Update render script and Makefile
This commit is contained in:
239
terminal/pentest
239
terminal/pentest
@@ -1,12 +1,12 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Penetration Testing [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge-flat2.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Penetration Testing [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge-flat2.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA collection of awesome penetration testing and offensive cybersecurity resources.[39m
|
||||
|
||||
[38;5;14m[1mPenetration[0m[38;5;14m[1m [0m[38;5;14m[1mtesting[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Penetration_test)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpractice[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlaunching[39m[38;5;12m [39m[38;5;12mauthorized,[39m[38;5;12m [39m[38;5;12msimulated[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mphysical[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexpose[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m
|
||||
[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mweaknesses[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m[38;5;12m [39m[38;5;12mShould[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mdiscover[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mvulnerability,[39m[38;5;12m [39m[38;5;12mplease[39m[38;5;12m [39m[38;5;12mfollow[39m[38;5;12m [39m[38;5;14m[1mthis[0m[38;5;14m[1m [0m[38;5;14m[1mguidance[0m[38;5;12m [39m[38;5;12m(https://kb.cert.org/vuls/guidance/)[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mreport[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mresponsibly.[39m
|
||||
[38;5;14m[1mPenetration[0m[38;5;14m[1m [0m[38;5;14m[1mtesting[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Penetration_test)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpractice[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlaunching[39m[38;5;12m [39m[38;5;12mauthorized,[39m[38;5;12m [39m[38;5;12msimulated[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mphysical[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mexpose[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mweaknesses[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m[38;5;12m [39m[38;5;12mShould[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mdiscover[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mvulnerability,[39m[38;5;12m [39m[38;5;12mplease[39m[38;5;12m [39m[38;5;12mfollow[39m[38;5;12m [39m[38;5;14m[1mthis[0m[38;5;14m[1m [0m[38;5;14m[1mguidance[0m[38;5;12m [39m[38;5;12m(https://kb.cert.org/vuls/guidance/)[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mreport[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mresponsibly.[39m
|
||||
|
||||
[38;5;12mYour[39m[38;5;12m [39m[38;5;12mcontributions[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msuggestions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mheartily♥[39m[38;5;12m [39m[38;5;12mwelcome.[39m[38;5;12m [39m[38;5;12m(✿◕‿◕).[39m[38;5;12m [39m[38;5;12mPlease[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mContributing[0m[38;5;14m[1m [0m[38;5;14m[1mGuidelines[0m[38;5;12m [39m[38;5;12m(CONTRIBUTING.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mdetails.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mlicensed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mCreative[0m[38;5;14m[1m [0m[38;5;14m[1mCommons[0m[38;5;14m[1m [0m[38;5;14m[1mAttribution[0m[38;5;14m[1m [0m[38;5;14m[1m4.0[0m[38;5;14m[1m [0m
|
||||
[38;5;14m[1mInternational[0m[38;5;14m[1m [0m[38;5;14m[1mLicense[0m[38;5;12m [39m[38;5;12m(https://creativecommons.org/licenses/by/4.0/).[39m
|
||||
[38;5;12mYour[39m[38;5;12m [39m[38;5;12mcontributions[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msuggestions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mheartily♥[39m[38;5;12m [39m[38;5;12mwelcome.[39m[38;5;12m [39m[38;5;12m(✿◕‿◕).[39m[38;5;12m [39m[38;5;12mPlease[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mContributing[0m[38;5;14m[1m [0m[38;5;14m[1mGuidelines[0m[38;5;12m [39m[38;5;12m(CONTRIBUTING.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mdetails.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mlicensed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mCreative[0m[38;5;14m[1m [0m[38;5;14m[1mCommons[0m[38;5;14m[1m [0m
|
||||
[38;5;14m[1mAttribution[0m[38;5;14m[1m [0m[38;5;14m[1m4.0[0m[38;5;14m[1m [0m[38;5;14m[1mInternational[0m[38;5;14m[1m [0m[38;5;14m[1mLicense[0m[38;5;12m [39m[38;5;12m(https://creativecommons.org/licenses/by/4.0/).[39m
|
||||
|
||||
[38;5;14m[1mThis project is supported by Netsparker Web Application Security Scanner[0m
|
||||
[38;5;12m (https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)[39m
|
||||
@@ -98,7 +98,8 @@
|
||||
[38;2;255;187;0m[4mAndroid Utilities[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcSploit[0m[38;5;12m (https://www.csploit.org/) - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFing[0m[38;5;12m (https://www.fing.com/products/fing-app/) - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFing[0m
|
||||
[38;5;12m (https://www.fing.com/products/fing-app/) - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.[39m
|
||||
|
||||
[38;2;255;187;0m[4mAnonymity Tools[0m
|
||||
|
||||
@@ -119,7 +120,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mAnti-virus Evasion Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAntiVirus Evasion Tool (AVET)[0m[38;5;12m (https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAntiVirus Evasion Tool (AVET)[0m
|
||||
[38;5;12m (https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCarbonCopy[0m[38;5;12m (https://github.com/paranoidninja/CarbonCopy) - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHyperion[0m[38;5;12m (http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE [39m[48;5;235m[38;5;249m.exe[49m[39m[38;5;12ms").[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShellter[0m[38;5;12m (https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.[39m
|
||||
@@ -132,8 +134,10 @@
|
||||
[38;5;12mSee also [39m[38;5;14m[1mDEF CON Suggested Reading[0m[38;5;12m (https://www.defcon.org/html/links/book-list.html).[39m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Penetration Testing by Wil Allsopp, 2017[0m[38;5;12m (https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012[0m[38;5;12m (http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014[0m[38;5;12m (http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012[0m
|
||||
[38;5;12m (http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014[0m
|
||||
[38;5;12m (http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Hacker's Handbook by Joshua J. Drake et al., 2014[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017[0m[38;5;12m (https://www.amazon.de/Blue-Team-Field-Manual-BTFM/dp/154101636X)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlack Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014[0m[38;5;12m (http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)[39m
|
||||
@@ -177,14 +181,16 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudHunter[0m[38;5;12m (https://github.com/belane/CloudHunter) - Looks for AWS, Azure and Google cloud storage buckets and lists permissions for vulnerable buckets.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudsplaining[0m[38;5;12m (https://cloudsplaining.readthedocs.io/) - Identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEndgame[0m[38;5;12m (https://endgame.readthedocs.io/) - AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGCPBucketBrute[0m[38;5;12m (https://github.com/RhinoSecurityLabs/GCPBucketBrute) - Script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGCPBucketBrute[0m
|
||||
[38;5;12m (https://github.com/RhinoSecurityLabs/GCPBucketBrute) - Script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.[39m
|
||||
|
||||
[38;2;255;187;0m[4mCollaboration Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDradis[0m[38;5;12m (https://dradisframework.com) - Open-source reporting and collaboration tool for IT security professionals.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHexway Hive[0m[38;5;12m (https://hexway.io/hive/) - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLair[0m[38;5;12m (https://github.com/lair-framework/lair/wiki) - Reactive attack collaboration framework and web application built with meteor.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Collaboration Framework (PCF)[0m[38;5;12m (https://gitlab.com/invuls/pentest-projects/pcf) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Collaboration Framework (PCF)[0m
|
||||
[38;5;12m (https://gitlab.com/invuls/pentest-projects/pcf) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReconmap[0m[38;5;12m (https://reconmap.com/) - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRedELK[0m[38;5;12m (https://github.com/outflanknl/RedELK) - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.[39m
|
||||
|
||||
@@ -249,19 +255,23 @@
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDET[0m[38;5;12m (https://github.com/sensepost/DET) - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIodine[0m[38;5;12m (https://code.kryo.se/iodine/) - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTrevorC2[0m[38;5;12m (https://github.com/trustedsec/trevorc2) - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnscat2[0m[38;5;12m (https://github.com/iagox86/dnscat2) - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTrevorC2[0m
|
||||
[38;5;12m (https://github.com/trustedsec/trevorc2) - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnscat2[0m
|
||||
[38;5;12m (https://github.com/iagox86/dnscat2) - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwnat[0m[38;5;12m (https://github.com/samyk/pwnat) - Punches holes in firewalls and NATs.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtgcd[0m[38;5;12m (http://tgcd.sourceforge.net/) - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mQueenSono[0m[38;5;12m (https://github.com/ariary/QueenSono) - Client/Server Binaries for data exfiltration with ICMP. Useful in a network where ICMP protocol is less monitored than others (which is a common case).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mQueenSono[0m[38;5;12m [39m[38;5;12m(https://github.com/ariary/QueenSono)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mClient/Server[39m[38;5;12m [39m[38;5;12mBinaries[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdata[39m[38;5;12m [39m[38;5;12mexfiltration[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mICMP.[39m[38;5;12m [39m[38;5;12mUseful[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mwhere[39m[38;5;12m [39m[38;5;12mICMP[39m[38;5;12m [39m[38;5;12mprotocol[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mless[39m[38;5;12m [39m[38;5;12mmonitored[39m[38;5;12m [39m[38;5;12mthan[39m[38;5;12m [39m[38;5;12mothers[39m[38;5;12m [39m[38;5;12m(which[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12mcommon[39m[38;5;12m [39m[38;5;12mcase).[39m
|
||||
|
||||
[38;2;255;187;0m[4mExploit Development Tools[0m
|
||||
|
||||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mReverse Engineering Tools[0m[48;2;30;30;40m[38;5;13m[3m (#reverse-engineering-tools)[0m[38;5;12m.[39m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mH26Forge[0m[38;5;12m (https://github.com/h26forge/h26forge) - Domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMagic[0m[38;5;14m[1m [0m[38;5;14m[1mUnicorn[0m[38;5;12m [39m[38;5;12m(https://github.com/trustedsec/unicorn)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mShellcode[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mvectors,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mmacros,[39m[38;5;12m [39m[38;5;12mPowerShell,[39m[38;5;12m [39m[38;5;12mHTML[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12m(HTA),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[48;5;235m[38;5;249mcertutil[49m[39m[38;5;12m [39m[38;5;12m(using[39m[38;5;12m [39m[38;5;12mfake[39m[38;5;12m [39m
|
||||
[38;5;12mcertificates).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mH26Forge[0m
|
||||
[38;5;12m (https://github.com/h26forge/h26forge) - Domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMagic[0m[38;5;14m[1m [0m[38;5;14m[1mUnicorn[0m[38;5;12m [39m[38;5;12m(https://github.com/trustedsec/unicorn)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mShellcode[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mvectors,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mmacros,[39m[38;5;12m [39m[38;5;12mPowerShell,[39m[38;5;12m [39m[38;5;12mHTML[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12m(HTA),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[48;5;235m[38;5;249mcertutil[49m[39m[38;5;12m [39m
|
||||
[38;5;12m(using[39m[38;5;12m [39m[38;5;12mfake[39m[38;5;12m [39m[38;5;12mcertificates).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPwntools[0m[38;5;12m (https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWordpress Exploit Framework[0m
|
||||
[38;5;12m (https://github.com/rastating/wordpress-exploit-framework) - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.[39m
|
||||
@@ -269,7 +279,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mFile Format Analysis Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExifTool[0m[38;5;12m (https://www.sno.phy.queensu.ca/~phil/exiftool/) - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExifTool[0m[38;5;12m [39m[38;5;12m(https://www.sno.phy.queensu.ca/~phil/exiftool/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPlatform-independent[39m[38;5;12m [39m[38;5;12mPerl[39m[38;5;12m [39m[38;5;12mlibrary[39m[38;5;12m [39m[38;5;12mplus[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcommand-line[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mreading,[39m[38;5;12m [39m[38;5;12mwriting[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mediting[39m[38;5;12m [39m[38;5;12mmeta[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mwide[39m[38;5;12m [39m
|
||||
[38;5;12mvariety[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfiles.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHachoir[0m[38;5;12m (https://hachoir.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKaitai Struct[0m[38;5;12m (http://kaitai.io/) - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpeepdf[0m[38;5;12m (https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python tool to explore PDF files in order to find out if the file can be harmful or not.[39m
|
||||
@@ -344,10 +355,10 @@
|
||||
[38;2;255;187;0m[4mMulti-paradigm Frameworks[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mArmitage[0m[38;5;12m (http://fastandeasyhacking.com/) - Java-based GUI front-end for the Metasploit Framework.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAutoSploit[0m
|
||||
[38;5;12m (https://github.com/NullArray/AutoSploit) - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDecker[0m[38;5;12m [39m[38;5;12m(https://github.com/stevenaldinger/decker)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12morchestration[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomation[39m[38;5;12m [39m[38;5;12mframework,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mallows[39m[38;5;12m [39m[38;5;12mwriting[39m[38;5;12m [39m[38;5;12mdeclarative,[39m[38;5;12m [39m[38;5;12mreusable[39m[38;5;12m [39m[38;5;12mconfigurations[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mingesting[39m[38;5;12m [39m[38;5;12mvariables[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12musing[39m[38;5;12m [39m[38;5;12moutputs[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12minputs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mothers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAutoSploit[0m[38;5;12m [39m[38;5;12m(https://github.com/NullArray/AutoSploit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAutomated[39m[38;5;12m [39m[38;5;12mmass[39m[38;5;12m [39m[38;5;12mexploiter,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mcollects[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12memploying[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mShodan.io[39m[38;5;12m [39m[38;5;12mAPI[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mprogrammatically[39m[38;5;12m [39m[38;5;12mchooses[39m[38;5;12m [39m[38;5;12mMetasploit[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mmodules[39m
|
||||
[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mShodan[39m[38;5;12m [39m[38;5;12mquery.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDecker[0m[38;5;12m [39m[38;5;12m(https://github.com/stevenaldinger/decker)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12morchestration[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomation[39m[38;5;12m [39m[38;5;12mframework,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mallows[39m[38;5;12m [39m[38;5;12mwriting[39m[38;5;12m [39m[38;5;12mdeclarative,[39m[38;5;12m [39m[38;5;12mreusable[39m[38;5;12m [39m[38;5;12mconfigurations[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12mingesting[39m[38;5;12m [39m[38;5;12mvariables[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12moutputs[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12minputs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mothers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFaraday[0m[38;5;12m (https://github.com/infobyte/faraday) - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit[0m[38;5;12m (https://www.metasploit.com/) - Software for offensive security teams to help verify vulnerabilities and manage security assessments.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPupy[0m[38;5;12m (https://github.com/n1nj4sec/pupy) - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.[39m
|
||||
@@ -359,17 +370,19 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntercepter-NG[0m[38;5;12m (http://sniff.su/) - Multifunctional network toolkit.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLegion[0m[38;5;12m (https://github.com/GoVanguard/legion) - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork-Tools.com[0m[38;5;12m (http://network-tools.com/) - Website offering an interface to numerous basic network utilities like [39m[48;5;235m[38;5;249mping[49m[39m[38;5;12m, [39m[48;5;235m[38;5;249mtraceroute[49m[39m[38;5;12m, [39m[48;5;235m[38;5;249mwhois[49m[39m[38;5;12m, and more.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNcrack[0m
|
||||
[38;5;12m (https://nmap.org/ncrack/) - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNcrack[0m[38;5;12m [39m[38;5;12m(https://nmap.org/ncrack/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mHigh-speed[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mauthentication[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mbuilt[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mhelp[39m[38;5;12m [39m[38;5;12mcompanies[39m[38;5;12m [39m[38;5;12msecure[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mproactively[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mhosts[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m
|
||||
[38;5;12mdevices[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mpoor[39m[38;5;12m [39m[38;5;12mpasswords.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPraeda[0m[38;5;12m (http://h.foofus.net/?page_id=218) - Automated multi-function printer data harvester for gathering usable data during security assessments.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPrinter Exploitation Toolkit (PRET)[0m
|
||||
[38;5;12m (https://github.com/RUB-NDS/PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSPARTA[0m[38;5;12m (https://sparta.secforce.com/) - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSigPloit[0m
|
||||
[38;5;12m (https://github.com/SigPloiter/SigPloit) - Signaling security testing framework dedicated to telecom security for researching vulnerabilites in the signaling protocols used in mobile (cellular phone) operators.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSigPloit[0m[38;5;12m [39m[38;5;12m(https://github.com/SigPloiter/SigPloit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSignaling[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mdedicated[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mtelecom[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mresearching[39m[38;5;12m [39m[38;5;12mvulnerabilites[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msignaling[39m[38;5;12m [39m[38;5;12mprotocols[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m
|
||||
[38;5;12mmobile[39m[38;5;12m [39m[38;5;12m(cellular[39m[38;5;12m [39m[38;5;12mphone)[39m[38;5;12m [39m[38;5;12moperators.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSmart Install Exploitation Tool (SIET)[0m[38;5;12m (https://github.com/Sab0tag3d/SIET) - Scripts for identifying Cisco Smart Install-enabled switches on a network and then manipulating them.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTHC Hydra[0m[38;5;12m (https://github.com/vanhauser-thc/thc-hydra) - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTsunami[0m[38;5;12m (https://github.com/google/tsunami-security-scanner) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTHC[0m[38;5;14m[1m [0m[38;5;14m[1mHydra[0m[38;5;12m [39m[38;5;12m(https://github.com/vanhauser-thc/thc-hydra)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOnline[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mcracking[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mbuilt-in[39m[38;5;12m [39m[38;5;12msupport[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mmany[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mprotocols,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mHTTP,[39m[38;5;12m [39m[38;5;12mSMB,[39m[38;5;12m [39m[38;5;12mFTP,[39m[38;5;12m [39m[38;5;12mtelnet,[39m[38;5;12m [39m[38;5;12mICQ,[39m[38;5;12m [39m[38;5;12mMySQL,[39m[38;5;12m [39m[38;5;12mLDAP,[39m[38;5;12m [39m
|
||||
[38;5;12mIMAP,[39m[38;5;12m [39m[38;5;12mVNC,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTsunami[0m[38;5;12m [39m[38;5;12m(https://github.com/google/tsunami-security-scanner)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGeneral[39m[38;5;12m [39m[38;5;12mpurpose[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mscanner[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mextensible[39m[38;5;12m [39m[38;5;12mplugin[39m[38;5;12m [39m[38;5;12msystem[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdetecting[39m[38;5;12m [39m[38;5;12mhigh[39m[38;5;12m [39m[38;5;12mseverity[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m
|
||||
[38;5;12mhigh[39m[38;5;12m [39m[38;5;12mconfidence.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZarp[0m[38;5;12m (https://github.com/hatRiot/zarp) - Network attack tool centered around the exploitation of local networks.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnstwist[0m[38;5;12m (https://github.com/elceef/dnstwist) - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdsniff[0m[38;5;12m (https://www.monkey.org/~dugsong/dsniff/) - Collection of tools for network auditing and pentesting.[39m
|
||||
@@ -387,8 +400,8 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMemcrashed[0m[38;5;12m (https://github.com/649/Memcrashed-DDoS-Exploit) - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSlowLoris[0m[38;5;12m (https://github.com/gkbrk/slowloris) - DoS tool that uses low bandwidth on the attacking side.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mT50[0m[38;5;12m (https://gitlab.com/fredericopissarra/t50/) - Faster network stress tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUFONet[0m[38;5;12m [39m[38;5;12m(https://github.com/epsylon/ufonet)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAbuses[39m[38;5;12m [39m[38;5;12mOSI[39m[38;5;12m [39m[38;5;12mlayer[39m[38;5;12m [39m[38;5;12m7[39m[38;5;12m [39m[38;5;12mHTTP[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate/manage[39m[38;5;12m [39m[38;5;12m'zombies'[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconduct[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12musing;[39m[38;5;12m [39m[48;5;235m[38;5;249mGET[49m[39m[38;5;12m/[39m[48;5;235m[38;5;249mPOST[49m[39m[38;5;12m,[39m[38;5;12m [39m[38;5;12mmultithreading,[39m[38;5;12m [39m[38;5;12mproxies,[39m[38;5;12m [39m[38;5;12morigin[39m[38;5;12m [39m[38;5;12mspoofing[39m[38;5;12m [39m[38;5;12mmethods,[39m[38;5;12m [39m[38;5;12mcache[39m[38;5;12m [39m[38;5;12mevasion[39m
|
||||
[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12metc.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUFONet[0m[38;5;12m [39m[38;5;12m(https://github.com/epsylon/ufonet)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAbuses[39m[38;5;12m [39m[38;5;12mOSI[39m[38;5;12m [39m[38;5;12mlayer[39m[38;5;12m [39m[38;5;12m7[39m[38;5;12m [39m[38;5;12mHTTP[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate/manage[39m[38;5;12m [39m[38;5;12m'zombies'[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconduct[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12musing;[39m[38;5;12m [39m[48;5;235m[38;5;249mGET[49m[39m[38;5;12m/[39m[48;5;235m[38;5;249mPOST[49m[39m[38;5;12m,[39m[38;5;12m [39m[38;5;12mmultithreading,[39m[38;5;12m [39m[38;5;12mproxies,[39m[38;5;12m [39m[38;5;12morigin[39m[38;5;12m [39m[38;5;12mspoofing[39m[38;5;12m [39m
|
||||
[38;5;12mmethods,[39m[38;5;12m [39m[38;5;12mcache[39m[38;5;12m [39m[38;5;12mevasion[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12metc.[39m
|
||||
|
||||
[38;2;255;187;0m[4mNetwork Reconnaissance Tools[0m
|
||||
|
||||
@@ -397,17 +410,19 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudFail[0m[38;5;12m (https://github.com/m0rtem/CloudFail) - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDNSDumpster[0m[38;5;12m (https://dnsdumpster.com/) - Online DNS recon and search service.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMass Scan[0m[38;5;12m (https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Amass[0m[38;5;12m (https://github.com/OWASP/Amass) - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mScanCannon[0m[38;5;12m [39m[38;5;12m(https://github.com/johnnyxmas/ScanCannon)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPOSIX-compliant[39m[38;5;12m [39m[38;5;12mBASH[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mlarge[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mcalling[39m[38;5;12m [39m[48;5;235m[38;5;249mmasscan[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12mports[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[48;5;235m[38;5;249mnmap[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mgain[39m[38;5;12m [39m[38;5;12mdetails[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||||
[38;5;12msystems/services[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthose[39m[38;5;12m [39m[38;5;12mports.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Amass[0m
|
||||
[38;5;12m (https://github.com/OWASP/Amass) - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mScanCannon[0m[38;5;12m [39m[38;5;12m(https://github.com/johnnyxmas/ScanCannon)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPOSIX-compliant[39m[38;5;12m [39m[38;5;12mBASH[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mlarge[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mcalling[39m[38;5;12m [39m[48;5;235m[38;5;249mmasscan[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12mports[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[48;5;235m[38;5;249mnmap[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m
|
||||
[38;5;12mgain[39m[38;5;12m [39m[38;5;12mdetails[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msystems/services[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthose[39m[38;5;12m [39m[38;5;12mports.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXRay[0m[38;5;12m (https://github.com/evilsocket/xray) - Network (sub)domain discovery and reconnaissance automation tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsenum[0m[38;5;12m [39m[38;5;12m(https://github.com/fwaeytens/dnsenum/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPerl[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12menumerates[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdomain,[39m[38;5;12m [39m[38;5;12mattempts[39m[38;5;12m [39m[38;5;12mzone[39m[38;5;12m [39m[38;5;12mtransfers,[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbrute[39m[38;5;12m [39m[38;5;12mforce[39m[38;5;12m [39m[38;5;12mdictionary[39m[38;5;12m [39m[38;5;12mstyle[39m[38;5;12m [39m[38;5;12mattack,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m
|
||||
[38;5;12mlook-ups[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mresults.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsenum[0m[38;5;12m [39m[38;5;12m(https://github.com/fwaeytens/dnsenum/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPerl[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12menumerates[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdomain,[39m[38;5;12m [39m[38;5;12mattempts[39m[38;5;12m [39m[38;5;12mzone[39m[38;5;12m [39m[38;5;12mtransfers,[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbrute[39m[38;5;12m [39m[38;5;12mforce[39m[38;5;12m [39m[38;5;12mdictionary[39m[38;5;12m [39m[38;5;12mstyle[39m[38;5;12m [39m[38;5;12mattack,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mthen[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m[38;5;12mlook-ups[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mresults.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsmap[0m[38;5;12m (https://github.com/makefu/dnsmap/) - Passive DNS network mapper.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsrecon[0m[38;5;12m (https://github.com/darkoperator/dnsrecon/) - DNS enumeration script.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnstracer[0m[38;5;12m (http://www.mavetju.org/unix/dnstracer.php) - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfierce[0m[38;5;12m (https://github.com/mschwager/fierce) - Python3 port of the original [39m[48;5;235m[38;5;249mfierce.pl[49m[39m[38;5;12m DNS reconnaissance tool for locating non-contiguous IP space.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnetdiscover[0m[38;5;12m (https://github.com/netdiscover-scanner/netdiscover) - Network address discovery scanner, based on ARP sweeps, developed mainly for those wireless networks without a DHCP server.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnetdiscover[0m
|
||||
[38;5;12m (https://github.com/netdiscover-scanner/netdiscover) - Network address discovery scanner, based on ARP sweeps, developed mainly for those wireless networks without a DHCP server.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnmap[0m[38;5;12m (https://nmap.org/) - Free security scanner for network exploration & security audits.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpassivedns-client[0m[38;5;12m (https://github.com/chrislee35/passivedns-client) - Library and query tool for querying several passive DNS providers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpassivedns[0m[38;5;12m (https://github.com/gamelinux/passivedns) - Network sniffer that logs all DNS server replies for use in a passive DNS setup.[39m
|
||||
@@ -433,8 +448,8 @@
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTraceWrangler[0m[38;5;12m (https://www.tracewrangler.com/) - Network capture file toolkit that can edit and merge [39m[48;5;235m[38;5;249mpcap[49m[39m[38;5;12m or [39m[48;5;235m[38;5;249mpcapng[49m[39m[38;5;12m files with batch editing features.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireEdit[0m[38;5;12m (https://wireedit.com/) - Full stack WYSIWYG pcap editor (requires a free license to edit packets).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbittwist[0m[38;5;12m [39m[38;5;12m(http://bittwist.sourceforge.net/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSimple[39m[38;5;12m [39m[38;5;12myet[39m[38;5;12m [39m[38;5;12mpowerful[39m[38;5;12m [39m[38;5;12mlibpcap-based[39m[38;5;12m [39m[38;5;12mEthernet[39m[38;5;12m [39m[38;5;12mpacket[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msimulating[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mscenario,[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mfirewall,[39m[38;5;12m [39m[38;5;12mIDS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mIPS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mtroubleshooting[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mproblems.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbittwist[0m[38;5;12m [39m[38;5;12m(http://bittwist.sourceforge.net/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSimple[39m[38;5;12m [39m[38;5;12myet[39m[38;5;12m [39m[38;5;12mpowerful[39m[38;5;12m [39m[38;5;12mlibpcap-based[39m[38;5;12m [39m[38;5;12mEthernet[39m[38;5;12m [39m[38;5;12mpacket[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msimulating[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mscenario,[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mfirewall,[39m[38;5;12m [39m[38;5;12mIDS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mIPS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtroubleshooting[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mproblems.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mhping3[0m[38;5;12m (https://github.com/antirez/hping) - Network tool able to send custom TCP/IP packets.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpig[0m[38;5;12m (https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mscapy[0m[38;5;12m (https://github.com/secdev/scapy) - Python-based interactive packet manipulation program and library.[39m
