Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-pentest
https://github.com/severnake/awesome-pentest
Last synced: about 6 hours ago
JSON representation
-
Network Tools
-
DDoS Tools
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- Anevicon - Powerful UDP-based load generator, written in Rust.
- HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- T50 - Faster network stress tool.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
- JS LOIC - JavaScript in-browser version of LOIC.
-
Docker Containers of Penetration Testing Distributions and Tools
- Intercepter-NG - Multifunctional network toolkit.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
- dsniff - Collection of tools for network auditing and pentesting.
- SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
-
Exfiltration Tools
- Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
-
Network Reconnaissance Tools
- DNSDumpster - Online DNS recon and search service.
- dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
- nmap - Free security scanner for network exploration & security audits.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
-
Protocol Analyzers and Sniffers
-
Network Traffic Replay and Editing Tools
- TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
- tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
-
Proxies and Machine-in-the-Middle (MITM) Tools
-
Wireless Network Tools
- Aircrack-ng - Set of tools for auditing wireless networks.
- BoopSuite - Suite of tools written in Python for wireless auditing.
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi Protected Setup.
- Bully - Implementation of the WPS brute force attack, written in C.
-
-
Online Resources
-
Online Penetration Testing Resources
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
- Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
- XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
-
Online Exploit Development Resources
- Exploit Writing Tutorials - Tutorials on how to develop exploits.
- Shellcode Examples - Shellcodes database.
-
Online Lock Picking Resources
- /r/lockpicking - Resources for learning lockpicking, equipment recommendations.
-
Online Open Sources Intelligence (OSINT) Resources
- GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
- Intel Techniques - Collection of OSINT tools. Menu on the left can be used to navigate through the categories.
- NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
- WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
-
Online Operating Systems Resources
- DistroWatch.com's Security Category - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
-
Other Lists Online
- .NET Programming - Software framework for Microsoft Windows platform development.
- Android Security - Collection of Android security related resources.
- AppSec - Resources for learning about application security.
- Awesome Awesomness - The List of the Lists.
- C/C++ Programming - One of the main language for open source security tools.
- CTFs - Capture The Flag frameworks, libraries, etc.
- Hacking - Tutorials, tools, and resources.
- Honeypots - Honeypots, tools, components, and more.
- Security-related Operating Systems - List of security related operating systems.
- JavaScript Programming - In-browser development and scripting.
- Malware Analysis - Tools and resources for analysts.
- PCAP Tools - Tools for processing network traffic.
- Python Programming by @vinta - General Python programming.
- Ruby Programming by @markets - The de-facto language for writing exploits.
- Security - Software, libraries, documents, and other resources.
- Shell Scripting - Command line frameworks, toolkits, guides and gizmos.
- InfoSec § Hacking challenges - Comprehensive directory of CTFs, wargames, hacking challenge websites, pentest practice lab exercises, and more.
-
Penetration Testing Report Templates
- T&VS Pentesting Report Template - Pentest report template provided by Test and Verification Services, Ltd.
-
-
Anonymity Tools
- OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
- Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
- dos-over-tor - Proof of concept denial of service over Tor stress test tool.
- Nipe - Script to redirect all traffic from the machine to the Tor network.
- I2P - The Invisible Internet Project.
-
Anti-virus Evasion Tools
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Veil - Generate metasploit payloads that bypass common anti-virus solutions.
- peCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
- shellsploit - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
-
Books
-
Defensive Programming Books
-
Hacker's Handbook Series Books
- Android Hacker's Handbook by Joshua J. Drake et al., 2014
- Car Hacker's Handbook by Craig Smith, 2016
- The Browser Hacker's Handbook by Wade Alcorn et al., 2014
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hacker's Handbook by Dominic Chell et al., 2015
- The Shellcoder's Handbook by Chris Anley et al., 2007
- The Web Application Hacker's Handbook by D. Stuttard, M. Pinto, 2011
- iOS Hacker's Handbook by Charlie Miller et al., 2012
-
Lock Picking Books
-
Malware Analysis Books
-
Network Analysis Books
-
Penetration Testing Books
- Btfm: Blue Team Field Manual by Alan J White & Ben Clark, 2017
- Bug Hunter's Diary by Tobias Klein, 2011
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- The Art of Exploitation by Jon Erickson, 2008
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
-
Reverse Engineering Books
-
Social Engineering Books
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
-
Windows Books
-
-
Conferences and Events
-
Windows Books
- 44Con - Annual Security Conference held in London.
- CCC - Annual meeting of the international hacker scene in Germany.
- CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
- DeepSec - Security Conference in Vienna, Austria.
- DerbyCon - Annual hacker conference based in Louisville.
- HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
- Hack.lu - Annual conference held in Luxembourg.
- PhreakNIC - Technology conference held annually in middle Tennessee.
- RSA Conference USA - Annual security conference in San Francisco, California, USA.
- SECUINSIDE - Security Conference in [Seoul](https://en.wikipedia.org/wiki/Seoul).
- Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
- DEF CON - Annual hacker convention in Las Vegas.
- Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
-
-
Docker Containers
-
Docker Containers of Intentionally Vulnerable Systems
- Vulnerable WordPress Installation - `docker pull wpscanteam/vulnerablewordpress`.
-
Docker Containers of Penetration Testing Distributions and Tools
- Official Kali Linux - `docker pull kalilinux/kali-linux-docker`.
-
-
File Format Analysis Tools
-
Docker Containers of Penetration Testing Distributions and Tools
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- Veles - Binary data visualization and analysis tool.
-
-
GNU/Linux Utilities
-
Docker Containers of Penetration Testing Distributions and Tools
- Lynis - Auditing tool for UNIX-based systems.
-
-
Hash Cracking Tools
-
Hex Editors
-
Docker Containers of Penetration Testing Distributions and Tools
- 0xED - Native macOS hex editor that supports plug-ins to display custom data types.
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
-
-
Multi-paradigm Frameworks
-
Docker Containers of Penetration Testing Distributions and Tools
- Armitage - Java-based GUI front-end for the Metasploit Framework.
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
-
-
Network Vulnerability Scanners
-
Wireless Network Tools
- Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
-
Web Vulnerability Scanners
-
-
OSINT Tools
-
Web Vulnerability Scanners
- Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans.
- FOCA (Fingerprinting Organizations with Collected Archives) - Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.
- Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
- Shodan - World's first search engine for Internet-connected devices.
- Threat Crowd - Search engine for threats.
- ZoomEye - Search engine for cyberspace that lets the user find specific network components.
- Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
-
-
Operating System Distributions
-
Penetration Testing Report Templates
- Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
- ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
- BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
- Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
- Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
- Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
- PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
-
-
Periodicals
-
Penetration Testing Report Templates
- 2600: The Hacker Quarterly - American publication about technology and computer "underground" culture.
- Phrack Magazine - By far the longest running hacker zine.
-
-
Physical Access Tools
-
Penetration Testing Report Templates
- AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
-
-
Reverse Engineering Tools
-
Penetration Testing Report Templates
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- Ghidra - Suite of free software reverse engineering tools developed by NSA's Research Directorate originally exposed in WikiLeaks's "Vault 7" publication and now maintained as open source software.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
-
-
Security Education Courses
-
Penetration Testing Report Templates
- Offensive Security Training - Training from BackTrack/Kali developers.
-
-
Social Engineering Tools
-
Penetration Testing Report Templates
- ShellPhish - Social media site cloner and phishing tool built atop SocialFish.
-
-
Vulnerability Databases
-
Penetration Testing Report Templates
- Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
- CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
- China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
- Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
- Distributed Weakness Filing (DWF) - Federated CNA (CVE Number Authority) mirroring MITRE's CVE database and offering additional CVE-equivalent numbers to otherwise out-of-scope vulnerability disclosures.
- Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
- HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
- Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
- National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
- US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
- Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
- Vulners - Security database of software vulnerabilities.
- Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
-
-
Web Exploitation
-
Penetration Testing Report Templates
- Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- Wappalyzer - Wappalyzer uncovers the technologies used on websites.
- autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
- sslstrip - Demonstration of the HTTPS stripping attacks.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
-
-
Android Utilities
-
Penetration Testing Report Templates
- Android Open Pwn Project (AOPP) - Variant of the Android Open Source Project (AOSP), called Pwnix, is built from the ground up for network hacking and pentesting.
- cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
-
-
Windows Utilities
-
Penetration Testing Report Templates
- Empire - Pure PowerShell post-exploitation agent.
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
-
-
macOS Utilities
-
Penetration Testing Report Templates
- Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
-
Programming Languages
Categories
Network Tools
42
Books
38
Online Resources
34
Conferences and Events
13
Vulnerability Databases
13
OSINT Tools
7
Operating System Distributions
7
Web Exploitation
6
Anti-virus Evasion Tools
5
Network Vulnerability Scanners
5
Anonymity Tools
5
Reverse Engineering Tools
5
Windows Utilities
3
Hex Editors
3
Physical Access Tools
3
Docker Containers
2
Hash Cracking Tools
2
Multi-paradigm Frameworks
2
Periodicals
2
License
2
File Format Analysis Tools
2
Android Utilities
2
GNU/Linux Utilities
1
macOS Utilities
1
Social Engineering Tools
1
Security Education Courses
1
Sub Categories
Penetration Testing Report Templates
47
DDoS Tools
21
Other Lists Online
17
Docker Containers of Penetration Testing Distributions and Tools
15
Windows Books
14
Web Vulnerability Scanners
11
Penetration Testing Books
9
Hacker's Handbook Series Books
9
Online Penetration Testing Resources
8
Wireless Network Tools
6
Social Engineering Books
5
Reverse Engineering Books
4
Network Reconnaissance Tools
4
Online Open Sources Intelligence (OSINT) Resources
4
Protocol Analyzers and Sniffers
3
Malware Analysis Books
3
Network Analysis Books
2
Proxies and Machine-in-the-Middle (MITM) Tools
2
Online Exploit Development Resources
2
Lock Picking Books
2
Defensive Programming Books
2
Network Traffic Replay and Editing Tools
2
Online Lock Picking Resources
1
Docker Containers of Intentionally Vulnerable Systems
1
Exfiltration Tools
1
Online Operating Systems Resources
1
Keywords
awesome
10
awesome-list
8
list
5
security
4
automated-analysis
1
analysis-framework
1
honeypot
1
chinese
1
chinese-translation
1
honeyd
1
hacking
1
penetration
1
ctf
1
resources
1
programming-tutorial
1
lists
1
libraries
1
cppcon
1
cpp-library
1
cpp
1
c-plus-plus
1
c
1
security-experts
1
reading-list
1
owasp
1
curated
1
application-security
1
android
1
fsharp
1
dotnet
1
csharp
1
remote-administrator-tool
1
post-exploitation
1
pentesting
1
macos
1
data-mining
1
zsh
1
shell
1
fish
1
cli
1
bash
1
ruby-libraries
1
ruby
1
curated-list
1
collection
1
python-resources
1
python-library
1
python-framework
1
python
1
collections
1