An open API service indexing awesome lists of open source software.

awesome-pentest

Collection of penetration testing tools
https://github.com/al1ex/awesome-pentest

Last synced: 4 days ago
JSON representation

  • Online Resources

  • Operating System Distributions

    • Penetration Testing Report Templates

      • Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
      • ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
      • Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
      • Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
      • BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
      • Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
      • PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
      • The Pentesters Framework - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that omits less frequently used utilities.
      • AttifyOS - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
      • BackBox - Ubuntu-based distribution for penetration tests and security assessments.
  • Network Tools

    • Protocol Analyzers and Sniffers

      • Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
      • Dripcap - Caffeinated packet analyzer.
      • Dshell - Network forensic analysis framework.
      • sniffglue - Secure multithreaded packet sniffer.
      • netsniff-ng - Swiss army knife for for network sniffing.
      • Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols.
      • Debookee - Simple and powerful network traffic analyzer for macOS.
      • Debookee - Simple and powerful network traffic analyzer for macOS.
    • Network Reconnaissance Tools

      • nmap - Free security scanner for network exploration & security audits.
      • DNSDumpster - Online DNS recon and search service.
      • zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
      • Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
      • fierce - Python3 port of the original `fierce.pl` DNS reconnaissance tool for locating non-contiguous IP space.
      • passivedns - Network sniffer that logs all DNS server replies for use in a passive DNS setup.
      • CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
      • XRay - Network (sub)domain discovery and reconnaissance automation tool.
      • smbmap - Handy SMB enumeration tool.
      • scanless - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
      • ACLight - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
      • ScanCannon - Python script to quickly enumerate large networks by calling `masscan` to quickly identify open ports and then `nmap` to gain details on the systems/services on those ports.
      • passivedns-client - Library and query tool for querying several passive DNS providers.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
    • Exfiltration Tools

      • Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
      • pwnat - Punches holes in firewalls and NATs.
      • Cloakify - Textual steganography toolkit that converts any filetype into lists of everyday strings.
      • DET - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
      • tgcd - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
    • Docker Containers of Penetration Testing Distributions and Tools

      • dsniff - Collection of tools for network auditing and pentesting.
      • THC Hydra - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.
      • rshijack - TCP connection hijacker, Rust rewrite of `shijack`.
      • scapy - Python-based interactive packet manipulation program & library.
      • CrackMapExec - Swiss army knife for pentesting networks.
      • Printer Exploitation Toolkit (PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
      • hping3 - Network tool able to send custom TCP/IP packets.
      • Zarp - Network attack tool centered around the exploitation of local networks.
      • dnstwist - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
      • pig - GNU/Linux packet crafting tool.
      • routersploit - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
      • Legion - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.
      • Network-Tools.com - Website offering an interface to numerous basic network utilities like `ping`, `traceroute`, `whois`, and more.
      • Intercepter-NG - Multifunctional network toolkit.
      • SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • IKEForce - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.
    • DDoS Tools

      • HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
      • Anevicon - Powerful UDP-based load generator, written in Rust.
      • SlowLoris - DoS tool that uses low bandwidth on the attacking side.
      • UFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
      • Memcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
      • JS LOIC - JavaScript in-browser version of LOIC.
    • Proxies and Machine-in-the-Middle (MITM) Tools

      • BetterCAP - Modular, portable and easily extensible MITM framework.
      • evilgrade - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
      • mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
      • SSH MITM - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
      • Morpheus - Automated ettercap TCP/IP Hijacking tool.
      • dnschef - Highly configurable DNS proxy for pentesters.
      • mallory - HTTP/HTTPS proxy over SSH.
      • oregano - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.
      • MITMf - Framework for Man-In-The-Middle attacks.
      • Habu - Python utility implementing a variety of network attacks, such as ARP poisoning, DHCP starvation, and more.
      • Lambda-Proxy - Utility for testing SQL Injection vulnerabilities on AWS Lambda serverless functions.
    • Wireless Network Tools