|
||||
@@ -455,14 +470,16 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mevilgrade[0m[38;5;12m (https://github.com/infobyte/evilgrade) - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmallory[0m[38;5;12m (https://github.com/justmao945/mallory) - HTTP/HTTPS proxy over SSH.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1moregano[0m[38;5;12m (https://github.com/nametoolong/oregano) - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msylkie[0m[38;5;12m (https://dlrobertson.github.io/sylkie/) - Command line tool and library for testing networks for common address spoofing security vulnerabilities in IPv6 networks using the Neighbor Discovery Protocol.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msylkie[0m[38;5;12m [39m[38;5;12m(https://dlrobertson.github.io/sylkie/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mCommand[39m[38;5;12m [39m[38;5;12mline[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibrary[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12maddress[39m[38;5;12m [39m[38;5;12mspoofing[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mIPv6[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12musing[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mNeighbor[39m[38;5;12m [39m
|
||||
[38;5;12mDiscovery[39m[38;5;12m [39m[38;5;12mProtocol.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPETEP[0m[38;5;12m (https://github.com/Warxim/petep) - Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.[39m
|
||||
|
||||
[38;2;255;187;0m[4mTransport Layer Security Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSSLyze[0m[38;5;12m (https://github.com/nabla-c0d3/sslyze) - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcrackpkcs12[0m[38;5;12m (https://github.com/crackpkcs12/crackpkcs12) - Multithreaded program to crack PKCS#12 files ([39m[48;5;235m[38;5;249m.p12[49m[39m[38;5;12m and [39m[48;5;235m[38;5;249m.pfx[49m[39m[38;5;12m extensions), such as TLS/SSL certificates.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtestssl.sh[0m[38;5;12m (https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtestssl.sh[0m
|
||||
[38;5;12m (https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtls_prober[0m[38;5;12m (https://github.com/WestpointLtd/tls_prober) - Fingerprint a server's SSL/TLS implementation.[39m
|
||||
|
||||
[38;2;255;187;0m[4mWireless Network Tools[0m
|
||||
@@ -482,13 +499,15 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWifite[0m[38;5;12m (https://github.com/derv82/wifite) - Automated wireless attack tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1minfernal-twin[0m[38;5;12m (https://github.com/entropy1337/infernal-twin) - Automated wireless hacking tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkrackattacks-scripts[0m[38;5;12m (https://github.com/vanhoefm/krackattacks-scripts) - WPA2 Krack attack scripts.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwnagotchi[0m[38;5;12m (https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwnagotchi[0m[38;5;12m [39m[38;5;12m(https://github.com/evilsocket/pwnagotchi)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDeep[39m[38;5;12m [39m[38;5;12mreinforcement[39m[38;5;12m [39m[38;5;12mlearning[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mAI[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mlearns[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mWi-Fi[39m[38;5;12m [39m[38;5;12menvironment[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12minstruments[39m[38;5;12m [39m[38;5;12mBetterCAP[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmaximize[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mWPA[39m[38;5;12m [39m
|
||||
[38;5;12mkey[39m[38;5;12m [39m[38;5;12mmaterial[39m[38;5;12m [39m[38;5;12mcaptured.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwifi-arsenal[0m[38;5;12m (https://github.com/0x90/wifi-arsenal) - Resources for Wi-Fi Pentesting.[39m
|
||||
|
||||
[38;2;255;187;0m[4mNetwork Vulnerability Scanners[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcelerystalk[0m[38;5;12m (https://github.com/sethsec/celerystalk) - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkube-hunter[0m[38;5;12m (https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkube-hunter[0m[38;5;12m [39m[38;5;12m(https://kube-hunter.aquasec.com/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen-source[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mruns[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtests[39m[38;5;12m [39m[38;5;12m("hunters")[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12missues[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mKubernetes[39m[38;5;12m [39m[38;5;12mclusters[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12meither[39m[38;5;12m [39m[38;5;12moutside[39m[38;5;12m [39m[38;5;12m("attacker's[39m[38;5;12m [39m[38;5;12mview")[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m
|
||||
[38;5;12minside[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcluster.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNessus[0m[38;5;12m (https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetsparker Application Security Scanner[0m[38;5;12m (https://www.netsparker.com/pricing/) - Application security scanner to automatically find security flaws.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNexpose[0m[38;5;12m (https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.[39m
|
||||
@@ -506,7 +525,8 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWPScan[0m[38;5;12m (https://wpscan.org/) - Black box WordPress vulnerability scanner.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWapiti[0m[38;5;12m (http://wapiti.sourceforge.net/) - Black box web application vulnerability scanner with built-in fuzzer.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWebReaver[0m[38;5;12m (https://www.webreaver.com/) - Commercial, graphical web application vulnerability scanner designed for macOS.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcms-explorer[0m[38;5;12m (https://code.google.com/archive/p/cms-explorer/) - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcms-explorer[0m
|
||||
[38;5;12m (https://code.google.com/archive/p/cms-explorer/) - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mjoomscan[0m[38;5;12m (https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project) - Joomla vulnerability scanner.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mskipfish[0m[38;5;12m (https://www.kali.org/tools/skipfish/) - Performant and adaptable active web application security reconnaissance tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mw3af[0m[38;5;12m (https://github.com/andresriancho/w3af) - Web application attack and audit framework.[39m
|
||||
@@ -515,7 +535,8 @@
|
||||
|
||||
[38;2;255;187;0m[4mOnline Operating Systems Resources[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDistroWatch.com's Security Category[0m[38;5;12m (https://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDistroWatch.com's Security Category[0m
|
||||
[38;5;12m (https://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.[39m
|
||||
|
||||
[38;2;255;187;0m[4mOnline Penetration Testing Resources[0m
|
||||
|
||||
@@ -524,9 +545,10 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Web Application Security Project (OWASP)[0m
|
||||
[38;5;12m (https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPENTEST-WIKI[0m[38;5;12m (https://github.com/nixawk/pentest-wiki) - Free online security knowledge library for pentesters and researchers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Execution Standard (PTES)[0m[38;5;12m (http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Framework (PTF)[0m
|
||||
[38;5;12m (http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Execution Standard (PTES)[0m
|
||||
[38;5;12m (http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration[0m[38;5;14m[1m [0m[38;5;14m[1mTesting[0m[38;5;14m[1m [0m[38;5;14m[1mFramework[0m[38;5;14m[1m [0m[38;5;14m[1m(PTF)[0m[38;5;12m [39m[38;5;12m(http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOutline[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mperforming[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtests[39m[38;5;12m [39m[38;5;12mcompiled[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mgeneral[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12musable[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;12mvulnerability[39m[38;5;12m [39m[38;5;12manalysts[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtesters[39m[38;5;12m [39m[38;5;12malike.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS-Payloads[0m[38;5;12m (http://www.xss-payloads.com) - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.[39m
|
||||
|
||||
[38;2;255;187;0m[4mOther Lists Online[0m
|
||||
@@ -566,14 +588,17 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecTools[0m[38;5;12m (http://sectools.org/) - Top 125 Network Security Tools.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity Talks[0m[38;5;12m (https://github.com/PaulSec/awesome-sec-talks) - Curated list of security conferences.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity[0m[38;5;12m (https://github.com/sbilly/awesome-security) - Software, libraries, documents, and other resources.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mServerless Security[0m[38;5;12m (https://github.com/puresec/awesome-serverless-security/) - Curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mServerless Security[0m
|
||||
[38;5;12m (https://github.com/puresec/awesome-serverless-security/) - Curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShell Scripting[0m[38;5;12m (https://github.com/alebcay/awesome-shell) - Command line frameworks, toolkits, guides and gizmos.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mYARA[0m[38;5;12m (https://github.com/InQuest/awesome-yara) - YARA rules, tools, and people.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPenetration Testing Report Templates[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPublic Pentesting Reports[0m[38;5;12m (https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mT&VS Pentesting Report Template[0m[38;5;12m (https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - Pentest report template provided by Test and Verification Services, Ltd.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPublic Pentesting Reports[0m
|
||||
[38;5;12m (https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mT&VS Pentesting Report Template[0m
|
||||
[38;5;12m (https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - Pentest report template provided by Test and Verification Services, Ltd.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb Application Security Assessment Report Template[0m[38;5;12m (http://lucideus.com/pdf/stw.pdf) - Sample Web application security assessment reporting template provided by Lucideus.[39m
|
||||
|
||||
[38;2;255;187;0m[4mOpen Sources Intelligence (OSINT)[0m
|
||||
@@ -585,10 +610,10 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGyoiThon[0m[38;5;12m (https://github.com/gyoisamurai/GyoiThon) - GyoiThon is an Intelligence Gathering tool using Machine Learning.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntrigue[0m[38;5;12m (http://intrigue.io) - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMaltego[0m[38;5;12m (http://www.maltego.com/) - Proprietary software for open sources intelligence and forensics.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacketTotal[0m
|
||||
[38;5;12m (https://packettotal.com/) - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Zeek and Suricata IDS signatures under the hood).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSkiptracer[0m[38;5;12m [39m[38;5;12m(https://github.com/xillwillx/skiptracer)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOSINT[39m[38;5;12m [39m[38;5;12mscraping[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12mPython[39m[38;5;12m [39m[38;5;12mwebscraping[39m[38;5;12m [39m[38;5;12m(BeautifulSoup)[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mPII[39m[38;5;12m [39m[38;5;12mpaywall[39m[38;5;12m [39m[38;5;12msites[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcompile[39m[38;5;12m [39m[38;5;12mpassive[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mramen[39m
|
||||
[38;5;12mnoodle[39m[38;5;12m [39m[38;5;12mbudget.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacketTotal[0m[38;5;12m [39m[38;5;12m(https://packettotal.com/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSimple,[39m[38;5;12m [39m[38;5;12mfree,[39m[38;5;12m [39m[38;5;12mhigh-quality[39m[38;5;12m [39m[38;5;12mpacket[39m[38;5;12m [39m[38;5;12mcapture[39m[38;5;12m [39m[38;5;12mfile[39m[38;5;12m [39m[38;5;12manalysis[39m[38;5;12m [39m[38;5;12mfacilitating[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mquick[39m[38;5;12m [39m[38;5;12mdetection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mnetwork-borne[39m[38;5;12m [39m[38;5;12mmalware[39m[38;5;12m [39m[38;5;12m(using[39m[38;5;12m [39m[38;5;12mZeek[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mSuricata[39m[38;5;12m [39m[38;5;12mIDS[39m[38;5;12m [39m
|
||||
[38;5;12msignatures[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mhood).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSkiptracer[0m[38;5;12m [39m[38;5;12m(https://github.com/xillwillx/skiptracer)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOSINT[39m[38;5;12m [39m[38;5;12mscraping[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12mPython[39m[38;5;12m [39m[38;5;12mwebscraping[39m[38;5;12m [39m[38;5;12m(BeautifulSoup)[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mPII[39m[38;5;12m [39m[38;5;12mpaywall[39m[38;5;12m [39m[38;5;12msites[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcompile[39m[38;5;12m [39m[38;5;12mpassive[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mon[39m
|
||||
[38;5;12ma[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mramen[39m[38;5;12m [39m[38;5;12mnoodle[39m[38;5;12m [39m[38;5;12mbudget.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSn1per[0m[38;5;12m (https://github.com/1N3/Sn1per) - Automated Pentest Recon Scanner.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSpiderfoot[0m[38;5;12m (http://www.spiderfoot.net/) - Multi-source OSINT automation tool with a Web UI and report visualizations.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcreepy[0m[38;5;12m (https://github.com/ilektrojohn/creepy) - Geolocation OSINT tool.[39m
|
||||
@@ -622,7 +647,8 @@
|
||||
[38;2;255;187;0m[4mEmail search and analysis tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSimplyEmail[0m[38;5;12m (https://github.com/SimplySecurity/SimplyEmail) - Email recon made fast and easy.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatBreach[0m[38;5;12m (https://github.com/Ekultek/WhatBreach) - Search email addresses and discover all known breaches that this email has been seen in, and download the breached database if it is publicly available.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatBreach[0m[38;5;12m [39m[38;5;12m(https://github.com/Ekultek/WhatBreach)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSearch[39m[38;5;12m [39m[38;5;12memail[39m[38;5;12m [39m[38;5;12maddresses[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdiscover[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12mbreaches[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthis[39m[38;5;12m [39m[38;5;12memail[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mbeen[39m[38;5;12m [39m[38;5;12mseen[39m[38;5;12m [39m[38;5;12min,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdownload[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mbreached[39m[38;5;12m [39m[38;5;12mdatabase[39m[38;5;12m [39m[38;5;12mif[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m
|
||||
[38;5;12mpublicly[39m[38;5;12m [39m[38;5;12mavailable.[39m
|
||||
|
||||
[38;2;255;187;0m[4mMetadata harvesting and analysis[0m
|
||||
|
||||
@@ -656,8 +682,10 @@
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlindElephant[0m[38;5;12m (http://blindelephant.sourceforge.net/) - Web application fingerprinter.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEyeWitness[0m[38;5;12m (https://github.com/ChrisTruncer/EyeWitness) - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGraphQL Voyager[0m[38;5;12m (https://graphql-kit.com/graphql-voyager/) - Represent any GraphQL API as an interactive graph, letting you explore data models from any Web site with a GraphQL query endpoint.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVHostScan[0m[38;5;12m (https://github.com/codingo/VHostScan) - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGraphQL Voyager[0m
|
||||
[38;5;12m (https://graphql-kit.com/graphql-voyager/) - Represent any GraphQL API as an interactive graph, letting you explore data models from any Web site with a GraphQL query endpoint.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVHostScan[0m
|
||||
[38;5;12m (https://github.com/codingo/VHostScan) - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWappalyzer[0m[38;5;12m (https://www.wappalyzer.com/) - Wappalyzer uncovers the technologies used on websites.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatWaf[0m[38;5;12m (https://github.com/Ekultek/WhatWaf) - Detect and bypass web application firewalls and protection systems.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatWeb[0m[38;5;12m (https://github.com/urbanadventurer/WhatWeb) - Website fingerprinter.[39m
|
||||
@@ -676,8 +704,8 @@
|
||||
[38;5;12m (http://networksecuritytoolkit.org/) - Fedora-based GNU/Linux bootable live Operating System designed to provide easy access to best-of-breed open source network security applications.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mParrot[0m[38;5;12m (https://parrotlinux.org/) - Distribution similar to Kali, with support for multiple hardware architectures.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentestBox[0m[38;5;12m (https://pentestbox.org/) - Open source pre-configured portable penetration testing environment for the Windows Operating System.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Pentesters Framework[0m
|
||||
[38;5;12m (https://github.com/trustedsec/ptf) - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that omits less frequently used utilities.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mPentesters[0m[38;5;14m[1m [0m[38;5;14m[1mFramework[0m[38;5;12m [39m[38;5;12m(https://github.com/trustedsec/ptf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDistro[39m[38;5;12m [39m[38;5;12morganized[39m[38;5;12m [39m[38;5;12maround[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mTesting[39m[38;5;12m [39m[38;5;12mExecution[39m[38;5;12m [39m[38;5;12mStandard[39m[38;5;12m [39m[38;5;12m(PTES),[39m[38;5;12m [39m[38;5;12mproviding[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcurated[39m[38;5;12m [39m[38;5;12mcollection[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mutilities[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m
|
||||
[38;5;12momits[39m[38;5;12m [39m[38;5;12mless[39m[38;5;12m [39m[38;5;12mfrequently[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mutilities.[39m
|
||||
|
||||
[38;2;255;187;0m[4mPeriodicals[0m
|
||||
|
||||
@@ -686,12 +714,13 @@
|
||||
|
||||
[38;2;255;187;0m[4mPhysical Access Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAT[0m[38;5;14m[1m [0m[38;5;14m[1mCommands[0m[38;5;12m [39m[38;5;12m(https://atcommands.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mUse[39m[38;5;12m [39m[38;5;12mAT[39m[38;5;12m [39m[38;5;12mcommands[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAndroid[39m[38;5;12m [39m[38;5;12mdevice's[39m[38;5;12m [39m[38;5;12mUSB[39m[38;5;12m [39m[38;5;12mport[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrewrite[39m[38;5;12m [39m[38;5;12mdevice[39m[38;5;12m [39m[38;5;12mfirmware,[39m[38;5;12m [39m[38;5;12mbypass[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mmechanisms,[39m[38;5;12m [39m[38;5;12mexfiltrate[39m[38;5;12m [39m[38;5;12msensitive[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mscreen[39m[38;5;12m [39m[38;5;12munlocks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12minject[39m[38;5;12m [39m[38;5;12mtouch[39m[38;5;12m [39m[38;5;12mevents.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAT[0m[38;5;14m[1m [0m[38;5;14m[1mCommands[0m[38;5;12m [39m[38;5;12m(https://atcommands.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mUse[39m[38;5;12m [39m[38;5;12mAT[39m[38;5;12m [39m[38;5;12mcommands[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAndroid[39m[38;5;12m [39m[38;5;12mdevice's[39m[38;5;12m [39m[38;5;12mUSB[39m[38;5;12m [39m[38;5;12mport[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrewrite[39m[38;5;12m [39m[38;5;12mdevice[39m[38;5;12m [39m[38;5;12mfirmware,[39m[38;5;12m [39m[38;5;12mbypass[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mmechanisms,[39m[38;5;12m [39m[38;5;12mexfiltrate[39m[38;5;12m [39m[38;5;12msensitive[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m
|
||||
[38;5;12mscreen[39m[38;5;12m [39m[38;5;12munlocks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12minject[39m[38;5;12m [39m[38;5;12mtouch[39m[38;5;12m [39m[38;5;12mevents.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBash Bunny[0m[38;5;12m (https://www.hak5.org/gear/bash-bunny) - Local exploit delivery tool in the form of a USB thumbdrive in which you write payloads in a DSL called BunnyScript.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLAN Turtle[0m[38;5;12m (https://lanturtle.com/) - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPCILeech[0m[38;5;12m (https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacket Squirrel[0m[38;5;12m (https://www.hak5.org/gear/packet-squirrel) - Ethernet multi-tool designed to enable covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacket Squirrel[0m
|
||||
[38;5;12m (https://www.hak5.org/gear/packet-squirrel) - Ethernet multi-tool designed to enable covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPoisontap[0m[38;5;12m (https://samy.pl/poisontap/) - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProxmark3[0m[38;5;12m (https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThunderclap[0m[38;5;12m (https://thunderclap.io/) - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.[39m
