From 0e5987d22f211ed18e9eccb131a9cf95ac2304f1 Mon Sep 17 00:00:00 2001 From: Meitar Moscovitz Date: Fri, 14 Apr 2017 19:10:36 -0400 Subject: [PATCH] Add "Physical Access Tools" section with three example tools. --- README.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/README.md b/README.md index de1eeea..b138d70 100644 --- a/README.md +++ b/README.md @@ -31,6 +31,7 @@ A collection of awesome penetration testing resources - [OSInt Tools](#osint-tools) - [Anonymity Tools](#anonymity-tools) - [Reverse Engineering Tools](#reverse-engineering-tools) + - [Physical Access Tools](#physical-access-tools) - [CTF Tools](#ctf-tools) - [Practice CTFs](#practice-ctfs) - [Books](#books) @@ -299,6 +300,11 @@ A collection of awesome penetration testing resources * [peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB * [dnSpy](https://github.com/0xd4d/dnSpy) - dnSpy is a tool to reverse engineer .NET assemblies +#### Physical Access Tools +* [LAN Turtle](https://lanturtle.com/) - a covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network. +* [USB Rubber Ducky](http://usbrubberducky.com/) - customizable keystroke injection attack platform masquerading as a USB thumbdrive +* [Poisontap](https://samy.pl/poisontap/) - siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers + #### CTF Tools * [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs * [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks