| skipped 27 lines |
28 | 28 | | |
29 | 29 | | And remember: With great power comes... (we already know). |
30 | 30 | | |
31 | | - | --------------------------------------------------------------------------------------------- |
32 | | - | Level 1 | Basic |
33 | | - | ------------------------------------------------|-------------------------------------------- |
34 | | - | [0] | TCP or UDP server just to receive messages |
35 | | - | [1] | TCP chat server |
36 | | - | [2] | UDP chat server |
37 | | - | [3] | Multi-threaded UDP or TCP chat server |
38 | | - | [4] | Server for file transfers |
39 | | - | [5] | Caesar Cipher tool |
40 | | - | [6] | TCP chat server -> The messages should be encoded with Caesar Cipher |
41 | | - | [7] | ROT13 Cipher |
42 | | - | [8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher |
43 | | - | [9] | Remote command execution |
44 | | - | [10] | Recreate the Netcat tool |
45 | | - | -------------------------------------------------------------------------------------------- |
46 | | - | Level 2 | Essential |
47 | | - | ------------------------------------------------|------------------------------------------- |
48 | | - | [11] | Simple port scanner |
49 | | - | [12] | Port scanner with OS fingerprint using TTL (Time To Live) |
50 | | - | [13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) |
51 | | - | [14] | Simple Web Directory brute-forcer (Threaded) |
52 | | - | [15] | Recursive Web Directory brute-forcer (Threaded peer recursion) |
53 | | - | [16] | Web Login bruteforce tool |
54 | | - | [17] | FTP Login bruteforce tool |
55 | | - | [18] | SSH Login bruteforce tool |
56 | | - | [19] | FTP User footprint |
57 | | - | [20] | MYSQL User footprint |
58 | | - | [21] | Simple Google Bot for web scan |
59 | | - | [22] | Auto website comment bot |
60 | | - | [23] | Auto website message bot |
61 | | - | [24] | Web-scrapping using Regex |
62 | | - | [25] | Bot to collect information about someone using Google / Bing / Yahoo! |
63 | | - | [26] | Simple SQLi tester |
64 | | - | [27] | Simple XSS tester |
65 | | - | [28] | Simple Wordpress brute-forcer |
66 | | - | [29] | SQLi database retriever |
67 | | - | [30] | Spam creator |
68 | | - | -------------------------------------------------------------------------------------------- |
69 | | - | Level 3 | Advanced Network Attacks |
70 | | - | ------------------------------------------------|------------------------------------------- |
71 | | - | [31] | Payload for reverse shell |
72 | | - | [32] | Payload to capture screenshots |
73 | | - | [33] | Implement a Botnet |
74 | | - | [34] | Passive web scanner |
75 | | - | [35] | ARP poisoning tool |
76 | | - | [36] | Application that creates random shortcuts on screen |
77 | | - | [37] | Application to encrypt a file |
78 | | - | [38] | Develop a Ransomware application |
79 | | - | [39] | Spam Email sender |
80 | | - | [40] | HTTP server for phishing |
81 | | - | [41] | Honeypot creator |
82 | | - | [42] | Application that connects to the Tor Network |
83 | | - | [43] | IRC Server |
84 | | - | [44] | Packet Capture tool |
| 31 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
| 32 | + | Level 1 | Basic | Exemple |
| 33 | + | ------------------------------------------------|------------------------------------------------|----------------------------------------- |
| 34 | + | [0] | TCP or UDP server just to receive messages | :heavy_check_mark: |
| 35 | + | [1] | TCP chat server | :heavy_check_mark: |
| 36 | + | [2] | UDP chat server | :x: |
| 37 | + | [3] | Multi-threaded UDP or TCP chat server | :x: |
| 38 | + | [4] | Server for file transfers | :x: |
| 39 | + | [5] | Caesar Cipher tool | :x: |
| 40 | + | [6] | TCP chat server -> The messages should be encoded with Caesar Cipher | :x: |
| 41 | + | [7] | ROT13 Cipher | :x: |
| 42 | + | [8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | :x: |
| 43 | + | [9] | Remote command execution | :x: |
| 44 | + | [10] | Recreate the Netcat tool | :x: |
| 45 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
| 46 | + | Level 2 | Essential | Exemple |
| 47 | + | ------------------------------------------------|------------------------------------------------|----------------------------------------- |
| 48 | + | [11] | Simple port scanner | :heavy_check_mark: |
| 49 | + | [12] | Port scanner with OS fingerprint using TTL (Time To Live) | :x: |
| 50 | + | [13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | :x: |
| 51 | + | [14] | Simple Web Directory brute-forcer (Threaded) | :x: |
| 52 | + | [15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | :x: |
