Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

awesome-pentest

A collection of awesome penetration testing resources, tools and other shiny things
https://github.com/zeroc0d3lab/awesome-pentest

Last synced: 2 days ago
JSON representation

  • Anonymity Tools

    • Tor Tools

      • OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
      • Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
  • Reverse Engineering

  • Network Vulnerability Scanners

    • Wireless Network Tools

      • Nexpose - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
    • Web Vulnerability Scanners

      • WebReaver - Commercial, graphical web application vulnerability scanner designed for macOS.
      • skipfish - Performant and adaptable active web application security reconnaissance tool.
      • Nikto - Noisy but fast black box web server and web application vulnerability scanner.
      • SecApps - In-browser web application security testing suite.
      • WPScan - Black box WordPress vulnerability scanner.
  • Android Utilities

    • Fing - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.
    • cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.
  • Books

  • Open Sources Intelligence (OSINT)

    • Web application and resource analysis tools

      • EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
      • Wappalyzer - Wappalyzer uncovers the technologies used on websites.
      • BlindElephant - Web application fingerprinter.
      • Hunter.io - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.
      • Threat Crowd - Search engine for threats.
    • Metadata harvesting and analysis

    • Network device discovery tools

      • Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans.
      • Shodan - World's first search engine for Internet-connected devices.
      • ZoomEye - Search engine for cyberspace that lets the user find specific network components.
    • OSINT Online Resources

      • GhostProject - Searchable database of billions of cleartext passwords, partially visible for free.
      • NetBootcamp OSINT Tools - Collection of OSINT links and custom Web interfaces to other services.
      • WiGLE.net - Information about wireless networks world-wide, with user-friendly desktop and web applications.
  • Online Resources

    • Other Lists Online

    • Online Operating Systems Resources

    • Online Penetration Testing Resources

      • MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - Curated knowledge base and model for cyber adversary behavior.
      • Penetration Testing Framework (PTF) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
      • XSS-Payloads - Resource dedicated to all things XSS (cross-site), including payloads, tools, games, and documentation.
    • Penetration Testing Report Templates

  • Cloud Platform Attack Tools

  • Conferences and Events

    • North America

      • DEF CON - Annual hacker convention in Las Vegas.
      • CarolinaCon - Infosec conference, held annually in North Carolina.
      • DerbyCon - Annual hacker conference based in Louisville.
      • Hackers Next Door - Cybersecurity and social technology conference held in New York City.
      • Hackers On Planet Earth (HOPE) - Semi-annual conference held in New York City.
      • National Cyber Summit - Annual US security conference and Capture the Flag event, held in Huntsville, Alabama, USA.
      • PhreakNIC - Technology conference held annually in middle Tennessee.
      • RSA Conference USA - Annual security conference in San Francisco, California, USA.
      • SummerCon - One of the oldest hacker conventions in America, held during Summer.
      • Virus Bulletin Conference - Annual conference going to be held in Denver, USA for 2016.
    • South America

    • Malware Analysis Books

      • CTFTime.org - Directory of upcoming and archive of past Capture The Flag (CTF) competitions with links to challenge writeups.
    • Asia

      • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands.
      • SECUINSIDE - Security Conference in Seoul.
      • HITCON - Hacks In Taiwan Conference held in Taiwan.
    • Europe

      • 44Con - Annual Security Conference held in London.
      • CCC - Annual meeting of the international hacker scene in Germany.
      • DeepSec - Security Conference in Vienna, Austria.
      • Hack.lu - Annual conference held in Luxembourg.
      • SteelCon - Security conference in Sheffield UK.
      • Swiss Cyber Storm - Annual security conference in Lucerne, Switzerland.
      • HoneyCON - Annual Security Conference in Guadalajara, Spain. Organized by the HoneySEC association.
  • Exfiltration Tools

    • Zealandia

      • Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
  • Windows Utilities

    • Web Exploitation Books

      • Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
      • wePWNise - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
      • Empire - Pure PowerShell post-exploitation agent.
  • Web Exploitation

  • Network Tools

    • Wireless Network Tools

      • Aircrack-ng - Set of tools for auditing wireless networks.
      • BoopSuite - Suite of tools written in Python for wireless auditing.
      • Kismet - Wireless network detector, sniffer, and IDS.
      • Reaver - Brute force attack against WiFi Protected Setup.
      • Bully - Implementation of the WPS brute force attack, written in C.
    • Intentionally Vulnerable Systems as Docker Containers

      • dsniff - Collection of tools for network auditing and pentesting.
      • Intercepter-NG - Multifunctional network toolkit.
      • Ncrack - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.
      • Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
      • SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
    • DDoS Tools

      • Anevicon - Powerful UDP-based load generator, written in Rust.
      • HOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
      • T50 - Faster network stress tool.
    • Network Reconnaissance Tools

      • DNSDumpster - Online DNS recon and search service.
      • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
      • nmap - Free security scanner for network exploration & security audits.
      • zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
    • Protocol Analyzers and Sniffers

    • Network Traffic Replay and Editing Tools

      • TraceWrangler - Network capture file toolkit that can edit and merge `pcap` or `pcapng` files with batch editing features.
      • tcpreplay - Suite of free Open Source utilities for editing and replaying previously captured network traffic.
    • Proxies and Machine-in-the-Middle (MITM) Tools

      • BetterCAP - Modular, portable and easily extensible MITM framework.
  • Anti-virus Evasion Tools

    • Tor Tools

      • Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
      • UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
      • Veil - Generate metasploit payloads that bypass common anti-virus solutions.
  • Collaboration Tools

    • Malware Analysis Books

      • Lair - Reactive attack collaboration framework and web application built with meteor.
      • Reconmap - Open-source collaboration platform for InfoSec professionals that streamlines the pentest process.
  • File Format Analysis Tools

    • Zealandia

      • Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
      • peepdf - Python tool to explore PDF files in order to find out if the file can be harmful or not.
      • Veles - Binary data visualization and analysis tool.
  • GNU/Linux Utilities

    • Zealandia

      • Lynis - Auditing tool for UNIX-based systems.
  • Hash Cracking Tools

    • Zealandia

      • CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
      • Rar Crack - RAR bruteforce cracker.
  • Hex Editors

    • Zealandia

      • Hexinator - World's finest (proprietary, commercial) Hex Editor.
      • wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and Windows.
  • Intentionally Vulnerable Systems

  • Lock Picking

  • Multi-paradigm Frameworks

    • Intentionally Vulnerable Systems as Docker Containers

      • Armitage - Java-based GUI front-end for the Metasploit Framework.
      • Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
  • Shellcoding Guides and Tutorials

  • Operating System Distributions

    • Web application and resource analysis tools

      • Android Tamer - Distribution built for Android security professionals that includes tools required for Android security testing.
      • ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
      • BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
      • Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
      • Kali - Rolling Debian-based GNU/Linux distribution designed for penetration testing and digital forensics.
      • Parrot - Distribution similar to Kali, with support for multiple hardware architectures.
      • PentestBox - Open source pre-configured portable penetration testing environment for the Windows Operating System.
  • Periodicals

    • Web application and resource analysis tools

  • Physical Access Tools

    • Web application and resource analysis tools

      • AT Commands - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.
      • Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
      • Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
      • Thunderclap - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.
  • Privilege Escalation Tools

    • Web application and resource analysis tools

      • GTFOBins - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
      • LOLBAS (Living Off The Land Binaries and Scripts) - Documents binaries, scripts, and libraries that can be used for "Living Off The Land" techniques, i.e., binaries that can be used by an attacker to perform actions beyond their original purpose.
  • Security Education Courses

  • Social Engineering

  • Vulnerability Databases

    • Social Engineering Tools

      • Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
      • CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
      • China National Vulnerability Database (CNNVD) - Chinese government-run vulnerability database analoguous to the United States's CVE database hosted by Mitre Corporation.
      • Common Vulnerabilities and Exposures (CVE) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
      • Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
      • HPI-VDB - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
      • Inj3ct0r - Exploit marketplace and vulnerability information aggregator. ([Onion service](http://mvfjfugdwgc5uwho.onion/).)
      • National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
      • Open Source Vulnerabilities (OSV) - Database of vulnerabilities affecting open source software, queryable by project, Git commit, or version.
      • US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
      • Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
      • Vulners - Security database of software vulnerabilities.
      • Vulmon - Vulnerability search engine with vulnerability intelligence features that conducts full text searches in its database.
  • macOS Utilities

    • Intentionally Vulnerable Systems as Docker Containers

      • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.