Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
fucking-awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things. With repository stars⭐ and forks🍴
https://github.com/Correia-jpv/fucking-awesome-pentest
Last synced: 4 days ago
JSON representation
-
Shellcoding Guides and Tutorials
-
Reverse Engineering Tools
- Exploit Writing Tutorials - Tutorials on how to develop exploits.
- Shellcode Examples - Shellcodes database.
- The Shellcoder's Handbook by Chris Anley et al., 2007
-
-
Windows Utilities
-
Web Exploitation Books
- Empire - Pure PowerShell post-exploitation agent.
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
-
-
Social Engineering
-
Social Engineering Books
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
-
-
Android Utilities
- cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
-
Anonymity Tools
-
- Metadata Anonymization Toolkit (MAT) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.
-
Tor Tools
-
-
Anti-virus Evasion Tools
-
Tor Tools
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
- Veil - Generate metasploit payloads that bypass common anti-virus solutions.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
-
-
Books
-
Tor Tools
- DEF CON Suggested Reading
- BTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Bug Hunter's Diary by Tobias Klein, 2011
- Car Hacker's Handbook by Craig Smith, 2016
- Effective Software Testing, 2021
- Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- The Art of Exploitation by Jon Erickson, 2008
- The Art of Network Penetration Testing, 2020
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- Android Hacker's Handbook by Joshua J. Drake et al., 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- RTFM: Red Team Field Manual by Ben Clark, 2014
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015
- iOS Hacker's Handbook by Charlie Miller et al., 2012
-
Malware Analysis Books
-
-
Vulnerability Databases
-
Social Engineering Tools
- CISA Known Vulnerabilities Database (KEV) - Vulnerabilities in various systems already known to America's cyber defense agency, the Cybersecurity and Infrastructure Security Agency, to be actively exploited.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- Open Source Vulnerabilities (OSV) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
-
-
Cloud Platform Attack Tools
-
Malware Analysis Books
- HackingThe.cloud
- Cloud Container Attack Tool (CCAT) - Tool for testing security of container environments.
-
-
Collaboration Tools
-
Malware Analysis Books
- Dradis - Open-source reporting and collaboration tool for IT security professionals.
- Hexway Hive - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.
- Reconmap - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
- Lair - Reactive attack collaboration framework and web application built with meteor.
-
-
Conferences and Events
-
Malware Analysis Books
- CTFTime.org - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
-
Asia
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- HITCON - Hacks In Taiwan Conference held in Taiwan.
- SECUINSIDE - Security Conference in Seoul.
-
Europe
- 44Con - Annual Security Conference held in London.
- CCC - Annual meeting of the international hacker scene in Germany.
- DeepSec - Security Conference in Vienna, Austria.
- Hack.lu - Annual conference held in Luxembourg.
- SteelCon - Security conference in Sheffield UK.
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
-
North America
- CarolinaCon - Infosec conference, held annually in North Carolina.
- DEF CON - Annual hacker convention in Las Vegas.
- DerbyCon - Annual hacker conference based in Louisville.
- Hackers Next Door - Cybersecurity and social technology conference held in New York City.
- Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
- National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- SummerCon - One of the oldest hacker conventions in America, held during Summer.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
- PhreakNIC - Technology conference held annually in middle Tennessee.
-
South America
- Hackers to Hackers Conference (H2HC) - Oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.
-
-
Exfiltration Tools
-
Zealandia
- Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
-
-
File Format Analysis Tools
-
Zealandia
- peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
- Veles - Binary data visualization and analysis tool.
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
-
-
GNU/Linux Utilities
-
Zealandia
- Lynis - Auditing tool for UNIX-based systems.
-
-
Hash Cracking Tools
-
Hex Editors
-
Zealandia
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
-
-
Industrial Control and SCADA Systems
-
Zealandia
- OpalOPC - Commercial OPC UA vulnerability assessment tool, sold by Molemmat.
-
-
Intentionally Vulnerable Systems
-
Zealandia
-
Intentionally Vulnerable Systems as Docker Containers
- Vulnerable WordPress Installation - `docker pull wpscanteam/vulnerablewordpress`.
-
-
Network Tools
-
Intentionally Vulnerable Systems as Docker Containers
- dsniff - Collection of tools for network auditing and pentesting.
- Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
- Intercepter-NG - Multifunctional network toolkit.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
-
DDoS Tools
-
Network Reconnaissance Tools
- DNSDumpster - Online DNS recon and search service.
- nmap - Free security scanner for network exploration & security audits.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
- dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
-
Protocol Analyzers and Sniffers
- Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
- Debookee - Simple and powerful network traffic analyzer for macOS.
- awesome-pcaptools
-
Network Traffic Replay and Editing Tools
- TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
- tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
-
Proxies and Machine-in-the-Middle (MITM) Tools
- BetterCAP - Modular, portable and easily extensible MITM framework.
-
Wireless Network Tools
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi Protected Setup.
- Aircrack-ng - Set of tools for auditing wireless networks.
- BoopSuite - Suite of tools written in Python for wireless auditing.
- Bully - Implementation of the WPS brute force attack, written in C.
-
-
Multi-paradigm Frameworks
-
Intentionally Vulnerable Systems as Docker Containers
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
- Armitage - Java-based GUI front-end for the Metasploit Framework.
-
-
Network Vulnerability Scanners
-
Wireless Network Tools
- Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
-
Web Vulnerability Scanners
- Nikto - Noisy but fast black box web server and web application vulnerability scanner.
- SecApps - In-browser web application security testing suite.
- WPScan - Black box WordPress vulnerability scanner.
- WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
- skipfish - Performant and adaptable active web application security reconnaissance tool.
-
-
Online Resources
-
Online Operating Systems Resources
- DistroWatch.com's Security Category - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
-
Online Penetration Testing Resources
- MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
- Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
-
Other Lists Online
- Rawsec's CyberSecurity Inventory - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([Source](https://gitlab.com/rawsec/rawsec-cybersecurity-list))
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
- .NET Programming - Software framework for Microsoft Windows platform development.
- Android Security - Collection of Android security related resources.
- AppSec - Resources for learning about application security.
- Awesome Awesomness - The List of the Lists.
- Blue Team - Awesome resources, tools, and other shiny things for cybersecurity blue teams.
- C/C++ Programming - One of the main language for open source security tools.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- JavaScript Programming - In-browser development and scripting.
- Python Programming by @vinta - General Python programming.
- Ruby Programming by @markets - The de-facto language for writing exploits.
- Security - Software, libraries, documents, and other resources.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
-
Penetration Testing Report Templates
- T&VS Pentesting Report Template - Pentest report template provided by Test and Verification Services, Ltd.
-
-
Open Sources Intelligence (OSINT)
-
Data Broker and Search Engine Services
- Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
- Threat Crowd - Search engine for threats.
-
Metadata harvesting and analysis
- FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
-
Network device discovery tools
- Shodan - World's first search engine for Internet-connected devices.
-
OSINT Online Resources
- GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
- WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
- NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
-
Web application and resource analysis tools
- Wappalyzer - Wappalyzer uncovers the technologies used on websites.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
-
-
Operating System Distributions
-
Web application and resource analysis tools
- Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
- ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
- BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
- Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
- Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
- Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
- PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
-
-
Periodicals
-
Web application and resource analysis tools
- 2600: The Hacker Quarterly - American publication about technology and computer "underground" culture.
- Phrack Magazine - By far the longest running hacker zine.
-
-
Physical Access Tools
-
Web application and resource analysis tools
- AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
- Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
-
-
Privilege Escalation Tools
-
Web application and resource analysis tools
- GTFOBins - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
- LOLBAS (Living Off The Land Binaries and Scripts) - Documents binaries, scripts, and libraries that can be used for "Living Off The Land" techniques, i.e., binaries that can be used by an attacker to perform actions beyond their original purpose.