| 53 | + | [16] | Web Login bruteforce tool | :x: |
| 54 | + | [17] | FTP Login bruteforce tool | :x: |
| 55 | + | [18] | SSH Login bruteforce tool | :heavy_check_mark: |
| 56 | + | [19] | FTP User footprint | :x: |
| 57 | + | [20] | MYSQL User footprint | :x: |
| 58 | + | [21] | Simple Google Bot for web scan | :x: |
| 59 | + | [22] | Auto website comment bot | :x: |
| 60 | + | [23] | Auto website message bot | :x: |
| 61 | + | [24] | Web-scrapping using Regex | :x: |
| 62 | + | [25] | Bot to collect information about someone using Google / Bing / Yahoo! | :x: |
| 63 | + | [26] | Simple SQLi tester | :x: |
| 64 | + | [27] | Simple XSS tester | :x: |
| 65 | + | [28] | Simple Wordpress brute-forcer | :x: |
| 66 | + | [29] | SQLi database retriever | :x: |
| 67 | + | [30] | Spam creator | :x: |
| 68 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
| 69 | + | Level 3 | Advanced Network Attacks | Exemple |
| 70 | + | ------------------------------------------------|-------------------------------------------|---------------------------------------------- |
| 71 | + | [31] | Payload for reverse shell | :x: |
| 72 | + | [32] | Payload to capture screenshots | :x: |
| 73 | + | [33] | Implement a Botnet | :x: |
| 74 | + | [34] | Passive web scanner | :x: |
| 75 | + | [35] | ARP poisoning tool | :x: |
| 76 | + | [36] | Application that creates random shortcuts on screen | :x: |
| 77 | + | [37] | Application to encrypt a file | :x: |
| 78 | + | [38] | Develop a Ransomware application | :x: |
| 79 | + | [39] | Spam Email sender | :x: |
| 80 | + | [40] | HTTP server for phishing | :x: |
| 81 | + | [41] | Honeypot creator | :x: |
| 82 | + | [42] | Application that connects to the Tor Network | :x: |
| 83 | + | [43] | IRC Server | :x: |
| 84 | + | [44] | Packet Capture tool | :x: |
85 | 85 | | |
86 | | - | ------------------------------------------------------------------------------------------- |
87 | | - | Level 4 | Data analysis, payloads and more networking |
88 | | - | ------------------------------------------------|------------------------------------------ |
89 | | - | [45] | Packet Data analysis |
90 | | - | [46] | Packet image analysis with OpenCV |
91 | | - | [47] | Develop a hexdump tool |
92 | | - | [48] | Payload that moves the mouse cursor |
93 | | - | [49] | Vigenère Cipher |
94 | | - | [50] | Payload that starts automatically using Windows Regedit |
95 | | - | [51] | Payload that starts as a daemon |
96 | | - | [52] | Payload that retrieves browser information |
97 | | - | [53] | Link generator |
98 | | - | [54] | ASCII Name generator [ just for fun :) ] |
99 | | - | [55] | Full chat server with private messages, file and image transfer |
100 | | - | [56] | Simple firewall |
101 | | - | [57] | Gateway |
102 | | - | [58] | Powershell payload generator |
103 | | - | [59] | Bash payload generator |
104 | | - | [60] | Subdomain enumerator |
105 | | - | [61] | DNS Enumerator |
106 | | - | [62] | Your own interpreter |
107 | | - | [63] | Develop a Worm |
108 | | - | [64] | Server for DDOS |
109 | | - | [65] | Implement an IP Tracker |
110 | | - | [66] | BurpSuite extender |
111 | | - | [67] | Develop a Trojan |
112 | | - | [68] | Man In The Browser tool (kind of) |
113 | | - | [69] | Process monitor (Windows and Linux) |
114 | | - | [70] | Windows token privilege escalation tool |
| 86 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
| 87 | + | Level 4 | Data analysis, payloads and more networking | Exemple |
| 88 | + | ------------------------------------------------|------------------------------------------|----------------------------------------------- |
| 89 | + | [45] | Packet Data analysis | :x: |
| 90 | + | [46] | Packet image analysis with OpenCV | :x: |
| 91 | + | [47] | Develop a hexdump tool | :x: |
| 92 | + | [48] | Payload that moves the mouse cursor | :x: |
| 93 | + | [49] | Vigenère Cipher | :x: |
| 94 | + | [50] | Payload that starts automatically using Windows Regedit | :x: |
| 95 | + | [51] | Payload that starts as a daemon | :x: |
| 96 | + | [52] | Payload that retrieves browser information | :x: |
| 97 | + | [53] | Link generator | :x: |
| 98 | + | [54] | ASCII Name generator [ just for fun :) ] | :x: |
| 99 | + | [55] | Full chat server with private messages, file and image transfer | :x: |
| 100 | + | [56] | Simple firewall | :x: |
| 101 | + | [57] | Gateway | :x: |
| 102 | + | [58] | Powershell payload generator | :x: |
| 103 | + | [59] | Bash payload generator | :x: |
| 104 | + | [60] | Subdomain enumerator | :x: |
| 105 | + | [61] | DNS Enumerator | :x: |
