The Pentester's Swiss Army Knife


Keywords
pentesting, kali-linux, psak, python-3-6
License
BSD-3-Clause-Attribution
Install
pip install psak==0.5.9.5

Documentation

psak

N|Solid psak GitHub stars GitHub forks Github issues Python 3.6 License

Project Objectives

  1. Make pentesting easier

  2. Make pentesting simpler

  3. Make pentesting make sense

How does psak make pentesting easier, simpler and more sensible?

  • Features ready to use commands that are generally customizable
  • Cuts out the syntax and focuses on the concepts
  • Maintains consistency and demonstrates intuitive design

PSAK Framework

PSAK is simple to intergrate with, provided a intermediate

understanding of software develpment and Python 3. Just fork the

project, add you module and then submit a pull request.

Simply study the existing code and follow the style you sense.

PSAK Package | Description

------------- | -------------

psak_src | holds the psak project

exploit_modules | holds each psak exploit module package

setup.py | psak installation file

Installation Instructions

Copy and paste the following into your terminal as user root

to install psak:


apt-get update

apt-get upgrade

apt-get install python3

apt-get install python3-pip

apt-get install pip

apt-get install pip3

pip3 install --upgrade pip

pip install --upgrade google-api-python-client

pip3 install setuptools

pip3 install ipython

pip3 install graphviz

pip3 install cryptography

pip3 install scapy-python3

pip3 install matplotlib

pip3 install networkx

pip3 install pyx

pip3 install latex

pip3 install docopt

pip3 install netaddr

pip3 install requests

apt-get install tcpdump python3-crypto ipython3

apt-get install python3-tk

#Basic penetration utils

apt-get install airodump-ng

apt-get install aireplay-ng

apt-get install ip

apt-get install arping

# Finish up

pip3 install psak

apt autoremove

Networking Research

wireless deauthentication packets using python and scapy

Network Attacks

If the feature has not been marked completed, you can contribute

by writing an implementation of it by attack type

Basic Brute-Force Connectionless Attacks
  • UDP Flood

  • ICMP Flood

  • IGMP Flood

Complex Brute-Force Connectionless Attacks
  • Smurf Attacks

  • Fraggle Attacks

  • DNS Amplification

Basic Brute-Force Connection-Oriented Attacks
  • TCP-SYN Flood (Complete)

  • TCP-RST Attack

  • TCP-PSH+ACK Attack

Project payload list

A list of frameworks to use to design deliverable payloads for penetration testers.

  • PowerSploit: PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment.

  • Offensive-Security Exploit database: an official repository of The Exploit Database, a project sponsored by Offensive Security

  • DHCPig: initiates an advanced DHCP exhaustion attack