An open API service indexing awesome lists of open source software.

awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/eric-erki/awesome-pentest

Last synced: 6 days ago
JSON representation

  • Awesome Lists

  • Tools

    • Penetration Testing Distributions

      • Kali - GNU/Linux distribution designed for digital forensics and penetration testing.
      • ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
      • Parrot - Distribution similar to Kali, with multiple architecture.
      • BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
      • Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
      • PentestBox - Opensource pre-configured portable penetration testing environment for Windows OS.
      • The Pentesters Framework - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.
      • AttifyOS - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
      • BackBox - Ubuntu-based distribution for penetration tests and security assessments.
      • BackBox - Ubuntu-based distribution for penetration tests and security assessments.
    • Network Tools

      • Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
      • nmap - Free security scanner for network exploration & security audits.
      • Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
      • Intercepter-NG - Multifunctional network toolkit.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • dsniff - Collection of tools for network auditing and pentesting.
      • DNSDumpster - Online DNS recon and search service.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
      • BetterCAP - Modular, portable and easily extensible MITM framework.
      • Dripcap - Caffeinated packet analyzer.
      • Dshell - Network forensic analysis framework.
      • Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
      • THC Hydra - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.
      • evilgrade - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
      • mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
      • fierce - Python3 port of the original `fierce.pl` DNS reconnaissance tool for locating non-contiguous IP space.
      • passivedns - Network sniffer that logs all DNS server replies for use in a passive DNS setup.
      • SSH MITM - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
      • CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
      • XRay - Network (sub)domain discovery and reconnaissance automation tool.
      • scapy - Python-based interactive packet manipulation program & library.
      • CrackMapExec - Swiss army knife for pentesting networks.
      • Printer Exploitation Toolkit (PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
      • Zarp - Network attack tool centered around the exploitation of local networks.
      • Morpheus - Automated ettercap TCP/IP Hijacking tool.
      • pwnat - Punches holes in firewalls and NATs.
      • smbmap - Handy SMB enumeration tool.
      • dnstwist - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
      • dnschef - Highly configurable DNS proxy for pentesters.
      • mallory - HTTP/HTTPS proxy over SSH.
      • scanless - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
      • ACLight - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
      • netsniff-ng - Swiss army knife for for network sniffing.
      • Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols.
      • ScanCannon - Python script to quickly enumerate large networks by calling `masscan` to quickly identify open ports and then `nmap` to gain details on the systems/services on those ports.
      • pig - GNU/Linux packet crafting tool.
      • MITMf - Framework for Man-In-The-Middle attacks
      • DET - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
      • passivedns-client - Library and query tool for querying several passive DNS providers.
      • routersploit - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
      • Network-Tools.com - Website offering an interface to numerous basic network utilities like `ping`, `traceroute`, `whois`, and more.
      • Intercepter-NG - Multifunctional network toolkit.
      • SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • IKEForce - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • Debookee - Simple and powerful network traffic analyzer for macOS.
      • tgcd - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
      • Debookee - Simple and powerful network traffic analyzer for macOS.
    • Anonymity Tools

      • Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
      • OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
      • oregano - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.
      • Nipe - Script to redirect all traffic from the machine to the Tor network.
      • What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
      • I2P - The Invisible Internet Project.
    • Web Exploitation

      • Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
      • Wappalyzer - Wappalyzer uncovers the technologies used on websites.
      • autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
      • sslstrip - Demonstration of the HTTPS stripping attacks.
      • OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
      • EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
      • WhatWeb - Website fingerprinter.
      • Browser Exploitation Framework (BeEF) - Command and control server for delivering exploits to commandeered Web browsers.
      • GitTools - Automatically find and download Web-accessible `.git` repositories.
      • Commix - Automated all-in-one operating system command injection and exploitation tool.
      • wafw00f - Identifies and fingerprints Web Application Firewall (WAF) products.
      • FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
      • Raccoon - A high performance offensive security tool for reconnaissance and vulnerability scanning
      • Kadabra - Automatic LFI exploiter and scanner.
      • weevely3 - Weaponized web shell.
      • DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.
      • VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
      • webscreenshot - A simple script to take screenshots of list of websites.
      • tplmap - Automatic server-side template injection and Web server takeover tool.
      • Wordpress Exploit Framework - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
      • fimap - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
      • WPSploit - Exploit WordPress-powered websites with Metasploit.
      • Kadimus - LFI scan and exploit tool.
      • liffy - LFI exploitation tool.
      • sslstrip2 - SSLStrip version to defeat HSTS.
      • NoSQLmap - Automatic NoSQL injection and database takeover tool.
      • recursebuster - Content discovery tool to perform directory and file bruteforcing.
      • BlindElephant - Web application fingerprinter.
    • OSINT Tools

