https://github.com/yogsec/hacking-tools
A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
https://github.com/yogsec/hacking-tools
blue-team bug-bounty-tools bugbounty bugbountytips cybersecurity ethical-hacking-tools exploit forensics hackers hacking hacking-tools kali-linux linux-tools penetration-testing penetration-testing-tools red-team reverse-engineering vulnerability web-security
Last synced: 19 days ago
JSON representation
A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
- Host: GitHub
- URL: https://github.com/yogsec/hacking-tools
- Owner: yogsec
- License: mit
- Created: 2025-02-13T08:09:05.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2026-01-25T10:38:41.000Z (about 2 months ago)
- Last Synced: 2026-01-25T21:29:53.494Z (about 2 months ago)
- Topics: blue-team, bug-bounty-tools, bugbounty, bugbountytips, cybersecurity, ethical-hacking-tools, exploit, forensics, hackers, hacking, hacking-tools, kali-linux, linux-tools, penetration-testing, penetration-testing-tools, red-team, reverse-engineering, vulnerability, web-security
- Homepage: https://linktr.ee/yogsec
- Size: 64.5 KB
- Stars: 502
- Watchers: 5
- Forks: 108
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Hacking-Tools
A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.

---
## Table of Contents
- [π Information Gathering](#-information-gathering)
- [π Vulnerability Analysis](#-vulnerability-analysis)
- [π₯ Exploitation Tools](#-exploitation-tools)
- [π‘ Wireless Attacks](#-wireless-attacks)
- [π§βπ» Forensics Tools](#-forensics-tools)
- [β³ Stress Testing](#-stress-testing)
- [π΅οΈββοΈ Sniffing & Spoofing](#-sniffing--spoofing)
- [π Password Attacks](#-password-attacks)
- [π Web Application Analysis](#-web-application-analysis)
- [π§βπ» Reverse Engineering](#-reverse-engineering)
- [π Reporting Tools](#-reporting-tools)
- [π Social Engineering Tools](#-social-engineering-tools)
- [π§© Miscellaneous](#-miscellaneous)
## Information Gathering
- π **[Nmap](https://nmap.org/)** β Network scanning and mapping tool.
- πΆ **[Kismet](https://www.kismetwireless.net/)** β Wireless network detector, sniffer, and intrusion detection.
- π΅οΈ **[Maltego](https://www.maltego.com/)** β OSINT and data mining tool for information analysis.
- π¨ **[theHarvester](https://github.com/laramies/theHarvester)** β Tool to gather emails, subdomains, hosts, and more.
- π **[Recon-ng](https://github.com/lanmaster53/recon-ng)** β Full-featured web reconnaissance framework.
- π΅οΈββοΈ **[SpiderFoot](https://github.com/smicallef/spiderfoot)** β Automate OSINT collection from multiple sources.
- π **[Amass](https://github.com/OWASP/Amass)** β Network mapping and external asset discovery tool.
- ποΈ **[Sublist3r](https://github.com/aboul3la/Sublist3r)** β Subdomain enumeration using search engines.
- π§βπ» **[Assetfinder](https://github.com/tomnomnom/assetfinder)** β Subdomain discovery using various sources.
- π **[crt.sh](https://crt.sh/)** β SSL certificate transparency log search engine.
- π§ͺ **[Dnsrecon](https://github.com/darkoperator/dnsrecon)** β Perform DNS enumeration and zone transfers.
- π **[Fierce](https://github.com/mschwager/fierce)** β DNS reconnaissance and attack tool.
- π **[WHOIS](https://www.whois.com/)** β Domain registration and ownership lookup.
- π¬ **[EmailHarvester](https://github.com/maldevel/EmailHarvester)** β Email enumeration and gathering.
- πΈοΈ **[Shodan](https://www.shodan.io/)** β Search engine for internet-connected devices.
- π₯ **[Censys](https://censys.io/)** β Search engine for hosts and networks on the internet.
- π **[OSINT Framework](https://osintframework.com/)** β Collection of OSINT tools and resources.
- π§βπ» **[FOCA](https://github.com/ElevenPaths/FOCA)** β Metadata extraction and document analysis.
- π‘οΈ **[Netcraft](https://www.netcraft.com/)** β Website profiling and phishing detection.
- ποΈ **[BuiltWith](https://builtwith.com/)** β Website technology lookup and analysis.
