Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-pentest
https://github.com/sgxguru/awesome-pentest
Last synced: about 22 hours ago
JSON representation
-
Anonymity Tools
- Metadata Anonymization Toolkit (MAT) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.
- OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
- Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
- Nipe - Script to redirect all traffic from the machine to the Tor network.
- I2P - The Invisible Internet Project.
-
Anti-virus Evasion Tools
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Veil - Generate metasploit payloads that bypass common anti-virus solutions.
- peCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
-
Books
-
Defensive Programming Books
-
Hacker's Handbook Series Books
- Android Hacker's Handbook by Joshua J. Drake et al., 2014
- Car Hacker's Handbook by Craig Smith, 2016
- The Browser Hacker's Handbook by Wade Alcorn et al., 2014
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015
- The Shellcoder's Handbook by Chris Anley et al., 2007
- The Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011
- iOS Hacker's Handbook by Charlie Miller et al., 2012
-
Lock Picking Books
-
Malware Analysis Books
-
Network Analysis Books
-
Penetration Testing Books
- Btfm: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Bug Hunter's Diary by Tobias Klein, 2011
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- The Art of Exploitation by Jon Erickson, 2008
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
-
Reverse Engineering Books
-
Social Engineering Books
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
-
Windows Books
-
-
Collaboration Tools
-
Windows Books
- Lair - Reactive attack collaboration framework and web application built with meteor.
-
-
Conferences and Events
-
Asia
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- SECUINSIDE - Security Conference in Seoul.
- HITCON - Hacks In Taiwan Conference held in Taiwan.
-
Europe
- 44Con - Annual Security Conference held in London.
- CCC - Annual meeting of the international hacker scene in Germany.
- DeepSec - Security Conference in Vienna, Austria.
- Hack.lu - Annual conference held in Luxembourg.
- SteelCon - Security conference in Sheffield UK.
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
-
North America
- CarolinaCon - Infosec conference, held annually in North Carolina.
- DerbyCon - Annual hacker conference based in Louisville.
- Hackers Next Door - Cybersecurity and social technology conference held in New York City.
- Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
- National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- SummerCon - One of the oldest hacker conventions in America, held during Summer.
- DEF CON - Annual hacker convention in Las Vegas.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
-
-
Docker Containers
-
Docker Containers of Intentionally Vulnerable Systems
- Damn Vulnerable Web Application (DVWA) - `docker pull citizenstig/dvwa`.
- OWASP Mutillidae II Web Pen-Test Practice Application - `docker pull citizenstig/nowasp`.
- OWASP Security Shepherd - `docker pull ismisepaul/securityshepherd`.
- Vulnerability as a service: Heartbleed - `docker pull hmlio/vaas-cve-2014-0160`.
- Vulnerability as a service: Shellshock - `docker pull hmlio/vaas-cve-2014-6271`.
- Vulnerable WordPress Installation - `docker pull wpscanteam/vulnerablewordpress`.
-
Docker Containers of Penetration Testing Distributions and Tools
- Docker Bench for Security - `docker pull diogomonica/docker-bench-security`.
- Official Kali Linux - `docker pull kalilinux/kali-linux-docker`.
- Official WPScan - `docker pull wpscanteam/wpscan`.
- Security Ninjas - `docker pull opendns/security-ninjas`.
- docker-metasploit - `docker pull phocean/msf`.
-
-
File Format Analysis Tools
-
Docker Containers of Penetration Testing Distributions and Tools
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
- Veles - Binary data visualization and analysis tool.
- ExifTool - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.
-
-
GNU/Linux Utilities
-
Docker Containers of Penetration Testing Distributions and Tools
- Lynis - Auditing tool for UNIX-based systems.
-
-
Hash Cracking Tools
-
Hex Editors
-
Docker Containers of Penetration Testing Distributions and Tools
- 0xED - Native macOS hex editor that supports plug-ins to display custom data types.
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
- Hex Fiend - Fast, open source, hex editor for macOS with support for viewing binary diffs.
-
-
Multi-paradigm Frameworks
-
Docker Containers of Penetration Testing Distributions and Tools
- Armitage - Java-based GUI front-end for the Metasploit Framework.
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
-
-
Network Tools
-
Docker Containers of Penetration Testing Distributions and Tools
- Intercepter-NG - Multifunctional network toolkit.
- Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
- dsniff - Collection of tools for network auditing and pentesting.
- SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
-
DDoS Tools
-
Exfiltration Tools
- Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
-
Network Reconnaissance Tools
- DNSDumpster - Online DNS recon and search service.
- dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
- nmap - Free security scanner for network exploration & security audits.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
-
Protocol Analyzers and Sniffers
-
Network Traffic Replay and Editing Tools
- TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
- tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
-
Proxies and Machine-in-the-Middle (MITM) Tools
-
Wireless Network Tools
- Aircrack-ng - Set of tools for auditing wireless networks.
- BoopSuite - Suite of tools written in Python for wireless auditing.
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi Protected Setup.
- Bully - Implementation of the WPS brute force attack, written in C.
-
-
Network Vulnerability Scanners
-
Wireless Network Tools
- Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
-
Web Vulnerability Scanners
- Nikto - Noisy but fast black box web server and web application vulnerability scanner.
- SecApps - In-browser web application security testing suite.
- WPScan - Black box WordPress vulnerability scanner.
- WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
- cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
-
-
OSINT Tools
-
Data broker and search engine services
- Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
- Threat Crowd - Search engine for threats.
-
Metadata harvesting and analysis
- FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
-
Network device discovery tools
-
Web Vulnerability Scanners
- PacketTotal - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Bro and Suricata IDS signatures under the hood).
- Intrigue - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
- Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
-
-
Online Resources
-
Online Exploit Development Resources
- Exploit Writing Tutorials - Tutorials on how to develop exploits.
