awesome-pentest
A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/eric-erki/awesome-pentest
Last synced: 14 days ago
JSON representation
-
Awesome Lists
-
Defcon Suggested Reading
- .NET Programming - Software framework for Microsoft Windows platform development.
- JavaScript Programming - In-browser development and scripting.
- Python Programming by @vinta - General Python programming.
- Ruby Programming by @markets - The de-facto language for writing exploits.
- C/C++ Programming - One of the main language for open source security tools.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
- AppSec - Resources for learning about application security.
- Security - Software, libraries, documents, and other resources.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Malware Analysis - Tools and resources for analysts.
- Android Security - Collection of Android security related resources.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- PCAP Tools - Tools for processing network traffic.
- Awesome Awesomness - The List of the Lists.
- Creative Commons Attribution 4.0 International License
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
-  and [various paste sites](http://netbootcamp.org/pastesearch.html).
- OSINT Framework - Collection of various OSINT tools broken out by category.
-
Lock Picking Resources
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
-
Operating Systems
- Digital Evidence & Forensics Toolkit (DEFT) - Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
- Security related Operating Systems @ Rawsec - Complete list of security related operating systems.
- cuckoo - Open source automated malware analysis system.
- Tails - Live OS aimed at preserving privacy and anonymity.
-
-
Books
-
Hackers Handbook Series
- Android Hackers Handbook by Joshua J. Drake et al., 2014
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hackers Handbook by Dominic Chell et al., 2015
- iOS Hackers Handbook by Charlie Miller et al., 2012
- The Shellcoders Handbook by Chris Anley et al., 2007
- The Browser Hackers Handbook by Wade Alcorn et al., 2014
- The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
-
Penetration Testing Books
- Btfm: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- Advanced Penetration Testing by Wil Allsopp, 2017
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- The Hacker Playbook by Peter Kim, 2014
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
-
Reverse Engineering Books
-
Social Engineering Books
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
-
Network Analysis Books
-
Malware Analysis Books
-
Lock Picking Books
-
Defensive Development
-
Defcon Suggested Reading
-
Windows Books
-
-
Information Security Conferences
-
Defcon Suggested Reading
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- SECUINSIDE - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul).
- 44Con - Annual Security Conference held in London.
- CCC - Annual meeting of the international hacker scene in Germany.
- DeepSec - Security Conference in Vienna, Austria.
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- DerbyCon - Annual hacker conference based in Louisville.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
- Hack.lu - Annual conference held in Luxembourg.
- AppSecUSA - Annual conference organized by OWASP.
- DEF CON - Annual hacker convention in Las Vegas.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- ShmooCon - Annual US East coast hacker convention.
- CarolinaCon - Infosec conference, held annually in North Carolina.
- DefCamp - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
- BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
- Nullcon - Annual conference in Delhi and Goa, India.
- BalCCon - Balkan Computer Congress, annually held in Novi Sad, Serbia.
- Black Hat - Annual security conference in Las Vegas.
-
-
Information Security Magazines
-
Defcon Suggested Reading
- 2600: The Hacker Quarterly - American publication about technology and computer "underground."
- Phrack Magazine - By far the longest running hacker zine.
-
-
Vulnerability Databases
-
Defcon Suggested Reading
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Open Source Vulnerability Database (OSVDB) - Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- SecuriTeam - Independent source of software vulnerability information.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
- Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
- Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
- Mozilla Foundation Security Advisories - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
-
-
Security Courses
-
Defcon Suggested Reading
- Offensive Security Training - Training from BackTrack/Kali developers.
- CTF Field Guide - Everything you need to win your next CTF competition.
- Computer Security Student - Many free tutorials, great for beginners, $10/mo membership unlocks all content.
- SANS Security Training - Computer Security Training & Certification.
- ARIZONA CYBER WARFARE RANGE - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
-
Programming Languages
Categories
Sub Categories
Defcon Suggested Reading
86
Network Tools
50
DDoS Tools
29
OSINT Tools
28
Web Exploitation
28
Network Vulnerability Scanners
18
Reverse Engineering Tools
15
Penetration Testing Resources
14
Windows Utilities
14
Penetration Testing Books
10
Penetration Testing Distributions
10
Social Engineering Tools
9
Hackers Handbook Series
8
Anti-virus Evasion Tools
7
Wireless Network Tools
7
Social Engineering Books
6
Anonymity Tools
6
Docker for Penetration Testing
5
Multi-paradigm Frameworks
5
Hash Cracking Tools
5
Lock Picking Books
4
Exploit Development
4
Operating Systems
4
Hex Editors
3
Network Analysis Books
3
Reverse Engineering Books
3
Physical Access Tools
3
Penetration Testing Report Templates
3
OSINT Resources
3
CTF Tools
3
Transport Layer Security Tools
3
macOS Utilities
2
Malware Analysis Books
2
Windows Books
2
Defensive Development
2
File Format Analysis Tools
2
Lock Picking Resources
1
Side-channel Tools
1
GNU/Linux Utilities
1
Keywords
security
34
python
20
pentesting
18
awesome
15
awesome-list
14
hacking
13
penetration-testing
10
pentest
10
security-tools
8
osint
8
list
7
security-audit
6
scanner
6
infosec
5
reconnaissance
5
linux
5
ruby
5
golang
5
cybersecurity
4
vulnerability-scanners
4
recon
4
active-directory
4
network-security
4
appsec
4
hacking-tool
4
windows
4
man-in-the-middle
4
vulnerability-scanner
3
network
3
phishing
3
bruteforce
3
python3
3
javascript
3
static-analysis
3
nodejs
3
exploit
3
security-scanner
3
pentest-tool
3
exploitation
3
ctf
3
go
3
dns
3
vulnerabilities
3
owasp
3
information-gathering
3
fuzzing
3
enumeration
3
mitm
3
ssh
2
open-source
2