| 106 | + | [62] | Your own interpreter | :x: |
| 107 | + | [63] | Develop a Worm | :x: |
| 108 | + | [64] | Server for DDOS | :x: |
| 109 | + | [65] | Implement an IP Tracker | :x: |
| 110 | + | [66] | BurpSuite extender | :x: |
| 111 | + | [67] | Develop a Trojan | :x: |
| 112 | + | [68] | Man In The Browser tool (kind of) | :x: |
| 113 | + | [69] | Process monitor (Windows and Linux) | :x: |
| 114 | + | [70] | Windows token privilege escalation tool | :x: |
115 | 115 | | |
116 | | - | ------------------------------------------------------------------------------------------ |
117 | | - | Level 5 | Cryptography, Reverse Engineering and Post exploitation |
118 | | - | ------------------------------------------------|------------------------------------------ |
119 | | - | [71] | Develop a code injection tool |
120 | | - | [72] | Develop a Worm with auto replication over email |
121 | | - | [73] | Simple Disassembler |
122 | | - | [74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients |
123 | | - | [75] | Password hash cracker |
124 | | - | [76] | Direct code injection exploit |
125 | | - | [77] | Android daemon payload |
126 | | - | [78] | Browser exploitation tool |
127 | | - | [79] | Simple tool for Reverse Engineering |
128 | | - | [80] | Script for OS enumeration (after shell) |
129 | | - | [81] | RSA Payload generator |
130 | | - | [82] | Handshake capture |
131 | | - | [83] | Wifi monitor |
132 | | - | [84] | Buffer Overflow exploit |
133 | | - | [85] | Stack Overflow exploit |
134 | | - | [86] | Banner exploit |
135 | | - | [87] | ISS Exploit |
136 | | - | [88] | Wifi de-authentication attack (DoS) tool |
137 | | - | [89] | Badchar detector |
138 | | - | [90] | Firewall detector |
139 | | - | [91] | Exploitation Framework |
140 | | - | [92] | Botnet with SSH C&C and automatic server backup to prevent loss of control |
141 | | - | [93] | Windows enumeration tool |
142 | | - | [94] | Application information gathering (after shell) |
143 | | - | [95] | Recreate TCPDUMP |
144 | | - | [96] | Bluetooth exploit |
145 | | - | [97] | Windows Blue Screen Exploit |
146 | | - | [98] | Encoded exploit |
147 | | - | [99] | Antivirus evasion application |
148 | | - | [100] | Your own metasploit module |
149 | | - | ------------------------------------------------------------------------------------------ |
| 116 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
| 117 | + | Level 5 | Cryptography, Reverse Engineering and Post exploitation | Exemple |
| 118 | + | ------------------------------------------------|------------------------------------------|----------------------------------------------- |
| 119 | + | [71] | Develop a code injection tool | :x: |
| 120 | + | [72] | Develop a Worm with auto replication over email | :x: |
| 121 | + | [73] | Simple Disassembler | :x: |
| 122 | + | [74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | :x: |
| 123 | + | [75] | Password hash cracker | :x: |
| 124 | + | [76] | Direct code injection exploit | :x: |
| 125 | + | [77] | Android daemon payload | :x: |
| 126 | + | [78] | Browser exploitation tool | :x: |
| 127 | + | [79] | Simple tool for Reverse Engineering | :x: |
| 128 | + | [80] | Script for OS enumeration (after shell) | :x: |
| 129 | + | [81] | RSA Payload generator | :x: |
| 130 | + | [82] | Handshake capture | :x: |
| 131 | + | [83] | Wifi monitor | :x: |
| 132 | + | [84] | Buffer Overflow exploit | :x: |
| 133 | + | [85] | Stack Overflow exploit | :x: |
| 134 | + | [86] | Banner exploit | :x: |
| 135 | + | [87] | ISS Exploit | :x: |
| 136 | + | [88] | Wifi de-authentication attack (DoS) tool | :x: |
| 137 | + | [89] | Badchar detector | :x: |
| 138 | + | [90] | Firewall detector | :x: |
| 139 | + | [91] | Exploitation Framework | :x: |
| 140 | + | [92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | :x: |
| 141 | + | [93] | Windows enumeration tool | :x: |
| 142 | + | [94] | Application information gathering (after shell) | :x: |
| 143 | + | [95] | Recreate TCPDUMP | :x: |
| 144 | + | [96] | Bluetooth exploit | :x: |
| 145 | + | [97] | Windows Blue Screen Exploit | :x: |
| 146 | + | [98] | Encoded exploit | :x: |
| 147 | + | [99] | Antivirus evasion application | :x: |
| 148 | + | [100] | Your own metasploit module | :x: |
| 149 | + | ------------------------------------------------------------------------------------------------------------------------------------------- |
150 | 150 | | ## Adding your examples |
151 | 151 | | |
152 | 152 | | You can make a pull request for the "Projects" directory and name the file in |
| skipped 12 lines |