awesome-pentest
Awesome Penetration Testing A collection of awesome penetration testing resources
https://github.com/muhammd/awesome-pentest
Last synced: 10 days ago
JSON representation
-
Awesome Penetration Testing ("https://github.com/Muhammd/Awesome-Pentest")
-
Awesome Lists
- .NET Programming - A software framework for Microsoft Windows platform development
- JavaScript Programming - In-browser development and scripting
- Python Programming by @vinta - General Python programming
- Ruby Programming by @markets - The de-facto language for writing exploits
- C/C++ Programming - One of the main language for open source security tools
- Shell Scripting - Command-line frameworks, toolkits, guides and gizmos
- AppSec - Resources for learning about application security
- Security - Software, libraries, documents, and other resources
- CTFs - Capture The Flag frameworks, libraries, etc
- Malware Analysis - Tools and resources for analysts
- Android Security - A collection of android security related resources
- Hacking - Tutorials, tools, and resources
- Honeypots - Honeypots, tools, components, and more
- PCAP Tools - Tools for processing network traffic
- Awesome Awesomness - The List of the Lists
- Kali Linux Tools - List of tools present in Kali Linux
- Node.js Programming by @vndmtrx - JavaScript in command-line
- Awesome List - A curated list of awesome lists
- Node.js Programming by @sindresorhus - JavaScript in command-line
- Ruby Programming by @Sdogruyol - The de-facto language for writing exploits
- Ruby Programming by @dreikanter - The de-facto language for writing exploits
- SecLists - Collection of multiple types of lists used during security assessments
- Python Programming by @svaksha - General Python programming
- Infosec - Information security resources for pentesting, forensics, and more
- Python tools for penetration testers - Lots of pentesting tools are written in Python
- Security Talks - A curated list of security conferences
- SecTools - Top 125 Network Security Tools
-
Tools
- Tor - The free software for enabling onion routing online anonymity
- Shodan - Shodan is the world's first search engine for Internet-connected devices
- Parrot - A distribution similar to Kali, with multiple architecture
- tgcd - a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls
- Hexinator - World's finest Hex Editor
- Damn Vulnerable Web Application (DVWA)
- OWASP Mutillidae II Web Pen-Test Practice Application
- OWASP Security Shepherd
- Vulnerability as a service: Heartbleed
- Vulnerability as a service: Shellshock
- dsniff - a collection of tools for network auditing and pentesting
- DNSDumpster - Online DNS recond and search service
- Aircrack-ng - a set of tools for auditing wireless network
- Kismet - Wireless network detector, sniffer, and IDS
- Nexpose - Vulnerability Management & Risk Management Software
- Nikto - Web application vulnerability scanner
- Secapps - Integrated web application security testing environment
- Wapiti - Web application vulnerability scanner
- cms-explorer - CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.
- joomscan - Joomla CMS scanner
- BlindElephant - Web Application Fingerprinter
- NST - Network Security Toolkit distribution
- OllyDbg - An x86 debugger that emphasizes binary code analysis
- Radare2 - Opensource, crossplatform reverse engineering framework.
- mimikatz - Credentials extraction tool for Windows OS
- OWASP Zed Attack Proxy - Penetration testing tool for web applications
- official WPScan
- Security Ninjas
- Docker Bench for Security
- Immunity Debugger - A powerful new way to write exploits and analyze malware
- docker-metasploit
- Arch Linux Penetration Tester
- OWASP WebGoat Project docker image
- Pentoo - security-focused livecd based on Gentoo
- BackBox - Ubuntu-based distribution for penetration tests and security assessments
- ExploitPack - Graphical tool for penetration testing with a bunch of exploits
- Netsparker - Web Application Security Scanner
- WebReaver - Web application vulnerability scanner for Mac OS X
- Intercepter-NG - a multifunctional network toolkit
- SPARTA - Network Infrastructure Penetration Testing Tool
- sslstrip - a demonstration of the HTTPS stripping attacks
- HexEdit.js - Browser-based hex editing
- Online MD5 cracker - Online MD5 hash Cracker
- JS LOIC - JavaScript in-browser version of LOIC
- T50 - The more fast network stress tool
- recon-ng - A full-featured Web Reconnaissance framework written in Python
- IDA Free - The freeware version of IDA v5.0
- WDK/WinDbg - Windows Driver Kit and WinDbg
- Bokken - GUI for Pyew Radare2.
