Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-pentest
https://github.com/0xh4di/awesome-pentest
Last synced: 1 day ago
JSON representation
-
Online Resources
-
Penetration Testing Resources
- Penetration Testing Execution Standard (PTES) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
- PENTEST-WIKI - Free online security knowledge library for pentesters and researchers.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
- InfoSec Institute - IT and security bootcamps.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
- XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
-
Exploit Development
- Shellcode Tutorial - Tutorial on how to write shellcode.
- Shellcode Examples - Shellcodes database.
- Exploit Writing Tutorials - Tutorials on how to develop exploits.
-
Open Sources Intelligence (OSINT) Resources
- CertGraph - Crawls a domain's SSL/TLS certificates for its certificate alternative names.
- Intel Techniques - Collection of OSINT tools. Menu on the left can be used to navigate through the categories.
- NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
- WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
- GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
-
Lock Picking Resources
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
-
Operating Systems
- Security related Operating Systems @ Rawsec - Complete list of security related operating systems.
- Digital Evidence & Forensics Toolkit (DEFT) - Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
-
Penetration Testing Report Templates
- T&VS Pentesting Report Template - Pentest report template provided by Test and Verification Services, Ltd.
-
-
Tools
-
OSINT Tools
- Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans.
- Shodan - World's first search engine for Internet-connected devices.
- recon-ng - Full-featured Web Reconnaissance framework written in Python.
- Threat Crowd - Search engine for threats.
- ZoomEye - Search engine for cyberspace that lets the user find specific network components.
- Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
- FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
- Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
-
Penetration Testing Distributions
- Kali - GNU/Linux distribution designed for digital forensics and penetration testing.
- ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
- BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
- Parrot - Distribution similar to Kali, with multiple architecture.
- Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
- PentestBox - Opensource pre-configured portable penetration testing environment for Windows OS.
- Android Tamer - OS for Android Security Professionals. Includes all the tools required for Android security testing.
-
Docker for Penetration Testing
-
Multi-paradigm Frameworks
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
- Armitage - Java-based GUI front-end for the Metasploit Framework.
-
Network vulnerability scanners
- Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
- Nikto - Noisy but fast black box web server and web application vulnerability scanner.
- SecApps - In-browser web application security testing suite.
- WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
- WPScan - Black box WordPress vulnerability scanner.
- cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
-
Network Tools
- Intercepter-NG - Multifunctional network toolkit.
- dsniff - Collection of tools for network auditing and pentesting.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
- Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
- nmap - Free security scanner for network exploration & security audits.
- DNSDumpster - Online DNS recon and search service.
- dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
- Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
- Dripcap - Caffeinated packet analyzer.
- BetterCAP - Modular, portable and easily extensible MITM framework.
- SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
-
Wireless Network Tools
- Aircrack-ng - Set of tools for auditing wireless networks.
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi Protected Setup.
- BoopSuite - Suite of tools written in Python for wireless auditing.
- Bully - Implementation of the WPS brute force attack, written in C.
-
Web Exploitation
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
- autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
- Wappalyzer - Wappalyzer uncovers the technologies used on websites.
- sslstrip - Demonstration of the HTTPS stripping attacks.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
-
Hex Editors
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- 0xED - Native macOS hex editor that supports plug-ins to display custom data types.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
-
File Format Analysis Tools
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- Veles - Binary data visualization and analysis tool.
-
Anti-virus Evasion Tools
- Veil - Generate metasploit payloads that bypass common anti-virus solutions.
- shellsploit - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
- peCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
-
Hash Cracking Tools
-
Windows Utilities
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- Empire - Pure PowerShell post-exploitation agent.
- wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
-
GNU/Linux Utilities
- Lynis - Auditing tool for UNIX-based systems.
-
DDoS Tools
- JS LOIC - JavaScript in-browser version of LOIC.
- HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
- Anevicon - The most powerful UDP-based load generator, written in Rust.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- T50 - Faster network stress tool.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
-
Social Engineering Tools
- ShellPhish - Social media site cloner and phishing tool built atop SocialFish.
-
Anonymity Tools
- Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
- OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
- dos-over-tor - Proof of concept denial of service over Tor stress test tool.
-
Reverse Engineering Tools
- Ghidra - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
-
Physical Access Tools
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
- AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
-
macOS Utilities
- Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
-
-
Books
-
Penetration Testing Books
- Btfm: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
-
Hackers Handbook Series
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Shellcoders Handbook by Chris Anley et al., 2007
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
- iOS Hackers Handbook by Charlie Miller et al., 2012
- Android Hackers Handbook by Joshua J. Drake et al., 2014
- The Browser Hackers Handbook by Wade Alcorn et al., 2014
- The Mobile Application Hackers Handbook by Dominic Chell et al., 2015
-
Defensive Development
-
Network Analysis Books
-
Reverse Engineering Books
-
Malware Analysis Books
-
Social Engineering Books
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
-
Lock Picking Books
-
Defcon Suggested Reading
-
-
Vulnerability Databases
-
Defcon Suggested Reading
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
- Distributed Weakness Filing (DWF) - Federated CNA (CVE Number Authority) mirroring MITRE's CVE database and offering additional CVE-equivalent numbers to otherwise out-of-scope vulnerability disclosures.
-
-
Security Courses
-
Defcon Suggested Reading
- Offensive Security Training - Training from BackTrack/Kali developers.
-
-
Information Security Conferences
-
Defcon Suggested Reading
- CCC - Annual meeting of the international hacker scene in Germany.
- DerbyCon - Annual hacker conference based in Louisville.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
- Hack.lu - Annual conference held in Luxembourg.
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- DeepSec - Security Conference in Vienna, Austria.
- SECUINSIDE - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul).
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- 44Con - Annual Security Conference held in London.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
- DEF CON - Annual hacker convention in Las Vegas.
-
-
Information Security Magazines
-
Defcon Suggested Reading
- 2600: The Hacker Quarterly - American publication about technology and computer "underground" culture.
- Phrack Magazine - By far the longest running hacker zine.
-
-
Awesome Lists
-
Defcon Suggested Reading
- C/C++ Programming - One of the main language for open source security tools.
- .NET Programming - Software framework for Microsoft Windows platform development.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
- Ruby Programming by @markets - The de-facto language for writing exploits.
- JavaScript Programming - In-browser development and scripting.
- Python Programming by @vinta - General Python programming.
- Android Security - Collection of Android security related resources.
- Awesome Awesomness - The List of the Lists.
- AppSec - Resources for learning about application security.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- Malware Analysis - Tools and resources for analysts.
- PCAP Tools - Tools for processing network traffic.
- Security - Software, libraries, documents, and other resources.
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
-
Categories
Sub Categories
Defcon Suggested Reading
47
DDoS Tools
16
Penetration Testing Resources
14
Network Tools
12
OSINT Tools
8
Hackers Handbook Series
8
Penetration Testing Distributions
7
Web Exploitation
6
Network vulnerability scanners
6
Penetration Testing Books
5
Social Engineering Books
5
Wireless Network Tools
5
Open Sources Intelligence (OSINT) Resources
5
Anti-virus Evasion Tools
5
Reverse Engineering Tools
5
Physical Access Tools
3
Reverse Engineering Books
3
Docker for Penetration Testing
3
Hex Editors
3
Exploit Development
3
Windows Utilities
3
Anonymity Tools
3
File Format Analysis Tools
2
Operating Systems
2
Network Analysis Books
2
Malware Analysis Books
2
Multi-paradigm Frameworks
2
Hash Cracking Tools
2
Defensive Development
2
Lock Picking Books
2
macOS Utilities
1
Lock Picking Resources
1
Social Engineering Tools
1
Penetration Testing Report Templates
1
GNU/Linux Utilities
1
Keywords
awesome
10
awesome-list
8
security
5
list
5
hacking
2
fsharp
1
bash
1
cli
1
fish
1
shell
1
zsh
1
collection
1
curated-list
1
ruby
1
ruby-libraries
1
collections
1
python
1
python-framework
1
python-library
1
dotnet
1
csharp
1
clr
1
resources
1
programming-tutorial
1
lists
1
libraries
1
cppcon
1
cpp-library
1
cpp
1
c-plus-plus
1
c
1
pentest
1
remote-administrator-tool
1
post-exploitation
1
pentesting
1
macos
1
data-mining
1
threatintel
1
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-research
1
malware-collection
1
malware-analysis
1
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1