About Netrunners

We're a tight‑knit crew of friends who hop onto Discord every day to dive into everything from cybersecurity and technology to hardware hacking, programming, cryptography, and plenty of other tech‑adjacent rabbit holes.

As an inside joke, we role‑play as a full‑blown corporation—complete with "executive" ranks, formal memos, and mock corporate rituals. The twist? Our determination and drive could make some real companies jealous. It's all in good fun and has become a beloved tradition that keeps our community lively and laughing.

Who We Are

Developer/ Pentester

R1nzler

The mastermind behind our codebases — from front-end magic to back-end wizardry, with a keen eye for pentesting and security.

Blog →

Project Manager / Pentester

Whare

Keeps the team on track, conducts authorized pentests for companies and public institutions, and actively plays CTFs.

Blog →

System Administrator

2as

Our infrastructure guru — if it runs on Linux, he's already optimized, audited, and secured it.

Blog →

Pentester 1

ShatCode

Specialized in finding vulnerabilities, even in things that were never supposed to be vulnerable, and also working as a military cybersecurity specialist.

Pentester 2

DLL

Methodical, precise, and always two steps ahead — especially impressive considering he's our youngest member at just 17 years old.

Blog →

Junior Pentester 3

R00tBegginer

Our up-and-coming hacker — hungry to learn, eager to break stuff, and already making waves.

Blog →

About Netrunners Toolkit

Netrunners Toolkit is designed to streamline the pentesting process and support learning along the way. It's a versatile toolset, useful both in CTFs and real-world scenarios. However, note that many commands are optimized for CTF environments and may include flags or options not recommended for use in production systems.

Our goal is to continue improving the toolkit by adding new tools, better documentation, and expanded functionality. We welcome contributions, suggestions, or ideas from the community!

Origins

It all started when Whare, about 30 minutes before the release of the PUPPY machine on Hack The Box, was preparing a list of all the commands he'd need based on the provided credentials. That's when the idea hit: why not find a way to automate this process, similar to how automation is used in bug bounty hunting (inspired by projects like revshells.com or lostsec.xyz)?

The idea was pitched to the group NETRUNNERS. After researching existing tools and not finding one that fully met our needs, we decided to build it ourselves.

One day, our sysadmin 2as created a quick and dirty JavaScript demo, trying hard to make things work. That "raw" aesthetic and lack of scalability lit a spark in our full-stack developer R1nzler, who immediately stepped in and took the lead on developing the project into something serious.