Add "Physical Access Tools" section with three example tools.

This commit is contained in:
Meitar Moscovitz 2017-04-14 19:10:36 -04:00
parent 4479282832
commit 0e5987d22f
No known key found for this signature in database
GPG Key ID: 07EFAA28AB94BC85

View File

@ -31,6 +31,7 @@ A collection of awesome penetration testing resources
- [OSInt Tools](#osint-tools)
- [Anonymity Tools](#anonymity-tools)
- [Reverse Engineering Tools](#reverse-engineering-tools)
- [Physical Access Tools](#physical-access-tools)
- [CTF Tools](#ctf-tools)
- [Practice CTFs](#practice-ctfs)
- [Books](#books)
@ -299,6 +300,11 @@ A collection of awesome penetration testing resources
* [peda](https://github.com/longld/peda) - Python Exploit Development Assistance for GDB
* [dnSpy](https://github.com/0xd4d/dnSpy) - dnSpy is a tool to reverse engineer .NET assemblies
#### Physical Access Tools
* [LAN Turtle](https://lanturtle.com/) - a covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
* [USB Rubber Ducky](http://usbrubberducky.com/) - customizable keystroke injection attack platform masquerading as a USB thumbdrive
* [Poisontap](https://samy.pl/poisontap/) - siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers
#### CTF Tools
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks