958 lines
154 KiB
Plaintext
958 lines
154 KiB
Plaintext
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome Penetration Testing [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge-flat2.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||
|
||
[38;5;11m[1m▐[0m[38;5;12m [39m[38;5;12mA collection of awesome penetration testing and offensive cybersecurity resources.[39m
|
||
|
||
[38;5;14m[1mPenetration[0m[38;5;14m[1m [0m[38;5;14m[1mtesting[0m[38;5;12m [39m[38;5;12m(https://en.wikipedia.org/wiki/Penetration_test)[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpractice[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mlaunching[39m[38;5;12m [39m[38;5;12mauthorized,[39m[38;5;12m [39m[38;5;12msimulated[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12magainst[39m[38;5;12m [39m[38;5;12mcomputer[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mphysical[39m[38;5;12m [39m[38;5;12minfrastructure[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mexpose[39m[38;5;12m [39m[38;5;12mpotential[39m[38;5;12m [39m
|
||
[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mweaknesses[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m[38;5;12m [39m[38;5;12mShould[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mdiscover[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mvulnerability,[39m[38;5;12m [39m[38;5;12mplease[39m[38;5;12m [39m[38;5;12mfollow[39m[38;5;12m [39m[38;5;14m[1mthis[0m[38;5;14m[1m [0m[38;5;14m[1mguidance[0m[38;5;12m [39m[38;5;12m(https://kb.cert.org/vuls/guidance/)[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mreport[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mresponsibly.[39m
|
||
|
||
[38;5;12mYour[39m[38;5;12m [39m[38;5;12mcontributions[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12msuggestions[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mheartily♥[39m[38;5;12m [39m[38;5;12mwelcome.[39m[38;5;12m [39m[38;5;12m(✿◕‿◕).[39m[38;5;12m [39m[38;5;12mPlease[39m[38;5;12m [39m[38;5;12mcheck[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;14m[1mContributing[0m[38;5;14m[1m [0m[38;5;14m[1mGuidelines[0m[38;5;12m [39m[38;5;12m(CONTRIBUTING.md)[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mmore[39m[38;5;12m [39m[38;5;12mdetails.[39m[38;5;12m [39m[38;5;12mThis[39m[38;5;12m [39m[38;5;12mwork[39m[38;5;12m [39m[38;5;12mis[39m[38;5;12m [39m[38;5;12mlicensed[39m[38;5;12m [39m[38;5;12munder[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;14m[1mCreative[0m[38;5;14m[1m [0m[38;5;14m[1mCommons[0m[38;5;14m[1m [0m[38;5;14m[1mAttribution[0m[38;5;14m[1m [0m[38;5;14m[1m4.0[0m[38;5;14m[1m [0m
|
||
[38;5;14m[1mInternational[0m[38;5;14m[1m [0m[38;5;14m[1mLicense[0m[38;5;12m [39m[38;5;12m(https://creativecommons.org/licenses/by/4.0/).[39m
|
||
|
||
[38;5;14m[1mThis project is supported by Netsparker Web Application Security Scanner[0m
|
||
[38;5;12m (https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)[39m
|
||
|
||
[38;2;255;187;0m[4mContents[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Utilities[0m[38;5;12m (#android-utilities)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAnonymity Tools[0m[38;5;12m (#anonymity-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTor Tools[0m[38;5;12m (#tor-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAnti-virus Evasion Tools[0m[38;5;12m (#anti-virus-evasion-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBooks[0m[38;5;12m (#books)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMalware Analysis Books[0m[38;5;12m (#malware-analysis-books)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTF Tools[0m[38;5;12m (#ctf-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloud Platform Attack Tools[0m[38;5;12m (#cloud-platform-attack-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCollaboration Tools[0m[38;5;12m (#collaboration-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mConferences and Events[0m[38;5;12m (#conferences-and-events)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAsia[0m[38;5;12m (#asia)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEurope[0m[38;5;12m (#europe)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNorth America[0m[38;5;12m (#north-america)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSouth America[0m[38;5;12m (#south-america)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZealandia[0m[38;5;12m (#zealandia)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExfiltration Tools[0m[38;5;12m (#exfiltration-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Development Tools[0m[38;5;12m (#exploit-development-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFile Format Analysis Tools[0m[38;5;12m (#file-format-analysis-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGNU/Linux Utilities[0m[38;5;12m (#gnulinux-utilities)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHash Cracking Tools[0m[38;5;12m (#hash-cracking-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHex Editors[0m[38;5;12m (#hex-editors)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIndustrial Control and SCADA Systems[0m[38;5;12m (#industrial-control-and-scada-systems)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntentionally Vulnerable Systems[0m[38;5;12m (#intentionally-vulnerable-systems)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntentionally Vulnerable Systems as Docker Containers[0m[38;5;12m (#intentionally-vulnerable-systems-as-docker-containers)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLock Picking[0m[38;5;12m (#lock-picking)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmacOS Utilities[0m[38;5;12m (#macos-utilities)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMulti-paradigm Frameworks[0m[38;5;12m (#multi-paradigm-frameworks)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork Tools[0m[38;5;12m (#network-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDDoS Tools[0m[38;5;12m (#ddos-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork Reconnaissance Tools[0m[38;5;12m (#network-reconnaissance-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProtocol Analyzers and Sniffers[0m[38;5;12m (#protocol-analyzers-and-sniffers)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork Traffic Replay and Editing Tools[0m[38;5;12m (#network-traffic-replay-and-editing-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProxies and Machine-in-the-Middle (MITM) Tools[0m[38;5;12m (#proxies-and-machine-in-the-middle-mitm-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTransport Layer Security Tools[0m[38;5;12m (#transport-layer-security-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireless Network Tools[0m[38;5;12m (#wireless-network-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork Vulnerability Scanners[0m[38;5;12m (#network-vulnerability-scanners)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb Vulnerability Scanners[0m[38;5;12m (#web-vulnerability-scanners)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Sources Intelligence (OSINT)[0m[38;5;12m (#open-sources-intelligence-osint)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mData broker and search engine services[0m[38;5;12m (#data-broker-and-search-engine-services)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDorking tools[0m[38;5;12m (#dorking-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEmail search and analysis tools[0m[38;5;12m (#email-search-and-analysis-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetadata harvesting and analysis[0m[38;5;12m (#metadata-harvesting-and-analysis)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork device discovery tools[0m[38;5;12m (#network-device-discovery-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOSINT Online Resources[0m[38;5;12m (#osint-online-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSource code repository searching tools[0m[38;5;12m (#source-code-repository-searching-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb application and resource analysis tools[0m[38;5;12m (#web-application-and-resource-analysis-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Resources[0m[38;5;12m (#online-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Code Samples and Examples[0m[38;5;12m (#online-code-samples-and-examples)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Exploit Development Resources[0m[38;5;12m (#online-exploit-development-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Lock Picking Resources[0m[38;5;12m (#online-lock-picking-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Operating Systems Resources[0m[38;5;12m (#online-operating-systems-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnline Penetration Testing Resources[0m[38;5;12m (#online-penetration-testing-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOther Lists Online[0m[38;5;12m (#other-lists-online)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Report Templates[0m[38;5;12m (#penetration-testing-report-templates)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOperating System Distributions[0m[38;5;12m (#operating-system-distributions)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPeriodicals[0m[38;5;12m (#periodicals)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPhysical Access Tools[0m[38;5;12m (#physical-access-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPrivilege Escalation Tools[0m[38;5;12m (#privilege-escalation-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPassword Spraying Tools[0m[38;5;12m (#password-spraying-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Engineering[0m[38;5;12m (#reverse-engineering)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Engineering Books[0m[38;5;12m (#reverse-engineering-books)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Engineering Tools[0m[38;5;12m (#reverse-engineering-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity Education Courses[0m[38;5;12m (#security-education-courses)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShellcoding Guides and Tutorials[0m[38;5;12m (#exploit-development-online-resources)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSide-channel Tools[0m[38;5;12m (#side-channel-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering[0m[38;5;12m (#social-engineering)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering Books[0m[38;5;12m (#social-engineering-books)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering Online Resources[0m[38;5;12m (#social-engineering-online-resources)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering Tools[0m[38;5;12m (#social-engineering-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mStatic Analyzers[0m[38;5;12m (#static-analyzers)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSteganography Tools[0m[38;5;12m (#steganography-tools)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability Databases[0m[38;5;12m (#vulnerability-databases)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb Exploitation[0m[38;5;12m (#web-exploitation)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntercepting Web proxies[0m[38;5;12m (#intercepting-web-proxies)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb file inclusion tools[0m[38;5;12m (#web-file-inclusion-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb injection tools[0m[38;5;12m (#web-injection-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb path discovery and bruteforcing tools[0m[38;5;12m (#web-path-discovery-and-bruteforcing-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb shells and C2 frameworks[0m[38;5;12m (#web-shells-and-c2-frameworks)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb-accessible source code ripping tools[0m[38;5;12m (#web-accessible-source-code-ripping-tools)[39m
|
||
[38;5;12m [39m[38;5;12m [39m[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb Exploitation Books[0m[38;5;12m (#web-exploitation-books)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Utilities[0m[38;5;12m (#windows-utilities)[39m
|
||
|
||
[38;2;255;187;0m[4mAndroid Utilities[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcSploit[0m[38;5;12m (https://www.csploit.org/) - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFing[0m[38;5;12m (https://www.fing.com/products/fing-app/) - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.[39m
|
||
|
||
[38;2;255;187;0m[4mAnonymity Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mI2P[0m[38;5;12m (https://geti2p.net/) - The Invisible Internet Project.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetadata Anonymization Toolkit (MAT)[0m[38;5;12m (https://0xacab.org/jvoisin/mat2) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhat Every Browser Knows About You[0m[38;5;12m (http://webkay.robinlinus.com/) - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.[39m
|
||
|
||
[38;2;255;187;0m[4mTor Tools[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-tor[0m[38;5;12m (https://github.com/ajvb/awesome-tor).[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNipe[0m[38;5;12m (https://github.com/GouveaHeitor/nipe) - Script to redirect all traffic from the machine to the Tor network.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOnionScan[0m[38;5;12m (https://onionscan.org/) - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTails[0m[38;5;12m (https://tails.boum.org/) - Live operating system aiming to preserve your privacy and anonymity.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTor[0m[38;5;12m (https://www.torproject.org/) - Free software and onion routed overlay network that helps you defend against traffic analysis.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdos-over-tor[0m[38;5;12m (https://github.com/skizap/dos-over-tor) - Proof of concept denial of service over Tor stress test tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkalitorify[0m[38;5;12m (https://github.com/brainfuckSec/kalitorify) - Transparent proxy through Tor for Kali Linux OS.[39m
|
||
|
||
[38;2;255;187;0m[4mAnti-virus Evasion Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAntiVirus Evasion Tool (AVET)[0m[38;5;12m (https://github.com/govolution/avet) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCarbonCopy[0m[38;5;12m (https://github.com/paranoidninja/CarbonCopy) - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHyperion[0m[38;5;12m (http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE [39m[48;5;235m[38;5;249m.exe[49m[39m[38;5;12ms").[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShellter[0m[38;5;12m (https://www.shellterproject.com/) - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUniByAv[0m[38;5;12m (https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVeil[0m[38;5;12m (https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpeCloakCapstone[0m[38;5;12m (https://github.com/v-p-b/peCloakCapstone) - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.[39m
|
||
|
||
[38;2;255;187;0m[4mBooks[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mDEF CON Suggested Reading[0m[38;5;12m (https://www.defcon.org/html/links/book-list.html).[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Penetration Testing by Wil Allsopp, 2017[0m[38;5;12m (https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012[0m[38;5;12m (http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAdvanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014[0m[38;5;12m (http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Hacker's Handbook by Joshua J. Drake et al., 2014[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017[0m[38;5;12m (https://www.amazon.de/Blue-Team-Field-Manual-BTFM/dp/154101636X)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlack Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014[0m[38;5;12m (http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBug Hunter's Diary by Tobias Klein, 2011[0m[38;5;12m (https://nostarch.com/bughunter)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCar Hacker's Handbook by Craig Smith, 2016[0m[38;5;12m (https://nostarch.com/carhacking)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEffective Software Testing, 2021[0m[38;5;12m (https://www.manning.com/books/effective-software-testing)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007[0m[38;5;12m (http://www.fuzzing.org/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit: The Penetration Tester's Guide by David Kennedy et al., 2011[0m[38;5;12m (https://nostarch.com/metasploit)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014[0m[38;5;12m (https://nostarch.com/pentesting)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing: Procedures & Methodologies by EC-Council, 2010[0m[38;5;12m (http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProfessional Penetration Testing by Thomas Wilhelm, 2013[0m[38;5;12m (https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRTFM: Red Team Field Manual by Ben Clark, 2014[0m[38;5;12m (http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Art of Exploitation by Jon Erickson, 2008[0m[38;5;12m (https://nostarch.com/hacking2.htm)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Art of Network Penetration Testing, 2020[0m[38;5;12m (https://www.manning.com/books/the-art-of-network-penetration-testing)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013[0m[38;5;12m (https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Database Hacker's Handbook, David Litchfield et al., 2005[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Hacker Playbook by Peter Kim, 2014[0m[38;5;12m (http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Mobile Application Hacker's Handbook by Dominic Chell et al., 2015[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUnauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010[0m[38;5;12m (http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mViolent Python by TJ O'Connor, 2012[0m[38;5;12m (https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1miOS Hacker's Handbook by Charlie Miller et al., 2012[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html)[39m
|
||
|
||
[38;2;255;187;0m[4mMalware Analysis Books[0m
|
||
|
||
[38;5;12mSee [39m[38;5;14m[1mawesome-malware-analysis § Books[0m[38;5;12m (https://github.com/rshipp/awesome-malware-analysis#books).[39m
|
||
|
||
[38;2;255;187;0m[4mCTF Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTF Field Guide[0m[38;5;12m (https://trailofbits.github.io/ctf/) - Everything you need to win your next CTF competition.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCiphey[0m[38;5;12m (https://github.com/ciphey/ciphey) - Automated decryption tool using artificial intelligence and natural language processing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRsaCtfTool[0m[38;5;12m (https://github.com/Ganapati/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mctf-tools[0m[38;5;12m (https://github.com/zardus/ctf-tools) - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mshellpop[0m[38;5;12m (https://github.com/0x00-0x00/shellpop) - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests.[39m
|
||
|
||
[38;2;255;187;0m[4mCloud Platform Attack Tools[0m
|
||
|
||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mHackingThe.cloud[0m[48;2;30;30;40m[38;5;13m[3m (https://hackingthe.cloud/)[0m[38;5;12m.[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloud Container Attack Tool (CCAT)[0m[38;5;12m (https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/) - Tool for testing security of container environments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudHunter[0m[38;5;12m (https://github.com/belane/CloudHunter) - Looks for AWS, Azure and Google cloud storage buckets and lists permissions for vulnerable buckets.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudsplaining[0m[38;5;12m (https://cloudsplaining.readthedocs.io/) - Identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEndgame[0m[38;5;12m (https://endgame.readthedocs.io/) - AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGCPBucketBrute[0m[38;5;12m (https://github.com/RhinoSecurityLabs/GCPBucketBrute) - Script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.[39m
|
||
|
||
[38;2;255;187;0m[4mCollaboration Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDradis[0m[38;5;12m (https://dradisframework.com) - Open-source reporting and collaboration tool for IT security professionals.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHexway Hive[0m[38;5;12m (https://hexway.io/hive/) - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLair[0m[38;5;12m (https://github.com/lair-framework/lair/wiki) - Reactive attack collaboration framework and web application built with meteor.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Collaboration Framework (PCF)[0m[38;5;12m (https://gitlab.com/invuls/pentest-projects/pcf) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReconmap[0m[38;5;12m (https://reconmap.com/) - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRedELK[0m[38;5;12m (https://github.com/outflanknl/RedELK) - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.[39m
|
||
|
||
[38;2;255;187;0m[4mConferences and Events[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBSides[0m[38;5;12m (http://www.securitybsides.com/) - Framework for organising and holding security conferences.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTFTime.org[0m[38;5;12m (https://ctftime.org/) - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.[39m
|
||
|
||
[38;2;255;187;0m[4mAsia[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHITB[0m[38;5;12m (https://conference.hitb.org/) - Deep-knowledge security conference held in Malaysia and The Netherlands.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHITCON[0m[38;5;12m (https://hitcon.org/) - Hacks In Taiwan Conference held in Taiwan.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNullcon[0m[38;5;12m (http://nullcon.net/website/) - Annual conference in Delhi and Goa, India.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSECUINSIDE[0m[38;5;12m (http://secuinside.com) - Security Conference in Seoul.[39m
|
||
|
||
[38;2;255;187;0m[4mEurope[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1m44Con[0m[38;5;12m (https://44con.com/) - Annual Security Conference held in London.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBalCCon[0m[38;5;12m (https://www.balccon.org) - Balkan Computer Congress, annually held in Novi Sad, Serbia.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBruCON[0m[38;5;12m (http://brucon.org) - Annual security conference in Belgium.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCCC[0m[38;5;12m (https://events.ccc.de/congress/) - Annual meeting of the international hacker scene in Germany.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDeepSec[0m[38;5;12m (https://deepsec.net/) - Security Conference in Vienna, Austria.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDefCamp[0m[38;5;12m (http://def.camp/) - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFSec[0m[38;5;12m (http://fsec.foi.hr) - FSec - Croatian Information Security Gathering in Varaždin, Croatia.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHack.lu[0m[38;5;12m (https://hack.lu/) - Annual conference held in Luxembourg.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInfosecurity Europe[0m[38;5;12m (http://www.infosecurityeurope.com/) - Europe's number one information security event, held in London, UK.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSteelCon[0m[38;5;12m (https://www.steelcon.info/) - Security conference in Sheffield UK.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSwiss Cyber Storm[0m[38;5;12m (https://www.swisscyberstorm.com/) - Annual security conference in Lucerne, Switzerland.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTroopers[0m[38;5;12m (https://www.troopers.de) - Annual international IT Security event with workshops held in Heidelberg, Germany.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneyCON[0m[38;5;12m (https://honeycon.eu/) - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.[39m
|
||
|
||
[38;2;255;187;0m[4mNorth America[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAppSecUSA[0m[38;5;12m (https://appsecusa.org/) - Annual conference organized by OWASP.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlack Hat[0m[38;5;12m (http://www.blackhat.com/) - Annual security conference in Las Vegas.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCarolinaCon[0m[38;5;12m (https://carolinacon.org/) - Infosec conference, held annually in North Carolina.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDEF CON[0m[38;5;12m (https://www.defcon.org/) - Annual hacker convention in Las Vegas.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDerbyCon[0m[38;5;12m (https://www.derbycon.com/) - Annual hacker conference based in Louisville.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackers Next Door[0m[38;5;12m (https://hnd.techlearningcollective.com/) - Cybersecurity and social technology conference held in New York City.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackers On Planet Earth (HOPE)[0m[38;5;12m (https://hope.net/) - Semi-annual conference held in New York City.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackfest[0m[38;5;12m (https://hackfest.ca) - Largest hacking conference in Canada.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLayerOne[0m[38;5;12m (http://www.layerone.org/) - Annual US security conference held every spring in Los Angeles.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNational Cyber Summit[0m[38;5;12m (https://www.nationalcybersummit.com/) - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPhreakNIC[0m[38;5;12m (http://phreaknic.info/) - Technology conference held annually in middle Tennessee.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRSA Conference USA[0m[38;5;12m (https://www.rsaconference.com/) - Annual security conference in San Francisco, California, USA.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShmooCon[0m[38;5;12m (http://shmoocon.org/) - Annual US East coast hacker convention.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSkyDogCon[0m[38;5;12m (http://www.skydogcon.com/) - Technology conference in Nashville.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSummerCon[0m[38;5;12m (https://www.summercon.org/) - One of the oldest hacker conventions in America, held during Summer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThotCon[0m[38;5;12m (http://thotcon.org/) - Annual US hacker conference held in Chicago.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVirus Bulletin Conference[0m[38;5;12m (https://www.virusbulletin.com/conference/index) - Annual conference going to be held in Denver, USA for 2016.[39m
|
||
|
||
[38;2;255;187;0m[4mSouth America[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEkoparty[0m[38;5;12m (http://www.ekoparty.org) - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHackers to Hackers Conference (H2HC)[0m[38;5;12m (https://www.h2hc.com.br/) - Oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.[39m
|
||
|
||
[38;2;255;187;0m[4mZealandia[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCHCon[0m[38;5;12m (https://chcon.nz) - Christchurch Hacker Con, Only South Island of New Zealand hacker con.[39m
|
||
|
||
[38;2;255;187;0m[4mExfiltration Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDET[0m[38;5;12m (https://github.com/sensepost/DET) - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIodine[0m[38;5;12m (https://code.kryo.se/iodine/) - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTrevorC2[0m[38;5;12m (https://github.com/trustedsec/trevorc2) - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnscat2[0m[38;5;12m (https://github.com/iagox86/dnscat2) - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwnat[0m[38;5;12m (https://github.com/samyk/pwnat) - Punches holes in firewalls and NATs.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtgcd[0m[38;5;12m (http://tgcd.sourceforge.net/) - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mQueenSono[0m[38;5;12m (https://github.com/ariary/QueenSono) - Client/Server Binaries for data exfiltration with ICMP. Useful in a network where ICMP protocol is less monitored than others (which is a common case).[39m
|
||
|
||
[38;2;255;187;0m[4mExploit Development Tools[0m
|
||
|
||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mReverse Engineering Tools[0m[48;2;30;30;40m[38;5;13m[3m (#reverse-engineering-tools)[0m[38;5;12m.[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mH26Forge[0m[38;5;12m (https://github.com/h26forge/h26forge) - Domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMagic[0m[38;5;14m[1m [0m[38;5;14m[1mUnicorn[0m[38;5;12m [39m[38;5;12m(https://github.com/trustedsec/unicorn)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mShellcode[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mnumerous[39m[38;5;12m [39m[38;5;12mattack[39m[38;5;12m [39m[38;5;12mvectors,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mmacros,[39m[38;5;12m [39m[38;5;12mPowerShell,[39m[38;5;12m [39m[38;5;12mHTML[39m[38;5;12m [39m[38;5;12mapplications[39m[38;5;12m [39m[38;5;12m(HTA),[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[48;5;235m[38;5;249mcertutil[49m[39m[38;5;12m [39m[38;5;12m(using[39m[38;5;12m [39m[38;5;12mfake[39m[38;5;12m [39m
|
||
[38;5;12mcertificates).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPwntools[0m[38;5;12m (https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWordpress Exploit Framework[0m
|
||
[38;5;12m (https://github.com/rastating/wordpress-exploit-framework) - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpeda[0m[38;5;12m (https://github.com/longld/peda) - Python Exploit Development Assistance for GDB.[39m
|
||
|
||
[38;2;255;187;0m[4mFile Format Analysis Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExifTool[0m[38;5;12m (https://www.sno.phy.queensu.ca/~phil/exiftool/) - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHachoir[0m[38;5;12m (https://hachoir.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKaitai Struct[0m[38;5;12m (http://kaitai.io/) - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpeepdf[0m[38;5;12m (https://eternal-todo.com/tools/peepdf-pdf-analysis-tool) - Python tool to explore PDF files in order to find out if the file can be harmful or not.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVeles[0m[38;5;12m (https://codisec.com/veles/) - Binary data visualization and analysis tool.[39m
|
||
|
||
[38;2;255;187;0m[4mGNU/Linux Utilities[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHwacha[0m[38;5;12m (https://github.com/n00py/Hwacha) - Post-exploitation tool to quickly execute payloads via SSH on one or more Linux systems simultaneously.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinux Exploit Suggester[0m[38;5;12m (https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLynis[0m[38;5;12m (https://cisofy.com/lynis/) - Auditing tool for UNIX-based systems.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mchecksec.sh[0m[38;5;12m (https://www.trapkit.de/tools/checksec.html) - Shell script designed to test what standard Linux OS and PaX security features are being used.[39m
|
||
|
||
[38;2;255;187;0m[4mHash Cracking Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBruteForce Wallet[0m[38;5;12m (https://github.com/glv2/bruteforce-wallet) - Find the password of an encrypted wallet file (i.e. [39m[48;5;235m[38;5;249mwallet.dat[49m[39m[38;5;12m).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCeWL[0m[38;5;12m (https://digi.ninja/projects/cewl.php) - Generates custom wordlists by spidering a target's website and collecting unique words.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mduplicut[0m[38;5;12m (https://github.com/nil0x42/duplicut) - Quickly remove duplicates, without changing the order, and without getting OOM on huge wordlists.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGoCrack[0m[38;5;12m (https://github.com/fireeye/gocrack) - Management Web frontend for distributed password cracking sessions using hashcat (or other supported tools) written in Go.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHashcat[0m[38;5;12m (http://hashcat.net/hashcat/) - The more fast hash cracker.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mhate_crack[0m[38;5;12m (https://github.com/trustedsec/hate_crack) - Tool for automating cracking methodologies through Hashcat.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJWT Cracker[0m[38;5;12m (https://github.com/lmammino/jwt-cracker) - Simple HS256 JSON Web Token (JWT) token brute force cracker.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJohn the Ripper[0m[38;5;12m (http://www.openwall.com/john/) - Fast password cracker.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRar Crack[0m[38;5;12m (http://rarcrack.sourceforge.net) - RAR bruteforce cracker.[39m
|
||
|
||
[38;2;255;187;0m[4mHex Editors[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBless[0m[38;5;12m (https://github.com/bwrsandman/Bless) - High quality, full featured, cross-platform graphical hex editor written in Gtk#.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFrhed[0m[38;5;12m (http://frhed.sourceforge.net/) - Binary file editor for Windows.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHex Fiend[0m[38;5;12m (http://ridiculousfish.com/hexfiend/) - Fast, open source, hex editor for macOS with support for viewing binary diffs.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHexEdit.js[0m[38;5;12m (https://hexed.it) - Browser-based hex editing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHexinator[0m[38;5;12m (https://hexinator.com/) - World's finest (proprietary, commercial) Hex Editor.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mhexedit[0m[38;5;12m (https://github.com/pixel/hexedit) - Simple, fast, console-based hex editor.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwxHexEditor[0m[38;5;12m (http://www.wxhexeditor.org/) - Free GUI hex editor for GNU/Linux, macOS, and Windows.[39m
|
||
|
||
[38;2;255;187;0m[4mIndustrial Control and SCADA Systems[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-industrial-control-system-security[0m[38;5;12m (https://github.com/hslatman/awesome-industrial-control-system-security).[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIndustrial Exploitation Framework (ISF)[0m
|
||
[38;5;12m (https://github.com/dark-lbp/isf) - Metasploit-like exploit framework based on routersploit designed to target Industrial Control Systems (ICS), SCADA devices, PLC firmware, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1ms7scan[0m[38;5;12m (https://github.com/klsecservices/s7scan) - Scanner for enumerating Siemens S7 PLCs on a TCP/IP or LLC network.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpalOPC[0m[38;5;12m (https://opalopc.com/) - Commercial OPC UA vulnerability assessment tool, sold by Molemmat.[39m
|
||
|
||
[38;2;255;187;0m[4mIntentionally Vulnerable Systems[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-vulnerable[0m[38;5;12m (https://github.com/kaiiyer/awesome-vulnerable).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest-Ground[0m[38;5;12m (https://pentest-ground.com/).[39m
|
||
|
||
[38;2;255;187;0m[4mIntentionally Vulnerable Systems as Docker Containers[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDamn Vulnerable Web Application (DVWA)[0m[38;5;12m (https://hub.docker.com/r/citizenstig/dvwa/) - [39m[48;5;235m[38;5;249mdocker pull citizenstig/dvwa[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Juice Shop[0m[38;5;12m (https://github.com/bkimminich/juice-shop#docker-container--) - [39m[48;5;235m[38;5;249mdocker pull bkimminich/juice-shop[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Mutillidae II Web Pen-Test Practice Application[0m[38;5;12m (https://hub.docker.com/r/citizenstig/nowasp/) - [39m[48;5;235m[38;5;249mdocker pull citizenstig/nowasp[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP NodeGoat[0m[38;5;12m (https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker) - [39m[48;5;235m[38;5;249mdocker-compose build && docker-compose up[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Security Shepherd[0m[38;5;12m (https://hub.docker.com/r/ismisepaul/securityshepherd/) - [39m[48;5;235m[38;5;249mdocker pull ismisepaul/securityshepherd[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP WebGoat Project 7.1 docker image[0m[38;5;12m (https://hub.docker.com/r/webgoat/webgoat-7.1/) - [39m[48;5;235m[38;5;249mdocker pull webgoat/webgoat-7.1[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP WebGoat Project 8.0 docker image[0m[38;5;12m (https://hub.docker.com/r/webgoat/webgoat-8.0/) - [39m[48;5;235m[38;5;249mdocker pull webgoat/webgoat-8.0[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability as a service: Heartbleed[0m[38;5;12m (https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/) - [39m[48;5;235m[38;5;249mdocker pull hmlio/vaas-cve-2014-0160[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability as a service: SambaCry[0m[38;5;12m (https://hub.docker.com/r/vulnerables/cve-2017-7494/) - [39m[48;5;235m[38;5;249mdocker pull vulnerables/cve-2017-7494[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability as a service: Shellshock[0m[38;5;12m (https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/) - [39m[48;5;235m[38;5;249mdocker pull hmlio/vaas-cve-2014-6271[49m[39m[38;5;12m.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerable WordPress Installation[0m[38;5;12m (https://hub.docker.com/r/wpscanteam/vulnerablewordpress/) - [39m[48;5;235m[38;5;249mdocker pull wpscanteam/vulnerablewordpress[49m[39m[38;5;12m.[39m
|
||
|
||
[38;2;255;187;0m[4mLock Picking[0m
|
||
|
||
[38;5;12mSee [39m[38;5;14m[1mawesome-lockpicking[0m[38;5;12m (https://github.com/fabacab/awesome-lockpicking).[39m
|
||
|
||
[38;2;255;187;0m[4mmacOS Utilities[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBella[0m[38;5;12m (https://github.com/kdaoudieh/Bella) - Pure Python post-exploitation data mining and remote administration tool for macOS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvilOSX[0m[38;5;12m (https://github.com/Marten4n6/EvilOSX) - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.[39m
|
||
|
||
[38;2;255;187;0m[4mMulti-paradigm Frameworks[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mArmitage[0m[38;5;12m (http://fastandeasyhacking.com/) - Java-based GUI front-end for the Metasploit Framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAutoSploit[0m
|
||
[38;5;12m (https://github.com/NullArray/AutoSploit) - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDecker[0m[38;5;12m [39m[38;5;12m(https://github.com/stevenaldinger/decker)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPenetration[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12morchestration[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomation[39m[38;5;12m [39m[38;5;12mframework,[39m[38;5;12m [39m[38;5;12mwhich[39m[38;5;12m [39m[38;5;12mallows[39m[38;5;12m [39m[38;5;12mwriting[39m[38;5;12m [39m[38;5;12mdeclarative,[39m[38;5;12m [39m[38;5;12mreusable[39m[38;5;12m [39m[38;5;12mconfigurations[39m[38;5;12m [39m[38;5;12mcapable[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mingesting[39m[38;5;12m [39m[38;5;12mvariables[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||
[38;5;12musing[39m[38;5;12m [39m[38;5;12moutputs[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12mrun[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m[38;5;12minputs[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mothers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFaraday[0m[38;5;12m (https://github.com/infobyte/faraday) - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit[0m[38;5;12m (https://www.metasploit.com/) - Software for offensive security teams to help verify vulnerabilities and manage security assessments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPupy[0m[38;5;12m (https://github.com/n1nj4sec/pupy) - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.[39m
|
||
|
||
[38;2;255;187;0m[4mNetwork Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCrackMapExec[0m[38;5;12m (https://github.com/byt3bl33d3r/CrackMapExec) - Swiss army knife for pentesting networks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIKEForce[0m[38;5;12m (https://github.com/SpiderLabs/ikeforce) - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntercepter-NG[0m[38;5;12m (http://sniff.su/) - Multifunctional network toolkit.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLegion[0m[38;5;12m (https://github.com/GoVanguard/legion) - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork-Tools.com[0m[38;5;12m (http://network-tools.com/) - Website offering an interface to numerous basic network utilities like [39m[48;5;235m[38;5;249mping[49m[39m[38;5;12m, [39m[48;5;235m[38;5;249mtraceroute[49m[39m[38;5;12m, [39m[48;5;235m[38;5;249mwhois[49m[39m[38;5;12m, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNcrack[0m
|
||
[38;5;12m (https://nmap.org/ncrack/) - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPraeda[0m[38;5;12m (http://h.foofus.net/?page_id=218) - Automated multi-function printer data harvester for gathering usable data during security assessments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPrinter Exploitation Toolkit (PRET)[0m
|
||
[38;5;12m (https://github.com/RUB-NDS/PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSPARTA[0m[38;5;12m (https://sparta.secforce.com/) - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSigPloit[0m
|
||
[38;5;12m (https://github.com/SigPloiter/SigPloit) - Signaling security testing framework dedicated to telecom security for researching vulnerabilites in the signaling protocols used in mobile (cellular phone) operators.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSmart Install Exploitation Tool (SIET)[0m[38;5;12m (https://github.com/Sab0tag3d/SIET) - Scripts for identifying Cisco Smart Install-enabled switches on a network and then manipulating them.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTHC Hydra[0m[38;5;12m (https://github.com/vanhauser-thc/thc-hydra) - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTsunami[0m[38;5;12m (https://github.com/google/tsunami-security-scanner) - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZarp[0m[38;5;12m (https://github.com/hatRiot/zarp) - Network attack tool centered around the exploitation of local networks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnstwist[0m[38;5;12m (https://github.com/elceef/dnstwist) - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdsniff[0m[38;5;12m (https://www.monkey.org/~dugsong/dsniff/) - Collection of tools for network auditing and pentesting.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mimpacket[0m[38;5;12m (https://github.com/CoreSecurity/impacket) - Collection of Python classes for working with network protocols.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpivotsuite[0m[38;5;12m (https://github.com/RedTeamOperations/PivotSuite) - Portable, platform independent and powerful network pivoting toolkit.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mroutersploit[0m[38;5;12m (https://github.com/reverse-shell/routersploit) - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mrshijack[0m[38;5;12m (https://github.com/kpcyrd/rshijack) - TCP connection hijacker, Rust rewrite of [39m[48;5;235m[38;5;249mshijack[49m[39m[38;5;12m.[39m
|
||
|
||
[38;2;255;187;0m[4mDDoS Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAnevicon[0m[38;5;12m (https://github.com/rozgo/anevicon) - Powerful UDP-based load generator, written in Rust.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mD(HE)ater[0m[38;5;12m (https://github.com/Balasys/dheater) - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHOIC[0m[38;5;12m (https://sourceforge.net/projects/high-orbit-ion-cannon/) - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLow Orbit Ion Canon (LOIC)[0m[38;5;12m (https://github.com/NewEraCracker/LOIC) - Open source network stress tool written for Windows.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMemcrashed[0m[38;5;12m (https://github.com/649/Memcrashed-DDoS-Exploit) - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSlowLoris[0m[38;5;12m (https://github.com/gkbrk/slowloris) - DoS tool that uses low bandwidth on the attacking side.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mT50[0m[38;5;12m (https://gitlab.com/fredericopissarra/t50/) - Faster network stress tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUFONet[0m[38;5;12m [39m[38;5;12m(https://github.com/epsylon/ufonet)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAbuses[39m[38;5;12m [39m[38;5;12mOSI[39m[38;5;12m [39m[38;5;12mlayer[39m[38;5;12m [39m[38;5;12m7[39m[38;5;12m [39m[38;5;12mHTTP[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcreate/manage[39m[38;5;12m [39m[38;5;12m'zombies'[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mconduct[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mattacks[39m[38;5;12m [39m[38;5;12musing;[39m[38;5;12m [39m[48;5;235m[38;5;249mGET[49m[39m[38;5;12m/[39m[48;5;235m[38;5;249mPOST[49m[39m[38;5;12m,[39m[38;5;12m [39m[38;5;12mmultithreading,[39m[38;5;12m [39m[38;5;12mproxies,[39m[38;5;12m [39m[38;5;12morigin[39m[38;5;12m [39m[38;5;12mspoofing[39m[38;5;12m [39m[38;5;12mmethods,[39m[38;5;12m [39m[38;5;12mcache[39m[38;5;12m [39m[38;5;12mevasion[39m
