Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/enaqx/awesome-pentest
Last synced: 1 day ago
JSON representation
-
Anonymity Tools
-
Tor Tools
- Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
- OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
- Tails - Live operating system aiming to preserve your privacy and anonymity.
-
- I2P - The Invisible Internet Project.
- Metadata Anonymization Toolkit (MAT) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.
- What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
- I2P - The Invisible Internet Project.
-
-
Android Utilities
- cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
-
Anti-virus Evasion Tools
-
Tor Tools
- Hyperion - Runtime encryptor for 32-bit portable executables ("PE `.exe`s").
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Veil - Generate metasploit payloads that bypass common anti-virus solutions.
-
-
Books
-
Tor Tools
- DEF CON Suggested Reading
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Android Hacker's Handbook by Joshua J. Drake et al., 2014
- BTFM: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Bug Hunter's Diary by Tobias Klein, 2011
- Car Hacker's Handbook by Craig Smith, 2016
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
- Professional Penetration Testing by Thomas Wilhelm, 2013
- The Art of Exploitation by Jon Erickson, 2008
- The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- iOS Hacker's Handbook by Charlie Miller et al., 2012
- The Hacker Playbook by Peter Kim, 2014
- DEF CON Suggested Reading
- Effective Software Testing, 2021
- The Art of Network Penetration Testing, 2020
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- RTFM: Red Team Field Manual by Ben Clark, 2014
-
Malware Analysis Books
-
-
Cloud Platform Attack Tools
-
Malware Analysis Books
- HackingThe.cloud
- Cloud Container Attack Tool (CCAT) - Tool for testing security of container environments.
-
-
Collaboration Tools
-
Malware Analysis Books
- Dradis - Open-source reporting and collaboration tool for IT security professionals.
- Hexway Hive - Commercial collaboration, data aggregation, and reporting framework for red teams with a limited free self-hostable option.
- Lair - Reactive attack collaboration framework and web application built with meteor.
- Reconmap - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
-
-
Conferences and Events
-
Malware Analysis Books
- BSides - Framework for organising and holding security conferences.
- CTFTime.org - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
-
Asia
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- HITCON - Hacks In Taiwan Conference held in Taiwan.
- SECUINSIDE - Security Conference in Seoul.
- Nullcon - Annual conference in Delhi and Goa, India.
- HITCON - Hacks In Taiwan Conference held in Taiwan.
-
Europe
- 44Con - Annual Security Conference held in London.
- BruCON - Annual security conference in Belgium.
- CCC - Annual meeting of the international hacker scene in Germany.
- DeepSec - Security Conference in Vienna, Austria.
- FSec - FSec - Croatian Information Security Gathering in Varaždin, Croatia.
- Hack.lu - Annual conference held in Luxembourg.
- Infosecurity Europe - Europe's number one information security event, held in London, UK.
- SteelCon - Security conference in Sheffield UK.
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- Troopers - Annual international IT Security event with workshops held in Heidelberg, Germany.
- HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
-
North America
- AppSecUSA - Annual conference organized by OWASP.
- Black Hat - Annual security conference in Las Vegas.
- CarolinaCon - Infosec conference, held annually in North Carolina.
- DEF CON - Annual hacker convention in Las Vegas.
- DerbyCon - Annual hacker conference based in Louisville.
- Hackers Next Door - Cybersecurity and social technology conference held in New York City.
- Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
- Hackfest - Largest hacking conference in Canada.
- LayerOne - Annual US security conference held every spring in Los Angeles.
- National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- SkyDogCon - Technology conference in Nashville.
- SummerCon - One of the oldest hacker conventions in America, held during Summer.
- ThotCon - Annual US hacker conference held in Chicago.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
- DEF CON - Annual hacker convention in Las Vegas.
-
South America
- Ekoparty - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.
- Hackers to Hackers Conference (H2HC) - Oldest security research (hacking) conference in Latin America and one of the oldest ones still active in the world.
-
Zealandia
- CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
-
-
File Format Analysis Tools
-
Zealandia
- Veles - Binary data visualization and analysis tool.
- Hachoir - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
-
-
Exfiltration Tools
-
GNU/Linux Utilities
-
Zealandia
- Linux Exploit Suggester - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
- Lynis - Auditing tool for UNIX-based systems.
- checksec.sh - Shell script designed to test what standard Linux OS and PaX security features are being used.
-
-
Hash Cracking Tools
-
Zealandia
- CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
- John the Ripper - Fast password cracker.
- Rar Crack - RAR bruteforce cracker.
-
-
Hex Editors
-
Zealandia
- Frhed - Binary file editor for Windows.
- Hex Fiend - Fast, open source, hex editor for macOS with support for viewing binary diffs.
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
-
-
Industrial Control and SCADA Systems
-
Zealandia
- OpalOPC - Commercial OPC UA vulnerability assessment tool, sold by Molemmat.
-
-
Intentionally Vulnerable Systems
-
Zealandia
-
Intentionally Vulnerable Systems as Docker Containers
- Damn Vulnerable Web Application (DVWA) - `docker pull citizenstig/dvwa`.
- OWASP Juice Shop - `docker pull bkimminich/juice-shop`.
- OWASP Mutillidae II Web Pen-Test Practice Application - `docker pull citizenstig/nowasp`.
- OWASP Security Shepherd - `docker pull ismisepaul/securityshepherd`.
- OWASP WebGoat Project 7.1 docker image - `docker pull webgoat/webgoat-7.1`.
- OWASP WebGoat Project 8.0 docker image - `docker pull webgoat/webgoat-8.0`.
- Vulnerability as a service: Heartbleed - `docker pull hmlio/vaas-cve-2014-0160`.
- Vulnerability as a service: SambaCry - `docker pull vulnerables/cve-2017-7494`.
- Vulnerability as a service: Shellshock - `docker pull hmlio/vaas-cve-2014-6271`.
- Vulnerable WordPress Installation - `docker pull wpscanteam/vulnerablewordpress`.
-
-
Lock Picking
-
Intentionally Vulnerable Systems as Docker Containers
-
-
Multi-paradigm Frameworks
-
Intentionally Vulnerable Systems as Docker Containers
- Armitage - Java-based GUI front-end for the Metasploit Framework.
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
-
-
Network Tools
-
Intentionally Vulnerable Systems as Docker Containers
- Intercepter-NG - Multifunctional network toolkit.
- Network-Tools.com - Website offering an interface to numerous basic network utilities like `ping`, `traceroute`, `whois`, and more.
- Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
- dsniff - Collection of tools for network auditing and pentesting.
- routersploit - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
- SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
-
DDoS Tools
-
Network Reconnaissance Tools
- DNSDumpster - Online DNS recon and search service.
- OWASP Amass - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
- dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
- nmap - Free security scanner for network exploration & security audits.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
-
Protocol Analyzers and Sniffers
- awesome-pcaptools
- Debookee - Simple and powerful network traffic analyzer for macOS.
- Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
- tcpdump/libpcap - Common packet analyzer that runs under the command line.
- Debookee - Simple and powerful network traffic analyzer for macOS.
-
Network Traffic Replay and Editing Tools
- TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
- WireEdit - Full stack WYSIWYG pcap editor (requires a free license to edit packets).
- bittwist - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.
- tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
-
Proxies and Machine-in-the-Middle (MITM) Tools
-
Wireless Network Tools
- Aircrack-ng - Set of tools for auditing wireless networks.
- BoopSuite - Suite of tools written in Python for wireless auditing.
- Bully - Implementation of the WPS brute force attack, written in C.
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi Protected Setup.
- Bully - Implementation of the WPS brute force attack, written in C.
-
-
Network Vulnerability Scanners
-
Wireless Network Tools
- Nessus - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
- Netsparker Application Security Scanner - Application security scanner to automatically find security flaws.
- Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
- OpenVAS - Free software implementation of the popular Nessus vulnerability assessment system.
-
Web Vulnerability Scanners
- Arachni - Scriptable framework for evaluating the security of web applications.
- Nikto - Noisy but fast black box web server and web application vulnerability scanner.
- SecApps - In-browser web application security testing suite.
- WPScan - Black box WordPress vulnerability scanner.
- Wapiti - Black box web application vulnerability scanner with built-in fuzzer.
- WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
- cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
- joomscan - Joomla vulnerability scanner.
- skipfish - Performant and adaptable active web application security reconnaissance tool.
-
-
Online Resources
-
Online Operating Systems Resources
- DistroWatch.com's Security Category - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
-
Online Penetration Testing Resources
- MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
- Metasploit Unleashed - Free Offensive Security Metasploit course.
- Open Web Application Security Project (OWASP) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
- Penetration Testing Execution Standard (PTES) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
- Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- Open Web Application Security Project (OWASP) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
-
Other Lists Online
- .NET Programming - Software framework for Microsoft Windows platform development.
- Infosec/hacking videos recorded by cooper - Collection of security conferences recorded by Cooper.
- Android Security - Collection of Android security related resources.
- AppSec - Resources for learning about application security.
- Awesome Awesomness - The List of the Lists.
- Blue Team - Awesome resources, tools, and other shiny things for cybersecurity blue teams.
- C/C++ Programming - One of the main language for open source security tools.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
- JavaScript Programming - In-browser development and scripting.
- Kali Linux Tools - List of tools present in Kali Linux.
- Python Programming by @vinta - General Python programming.