## Vulnerability Analysis
- π§ͺ **[OpenVAS](https://github.com/greenbone/openvas-scanner)** β Open-source vulnerability scanner.
- π‘οΈ **[Nessus](https://www.tenable.com/products/nessus)** β Commercial vulnerability assessment tool.
- π΅οΈββοΈ **[Nikto](https://cirt.net/Nikto2)** β Web server scanner for detecting vulnerabilities.
- πΊ **[Wapiti](https://github.com/wapiti-scanner/wapiti)** β Web application security scanner.
- π§βπ» **[Vega](https://github.com/subgraph/Vega)** β GUI-based web vulnerability scanner.
- π·οΈ **[Arachni](https://github.com/Arachni/arachni)** β Feature-rich web application security scanner.
- π **[SQLmap](https://github.com/sqlmapproject/sqlmap)** β Automated SQL injection detection and exploitation tool.
- πΈοΈ **[OWASP ZAP](https://www.zaproxy.org/)** β Open-source web application security scanner.
- π **[Nmap Vulners](https://github.com/vulnersCom/nmap-vulners)** β Nmap NSE script for CVE detection.
- π **[Retire.js](https://github.com/RetireJS/retire.js)** β JavaScript library vulnerability scanner.
- βοΈ **[Dependency-Check](https://github.com/jeremylong/DependencyCheck)** β Vulnerability analysis for project dependencies.
- π§βπ» **[Bandit](https://github.com/PyCQA/bandit)** β Security linter for Python code.
- π **[Vuls](https://github.com/future-architect/vuls)** β Agentless vulnerability scanner for Linux/FreeBSD servers.
- π¦ **[Trivy](https://github.com/aquasecurity/trivy)** β Vulnerability scanner for containers and dependencies.
- π§βπ» **[Grype](https://github.com/anchore/grype)** β Vulnerability scanner for container images and filesystems.
- π§βπ» **[Safety](https://github.com/pyupio/safety)** β Python dependency security scanner.
- π **[Lychee](https://github.com/lycheeverse/lychee)** β Broken link checker with vulnerability detection potential.
- π **[GitLeaks](https://github.com/gitleaks/gitleaks)** β Detect hardcoded secrets and sensitive data.
- π§βπ» **[ScoutSuite](https://github.com/nccgroup/ScoutSuite)** β Multi-cloud security auditing tool.
- π§βπ» **[CloudSploit](https://github.com/aquasecurity/cloudsploit)** β AWS security auditing tool.
## Exploitation Tools
- π― [**Metasploit Framework**](https://github.com/rapid7/metasploit-framework) β Powerful exploit development and penetration testing framework.
- π [**Armitage**](https://github.com/rsmudge/armitage) β GUI front-end for Metasploit to visualize attacks.
- π [**BeEF (Browser Exploitation Framework)**](https://github.com/beefproject/beef) β Exploits browser vulnerabilities for client-side attacks.
- π» [**ExploitDB**](https://github.com/offensive-security/exploitdb) β Archive of public exploits and proof-of-concept code.
- π [**SearchSploit**](https://github.com/offensive-security/exploitdb-bin-sploits) β Offline version of ExploitDB for quick exploit searching.
- π [**sqlmap**](https://github.com/sqlmapproject/sqlmap) β Automated SQL injection exploitation tool.
- π€ [**Commix**](https://github.com/commixproject/commix) β Automated command injection vulnerability scanner.
- π₯οΈ [**RouterSploit**](https://github.com/threat9/routersploit) β Exploits vulnerabilities in routers, IoT, and embedded devices.
- π² [**SET (Social Engineering Toolkit)**](https://github.com/trustedsec/social-engineer-toolkit) β Human hacking via phishing, payloads, and more.
- π΅οΈββοΈ [**Empire**](https://github.com/BC-SECURITY/Empire) β Post-exploitation framework for PowerShell agents.
- π§βπ» [**Pupy**](https://github.com/n1nj4sec/pupy) β Cross-platform post-exploitation remote access tool (RAT).
- 𧨠[**Sliver**](https://github.com/BishopFox/sliver) β C2 framework for adversary simulation and red teaming.
- π [**Shellter**](https://www.shellterproject.com) β Dynamic shellcode injector for Windows executables.
- π¦ [**Merlin**](https://github.com/Ne0nd0g/merlin) β Post-exploitation command & control server using HTTP/2.
