PETEP (PEnetration TEsting Proxy) Logo

PETEP (PEnetration TEsting Proxy)

Open-source Java application for creating proxies for traffic analysis & modification.

Visit Website
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

PETEP (PEnetration TEsting Proxy) Description

PETEP (PEnetration TEsting Proxy) is an open-source Java application for creating proxies for traffic analysis & modification. The main goal of PETEP is to provide a useful tool for performing penetration tests of applications with various protocols (on TCP/UDP) by setting up proxies and interceptors to manage the traffic transmitted between the client and the server. Links 🌐 Official Website: [Link](official_website) 🔽 Download: [Link](download) 📖 User Guide: [Link](user_guide) 📚 Methodology: [Link](methodology) 👩‍💻 Developer Guide: [Link](developer_guide) 🎬 Youtube PETEP - Tutorial (TCP Proxy for Hacking) Installation & Usage Requirements: Java 11+ (for M1, M2 Mac use Java 17+) Running PETEP for the first time: - Download latest PETEP release - Extract PETEP zip file - Run PETEP using petep.sh (Linux, Mac) or petep.bat (Windows) # Linux / Mac chmod +x petep.sh ./petep.sh # Windows petep.bat Tip: Provided run scripts contain useful variables, including the working directory (for petep.json file) and the path to the Java executable. You might need to change it if you do not have it in PATH or you use multiple Java versions on your machine. Setting up your first project: - Start PETEP - Create a new project using the FULL preset and click Run - In Settings, set up TCP/UDP proxy and optionally configure interceptors - Click

PETEP (PEnetration TEsting Proxy) FAQ

Common questions about PETEP (PEnetration TEsting Proxy) including features, pricing, alternatives, and user reviews.

PETEP (PEnetration TEsting Proxy) is Open-source Java application for creating proxies for traffic analysis & modification.. It is a Vulnerability Management solution designed to help security teams with Proxy.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Burp Suite Professional Logo

A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

0
xsshunter_client Logo

A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.

0
MITM SOCKS Proxy for Java Logo

Intercepts and examines mobile app connections by stripping SSL/TLS layer.

0
SSH MITM v2.3-dev Logo

A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.

0
mitmproxy Logo

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox