Make pentesting easier
Make pentesting simpler
Make pentesting make sense
How does psak make pentesting easier, simpler and more sensible?
- Features ready to use commands that are generally customizable
- Cuts out the syntax and focuses on the concepts
- Maintains consistency and demonstrates intuitive design
PSAK is simple to intergrate with, provided a intermediate
understanding of software develpment and Python 3. Just fork the
project, add you module and then submit a pull request.
Simply study the existing code and follow the style you sense.
PSAK Package | Description
------------- | -------------
psak_src | holds the psak project
exploit_modules | holds each psak exploit module package
setup.py | psak installation file
Copy and paste the following into your terminal as user root
to install psak:
apt-get update apt-get upgrade apt-get install python3 apt-get install python3-pip apt-get install pip apt-get install pip3 pip3 install --upgrade pip pip install --upgrade google-api-python-client pip3 install setuptools pip3 install ipython pip3 install graphviz pip3 install cryptography pip3 install scapy-python3 pip3 install matplotlib pip3 install networkx pip3 install pyx pip3 install latex pip3 install docopt pip3 install netaddr pip3 install requests apt-get install tcpdump python3-crypto ipython3 apt-get install python3-tk #Basic penetration utils apt-get install airodump-ng apt-get install aireplay-ng apt-get install ip apt-get install arping # Finish up pip3 install psak apt autoremove
Scapy-Attacks: scapy based attack research (Intergration in progress)
Ddos database: Ddos knowledge database ((Intergration in progress))
James' Security Blog: A small comprehensive list of attacks and their implementation
Wifi ID's: Understanding the network terms SSID, BSSID, and ESSID
Deauthentication Attack: how to create and send
wireless deauthentication packets using python and scapy
If the feature has not been marked completed, you can contribute
by writing an implementation of it by attack type
Basic Brute-Force Connectionless Attacks
Complex Brute-Force Connectionless Attacks
Basic Brute-Force Connection-Oriented Attacks
TCP-SYN Flood (Complete)
Project payload list
A list of frameworks to use to design deliverable payloads for penetration testers.
PowerSploit: PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.
Offensive-Security Exploit database: an official repository of The Exploit Database, a project sponsored by Offensive Security
DHCPig: initiates an advanced DHCP exhaustion attack