| skipped 30 lines |
31 | 31 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
32 | 32 | | Level 1 | Basic | Exemple |
33 | 33 | | ------------------------------------------------|------------------------------------------------|----------------------------------------- |
34 | | - | [0] | TCP or UDP server just to receive messages | - [x] |
35 | | - | [1] | TCP chat server | - [x] |
36 | | - | [2] | UDP chat server | - [] |
37 | | - | [3] | Multi-threaded UDP or TCP chat server | - [] |
38 | | - | [4] | Server for file transfers | - [] |
39 | | - | [5] | Caesar Cipher tool | - [] |
40 | | - | [6] | TCP chat server -> The messages should be encoded with Caesar Cipher | - [] |
41 | | - | [7] | ROT13 Cipher | - [] |
42 | | - | [8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | - [] |
43 | | - | [9] | Remote command execution | - [] |
44 | | - | [10] | Recreate the Netcat tool | - [] |
| 34 | + | [0] | TCP or UDP server just to receive messages | :heavy_check_mark: |
| 35 | + | [1] | TCP chat server | :heavy_check_mark: |
| 36 | + | [2] | UDP chat server | :x: |
| 37 | + | [3] | Multi-threaded UDP or TCP chat server | :x: |
| 38 | + | [4] | Server for file transfers | :x: |
| 39 | + | [5] | Caesar Cipher tool | :x: |
| 40 | + | [6] | TCP chat server -> The messages should be encoded with Caesar Cipher | :x: |
| 41 | + | [7] | ROT13 Cipher | :x: |
| 42 | + | [8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | :x: |
| 43 | + | [9] | Remote command execution | :x: |
| 44 | + | [10] | Recreate the Netcat tool | :x: |
45 | 45 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
46 | 46 | | Level 2 | Essential | Exemple |
47 | 47 | | ------------------------------------------------|------------------------------------------------|----------------------------------------- |
48 | | - | [11] | Simple port scanner | - [x] |
49 | | - | [12] | Port scanner with OS fingerprint using TTL (Time To Live) | - [] |
50 | | - | [13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | - [] |
51 | | - | [14] | Simple Web Directory brute-forcer (Threaded) | - [] |
52 | | - | [15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | - [] |
53 | | - | [16] | Web Login bruteforce tool | - [] |
54 | | - | [17] | FTP Login bruteforce tool | - [] |
55 | | - | [18] | SSH Login bruteforce tool | - [x] |
56 | | - | [19] | FTP User footprint | - [] |
57 | | - | [20] | MYSQL User footprint | - [] |
58 | | - | [21] | Simple Google Bot for web scan | - [] |
59 | | - | [22] | Auto website comment bot | - [] |
60 | | - | [23] | Auto website message bot | - [] |
61 | | - | [24] | Web-scrapping using Regex | - [] |
62 | | - | [25] | Bot to collect information about someone using Google / Bing / Yahoo! | - [] |
63 | | - | [26] | Simple SQLi tester | - [] |
64 | | - | [27] | Simple XSS tester | - [] |
65 | | - | [28] | Simple Wordpress brute-forcer | - [] |
66 | | - | [29] | SQLi database retriever | - [] |
67 | | - | [30] | Spam creator | - [] |
| 48 | + | [11] | Simple port scanner | :heavy_check_mark: |
| 49 | + | [12] | Port scanner with OS fingerprint using TTL (Time To Live) | :x: |
| 50 | + | [13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | :x: |
| 51 | + | [14] | Simple Web Directory brute-forcer (Threaded) | :x: |
| 52 | + | [15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | :x: |
| 53 | + | [16] | Web Login bruteforce tool | :x: |
| 54 | + | [17] | FTP Login bruteforce tool | :x: |
| 55 | + | [18] | SSH Login bruteforce tool | :heavy_check_mark: |
| 56 | + | [19] | FTP User footprint | :x: |
| 57 | + | [20] | MYSQL User footprint | :x: |
| 58 | + | [21] | Simple Google Bot for web scan | :x: |
| 59 | + | [22] | Auto website comment bot | :x: |
| 60 | + | [23] | Auto website message bot | :x: |
| 61 | + | [24] | Web-scrapping using Regex | :x: |
| 62 | + | [25] | Bot to collect information about someone using Google / Bing / Yahoo! | :x: |
| 63 | + | [26] | Simple SQLi tester | :x: |
| 64 | + | [27] | Simple XSS tester | :x: |
| 65 | + | [28] | Simple Wordpress brute-forcer | :x: |
| 66 | + | [29] | SQLi database retriever | :x: |
| 67 | + | [30] | Spam creator | :x: |
68 | 68 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
69 | 69 | | Level 3 | Advanced Network Attacks | exemple |
70 | 70 | | ------------------------------------------------|-------------------------------------------|---------------------------------------------- |
71 | | - | [31] | Payload for reverse shell | - [] |
72 | | - | [32] | Payload to capture screenshots | - [] |
73 | | - | [33] | Implement a Botnet | - [] |
74 | | - | [34] | Passive web scanner | - [] |
75 | | - | [35] | ARP poisoning tool | - [] |
76 | | - | [36] | Application that creates random shortcuts on screen | - [] |
77 | | - | [37] | Application to encrypt a file | - [] |
78 | | - | [38] | Develop a Ransomware application | - [] |
79 | | - | [39] | Spam Email sender | - [] |
80 | | - | [40] | HTTP server for phishing | - [] |
