Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-pentest-1
Awesome Penetration Testing A collection of awesome penetration testing resources
https://github.com/paralax/awesome-pentest-1
Last synced: 4 days ago
JSON representation
-
Awesome Penetration Testing ("https://github.com/Muhammd/Awesome-Pentest")
-
Tools
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- Online MD5 cracker - Online MD5 hash Cracker
- JS LOIC - JavaScript in-browser version of LOIC
- Parrot - A distribution similar to Kali, with multiple architecture
- ExploitPack - Graphical tool for penetration testing with a bunch of exploits
- OWASP Zed Attack Proxy - Penetration testing tool for web applications
- Secapps - Integrated web application security testing environment
- official Kali Linux
- docker-metasploit
- Vulnerable WordPress Installation
- Arch Linux Penetration Tester
- Nexpose - Vulnerability Management & Risk Management Software
- Nikto - Web application vulnerability scanner
- WebReaver - Web application vulnerability scanner for Mac OS X
- Intercepter-NG - a multifunctional network toolkit
- DNSDumpster - Online DNS recond and search service
- Aircrack-ng - a set of tools for auditing wireless network
- dsniff - a collection of tools for network auditing and pentesting
- Kismet - Wireless network detector, sniffer, and IDS
- sslstrip - a demonstration of the HTTPS stripping attacks
- WPScan - Black box WordPress vulnerability scanner
- Hexinator - World's finest Hex Editor
- JS LOIC - JavaScript in-browser version of LOIC
- Shodan - Shodan is the world's first search engine for Internet-connected devices
- recon-ng - A full-featured Web Reconnaissance framework written in Python
- IDA Pro - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
- Tor - The free software for enabling onion routing online anonymity
- IDA Free - The freeware version of IDA v5.0
- WDK/WinDbg - Windows Driver Kit and WinDbg
- OllyDbg - An x86 debugger that emphasizes binary code analysis
- Bokken - GUI for Pyew Radare2.
- Immunity Debugger - A powerful new way to write exploits and analyze malware
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
- JS LOIC - JavaScript in-browser version of LOIC
-
Online Resources
- Shellcode Examples - Shellcodes database
- Exploit Writing Tutorials - Tutorials on how to develop exploits
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
-
Books
- Android Hackers Handbook by Joshua J. Drake et al., 2014
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Shellcoders Handbook by Chris Anley et al., 2007
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
- iOS Hackers Handbook by Charlie Miller et al., 2012
- The Browser Hackers Handbook by Wade Alcorn et al., 2014
- The Mobile Application Hackers Handbook by Dominic Chell et al., 2015
- Hacking the Xbox by Andrew Huang, 2003
- Practical Reverse Engineering by Bruce Dang et al., 2014
- The Art of Memory Forensics by Michael Hale Ligh et al., 2014
- Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- Lock Picking: Detail Overkill by Solomon
- Eddie the Wire books
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
-
Vulnerability Databases
-
Security Courses
- Offensive Security Training - Training from BackTrack/Kali developers
- Cybrary - online IT and Cyber Security training platform
-
Information Security Conferences
- DerbyCon - An annual hacker conference based in Louisville
- PhreakNIC - A technology conference held annually in middle Tennessee
- Hack3rCon - An annual US hacker conference
- DeepSec - Security Conference in Vienna, Austria
- SECUINSIDE - Security Conference in [Seoul](http://en.wikipedia.org/wiki/Seoul)
- RSA Conference USA - An annual security conference in San Francisco, California, USA
- Swiss Cyber Storm - An annual security conference in Lucerne, Switzerland
- Hack.lu - An annual conference held in Luxembourg
- SummerCon - One of the oldest hacker conventions, held during Summer
- DEF CON - An annual hacker convention in Las Vegas
-
Information Security Magazines
- Phrack Magazine - By far the longest running hacker zine
-
Awesome Lists
- C/C++ Programming - One of the main language for open source security tools
- .NET Programming - A software framework for Microsoft Windows platform development
- Shell Scripting - Command-line frameworks, toolkits, guides and gizmos
- Ruby Programming by @markets - The de-facto language for writing exploits
- JavaScript Programming - In-browser development and scripting
- Node.js Programming by @vndmtrx - JavaScript in command-line
- Python Programming by @vinta - General Python programming
- Android Security - A collection of android security related resources
- Awesome Awesomness - The List of the Lists
- AppSec - Resources for learning about application security
- CTFs - Capture The Flag frameworks, libraries, etc
- Hacking - Tutorials, tools, and resources
- Honeypots - Honeypots, tools, components, and more
- Malware Analysis - Tools and resources for analysts
- PCAP Tools - Tools for processing network traffic
- Security - Software, libraries, documents, and other resources
-
License
-
Programming Languages
Sub Categories
Keywords
awesome
10
awesome-list
8
list
5
security
4
python-framework
1
python
1
collections
1
ruby-libraries
1
python-library
1
ruby
1
curated-list
1
collection
1
zsh
1
shell
1
fish
1
cli
1
bash
1
fsharp
1
dotnet
1
csharp
1
clr
1
resources
1
programming-tutorial
1
lists
1
libraries
1
cppcon
1
cpp-library
1
cpp
1
c-plus-plus
1
threatintel
1
threat-sharing
1
threat-intelligence
1
static-analysis
1
network-traffic
1
malware-samples
1
malware-research
1
malware-collection
1
malware-analysis
1
dynamic-analysis
1
drop-ice
1
domain-analysis
1
chinese-translation
1
chinese
1
automated-analysis
1
analysis-framework
1
honeypot
1
honeyd
1
hacking
1
penetration
1
ctf
1