https://github.com/syslog777/psak
The Pentester's Swiss Army Knife
https://github.com/syslog777/psak
kali-linux pentesting psak python-3-6
Last synced: 18 days ago
JSON representation
The Pentester's Swiss Army Knife
- Host: GitHub
- URL: https://github.com/syslog777/psak
- Owner: Syslog777
- License: bsd-3-clause
- Created: 2017-12-10T02:29:04.000Z (over 7 years ago)
- Default Branch: psak
- Last Pushed: 2020-01-25T10:13:47.000Z (over 5 years ago)
- Last Synced: 2024-04-23T09:41:30.983Z (about 1 year ago)
- Topics: kali-linux, pentesting, psak, python-3-6
- Language: Python
- Homepage:
- Size: 183 KB
- Stars: 28
- Watchers: 6
- Forks: 8
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# psak
[](https://nodesource.com/products/nsolid)
[](https://github.com/Syslog777/psak/)
[](https://github.com/Syslog777/psak/stargazers)
[](https://github.com/Syslog777/psak/network)
[](https://github.com/Syslog777/psak/issues)
[](https://www.python.org/downloads/release/python-363/)
[](https://github.com/Syslog777/psak/blob/Release-0.5/LICENSE)### Project Objectives
1. Make pentesting easier
2. Make pentesting simpler
3. Make pentesting make sense
### How does psak make pentesting easier, simpler and more sensible?
- Features ready to use commands that are generally customizable
- Cuts out the syntax and focuses on the concepts
- Maintains consistency and demonstrates intuitive design
### PSAK FrameworkPSAK is simple to intergrate with, provided a intermediate
understanding of software develpment and Python 3. Just fork the
project, add you module and then submit a pull request.
> Simply study the existing code and follow the style you sense.
PSAK Package | Description
------------- | -------------
psak_src | holds the psak project
exploit_modules | holds each psak exploit module package
setup.py | psak installation file
### Installation Instructions
Copy and paste the following into your terminal as user root
to install psak:
```
apt-get update
apt-get upgrade
apt-get install python3
apt-get install python3-pip
apt-get install pip
apt-get install pip3
pip3 install --upgrade pip
pip install --upgrade google-api-python-client
pip3 install setuptools
pip3 install ipython
pip3 install graphviz
pip3 install cryptography
pip3 install scapy-python3
pip3 install matplotlib
pip3 install networkx
pip3 install pyx
pip3 install latex
pip3 install docopt
pip3 install netaddr
pip3 install requests
apt-get install tcpdump python3-crypto ipython3
apt-get install python3-tk
#Basic penetration utils
apt-get install airodump-ng
apt-get install aireplay-ng
apt-get install ip
apt-get install arping
# Finish up
pip3 install psak
apt autoremove
```
### Networking Research
- [Scapy-Attacks][Scapy-Attacks]: scapy based attack research (Intergration in progress)
- [Ddos database][ddosd]: Ddos knowledge database ((Intergration in progress))
- [James' Security Blog][jsb]: A small comprehensive list of attacks and their implementation
- [Wifi ID's][juniper]: Understanding the network terms SSID, BSSID, and ESSID
- [Deauthentication Attack][deauth]: how to create and send
wireless deauthentication packets using python and scapy
# Network Attacks
If the feature has not been marked completed, you can contribute
by writing an implementation of it by attack type
##### Basic Brute-Force Connectionless Attacks
- UDP Flood
- ICMP Flood
- IGMP Flood
##### Complex Brute-Force Connectionless Attacks
- Smurf Attacks
- Fraggle Attacks
- DNS Amplification
##### Basic Brute-Force Connection-Oriented Attacks
- TCP-SYN Flood (Complete)
- TCP-RST Attack
- TCP-PSH+ACK Attack
##### Project payload list
> A list of frameworks to use to design deliverable payloads for penetration testers.
- [PowerSploit][powersploit]: PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.
- [Offensive-Security Exploit database][exploit-database]: an official repository of The Exploit Database, a project sponsored by Offensive Security
- [DHCPig][dhcpig]: initiates an advanced DHCP exhaustion attack
[ddosd]:
[dhcpTake]:
[powersploit]:
[waf]:
[tplMap]:
[mitmAP]:
[sshMitm]:
[tlsprober]:
[finmap]:
[NoSql]:
[webscrnshot]:
[exploit-database]:
[dhcpig]:
[slowloris]:
[DHCP-starvation]:
[Scapy-Attacks]:
[jsb]:
[juniper]:
[deauth]: