This project's template is from kurogai.
Level 1 | Basic | Done |
---|---|---|
[0] | TCP or UDP server just to receive messages | ✔️ |
[1] | TCP chat server | ❌ |
[2] | UDP chat server | ❌ |
[3] | Multi-threaded UDP or TCP chat server | ❌ |
[4] | Server for file transfers | ❌ |
[5] | Caesar Cipher tool | ✔️ |
[6] | TCP chat server -> The messages should be encoded with Caesar Cipher | ❌ |
[7] | ROT13 Cipher | ❌ |
[8] | UDP Chat server -> The messages should be encoded with ROT13 Cipher | ❌ |
[9] | Remote command execution | ❌ |
[10] | Recreate the Netcat tool | ❌ |
Level 2 | Essential | Done |
---|---|---|
[11] | Simple port scanner | ✔️ |
[12] | Port scanner with OS fingerprint using TTL (Time To Live) | ❌ |
[13] | Port scanner with port footprint (HTTP? DNS? FTP? IRC?) | ❌ |
[14] | Simple Web Directory brute-forcer (Threaded) | ❌ |
[15] | Recursive Web Directory brute-forcer (Threaded peer recursion) | ❌ |
[16] | Web Login bruteforce tool | ❌ |
[17] | FTP Login bruteforce tool | ❌ |
[18] | SSH Login bruteforce tool | ❌ |
[19] | FTP User footprint | ❌ |
[20] | MYSQL User footprint | ❌ |
[21] | Simple Google Bot for web scan | ❌ |
[22] | Auto website comment bot | ❌ |
[23] | Auto website message bot | ❌ |
[24] | Web-scrapping using Regex | ❌ |
[25] | Bot to collect information about someone using Google / Bing / Yahoo! | ❌ |
[26] | Simple SQLi tester | ❌ |
[27] | Simple XSS tester | ❌ |
[28] | Simple Wordpress brute-forcer | ❌ |
[29] | SQLi database retriever | ❌ |
[30] | Spam creator | ❌ |
Level 3 | Advanced Network Attacks | Done |
---|---|---|
[31] | Payload for reverse shell | ❌ |
[32] | Payload to capture screenshots | ❌ |
[33] | Implement a Botnet | ❌ |
[34] | Passive web scanner | ❌ |
[35] | ARP poisoning tool | ❌ |
[36] | Application that creates random shortcuts on screen | ❌ |
[37] | Application to encrypt a file | ✔️ |
[38] | Develop a Ransomware application | ❌ |
[39] | Spam Email sender | ❌ |
[40] | HTTP server for phishing | ❌ |
[41] | Honeypot creator | ❌ |
[42] | Application that connects to the Tor Network | ❌ |
[43] | IRC Server | ❌ |
[44] | Packet Capture tool | ❌ |
Level 4 | Data analysis, payloads and more networking | Done |
---|---|---|
[45] | Packet Data analysis | ❌ |
[46] | Packet image analysis with OpenCV | ❌ |
[47] | Develop a hexdump tool | ❌ |
[48] | Payload that moves the mouse cursor | ❌ |
[49] | Vigenère Cipher | ❌ |
[50] | Payload that starts automatically using Windows Regedit | ❌ |
[51] | Payload that starts as a daemon | ❌ |
[52] | Payload that retrieves browser information | ❌ |
[53] | Link generator | ❌ |
[54] | ASCII Name generator [ just for fun :) ] | ❌ |
[55] | Full chat server with private messages, file and image transfer | ❌ |
[56] | Simple firewall | ❌ |
[57] | Gateway | ❌ |
[58] | Powershell payload generator | ❌ |
[59] | Bash payload generator | ❌ |
[60] | Subdomain enumerator | ❌ |
[61] | DNS Enumerator | ❌ |
[62] | Your own interpreter | ❌ |
[63] | Develop a Worm | ❌ |
[64] | Server for DDOS | ❌ |
[65] | Implement an IP Tracker | ❌ |
[66] | BurpSuite extender | ❌ |
[67] | Develop a Trojan | ❌ |
[68] | Man In The Browser tool (kind of) | ❌ |
[69] | Process monitor (Windows and Linux) | ❌ |
[70] | Windows token privilege escalation tool | ❌ |
Level 5 | Cryptography, Reverse Engineering and Post exploitation | Done |
---|---|---|
[71] | Develop a code injection tool | ❌ |
[72] | Develop a Worm with auto replication over email | ❌ |
[73] | Simple Disassembler | ❌ |
[74] | Server for DDoS with multi-staged operations and multi-threaded handling of clients | ❌ |
[75] | Password hash cracker | ❌ |
[76] | Direct code injection exploit | ❌ |
[77] | Android daemon payload | ❌ |
[78] | Browser exploitation tool | ❌ |
[79] | Simple tool for Reverse Engineering | ❌ |
[80] | Script for OS enumeration (after shell) | ❌ |
[81] | RSA Payload generator | ❌ |
[82] | Handshake capture | ❌ |
[83] | Wifi monitor | ❌ |
[84] | Buffer Overflow exploit | ❌ |
[85] | Stack Overflow exploit | ❌ |
[86] | Banner exploit | ❌ |
[87] | ISS Exploit | ❌ |
[88] | Wifi de-authentication attack (DoS) tool | ❌ |
[89] | Badchar detector | ❌ |
[90] | Firewall detector | ❌ |
[91] | Exploitation Framework | ❌ |
[92] | Botnet with SSH C&C and automatic server backup to prevent loss of control | ❌ |
[93] | Windows enumeration tool | ❌ |
[94] | Application information gathering (after shell) | ❌ |
[95] | Recreate TCPDUMP | ❌ |
[96] | Bluetooth exploit | ❌ |
[97] | Windows Blue Screen Exploit | ❌ |
[98] | Encoded exploit | ❌ |
[99] | Antivirus evasion application | ❌ |
[100] | Your own metasploit module | ❌ |