-
-
Reverse Engineering
-
Reverse Engineering Books
-
Reverse Engineering Tools
- angr - Platform-agnostic binary analysis framework.
- Ghidra - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
-
-
Security Education Courses
-
Reverse Engineering Tools
- Offensive Security Training - Training from BackTrack/Kali developers.
- Roppers Academy Training - Free courses on computing and security fundamentals designed to train a beginner to crush their first CTF.
-
-
Web Exploitation
-
Social Engineering Tools
- autochrome - Chrome browser profile preconfigured with appropriate settings needed for web application testing.
- sslstrip - Demonstration of the HTTPS stripping attacks.
-
Intercepting Web proxies
- Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
-
Web path discovery and bruteforcing tools
- DotDotPwn - Directory traversal fuzzer.
-
Web Exploitation Books
-
-
Lock Picking
-
Intentionally Vulnerable Systems as Docker Containers
-
-
macOS Utilities
-
Intentionally Vulnerable Systems as Docker Containers
- Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
-
Programming Languages
Categories
Network Tools
22
Conferences and Events
22
Online Resources
21
Books
19
Vulnerability Databases
14
Open Sources Intelligence (OSINT)
9
Reverse Engineering
9
Web Exploitation
8
Operating System Distributions
7
Network Vulnerability Scanners
6
Social Engineering
5
Physical Access Tools
4
Collaboration Tools
4
Anti-virus Evasion Tools
3
File Format Analysis Tools
3
Windows Utilities
3
Anonymity Tools
3
Shellcoding Guides and Tutorials
3
License
2
Security Education Courses
2
Hex Editors
2
Periodicals
2
Multi-paradigm Frameworks
2
Hash Cracking Tools
2
Privilege Escalation Tools
2
Intentionally Vulnerable Systems
2
Cloud Platform Attack Tools
2
GNU/Linux Utilities
1
macOS Utilities
1
Android Utilities
1
Lock Picking
1
Industrial Control and SCADA Systems
1
Exfiltration Tools
1
Sub Categories
Tor Tools
23
Web application and resource analysis tools
17
Other Lists Online
16
Social Engineering Tools
16
Zealandia
11
Reverse Engineering Tools
10
North America
10
Intentionally Vulnerable Systems as Docker Containers
9
Malware Analysis Books
8
Web Exploitation Books
7
Europe
7
Wireless Network Tools
6
Web Vulnerability Scanners
5
Social Engineering Books
5
Reverse Engineering Books
4
Network Reconnaissance Tools
4
Asia
3
Protocol Analyzers and Sniffers
3
DDoS Tools
3
Online Penetration Testing Resources
3
OSINT Online Resources
3
Intercepting Web proxies
3
Data Broker and Search Engine Services
2
Network Traffic Replay and Editing Tools
2
Metadata harvesting and analysis
1
Proxies and Machine-in-the-Middle (MITM) Tools
1
South America
1
Penetration Testing Report Templates
1
Web path discovery and bruteforcing tools
1
Online Operating Systems Resources
1
Network device discovery tools
1
Keywords
awesome
11
awesome-list
10
security
5
list
5
keypicking
1
lockpicking
1
locksmith
1
locksmithing
1
locksport
1
physec
1
physical-security
1
picking-locks
1
data-mining
1
macos
1
pentesting
1
post-exploitation
1
remote-administrator-tool
1
clr
1
csharp
1
dotnet
1
fsharp
1
metadata
1
python3
1
analysis-framework
1
automated-analysis
1
chinese
1
chinese-translation
1
domain-analysis
1
drop-ice
1
dynamic-analysis
1
malware-analysis
1
malware-collection
1
malware-research
1
malware-samples
1
network-traffic
1
static-analysis
1
threat-intelligence
1
threat-sharing
1
threatintel
1
resources
1
ctf
1
penetration
1
hacking
1
honeyd
1
honeypot
1
collections
1
python
1
python-framework
1
python-library
1
python-resources
1