An open API service indexing awesome lists of open source software.

https://github.com/yogsec/hacking-tools

A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.
https://github.com/yogsec/hacking-tools

blue-team bug-bounty-tools bugbounty bugbountytips cybersecurity ethical-hacking-tools exploit forensics hackers hacking hacking-tools kali-linux linux-tools penetration-testing penetration-testing-tools red-team reverse-engineering vulnerability web-security

Last synced: 19 days ago
JSON representation

A curated list of penetration testing and ethical hacking tools, organized by category. This compilation includes tools from Kali Linux and other notable sources.

Awesome Lists containing this project

README

          

# Hacking-Tools


A curated list of penetration testing and ethical hacking tools, organized by category. This collection includes Kali Linux tools and other notable utilities.

![Hacking Anime](https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExdHJjMXpvb2hkdXJvN2Y3cmllNG81YXNsem90ejhwY2NqbXB5OXgzaiZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/137EaR4vAOCn1S/giphy.gif)






LinkedIn


LinkTree


X


Email


Website

---

## Table of Contents

- [πŸ” Information Gathering](#-information-gathering)
- [πŸ”Ž Vulnerability Analysis](#-vulnerability-analysis)
- [πŸ’₯ Exploitation Tools](#-exploitation-tools)
- [πŸ“‘ Wireless Attacks](#-wireless-attacks)
- [πŸ§‘β€πŸ’» Forensics Tools](#-forensics-tools)
- [⏳ Stress Testing](#-stress-testing)
- [πŸ•΅οΈβ€β™€οΈ Sniffing & Spoofing](#-sniffing--spoofing)
- [πŸ” Password Attacks](#-password-attacks)
- [🌐 Web Application Analysis](#-web-application-analysis)
- [πŸ§‘β€πŸ’» Reverse Engineering](#-reverse-engineering)
- [πŸ“ Reporting Tools](#-reporting-tools)
- [🎭 Social Engineering Tools](#-social-engineering-tools)
- [🧩 Miscellaneous](#-miscellaneous)

## Information Gathering

- πŸ›œ **[Nmap](https://nmap.org/)** – Network scanning and mapping tool.
- πŸ“Ά **[Kismet](https://www.kismetwireless.net/)** – Wireless network detector, sniffer, and intrusion detection.
- πŸ•΅οΈ **[Maltego](https://www.maltego.com/)** – OSINT and data mining tool for information analysis.
- πŸ“¨ **[theHarvester](https://github.com/laramies/theHarvester)** – Tool to gather emails, subdomains, hosts, and more.
- πŸ”— **[Recon-ng](https://github.com/lanmaster53/recon-ng)** – Full-featured web reconnaissance framework.
- πŸ•΅οΈβ€β™‚οΈ **[SpiderFoot](https://github.com/smicallef/spiderfoot)** – Automate OSINT collection from multiple sources.
- πŸ” **[Amass](https://github.com/OWASP/Amass)** – Network mapping and external asset discovery tool.
- πŸ—‚οΈ **[Sublist3r](https://github.com/aboul3la/Sublist3r)** – Subdomain enumeration using search engines.
- πŸ§‘β€πŸ’» **[Assetfinder](https://github.com/tomnomnom/assetfinder)** – Subdomain discovery using various sources.
- 🌍 **[crt.sh](https://crt.sh/)** – SSL certificate transparency log search engine.
- πŸ§ͺ **[Dnsrecon](https://github.com/darkoperator/dnsrecon)** – Perform DNS enumeration and zone transfers.
- πŸ“œ **[Fierce](https://github.com/mschwager/fierce)** – DNS reconnaissance and attack tool.
- πŸ“„ **[WHOIS](https://www.whois.com/)** – Domain registration and ownership lookup.
- πŸ“¬ **[EmailHarvester](https://github.com/maldevel/EmailHarvester)** – Email enumeration and gathering.
- πŸ•ΈοΈ **[Shodan](https://www.shodan.io/)** – Search engine for internet-connected devices.
- πŸ”₯ **[Censys](https://censys.io/)** – Search engine for hosts and networks on the internet.
- 🌐 **[OSINT Framework](https://osintframework.com/)** – Collection of OSINT tools and resources.
- πŸ§‘β€πŸ’» **[FOCA](https://github.com/ElevenPaths/FOCA)** – Metadata extraction and document analysis.
- πŸ›‘οΈ **[Netcraft](https://www.netcraft.com/)** – Website profiling and phishing detection.
- πŸ›οΈ **[BuiltWith](https://builtwith.com/)** – Website technology lookup and analysis.