      • Shodan - World's first search engine for Internet-connected devices.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
      • Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
      • Threat Crowd - Search engine for threats.
      • FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
      • recon-ng - Full-featured Web Reconnaissance framework written in Python.
      • AQUATONE - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.
      • Sn1per - Automated Pentest Recon Scanner.
      • theHarvester - E-mail, subdomain and people names harvester.
      • BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.
      • snitch - Information gathering via dorks.
      • metagoofil - Metadata harvester.
      • gOSINT - OSINT tool with multiple modules and a telegram scraper.
      • github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak.
      • creepy - Geolocation OSINT tool.
      • OWASP Amass - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
      • Virus Total - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
      • Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
      • GooDork - Command line Google dorking tool.
      • dork-cli - Command line Google dork tool.
      • vcsmap - Plugin-based tool to scan public version control systems for sensitive information.
      • Spiderfoot - Multi-source OSINT automation tool with a Web UI and report visualizations
      • fast-recon - Perform Google dorks against a domain.
      • PacketTotal - Simple, free, high-quality packet capture file analysis facilitating the quick detection of network-borne malware (using Bro and Suricata IDS signatures under the hood).
      • Intrigue - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
      • Google Hacking Database - Database of Google dorks; can be used for recon.
      • Google-dorks - Common Google dorks and others you probably don't know.
    • Multi-paradigm Frameworks

      • Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
      • Armitage - Java-based GUI front-end for the Metasploit Framework.
      • Faraday - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
      • Pupy - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
      • AutoSploit - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.
    • Anti-virus Evasion Tools

      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
      • UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
      • Veil - Generate metasploit payloads that bypass common anti-virus solutions.
      • peCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
      • AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
      • peCloakCapstone - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
    • File Format Analysis Tools

      • Veles - Binary data visualization and analysis tool.
      • Hachoir - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
    • Hash Cracking Tools

      • CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
      • Rar Crack - RAR bruteforce cracker.
      • JWT Cracker - Simple HS256 JWT token brute force cracker.
      • BruteForce Wallet - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
      • StegCracker - Steganography brute-force utility to uncover hidden data inside files.
    • Hex Editors

      • Hexinator - World's finest (proprietary, commercial) Hex Editor.
      • 0xED - Native macOS hex editor that supports plug-ins to display custom data types.
      • Frhed - Binary file editor for Windows.
    • DDoS Tools

      • HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
      • T50 - Faster network stress tool.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • JS LOIC - JavaScript in-browser version of LOIC.
      • SlowLoris - DoS tool that uses low bandwidth on the attacking side.
      • UFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
      • Memcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
      • JS LOIC - JavaScript in-browser version of LOIC.
    • Wireless Network Tools

      • Aircrack-ng - Set of tools for auditing wireless networks.
      • Kismet - Wireless network detector, sniffer, and IDS.
      • Reaver - Brute force attack against WiFi Protected Setup.
      • Fluxion - Suite of automated social engineering based WPA attacks.
      • Wifite - Automated wireless attack tool.
      • Cowpatty - Brute-force dictionary attack against WPA-PSK.
      • Airgeddon - Multi-use bash script for Linux systems to audit wireless networks.
    • Network Vulnerability Scanners

      • Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
      • Nikto - Noisy but fast black box web server and web application vulnerability scanner.
      • SecApps - In-browser web application security testing suite.
      • WPScan - Black box WordPress vulnerability scanner.
      • WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
      • Zoom - Powerful wordpress username enumerator with infinite scanning.
      • sobelow - Security-focused static analysis for the Phoenix Framework.
      • Brakeman - Static analysis security vulnerability scanner for Ruby on Rails applications.
      • Vuls - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
      • w3af - Web application attack and audit framework.
      • Progpilot - Static security analysis tool for PHP code.
      • JCS - Joomla Vulnerability Component Scanner with automatic database updater from exploitdb and packetstorm.
      • ACSTIS - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
      • bandit - Security oriented static analyser for python code.
      • joomscan - Joomla vulnerability scanner.
      • cppcheck - Extensible C/C++ static analyzer focused on finding bugs.
      • Wapiti - Black box web application vulnerability scanner with built-in fuzzer.
      • FindBugs - Free software static analyzer to look for bugs in Java code.
    • Penetration Testing Report Templates

    • Physical Access Tools

      • Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
      • Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
      • PCILeech - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
    • Reverse Engineering Tools

      • Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
      • OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
      • Immunity Debugger - Powerful way to write exploits and analyze malware.
      • Evan's Debugger - OllyDbg-like debugger for GNU/Linux.
      • peda - Python Exploit Development Assistance for GDB.
      • Voltron - Extensible debugger UI toolkit written in Python.
      • Medusa - Open source, cross-platform interactive disassembler.
      • PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
      • dnSpy - Tool to reverse engineer .NET assemblies.
      • OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
      • Immunity Debugger - Powerful way to write exploits and analyze malware.
      • rVMI - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
      • WDK/WinDbg - Windows Driver Kit and WinDbg.
      • binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
      • plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
    • Windows Utilities

      • Empire - Pure PowerShell post-exploitation agent.
      • wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
      • Ruler - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.
      • Fibratus - Tool for exploration and tracing of the Windows kernel.
      • PowerSploit - PowerShell Post-Exploitation Framework.
      • RID_ENUM - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.
      • Magic Unicorn - Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or `certutil` (using fake certificates).
      • Responder - LLMNR, NBT-NS and MDNS poisoner.
      • DeathStar - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
      • MailSniper - Modular tool for searching through email in a Microsoft Exchange environment, gathering the Global Address List from Outlook Web Access (OWA) and Exchange Web Services (EWS), and more.
      • redsnarf - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
      • Windows Exploit Suggester - Detects potential missing patches on the target.
      • SCOMDecrypt - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.
    • Social Engineering Tools

      • ShellPhish - Social media site cloner and phishing tool built atop SocialFish.
      • Social Engineer Toolkit (SET) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
      • Beelogger - Tool for generating keylooger.
      • Catphish - Tool for phishing and corporate espionage written in Ruby.
      • SocialFish - Social media phishing framework that can run on an Android phone or in a Docker container.
      • FiercePhish - Full-fledged phishing framework to manage all phishing engagements.
      • Evilginx - MITM attack framework used for phishing credentials and session cookies from any Web service.
      • King Phisher - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
      • wifiphisher - Automated phishing attacks against WiFi networks.
    • CTF Tools

      • Pwntools - Rapid exploit development framework built for use in CTFs.
      • ctf-tools - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
      • RsaCtfTool - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
    • Docker for Penetration Testing

    • macOS Utilities

      • EvilOSX - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
      • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
    • Transport Layer Security Tools

      • SSLyze - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
      • tls_prober - Fingerprint a server's SSL/TLS implementation.
      • crackpkcs12 - Multithreaded program to crack PKCS#12 files (`.p12` and `.pfx` extensions), such as TLS/SSL certificates.
    • GNU/Linux Utilities

    • Side-channel Tools

      • ChipWhisperer - Complete open-source toolchain for side-channel power analysis and glitching attacks.
  • Online Resources

    • Exploit Development

    • Penetration Testing Resources

      • MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
      • Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • XSS-Payloads - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
      • PENTEST-WIKI - Free online security knowledge library for pentesters and researchers.
      • Metasploit Unleashed - Free Offensive Security Metasploit course.
      • Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
    • OSINT Resources

      • WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
      • NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).
    • Lock Picking Resources

      • /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
    • Operating Systems

  • Books

  • Information Security Conferences

    • Defcon Suggested Reading

      • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
      • SECUINSIDE - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul).
      • 44Con - Annual Security Conference held in London.
      • CCC - Annual meeting of the international hacker scene in Germany.
      • DeepSec - Security Conference in Vienna, Austria.
      • Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
      • DerbyCon - Annual hacker conference based in Louisville.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • RSA Conference USA - Annual security conference in San Francisco, California, USA.
      • CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
      • Hack.lu - Annual conference held in Luxembourg.
      • AppSecUSA - Annual conference organized by OWASP.
      • DEF CON - Annual hacker convention in Las Vegas.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • ShmooCon - Annual US East coast hacker convention.
      • CarolinaCon - Infosec conference, held annually in North Carolina.
      • DefCamp - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
      • Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
      • BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
      • Nullcon - Annual conference in Delhi and Goa, India.
      • BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
      • Black Hat - Annual security conference in Las Vegas.
  • Information Security Magazines

  • Vulnerability Databases

    • Defcon Suggested Reading

      • Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
      • CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
      • China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
      • Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
      • Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
      • HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
      • National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
      • US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
      • Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
      • Vulners - Security database of software vulnerabilities.
      • Open Source Vulnerability Database (OSVDB) - Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Inj3ct0r - Exploit marketplace and vulnerability information aggregator.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • SecuriTeam - Independent source of software vulnerability information.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
      • Mozilla Foundation Security Advisories - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
  • Security Courses