🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 30 lines
    31 31  -------------------------------------------------------------------------------------------------------------------------------------------
    32 32  Level 1 | Basic | Exemple
    33 33  ------------------------------------------------|------------------------------------------------|-----------------------------------------
    34  -[0] | TCP or UDP server just to receive messages | - [x]
    35  -[1] | TCP chat server | - [x]
    36  -[2] | UDP chat server | - []
    37  -[3] | Multi-threaded UDP or TCP chat server | - []
    38  -[4] | Server for file transfers | - []
    39  -[5] | Caesar Cipher tool | - []
    40  -[6] | TCP chat server -> The messages should be encoded with Caesar Cipher | - []
    41  -[7] | ROT13 Cipher | - []
    42  -[8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | - []
    43  -[9] | Remote command execution | - []
    44  -[10] | Recreate the Netcat tool | - []
     34 +[0] | TCP or UDP server just to receive messages | :heavy_check_mark:
     35 +[1] | TCP chat server | :heavy_check_mark:
     36 +[2] | UDP chat server | :x:
     37 +[3] | Multi-threaded UDP or TCP chat server | :x:
     38 +[4] | Server for file transfers | :x:
     39 +[5] | Caesar Cipher tool | :x:
     40 +[6] | TCP chat server -> The messages should be encoded with Caesar Cipher | :x:
     41 +[7] | ROT13 Cipher | :x:
     42 +[8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | :x:
     43 +[9] | Remote command execution | :x:
     44 +[10] | Recreate the Netcat tool | :x:
    45 45  -------------------------------------------------------------------------------------------------------------------------------------------
    46 46  Level 2 | Essential | Exemple
    47 47  ------------------------------------------------|------------------------------------------------|-----------------------------------------
    48  -[11] | Simple port scanner | - [x]
    49  -[12] | Port scanner with OS fingerprint using TTL (Time To Live) | - []
    50  -[13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | - []
    51  -[14] | Simple Web Directory brute-forcer (Threaded) | - []
    52  -[15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | - []
    53  -[16] | Web Login bruteforce tool | - []
    54  -[17] | FTP Login bruteforce tool | - []
    55  -[18] | SSH Login bruteforce tool | - [x]
    56  -[19] | FTP User footprint | - []
    57  -[20] | MYSQL User footprint | - []
    58  -[21] | Simple Google Bot for web scan | - []
    59  -[22] | Auto website comment bot | - []
    60  -[23] | Auto website message bot | - []
    61  -[24] | Web-scrapping using Regex | - []
    62  -[25] | Bot to collect information about someone using Google / Bing / Yahoo! | - []
    63  -[26] | Simple SQLi tester | - []
    64  -[27] | Simple XSS tester | - []
    65  -[28] | Simple Wordpress brute-forcer | - []
    66  -[29] | SQLi database retriever | - []
    67  -[30] | Spam creator | - []
     48 +[11] | Simple port scanner | :heavy_check_mark:
     49 +[12] | Port scanner with OS fingerprint using TTL (Time To Live) | :x:
     50 +[13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | :x:
     51 +[14] | Simple Web Directory brute-forcer (Threaded) | :x:
     52 +[15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | :x:
     53 +[16] | Web Login bruteforce tool | :x:
     54 +[17] | FTP Login bruteforce tool | :x:
     55 +[18] | SSH Login bruteforce tool | :heavy_check_mark:
     56 +[19] | FTP User footprint | :x:
     57 +[20] | MYSQL User footprint | :x:
     58 +[21] | Simple Google Bot for web scan | :x:
     59 +[22] | Auto website comment bot | :x:
     60 +[23] | Auto website message bot | :x:
     61 +[24] | Web-scrapping using Regex | :x:
     62 +[25] | Bot to collect information about someone using Google / Bing / Yahoo! | :x:
     63 +[26] | Simple SQLi tester | :x:
     64 +[27] | Simple XSS tester | :x:
     65 +[28] | Simple Wordpress brute-forcer | :x:
     66 +[29] | SQLi database retriever | :x:
     67 +[30] | Spam creator | :x:
    68 68  -------------------------------------------------------------------------------------------------------------------------------------------
    69 69  Level 3 | Advanced Network Attacks | exemple
    70 70  ------------------------------------------------|-------------------------------------------|----------------------------------------------
    71  -[31] | Payload for reverse shell | - []
    72  -[32] | Payload to capture screenshots | - []
    73  -[33] | Implement a Botnet | - []
    74  -[34] | Passive web scanner | - []
    75  -[35] | ARP poisoning tool | - []
    76  -[36] | Application that creates random shortcuts on screen | - []
    77  -[37] | Application to encrypt a file | - []
    78  -[38] | Develop a Ransomware application | - []