      • Aircrack-ng - Set of tools for auditing wireless networks.
      • BoopSuite - Suite of tools written in Python for wireless auditing.
      • Kismet - Wireless network detector, sniffer, and IDS.
      • Reaver - Brute force attack against WiFi Protected Setup.
      • wifi-arsenal - Resources for Wi-Fi Pentesting.
      • krackattacks-scripts - WPA2 Krack attack scripts.
      • Fluxion - Suite of automated social engineering based WPA attacks.
      • Wifite - Automated wireless attack tool.
      • Cowpatty - Brute-force dictionary attack against WPA-PSK.
      • Airgeddon - Multi-use bash script for Linux systems to audit wireless networks.
      • infernal-twin - Automated wireless hacking tool.
      • WiFi-Pumpkin - Framework for rogue Wi-Fi access point attack.
      • Bully - Implementation of the WPS brute force attack, written in C.
      • KRACK Detector - Detect and prevent KRACK attacks in your network.
    • Transport Layer Security Tools

      • SSLyze - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
      • tls_prober - Fingerprint a server's SSL/TLS implementation.
      • crackpkcs12 - Multithreaded program to crack PKCS#12 files (`.p12` and `.pfx` extensions), such as TLS/SSL certificates.
  • Anonymity Tools

    • Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
    • OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
    • kalitorify - Transparent proxy through Tor for Kali Linux OS.
    • Nipe - Script to redirect all traffic from the machine to the Tor network.
    • What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
    • I2P - The Invisible Internet Project.
  • Web Exploitation

    • Penetration Testing Report Templates

      • Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
      • Wappalyzer - Wappalyzer uncovers the technologies used on websites.
      • autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
      • sslstrip - Demonstration of the HTTPS stripping attacks.
      • OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
      • EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
      • WhatWeb - Website fingerprinter.
      • Browser Exploitation Framework (BeEF) - Command and control server for delivering exploits to commandeered Web browsers.
      • GitTools - Automatically find and download Web-accessible `.git` repositories.
      • Commix - Automated all-in-one operating system command injection and exploitation tool.
      • wafw00f - Identifies and fingerprints Web Application Firewall (WAF) products.
      • FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
      • Raccoon - High performance offensive security tool for reconnaissance and vulnerability scanning.
      • WhatWaf - Detect and bypass web application firewalls and protection systems.
      • Kadabra - Automatic LFI exploiter and scanner.
      • weevely3 - Weaponized PHP-based web shell.
      • NoSQLmap - Automatic NoSQL injection and database takeover tool.
      • DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.
      • VHostScan - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
      • webscreenshot - Simple script to take screenshots of websites from a list of sites.
      • tplmap - Automatic server-side template injection and Web server takeover tool.
      • Wordpress Exploit Framework - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
      • fimap - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
      • badtouch - Scriptable network authentication cracker.
      • WPSploit - Exploit WordPress-powered websites with Metasploit.
      • Kadimus - LFI scan and exploit tool.
      • liffy - LFI exploitation tool.
      • sslstrip2 - SSLStrip version to defeat HSTS.
      • recursebuster - Content discovery tool to perform directory and file bruteforcing.
      • BlindElephant - Web application fingerprinter.
  • OSINT Tools

    • Web Vulnerability Scanners

      • Shodan - World's first search engine for Internet-connected devices.
      • Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
      • Threat Crowd - Search engine for threats.
      • FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
      • recon-ng - Full-featured Web Reconnaissance framework written in Python.
      • AQUATONE - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.
      • sn0int - Semi-automatic OSINT framework and package manager.
      • Sn1per - Automated Pentest Recon Scanner.
      • theHarvester - E-mail, subdomain and people names harvester.
      • BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.
      • snitch - Information gathering via dorks.
      • metagoofil - Metadata harvester.
      • gOSINT - OSINT tool with multiple modules and a telegram scraper.
      • github-dorks - CLI tool to scan GitHub repos/organizations for potential sensitive information leaks.
      • pagodo - Automate Google Hacking Database scraping.
      • SimplyEmail - Email recon made fast and easy.
      • creepy - Geolocation OSINT tool.
      • GyoiThon - GyoiThon is an Intelligence Gathering tool using Machine Learning.
      • surfraw - Fast UNIX command line interface to a variety of popular WWW search engines.
      • OWASP Amass - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
      • Virus Total - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
      • image-match - Quickly search over billions of images.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
      • Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
      • GooDork - Command line Google dorking tool.
      • dork-cli - Command line Google dork tool.
      • vcsmap - Plugin-based tool to scan public version control systems for sensitive information.
      • fast-recon - Perform Google dorks against a domain.
      • Intrigue - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
      • dorks - Google hack database automation tool.
      • Google Hacking Database - Database of Google dorks; can be used for recon.
      • PacketTotal - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Bro and Suricata IDS signatures under the hood).
  • Multi-paradigm Frameworks

    • Docker Containers of Penetration Testing Distributions and Tools

      • Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
      • Armitage - Java-based GUI front-end for the Metasploit Framework.
      • Faraday - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
      • Pupy - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
      • AutoSploit - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.
      • Decker - Penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.
  • Anti-virus Evasion Tools

    • UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
    • Veil - Generate metasploit payloads that bypass common anti-virus solutions.
    • peCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
    • AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
    • peCloakCapstone - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
    • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
  • Books

  • Conferences and Events

    • Windows Books

      • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
      • SECUINSIDE - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul).
      • 44Con - Annual Security Conference held in London.
      • CCC - Annual meeting of the international hacker scene in Germany.
      • DeepSec - Security Conference in Vienna, Austria.
      • Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
      • DerbyCon - Annual hacker conference based in Louisville.
      • RSA Conference USA - Annual security conference in San Francisco, California, USA.
      • CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
      • Hack.lu - Annual conference held in Luxembourg.
      • DEF CON - Annual hacker convention in Las Vegas.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • ShmooCon - Annual US East coast hacker convention.
      • CarolinaCon - Infosec conference, held annually in North Carolina.
      • DefCamp - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
      • Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
      • BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
      • Nullcon - Annual conference in Delhi and Goa, India.
      • BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
      • AppSecUSA - Annual conference organized by OWASP.
      • Black Hat - Annual security conference in Las Vegas.
  • File Format Analysis Tools

    • Docker Containers of Penetration Testing Distributions and Tools

      • Veles - Binary data visualization and analysis tool.
  • Hash Cracking Tools

    • Docker Containers of Penetration Testing Distributions and Tools

      • CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
      • Rar Crack - RAR bruteforce cracker.
      • JWT Cracker - Simple HS256 JSON Web Token (JWT) token brute force cracker.
      • BruteForce Wallet - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
      • StegCracker - Steganography brute-force utility to uncover hidden data inside files.
  • Hex Editors

    • Docker Containers of Penetration Testing Distributions and Tools

      • Hexinator - World's finest (proprietary, commercial) Hex Editor.
      • wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
      • 0xED - Native macOS hex editor that supports plug-ins to display custom data types.
      • hexedit - Simple, fast, console-based hex editor.
      • Bless - High quality, full featured, cross-platform graphical hex editor written in Gtk#.
      • Frhed - Binary file editor for Windows.
  • Network Vulnerability Scanners

    • Wireless Network Tools

      • Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
      • Vuls - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
    • Web Vulnerability Scanners

      • Nikto - Noisy but fast black box web server and web application vulnerability scanner.
      • SecApps - In-browser web application security testing suite.
      • WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
      • w3af - Web application attack and audit framework.
      • JCS - Joomla Vulnerability Component Scanner with automatic database updater from exploitdb and packetstorm.
      • ACSTIS - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
      • joomscan - Joomla vulnerability scanner.
      • Wapiti - Black box web application vulnerability scanner with built-in fuzzer.
  • Periodicals

    • Penetration Testing Report Templates

  • Physical Access Tools

    • Penetration Testing Report Templates

      • AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
      • Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
      • Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
      • PCILeech - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
  • Reverse Engineering Tools

    • Penetration Testing Report Templates

      • Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
      • UEFITool - UEFI firmware image viewer and editor.
      • peda - Python Exploit Development Assistance for GDB.
      • pwndbg - GDB plug-in that eases debugging with GDB, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers, and exploit developers.
      • Voltron - Extensible debugger UI toolkit written in Python.
      • Medusa - Open source, cross-platform interactive disassembler.
      • awesome-reversing
      • PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
      • boxxy - Linkable sandbox explorer.
      • dnSpy - Tool to reverse engineer .NET assemblies.
      • OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
      • Immunity Debugger - Powerful way to write exploits and analyze malware.
      • rVMI - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
      • WDK/WinDbg - Windows Driver Kit and WinDbg.
      • binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
      • plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
  • Vulnerability Databases

