PETEP (PEnetration TEsting Proxy) Logo

PETEP (PEnetration TEsting Proxy)

0
Free
Visit Website

PETEP (PEnetration TEsting Proxy) is an open-source Java application for creating proxies for traffic analysis & modification. The main goal of PETEP is to provide a useful tool for performing penetration tests of applications with various protocols (on TCP/UDP) by setting up proxies and interceptors to manage the traffic transmitted between the client and the server. Links 🌐 Official Website: [Link](official_website) 🔽 Download: [Link](download) 📖 User Guide: [Link](user_guide) 📚 Methodology: [Link](methodology) 👩‍💻 Developer Guide: [Link](developer_guide) 🎬 Youtube PETEP - Tutorial (TCP Proxy for Hacking) Installation & Usage Requirements: Java 11+ (for M1, M2 Mac use Java 17+) Running PETEP for the first time: - Download latest PETEP release - Extract PETEP zip file - Run PETEP using petep.sh (Linux, Mac) or petep.bat (Windows) # Linux / Mac chmod +x petep.sh ./petep.sh # Windows petep.bat Tip: Provided run scripts contain useful variables, including the working directory (for petep.json file) and the path to the Java executable. You might need to change it if you do not have it in PATH or you use multiple Java versions on your machine. Setting up your first project: - Start PETEP - Create a new project using the FULL preset and click Run - In Settings, set up TCP/UDP proxy and optionally configure interceptors - Click

FEATURES

ALTERNATIVES

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

A framework for exploiting Android-based devices and applications

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

A PowerShell toolkit for attacking Azure environments