An open API service indexing awesome lists of open source software.

awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/yllnelaj/awesome-pentest

Last synced: 8 days ago
JSON representation

  • Online Resources

  • Books

  • Lock Picking

  • Network Tools

    • Protocol Analyzers and Sniffers

      • awesome-pcaptools
      • Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
      • Dshell - Network forensic analysis framework.
      • sniffglue - Secure multithreaded packet sniffer.
      • netsniff-ng - Swiss army knife for network sniffing.
      • Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols.
      • Debookee - Simple and powerful network traffic analyzer for macOS.
    • Network Reconnaissance Tools

      • nmap - Free security scanner for network exploration & security audits.
      • DNSDumpster - Online DNS recon and search service.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
      • AQUATONE - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.
      • Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
      • fierce - Python3 port of the original `fierce.pl` DNS reconnaissance tool for locating non-contiguous IP space.
      • passivedns - Network sniffer that logs all DNS server replies for use in a passive DNS setup.
      • subbrute - DNS meta-query spider that enumerates DNS records, and subdomains.
      • CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
      • XRay - Network (sub)domain discovery and reconnaissance automation tool.
      • smbmap - Handy SMB enumeration tool.
      • scanless - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
      • ACLight - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
      • ScanCannon - Python script to quickly enumerate large networks by calling `masscan` to quickly identify open ports and then `nmap` to gain details on the systems/services on those ports.
      • passivedns-client - Library and query tool for querying several passive DNS providers.
      • OWASP Amass - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • RustScan - Lightweight and quick open-source port scanner designed to automatically pipe open ports into Nmap.
    • Intentionally Vulnerable Systems as Docker Containers

      • Intercepter-NG - Multifunctional network toolkit.
      • Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • dsniff - Collection of tools for network auditing and pentesting.
      • THC Hydra - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.
      • rshijack - TCP connection hijacker, Rust rewrite of `shijack`.
      • CrackMapExec - Swiss army knife for pentesting networks.
      • Printer Exploitation Toolkit (PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
      • Zarp - Network attack tool centered around the exploitation of local networks.
      • dnstwist - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
      • Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
      • routersploit - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
      • Legion - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.
      • Network-Tools.com - Website offering an interface to numerous basic network utilities like `ping`, `traceroute`, `whois`, and more.
      • Intercepter-NG - Multifunctional network toolkit.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • IKEForce - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.
      • pivotsuite - Portable, platform independent and powerful network pivoting toolkit.
    • DDoS Tools

      • Anevicon - Powerful UDP-based load generator, written in Rust.
      • HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
      • T50 - Faster network stress tool.
      • SlowLoris - DoS tool that uses low bandwidth on the attacking side.
      • UFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
      • Low Orbit Ion Canon (LOIC) - Open source network stress tool written for Windows.
      • Memcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
    • Network Traffic Replay and Editing Tools

      • TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
      • tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
      • scapy - Python-based interactive packet manipulation program and library.
      • hping3 - Network tool able to send custom TCP/IP packets.
      • pig - GNU/Linux packet crafting tool.
      • bittwist - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.
    • Proxies and Machine-in-the-Middle (MITM) Tools

      • BetterCAP - Modular, portable and easily extensible MITM framework.
      • evilgrade - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
      • SSH MITM - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
      • Morpheus - Automated ettercap TCP/IP Hijacking tool.
      • dnschef - Highly configurable DNS proxy for pentesters.
      • mallory - HTTP/HTTPS proxy over SSH.
      • oregano - Python module that runs as a machine-in-the-middle (MITM) accepting Tor client requests.
      • MITMf - Framework for Man-In-The-Middle attacks.
      • Habu - Python utility implementing a variety of network attacks, such as ARP poisoning, DHCP starvation, and more.
      • Lambda-Proxy - Utility for testing SQL Injection vulnerabilities on AWS Lambda serverless functions.
      • sylkie - Command line tool and library for testing networks for common address spoofing security vulnerabilities in IPv6 networks using the Neighbor Discovery Protocol.
    • Wireless Network Tools

      • Aircrack-ng - Set of tools for auditing wireless networks.
      • BoopSuite - Suite of tools written in Python for wireless auditing.
      • Kismet - Wireless network detector, sniffer, and IDS.
      • Reaver - Brute force attack against WiFi Protected Setup.
      • pwnagotchi - Deep reinforcement learning based AI that learns from the Wi-Fi environment and instruments BetterCAP in order to maximize the WPA key material captured.
      • wifi-arsenal - Resources for Wi-Fi Pentesting.
      • krackattacks-scripts - WPA2 Krack attack scripts.
      • Fluxion - Suite of automated social engineering based WPA attacks.
      • Wifite - Automated wireless attack tool.
      • Cowpatty - Brute-force dictionary attack against WPA-PSK.
      • Airgeddon - Multi-use bash script for Linux systems to audit wireless networks.
      • infernal-twin - Automated wireless hacking tool.
      • WiFi-Pumpkin - Framework for rogue Wi-Fi access point attack.
      • KRACK Detector - Detect and prevent KRACK attacks in your network.
    • Transport Layer Security Tools

      • SSLyze - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
      • tls_prober - Fingerprint a server's SSL/TLS implementation.
      • crackpkcs12 - Multithreaded program to crack PKCS#12 files (`.p12` and `.pfx` extensions), such as TLS/SSL certificates.
  • Operating System Distributions

    • Web application and resource analysis tools

      • Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
      • ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
      • Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
      • BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
      • Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
      • Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
      • PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
      • The Pentesters Framework - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that omits less frequently used utilities.
      • AttifyOS - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
  • Anonymity Tools

    • Tor Tools

      • Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
      • OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
      • dos-over-tor - Proof of concept denial of service over Tor stress test tool.
      • awesome-tor
      • kalitorify - Transparent proxy through Tor for Kali Linux OS.
      • Nipe - Script to redirect all traffic from the machine to the Tor network.
  • Web Exploitation

    • Intercepting Web proxies

      • Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
      • OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
      • mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
    • Social Engineering Tools

      • autochrome - Chrome browser profile preconfigured with appropriate settings needed for web application testing.
      • sslstrip - Demonstration of the HTTPS stripping attacks.
      • FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
      • Raccoon - High performance offensive security tool for reconnaissance and vulnerability scanning.
      • badtouch - Scriptable network authentication cracker.
      • WPSploit - Exploit WordPress-powered websites with Metasploit.
      • sslstrip2 - SSLStrip version to defeat HSTS.
    • Web Exploitation Books

    • Web shells and C2 frameworks

      • Browser Exploitation Framework (BeEF) - Command and control server for delivering exploits to commandeered Web browsers.
      • weevely3 - Weaponized PHP-based web shell.
      • PhpSploit - Full-featured C2 framework which silently persists on webserver via evil PHP oneliner.
      • DAws - Advanced Web shell.
      • SharPyShell - Tiny and obfuscated ASP.NET webshell for C# web applications.
    • Web-accessible source code ripping tools

      • GitTools - Automatically find and download Web-accessible `.git` repositories.
      • git-dumper - Tool to dump a git repository from a website.
      • DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.
      • git-scanner - Tool for bug hunting or pentesting websites that have open `.git` repositories available in public.
    • Web path discovery and bruteforcing tools

      • dirsearch - Web path scanner.
      • recursebuster - Content discovery tool to perform directory and file bruteforcing.
    • Web injection tools

      • Commix - Automated all-in-one operating system command injection and exploitation tool.
      • NoSQLmap - Automatic NoSQL injection and database takeover tool.
      • tplmap - Automatic server-side template injection and Web server takeover tool.
    • Web file inclusion tools

      • LFISuite - Automatic LFI scanner and exploiter.
      • fimap - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
      • Kadimus - LFI scan and exploit tool.
      • liffy - LFI exploitation tool.
  • Shellcoding Guides and Tutorials

  • Open Sources Intelligence (OSINT)

    • Network device discovery tools

      • Shodan - World's first search engine for Internet-connected devices.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
    • OSINT Online Resources

      • WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
      • GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
      • NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
      • CertGraph - Crawls a domain's SSL/TLS certificates for its certificate alternative names.
      • Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
      • Threat Crowd - Search engine for threats.
      • surfraw - Fast UNIX command line interface to a variety of popular WWW search engines.
      • Virus Total - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
    • Metadata harvesting and analysis

    • Web application and resource analysis tools

      • Wappalyzer - Wappalyzer uncovers the technologies used on websites.
      • EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
      • WhatWeb - Website fingerprinter.
      • wafw00f - Identifies and fingerprints Web Application Firewall (WAF) products.
      • WhatWaf - Detect and bypass web application firewalls and protection systems.
      • VHostScan - Virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
      • webscreenshot - Simple script to take screenshots of websites from a list of sites.
      • BlindElephant - Web application fingerprinter.
    • Penetration Testing Report Templates

      • awesome-osint
      • sn0int - Semi-automatic OSINT framework and package manager.
      • Sn1per - Automated Pentest Recon Scanner.
      • recon-ng - Full-featured Web Reconnaissance framework written in Python.
      • gOSINT - OSINT tool with multiple modules and a telegram scraper.
      • Skiptracer - OSINT scraping framework that utilizes basic Python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget.
      • creepy - Geolocation OSINT tool.
      • GyoiThon - GyoiThon is an Intelligence Gathering tool using Machine Learning.
      • image-match - Quickly search over billions of images.
      • Depix - Tool for recovering passwords from pixelized screenshots (by de-pixelating text).
      • Intrigue - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
      • Spiderfoot - Multi-source OSINT automation tool with a Web UI and report visualizations.
    • Dorking tools

      • BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.
      • snitch - Information gathering via dorks.
      • github-dorks - CLI tool to scan GitHub repos/organizations for potential sensitive information leaks.
      • pagodo - Automate Google Hacking Database scraping.
      • dorkbot - Command-line tool to scan Google (or other) search results for vulnerabilities.
      • GooDork - Command line Google dorking tool.
      • dork-cli - Command line Google dork tool.
      • fast-recon - Perform Google dorks against a domain.
      • dorks - Google hack database automation tool.
      • Google Hacking Database - Database of Google dorks; can be used for recon.
      • WhatBreach - Search email addresses and discover all known breaches that this email has been seen in, and download the breached database if it is publicly available.
      • SimplyEmail - Email recon made fast and easy.
    • Source code repository searching tools

      • vcsmap - Plugin-based tool to scan public version control systems for sensitive information.
  • Multi-paradigm Frameworks

    • Intentionally Vulnerable Systems as Docker Containers

      • Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
      • Armitage - Java-based GUI front-end for the Metasploit Framework.
      • Faraday - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
      • Pupy - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
      • AutoSploit - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.
      • Decker - Penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.
  • Conferences and Events

    • Malware Analysis Books

      • CTFTime.org - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
    • Asia

      • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
      • SECUINSIDE - Security Conference in Seoul.
      • HITCON - Hacks In Taiwan Conference held in Taiwan.
      • Nullcon - Annual conference in Delhi and Goa, India.
    • Europe

      • 44Con - Annual Security Conference held in London.
      • CCC - Annual meeting of the international hacker scene in Germany.
      • DeepSec - Security Conference in Vienna, Austria.
      • Hack.lu - Annual conference held in Luxembourg.
      • SteelCon - Security conference in Sheffield UK.
      • Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
      • HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
      • DefCamp - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
    • North America

      • CarolinaCon - Infosec conference, held annually in North Carolina.
      • DerbyCon - Annual hacker conference based in Louisville.
      • Hackers Next Door - Cybersecurity and social technology conference held in New York City.
      • Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
      • National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • RSA Conference USA - Annual security conference in San Francisco, California, USA.
      • SummerCon - One of the oldest hacker conventions in America, held during Summer.
      • DEF CON - Annual hacker convention in Las Vegas.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • ShmooCon - Annual US East coast hacker convention.
      • AppSecUSA - Annual conference organized by OWASP.
      • Black Hat - Annual security conference in Las Vegas.
    • South America

    • Zealandia

      • CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con.
  • GNU/Linux Utilities

