PETEP (PEnetration TEsting Proxy) is an open-source Java application for creating proxies for traffic analysis & modification. The main goal of PETEP is to provide a useful tool for performing penetration tests of applications with various protocols (on TCP/UDP) by setting up proxies and interceptors to manage the traffic transmitted between the client and the server. Links 🌐 Official Website: [Link](official_website) 🔽 Download: [Link](download) 📖 User Guide: [Link](user_guide) 📚 Methodology: [Link](methodology) 👩💻 Developer Guide: [Link](developer_guide) 🎬 Youtube PETEP - Tutorial (TCP Proxy for Hacking) Installation & Usage Requirements: Java 11+ (for M1, M2 Mac use Java 17+) Running PETEP for the first time: - Download latest PETEP release - Extract PETEP zip file - Run PETEP using petep.sh (Linux, Mac) or petep.bat (Windows) # Linux / Mac chmod +x petep.sh ./petep.sh # Windows petep.bat Tip: Provided run scripts contain useful variables, including the working directory (for petep.json file) and the path to the Java executable. You might need to change it if you do not have it in PATH or you use multiple Java versions on your machine. Setting up your first project: - Start PETEP - Create a new project using the FULL preset and click Run - In Settings, set up TCP/UDP proxy and optionally configure interceptors - Click
FEATURES
ALTERNATIVES
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.
Preparation process for participating in the Pacific Rim CCDC 2015.
Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.
A practical guide on NTLM relaying for Active Directory attacks.
DueDLLigence is an open-source tool for identifying and analyzing DLL hijacking vulnerabilities in Windows applications, providing automated analysis and remediation guidance.
A black-box obfuscation tool for Android apps with Android App Bundle support.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.