    • Penetration Testing Report Templates

      • Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
      • CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
      • Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
      • Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
      • HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
      • National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
      • US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
      • Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
      • Vulners - Security database of software vulnerabilities.
      • Distributed Weakness Filing (DWF) - Federated CNA (CVE Number Authority) mirroring MITRE's CVE database and offering additional CVE-equivalent numbers to otherwise out-of-scope vulnerability disclosures.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • SecuriTeam - Independent source of software vulnerability information.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
      • Mozilla Foundation Security Advisories - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
  • Windows Utilities

    • Penetration Testing Report Templates

      • Empire - Pure PowerShell post-exploitation agent.
      • Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
      • wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
      • Ruler - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.
      • Fibratus - Tool for exploration and tracing of the Windows kernel.
      • Covenant - ASP.NET Core application that serves as a collaborative command and control platform for red teamers.
      • PowerSploit - PowerShell Post-Exploitation Framework.
      • LaZagne - Credentials recovery project.
      • RID_ENUM - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.
      • Magic Unicorn - Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or `certutil` (using fake certificates).
      • Responder - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner.
      • DeathStar - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
      • MailSniper - Modular tool for searching through email in a Microsoft Exchange environment, gathering the Global Address List from Outlook Web Access (OWA) and Exchange Web Services (EWS), and more.
      • redsnarf - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
      • Commando VM - Automated installation of over 140 Windows software packages for penetration testing and red teaming.
      • Windows Exploit Suggester - Detects potential missing patches on the target.
      • Active Directory and Privilege Escalation (ADAPE) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory.
      • SCOMDecrypt - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.
  • Social Engineering Tools

    • Penetration Testing Report Templates

      • ShellPhish - Social media site cloner and phishing tool built atop SocialFish.
      • Social Engineer Toolkit (SET) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
      • Beelogger - Tool for generating keylooger.
      • Evilginx2 - Standalone man-in-the-middle attack framework.
      • Catphish - Tool for phishing and corporate espionage written in Ruby.
      • SocialFish - Social media phishing framework that can run on an Android phone or in a Docker container.
      • Modlishka - Flexible and powerful reverse proxy with real-time two-factor authentication.
      • FiercePhish - Full-fledged phishing framework to manage all phishing engagements.
      • Evilginx - MITM attack framework used for phishing credentials and session cookies from any Web service.
      • phishery - TLS/SSL enabled Basic Auth credential harvester.
      • King Phisher - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
      • wifiphisher - Automated phishing attacks against WiFi networks.
  • Security Education Courses

  • Static Analyzers

    • Penetration Testing Report Templates

      • sobelow - Security-focused static analysis for the Phoenix Framework.
      • Brakeman - Static analysis security vulnerability scanner for Ruby on Rails applications.
      • Progpilot - Static security analysis tool for PHP code.
      • RegEx-DoS - Analyzes source code for Regular Expressions susceptible to Denial of Service attacks.
      • bandit - Security oriented static analyser for Python code.
      • cppcheck - Extensible C/C++ static analyzer focused on finding bugs.
      • FindBugs - Free software static analyzer to look for bugs in Java code.
  • CTF Tools

    • Windows Books

      • Pwntools - Rapid exploit development framework built for use in CTFs.
      • ctf-tools - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
      • shellpop - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests.
      • RsaCtfTool - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
  • Docker Containers

  • macOS Utilities

    • Penetration Testing Report Templates

      • EvilOSX - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
      • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
  • Industrial Control and SCADA Systems

  • GNU/Linux Utilities

    • Docker Containers of Penetration Testing Distributions and Tools

      • LinEnum - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.
      • unix-privesc-check - Shell script to check for simple privilege escalation vectors on UNIX systems.
      • Hwacha - Post-exploitation tool to quickly execute payloads via SSH on one or more Linux systems simultaneously.
      • Linux Exploit Suggester - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
  • Collaboration Tools

    • Windows Books

      • RedELK - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.
  • Side-channel Tools

    • Penetration Testing Report Templates

      • ChipWhisperer - Complete open-source toolchain for side-channel power analysis and glitching attacks.