|
||||
@@ -699,11 +728,11 @@
|
||||
|
||||
[38;2;255;187;0m[4mPrivilege Escalation Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mActive Directory and Privilege Escalation (ADAPE)[0m
|
||||
[38;5;12m (https://github.com/hausec/ADAPE-Script) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mActive[0m[38;5;14m[1m [0m[38;5;14m[1mDirectory[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mPrivilege[0m[38;5;14m[1m [0m[38;5;14m[1mEscalation[0m[38;5;14m[1m [0m[38;5;14m[1m(ADAPE)[0m[38;5;12m [39m[38;5;12m(https://github.com/hausec/ADAPE-Script)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mUmbrella[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mautomates[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12mPowerShell[39m[38;5;12m [39m[38;5;12mmodules[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mdiscover[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||||
[38;5;12mmisconfigurations[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mattempt[39m[38;5;12m [39m[38;5;12mprivilege[39m[38;5;12m [39m[38;5;12mescalation[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mActive[39m[38;5;12m [39m[38;5;12mDirectory.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGTFOBins[0m[38;5;12m (https://gtfobins.github.io/) - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLOLBAS[0m[38;5;14m[1m [0m[38;5;14m[1m(Living[0m[38;5;14m[1m [0m[38;5;14m[1mOff[0m[38;5;14m[1m [0m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mLand[0m[38;5;14m[1m [0m[38;5;14m[1mBinaries[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mScripts)[0m[38;5;12m [39m[38;5;12m(https://lolbas-project.github.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDocuments[39m[38;5;12m [39m[38;5;12mbinaries,[39m[38;5;12m [39m[38;5;12mscripts,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibraries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12m"Living[39m[38;5;12m [39m[38;5;12mOff[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mLand"[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12mi.e.,[39m[38;5;12m [39m[38;5;12mbinaries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m
|
||||
[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mattacker[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mactions[39m[38;5;12m [39m[38;5;12mbeyond[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12moriginal[39m[38;5;12m [39m[38;5;12mpurpose.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLOLBAS[0m[38;5;14m[1m [0m[38;5;14m[1m(Living[0m[38;5;14m[1m [0m[38;5;14m[1mOff[0m[38;5;14m[1m [0m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mLand[0m[38;5;14m[1m [0m[38;5;14m[1mBinaries[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mScripts)[0m[38;5;12m [39m[38;5;12m(https://lolbas-project.github.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDocuments[39m[38;5;12m [39m[38;5;12mbinaries,[39m[38;5;12m [39m[38;5;12mscripts,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibraries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12m"Living[39m[38;5;12m [39m[38;5;12mOff[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mLand"[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m
|
||||
[38;5;12mi.e.,[39m[38;5;12m [39m[38;5;12mbinaries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mattacker[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mactions[39m[38;5;12m [39m[38;5;12mbeyond[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12moriginal[39m[38;5;12m [39m[38;5;12mpurpose.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinEnum[0m[38;5;12m (https://github.com/rebootuser/LinEnum) - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPostenum[0m[38;5;12m (https://github.com/mbahadou/postenum) - Shell script used for enumerating possible privilege escalation opportunities on a local GNU/Linux system.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1munix-privesc-check[0m[38;5;12m (https://github.com/pentestmonkey/unix-privesc-check) - Shell script to check for simple privilege escalation vectors on UNIX systems.[39m
|
||||
@@ -711,8 +740,8 @@
|
||||
[38;2;255;187;0m[4mPassword Spraying Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDomainPasswordSpray[0m[38;5;12m (https://github.com/dafthack/DomainPasswordSpray) - Tool written in PowerShell to perform a password spray attack against users of a domain.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSprayingToolkit[0m
|
||||
[38;5;12m (https://github.com/byt3bl33d3r/SprayingToolkit) - Scripts to make password spraying attacks against Lync/S4B, Outlook Web Access (OWA) and Office 365 (O365) a lot quicker, less painful and more efficient.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSprayingToolkit[0m[38;5;12m [39m[38;5;12m(https://github.com/byt3bl33d3r/SprayingToolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mScripts[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mpassword[39m[38;5;12m [39m[38;5;12mspraying[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mLync/S4B,[39m[38;5;12m [39m[38;5;12mOutlook[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12m(OWA)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12m365[39m[38;5;12m [39m[38;5;12m(O365)[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlot[39m[38;5;12m [39m[38;5;12mquicker,[39m[38;5;12m [39m
|
||||
[38;5;12mless[39m[38;5;12m [39m[38;5;12mpainful[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mefficient.[39m
|
||||
|
||||
[38;2;255;187;0m[4mReverse Engineering[0m
|
||||
|
||||
@@ -734,11 +763,11 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvan's Debugger[0m[38;5;12m (http://www.codef00.com/projects#debugger) - OllyDbg-like debugger for GNU/Linux.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFrida[0m[38;5;12m (https://www.frida.re/) - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFridax[0m[38;5;12m (https://github.com/NorthwaveNL/fridax) - Read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGhidra[0m[38;5;12m [39m[38;5;12m(https://www.ghidra-sre.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSuite[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m[38;5;12mengineering[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mdeveloped[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mNSA's[39m[38;5;12m [39m[38;5;12mResearch[39m[38;5;12m [39m[38;5;12mDirectorate[39m[38;5;12m [39m[38;5;12moriginally[39m[38;5;12m [39m[38;5;12mexposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mWikiLeaks's[39m[38;5;12m [39m[38;5;12m"Vault[39m[38;5;12m [39m[38;5;12m7"[39m[38;5;12m [39m[38;5;12mpublication[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnow[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m
|
||||
[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGhidra[0m[38;5;12m [39m[38;5;12m(https://www.ghidra-sre.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSuite[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m[38;5;12mengineering[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mdeveloped[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mNSA's[39m[38;5;12m [39m[38;5;12mResearch[39m[38;5;12m [39m[38;5;12mDirectorate[39m[38;5;12m [39m[38;5;12moriginally[39m[38;5;12m [39m[38;5;12mexposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mWikiLeaks's[39m[38;5;12m [39m[38;5;12m"Vault[39m[38;5;12m [39m[38;5;12m7"[39m[38;5;12m [39m[38;5;12mpublication[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||||
[38;5;12mnow[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mImmunity Debugger[0m[38;5;12m (https://immunityinc.com/products/debugger/) - Powerful way to write exploits and analyze malware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInteractive[0m[38;5;14m[1m [0m[38;5;14m[1mDisassembler[0m[38;5;14m[1m [0m[38;5;14m[1m(IDA[0m[38;5;14m[1m [0m[38;5;14m[1mPro)[0m[38;5;12m [39m[38;5;12m(https://www.hex-rays.com/products/ida/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProprietary[39m[38;5;12m [39m[38;5;12mmulti-processor[39m[38;5;12m [39m[38;5;12mdisassembler[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdebugger[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mWindows,[39m[38;5;12m [39m[38;5;12mGNU/Linux,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mmacOS;[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12mversion,[39m[38;5;12m [39m[38;5;14m[1mIDA[0m[38;5;14m[1m [0m[38;5;14m[1mFree[0m[38;5;12m [39m
|
||||
[38;5;12m(https://www.hex-rays.com/products/ida/support/download_freeware.shtml).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInteractive[0m[38;5;14m[1m [0m[38;5;14m[1mDisassembler[0m[38;5;14m[1m [0m[38;5;14m[1m(IDA[0m[38;5;14m[1m [0m[38;5;14m[1mPro)[0m[38;5;12m [39m[38;5;12m(https://www.hex-rays.com/products/ida/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProprietary[39m[38;5;12m [39m[38;5;12mmulti-processor[39m[38;5;12m [39m[38;5;12mdisassembler[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdebugger[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mWindows,[39m[38;5;12m [39m[38;5;12mGNU/Linux,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mmacOS;[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m
|
||||
[38;5;12mversion,[39m[38;5;12m [39m[38;5;14m[1mIDA[0m[38;5;14m[1m [0m[38;5;14m[1mFree[0m[38;5;12m [39m[38;5;12m(https://www.hex-rays.com/products/ida/support/download_freeware.shtml).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMedusa[0m[38;5;12m (https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOllyDbg[0m[38;5;12m (http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPyREBox[0m[38;5;12m (https://github.com/Cisco-Talos/pyrebox) - Python scriptable Reverse Engineering sandbox by Cisco-Talos.[39m
|
||||
@@ -750,16 +779,19 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mboxxy[0m[38;5;12m (https://github.com/kpcyrd/boxxy-rs) - Linkable sandbox explorer.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnSpy[0m[38;5;12m (https://github.com/0xd4d/dnSpy) - Tool to reverse engineer .NET assemblies.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mplasma[0m[38;5;12m (https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwndbg[0m
|
||||
[38;5;12m (https://github.com/pwndbg/pwndbg) - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwndbg[0m[38;5;12m [39m[38;5;12m(https://github.com/pwndbg/pwndbg)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGDB[39m[38;5;12m [39m[38;5;12mplug-in[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12meases[39m[38;5;12m [39m[38;5;12mdebugging[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12mGDB,[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfocus[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mfeatures[39m[38;5;12m [39m[38;5;12mneeded[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mlow-level[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mdevelopers,[39m[38;5;12m [39m[38;5;12mhardware[39m[38;5;12m [39m[38;5;12mhackers,[39m[38;5;12m [39m[38;5;12mreverse-engineers,[39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mdevelopers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mrVMI[0m[38;5;12m (https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mx64dbg[0m[38;5;12m (http://x64dbg.com/) - Open source x64/x32 debugger for windows.[39m