    • Zealandia

      • Lynis - Auditing tool for UNIX-based systems.
      • Hwacha - Post-exploitation tool to quickly execute payloads via SSH on one or more Linux systems simultaneously.
      • Linux Exploit Suggester - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
  • Android Utilities

    • cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
    • Fing - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.
  • Anti-virus Evasion Tools

    • Tor Tools

      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
      • UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
      • Veil - Generate metasploit payloads that bypass common anti-virus solutions.
      • AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
      • peCloakCapstone - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
      • CarbonCopy - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.
      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
  • Collaboration Tools

    • Malware Analysis Books

      • Lair - Reactive attack collaboration framework and web application built with meteor.
      • RedELK - Track and alarm about Blue Team activities while providing better usability in long term offensive operations.
      • Dradis - Open-source reporting and collaboration tool for IT security professionals.
      • Pentest Collaboration Framework (PCF) - Open source, cross-platform, and portable toolkit for automating routine pentest processes with a team.
  • Exfiltration Tools

    • Zealandia

      • Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
      • TrevorC2 - Client/server tool for masking command and control and data exfiltration through a normally browsable website, not typical HTTP POST requests.
      • dnscat2 - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.
      • pwnat - Punches holes in firewalls and NATs.
      • DET - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
      • tgcd - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
  • File Format Analysis Tools

    • Zealandia

      • peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
      • Veles - Binary data visualization and analysis tool.
      • ExifTool - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.
  • Hash Cracking Tools

    • Zealandia

      • CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
      • Rar Crack - RAR bruteforce cracker.
      • hate_crack - Tool for automating cracking methodologies through Hashcat.
      • duplicut - Quickly remove duplicates, without changing the order, and without getting OOM on huge wordlists.
      • JWT Cracker - Simple HS256 JSON Web Token (JWT) token brute force cracker.
      • BruteForce Wallet - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
      • GoCrack - Management Web frontend for distributed password cracking sessions using hashcat (or other supported tools) written in Go.
  • Hex Editors

    • Zealandia

      • Hexinator - World's finest (proprietary, commercial) Hex Editor.
      • wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
      • hexedit - Simple, fast, console-based hex editor.
      • Bless - High quality, full featured, cross-platform graphical hex editor written in Gtk#.
      • Frhed - Binary file editor for Windows.
  • Intentionally Vulnerable Systems

  • Network Vulnerability Scanners

    • Wireless Network Tools

      • Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
      • Vuls - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
      • celerystalk - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner.
      • Netsparker Application Security Scanner - Application security scanner to automatically find security flaws.
    • Web Vulnerability Scanners

      • Nikto - Noisy but fast black box web server and web application vulnerability scanner.
      • SecApps - In-browser web application security testing suite.
      • WPScan - Black box WordPress vulnerability scanner.
      • WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
      • cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
      • w3af - Web application attack and audit framework.
      • JCS - Joomla Vulnerability Component Scanner with automatic database updater from exploitdb and packetstorm.
      • ACSTIS - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
      • joomscan - Joomla vulnerability scanner.
      • Wapiti - Black box web application vulnerability scanner with built-in fuzzer.
  • Periodicals

    • Web application and resource analysis tools

  • Physical Access Tools

    • Web application and resource analysis tools

      • AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
      • Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
      • Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
      • Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
      • PCILeech - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
  • Reverse Engineering

  • Social Engineering

  • Vulnerability Databases

    • Social Engineering Tools

      • Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
      • CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
      • China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
      • Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
      • Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
      • HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
      • National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
      • Open Source Vulnerabilities (OSV) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
      • US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
      • Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
      • Vulners - Security database of software vulnerabilities.
      • Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
      • Snyk Vulnerability DB - Detailed information and remediation guidance for vulnerabilities known by Snyk.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Snyk Vulnerability DB - Detailed information and remediation guidance for vulnerabilities known by Snyk.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • SecuriTeam - Independent source of software vulnerability information.
      • Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
      • Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
      • Mozilla Foundation Security Advisories - Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
  • Windows Utilities