- Rawsec's CyberSecurity Inventory - An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ([Source](https://gitlab.com/rawsec/rawsec-cybersecurity-list))
- Ruby Programming by @markets - The de-facto language for writing exploits.
- SecTools - Top 125 Network Security Tools.
- Security - Software, libraries, documents, and other resources.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
-
Penetration Testing Report Templates
- T&VS Pentesting Report Template - Pentest report template provided by Test and Verification Services, Ltd.
-
-
Open Sources Intelligence (OSINT)
-
Penetration Testing Report Templates
- Depix - Tool for recovering passwords from pixelized screenshots (by de-pixelating text).
- Intrigue - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
- PacketTotal - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Zeek and Suricata IDS signatures under the hood).
- Spiderfoot - Multi-source OSINT automation tool with a Web UI and report visualizations.
-
Data Broker and Search Engine Services
- Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
- Threat Crowd - Search engine for threats.
- Virus Total - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
-
Dorking tools
- Google Hacking Database - Database of Google dorks; can be used for recon.
-
Metadata harvesting and analysis
- FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
-
Network device discovery tools
-
OSINT Online Resources
- GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
- NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
- WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
-
Web application and resource analysis tools
- BlindElephant - Web application fingerprinter.
- GraphQL Voyager - Represent any GraphQL API as an interactive graph, letting you explore data models from any Web site with a GraphQL query endpoint.
- Wappalyzer - Wappalyzer uncovers the technologies used on websites.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
-
-
Operating System Distributions
-
Web application and resource analysis tools
- Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
- ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
- BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
- Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
- Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
- Network Security Toolkit (NST) - Fedora-based GNU/Linux bootable live Operating System designed to provide easy access to best-of-breed open source network security applications.
- Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
- PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
-
-
Periodicals
-
Web application and resource analysis tools
- 2600: The Hacker Quarterly - American publication about technology and computer "underground" culture.
- Phrack Magazine - By far the longest running hacker zine.
-
-
Physical Access Tools
-
Web application and resource analysis tools
- AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
- Bash Bunny - Local exploit delivery tool in the form of a USB thumbdrive in which you write payloads in a DSL called BunnyScript.
- LAN Turtle - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
- Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
- USB Rubber Ducky - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
-
-
Privilege Escalation Tools
-
Web application and resource analysis tools
- GTFOBins - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
- LOLBAS (Living Off The Land Binaries and Scripts) - Documents binaries, scripts, and libraries that can be used for "Living Off The Land" techniques, i.e., binaries that can be used by an attacker to perform actions beyond their original purpose.
-
-
Reverse Engineering
-
Reverse Engineering Books
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
- Hacking the Xbox by Andrew Huang, 2003
- Practical Reverse Engineering by Bruce Dang et al., 2014
- Reverse Engineering for Beginners by Dennis Yurichev
- The IDA Pro Book by Chris Eagle, 2011
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
-
Reverse Engineering Tools
- angr - Platform-agnostic binary analysis framework.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- Evan's Debugger - OllyDbg-like debugger for GNU/Linux.
- Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- Ghidra - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
- Radare2 - Open source, crossplatform reverse engineering framework.
- WDK/WinDbg - Windows Driver Kit and WinDbg.
- binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
- dnSpy - Tool to reverse engineer .NET assemblies.
- x64dbg - Open source x64/x32 debugger for windows.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
-
-
Security Education Courses
-
Reverse Engineering Tools
- ARIZONA CYBER WARFARE RANGE - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
- European Union Agency for Network and Information Security - ENISA Cyber Security Training material.
- Offensive Security Training - Training from BackTrack/Kali developers.
- Open Security Training - Training material for computer security classes.
- Roppers Academy Training - Free courses on computing and security fundamentals designed to train a beginner to crush their first CTF.
- SANS Security Training - Computer Security Training & Certification.
- Offensive Security Training - Training from BackTrack/Kali developers.
-
-
Shellcoding Guides and Tutorials
-
Reverse Engineering Tools
- Exploit Writing Tutorials - Tutorials on how to develop exploits.
- Shellcode Examples - Shellcodes database.
- Shellcode Tutorial - Tutorial on how to write shellcode.
- The Shellcoder's Handbook by Chris Anley et al., 2007
-
-
Side-channel Tools
-
Reverse Engineering Tools
- ChipWhisperer - Complete open-source toolchain for side-channel power analysis and glitching attacks.
-
-
Social Engineering
-
Reverse Engineering Tools
-
Social Engineering Books
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- No Tech Hacking by Johnny Long & Jack Wiles, 2008
-
Social Engineering Online Resources
- Social Engineering Framework - Information resource for social engineers.
-
Social Engineering Tools
- King Phisher - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
- wifiphisher - Automated phishing attacks against WiFi networks.
