Network Security for Penetration Testing
Comprehensive solutions for securing network infrastructure, traffic, and communications. Task: Penetration TestingExplore 24 curated tools and resources
RELATED TASKS
PINNED
Promoted • 4 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A powerful directory/file, DNS and VHost busting tool written in Go.
A fast and simple recursive content discovery tool
A tool for enumerating subdomains of a given domain
Fast passive subdomain enumeration tool
A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities
A Python-based web application scanner for OSINT and fuzzing OWASP vulnerabilities
A fast domain resolver and subdomain bruteforcing tool
A smart SSRF scanner using different methods like parameter brute forcing in post and get requests.
A smart SSRF scanner using different methods like parameter brute forcing in post and get requests.
A Burp extension to detect alias traversal via NGINX misconfiguration at scale.
A Burp extension to detect alias traversal via NGINX misconfiguration at scale.
A bash script for scanning a target network for HTTP resources through XXE
A bash script for scanning a target network for HTTP resources through XXE
A tool to discover new target domains using Content Security Policy
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
A honeypot that emulates a Belkin N300 Home Wireless router with default setup to observe traffic
A utility to generate malicious network traffic for security evaluation.
A utility to generate malicious network traffic for security evaluation.
Authenticated SSRF in Grafana
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
Tool for setting up Glutton, a cybersecurity tool for monitoring SSH traffic.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A simple Docker-based honeypot to detect port scanning
Smart traffic sniffing tool for penetration testers
Fake SSH server that sends push notifications for login attempts
Fake SSH server that sends push notifications for login attempts
A powerful interactive packet manipulation program and library for network exploration and security testing.
A powerful interactive packet manipulation program and library for network exploration and security testing.
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A Docker container that starts a SSH honeypot and reports statistics to the SANS ISC DShield project
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.
A printer honeypot PoC that simulates a printer on a network to detect and analyze potential attackers.