- π§ββοΈ [**Covenant**](https://github.com/cobbr/Covenant) β C#-based post-exploitation platform.
- π [**PowerSploit**](https://github.com/PowerShellMafia/PowerSploit) β PowerShell scripts for post-exploitation.
- π [**Windows Exploit Suggester**](https://github.com/bitsadmin/wesng) β Suggests exploits based on Windows OS versions.
- π¦ [**PayloadsAllTheThings**](https://github.com/swisskyrepo/PayloadsAllTheThings) β Collection of payloads for exploits, fuzzing, and pentesting.
- π§βπ» [**Fuzzbunch**](https://github.com/fuzzbunch/fuzzbunch) β NSAβs exploit framework (part of the Shadow Brokers leak).
- π οΈ [**CrackMapExec**](https://github.com/byt3bl33d3r/CrackMapExec) β Swiss army knife for post-exploitation in Windows environments.
## Wireless Attacks
- π‘ [**Aircrack-ng**](https://github.com/aircrack-ng/aircrack-ng) β WiFi cracking suite
- π οΈ [**Reaver**](https://github.com/t6x/reaver-wps-fork) β WPS attack tool
- π§βπ» [**Fern WiFi Cracker**](https://github.com/savio-code/fern-wifi-cracker) β Wireless network auditing tool
- π [**Wifite**](https://github.com/derv82/wifite) β Automated wireless attack tool
- π‘οΈ [**Kismet**](https://kismetwireless.net/) β Wireless network detector & sniffer
- π [**MDK3**](https://github.com/aircrack-ng/mdk3) β Wireless network attack tool
- π― [**PixieWPS**](https://github.com/wiire/aircrack-ng) β WPS offline attack tool
- π§ [**WPA2 Wordlist Generator**](https://github.com/edenhill/wpa2-wordlist-generator) β Generate custom WPA2 wordlists
- π΅οΈββοΈ [**Bully**](https://github.com/aanarchyy/bully) β WPS attack tool for brute-forcing
- π [**Evil Twin**](https://github.com/derv82/evil-twin) β Create fake AP for capturing handshakes
- π [**WiFi-Pumpkin**](https://github.com/P0cL4bs/WiFi-Pumpkin) β Man-in-the-middle framework for Wi-Fi networks
- π§© [**Airgeddon**](https://github.com/v1s1t0r1sh3r3/airgeddon) β Multi-use bash script for wireless auditing
- π§βπ» [**Ghost Phisher**](https://github.com/sundowndev/ghost-phisher) β Wireless network attack tool for phishing
- π§βπ§ [**NoCatSplash**](https://github.com/no-such-project/NoCatSplash) β Captive portal for Wi-Fi networks
- π¦ [**Wifiphisher**](https://github.com/wifiphisher/wifiphisher) β Phishing tool for Wi-Fi networks
- π‘ [**WLANPi**](https://github.com/wlanpi/wlanpi) β Wireless attack platform for pen-testers
- π οΈ [**Cowpatty**](https://github.com/wiire/cowpatty) β Tool for offline WPA2 cracking
- π [**Scapy**](https://github.com/secdev/scapy) β Python tool for packet manipulation and analysis
- πΆ [**NetStumbler**](http://www.netstumbler.com/) β Wi-Fi scanner for Windows
- π [**Wi-Fi Pineapple**](https://github.com/securestate/wifipineapple) β Wireless attack platform by Hak5
## Forensics Tools
- π§βπ» [**Autopsy**](https://www.autopsy.com/) β Digital forensics platform for analyzing hard drives and smartphones.
- π§ [**Volatility**](https://www.volatilityfoundation.org/) β Memory forensics framework for analyzing RAM dumps.
- ποΈ [**Binwalk**](https://github.com/ReFirmLabs/binwalk) β Firmware analysis tool for extracting embedded files.
- π [**Sleuth Kit (TSK)**](https://www.sleuthkit.org/sleuthkit/) β Command-line tools for disk image investigation.
- π§βπ» [**ExifTool**](https://exiftool.org/) β Metadata extractor for images, videos, and documents.
- ποΈ [**TestDisk**](https://www.cgsecurity.org/wiki/TestDisk) β Disk recovery tool to restore lost partitions.