    79  -[39] | Spam Email sender | - []
    80  -[40] | HTTP server for phishing | - []
    81  -[41] | Honeypot creator | - []
    82  -[42] | Application that connects to the Tor Network | - []
    83  -[43] | IRC Server | - []
    84  -[44] | Packet Capture tool | - []
     71 +[31] | Payload for reverse shell | :x:
     72 +[32] | Payload to capture screenshots | :x:
     73 +[33] | Implement a Botnet | :x:
     74 +[34] | Passive web scanner | :x:
     75 +[35] | ARP poisoning tool | :x:
     76 +[36] | Application that creates random shortcuts on screen | :x:
     77 +[37] | Application to encrypt a file | :x:
     78 +[38] | Develop a Ransomware application | :x:
     79 +[39] | Spam Email sender | :x:
     80 +[40] | HTTP server for phishing | :x:
     81 +[41] | Honeypot creator | :x:
     82 +[42] | Application that connects to the Tor Network | :x:
     83 +[43] | IRC Server | :x:
     84 +[44] | Packet Capture tool | :x:
    85 85   
    86 86  -------------------------------------------------------------------------------------------------------------------------------------------
    87 87  Level 4 | Data analysis, payloads and more networking | exemple
    skipped 28 lines
    116 116  -------------------------------------------------------------------------------------------------------------------------------------------
    117 117   Level 5 | Cryptography, Reverse Engineering and Post exploitation | exemple
    118 118  ------------------------------------------------|------------------------------------------|-----------------------------------------------
    119  -[71] | Develop a code injection tool | - []
    120  -[72] | Develop a Worm with auto replication over email | - []
    121  -[73] | Simple Disassembler | - []
    122  -[74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | - []
    123  -[75] | Password hash cracker | - []
    124  -[76] | Direct code injection exploit | - []
    125  -[77] | Android daemon payload | - []
    126  -[78] | Browser exploitation tool | - []
    127  -[79] | Simple tool for Reverse Engineering | - []
    128  -[80] | Script for OS enumeration (after shell) | - []
    129  -[81] | RSA Payload generator | - []
    130  -[82] | Handshake capture | - []
    131  -[83] | Wifi monitor | - []
    132  -[84] | Buffer Overflow exploit | - []
    133  -[85] | Stack Overflow exploit | - []
    134  -[86] | Banner exploit | - []
    135  -[87] | ISS Exploit | - []
    136  -[88] | Wifi de-authentication attack (DoS) tool | - []
    137  -[89] | Badchar detector | - []
    138  -[90] | Firewall detector | - []
    139  -[91] | Exploitation Framework | - []
    140  -[92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | - []
    141  -[93] | Windows enumeration tool | - []
    142  -[94] | Application information gathering (after shell) | - []
    143  -[95] | Recreate TCPDUMP | - []
    144  -[96] | Bluetooth exploit | - []
    145  -[97] | Windows Blue Screen Exploit | - []
    146  -[98] | Encoded exploit | - []
    147  -[99] | Antivirus evasion application | - []
    148  -[100] | Your own metasploit module | - []
     119 +[71] | Develop a code injection tool | :x:
     120 +[72] | Develop a Worm with auto replication over email | :x:
     121 +[73] | Simple Disassembler | :x:
     122 +[74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | :x:
     123 +[75] | Password hash cracker | :x:
     124 +[76] | Direct code injection exploit | :x:
     125 +[77] | Android daemon payload | :x:
     126 +[78] | Browser exploitation tool | :x:
     127 +[79] | Simple tool for Reverse Engineering | :x:
     128 +[80] | Script for OS enumeration (after shell) | :x:
     129 +[81] | RSA Payload generator | :x:
     130 +[82] | Handshake capture | :x:
     131 +[83] | Wifi monitor | :x:
     132 +[84] | Buffer Overflow exploit | :x:
     133 +[85] | Stack Overflow exploit | :x:
     134 +[86] | Banner exploit | :x:
     135 +[87] | ISS Exploit | :x:
     136 +[88] | Wifi de-authentication attack (DoS) tool | :x:
     137 +[89] | Badchar detector | :x:
     138 +[90] | Firewall detector | :x:
     139 +[91] | Exploitation Framework | :x:
     140 +[92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | :x:
     141 +[93] | Windows enumeration tool | :x:
     142 +[94] | Application information gathering (after shell) | :x:
     143 +[95] | Recreate TCPDUMP | :x:
     144 +[96] | Bluetooth exploit | :x:
     145 +[97] | Windows Blue Screen Exploit | :x:
     146 +[98] | Encoded exploit | :x:
     147 +[99] | Antivirus evasion application | :x:
     148 +[100] | Your own metasploit module | :x:
    149 149  -------------------------------------------------------------------------------------------------------------------------------------------
    150 150  ## Adding your examples
    151 151   
    skipped 13 lines
Please wait...
Page is in error, reload to recover