## Vulnerability Analysis

- πŸ§ͺ **[OpenVAS](https://github.com/greenbone/openvas-scanner)** – Open-source vulnerability scanner.
- πŸ›‘οΈ **[Nessus](https://www.tenable.com/products/nessus)** – Commercial vulnerability assessment tool.
- πŸ•΅οΈβ€β™‚οΈ **[Nikto](https://cirt.net/Nikto2)** – Web server scanner for detecting vulnerabilities.
- 🐺 **[Wapiti](https://github.com/wapiti-scanner/wapiti)** – Web application security scanner.
- πŸ§‘β€πŸ’» **[Vega](https://github.com/subgraph/Vega)** – GUI-based web vulnerability scanner.
- πŸ•·οΈ **[Arachni](https://github.com/Arachni/arachni)** – Feature-rich web application security scanner.
- 🐍 **[SQLmap](https://github.com/sqlmapproject/sqlmap)** – Automated SQL injection detection and exploitation tool.
- πŸ•ΈοΈ **[OWASP ZAP](https://www.zaproxy.org/)** – Open-source web application security scanner.
- πŸ›œ **[Nmap Vulners](https://github.com/vulnersCom/nmap-vulners)** – Nmap NSE script for CVE detection.
- πŸ”Ž **[Retire.js](https://github.com/RetireJS/retire.js)** – JavaScript library vulnerability scanner.
- βš™οΈ **[Dependency-Check](https://github.com/jeremylong/DependencyCheck)** – Vulnerability analysis for project dependencies.
- πŸ§‘β€πŸ’» **[Bandit](https://github.com/PyCQA/bandit)** – Security linter for Python code.
- 🐞 **[Vuls](https://github.com/future-architect/vuls)** – Agentless vulnerability scanner for Linux/FreeBSD servers.
- πŸ“¦ **[Trivy](https://github.com/aquasecurity/trivy)** – Vulnerability scanner for containers and dependencies.
- πŸ§‘β€πŸ’» **[Grype](https://github.com/anchore/grype)** – Vulnerability scanner for container images and filesystems.
- πŸ§‘β€πŸ’» **[Safety](https://github.com/pyupio/safety)** – Python dependency security scanner.
- πŸ“„ **[Lychee](https://github.com/lycheeverse/lychee)** – Broken link checker with vulnerability detection potential.
- πŸ“œ **[GitLeaks](https://github.com/gitleaks/gitleaks)** – Detect hardcoded secrets and sensitive data.
- πŸ§‘β€πŸ’» **[ScoutSuite](https://github.com/nccgroup/ScoutSuite)** – Multi-cloud security auditing tool.
- πŸ§‘β€πŸ’» **[CloudSploit](https://github.com/aquasecurity/cloudsploit)** – AWS security auditing tool.

## Exploitation Tools

- 🎯 [**Metasploit Framework**](https://github.com/rapid7/metasploit-framework) – Powerful exploit development and penetration testing framework.
- πŸš€ [**Armitage**](https://github.com/rsmudge/armitage) – GUI front-end for Metasploit to visualize attacks.
- 🌐 [**BeEF (Browser Exploitation Framework)**](https://github.com/beefproject/beef) – Exploits browser vulnerabilities for client-side attacks.
- πŸ’» [**ExploitDB**](https://github.com/offensive-security/exploitdb) – Archive of public exploits and proof-of-concept code.
- πŸ“œ [**SearchSploit**](https://github.com/offensive-security/exploitdb-bin-sploits) – Offline version of ExploitDB for quick exploit searching.
- 🐍 [**sqlmap**](https://github.com/sqlmapproject/sqlmap) – Automated SQL injection exploitation tool.
- πŸ“€ [**Commix**](https://github.com/commixproject/commix) – Automated command injection vulnerability scanner.
- πŸ–₯️ [**RouterSploit**](https://github.com/threat9/routersploit) – Exploits vulnerabilities in routers, IoT, and embedded devices.
- πŸ“² [**SET (Social Engineering Toolkit)**](https://github.com/trustedsec/social-engineer-toolkit) – Human hacking via phishing, payloads, and more.
- πŸ•΅οΈβ€β™‚οΈ [**Empire**](https://github.com/BC-SECURITY/Empire) – Post-exploitation framework for PowerShell agents.
- πŸ§‘β€πŸ’» [**Pupy**](https://github.com/n1nj4sec/pupy) – Cross-platform post-exploitation remote access tool (RAT).
- 🧨 [**Sliver**](https://github.com/BishopFox/sliver) – C2 framework for adversary simulation and red teaming.
- 🐚 [**Shellter**](https://www.shellterproject.com) – Dynamic shellcode injector for Windows executables.
- 🐦 [**Merlin**](https://github.com/Ne0nd0g/merlin) – Post-exploitation command & control server using HTTP/2.
- πŸ§™β€β™‚οΈ [**Covenant**](https://github.com/cobbr/Covenant) – C#-based post-exploitation platform.
- πŸ”’ [**PowerSploit**](https://github.com/PowerShellMafia/PowerSploit) – PowerShell scripts for post-exploitation.
- πŸ”Ž [**Windows Exploit Suggester**](https://github.com/bitsadmin/wesng) – Suggests exploits based on Windows OS versions.
- πŸ“¦ [**PayloadsAllTheThings**](https://github.com/swisskyrepo/PayloadsAllTheThings) – Collection of payloads for exploits, fuzzing, and pentesting.
- πŸ§‘β€πŸ’» [**Fuzzbunch**](https://github.com/fuzzbunch/fuzzbunch) – NSA’s exploit framework (part of the Shadow Brokers leak).
- πŸ› οΈ [**CrackMapExec**](https://github.com/byt3bl33d3r/CrackMapExec) – Swiss army knife for post-exploitation in Windows environments.

