PETEP (PEnetration TEsting Proxy) Logo

PETEP (PEnetration TEsting Proxy)

0
Free
Updated 11 March 2025
Visit Website

PETEP (PEnetration TEsting Proxy) is an open-source Java application for creating proxies for traffic analysis & modification. The main goal of PETEP is to provide a useful tool for performing penetration tests of applications with various protocols (on TCP/UDP) by setting up proxies and interceptors to manage the traffic transmitted between the client and the server. Links 🌐 Official Website: [Link](official_website) 🔽 Download: [Link](download) 📖 User Guide: [Link](user_guide) 📚 Methodology: [Link](methodology) 👩‍💻 Developer Guide: [Link](developer_guide) 🎬 Youtube PETEP - Tutorial (TCP Proxy for Hacking) Installation & Usage Requirements: Java 11+ (for M1, M2 Mac use Java 17+) Running PETEP for the first time: - Download latest PETEP release - Extract PETEP zip file - Run PETEP using petep.sh (Linux, Mac) or petep.bat (Windows) # Linux / Mac chmod +x petep.sh ./petep.sh # Windows petep.bat Tip: Provided run scripts contain useful variables, including the working directory (for petep.json file) and the path to the Java executable. You might need to change it if you do not have it in PATH or you use multiple Java versions on your machine. Setting up your first project: - Start PETEP - Create a new project using the FULL preset and click Run - In Settings, set up TCP/UDP proxy and optionally configure interceptors - Click

FEATURES

SIMILAR TOOLS

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.

A full-featured reconnaissance framework for web-based reconnaissance with a modular design.

A framework for exploiting Android-based devices and applications

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

Maintaining account persistence via XSS and Oauth

A post-exploitation framework for attacking running AWS infrastructure

A tool for managing multiple reverse shell sessions/clients via terminal with a RESTful API.

A tool for security researchers and penetration testers to automate the process of finding sensitive information on a target domain.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved