Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Awesome-Pentest
A list of awesome penetration testing tools and resources.
https://github.com/Kc57/Awesome-Pentest
Last synced: about 9 hours ago
JSON representation
-
Hardware Security
-
CAN Bus
- Korlan USB2CAN - With USB2CAN you can monitor a CAN network, write a CAN program and communicate with industrial, medical, automotive or another type of CAN bus network devices.
-
Logic Analyzers
- DSLogic - DSLogic is a series of USB-based logic analyzer, with max sample rate up to 1GHz, and max sample depth up to 16G.
- Saleae - Saleae logic analyzers are used by electrical engineers, firmware developers, enthusiasts, and engineering students to record, measure, visualize, and decode the signals in their electrical circuits.
-
- Binwalk - Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
- chipsec - CHIPSEC is a framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities.
-
Misc Hardware Tools
- Bus Pirate - The Bus Pirate is an open source hacker multi-tool that talks to electronic stuff.
- ChipWhisperer - The complete open-source toolchain for side-channel power analysis and glitching attacks.
- HydraBus - The HydraBus (hardware) with HydraFW (firmware) are used as an open source multi-tool for anyone interested in learning/developping/debugging/hacking/Penetration Testing for basic or advanced embedded hardware.
-
-
Mobile Security
-
Android
- Apktool - A tool for reverse engineering 3rd party, closed, binary Android apps.
- rootAVD - root your Android Studio Virtual Device (AVD), with Magisk (Stable, Canary or Alpha).
- Apktool - A tool for reverse engineering 3rd party, closed, binary Android apps.
- dex2jar - Tools to work with android .dex and java .class files.
- Simplify - Android virtual machine and deobfuscator.
-
iOS
- iOS App Signer - iOS App Signer can (re)sign apps and bundle them into ipa files that are ready to be installed on an iOS device.
- plistsubtractor_py3 - plistsubtractor updated for Python3.
- Swift Demangler - Demangles mangled names.
- iHide - A utility for hiding jailbreak from iOS applications.
- Keychain-Dumper - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken.
- MGSpoof - Hook MGCopyAnswer + custom helper so user can spoof some keys.
- plistsubtractor - Read a plist file, write out any embedded plist files.
- Shadow - A jailbreak detection bypass for modern iOS jailbreaks.
- Sideloadly - Sideloadly is a Cydia impactor alternative that allows you to install IPA for your iPhone or iPad.
- sigh - sigh can create, renew, download and repair provisioning profiles (with one command). It supports App Store, Ad Hoc, Development and Enterprise profiles and supports nice features, like auto-adding all test devices.
-
Misc
- Frida - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
- Fridump - A universal memory dumper using Frida.
- frida-swift-bridge - Swift interop from Frida.
- ipwndfu - open-source jailbreaking tool for many iOS devices.
- Mobile Security Framework (MobSF) - Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- objection - objection is a runtime mobile exploration toolkit, powered by Frida.
- Proxy Helper - Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.
-
Vulnerable Apps
- AndroGoat - AndroGoat is purposely developed open source vulnerable/insecure app using Kotlin.
- Damn-Vulnerable-Bank - Damn Vulnerable Bank is designed to be an intentionally vulnerable android application.
- igoat - A Learning Tool for iOS App Pentesting and Security by Swaroop Yermalkar. `Objective-C`
- iGoat-Swift - A Damn Vulnerable Swift Application for iOS. `Swift`
- InsecureShop - An Intentionally designed Vulnerable Android Application built in Kotlin. `Kotlin`
- MASTG-Hacking-Playground - The MASTG Hacking Playground is a collection of educational iOS and Android mobile apps, that are intentionally build insecure in order to give practical guidance to developers, security researches and penetration testers.
- ovaa - OVAA (Oversecured Vulnerable Android App) is an Android app that aggregates all the platform's known and popular security vulnerabilities.
-
-
OSINT
-
Vulnerable Apps
- Amass - n-depth Attack Surface Mapping and Asset Discovery
- github-search - Tools to perform basic search on GitHub.
- subfinder - Subfinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
- Amass - n-depth Attack Surface Mapping and Asset Discovery
-
Metadata Tools
- Goca - Goca is a FOCA fork written in Go, which is a tool used mainly to find metadata and hidden information in the documents its scans.
-
-
Web Tools
-
GraphQL
- graphql-voyager - Represent any GraphQL API as an interactive graph.
- clairvoyance - Obtain GraphQL API schema despite disabled introspection!
- GraphCrawler - GraphQL automated security testing toolkit.
-
Metadata Tools
-
Burp Suite Plugins
- burp-awesome-tls - This extension hijacks Burp's HTTP/TLS stack and allows you to spoof any browser fingerprint in order to make it more powerful and less prone to fingerprinting by all kinds of WAFs.
-
-
Antivirus Evasion Tools
- Anti-Virus-Evading-Payloads - Guide to generating AV evading payloads.