|
||
[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12metc.[39m
|
||
|
||
[38;2;255;187;0m[4mNetwork Reconnaissance Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mACLight[0m[38;5;12m (https://github.com/cyberark/ACLight) - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAQUATONE[0m[38;5;12m (https://github.com/michenriksen/aquatone) - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloudFail[0m[38;5;12m (https://github.com/m0rtem/CloudFail) - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDNSDumpster[0m[38;5;12m (https://dnsdumpster.com/) - Online DNS recon and search service.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMass Scan[0m[38;5;12m (https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Amass[0m[38;5;12m (https://github.com/OWASP/Amass) - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mScanCannon[0m[38;5;12m [39m[38;5;12m(https://github.com/johnnyxmas/ScanCannon)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPOSIX-compliant[39m[38;5;12m [39m[38;5;12mBASH[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12menumerate[39m[38;5;12m [39m[38;5;12mlarge[39m[38;5;12m [39m[38;5;12mnetworks[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mcalling[39m[38;5;12m [39m[48;5;235m[38;5;249mmasscan[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mquickly[39m[38;5;12m [39m[38;5;12midentify[39m[38;5;12m [39m[38;5;12mopen[39m[38;5;12m [39m[38;5;12mports[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[48;5;235m[38;5;249mnmap[49m[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mgain[39m[38;5;12m [39m[38;5;12mdetails[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m
|
||
[38;5;12msystems/services[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthose[39m[38;5;12m [39m[38;5;12mports.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXRay[0m[38;5;12m (https://github.com/evilsocket/xray) - Network (sub)domain discovery and reconnaissance automation tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsenum[0m[38;5;12m [39m[38;5;12m(https://github.com/fwaeytens/dnsenum/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPerl[39m[38;5;12m [39m[38;5;12mscript[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12menumerates[39m[38;5;12m [39m[38;5;12mDNS[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mdomain,[39m[38;5;12m [39m[38;5;12mattempts[39m[38;5;12m [39m[38;5;12mzone[39m[38;5;12m [39m[38;5;12mtransfers,[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mbrute[39m[38;5;12m [39m[38;5;12mforce[39m[38;5;12m [39m[38;5;12mdictionary[39m[38;5;12m [39m[38;5;12mstyle[39m[38;5;12m [39m[38;5;12mattack,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mthen[39m[38;5;12m [39m[38;5;12mperforms[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m
|
||
[38;5;12mlook-ups[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mresults.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsmap[0m[38;5;12m (https://github.com/makefu/dnsmap/) - Passive DNS network mapper.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnsrecon[0m[38;5;12m (https://github.com/darkoperator/dnsrecon/) - DNS enumeration script.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnstracer[0m[38;5;12m (http://www.mavetju.org/unix/dnstracer.php) - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfierce[0m[38;5;12m (https://github.com/mschwager/fierce) - Python3 port of the original [39m[48;5;235m[38;5;249mfierce.pl[49m[39m[38;5;12m DNS reconnaissance tool for locating non-contiguous IP space.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnetdiscover[0m[38;5;12m (https://github.com/netdiscover-scanner/netdiscover) - Network address discovery scanner, based on ARP sweeps, developed mainly for those wireless networks without a DHCP server.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnmap[0m[38;5;12m (https://nmap.org/) - Free security scanner for network exploration & security audits.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpassivedns-client[0m[38;5;12m (https://github.com/chrislee35/passivedns-client) - Library and query tool for querying several passive DNS providers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpassivedns[0m[38;5;12m (https://github.com/gamelinux/passivedns) - Network sniffer that logs all DNS server replies for use in a passive DNS setup.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRustScan[0m[38;5;12m (https://github.com/rustscan/rustscan) - Lightweight and quick open-source port scanner designed to automatically pipe open ports into Nmap.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mscanless[0m[38;5;12m (https://github.com/vesche/scanless) - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msmbmap[0m[38;5;12m (https://github.com/ShawnDEvans/smbmap) - Handy SMB enumeration tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msubbrute[0m[38;5;12m (https://github.com/TheRook/subbrute) - DNS meta-query spider that enumerates DNS records, and subdomains.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mzmap[0m[38;5;12m (https://zmap.io/) - Open source network scanner that enables researchers to easily perform Internet-wide network studies.[39m
|
||
|
||
[38;2;255;187;0m[4mProtocol Analyzers and Sniffers[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-pcaptools[0m[38;5;12m (https://github.com/caesar0301/awesome-pcaptools).[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDebookee[0m[38;5;12m (http://www.iwaxx.com/debookee/) - Simple and powerful network traffic analyzer for macOS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDshell[0m[38;5;12m (https://github.com/USArmyResearchLab/Dshell) - Network forensic analysis framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetzob[0m[38;5;12m (https://github.com/netzob/netzob) - Reverse engineering, traffic generation and fuzzing of communication protocols.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireshark[0m[38;5;12m (https://www.wireshark.org/) - Widely-used graphical, cross-platform network protocol analyzer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mnetsniff-ng[0m[38;5;12m (https://github.com/netsniff-ng/netsniff-ng) - Swiss army knife for network sniffing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msniffglue[0m[38;5;12m (https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtcpdump/libpcap[0m[38;5;12m (http://www.tcpdump.org/) - Common packet analyzer that runs under the command line.[39m
|
||
|
||
[38;2;255;187;0m[4mNetwork Traffic Replay and Editing Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTraceWrangler[0m[38;5;12m (https://www.tracewrangler.com/) - Network capture file toolkit that can edit and merge [39m[48;5;235m[38;5;249mpcap[49m[39m[38;5;12m or [39m[48;5;235m[38;5;249mpcapng[49m[39m[38;5;12m files with batch editing features.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWireEdit[0m[38;5;12m (https://wireedit.com/) - Full stack WYSIWYG pcap editor (requires a free license to edit packets).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbittwist[0m[38;5;12m [39m[38;5;12m(http://bittwist.sourceforge.net/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSimple[39m[38;5;12m [39m[38;5;12myet[39m[38;5;12m [39m[38;5;12mpowerful[39m[38;5;12m [39m[38;5;12mlibpcap-based[39m[38;5;12m [39m[38;5;12mEthernet[39m[38;5;12m [39m[38;5;12mpacket[39m[38;5;12m [39m[38;5;12mgenerator[39m[38;5;12m [39m[38;5;12museful[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12msimulating[39m[38;5;12m [39m[38;5;12mnetworking[39m[38;5;12m [39m[38;5;12mtraffic[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mscenario,[39m[38;5;12m [39m[38;5;12mtesting[39m[38;5;12m [39m[38;5;12mfirewall,[39m[38;5;12m [39m[38;5;12mIDS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mIPS,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||
[38;5;12mtroubleshooting[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12mnetwork[39m[38;5;12m [39m[38;5;12mproblems.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mhping3[0m[38;5;12m (https://github.com/antirez/hping) - Network tool able to send custom TCP/IP packets.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpig[0m[38;5;12m (https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mscapy[0m[38;5;12m (https://github.com/secdev/scapy) - Python-based interactive packet manipulation program and library.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtcpreplay[0m[38;5;12m (https://tcpreplay.appneta.com/) - Suite of free Open Source utilities for editing and replaying previously captured network traffic.[39m
|
||
|
||
[38;2;255;187;0m[4mProxies and Machine-in-the-Middle (MITM) Tools[0m
|
||
|
||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mIntercepting Web proxies[0m[48;2;30;30;40m[38;5;13m[3m (#intercepting-web-proxies)[0m[38;5;12m.[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBetterCAP[0m[38;5;12m (https://www.bettercap.org/) - Modular, portable and easily extensible MITM framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEttercap[0m[38;5;12m (http://www.ettercap-project.org) - Comprehensive, mature suite for machine-in-the-middle attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHabu[0m[38;5;12m (https://github.com/portantier/habu) - Python utility implementing a variety of network attacks, such as ARP poisoning, DHCP starvation, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLambda-Proxy[0m[38;5;12m (https://github.com/puresec/lambda-proxy) - Utility for testing SQL Injection vulnerabilities on AWS Lambda serverless functions.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMITMf[0m[38;5;12m (https://github.com/byt3bl33d3r/MITMf) - Framework for Man-In-The-Middle attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMorpheus[0m[38;5;12m (https://github.com/r00t-3xp10it/morpheus) - Automated ettercap TCP/IP Hijacking tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSSH MITM[0m[38;5;12m (https://github.com/jtesta/ssh-mitm) - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnschef[0m[38;5;12m (https://github.com/iphelix/dnschef) - Highly configurable DNS proxy for pentesters.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mevilgrade[0m[38;5;12m (https://github.com/infobyte/evilgrade) - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmallory[0m[38;5;12m (https://github.com/justmao945/mallory) - HTTP/HTTPS proxy over SSH.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1moregano[0m[38;5;12m (https://github.com/nametoolong/oregano) - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msylkie[0m[38;5;12m (https://dlrobertson.github.io/sylkie/) - Command line tool and library for testing networks for common address spoofing security vulnerabilities in IPv6 networks using the Neighbor Discovery Protocol.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPETEP[0m[38;5;12m (https://github.com/Warxim/petep) - Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.[39m
|
||
|
||
[38;2;255;187;0m[4mTransport Layer Security Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSSLyze[0m[38;5;12m (https://github.com/nabla-c0d3/sslyze) - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcrackpkcs12[0m[38;5;12m (https://github.com/crackpkcs12/crackpkcs12) - Multithreaded program to crack PKCS#12 files ([39m[48;5;235m[38;5;249m.p12[49m[39m[38;5;12m and [39m[48;5;235m[38;5;249m.pfx[49m[39m[38;5;12m extensions), such as TLS/SSL certificates.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtestssl.sh[0m[38;5;12m (https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtls_prober[0m[38;5;12m (https://github.com/WestpointLtd/tls_prober) - Fingerprint a server's SSL/TLS implementation.[39m
|
||
|
||
[38;2;255;187;0m[4mWireless Network Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAircrack-ng[0m[38;5;12m (http://www.aircrack-ng.org/) - Set of tools for auditing wireless networks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAirgeddon[0m[38;5;12m (https://github.com/v1s1t0r1sh3r3/airgeddon) - Multi-use bash script for Linux systems to audit wireless networks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBoopSuite[0m[38;5;12m (https://github.com/MisterBianco/BoopSuite) - Suite of tools written in Python for wireless auditing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBully[0m[38;5;12m (http://git.kali.org/gitweb/?p=packages/bully.git;a=summary) - Implementation of the WPS brute force attack, written in C.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCowpatty[0m[38;5;12m (https://github.com/joswr1ght/cowpatty) - Brute-force dictionary attack against WPA-PSK.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFluxion[0m[38;5;12m (https://github.com/FluxionNetwork/fluxion) - Suite of automated social engineering based WPA attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKRACK Detector[0m[38;5;12m (https://github.com/securingsam/krackdetector) - Detect and prevent KRACK attacks in your network.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKismet[0m[38;5;12m (https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPSKracker[0m[38;5;12m (https://github.com/soxrok2212/PSKracker) - Collection of WPA/WPA2/WPS default algorithms, password generators, and PIN generators written in C.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReaver[0m[38;5;12m (https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWiFi Pineapple[0m[38;5;12m (https://www.wifipineapple.com/) - Wireless auditing and penetration testing platform.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWiFi-Pumpkin[0m[38;5;12m (https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for rogue Wi-Fi access point attack.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWifite[0m[38;5;12m (https://github.com/derv82/wifite) - Automated wireless attack tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1minfernal-twin[0m[38;5;12m (https://github.com/entropy1337/infernal-twin) - Automated wireless hacking tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkrackattacks-scripts[0m[38;5;12m (https://github.com/vanhoefm/krackattacks-scripts) - WPA2 Krack attack scripts.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwnagotchi[0m[38;5;12m (https://github.com/evilsocket/pwnagotchi) - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwifi-arsenal[0m[38;5;12m (https://github.com/0x90/wifi-arsenal) - Resources for Wi-Fi Pentesting.[39m
|
||
|
||
