About Netrunners
We're a tight‑knit crew of friends who hop onto Discord every day to dive into everything from cybersecurity and technology to hardware hacking, programming, cryptography, and plenty of other tech‑adjacent rabbit holes.
As an inside joke, we role‑play as a full‑blown corporation—complete with "executive" ranks, formal memos, and mock corporate rituals. The twist? Our determination and drive could make some real companies jealous. It's all in good fun and has become a beloved tradition that keeps our community lively and laughing.
Who We Are
Developer/ Pentester
R1nzler
The mastermind behind our codebases — from front-end magic to back-end wizardry, with a keen eye for pentesting and security.
Blog →Project Manager / Pentester
Whare
Keeps the team on track, conducts authorized pentests for companies and public institutions, and actively plays CTFs.
Blog →System Administrator
2as
Our infrastructure guru — if it runs on Linux, he's already optimized, audited, and secured it.
Blog →Pentester 1
ShatCode
Specialized in finding vulnerabilities, even in things that were never supposed to be vulnerable, and also working as a military cybersecurity specialist.
Pentester 2
DLL
Methodical, precise, and always two steps ahead — especially impressive considering he's our youngest member at just 17 years old.
Blog →Junior Pentester 3
R00tBegginer
Our up-and-coming hacker — hungry to learn, eager to break stuff, and already making waves.
Blog →About Netrunners Toolkit
Netrunners Toolkit is designed to streamline the pentesting process and support learning along the way. It's a versatile toolset, useful both in CTFs and real-world scenarios. However, note that many commands are optimized for CTF environments and may include flags or options not recommended for use in production systems.
Our goal is to continue improving the toolkit by adding new tools, better documentation, and expanded functionality. We welcome contributions, suggestions, or ideas from the community!
Origins
It all started when Whare, about 30 minutes before the release of the PUPPY machine on Hack The Box, was preparing a list of all the commands he'd need based on the provided credentials. That's when the idea hit: why not find a way to automate this process, similar to how automation is used in bug bounty hunting (inspired by projects like revshells.com or lostsec.xyz)?
The idea was pitched to the group NETRUNNERS. After researching existing tools and not finding one that fully met our needs, we decided to build it ourselves.
One day, our sysadmin 2as created a quick and dirty JavaScript demo, trying hard to make things work. That "raw" aesthetic and lack of scalability lit a spark in our full-stack developer R1nzler, who immediately stepped in and took the lead on developing the project into something serious.