- π [**PhotoRec**](https://www.cgsecurity.org/wiki/PhotoRec) β File recovery software for deleted files from disks.
- π§βπ» [**Foremost**](https://foremost.sourceforge.net/) β File carving tool for data recovery based on headers.
- π [**Hashdeep**](https://github.com/jessek/hashdeep) β File hashing tool with recursive hashing & audit mode.
- π§βπ» [**Bulk Extractor**](https://github.com/simsong/bulk_extractor) β Extracts email, URLs, and other artifacts from raw data.
- ποΈ [**Digital Forensics Framework (DFF)**](https://github.com/arxsys/dff) β Open-source platform for digital forensics.
- π§βπ» [**Xplico**](https://www.xplico.org/) β Network forensics tool to reconstruct network sessions.
- π§βπ» [**NetworkMiner**](https://www.netresec.com/?page=NetworkMiner) β Passive network packet analyzer for network forensics.
- π§βπ» [**Pdf-parser**](https://blog.didierstevens.com/programs/pdf-tools/) β Analyze and extract content from PDF files.
- π§βπ» [**RegRipper**](https://github.com/keydet89/RegRipper3.0) β Windows registry analysis tool.
- π§βπ» [**PEView**](https://www.aldeid.com/wiki/PEview) β Portable executable (PE) file viewer for malware analysis.
- π§βπ» [**YARA**](https://github.com/VirusTotal/yara) β Malware pattern-matching tool used by researchers.
- π§βπ» [**HxD**](https://mh-nexus.de/en/hxd/) β Hex editor for raw disk editing and analysis.
- π§βπ» [**FTK Imager**](https://accessdata.com/products-services/ftk-imager) β Disk imaging and evidence preview tool.
- π§βπ» [**Capstone**](https://www.capstone-engine.org/) β Disassembly framework for binary analysis.
## Stress Testing
- π **[Slowloris](https://github.com/gkbrk/slowloris)** β HTTP DoS tool for keeping many connections open
- π°οΈ **[LOIC](https://github.com/NewEraCracker/LOIC)** β Low Orbit Ion Cannon for stress testing
- π» **[HULK](https://github.com/evilarc/HULK)** β HTTP flood tool that makes use of varied requests
- π¦Έ **[GoldenEye](https://github.com/jseidl/GoldenEye)** β Python-based HTTP denial-of-service tool
- π¨ **[Tsunami](https://github.com/tsunami-pft/tsunami)** β Network stress testing and security evaluation
- π **[R-U-Dead-Yet](https://github.com/m0nad/DDoS)** β Simple DoS testing tool
- π§― **[DDoS-Sim](https://github.com/DDoS-Sim/DDoS-Sim)** β DDoS simulation tool
- π₯ **[Xerxes](https://github.com/BigMondo/Xerxes)** β Powerful DDoS attack tool for testing purposes
- π― **[Web-Hulk](https://github.com/wwkman/Web-Hulk)** β Web server stress testing tool
- π **[Synful](https://github.com/SynfulTeam/synful)** β SYN flood tool for stress testing
- π£ **[LOIC-PowerShell](https://github.com/LOIC-PowerShell/LOIC-PowerShell)** β PowerShell-based LOIC for DDoS testing
- π **[T50](https://github.com/technitium/T50)** β A powerful stress testing tool that simulates multiple attack vectors
- πͺοΈ **[RIP-Lite](https://github.com/Sp0oF/RIP-Lite)** β Lightweight stress testing tool for HTTP and SOCKS
- π **[Stress-ng](https://github.com/ColinIanKing/stress-ng)** β A tool that can stress test the CPU, RAM, I/O, and more
- π οΈ **[XDT](https://github.com/xwdn/xdt)** β DDoS testing tool with multi-protocol support
- π₯ **[Botnet](https://github.com/yeswepwn/Botnet)** β DDoS botnet attack simulation tool
- π¨ **[DDOS-Exploit](https://github.com/nemesis2020/DDOS-Exploit)** β Exploit kit for DDoS stress testing
- π‘οΈ **[Fudp](https://github.com/Toph-3r/fudp)** β A multi-threaded UDP flooder for stress testing
- β‘ **[BlackHAT](https://github.com/j3ssie/BlackHAT)** β A stress testing framework for web applications
## Sniffing & Spoofing
- π **[Wireshark](https://www.wireshark.org/)** β Network protocol analyzer
- π΅οΈββοΈ **[Ettercap](https://www.ettercap-project.org/)** β Man-in-the-middle attack tool
- β‘ **[BetterCAP](https://www.bettercap.org/)** β Flexible network attack & monitoring tool
- π‘ **[Tcpdump](https://www.tcpdump.org/)** β Command-line packet analyzer
- π **[Nessus](https://www.tenable.com/products/nessus)** β Vulnerability scanner with sniffing capabilities
- π **[Scapy](https://scapy.net/)** β Python-based interactive packet manipulation program
- π **[MITMf](https://github.com/byt3bl33d3r/MITMf)** β Man-in-the-middle framework for network attacks
- π¦ **[Fakenet-NG](https://github.com/axil/fakenet-ng)** β Fake network traffic generation tool
- πΎ **[Dsniff](https://github.com/joschi/dsniff)** β Collection of network monitoring tools for penetration testers
- π― **[Responder](https://github.com/SpiderLabs/Responder)** β LLMNR, NBT-NS, and MDNS poisoner for internal network attacks
- π» **[Ettercap-NG](https://github.com/Ettercap/ettercap)** β Enhanced version of Ettercap with additional features
- π§βπ» **[Arp-Spoof](https://github.com/vanhauser-thc/thc-hydra)** β Tool to intercept network traffic by sending ARP packets
- π **[WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin)** β WiFi spoofing tool
- π£ **[Aircrack-ng](https://www.aircrack-ng.org/)** β Suite for wireless network auditing and cracking WEP/WPA keys
- π§© **[Xplico](https://www.xplico.org/)** β Network forensics tool that extracts applications' data from pcap files
- π **[Pry-Fi](https://github.com/Kevin-Robert/Pry-Fi)** β A tool to find and exploit vulnerabilities in wireless networks
- π΅οΈββοΈ **[Kismet](https://kismetwireless.net/)** β Wireless network detector, sniffer, and intrusion detection system
- π **[Burp Suite](https://portswigger.net/burp)** β Web vulnerability scanner and network attack tool with advanced interception features
- π» **[Snoopy](https://github.com/marooned/snoopy)** β Sniffing & spoofing tool focused on DNS & HTTP traffic
- π‘ **[Snort](https://www.snort.org/)** β Open-source network intrusion detection & prevention system
## Password Attacks
- π₯ **[John the Ripper](https://www.openwall.com/john/)** β Password cracking tool for various password hashes.
- π§βπ» **[Hydra](https://github.com/vanhauser-thc/thc-hydra)** β Brute-force tool that supports a wide range of protocols.
- β‘ **[Hashcat](https://github.com/hashcat/hashcat)** β Advanced password recovery using GPUs.
- π **[Medusa](https://github.com/jmk-foofus/medusa)** β A speedy, parallelized login brute-forcer.
- π **[Aircrack-ng](https://www.aircrack-ng.org/)** β WiFi password cracking suite.
- π **[Wifite](https://github.com/derv82/wifite2)** β Wireless network attack tool focused on WPA/WPA2.
- π§ **[THC-Hydra](https://github.com/vanhauser-thc/thc-hydra)** β A very fast network login cracker.
- π― **[Hash-Toolkit](https://github.com/rapid7/hash_toolkit)** β A tool for password hash cracking.
- π οΈ **[Brutus](https://www.hoobie.net/brutus/)** β An old but reliable password cracker for HTTP, FTP, and more.
- π **[Burp Suite](https://portswigger.net/burp)** β A popular web vulnerability scanner with password attack features.
- π§βπ» **[Ophcrack](http://ophcrack.sourceforge.net/)** β A Windows password cracker using rainbow tables.
- π» **[Cain & Abel](https://www.oxid.it/cain.html)** β A versatile tool for cracking various password hashes, sniffing networks, and decoding passwords.
- π **[L0phtCrack](https://www.l0phtcrack.com/)** β Windows password auditing and recovery tool.
- π§© **[CrackStation](https://crackstation.net/)** β A free online service for cracking password hashes using dictionary attacks.
- π **[RainbowCrack](https://project-rainbowcrack.com/)** β A tool that utilizes rainbow tables to crack passwords.
- π§βπ» **[Medusa](https://github.com/jmk-foofus/medusa)** β Parallelized login brute-forcer for multiple protocols.
- π₯ **[Patator](https://github.com/lanjelot/patator)** β A multi-purpose brute-forcing tool that supports numerous protocols.
- π‘οΈ **[RSMangler](https://github.com/s0md3v/Hash-Buster)** β A hash bruteforce tool for creating password dictionaries.
- π§βπ» **[CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec)** β A post-exploitation tool for automating credential validation.
- π΅οΈββοΈ **[SudoKiller](https://github.com/TH3xACE/SudoKiller)** β A tool for privilege escalation that can be used for password cracking in Unix-based systems.
## Web Application Analysis
- π§βπ» [**Burp Suite**](https://portswigger.net/burp) β Web security testing toolkit.
- π΅οΈ [**OWASP ZAP**](https://www.zaproxy.org/) β Open-source web application scanner.
- π [**SQLmap**](https://github.com/sqlmapproject/sqlmap) β Automated SQL injection tool.
- π [**Wappalyzer**](https://www.wappalyzer.com/) β Identify technologies on websites.
- π§βπ» [**Dirb**](https://gitlab.com/kalilinux/packages/dirb) β Web content scanner.
- π [**Gobuster**](https://github.com/OJ/gobuster) β Directory and DNS brute-forcing.
- π [**Nikto**](https://github.com/sullo/nikto) β Web server vulnerability scanner.
- π§βπ» [**Sublist3r**](https://github.com/aboul3la/Sublist3r) β Subdomain enumeration.
- π΅οΈ [**Amass**](https://github.com/owasp-amass/amass) β Network mapping and subdomain enumeration.
- π [**Httpx**](https://github.com/projectdiscovery/httpx) β Fast HTTP probing.
- π [**FFUF**](https://github.com/ffuf/ffuf) β Fast web fuzzer.
- π§βπ» [**WhatWeb**](https://github.com/urbanadventurer/WhatWeb) β Identify web technologies.
- π οΈ [**Nuclei**](https://github.com/projectdiscovery/nuclei) β Vulnerability scanning and templating.
- π§βπ» [**XSStrike**](https://github.com/s0md3v/XSStrike) β XSS detection and exploitation.
- π [**Commix**](https://github.com/commixproject/commix) β Automated command injection.
- π₯ [**WPScan**](https://github.com/wpscanteam/wpscan) β WordPress security scanner.
- π‘οΈ [**Cmsmap**](https://github.com/Dionach/CMSmap) β CMS detection and exploitation.
- π [**Arachni**](https://github.com/Arachni/arachni) β Advanced web vulnerability scanner.
- π΅οΈ [**Waybackurls**](https://github.com/tomnomnom/waybackurls) β Fetch URLs from Wayback Machine.
- π§βπ» [**Unfurl**](https://github.com/tomnomnom/unfurl) β Extract URLs and data from URLs.
- π [**Dirsearch**](https://github.com/maurosoria/dirsearch) β A fast and powerful scanner that uses brute-force to find hidden directories and files on web servers. It discovers inaccessible content with customizable wordlists.
## Reverse Engineering
- π§ [**Ghidra**](https://ghidra-sre.org/) β Open-source software reverse engineering framework.
- π [**Radare2**](https://github.com/radareorg/radare2) β Command-line reverse engineering toolkit.
- π οΈ [**OllyDbg**](http://www.ollydbg.de/) β 32-bit assembler-level debugger for Windows.
- π§βπ» [**IDA Pro**](https://hex-rays.com/ida-pro/) β Industry-standard interactive disassembler.
- π [**Binary Ninja**](https://binary.ninja/) β Interactive binary analysis platform.
- π‘οΈ [**x64dbg**](https://x64dbg.com/) β Open-source Windows debugger for x64 and x86.
- 𧬠[**Cutter**](https://cutter.re/) β GUI for Radare2 with advanced analysis features.
- π [**Hopper**](https://www.hopperapp.com/) β Mac & Linux disassembler with powerful analysis.
- π§βπ» [**dnSpy**](https://github.com/dnSpy/dnSpy) β .NET debugger and assembly editor.
- π [**RetDec**](https://retdec.com/) β Open-source decompiler for machine code.
- βοΈ [**angr**](https://angr.io/) β Python framework for binary analysis.
- π§βπ» [**Frida**](https://frida.re/) β Dynamic instrumentation toolkit.
- π [**Binary Analysis Toolkit (BAT)**](https://github.com/cea-sec/BAT) β Malware analysis and binary inspection.
- π [**Rizin**](https://rizin.re/) β Fork of Radare2 with a focus on usability.
- ποΈ [**PEiD**](https://www.softpedia.com/get/Programming/File-Editors/PEiD.shtml) β Detect packers, cryptors, and compilers.
- π§βπ» [**DiE (Detect It Easy)**](https://github.com/horsicq/Detect-It-Easy) β Portable executable identifier.
- π [**LIEF**](https://lief.quarkslab.com/) β Library for parsing and modifying executables.
- π [**Snowman**](https://derevenets.com/) β Native code to C++ decompiler.
- π§βπ» [**APKTool**](https://github.com/iBotPeaches/Apktool) β Decompile and rebuild Android APKs.
- π [**JEB Decompiler**](https://www.pnfsoftware.com/jeb/) β Commercial decompiler for Android and other platforms.
## Reporting Tools
- π [**Dradis**](https://dradisframework.com/) β Collaboration and reporting platform for pentesters.
- π§βπ» [**Faraday**](https://faradaysec.com/) β Multi-user penetration testing IDE.
- π³ [**MagicTree**](http://www.magictree.org/) β Pentesting productivity tool for data aggregation and reporting.
- π [**Serpico**](https://github.com/SerpicoProject/Serpico) β Simplifying pentest reporting using templates.
- π [**LaTeX**](https://www.latex-project.org/) β High-quality typesetting system often used for security reports.
- π [**reNgine**](https://github.com/yogeshojha/rengine) β Automated reconnaissance framework with reporting.
- π§βπ» [**ReconNote**](https://github.com/nahamsec/recon_note) β Web-based notes manager for recon and reporting.
- π [**Pentracker**](https://github.com/noraj/pentracker) β Pentest reporting and management tool.
- π [**Markdown**](https://www.markdownguide.org/) β Lightweight markup language for clean report writing.
- π [**Ghostwriter**](https://github.com/GhostManager/Ghostwriter) β Reporting and engagement management platform.
- π [**VulnReport**](https://github.com/salesforce/vulnreport) β Automated vulnerability reporting platform.
- π [**Katana Framework**](https://github.com/PowerScript/KatanaFramework) β Post-exploitation and reporting utility.
- π [**Pentest-Report-Template**](https://github.com/adamjdeacon/Pentest-Report-Template) β Professional pentest report LaTeX template.
- π [**ProofSuite**](https://github.com/danielfuentes/proofsuite) β Automated proof of concept and reporting tool.
- π§βπ» [**VulnWhisperer**](https://github.com/austin-taylor/VulnWhisperer) β Vulnerability management reporting with Nessus, Qualys, and OpenVAS.
- π [**RiskSense**](https://www.risksense.com/) β Risk-based vulnerability management and reporting.
- π [**Pentestly**](https://github.com/praetorian-code/pentestly) β Powershell-based post-exploitation and reporting.
- π [**SecReport**](https://github.com/Matir/secreport) β Report generation tool for pentesters.
- π [**PwnDoc**](https://github.com/pwndoc/pwndoc) β Pentest reporting tool with customizable templates.
- π§βπ» [**PenTest-Wiki**](https://github.com/nixawk/pentest-wiki) β Knowledge base for pentesting & reporting references.
## Social Engineering Tools
- π§βπ» [**SET (Social-Engineer Toolkit)**](https://github.com/trustedsec/social-engineer-toolkit) β Advanced framework for social engineering attacks.
- π§ [**King Phisher**](https://github.com/rsmusllp/king-phisher) β Phishing campaign toolkit for testing and training.
- π£ [**Phishing Frenzy**](https://github.com/pentestgeek/phishing-frenzy) β Phishing campaign automation platform.
- πͺ€ [**Gophish**](https://github.com/gophish/gophish) β Open-source phishing toolkit for awareness and testing.
- π© [**Evilginx2**](https://github.com/kgretzky/evilginx2) β Phishing toolkit using reverse proxy for capturing credentials & tokens.
- π΅οΈββοΈ [**HiddenEye**](https://github.com/DarkSecDevelopers/HiddenEye) β Modern phishing tool with advanced social engineering features.
- π₯ [**BlackEye**](https://github.com/An0nUD4Y/blackeye) β Phishing tool with site cloning capabilities.
- π [**Zphisher**](https://github.com/htr-tech/zphisher) β Advanced phishing tool with tunneling support.
- π‘ [**SocialFish**](https://github.com/UndeadSec/SocialFish) β Social engineering phishing framework.
- π§βπ» [**HiddenEye Reborn**](https://github.com/DarkSecDevelopers/HiddenEyeReborn) β Improved version of HiddenEye for phishing & spoofing.
- π§βπ» [**EvilPhish**](https://github.com/An0nNiemus/EvilPhish) β Social engineering tool for phishing websites.
- π¬ [**ShellPhish**](https://github.com/thelinuxchoice/shellphish) β Automated phishing tool supporting multiple templates.
- π§βπ» [**CamPhish**](https://github.com/techchipnet/CamPhish) β Webcam phishing attack tool.
- π΅οΈ [**Weeman**](https://github.com/evait-security/weeman) β HTTP server-based phishing framework.
- π² [**QRGen**](https://github.com/sdushantha/qrgen) β QR code phishing generator.
- π΅οΈ [**PyPhisher**](https://github.com/KasRoudra/PyPhisher) β Python-based phishing toolkit with multiple site templates.
- πΈοΈ [**AdvPhishing**](https://github.com/Ignitetch/AdvPhishing) β Advanced phishing tool with login page cloning.
- π― [**SocialBox**](https://github.com/samsesh/SocialBox) β Brute-force social media hacking toolkit.
- π§βπ» [**XPhisher**](https://github.com/htr-tech/xphisher) β Advanced phishing tool with inbuilt tunneling.
- π [**CredSniper**](https://github.com/ustayready/CredSniper) β Phishing framework with two-factor authentication bypass support.
## Miscellaneous
- π **[Kali Linux](https://www.kali.org/)** β Advanced penetration testing and security auditing OS.
- π¦ **[Parrot Security OS](https://www.parrotsec.org/)** β Security-focused OS for pentesting and privacy.
- π§βπ» **[BackBox](https://www.backbox.org/)** β Ubuntu-based Linux distro for penetration testing.
- π΅οΈ **[BlackArch Linux](https://blackarch.org/)** β Arch-based OS with 2800+ hacking tools.
- π **[Pentoo](https://www.pentoo.ch/)** β Security-focused Gentoo-based Linux.
- π§βπ» **[Tails](https://tails.boum.org/)** β Privacy and anonymity-focused live OS.
- π§ͺ **[CAINE](https://www.caine-live.net/)** β Digital forensics live Linux distro.
- π§βπ» **[Bugtraq](https://bugtraq-team.com/)** β Linux distro for pentesting & malware analysis.
- π **[Whonix](https://www.whonix.org/)** β Anonymous OS based on Tor.
- π§ **[DEFT Linux](https://www.deftlinux.net/)** β Digital evidence & forensics toolkit.
- π **[Subgraph OS](https://subgraph.com/)** β Secure Linux distro with hardened kernel.
- π§βπ» **[ArchStrike](https://archstrike.org/)** β Arch Linux repository for security tools.
- π§βπ» **[Fedora Security Lab](https://labs.fedoraproject.org/security/)** β Fedora spin for security auditing.
- π§βπ» **[SamuraiWTF](https://github.com/SamuraiWTF/samuraiwtf)** β Web application penetration testing environment.
- π **[Cyborg Hawk](https://cyborg.ztrela.com/)** β Security distro for penetration testing.
- π§βπ» **[Matriux Krypton](https://www.matriux.com/)** β Debian-based security distribution.
- π₯ **[NodeZero](https://sourceforge.net/projects/nodezero/)** β Ubuntu-based penetration testing OS.
- π§βπ» **[GnackTrack](https://sourceforge.net/projects/gnacktrack/)** β Linux live distribution for penetration testing.
- π‘οΈ **[SELKS](https://www.stamus-networks.com/open-source)** β Suricata-based IDS/IPS platform.
- π΅οΈββοΈ **[PentestBox](https://pentestbox.org/)** β Penetration testing toolkit for Windows.
---
### Support
You can support this project **directly** using **Ko-fi**:
[](https://ko-fi.com/W7W116EDDL)
> Every contribution, small or large, helps keep open-source cybersecurity alive. Thank you for supporting **Hacking-Tools**! π‘οΈ