|
||||
|
||||
[38;2;255;187;0m[4mSecurity Education Courses[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARIZONA CYBER WARFARE RANGE[0m[38;5;12m (http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCybrary[0m[38;5;12m (http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Environments'.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEuropean Union Agency for Network and Information Security[0m[38;5;12m (https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARIZONA CYBER WARFARE RANGE[0m
|
||||
[38;5;12m (http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCybrary[0m[38;5;12m [39m[38;5;12m(http://cybrary.it)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mFree[39m[38;5;12m [39m[38;5;12mcourses[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12methical[39m[38;5;12m [39m[38;5;12mhacking[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12madvanced[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtesting.[39m[38;5;12m [39m[38;5;12mAdvanced[39m[38;5;12m [39m[38;5;12mpenetration[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mcourses[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mbased[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mbook[39m[38;5;12m [39m[38;5;12m'Penetration[39m[38;5;12m [39m[38;5;12mTesting[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mHighly[39m[38;5;12m [39m
|
||||
[38;5;12mSecured[39m[38;5;12m [39m[38;5;12mEnvironments'.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEuropean Union Agency for Network and Information Security[0m
|
||||
[38;5;12m (https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOffensive Security Training[0m[38;5;12m (https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Security Training[0m[38;5;12m (http://opensecuritytraining.info/) - Training material for computer security classes.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers Academy Training[0m[38;5;12m (https://www.hoppersroppers.org/training.html) - Free courses on computing and security fundamentals designed to train a beginner to crush their first CTF. [39m
|
||||
@@ -775,9 +807,10 @@
|
||||
[38;2;255;187;0m[4mSide-channel Tools[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChipWhisperer[0m[38;5;12m (http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSGX-Step[0m
|
||||
[38;5;12m (https://github.com/jovanbulck/sgx-step) - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTRRespass[0m[38;5;12m (https://github.com/vusec/trrespass) - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSGX-Step[0m[38;5;12m [39m[38;5;12m(https://github.com/jovanbulck/sgx-step)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen-source[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mfacilitate[39m[38;5;12m [39m[38;5;12mside-channel[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mresearch[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mIntel[39m[38;5;12m [39m[38;5;12mx86[39m[38;5;12m [39m[38;5;12mprocessors[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mgeneral[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mIntel[39m[38;5;12m [39m[38;5;12mSGX[39m[38;5;12m [39m[38;5;12m(Software[39m[38;5;12m [39m[38;5;12mGuard[39m[38;5;12m [39m
|
||||
[38;5;12mExtensions)[39m[38;5;12m [39m[38;5;12mplatforms[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mparticular.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTRRespass[0m
|
||||
[38;5;12m (https://github.com/vusec/trrespass) - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.[39m
|
||||
|
||||
[38;2;255;187;0m[4mSocial Engineering[0m
|
||||
|
||||
@@ -801,14 +834,16 @@
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBeelogger[0m[38;5;12m (https://github.com/4w4k3/BeeLogger) - Tool for generating keylooger.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCatphish[0m[38;5;12m (https://github.com/ring0lab/catphish) - Tool for phishing and corporate espionage written in Ruby.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvilginx2[0m[38;5;12m (https://github.com/kgretzky/evilginx2) - Standalone Machine-in-the-Middle (MitM) reverse proxy attack framework for setting up phishing pages capable of defeating most forms of 2FA security schemes.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvilginx2[0m[38;5;12m [39m[38;5;12m(https://github.com/kgretzky/evilginx2)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mStandalone[39m[38;5;12m [39m[38;5;12mMachine-in-the-Middle[39m[38;5;12m [39m[38;5;12m(MitM)[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m[38;5;12mproxy[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msetting[39m[38;5;12m [39m[38;5;12mup[39m[38;5;12m [39m[38;5;12mphishing[39m[38;5;12m [39m[38;5;12mpages[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mdefeating[39m[38;5;12m [39m[38;5;12mmost[39m[38;5;12m [39m[38;5;12mforms[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12m2FA[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mschemes.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFiercePhish[0m[38;5;12m (https://github.com/Raikia/FiercePhish) - Full-fledged phishing framework to manage all phishing engagements.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGophish[0m[38;5;12m (https://getgophish.com) - Open-source phishing framework.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKing Phisher[0m[38;5;12m (https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKing Phisher[0m
|
||||
[38;5;12m (https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mModlishka[0m[38;5;12m (https://github.com/drk1wi/Modlishka) - Flexible and powerful reverse proxy with real-time two-factor authentication.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReelPhish[0m[38;5;12m (https://github.com/fireeye/ReelPhish) - Real-time two-factor phishing tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineer Toolkit (SET)[0m
|
||||
[38;5;12m (https://github.com/trustedsec/social-engineer-toolkit) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial[0m[38;5;14m[1m [0m[38;5;14m[1mEngineer[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;14m[1m [0m[38;5;14m[1m(SET)[0m[38;5;12m [39m[38;5;12m(https://github.com/trustedsec/social-engineer-toolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12mpentesting[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mdesigned[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msocial[39m[38;5;12m [39m[38;5;12mengineering[39m[38;5;12m [39m[38;5;12mfeaturing[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mnumber[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcustom[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m
|
||||
[38;5;12mvectors[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12mbelievable[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12mquickly.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocialFish[0m[38;5;12m (https://github.com/UndeadSec/SocialFish) - Social media phishing framework that can run on an Android phone or in a Docker container.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mphishery[0m[38;5;12m (https://github.com/ryhanson/phishery) - TLS/SSL enabled Basic Auth credential harvester.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwifiphisher[0m[38;5;12m (https://github.com/sophron/wifiphisher) - Automated phishing attacks against WiFi networks.[39m
|
||||
@@ -832,28 +867,30 @@
|
||||
|
||||
[38;2;255;187;0m[4mVulnerability Databases[0m
|
||||
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBugtraq (BID)[0m[38;5;12m (http://www.securityfocus.com/bid/) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCISA[0m[38;5;14m[1m [0m[38;5;14m[1mKnown[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;14m[1m [0m[38;5;14m[1m(KEV)[0m[38;5;12m [39m[38;5;12m(https://www.cisa.gov/known-exploited-vulnerabilities-catalog)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mVulnerabilities[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12malready[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mAmerica's[39m[38;5;12m [39m[38;5;12mcyber[39m[38;5;12m [39m[38;5;12mdefense[39m[38;5;12m [39m[38;5;12magency,[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mCybersecurity[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mInfrastructure[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mAgency,[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mactively[39m[38;5;12m [39m[38;5;12mexploited.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBugtraq (BID)[0m
|
||||
[38;5;12m (http://www.securityfocus.com/bid/) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCISA[0m[38;5;14m[1m [0m[38;5;14m[1mKnown[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;14m[1m [0m[38;5;14m[1m(KEV)[0m[38;5;12m [39m[38;5;12m(https://www.cisa.gov/known-exploited-vulnerabilities-catalog)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mVulnerabilities[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12malready[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mAmerica's[39m[38;5;12m [39m[38;5;12mcyber[39m[38;5;12m [39m[38;5;12mdefense[39m[38;5;12m [39m
|
||||
[38;5;12magency,[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mCybersecurity[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mInfrastructure[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mAgency,[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mactively[39m[38;5;12m [39m[38;5;12mexploited.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCXSecurity[0m[38;5;12m (https://cxsecurity.com/) - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChina National Vulnerability Database (CNNVD)[0m[38;5;12m (http://www.cnnvd.org.cn/) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChina National Vulnerability Database (CNNVD)[0m
|
||||
[38;5;12m (http://www.cnnvd.org.cn/) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCommon Vulnerabilities and Exposures (CVE)[0m[38;5;12m (https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit-DB[0m[38;5;12m (https://www.exploit-db.com/) - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFull-Disclosure[0m[38;5;12m (http://seclists.org/fulldisclosure/) - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGitHub Advisories[0m[38;5;12m (https://github.com/advisories/) - Public vulnerability advisories published by or affecting codebases hosted by GitHub, including open source projects.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHPI-VDB[0m[38;5;12m (https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInj3ct0r[0m[38;5;12m (https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator. ([39m[38;5;14m[1mOnion service[0m[38;5;12m (http://mvfjfugdwgc5uwho.onion/).)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMicrosoft Security Advisories and Bulletins[0m
|
||||
[38;5;12m (https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMicrosoft[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mAdvisories[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mBulletins[0m[38;5;12m [39m[38;5;12m(https://docs.microsoft.com/en-us/security-updates/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mArchive[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mannouncements[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12madvisories[39m[38;5;12m [39m[38;5;12mimpacting[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12msoftware,[39m[38;5;12m [39m[38;5;12mpublished[39m[38;5;12m [39m