## Wireless Attacks

- πŸ“‘ [**Aircrack-ng**](https://github.com/aircrack-ng/aircrack-ng) – WiFi cracking suite
- πŸ› οΈ [**Reaver**](https://github.com/t6x/reaver-wps-fork) – WPS attack tool
- πŸ§‘β€πŸ’» [**Fern WiFi Cracker**](https://github.com/savio-code/fern-wifi-cracker) – Wireless network auditing tool
- πŸ”“ [**Wifite**](https://github.com/derv82/wifite) – Automated wireless attack tool
- πŸ›‘οΈ [**Kismet**](https://kismetwireless.net/) – Wireless network detector & sniffer
- 🌐 [**MDK3**](https://github.com/aircrack-ng/mdk3) – Wireless network attack tool
- 🎯 [**PixieWPS**](https://github.com/wiire/aircrack-ng) – WPS offline attack tool
- 🧠 [**WPA2 Wordlist Generator**](https://github.com/edenhill/wpa2-wordlist-generator) – Generate custom WPA2 wordlists
- πŸ•΅οΈβ€β™‚οΈ [**Bully**](https://github.com/aanarchyy/bully) – WPS attack tool for brute-forcing
- πŸ”„ [**Evil Twin**](https://github.com/derv82/evil-twin) – Create fake AP for capturing handshakes
- πŸš€ [**WiFi-Pumpkin**](https://github.com/P0cL4bs/WiFi-Pumpkin) – Man-in-the-middle framework for Wi-Fi networks
- 🧩 [**Airgeddon**](https://github.com/v1s1t0r1sh3r3/airgeddon) – Multi-use bash script for wireless auditing
- πŸ§‘β€πŸ’» [**Ghost Phisher**](https://github.com/sundowndev/ghost-phisher) – Wireless network attack tool for phishing
- πŸ§‘β€πŸ”§ [**NoCatSplash**](https://github.com/no-such-project/NoCatSplash) – Captive portal for Wi-Fi networks
- 🦠 [**Wifiphisher**](https://github.com/wifiphisher/wifiphisher) – Phishing tool for Wi-Fi networks
- πŸ“‘ [**WLANPi**](https://github.com/wlanpi/wlanpi) – Wireless attack platform for pen-testers
- πŸ› οΈ [**Cowpatty**](https://github.com/wiire/cowpatty) – Tool for offline WPA2 cracking
- 🌐 [**Scapy**](https://github.com/secdev/scapy) – Python tool for packet manipulation and analysis
- πŸ“Ά [**NetStumbler**](http://www.netstumbler.com/) – Wi-Fi scanner for Windows
- πŸ”’ [**Wi-Fi Pineapple**](https://github.com/securestate/wifipineapple) – Wireless attack platform by Hak5