[38;2;255;187;0m[4mNetwork Vulnerability Scanners[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcelerystalk[0m[38;5;12m (https://github.com/sethsec/celerystalk) - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mkube-hunter[0m[38;5;12m (https://kube-hunter.aquasec.com/) - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNessus[0m[38;5;12m (https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetsparker Application Security Scanner[0m[38;5;12m (https://www.netsparker.com/pricing/) - Application security scanner to automatically find security flaws.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNexpose[0m[38;5;12m (https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpenVAS[0m[38;5;12m (http://www.openvas.org/) - Free software implementation of the popular Nessus vulnerability assessment system.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVuls[0m[38;5;12m (https://github.com/future-architect/vuls) - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb Vulnerability Scanners[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mACSTIS[0m[38;5;12m (https://github.com/tijme/angularjs-csti-scanner) - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mArachni[0m[38;5;12m (http://www.arachni-scanner.com/) - Scriptable framework for evaluating the security of web applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJCS[0m[38;5;12m (https://github.com/TheM4hd1/JCS) - Joomla Vulnerability Component Scanner with automatic database updater from exploitdb and packetstorm.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNikto[0m[38;5;12m (https://cirt.net/nikto2) - Noisy but fast black box web server and web application vulnerability scanner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQLmate[0m[38;5;12m (https://github.com/UltimateHackers/sqlmate) - Friend of [39m[48;5;235m[38;5;249msqlmap[49m[39m[38;5;12m that identifies SQLi vulnerabilities based on a given dork and (optional) website.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecApps[0m[38;5;12m (https://secapps.com/) - In-browser web application security testing suite.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWPScan[0m[38;5;12m (https://wpscan.org/) - Black box WordPress vulnerability scanner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWapiti[0m[38;5;12m (http://wapiti.sourceforge.net/) - Black box web application vulnerability scanner with built-in fuzzer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWebReaver[0m[38;5;12m (https://www.webreaver.com/) - Commercial, graphical web application vulnerability scanner designed for macOS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcms-explorer[0m[38;5;12m (https://code.google.com/archive/p/cms-explorer/) - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mjoomscan[0m[38;5;12m (https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project) - Joomla vulnerability scanner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mskipfish[0m[38;5;12m (https://www.kali.org/tools/skipfish/) - Performant and adaptable active web application security reconnaissance tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mw3af[0m[38;5;12m (https://github.com/andresriancho/w3af) - Web application attack and audit framework.[39m
|
||
|
||
[38;2;255;187;0m[4mOnline Resources[0m
|
||
|
||
[38;2;255;187;0m[4mOnline Operating Systems Resources[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDistroWatch.com's Security Category[0m[38;5;12m (https://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.[39m
|
||
|
||
[38;2;255;187;0m[4mOnline Penetration Testing Resources[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)[0m[38;5;12m (https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMetasploit Unleashed[0m[38;5;12m (https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Web Application Security Project (OWASP)[0m
|
||
[38;5;12m (https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPENTEST-WIKI[0m[38;5;12m (https://github.com/nixawk/pentest-wiki) - Free online security knowledge library for pentesters and researchers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Execution Standard (PTES)[0m[38;5;12m (http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPenetration Testing Framework (PTF)[0m
|
||
[38;5;12m (http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mXSS-Payloads[0m[38;5;12m (http://www.xss-payloads.com) - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.[39m
|
||
|
||
[38;2;255;187;0m[4mOther Lists Online[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1m.NET Programming[0m[38;5;12m (https://github.com/quozd/awesome-dotnet) - Software framework for Microsoft Windows platform development.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInfosec/hacking videos recorded by cooper[0m[38;5;12m (https://administraitor.video) - Collection of security conferences recorded by Cooper.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Exploits[0m[38;5;12m (https://github.com/sundaysec/Android-Exploits) - Guide on Android Exploitation and Hacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Security[0m[38;5;12m (https://github.com/ashishb/android-security-awesome) - Collection of Android security related resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAppSec[0m[38;5;12m (https://github.com/paragonie/awesome-appsec) - Resources for learning about application security.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome Awesomness[0m[38;5;12m (https://github.com/bayandin/awesome-awesomeness) - The List of the Lists.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome Malware[0m[38;5;12m (https://github.com/fabacab/awesome-malware) - Curated collection of awesome malware, botnets, and other post-exploitation tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAwesome Shodan Queries[0m[38;5;12m (https://github.com/jakejarvis/awesome-shodan-queries) - Awesome list of useful, funny, and depressing search queries for Shodan.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAWS Tool Arsenal[0m[38;5;12m (https://github.com/toniblyx/my-arsenal-of-aws-security-tools) - List of tools for testing and securing AWS environments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlue Team[0m[38;5;12m (https://github.com/fabacab/awesome-cybersecurity-blueteam) - Awesome resources, tools, and other shiny things for cybersecurity blue teams.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mC/C++ Programming[0m[38;5;12m (https://github.com/fffaraz/awesome-cpp) - One of the main language for open source security tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCTFs[0m[38;5;12m (https://github.com/apsdehal/awesome-ctf) - Capture The Flag frameworks, libraries, etc.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mForensics[0m[38;5;12m (https://github.com/Cugu/awesome-forensics) - Free (mostly open source) forensic analysis tools and resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHacking[0m[38;5;12m (https://github.com/carpedm20/awesome-hacking) - Tutorials, tools, and resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHoneypots[0m[38;5;12m (https://github.com/paralax/awesome-honeypots) - Honeypots, tools, components, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInfoSec § Hacking challenges[0m
|
||
[38;5;12m (https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges) - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInfosec[0m[38;5;12m (https://github.com/onlurking/awesome-infosec) - Information security resources for pentesting, forensics, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mJavaScript Programming[0m[38;5;12m (https://github.com/sorrycc/awesome-javascript) - In-browser development and scripting.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKali Linux Tools[0m[38;5;12m (http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNode.js Programming by @sindresorhus[0m[38;5;12m (https://github.com/sindresorhus/awesome-nodejs) - Curated list of delightful Node.js packages and resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentest Cheat Sheets[0m[38;5;12m (https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython Programming by @svaksha[0m[38;5;12m (https://github.com/svaksha/pythonidae) - General Python programming.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython Programming by @vinta[0m[38;5;12m (https://github.com/vinta/awesome-python) - General Python programming.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPython tools for penetration testers[0m[38;5;12m (https://github.com/dloss/python-pentest-tools) - Lots of pentesting tools are written in Python.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRawsec's[0m[38;5;14m[1m [0m[38;5;14m[1mCyberSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mInventory[0m[38;5;12m [39m[38;5;12m(https://inventory.raw.pm/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAn[39m[38;5;12m [39m[38;5;12mopen-source[39m[38;5;12m [39m[38;5;12minventory[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mtools,[39m[38;5;12m [39m[38;5;12mresources,[39m[38;5;12m [39m[38;5;12mCTF[39m[38;5;12m [39m[38;5;12mplatforms[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mOperating[39m[38;5;12m [39m[38;5;12mSystems[39m[38;5;12m [39m[38;5;12mabout[39m[38;5;12m [39m[38;5;12mCyberSecurity.[39m[38;5;12m [39m[38;5;12m([39m[38;5;14m[1mSource[0m[38;5;12m [39m
|
||
[38;5;12m(https://gitlab.com/rawsec/rawsec-cybersecurity-list))[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRed Teaming[0m[38;5;12m (https://github.com/yeyintminthuhtut/Awesome-Red-Teaming) - List of Awesome Red Teaming Resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuby Programming by @Sdogruyol[0m[38;5;12m (https://github.com/Sdogruyol/awesome-ruby) - The de-facto language for writing exploits.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuby Programming by @dreikanter[0m[38;5;12m (https://github.com/dreikanter/ruby-bookmarks) - The de-facto language for writing exploits.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuby Programming by @markets[0m[38;5;12m (https://github.com/markets/awesome-ruby) - The de-facto language for writing exploits.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecLists[0m[38;5;12m (https://github.com/danielmiessler/SecLists) - Collection of multiple types of lists used during security assessments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecTools[0m[38;5;12m (http://sectools.org/) - Top 125 Network Security Tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity Talks[0m[38;5;12m (https://github.com/PaulSec/awesome-sec-talks) - Curated list of security conferences.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecurity[0m[38;5;12m (https://github.com/sbilly/awesome-security) - Software, libraries, documents, and other resources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mServerless Security[0m[38;5;12m (https://github.com/puresec/awesome-serverless-security/) - Curated list of awesome serverless security resources such as (e)books, articles, whitepapers, blogs and research papers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShell Scripting[0m[38;5;12m (https://github.com/alebcay/awesome-shell) - Command line frameworks, toolkits, guides and gizmos.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mYARA[0m[38;5;12m (https://github.com/InQuest/awesome-yara) - YARA rules, tools, and people.[39m
|
||
|
||
[38;2;255;187;0m[4mPenetration Testing Report Templates[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPublic Pentesting Reports[0m[38;5;12m (https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mT&VS Pentesting Report Template[0m[38;5;12m (https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - Pentest report template provided by Test and Verification Services, Ltd.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWeb Application Security Assessment Report Template[0m[38;5;12m (http://lucideus.com/pdf/stw.pdf) - Sample Web application security assessment reporting template provided by Lucideus.[39m
|
||
|
||
[38;2;255;187;0m[4mOpen Sources Intelligence (OSINT)[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-osint[0m[38;5;12m (https://github.com/jivoi/awesome-osint).[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDataSploit[0m[38;5;12m (https://github.com/upgoingstar/datasploit) - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDepix[0m[38;5;12m (https://github.com/beurtschipper/Depix) - Tool for recovering passwords from pixelized screenshots (by de-pixelating text).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGyoiThon[0m[38;5;12m (https://github.com/gyoisamurai/GyoiThon) - GyoiThon is an Intelligence Gathering tool using Machine Learning.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mIntrigue[0m[38;5;12m (http://intrigue.io) - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMaltego[0m[38;5;12m (http://www.maltego.com/) - Proprietary software for open sources intelligence and forensics.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacketTotal[0m
|
||
[38;5;12m (https://packettotal.com/) - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Zeek and Suricata IDS signatures under the hood).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSkiptracer[0m[38;5;12m [39m[38;5;12m(https://github.com/xillwillx/skiptracer)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOSINT[39m[38;5;12m [39m[38;5;12mscraping[39m[38;5;12m [39m[38;5;12mframework[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mutilizes[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12mPython[39m[38;5;12m [39m[38;5;12mwebscraping[39m[38;5;12m [39m[38;5;12m(BeautifulSoup)[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mPII[39m[38;5;12m [39m[38;5;12mpaywall[39m[38;5;12m [39m[38;5;12msites[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mcompile[39m[38;5;12m [39m[38;5;12mpassive[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtarget[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mramen[39m
|
||
[38;5;12mnoodle[39m[38;5;12m [39m[38;5;12mbudget.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSn1per[0m[38;5;12m (https://github.com/1N3/Sn1per) - Automated Pentest Recon Scanner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSpiderfoot[0m[38;5;12m (http://www.spiderfoot.net/) - Multi-source OSINT automation tool with a Web UI and report visualizations.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcreepy[0m[38;5;12m (https://github.com/ilektrojohn/creepy) - Geolocation OSINT tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgOSINT[0m[38;5;12m (https://github.com/Nhoya/gOSINT) - OSINT tool with multiple modules and a telegram scraper.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mimage-match[0m[38;5;12m (https://github.com/ascribe/image-match) - Quickly search over billions of images.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mrecon-ng[0m[38;5;12m (https://github.com/lanmaster53/recon-ng) - Full-featured Web Reconnaissance framework written in Python.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msn0int[0m[38;5;12m (https://github.com/kpcyrd/sn0int) - Semi-automatic OSINT framework and package manager.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFacebook Friend List Scraper[0m[38;5;12m (https://github.com/narkopolo/fb_friend_list_scraper) - Tool to scrape names and usernames from large friend lists on Facebook, without being rate limited.[39m