|
||||
[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mResponse[39m[38;5;12m [39m[38;5;12mCenter[39m[38;5;12m [39m[38;5;12m(MSRC).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMozilla Foundation Security Advisories[0m[38;5;12m (https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNational Vulnerability Database (NVD)[0m
|
||||
[38;5;12m (https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNational[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerability[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;14m[1m [0m[38;5;14m[1m(NVD)[0m[38;5;12m [39m[38;5;12m(https://nvd.nist.gov/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mUnited[39m[38;5;12m [39m[38;5;12mStates[39m[38;5;12m [39m[38;5;12mgovernment's[39m[38;5;12m [39m[38;5;12mNational[39m[38;5;12m [39m[38;5;12mVulnerability[39m[38;5;12m [39m[38;5;12mDatabase[39m[38;5;12m [39m[38;5;12mprovides[39m[38;5;12m [39m[38;5;12madditional[39m[38;5;12m [39m[38;5;12mmeta-data[39m[38;5;12m [39m[38;5;12m(CPE,[39m[38;5;12m [39m[38;5;12mCVSS[39m[38;5;12m [39m[38;5;12mscoring)[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mstandard[39m[38;5;12m [39m
|
||||
[38;5;12mCVE[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12malong[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfine-grained[39m[38;5;12m [39m[38;5;12msearch[39m[38;5;12m [39m[38;5;12mengine.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Source Vulnerabilities (OSV)[0m[38;5;12m (https://osv.dev/) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacket Storm[0m[38;5;12m (https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecuriTeam[0m[38;5;12m (http://www.securiteam.com/) - Independent source of software vulnerability information.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSnyk Vulnerability DB[0m[38;5;12m (https://snyk.io/vuln/) - Detailed information and remediation guidance for vulnerabilities known by Snyk.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUS-CERT[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerability[0m[38;5;14m[1m [0m[38;5;14m[1mNotes[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;12m [39m[38;5;12m(https://www.kb.cert.org/vuls/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSummaries,[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mdetails,[39m[38;5;12m [39m[38;5;12mremediation[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlists[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mvendors[39m[38;5;12m [39m[38;5;12maffected[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12maggregated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mUnited[39m
|
||||
[38;5;12mStates[39m[38;5;12m [39m[38;5;12mComputer[39m[38;5;12m [39m[38;5;12mEmergency[39m[38;5;12m [39m[38;5;12mResponse[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12m(US-CERT).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUS-CERT[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerability[0m[38;5;14m[1m [0m[38;5;14m[1mNotes[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;12m [39m[38;5;12m(https://www.kb.cert.org/vuls/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSummaries,[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mdetails,[39m[38;5;12m [39m[38;5;12mremediation[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlists[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mvendors[39m[38;5;12m [39m[38;5;12maffected[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m
|
||||
[38;5;12maggregated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mUnited[39m[38;5;12m [39m[38;5;12mStates[39m[38;5;12m [39m[38;5;12mComputer[39m[38;5;12m [39m[38;5;12mEmergency[39m[38;5;12m [39m[38;5;12mResponse[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12m(US-CERT).[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulDB[0m[38;5;12m (https://vuldb.com) - Independent vulnerability database with user community, exploit details, and additional meta data (e.g. CPE, CVSS, CWE)[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability Lab[0m[38;5;12m (https://www.vulnerability-lab.com/) - Open forum for security advisories organized by category of exploit target.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulners[0m[38;5;12m (https://vulners.com/) - Security database of software vulnerabilities.[39m
|
||||
@@ -866,7 +903,8 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOffensive Web Testing Framework (OWTF)[0m[38;5;12m (https://www.owasp.org/index.php/OWASP_OWTF) - Python-based framework for pentesting Web applications based on the OWASP Testing Guide.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRaccoon[0m[38;5;12m (https://github.com/evyatarmeged/Raccoon) - High performance offensive security tool for reconnaissance and vulnerability scanning.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWPSploit[0m[38;5;12m (https://github.com/espreto/wpsploit) - Exploit WordPress-powered websites with Metasploit.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mautochrome[0m[38;5;12m (https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/) - Chrome browser profile preconfigured with appropriate settings needed for web application testing.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mautochrome[0m
|
||||
[38;5;12m (https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/) - Chrome browser profile preconfigured with appropriate settings needed for web application testing.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbadtouch[0m[38;5;12m (https://github.com/kpcyrd/badtouch) - Scriptable network authentication cracker.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgobuster[0m[38;5;12m (https://github.com/OJ/gobuster) - Lean multipurpose brute force search/fuzzing tool for Web (and DNS) reconnaissance.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msslstrip2[0m[38;5;12m (https://github.com/LeonardoNve/sslstrip2) - SSLStrip version to defeat HSTS.[39m
|
||||
@@ -933,8 +971,8 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFibratus[0m[38;5;12m (https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInveigh[0m[38;5;12m (https://github.com/Kevin-Robertson/Inveigh) - Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/machine-in-the-middle tool.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLaZagne[0m[38;5;12m (https://github.com/AlessandroZ/LaZagne) - Credentials recovery project.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMailSniper[0m[38;5;12m [39m[38;5;12m(https://github.com/dafthack/MailSniper)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mModular[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msearching[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12memail[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m[38;5;12menvironment,[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mGlobal[39m[38;5;12m [39m[38;5;12mAddress[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mOutlook[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12m(OWA)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m
|
||||
[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mServices[39m[38;5;12m [39m[38;5;12m(EWS),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMailSniper[0m[38;5;12m [39m[38;5;12m(https://github.com/dafthack/MailSniper)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mModular[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msearching[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12memail[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m[38;5;12menvironment,[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mGlobal[39m[38;5;12m [39m[38;5;12mAddress[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mOutlook[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mAccess[39m
|
||||
[38;5;12m(OWA)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mServices[39m[38;5;12m [39m[38;5;12m(EWS),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerSploit[0m[38;5;12m (https://github.com/PowerShellMafia/PowerSploit) - PowerShell Post-Exploitation Framework.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRID_ENUM[0m[38;5;12m (https://github.com/trustedsec/ridenum) - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mResponder[0m[38;5;12m (https://github.com/SpiderLabs/Responder) - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner.[39m
|
||||
@@ -942,12 +980,13 @@
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuler[0m[38;5;12m (https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSCOMDecrypt[0m[38;5;12m (https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSysinternals Suite[0m[38;5;12m (https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - The Sysinternals Troubleshooting Utilities.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Credentials Editor[0m[38;5;12m (https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Credentials Editor[0m
|
||||
[38;5;12m (https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Exploit Suggester[0m[38;5;12m (https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmimikatz[0m[38;5;12m (http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mredsnarf[0m[38;5;12m (https://github.com/nccgroup/redsnarf) - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwePWNise[0m[38;5;12m [39m[38;5;12m(https://labs.mwrinfosecurity.com/tools/wepwnise/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGenerates[39m[38;5;12m [39m[38;5;12marchitecture[39m[38;5;12m [39m[38;5;12mindependent[39m[38;5;12m [39m[38;5;12mVBA[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mdocuments[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mtemplates[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomates[39m[38;5;12m [39m[38;5;12mbypassing[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mcontrol[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m
|
||||
[38;5;12mmitigation[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwePWNise[0m[38;5;12m [39m[38;5;12m(https://labs.mwrinfosecurity.com/tools/wepwnise/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGenerates[39m[38;5;12m [39m[38;5;12marchitecture[39m[38;5;12m [39m[38;5;12mindependent[39m[38;5;12m [39m[38;5;12mVBA[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mdocuments[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mtemplates[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomates[39m[38;5;12m [39m[38;5;12mbypassing[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m
|
||||
[38;5;12mcontrol[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m[38;5;12mmitigation[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWinPwn[0m[38;5;12m (https://github.com/SecureThisShit/WinPwn) - Internal penetration test script to perform local and domain reconnaissance, privilege escalation and exploitation.[39m
|
||||
|
||||
[38;2;255;187;0m[4mLicense[0m
|
||||
|
||||
Reference in New Issue
Block a user