-
AWS
- slurp - A blazing fast & feature rich Amazon S3 bucket enumerator.
- AWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets.
- enumerate-iam - Enumerate the permissions associated with AWS credential set.
- lazys3 - A Ruby script to bruteforce for AWS s3 buckets using different permutations.
- s3-inspector - Tool to check AWS S3 bucket permissions.
- S3Scanner - Scan for open S3 buckets and dump the contents.
-
File Viewers and Pretty Printers
- gron - gron transforms JSON into discrete assignments to make it easier to grep for what you want and see the absolute 'path' to it. It eases the exploration of APIs that return large blobs of JSON but have terrible documentation.
- jless - jless is a command-line JSON viewer designed for reading, exploring, and searching through JSON data.
-
Hash Cracking Tools
-
Misc Hardware Tools
- haiti - A CLI tool (and library) to identify hash types (hash type identifier).
- Hashview - A web front-end for password cracking and analytics.
- hate_crack - A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
-
-
Hex Editors
-
Misc Hardware Tools
- ImHex - A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
-
-
Lab Setup
-
Misc Hardware Tools
- AutomatedLab - AutomatedLab is a provisioning solution and framework that lets you deploy complex labs on HyperV and Azure with simple PowerShell scripts.
- BadBlood - BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world.
-
-
Network Tools
-
Vulnerable Apps
- Certipy - Tool for Active Directory Certificate Services enumeration and abuse.
- Coercer - A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.
- Nginxpwner - Nginxpwner is a simple tool to look for common Nginx misconfigurations and vulnerabilities.
- Nuclei - Fast and customizable vulnerability scanner based on simple YAML based DSL.
- SSHScan - SSHScan is a testing tool that enumerates SSH Ciphers. Using SSHScan, weak ciphers can be easily detected.
-
-
Privilege Escalation Tools
-
Metadata Tools
- IDiagnosticProfileUAC - Just another UAC bypass using auto-elevated COM object Virtual Factory for DiagCpl (12C21EA7-2EB8-4B55-9249-AC243DA8C666).
- iscsicpl_bypassUAC - UAC bypass for x64 Windows 7 - 11.
-
-
Reverse Engineering Tools
-
Metadata Tools
- Cpp2IL - Work-in-progress tool to reverse unity's IL2CPP toolchain. `Unity`
- dnSpy - Unofficial revival of the well known .NET debugger and assembly editor, dnSpy.
- Doldrums - A Flutter/Dart reverse engineering tool. `Flutter`
- Ghidra - Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate.
- hbctool - Hermes Bytecode Reverse Engineering Tool (Assemble/Disassemble Hermes Bytecode). `React Native`
- Il2CppDumper - Unity il2cpp reverse engineer. `Unity`
- Il2CppInspector - Il2CppInspector helps you to reverse engineer IL2CPP applications, providing the most complete analysis currently available. `Unity`
- Recaf - The modern Java bytecode editor.
-
-
Static Application Security Testing (SAST)
-
Metadata Tools
- appshark - Appshark is a static taint analysis platform to scan vulnerabilities in an Android app.
- route-sixty-sink - an open source tool that enables defenders and security researchers alike to quickly identify vulnerabilities in any .NET assembly using automated source-to-sink analysis.
-
-
Wordlists
-
GraphQL
- google-10000-english - This repo contains a list of the 10,000 most common English words in order of frequency, as determined by n-gram frequency analysis of the Google's Trillion Word Corpus.
- SecLists - It's a collection of multiple types of lists used during security assessments, collected in one place.
-
Programming Languages
Categories
Mobile Security
29
Reverse Engineering Tools
8
Hardware Security
8
Web Tools
7
AWS
6
Network Tools
5
OSINT
5
Hash Cracking Tools
3
Privilege Escalation Tools
2
Wordlists
2
File Viewers and Pretty Printers
2
Lab Setup
2
Static Application Security Testing (SAST)
2
Hex Editors
1
Antivirus Evasion Tools
1
Sub Categories
Keywords
reverse-engineering
8
security
7
pentesting
5
static-analysis
5
hacking
4
unity
4
android
4
bugbounty
4
decompiler
3
il2cpp
3
java
3
pentest
3
ios
3
android-security
3
cybersecurity
3
security-tools
3
infosec
3
penetration-testing
3
vulnerable-application
2
firmware
2
vulnerable-android-apps
2
malware-analysis
2
metadata
2
golang
2
go
2
python
2
runtime-security
2
disassembler
2
osint
2
decompile
2
mobile-security
2
graphql
2
ios-security
2
pki
2
hyper
1
exchange
1
hyperv
1
lab-machine
1
domain-controller
1
directory
1
deployment
1
azure
1
automated-deployment
1
active-directory
1
active
1
windows
1
gcp
1
preprocessor
1
pattern-language
1
cwe
1