|
||
|
||
|
||
[38;2;255;187;0m[4mData Broker and Search Engine Services[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHunter.io[0m[38;5;12m (https://hunter.io/) - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThreat Crowd[0m[38;5;12m (https://www.threatcrowd.org/) - Search engine for threats.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVirus Total[0m[38;5;12m (https://www.virustotal.com/) - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msurfraw[0m[38;5;12m (https://github.com/kisom/surfraw) - Fast UNIX command line interface to a variety of popular WWW search engines.[39m
|
||
|
||
[38;2;255;187;0m[4mDorking tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBinGoo[0m[38;5;12m (https://github.com/Hood3dRob1n/BinGoo) - GNU/Linux bash based Bing and Google Dorking Tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdorkbot[0m[38;5;12m (https://github.com/utiso/dorkbot) - Command-line tool to scan Google (or other) search results for vulnerabilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgithub-dorks[0m[38;5;12m (https://github.com/techgaun/github-dorks) - CLI tool to scan GitHub repos/organizations for potential sensitive information leaks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGooDork[0m[38;5;12m (https://github.com/k3170makan/GooDork) - Command line Google dorking tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGoogle Hacking Database[0m[38;5;12m (https://www.exploit-db.com/google-hacking-database/) - Database of Google dorks; can be used for recon.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdork-cli[0m[38;5;12m (https://github.com/jgor/dork-cli) - Command line Google dork tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdorks[0m[38;5;12m (https://github.com/USSCltd/dorks) - Google hack database automation tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfast-recon[0m[38;5;12m (https://github.com/DanMcInerney/fast-recon) - Perform Google dorks against a domain.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpagodo[0m[38;5;12m (https://github.com/opsdisk/pagodo) - Automate Google Hacking Database scraping.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msnitch[0m[38;5;12m (https://github.com/Smaash/snitch) - Information gathering via dorks.[39m
|
||
|
||
[38;2;255;187;0m[4mEmail search and analysis tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSimplyEmail[0m[38;5;12m (https://github.com/SimplySecurity/SimplyEmail) - Email recon made fast and easy.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatBreach[0m[38;5;12m (https://github.com/Ekultek/WhatBreach) - Search email addresses and discover all known breaches that this email has been seen in, and download the breached database if it is publicly available.[39m
|
||
|
||
[38;2;255;187;0m[4mMetadata harvesting and analysis[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFOCA (Fingerprinting Organizations with Collected Archives)[0m
|
||
[38;5;12m (https://www.elevenpaths.com/labstools/foca/) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmetagoofil[0m[38;5;12m (https://github.com/laramies/metagoofil) - Metadata harvester.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtheHarvester[0m[38;5;12m (https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester.[39m
|
||
|
||
[38;2;255;187;0m[4mNetwork device discovery tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCensys[0m[38;5;12m (https://www.censys.io/) - Collects data on hosts and websites through daily ZMap and ZGrab scans.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShodan[0m[38;5;12m (https://www.shodan.io/) - World's first search engine for Internet-connected devices.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZoomEye[0m[38;5;12m (https://www.zoomeye.org/) - Search engine for cyberspace that lets the user find specific network components.[39m
|
||
|
||
[38;2;255;187;0m[4mOSINT Online Resources[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCertGraph[0m[38;5;12m (https://github.com/lanrat/certgraph) - Crawls a domain's SSL/TLS certificates for its certificate alternative names.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGhostProject[0m[38;5;12m (https://ghostproject.fr/) - Searchable database of billions of cleartext passwords, partially visible for free.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetBootcamp OSINT Tools[0m[38;5;12m (http://netbootcamp.org/osinttools/) - Collection of OSINT links and custom Web interfaces to other services.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOSINT Framework[0m[38;5;12m (http://osintframework.com/) - Collection of various OSINT tools broken out by category.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWiGLE.net[0m[38;5;12m (https://wigle.net/) - Information about wireless networks world-wide, with user-friendly desktop and web applications.[39m
|
||
|
||
[38;2;255;187;0m[4mSource code repository searching tools[0m
|
||
|
||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mWeb-accessible source code ripping tools[0m[48;2;30;30;40m[38;5;13m[3m (#web-accessible-source-code-ripping-tools)[0m[38;5;12m.[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mvcsmap[0m[38;5;12m (https://github.com/melvinsh/vcsmap) - Plugin-based tool to scan public version control systems for sensitive information.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mYar[0m[38;5;12m (https://github.com/Furduhlutur/yar) - Clone git repositories to search through the whole commit history in order of commit time for secrets, tokens, or passwords.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb application and resource analysis tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlindElephant[0m[38;5;12m (http://blindelephant.sourceforge.net/) - Web application fingerprinter.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEyeWitness[0m[38;5;12m (https://github.com/ChrisTruncer/EyeWitness) - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGraphQL Voyager[0m[38;5;12m (https://graphql-kit.com/graphql-voyager/) - Represent any GraphQL API as an interactive graph, letting you explore data models from any Web site with a GraphQL query endpoint.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVHostScan[0m[38;5;12m (https://github.com/codingo/VHostScan) - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWappalyzer[0m[38;5;12m (https://www.wappalyzer.com/) - Wappalyzer uncovers the technologies used on websites.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatWaf[0m[38;5;12m (https://github.com/Ekultek/WhatWaf) - Detect and bypass web application firewalls and protection systems.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWhatWeb[0m[38;5;12m (https://github.com/urbanadventurer/WhatWeb) - Website fingerprinter.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwafw00f[0m[38;5;12m (https://github.com/EnableSecurity/wafw00f) - Identifies and fingerprints Web Application Firewall (WAF) products.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwebscreenshot[0m[38;5;12m (https://github.com/maaaaz/webscreenshot) - Simple script to take screenshots of websites from a list of sites.[39m
|
||
|
||
[38;2;255;187;0m[4mOperating System Distributions[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAndroid Tamer[0m[38;5;12m (https://androidtamer.com/) - Distribution built for Android security professionals that includes tools required for Android security testing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mArchStrike[0m[38;5;12m (https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAttifyOS[0m[38;5;12m (https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBlackArch[0m[38;5;12m (https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBuscador[0m[38;5;12m (https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKali[0m[38;5;12m (https://www.kali.org/) - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNetwork Security Toolkit (NST)[0m
|
||
[38;5;12m (http://networksecuritytoolkit.org/) - Fedora-based GNU/Linux bootable live Operating System designed to provide easy access to best-of-breed open source network security applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mParrot[0m[38;5;12m (https://parrotlinux.org/) - Distribution similar to Kali, with support for multiple hardware architectures.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPentestBox[0m[38;5;12m (https://pentestbox.org/) - Open source pre-configured portable penetration testing environment for the Windows Operating System.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Pentesters Framework[0m
|
||
[38;5;12m (https://github.com/trustedsec/ptf) - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that omits less frequently used utilities.[39m
|
||
|
||
[38;2;255;187;0m[4mPeriodicals[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1m2600: The Hacker Quarterly[0m[38;5;12m (https://www.2600.com/Magazine/DigitalEditions) - American publication about technology and computer "underground" culture.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPhrack Magazine[0m[38;5;12m (http://www.phrack.org/) - By far the longest running hacker zine.[39m
|
||
|
||
[38;2;255;187;0m[4mPhysical Access Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mAT[0m[38;5;14m[1m [0m[38;5;14m[1mCommands[0m[38;5;12m [39m[38;5;12m(https://atcommands.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mUse[39m[38;5;12m [39m[38;5;12mAT[39m[38;5;12m [39m[38;5;12mcommands[39m[38;5;12m [39m[38;5;12mover[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mAndroid[39m[38;5;12m [39m[38;5;12mdevice's[39m[38;5;12m [39m[38;5;12mUSB[39m[38;5;12m [39m[38;5;12mport[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mrewrite[39m[38;5;12m [39m[38;5;12mdevice[39m[38;5;12m [39m[38;5;12mfirmware,[39m[38;5;12m [39m[38;5;12mbypass[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mmechanisms,[39m[38;5;12m [39m[38;5;12mexfiltrate[39m[38;5;12m [39m[38;5;12msensitive[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mscreen[39m[38;5;12m [39m[38;5;12munlocks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m
|
||
[38;5;12minject[39m[38;5;12m [39m[38;5;12mtouch[39m[38;5;12m [39m[38;5;12mevents.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBash Bunny[0m[38;5;12m (https://www.hak5.org/gear/bash-bunny) - Local exploit delivery tool in the form of a USB thumbdrive in which you write payloads in a DSL called BunnyScript.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLAN Turtle[0m[38;5;12m (https://lanturtle.com/) - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPCILeech[0m[38;5;12m (https://github.com/ufrisk/pcileech) - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacket Squirrel[0m[38;5;12m (https://www.hak5.org/gear/packet-squirrel) - Ethernet multi-tool designed to enable covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPoisontap[0m[38;5;12m (https://samy.pl/poisontap/) - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProxmark3[0m[38;5;12m (https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThunderclap[0m[38;5;12m (https://thunderclap.io/) - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUSB Rubber Ducky[0m[38;5;12m (http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.[39m
|
||
|
||
[38;2;255;187;0m[4mPrivilege Escalation Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mActive Directory and Privilege Escalation (ADAPE)[0m
|
||
[38;5;12m (https://github.com/hausec/ADAPE-Script) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGTFOBins[0m[38;5;12m (https://gtfobins.github.io/) - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLOLBAS[0m[38;5;14m[1m [0m[38;5;14m[1m(Living[0m[38;5;14m[1m [0m[38;5;14m[1mOff[0m[38;5;14m[1m [0m[38;5;14m[1mThe[0m[38;5;14m[1m [0m[38;5;14m[1mLand[0m[38;5;14m[1m [0m[38;5;14m[1mBinaries[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mScripts)[0m[38;5;12m [39m[38;5;12m(https://lolbas-project.github.io/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mDocuments[39m[38;5;12m [39m[38;5;12mbinaries,[39m[38;5;12m [39m[38;5;12mscripts,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlibraries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12m"Living[39m[38;5;12m [39m[38;5;12mOff[39m[38;5;12m [39m[38;5;12mThe[39m[38;5;12m [39m[38;5;12mLand"[39m[38;5;12m [39m[38;5;12mtechniques,[39m[38;5;12m [39m[38;5;12mi.e.,[39m[38;5;12m [39m[38;5;12mbinaries[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mcan[39m
|
||
[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mattacker[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mperform[39m[38;5;12m [39m[38;5;12mactions[39m[38;5;12m [39m[38;5;12mbeyond[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12moriginal[39m[38;5;12m [39m[38;5;12mpurpose.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLinEnum[0m[38;5;12m (https://github.com/rebootuser/LinEnum) - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPostenum[0m[38;5;12m (https://github.com/mbahadou/postenum) - Shell script used for enumerating possible privilege escalation opportunities on a local GNU/Linux system.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1munix-privesc-check[0m[38;5;12m (https://github.com/pentestmonkey/unix-privesc-check) - Shell script to check for simple privilege escalation vectors on UNIX systems.[39m
|
||
|
||
[38;2;255;187;0m[4mPassword Spraying Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDomainPasswordSpray[0m[38;5;12m (https://github.com/dafthack/DomainPasswordSpray) - Tool written in PowerShell to perform a password spray attack against users of a domain.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSprayingToolkit[0m
|
||
[38;5;12m (https://github.com/byt3bl33d3r/SprayingToolkit) - Scripts to make password spraying attacks against Lync/S4B, Outlook Web Access (OWA) and Office 365 (O365) a lot quicker, less painful and more efficient.[39m
|
||
|
||
[38;2;255;187;0m[4mReverse Engineering[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-reversing[0m[38;5;12m (https://github.com/tylerha97/awesome-reversing), [39m[48;2;30;30;40m[38;5;14m[1m[3mExploit Development Tools[0m[38;5;12m (#exploit-development-tools).[39m
|
||
|
||
[38;2;255;187;0m[4mReverse Engineering Books[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015[0m[38;5;12m (http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHacking the Xbox by Andrew Huang, 2003[0m[38;5;12m (https://nostarch.com/xbox.htm)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPractical Reverse Engineering by Bruce Dang et al., 2014[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118787315.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReverse Engineering for Beginners by Dennis Yurichev[0m[38;5;12m (http://beginners.re/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe IDA Pro Book by Chris Eagle, 2011[0m[38;5;12m (https://nostarch.com/idapro2.htm)[39m