    • Web Exploitation Books

      • Empire - Pure PowerShell post-exploitation agent.
      • Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
      • wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
      • Ruler - Abuses client-side Outlook features to gain a remote shell on a Microsoft Exchange server.
      • ctftool - Interactive Collaborative Translation Framework (CTF) exploration tool capable of launching cross-session edit session attacks.
      • Fibratus - Tool for exploration and tracing of the Windows kernel.
      • Covenant - ASP.NET Core application that serves as a collaborative command and control platform for red teamers.
      • PowerSploit - PowerShell Post-Exploitation Framework.
      • LaZagne - Credentials recovery project.
      • RID_ENUM - Python script that can enumerate all users from a Windows Domain Controller and crack those user's passwords using brute-force.
      • Responder - Link-Local Multicast Name Resolution (LLMNR), NBT-NS, and mDNS poisoner.
      • DeathStar - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
      • Rubeus - Toolset for raw Kerberos interaction and abuses.
      • MailSniper - Modular tool for searching through email in a Microsoft Exchange environment, gathering the Global Address List from Outlook Web Access (OWA) and Exchange Web Services (EWS), and more.
      • Inveigh - Windows PowerShell ADIDNS/LLMNR/mDNS/NBNS spoofer/machine-in-the-middle tool.
      • redsnarf - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
      • Commando VM - Automated installation of over 140 Windows software packages for penetration testing and red teaming.
      • Windows Exploit Suggester - Detects potential missing patches on the target.
      • SCOMDecrypt - Retrieve and decrypt RunAs credentials stored within Microsoft System Center Operations Manager (SCOM) databases.
  • Security Education Courses

  • Static Analyzers

    • Social Engineering Tools

      • sobelow - Security-focused static analysis for the Phoenix Framework.
      • Brakeman - Static analysis security vulnerability scanner for Ruby on Rails applications.
      • cwe_checker - Suite of tools built atop the Binary Analysis Platform (BAP) to heuristically detect CWEs in compiled binaries and firmware.
      • Progpilot - Static security analysis tool for PHP code.
      • RegEx-DoS - Analyzes source code for Regular Expressions susceptible to Denial of Service attacks.
      • cppcheck - Extensible C/C++ static analyzer focused on finding bugs.
      • FindBugs - Free software static analyzer to look for bugs in Java code.
  • Exploit Development Tools

    • Zealandia

      • peda - Python Exploit Development Assistance for GDB.
      • Pwntools - Rapid exploit development framework built for use in CTFs.
      • Wordpress Exploit Framework - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
      • Magic Unicorn - Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or `certutil` (using fake certificates).
  • CTF Tools

    • Malware Analysis Books

      • ctf-tools - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
      • CTF Field Guide - Everything you need to win your next CTF competition.
      • shellpop - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests.
      • RsaCtfTool - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
      • Ciphey - Automated decryption tool using artificial intelligence and natural language processing.
  • macOS Utilities

    • Intentionally Vulnerable Systems as Docker Containers

      • EvilOSX - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
      • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
  • Industrial Control and SCADA Systems

  • Privilege Escalation Tools

    • Web application and resource analysis tools

      • LinEnum - Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.
      • unix-privesc-check - Shell script to check for simple privilege escalation vectors on UNIX systems.
      • Active Directory and Privilege Escalation (ADAPE) - Umbrella script that automates numerous useful PowerShell modules to discover security misconfigurations and attempt privilege escalation against Active Directory.
      • Postenum - Shell script used for enumerating possible privilege escalation opportunities on a local GNU/Linux system.
    • Password Spraying Tools

      • DomainPasswordSpray - Tool written in PowerShell to perform a password spray attack against users of a domain.
      • SprayingToolkit - Scripts to make password spraying attacks against Lync/S4B, Outlook Web Access (OWA) and Office 365 (O365) a lot quicker, less painful and more efficient.
  • Steganography Tools

    • Social Engineering Tools

      • Cloakify - Textual steganography toolkit that converts any filetype into lists of everyday strings.
      • StegCracker - Steganography brute-force utility to uncover hidden data inside files.
  • Side-channel Tools

    • Reverse Engineering Tools

      • SGX-Step - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.
      • TRRespass - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.
      • ChipWhisperer - Complete open-source toolchain for side-channel power analysis and glitching attacks.