- Shellcode Examples - Shellcodes database.
-
Online Lock Picking Resources
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
- bosnianbill - Instructional lockpicking videos made by an expert.
-
Online Open Sources Intelligence (OSINT) Resources
- GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
- NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
- WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
-
Online Operating Systems Resources
- DistroWatch.com's Security Category - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
-
Online Penetration Testing Resources
- MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
- Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- Metasploit Unleashed - Free Offensive Security Metasploit course.
-
Other Lists Online
- .NET Programming - Software framework for Microsoft Windows platform development.
- Android Security - Collection of Android security related resources.
- AppSec - Resources for learning about application security.
- Awesome Awesomness - The List of the Lists.
- C/C++ Programming - One of the main language for open source security tools.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- Security-related Operating Systems - List of security related operating systems.
- JavaScript Programming - In-browser development and scripting.
- Malware Analysis - Tools and resources for analysts.
- PCAP Tools - Tools for processing network traffic.
- Python Programming by @vinta - General Python programming.
- Ruby Programming by @markets - The de-facto language for writing exploits.
- Security - Software, libraries, documents, and other resources.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
-
Penetration Testing Report Templates
- T&VS Pentesting Report Template - Pentest report template provided by Test and Verification Services, Ltd.
-
-
Operating System Distributions
-
Penetration Testing Report Templates
- Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
- ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
- BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
- Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
- Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
- Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
- PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
-
-
Periodicals
-
Penetration Testing Report Templates
- 2600: The Hacker Quarterly - American publication about technology and computer "underground" culture.
- Phrack Magazine - By far the longest running hacker zine.
-
-
Physical Access Tools
-
Penetration Testing Report Templates
- AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
- Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
-
-
Reverse Engineering Tools
-
Penetration Testing Report Templates
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- Ghidra - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
-
-
Security Education Courses
-
Penetration Testing Report Templates
- Offensive Security Training - Training from BackTrack/Kali developers.
- Open Security Training - Training material for computer security classes.
- SANS Security Training - Computer Security Training & Certification.
-
-
Social Engineering Tools
-
Penetration Testing Report Templates
- ShellPhish - Social media site cloner and phishing tool built atop SocialFish.
-
-
Vulnerability Databases
-
Penetration Testing Report Templates
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
- SecuriTeam - Independent source of software vulnerability information.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
-
-
Web Exploitation
-
Penetration Testing Report Templates
- Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- Wappalyzer - Wappalyzer uncovers the technologies used on websites.
- autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
- sslstrip - Demonstration of the HTTPS stripping attacks.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
-
-
Android Utilities
-
Penetration Testing Report Templates
- Android Open Pwn Project (AOPP) - Variant of the Android Open Source Project (AOSP), called Pwnix, is built from the ground up for network hacking and pentesting.
- cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
-
-
Windows Utilities
-
Penetration Testing Report Templates
- Empire - Pure PowerShell post-exploitation agent.
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
-
-
macOS Utilities
-
Penetration Testing Report Templates
- Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
-
Programming Languages
Categories
Books
42
Online Resources
35
Network Tools
24
Conferences and Events
20
Vulnerability Databases
15
Docker Containers
11
OSINT Tools
9
Operating System Distributions
7
Web Exploitation
6
Network Vulnerability Scanners
6
Anonymity Tools
5
Reverse Engineering Tools
5
Physical Access Tools
4
Hex Editors
4
Anti-virus Evasion Tools
4
File Format Analysis Tools
4
Security Education Courses
3
Windows Utilities
3
Multi-paradigm Frameworks
2
Periodicals
2
Hash Cracking Tools
2
Android Utilities
2
License
2
GNU/Linux Utilities
1
macOS Utilities
1
Social Engineering Tools
1
Collaboration Tools
1
Sub Categories
Penetration Testing Report Templates
52
Docker Containers of Penetration Testing Distributions and Tools
23
Other Lists Online
17
Penetration Testing Books
11
North America
10
Hacker's Handbook Series Books
9
Online Penetration Testing Resources
9
Web Vulnerability Scanners
8
Europe
7
Wireless Network Tools
6
Docker Containers of Intentionally Vulnerable Systems
6
Social Engineering Books
5
Windows Books
4
Network Reconnaissance Tools
4
Reverse Engineering Books
4
Malware Analysis Books
3
Asia
3
DDoS Tools
3
Online Open Sources Intelligence (OSINT) Resources
3
Network device discovery tools
3
Lock Picking Books
2
Defensive Programming Books
2
Network Traffic Replay and Editing Tools
2
Protocol Analyzers and Sniffers
2
Data broker and search engine services
2
Online Lock Picking Resources
2
Proxies and Machine-in-the-Middle (MITM) Tools
2
Network Analysis Books
2
Online Exploit Development Resources
2
Metadata harvesting and analysis
1
Exfiltration Tools
1
Online Operating Systems Resources
1
Keywords
awesome
10
awesome-list
8
list
5
security
4
cpp
1
cpp-library
1
cppcon
1
libraries
1
lists
1
programming-tutorial
1
resources
1
ctf
1
penetration
1
hacking
1
honeyd
1
honeypot
1
analysis-framework
1
automated-analysis
1
chinese
1
c-plus-plus
1
c
1
security-experts
1
reading-list
1
owasp
1
curated
1
application-security
1
android
1
fsharp
1
dotnet
1
csharp
1
clr
1
python3
1
python-framework
1
python-library
1
python-resources
1
collection
1
curated-list
1
ruby
1
ruby-libraries
1
bash
1
cli
1
fish
1
shell
1
zsh
1
data-mining
1
macos
1
pentesting
1
post-exploitation
1
metadata
1
chinese-translation
1