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- Online MD5 cracker - Online MD5 hash Cracker
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- Pwntools - CTF framework for use in CTFs
- WhatWeb - Website Fingerprinter
- Medusa disassembler - An open source interactive disassembler
- official OWASP ZAP
- Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
- faraday - Collaborative Penetration Test and Vulnerability Management Platform
- BeeF - The Browser Exploitation Framework Project
- evilgrade - The update explotation framework
- SET - The Social-Engineer Toolkit from TrustedSec
- mitmproxy - An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers
- Fibratus - Tool for exploration and tracing of the Windows kernel
- PowerSploit - A PowerShell Post-Exploitation Framework
- SSLyze - SSL configuration scanner
- w3af - Web application attack and audit framework
- theHarvester - E-mail, subdomain and people names harvester
- Wifite - Automated wireless attack tool
- weevely3 - Weaponized web shell
- Zarp - Zarp is a network attack tool centered around the exploitation of local networks
- pwnat - punches holes in firewalls and NATs
- smbmap - a handy SMB enumeration tool
- metagoofil - Metadata harvester
- DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR
- github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak
- mallory - HTTP/HTTPS proxy over SSH
- netsniff-ng - A Swiss army knife for for network sniffing
- arachni - Web Application Security Scanner Framework
- creepy - A geolocation OSINT tool
- tls_prober - fingerprint a server's SSL/TLS implementation
- Responder - A LLMNR, NBT-NS and MDNS poisoner
- pig - A Linux packet crafting tool
- DET - DET is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time
- Vulnerability as a service: Shellshock
- Security Ninjas
- Vulnerability as a service: Heartbleed
- routersploit - Automated penetration testing software for router
- Windows Exploit Suggester - Detects potential missing patches on the target
- OllyDbg - An x86 debugger that emphasizes binary code analysis
- Network Tools - Different network tools: ping, lookup, whois, etc
- joomscan - Joomla CMS scanner
- sslstrip2 - SSLStrip version to defeat HSTS
- Immunity Debugger - A powerful new way to write exploits and analyze malware
- ExploitPack - Graphical tool for penetration testing with a bunch of exploits
- Netsparker - Web Application Security Scanner
- Intercepter-NG - a multifunctional network toolkit
- Online MD5 cracker - Online MD5 hash Cracker
- Wireshark - A network protocol analyzer for Unix and Windows
- tgcd - a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls
- Wapiti - Web application vulnerability scanner
- Google Hacking Database - a database of Google dorks; can be used for recon
- nmap - Free Security Scanner For Network Exploration & Security Audits
- Pyew - A Python tool for static malware analysis.
- BackBox - Ubuntu-based distribution for penetration tests and security assessments
- Reaver - Brute force attack against Wifi Protected Setup
- wifiphisher - Automated phishing attacks against Wi-Fi networks
- Wappalyzer - Wappalyzer uncovers the technologies used on websites
- BlindElephant - Web Application Fingerprinter
- Linux Exploit Suggester - Linux Exploit Suggester; based on operating system release number.
- Empire - Empire is a pure PowerShell post-exploitation agent
- plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
- commix - Automated All-in-One OS Command Injection and Exploitation Tool
- Hashcat - The more fast hash cracker
- T50 - The more fast network stress tool
- Nipe - Script to redirect all traffic from the machine to the Tor network.
-
Online Resources
- Exploit Writing Tutorials - Tutorials on how to develop exploits
- Shellcode Examples - Shellcodes database
- Shellcode Tutorial - Tutorial on how to write shellcode
- Social Engineering Framework - An information resource for social engineers
- Schuyler Towne channel - Lockpicking videos and security talks
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
- GDB-peda - Python Exploit Development Assistance for GDB
- Shellcode Examples - Shellcodes database
- Shellcode Tutorial - Tutorial on how to write shellcode
- shellsploit - New Generation Exploit Development Kit
-
Books
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
- Professional Penetration Testing by Thomas Wilhelm, 2013
- The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Shellcoders Handbook by Chris Anley et al., 2007
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
- iOS Hackers Handbook by Charlie Miller et al., 2012
- Android Hackers Handbook by Joshua J. Drake et al., 2014
- The Browser Hackers Handbook by Wade Alcorn et al., 2014
- The Mobile Application Hackers Handbook by Dominic Chell et al., 2015
- Nmap Network Scanning by Gordon Fyodor Lyon, 2009
- Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012
- Hacking the Xbox by Andrew Huang, 2003
- Practical Reverse Engineering by Bruce Dang et al., 2014
- Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012
- The Art of Memory Forensics by Michael Hale Ligh et al., 2014
- Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- Practical Lock Picking by Deviant Ollam, 2012
- Keys to the Kingdom by Deviant Ollam, 2012
- CIA Lock Picking Field Operative Training Manual
- Lock Picking: Detail Overkill by Solomon
- Eddie the Wire books
- Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012
- Windows Internals by Mark Russinovich et al., 2012
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- Windows Internals by Mark Russinovich et al., 2012
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- The Hacker Playbook by Peter Kim, 2014
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
- Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
- Nmap Network Scanning by Gordon Fyodor Lyon, 2009
-
Information Security Conferences
- SECUINSIDE - Security Conference in [Seoul](http://en.wikipedia.org/wiki/Seoul)
- DeepSec - Security Conference in Vienna, Austria
- FSec - FSec - Croatian Information Security Gathering in Varaždin, Croatia
- Infosecurity Europe - Europe's number one information security event, held in London, UK
- Swiss Cyber Storm - An annual security conference in Lucerne, Switzerland
- Troopers - Annual international IT Security event with workshops held in Heidelberg, Germany
- DerbyCon - An annual hacker conference based in Louisville
- LayerOne - An annual US security conference held every spring in Los Angeles
- PhreakNIC - A technology conference held annually in middle Tennessee
- SkyDogCon - A technology conference in Nashville
- ThotCon - An annual US hacker conference held in Chicago
- Ekoparty - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina
- ShmooCon - An annual US east coast hacker convention
- Hack3rCon - An annual US hacker conference
- DefCamp - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania
- RSA Conference USA - An annual security conference in San Francisco, California, USA
- Virus Bulletin Conference - An annual conference going to be held in Denver, USA for 2016
- DEF CON - An annual hacker convention in Las Vegas
- PhreakNIC - A technology conference held annually in middle Tennessee
- CarolinaCon - An infosec conference, held annually in North Carolina
- ShmooCon - An annual US east coast hacker convention
- Hack3rCon - An annual US hacker conference
- DefCamp - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania
- Nullcon - An annual conference in Delhi and Goa, India
- AppSecUSA - An annual conference organised by OWASP
- Black Hat - An annual security conference in Las Vegas
- Virus Bulletin Conference - An annual conference going to be held in Denver, USA for 2016
- 44Con - Annual Security Conference held in London
-
Information Security Magazines
- Phrack Magazine - By far the longest running hacker zine
-
Security Courses
- Open Security Training - Training material for computer security classes
- SANS Security Training - Computer Security Training & Certification
- Cybrary - online IT and Cyber Security training platform
- Offensive Security Training - Training from BackTrack/Kali developers
- CTF Field Guide - everything you need to win your next CTF competition
- SANS Security Training - Computer Security Training & Certification
-
Vulnerability Databases
- CERT - US Computer Emergency Readiness Team
- OSVDB - Open Sourced Vulnerability Database
- Bugtraq - Symantec SecurityFocus
- MS Bulletin - Microsoft Security Bulletin
- Inj3ct0r - Inj3ct0r Exploit Database
- Inj3ct0r - Inj3ct0r Exploit Database
- Inj3ct0r - Inj3ct0r Exploit Database
- Inj3ct0r - Inj3ct0r Exploit Database
- Vulnerability Laboratory - Vulnerability Research Laboratory
- SecuriTeam - Securiteam Vulnerability Information
- Fulldisclosure - Full Disclosure Mailing List
- ZDI - Zero Day Initiative
- Exploit-DB - Offensive Security Exploit Database
- Packet Storm - Packet Storm Global Security Resource
-
License
-
Programming Languages
Sub Categories
Keywords
awesome
14
security
14
awesome-list
12
python
7
list
7
hacking
6
appsec
4
penetration-testing
4
ruby
4
ctf
3
security-audit
3
infosec
3
pentest
3
scanner
3
sql-injection
2
penetration
2
linux
2
owasp
2
javascript
2
application-security
2
proxy
2
ssl
2
tls
2
networking
2
resources
2
pentesting
2
lists
2
recon
2
blueteam
2
c-plus-plus
2
python2
1
pwntools
1
pwnable
1
unicorns
1
rails
1
exploit
1
defcon
1
assembly
1
bsd
1
disassembler
1
capture-the-flag
1
ctf-framework
1
penetration-testing-tools
1
pentesting-tools
1
penetration-test
1
network-security
1
kali-linux
1
hacking-tools
1
security-tools
1
nodejs
1