|
||
|
||
[38;2;255;187;0m[4mReverse Engineering Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mangr[0m[38;5;12m (https://angr.io/) - Platform-agnostic binary analysis framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCapstone[0m[38;5;12m (http://www.capstone-engine.org/) - Lightweight multi-platform, multi-architecture disassembly framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDetect It Easy(DiE)[0m[38;5;12m (https://github.com/horsicq/Detect-It-Easy) - Program for determining types of files for Windows, Linux and MacOS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvan's Debugger[0m[38;5;12m (http://www.codef00.com/projects#debugger) - OllyDbg-like debugger for GNU/Linux.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFrida[0m[38;5;12m (https://www.frida.re/) - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFridax[0m[38;5;12m (https://github.com/NorthwaveNL/fridax) - Read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGhidra[0m[38;5;12m [39m[38;5;12m(https://www.ghidra-sre.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSuite[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mreverse[39m[38;5;12m [39m[38;5;12mengineering[39m[38;5;12m [39m[38;5;12mtools[39m[38;5;12m [39m[38;5;12mdeveloped[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mNSA's[39m[38;5;12m [39m[38;5;12mResearch[39m[38;5;12m [39m[38;5;12mDirectorate[39m[38;5;12m [39m[38;5;12moriginally[39m[38;5;12m [39m[38;5;12mexposed[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mWikiLeaks's[39m[38;5;12m [39m[38;5;12m"Vault[39m[38;5;12m [39m[38;5;12m7"[39m[38;5;12m [39m[38;5;12mpublication[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mnow[39m[38;5;12m [39m[38;5;12mmaintained[39m[38;5;12m [39m[38;5;12mas[39m[38;5;12m [39m
|
||
[38;5;12mopen[39m[38;5;12m [39m[38;5;12msource[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mImmunity Debugger[0m[38;5;12m (https://immunityinc.com/products/debugger/) - Powerful way to write exploits and analyze malware.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInteractive[0m[38;5;14m[1m [0m[38;5;14m[1mDisassembler[0m[38;5;14m[1m [0m[38;5;14m[1m(IDA[0m[38;5;14m[1m [0m[38;5;14m[1mPro)[0m[38;5;12m [39m[38;5;12m(https://www.hex-rays.com/products/ida/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mProprietary[39m[38;5;12m [39m[38;5;12mmulti-processor[39m[38;5;12m [39m[38;5;12mdisassembler[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mdebugger[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mWindows,[39m[38;5;12m [39m[38;5;12mGNU/Linux,[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mmacOS;[39m[38;5;12m [39m[38;5;12malso[39m[38;5;12m [39m[38;5;12mhas[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12mversion,[39m[38;5;12m [39m[38;5;14m[1mIDA[0m[38;5;14m[1m [0m[38;5;14m[1mFree[0m[38;5;12m [39m
|
||
[38;5;12m(https://www.hex-rays.com/products/ida/support/download_freeware.shtml).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMedusa[0m[38;5;12m (https://github.com/wisk/medusa) - Open source, cross-platform interactive disassembler.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOllyDbg[0m[38;5;12m (http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPyREBox[0m[38;5;12m (https://github.com/Cisco-Talos/pyrebox) - Python scriptable Reverse Engineering sandbox by Cisco-Talos.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRadare2[0m[38;5;12m (http://rada.re/r/index.html) - Open source, crossplatform reverse engineering framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUEFITool[0m[38;5;12m (https://github.com/LongSoft/UEFITool) - UEFI firmware image viewer and editor.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVoltron[0m[38;5;12m (https://github.com/snare/voltron) - Extensible debugger UI toolkit written in Python.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWDK/WinDbg[0m[38;5;12m (https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/debugger-download-tools) - Windows Driver Kit and WinDbg.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbinwalk[0m[38;5;12m (https://github.com/devttys0/binwalk) - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mboxxy[0m[38;5;12m (https://github.com/kpcyrd/boxxy-rs) - Linkable sandbox explorer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdnSpy[0m[38;5;12m (https://github.com/0xd4d/dnSpy) - Tool to reverse engineer .NET assemblies.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mplasma[0m[38;5;12m (https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mpwndbg[0m
|
||
[38;5;12m (https://github.com/pwndbg/pwndbg) - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mrVMI[0m[38;5;12m (https://github.com/fireeye/rVMI) - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mx64dbg[0m[38;5;12m (http://x64dbg.com/) - Open source x64/x32 debugger for windows.[39m
|
||
|
||
[38;2;255;187;0m[4mSecurity Education Courses[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mARIZONA CYBER WARFARE RANGE[0m[38;5;12m (http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCybrary[0m[38;5;12m (http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Environments'.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEuropean Union Agency for Network and Information Security[0m[38;5;12m (https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOffensive Security Training[0m[38;5;12m (https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Security Training[0m[38;5;12m (http://opensecuritytraining.info/) - Training material for computer security classes.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRoppers Academy Training[0m[38;5;12m (https://www.hoppersroppers.org/training.html) - Free courses on computing and security fundamentals designed to train a beginner to crush their first CTF. [39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSANS Security Training[0m[38;5;12m (http://www.sans.org/) - Computer Security Training & Certification.[39m
|
||
|
||
[38;2;255;187;0m[4mShellcoding Guides and Tutorials[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit Writing Tutorials[0m[38;5;12m (https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShellcode Examples[0m[38;5;12m (http://shell-storm.org/shellcode/) - Shellcodes database.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mShellcode Tutorial[0m[38;5;12m (http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Shellcoder's Handbook by Chris Anley et al., 2007[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)[39m
|
||
|
||
[38;2;255;187;0m[4mSide-channel Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChipWhisperer[0m[38;5;12m (http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSGX-Step[0m
|
||
[38;5;12m (https://github.com/jovanbulck/sgx-step) - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mTRRespass[0m[38;5;12m (https://github.com/vusec/trrespass) - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.[39m
|
||
|
||
[38;2;255;187;0m[4mSocial Engineering[0m
|
||
|
||
[38;5;12mSee also [39m[38;5;14m[1mawesome-social-engineering[0m[38;5;12m (https://github.com/v2-dev/awesome-social-engineering).[39m
|
||
|
||
[38;2;255;187;0m[4mSocial Engineering Books[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGhost in the Wires by Kevin D. Mitnick & William L. Simon, 2011[0m[38;5;12m (http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNo Tech Hacking by Johnny Long & Jack Wiles, 2008[0m[38;5;12m (https://www.elsevier.com/books/no-tech-hacking/mitnick/978-1-59749-215-7)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014[0m
|
||
[38;5;12m (https://www.mhprofessional.com/9780071818469-usa-social-engineering-in-it-security-tools-tactics-and-techniques-group)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Art of Deception by Kevin D. Mitnick & William L. Simon, 2002[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUnmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html)[39m
|
||
|
||
[38;2;255;187;0m[4mSocial Engineering Online Resources[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineering Framework[0m[38;5;12m (http://www.social-engineer.org/framework/general-discussion/) - Information resource for social engineers.[39m
|
||
|
||
[38;2;255;187;0m[4mSocial Engineering Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBeelogger[0m[38;5;12m (https://github.com/4w4k3/BeeLogger) - Tool for generating keylooger.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCatphish[0m[38;5;12m (https://github.com/ring0lab/catphish) - Tool for phishing and corporate espionage written in Ruby.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEvilginx2[0m[38;5;12m (https://github.com/kgretzky/evilginx2) - Standalone Machine-in-the-Middle (MitM) reverse proxy attack framework for setting up phishing pages capable of defeating most forms of 2FA security schemes.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFiercePhish[0m[38;5;12m (https://github.com/Raikia/FiercePhish) - Full-fledged phishing framework to manage all phishing engagements.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGophish[0m[38;5;12m (https://getgophish.com) - Open-source phishing framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKing Phisher[0m[38;5;12m (https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mModlishka[0m[38;5;12m (https://github.com/drk1wi/Modlishka) - Flexible and powerful reverse proxy with real-time two-factor authentication.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mReelPhish[0m[38;5;12m (https://github.com/fireeye/ReelPhish) - Real-time two-factor phishing tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocial Engineer Toolkit (SET)[0m
|
||
[38;5;12m (https://github.com/trustedsec/social-engineer-toolkit) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSocialFish[0m[38;5;12m (https://github.com/UndeadSec/SocialFish) - Social media phishing framework that can run on an Android phone or in a Docker container.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mphishery[0m[38;5;12m (https://github.com/ryhanson/phishery) - TLS/SSL enabled Basic Auth credential harvester.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwifiphisher[0m[38;5;12m (https://github.com/sophron/wifiphisher) - Automated phishing attacks against WiFi networks.[39m
|
||
|
||
[38;2;255;187;0m[4mStatic Analyzers[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBrakeman[0m[38;5;12m (https://github.com/presidentbeef/brakeman) - Static analysis security vulnerability scanner for Ruby on Rails applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFindBugs[0m[38;5;12m (http://findbugs.sourceforge.net/) - Free software static analyzer to look for bugs in Java code.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mProgpilot[0m[38;5;12m (https://github.com/designsecurity/progpilot) - Static security analysis tool for PHP code.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRegEx-DoS[0m[38;5;12m (https://github.com/jagracey/RegEx-DoS) - Analyzes source code for Regular Expressions susceptible to Denial of Service attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbandit[0m[38;5;12m (https://pypi.python.org/pypi/bandit/) - Security oriented static analyser for Python code.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcppcheck[0m[38;5;12m (http://cppcheck.sourceforge.net/) - Extensible C/C++ static analyzer focused on finding bugs.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msobelow[0m[38;5;12m (https://github.com/nccgroup/sobelow) - Security-focused static analysis for the Phoenix Framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mcwe_checker[0m[38;5;12m (https://github.com/fkie-cad/cwe_checker) - Suite of tools built atop the Binary Analysis Platform (BAP) to heuristically detect CWEs in compiled binaries and firmware.[39m
|
||
|
||
[38;2;255;187;0m[4mSteganography Tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCloakify[0m[38;5;12m (https://github.com/TryCatchHCF/Cloakify) - Textual steganography toolkit that converts any filetype into lists of everyday strings.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mStegOnline[0m[38;5;12m (https://stegonline.georgeom.net/) - Web-based, enhanced, and open-source port of StegSolve.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mStegCracker[0m[38;5;12m (https://github.com/Paradoxis/StegCracker) - Steganography brute-force utility to uncover hidden data inside files.[39m
|
||
|
||
[38;2;255;187;0m[4mVulnerability Databases[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBugtraq (BID)[0m[38;5;12m (http://www.securityfocus.com/bid/) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCISA[0m[38;5;14m[1m [0m[38;5;14m[1mKnown[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;14m[1m [0m[38;5;14m[1m(KEV)[0m[38;5;12m [39m[38;5;12m(https://www.cisa.gov/known-exploited-vulnerabilities-catalog)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mVulnerabilities[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12malready[39m[38;5;12m [39m[38;5;12mknown[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mAmerica's[39m[38;5;12m [39m[38;5;12mcyber[39m[38;5;12m [39m[38;5;12mdefense[39m[38;5;12m [39m[38;5;12magency,[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mCybersecurity[39m[38;5;12m [39m
|
||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mInfrastructure[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mAgency,[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mactively[39m[38;5;12m [39m[38;5;12mexploited.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCXSecurity[0m[38;5;12m (https://cxsecurity.com/) - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mChina National Vulnerability Database (CNNVD)[0m[38;5;12m (http://www.cnnvd.org.cn/) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCommon Vulnerabilities and Exposures (CVE)[0m[38;5;12m (https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mExploit-DB[0m[38;5;12m (https://www.exploit-db.com/) - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFull-Disclosure[0m[38;5;12m (http://seclists.org/fulldisclosure/) - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGitHub Advisories[0m[38;5;12m (https://github.com/advisories/) - Public vulnerability advisories published by or affecting codebases hosted by GitHub, including open source projects.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mHPI-VDB[0m[38;5;12m (https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInj3ct0r[0m[38;5;12m (https://www.0day.today/) - Exploit marketplace and vulnerability information aggregator. ([39m[38;5;14m[1mOnion service[0m[38;5;12m (http://mvfjfugdwgc5uwho.onion/).)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMicrosoft Security Advisories and Bulletins[0m
|
||
[38;5;12m (https://docs.microsoft.com/en-us/security-updates/) - Archive and announcements of security advisories impacting Microsoft software, published by the Microsoft Security Response Center (MSRC).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMozilla Foundation Security Advisories[0m[38;5;12m (https://www.mozilla.org/security/advisories/) - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNational Vulnerability Database (NVD)[0m
|
||
[38;5;12m (https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOpen Source Vulnerabilities (OSV)[0m[38;5;12m (https://osv.dev/) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPacket Storm[0m[38;5;12m (https://packetstormsecurity.com/files/) - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSecuriTeam[0m[38;5;12m (http://www.securiteam.com/) - Independent source of software vulnerability information.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSnyk Vulnerability DB[0m[38;5;12m (https://snyk.io/vuln/) - Detailed information and remediation guidance for vulnerabilities known by Snyk.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mUS-CERT[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerability[0m[38;5;14m[1m [0m[38;5;14m[1mNotes[0m[38;5;14m[1m [0m[38;5;14m[1mDatabase[0m[38;5;12m [39m[38;5;12m(https://www.kb.cert.org/vuls/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSummaries,[39m[38;5;12m [39m[38;5;12mtechnical[39m[38;5;12m [39m[38;5;12mdetails,[39m[38;5;12m [39m[38;5;12mremediation[39m[38;5;12m [39m[38;5;12minformation,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mlists[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mvendors[39m[38;5;12m [39m[38;5;12maffected[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12maggregated[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mUnited[39m
|
||
[38;5;12mStates[39m[38;5;12m [39m[38;5;12mComputer[39m[38;5;12m [39m[38;5;12mEmergency[39m[38;5;12m [39m[38;5;12mResponse[39m[38;5;12m [39m[38;5;12mTeam[39m[38;5;12m [39m[38;5;12m(US-CERT).[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulDB[0m[38;5;12m (https://vuldb.com) - Independent vulnerability database with user community, exploit details, and additional meta data (e.g. CPE, CVSS, CWE)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulnerability Lab[0m[38;5;12m (https://www.vulnerability-lab.com/) - Open forum for security advisories organized by category of exploit target.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulners[0m[38;5;12m (https://vulners.com/) - Security database of software vulnerabilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mVulmon[0m[38;5;12m (https://vulmon.com/) - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mZero Day Initiative[0m[38;5;12m (http://zerodayinitiative.com/advisories/published/) - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb Exploitation[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFuzzDB[0m[38;5;12m (https://github.com/fuzzdb-project/fuzzdb) - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOffensive Web Testing Framework (OWTF)[0m[38;5;12m (https://www.owasp.org/index.php/OWASP_OWTF) - Python-based framework for pentesting Web applications based on the OWASP Testing Guide.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRaccoon[0m[38;5;12m (https://github.com/evyatarmeged/Raccoon) - High performance offensive security tool for reconnaissance and vulnerability scanning.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWPSploit[0m[38;5;12m (https://github.com/espreto/wpsploit) - Exploit WordPress-powered websites with Metasploit.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mautochrome[0m[38;5;12m (https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/) - Chrome browser profile preconfigured with appropriate settings needed for web application testing.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mbadtouch[0m[38;5;12m (https://github.com/kpcyrd/badtouch) - Scriptable network authentication cracker.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgobuster[0m[38;5;12m (https://github.com/OJ/gobuster) - Lean multipurpose brute force search/fuzzing tool for Web (and DNS) reconnaissance.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msslstrip2[0m[38;5;12m (https://github.com/LeonardoNve/sslstrip2) - SSLStrip version to defeat HSTS.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1msslstrip[0m[38;5;12m (https://www.thoughtcrime.org/software/sslstrip/) - Demonstration of the HTTPS stripping attacks.[39m
|
||
|
||
[38;2;255;187;0m[4mIntercepting Web proxies[0m
|
||
|
||
[38;5;12mSee also [39m[48;2;30;30;40m[38;5;14m[1m[3mProxies and Machine-in-the-Middle (MITM) Tools[0m[48;2;30;30;40m[38;5;13m[3m (#proxies-and-machine-in-the-middle-mitm-tools)[0m[38;5;12m.[39m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBurp Suite[0m[38;5;12m (https://portswigger.net/burp/) - Integrated platform for performing security testing of web applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFiddler[0m[38;5;12m (https://www.telerik.com/fiddler) - Free cross-platform web debugging proxy with user-friendly companion tools.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mOWASP Zed Attack Proxy (ZAP)[0m[38;5;12m (https://www.zaproxy.org/) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmitmproxy[0m[38;5;12m (https://mitmproxy.org/) - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb file inclusion tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mKadimus[0m[38;5;12m (https://github.com/P0cL4bs/Kadimus) - LFI scan and exploit tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLFISuite[0m[38;5;12m (https://github.com/D35m0nd142/LFISuite) - Automatic LFI scanner and exploiter.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mfimap[0m[38;5;12m (https://github.com/kurobeats/fimap) - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mliffy[0m[38;5;12m (https://github.com/hvqzao/liffy) - LFI exploitation tool.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb injection tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCommix[0m[38;5;12m (https://github.com/commixproject/commix) - Automated all-in-one operating system command injection and exploitation tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mNoSQLmap[0m[38;5;12m (https://github.com/codingo/NoSQLMap) - Automatic NoSQL injection and database takeover tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSQLmap[0m[38;5;12m (http://sqlmap.org/) - Automatic SQL injection and database takeover tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mtplmap[0m[38;5;12m (https://github.com/epinna/tplmap) - Automatic server-side template injection and Web server takeover tool.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb path discovery and bruteforcing tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDotDotPwn[0m[38;5;12m (https://dotdotpwn.blogspot.com/) - Directory traversal fuzzer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mdirsearch[0m[38;5;12m (https://github.com/maurosoria/dirsearch) - Web path scanner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mrecursebuster[0m[38;5;12m (https://github.com/c-sto/recursebuster) - Content discovery tool to perform directory and file bruteforcing.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb shells and C2 frameworks[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBrowser Exploitation Framework (BeEF)[0m[38;5;12m (https://github.com/beefproject/beef) - Command and control server for delivering exploits to commandeered Web browsers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDAws[0m[38;5;12m (https://github.com/dotcppfile/DAws) - Advanced Web shell.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMerlin[0m[38;5;12m (https://github.com/Ne0nd0g/merlin) - Cross-platform post-exploitation HTTP/2 Command and Control server and agent written in Golang.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPhpSploit[0m[38;5;12m (https://github.com/nil0x42/phpsploit) - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSharPyShell[0m[38;5;12m (https://github.com/antonioCoco/SharPyShell) - Tiny and obfuscated ASP.NET webshell for C# web applications.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mweevely3[0m[38;5;12m (https://github.com/epinna/weevely3) - Weaponized PHP-based web shell.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb-accessible source code ripping tools[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDVCS Ripper[0m[38;5;12m (https://github.com/kost/dvcs-ripper) - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mGitTools[0m[38;5;12m (https://github.com/internetwache/GitTools) - Automatically find and download Web-accessible [39m[48;5;235m[38;5;249m.git[49m[39m[38;5;12m repositories.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgit-dumper[0m[38;5;12m (https://github.com/arthaud/git-dumper) - Tool to dump a git repository from a website.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mgit-scanner[0m[38;5;12m (https://github.com/HightechSec/git-scanner) - Tool for bug hunting or pentesting websites that have open [39m[48;5;235m[38;5;249m.git[49m[39m[38;5;12m repositories available in public.[39m
|
||
|
||
[38;2;255;187;0m[4mWeb Exploitation Books[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Browser Hacker's Handbook by Wade Alcorn et al., 2014[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html)[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mThe Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011[0m[38;5;12m (http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)[39m
|
||
|
||
[38;2;255;187;0m[4mWindows Utilities[0m
|
||
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mBloodhound[0m[38;5;12m (https://github.com/adaptivethreat/Bloodhound/wiki) - Graphical Active Directory trust relationship explorer.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCommando VM[0m[38;5;12m (https://github.com/fireeye/commando-vm) - Automated installation of over 140 Windows software packages for penetration testing and red teaming.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mCovenant[0m[38;5;12m (https://github.com/cobbr/Covenant) - ASP.NET Core application that serves as a collaborative command and control platform for red teamers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mctftool[0m[38;5;12m (https://github.com/taviso/ctftool) - Interactive Collaborative Translation Framework (CTF) exploration tool capable of launching cross-session edit session attacks.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mDeathStar[0m[38;5;12m (https://github.com/byt3bl33d3r/DeathStar) - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mEmpire[0m[38;5;12m (https://www.powershellempire.com/) - Pure PowerShell post-exploitation agent.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mFibratus[0m[38;5;12m (https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mInveigh[0m[38;5;12m (https://github.com/Kevin-Robertson/Inveigh) - Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/machine-in-the-middle tool.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mLaZagne[0m[38;5;12m (https://github.com/AlessandroZ/LaZagne) - Credentials recovery project.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mMailSniper[0m[38;5;12m [39m[38;5;12m(https://github.com/dafthack/MailSniper)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mModular[39m[38;5;12m [39m[38;5;12mtool[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12msearching[39m[38;5;12m [39m[38;5;12mthrough[39m[38;5;12m [39m[38;5;12memail[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mMicrosoft[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m[38;5;12menvironment,[39m[38;5;12m [39m[38;5;12mgathering[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mGlobal[39m[38;5;12m [39m[38;5;12mAddress[39m[38;5;12m [39m[38;5;12mList[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mOutlook[39m[38;5;12m [39m[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mAccess[39m[38;5;12m [39m[38;5;12m(OWA)[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mExchange[39m[38;5;12m [39m
|
||
[38;5;12mWeb[39m[38;5;12m [39m[38;5;12mServices[39m[38;5;12m [39m[38;5;12m(EWS),[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmore.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mPowerSploit[0m[38;5;12m (https://github.com/PowerShellMafia/PowerSploit) - PowerShell Post-Exploitation Framework.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRID_ENUM[0m[38;5;12m (https://github.com/trustedsec/ridenum) - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mResponder[0m[38;5;12m (https://github.com/SpiderLabs/Responder) - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRubeus[0m[38;5;12m (https://github.com/GhostPack/Rubeus) - Toolset for raw Kerberos interaction and abuses.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mRuler[0m[38;5;12m (https://github.com/sensepost/ruler) - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSCOMDecrypt[0m[38;5;12m (https://github.com/nccgroup/SCOMDecrypt) - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mSysinternals Suite[0m[38;5;12m (https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite) - The Sysinternals Troubleshooting Utilities.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Credentials Editor[0m[38;5;12m (https://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWindows Exploit Suggester[0m[38;5;12m (https://github.com/GDSSecurity/Windows-Exploit-Suggester) - Detects potential missing patches on the target.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mmimikatz[0m[38;5;12m (http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mredsnarf[0m[38;5;12m (https://github.com/nccgroup/redsnarf) - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mwePWNise[0m[38;5;12m [39m[38;5;12m(https://labs.mwrinfosecurity.com/tools/wepwnise/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mGenerates[39m[38;5;12m [39m[38;5;12marchitecture[39m[38;5;12m [39m[38;5;12mindependent[39m[38;5;12m [39m[38;5;12mVBA[39m[38;5;12m [39m[38;5;12mcode[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mused[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mOffice[39m[38;5;12m [39m[38;5;12mdocuments[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m[38;5;12mtemplates[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mautomates[39m[38;5;12m [39m[38;5;12mbypassing[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mcontrol[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexploit[39m[38;5;12m [39m
|
||
[38;5;12mmitigation[39m[38;5;12m [39m[38;5;12msoftware.[39m
|
||
[48;5;12m[38;5;11m⟡[49m[39m[38;5;12m [39m[38;5;14m[1mWinPwn[0m[38;5;12m (https://github.com/SecureThisShit/WinPwn) - Internal penetration test script to perform local and domain reconnaissance, privilege escalation and exploitation.[39m
|
||
|
||
[38;2;255;187;0m[4mLicense[0m
|
||
|
||
[38;5;14m[1m![0m[38;5;12mCC-BY[39m[38;5;14m[1m (https://mirrors.creativecommons.org/presskit/buttons/88x31/svg/by.svg)[0m[38;5;12m (https://creativecommons.org/licenses/by/4.0/)[39m
|
||
|
||
[38;5;12mThis work is licensed under a [39m[38;5;14m[1mCreative Commons Attribution 4.0 International License[0m[38;5;12m (https://creativecommons.org/licenses/by/4.0/).[39m
|