81 | | - | [41] | Honeypot creator | - [] |
82 | | - | [42] | Application that connects to the Tor Network | - [] |
83 | | - | [43] | IRC Server | - [] |
84 | | - | [44] | Packet Capture tool | - [] |
| 71 | + | [31] | Payload for reverse shell | :x: |
| 72 | + | [32] | Payload to capture screenshots | :x: |
| 73 | + | [33] | Implement a Botnet | :x: |
| 74 | + | [34] | Passive web scanner | :x: |
| 75 | + | [35] | ARP poisoning tool | :x: |
| 76 | + | [36] | Application that creates random shortcuts on screen | :x: |
| 77 | + | [37] | Application to encrypt a file | :x: |
| 78 | + | [38] | Develop a Ransomware application | :x: |
| 79 | + | [39] | Spam Email sender | :x: |
| 80 | + | [40] | HTTP server for phishing | :x: |
| 81 | + | [41] | Honeypot creator | :x: |
| 82 | + | [42] | Application that connects to the Tor Network | :x: |
| 83 | + | [43] | IRC Server | :x: |
| 84 | + | [44] | Packet Capture tool | :x: |
85 | 85 | | |
86 | 86 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
87 | 87 | | Level 4 | Data analysis, payloads and more networking | exemple |
| skipped 28 lines |
116 | 116 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
117 | 117 | | Level 5 | Cryptography, Reverse Engineering and Post exploitation | exemple |
118 | 118 | | ------------------------------------------------|------------------------------------------|----------------------------------------------- |
119 | | - | [71] | Develop a code injection tool | - [] |
120 | | - | [72] | Develop a Worm with auto replication over email | - [] |
121 | | - | [73] | Simple Disassembler | - [] |
122 | | - | [74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | - [] |
123 | | - | [75] | Password hash cracker | - [] |
124 | | - | [76] | Direct code injection exploit | - [] |
125 | | - | [77] | Android daemon payload | - [] |
126 | | - | [78] | Browser exploitation tool | - [] |
127 | | - | [79] | Simple tool for Reverse Engineering | - [] |
128 | | - | [80] | Script for OS enumeration (after shell) | - [] |
129 | | - | [81] | RSA Payload generator | - [] |
130 | | - | [82] | Handshake capture | - [] |
131 | | - | [83] | Wifi monitor | - [] |
132 | | - | [84] | Buffer Overflow exploit | - [] |
133 | | - | [85] | Stack Overflow exploit | - [] |
134 | | - | [86] | Banner exploit | - [] |
135 | | - | [87] | ISS Exploit | - [] |
136 | | - | [88] | Wifi de-authentication attack (DoS) tool | - [] |
137 | | - | [89] | Badchar detector | - [] |
138 | | - | [90] | Firewall detector | - [] |
139 | | - | [91] | Exploitation Framework | - [] |
140 | | - | [92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | - [] |
141 | | - | [93] | Windows enumeration tool | - [] |
142 | | - | [94] | Application information gathering (after shell) | - [] |
143 | | - | [95] | Recreate TCPDUMP | - [] |
144 | | - | [96] | Bluetooth exploit | - [] |
145 | | - | [97] | Windows Blue Screen Exploit | - [] |
146 | | - | [98] | Encoded exploit | - [] |
147 | | - | [99] | Antivirus evasion application | - [] |
148 | | - | [100] | Your own metasploit module | - [] |
| 119 | + | [71] | Develop a code injection tool | :x: |
| 120 | + | [72] | Develop a Worm with auto replication over email | :x: |
| 121 | + | [73] | Simple Disassembler | :x: |
| 122 | + | [74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | :x: |
| 123 | + | [75] | Password hash cracker | :x: |
| 124 | + | [76] | Direct code injection exploit | :x: |
| 125 | + | [77] | Android daemon payload | :x: |
| 126 | + | [78] | Browser exploitation tool | :x: |
| 127 | + | [79] | Simple tool for Reverse Engineering | :x: |
| 128 | + | [80] | Script for OS enumeration (after shell) | :x: |
| 129 | + | [81] | RSA Payload generator | :x: |
| 130 | + | [82] | Handshake capture | :x: |
| 131 | + | [83] | Wifi monitor | :x: |
| 132 | + | [84] | Buffer Overflow exploit | :x: |
| 133 | + | [85] | Stack Overflow exploit | :x: |
| 134 | + | [86] | Banner exploit | :x: |
| 135 | + | [87] | ISS Exploit | :x: |
| 136 | + | [88] | Wifi de-authentication attack (DoS) tool | :x: |
| 137 | + | [89] | Badchar detector | :x: |
| 138 | + | [90] | Firewall detector | :x: |
| 139 | + | [91] | Exploitation Framework | :x: |
| 140 | + | [92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | :x: |
| 141 | + | [93] | Windows enumeration tool | :x: |
| 142 | + | [94] | Application information gathering (after shell) | :x: |
| 143 | + | [95] | Recreate TCPDUMP | :x: |
| 144 | + | [96] | Bluetooth exploit | :x: |
| 145 | + | [97] | Windows Blue Screen Exploit | :x: |
| 146 | + | [98] | Encoded exploit | :x: |
| 147 | + | [99] | Antivirus evasion application | :x: |
| 148 | + | [100] | Your own metasploit module | :x: |
149 | 149 | | ------------------------------------------------------------------------------------------------------------------------------------------- |
150 | 150 | | ## Adding your examples |
151 | 151 | | |
| skipped 13 lines |