-
-
Static Analyzers
-
Steganography Tools
-
Social Engineering Tools
- StegOnline - Web-based, enhanced, and open-source port of StegSolve.
-
-
Vulnerability Databases
-
Social Engineering Tools
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- CISA Known Vulnerabilities Database (KEV) - Vulnerabilities in various systems already known to America's cyber defense agency, the Cybersecurity and Infrastructure Security Agency, to be actively exploited.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
- Mozilla Foundation Security Advisories - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- Open Source Vulnerabilities (OSV) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
- Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
- SecuriTeam - Independent source of software vulnerability information.
-
-
Web Exploitation
-
Social Engineering Tools
- Offensive Web Testing Framework (OWTF) - Python-based framework for pentesting Web applications based on the OWASP Testing Guide.
- autochrome - Chrome browser profile preconfigured with appropriate settings needed for web application testing.
- badtouch - Scriptable network authentication cracker.
- sslstrip - Demonstration of the HTTPS stripping attacks.
-
Intercepting Web proxies
- Burp Suite - Integrated platform for performing security testing of web applications.
- Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
-
Web injection tools
- SQLmap - Automatic SQL injection and database takeover tool.
-
Web path discovery and bruteforcing tools
- DotDotPwn - Directory traversal fuzzer.
-
Web Exploitation Books
-
-
Windows Utilities
-
Web Exploitation Books
- Empire - Pure PowerShell post-exploitation agent.
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- Windows Exploit Suggester - Detects potential missing patches on the target.
- mimikatz - Credentials extraction tool for Windows operating system.
- wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
-
-
macOS Utilities
-
Intentionally Vulnerable Systems as Docker Containers
- Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
-
Programming Languages
Categories
Conferences and Events
38
Online Resources
35
Network Tools
33
Books
28
Reverse Engineering
20
Open Sources Intelligence (OSINT)
19
Vulnerability Databases
19
Network Vulnerability Scanners
13
Web Exploitation
12
Social Engineering
11
Intentionally Vulnerable Systems
11
Operating System Distributions
8
Security Education Courses
7
Anonymity Tools
7
Physical Access Tools
7
Windows Utilities
5
Shellcoding Guides and Tutorials
4
Collaboration Tools
4
Hex Editors
4
File Format Analysis Tools
4
Anti-virus Evasion Tools
4
Static Analyzers
3
GNU/Linux Utilities
3
Hash Cracking Tools
3
Privilege Escalation Tools
2
Periodicals
2
Multi-paradigm Frameworks
2
Exfiltration Tools
2
Cloud Platform Attack Tools
2
License
2
Steganography Tools
1
Side-channel Tools
1
Industrial Control and SCADA Systems
1
Android Utilities
1
macOS Utilities
1
Lock Picking
1
Sub Categories
Tor Tools
34
Social Engineering Tools
29
Reverse Engineering Tools
27
Web application and resource analysis tools
23
Intentionally Vulnerable Systems as Docker Containers
21
Other Lists Online
19
Zealandia
19
North America
17
Online Penetration Testing Resources
14
Europe
11
Wireless Network Tools
10
Malware Analysis Books
9
Web Exploitation Books
9
Web Vulnerability Scanners
9
Social Engineering Books
7
Reverse Engineering Books
6
Asia
5
Protocol Analyzers and Sniffers
5
Network Reconnaissance Tools
5
Penetration Testing Report Templates
5
Network Traffic Replay and Editing Tools
4
Intercepting Web proxies
4
DDoS Tools
3
OSINT Online Resources
3
Proxies and Machine-in-the-Middle (MITM) Tools
3
Data Broker and Search Engine Services
3
Network device discovery tools
3
South America
2
Metadata harvesting and analysis
1
Social Engineering Online Resources
1
Web injection tools
1
Dorking tools
1
Web path discovery and bruteforcing tools
1
Online Operating Systems Resources
1
Keywords
awesome
11
awesome-list
10
security
5
list
5
keypicking
1
lockpicking
1
locksmith
1
locksmithing
1
locksport
1
physec
1
physical-security
1
picking-locks
1
clr
1
csharp
1
dotnet
1
fsharp
1
android
1
application-security
1
curated
1
owasp
1
reading-list
1
metadata
1
python3
1
analysis-framework
1
automated-analysis
1
chinese
1
chinese-translation
1
domain-analysis
1
drop-ice
1
dynamic-analysis
1
malware-analysis
1
malware-collection
1
malware-research
1
malware-samples
1
network-traffic
1
static-analysis
1
threat-intelligence
1
threat-sharing
1
threatintel
1
honeypot
1
collections
1
python
1
python-framework
1
python-library
1
python-resources
1
collection
1
curated-list
1
ruby
1
ruby-libraries
1
bash
1