommended to use the tools in this repository with virtual environments. This keeps your projects and its dependencies separate from your main Python installation.
$ sudo apt-get install python3-venv
$ sudo mkdir myvirtualenvfolder
$ cd myvirtualenvfolder
~/myvirtualenvfolder$ python3 -m venv virtualv
~/myvirtualenfolderv$ source virtualv/bin/activate
(virtualv) ~/myvirtualenvfolder$ python
  • An IDE: VS Code (suggested) apt-get install code or download it here

  • Python 3.6 or higher. Installation depends on your OS, if you need help, click here

How-to

  1. Download the repo: $ sudo git clone https://github.com/crake7/Network-Pen-Test-Tools.git
  2. Have a look at the Tools section below to check the programs in each folder.
  3. Each folder has a README.md file that provides additional information for each tool.

Tools

  • Networking Tools

    Program Name Description
    arper.py Your good ol' ARP cache poisoner with host discovery functionality.
    netcat.py Simple client-server socket tool to run a shell, upload files and execute a command (Netcat-friendly).
    proxy.py TCP proxy to forward and modify traffic, or assess network-based software.
    tcp-client.py Basic TCP client to test for services, fuzz, or perform any number of other tasks.
    tcp-server.py TCP server to write command shells or crafting a proxy.
    udp-client.py Basic UDP client to test for services, fuzz, or perform any number of other tasks.
  • SSH Tools

    Program Name Description
    rforward.py Reverse SSH tunneling using Paramiko's demo file with slight modifications.
    ssh_cmd.py Avoid dectection making a connection to a SSH server and run a single command.
    ssh_rcmd.py Reverse SSH client. It receives commands from an SSH server. Useful for Windows clients.
    ssh_server.py Reverse SSH server. It sends commands to the SSH client(ssh_rcmd.py). Useful for Windows clients.
  • Sniffers

    Program Name Description
    host-scanner.py UDP host discovery (compatible with Windows/Linux)
    scapy-mailsniffer.py Sniffs traffic and steals email credentials (SMTP, POP3, IMAP).
    sniffer.py Reads a single raw packet (compatible with Windows/Linux)
    sniffer_ip_header_decode.py IP Packet sniffer (compatible with Windows/Linux)
  • Exfiltration

    Program Name Description
    cryptor.py Encrypts data and saves it into a file / Decrypts data from a file.
    email_exfil.py Encrypts data and sends it out in an email. (compatible with Windows/Linux)
    transmit_exfil.py Encrypts a file and sends it out via file transfer (compatible with Windows/Linux)
    paste_exfil.py Encrypts data and posts it in Pastebin (compatible with Windows/Linux)
    exfil.py Encrypts, decrypts and exilfrates data via email, file transfer or Pastebin. (compatible with Windows/Linux)
  • Windows Privilege Escalation

    Program Name Description
    vulnerable_service.py Framework to install a potentially vulnerable service.
    process_monitor.py Tracks process creation and execution. (No API hooking)
    proc_privileges_monitor.py Tracks process creation, execution and its privileges.
    file_monitor.py Monitors any changes in the Windows temporary directories.
    code_injector.py Monitors any new files in a specified directory, injects code into them and spawns a reverse shell.

Credits

This repo was created while reading the amazing book: Black Hat Python 2 by Justin Seitz and Tim Arnold.

Writers and contributors take NO responsibility and/or liability for how you choose to use any of the source code available here. By using any of the files available in this repository, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again, ALL files available here are for EDUCATION and/or RESEARCH purposes ONLY.

License

The code is licensed under the MIT License.

Releases

No releases published

Packages

No packages published