Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/yllnelaj/awesome-pentest

Last synced: 2 days ago
JSON representation

  • Online Resources

    • Online Penetration Testing Resources

      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
      • Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
    • Online Operating Systems Resources

    • Other Lists Online

    • Penetration Testing Report Templates

  • Android Utilities

    • cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
  • Anonymity Tools

    • Tor Tools

      • OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
      • Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
  • Anti-virus Evasion Tools

    • Tor Tools

      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
      • UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
      • Veil - Generate metasploit payloads that bypass common anti-virus solutions.
  • Books

  • Collaboration Tools

    • Malware Analysis Books

      • Lair - Reactive attack collaboration framework and web application built with meteor.
  • Conferences and Events

    • Malware Analysis Books

      • CTFTime.org - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
    • Asia

      • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
      • SECUINSIDE - Security Conference in Seoul.
      • HITCON - Hacks In Taiwan Conference held in Taiwan.
    • Europe

      • 44Con - Annual Security Conference held in London.
      • CCC - Annual meeting of the international hacker scene in Germany.
      • DeepSec - Security Conference in Vienna, Austria.
      • Hack.lu - Annual conference held in Luxembourg.
      • SteelCon - Security conference in Sheffield UK.
      • Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
      • HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
    • North America

      • CarolinaCon - Infosec conference, held annually in North Carolina.
      • DerbyCon - Annual hacker conference based in Louisville.
      • Hackers Next Door - Cybersecurity and social technology conference held in New York City.
      • Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
      • National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • RSA Conference USA - Annual security conference in San Francisco, California, USA.
      • SummerCon - One of the oldest hacker conventions in America, held during Summer.
      • DEF CON - Annual hacker convention in Las Vegas.
    • South America

  • Exfiltration Tools

    • Zealandia

      • Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
  • File Format Analysis Tools

    • Zealandia

      • Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
      • peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
      • Veles - Binary data visualization and analysis tool.
  • GNU/Linux Utilities

    • Zealandia

      • Lynis - Auditing tool for UNIX-based systems.
  • Hash Cracking Tools

    • Zealandia

      • CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
      • Rar Crack - RAR bruteforce cracker.
  • Hex Editors

    • Zealandia

      • Hexinator - World's finest (proprietary, commercial) Hex Editor.
      • wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
  • Intentionally Vulnerable Systems

  • Lock Picking

  • Multi-paradigm Frameworks

    • Intentionally Vulnerable Systems as Docker Containers

      • Armitage - Java-based GUI front-end for the Metasploit Framework.
      • Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
  • Network Tools

    • Intentionally Vulnerable Systems as Docker Containers

      • Intercepter-NG - Multifunctional network toolkit.
      • Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • dsniff - Collection of tools for network auditing and pentesting.
    • Network Reconnaissance Tools

      • zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
      • DNSDumpster - Online DNS recon and search service.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • nmap - Free security scanner for network exploration & security audits.
    • DDoS Tools

      • Anevicon - Powerful UDP-based load generator, written in Rust.
      • HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
      • T50 - Faster network stress tool.
    • Protocol Analyzers and Sniffers

    • Network Traffic Replay and Editing Tools

      • TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
      • tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
    • Proxies and Machine-in-the-Middle (MITM) Tools

      • BetterCAP - Modular, portable and easily extensible MITM framework.
    • Wireless Network Tools

      • Aircrack-ng - Set of tools for auditing wireless networks.
      • BoopSuite - Suite of tools written in Python for wireless auditing.
      • Kismet - Wireless network detector, sniffer, and IDS.
      • Reaver - Brute force attack against WiFi Protected Setup.
  • Network Vulnerability Scanners

    • Wireless Network Tools

      • Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
    • Web Vulnerability Scanners

      • Nikto - Noisy but fast black box web server and web application vulnerability scanner.
      • SecApps - In-browser web application security testing suite.
      • WPScan - Black box WordPress vulnerability scanner.
      • WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
      • cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
  • Open Sources Intelligence (OSINT)

      • Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
      • Threat Crowd - Search engine for threats.
    • Metadata harvesting and analysis

    • Network device discovery tools

      • Shodan - World's first search engine for Internet-connected devices.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
    • OSINT Online Resources

      • GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
      • NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
      • WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
    • Web application and resource analysis tools

      • Wappalyzer - Wappalyzer uncovers the technologies used on websites.
      • EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
  • Operating System Distributions

    • Web application and resource analysis tools

      • Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
      • ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
      • BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
      • Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
      • Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
      • Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
      • PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
  • Periodicals

    • Web application and resource analysis tools

  • Physical Access Tools

    • Web application and resource analysis tools

      • AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
      • Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
      • Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
      • Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
  • Reverse Engineering

  • Security Education Courses

  • Shellcoding Guides and Tutorials

  • Social Engineering

  • Vulnerability Databases

    • Social Engineering Tools

      • Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
      • CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
      • China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
      • Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
      • Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
      • HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
      • Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
      • National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
      • Open Source Vulnerabilities (OSV) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
      • US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
      • Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
      • Vulners - Security database of software vulnerabilities.
      • Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
  • Web Exploitation

  • Windows Utilities

    • Web Exploitation Books

      • Empire - Pure PowerShell post-exploitation agent.
      • Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
      • wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
  • macOS Utilities

    • Intentionally Vulnerable Systems as Docker Containers

      • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.