An open API service indexing awesome lists of open source software.

https://github.com/syslog777/psak

The Pentester's Swiss Army Knife
https://github.com/syslog777/psak

kali-linux pentesting psak python-3-6

Last synced: 18 days ago
JSON representation

The Pentester's Swiss Army Knife

Awesome Lists containing this project

README

        

# psak

[![N|Solid](https://www.python.org/static/community_logos/python-powered-w-100x40.png)](https://nodesource.com/products/nsolid)
[![psak](https://img.shields.io/badge/PSAK-Open--Source-000000.svg)](https://github.com/Syslog777/psak/)
[![GitHub stars](https://img.shields.io/github/stars/Syslog777/psak.svg)](https://github.com/Syslog777/psak/stargazers)
[![GitHub forks](https://img.shields.io/github/forks/Syslog777/psak.svg)](https://github.com/Syslog777/psak/network)
[![Github issues](https://img.shields.io/github/issues/Syslog777/psak.svg)](https://github.com/Syslog777/psak/issues)
[![Python 3.6](https://img.shields.io/badge/Python-3.6-00BFFF.svg)](https://www.python.org/downloads/release/python-363/)
[![License](https://img.shields.io/github/license/Syslog777/psak.svg)](https://github.com/Syslog777/psak/blob/Release-0.5/LICENSE)

### Project Objectives

1. Make pentesting easier

2. Make pentesting simpler

3. Make pentesting make sense

### How does psak make pentesting easier, simpler and more sensible?
- Features ready to use commands that are generally customizable
- Cuts out the syntax and focuses on the concepts
- Maintains consistency and demonstrates intuitive design
### PSAK Framework

PSAK is simple to intergrate with, provided a intermediate

understanding of software develpment and Python 3. Just fork the

project, add you module and then submit a pull request.

> Simply study the existing code and follow the style you sense.

PSAK Package | Description

------------- | -------------

psak_src | holds the psak project

exploit_modules | holds each psak exploit module package

setup.py | psak installation file

### Installation Instructions

Copy and paste the following into your terminal as user root

to install psak:

```

apt-get update

apt-get upgrade

apt-get install python3

apt-get install python3-pip

apt-get install pip

apt-get install pip3

pip3 install --upgrade pip

pip install --upgrade google-api-python-client

pip3 install setuptools

pip3 install ipython

pip3 install graphviz

pip3 install cryptography

pip3 install scapy-python3

pip3 install matplotlib

pip3 install networkx

pip3 install pyx

pip3 install latex

pip3 install docopt

pip3 install netaddr

pip3 install requests

apt-get install tcpdump python3-crypto ipython3

apt-get install python3-tk

#Basic penetration utils

apt-get install airodump-ng

apt-get install aireplay-ng

apt-get install ip

apt-get install arping

# Finish up

pip3 install psak

apt autoremove

```

### Networking Research

- [Scapy-Attacks][Scapy-Attacks]: scapy based attack research (Intergration in progress)

- [Ddos database][ddosd]: Ddos knowledge database ((Intergration in progress))

- [James' Security Blog][jsb]: A small comprehensive list of attacks and their implementation

- [Wifi ID's][juniper]: Understanding the network terms SSID, BSSID, and ESSID

- [Deauthentication Attack][deauth]: how to create and send

wireless deauthentication packets using python and scapy

# Network Attacks

If the feature has not been marked completed, you can contribute

by writing an implementation of it by attack type

##### Basic Brute-Force Connectionless Attacks

- UDP Flood

- ICMP Flood

- IGMP Flood

##### Complex Brute-Force Connectionless Attacks

- Smurf Attacks

- Fraggle Attacks

- DNS Amplification

##### Basic Brute-Force Connection-Oriented Attacks

- TCP-SYN Flood (Complete)

- TCP-RST Attack

- TCP-PSH+ACK Attack

##### Project payload list

> A list of frameworks to use to design deliverable payloads for penetration testers.

- [PowerSploit][powersploit]: PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.

- [Offensive-Security Exploit database][exploit-database]: an official repository of The Exploit Database, a project sponsored by Offensive Security

- [DHCPig][dhcpig]: initiates an advanced DHCP exhaustion attack

[ddosd]:

[dhcpTake]:

[powersploit]:

[waf]:

[tplMap]:

[mitmAP]:

[sshMitm]:

[tlsprober]:

[finmap]:

[NoSql]:

[webscrnshot]:

[exploit-database]:

[dhcpig]:

[slowloris]:

[DHCP-starvation]:

[Scapy-Attacks]:

[jsb]:

[juniper]:

[deauth]: