mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-22 21:59:29 -05:00
Add "Physical Access Tools" section with three example tools.
This commit is contained in:
parent
4479282832
commit
0e5987d22f
@ -31,6 +31,7 @@ A collection of awesome penetration testing resources
|
||||
- [OSInt Tools](#osint-tools)
|
||||
- [Anonymity Tools](#anonymity-tools)
|
||||
- [Reverse Engineering Tools](#reverse-engineering-tools)
|
||||
- [Physical Access Tools](#physical-access-tools)
|
||||
- [CTF Tools](#ctf-tools)
|
||||
- [Practice CTFs](#practice-ctfs)
|
||||
- [Books](#books)
|
||||
@ -299,6 +300,11 @@ A collection of awesome penetration testing resources
|
||||
* [peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB
|
||||
* [dnSpy](https://github.com/0xd4d/dnSpy) - dnSpy is a tool to reverse engineer .NET assemblies
|
||||
|
||||
#### Physical Access Tools
|
||||
* [LAN Turtle](https://lanturtle.com/) - a covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
|
||||
* [USB Rubber Ducky](http://usbrubberducky.com/) - customizable keystroke injection attack platform masquerading as a USB thumbdrive
|
||||
* [Poisontap](https://samy.pl/poisontap/) - siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers
|
||||
|
||||
#### CTF Tools
|
||||
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs
|
||||
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks
|
||||
|
Loading…
Reference in New Issue
Block a user