## Forensics Tools

- πŸ§‘β€πŸ’» [**Autopsy**](https://www.autopsy.com/) – Digital forensics platform for analyzing hard drives and smartphones.
- 🧠 [**Volatility**](https://www.volatilityfoundation.org/) – Memory forensics framework for analyzing RAM dumps.
- πŸ—‚οΈ [**Binwalk**](https://github.com/ReFirmLabs/binwalk) – Firmware analysis tool for extracting embedded files.
- πŸ” [**Sleuth Kit (TSK)**](https://www.sleuthkit.org/sleuthkit/) – Command-line tools for disk image investigation.
- πŸ§‘β€πŸ’» [**ExifTool**](https://exiftool.org/) – Metadata extractor for images, videos, and documents.
- πŸ—ƒοΈ [**TestDisk**](https://www.cgsecurity.org/wiki/TestDisk) – Disk recovery tool to restore lost partitions.
- πŸ”„ [**PhotoRec**](https://www.cgsecurity.org/wiki/PhotoRec) – File recovery software for deleted files from disks.
- πŸ§‘β€πŸ’» [**Foremost**](https://foremost.sourceforge.net/) – File carving tool for data recovery based on headers.
- πŸ”‘ [**Hashdeep**](https://github.com/jessek/hashdeep) – File hashing tool with recursive hashing & audit mode.
- πŸ§‘β€πŸ’» [**Bulk Extractor**](https://github.com/simsong/bulk_extractor) – Extracts email, URLs, and other artifacts from raw data.
- πŸ—„οΈ [**Digital Forensics Framework (DFF)**](https://github.com/arxsys/dff) – Open-source platform for digital forensics.
- πŸ§‘β€πŸ’» [**Xplico**](https://www.xplico.org/) – Network forensics tool to reconstruct network sessions.
- πŸ§‘β€πŸ’» [**NetworkMiner**](https://www.netresec.com/?page=NetworkMiner) – Passive network packet analyzer for network forensics.
- πŸ§‘β€πŸ’» [**Pdf-parser**](https://blog.didierstevens.com/programs/pdf-tools/) – Analyze and extract content from PDF files.
- πŸ§‘β€πŸ’» [**RegRipper**](https://github.com/keydet89/RegRipper3.0) – Windows registry analysis tool.
- πŸ§‘β€πŸ’» [**PEView**](https://www.aldeid.com/wiki/PEview) – Portable executable (PE) file viewer for malware analysis.
- πŸ§‘β€πŸ’» [**YARA**](https://github.com/VirusTotal/yara) – Malware pattern-matching tool used by researchers.
- πŸ§‘β€πŸ’» [**HxD**](https://mh-nexus.de/en/hxd/) – Hex editor for raw disk editing and analysis.
- πŸ§‘β€πŸ’» [**FTK Imager**](https://accessdata.com/products-services/ftk-imager) – Disk imaging and evidence preview tool.
- πŸ§‘β€πŸ’» [**Capstone**](https://www.capstone-engine.org/) – Disassembly framework for binary analysis.

## Stress Testing

- 🐌 **[Slowloris](https://github.com/gkbrk/slowloris)** – HTTP DoS tool for keeping many connections open
- πŸ›°οΈ **[LOIC](https://github.com/NewEraCracker/LOIC)** – Low Orbit Ion Cannon for stress testing
- 🐻 **[HULK](https://github.com/evilarc/HULK)** – HTTP flood tool that makes use of varied requests
- 🦸 **[GoldenEye](https://github.com/jseidl/GoldenEye)** – Python-based HTTP denial-of-service tool
- πŸ’¨ **[Tsunami](https://github.com/tsunami-pft/tsunami)** – Network stress testing and security evaluation
- πŸ›‘ **[R-U-Dead-Yet](https://github.com/m0nad/DDoS)** – Simple DoS testing tool
- 🧯 **[DDoS-Sim](https://github.com/DDoS-Sim/DDoS-Sim)** – DDoS simulation tool
- πŸ’₯ **[Xerxes](https://github.com/BigMondo/Xerxes)** – Powerful DDoS attack tool for testing purposes
- 🎯 **[Web-Hulk](https://github.com/wwkman/Web-Hulk)** – Web server stress testing tool
- πŸš€ **[Synful](https://github.com/SynfulTeam/synful)** – SYN flood tool for stress testing
- πŸ’£ **[LOIC-PowerShell](https://github.com/LOIC-PowerShell/LOIC-PowerShell)** – PowerShell-based LOIC for DDoS testing
- 🌐 **[T50](https://github.com/technitium/T50)** – A powerful stress testing tool that simulates multiple attack vectors
- πŸŒͺ️ **[RIP-Lite](https://github.com/Sp0oF/RIP-Lite)** – Lightweight stress testing tool for HTTP and SOCKS
- πŸ‰ **[Stress-ng](https://github.com/ColinIanKing/stress-ng)** – A tool that can stress test the CPU, RAM, I/O, and more
- πŸ› οΈ **[XDT](https://github.com/xwdn/xdt)** – DDoS testing tool with multi-protocol support
- πŸ₯‚ **[Botnet](https://github.com/yeswepwn/Botnet)** – DDoS botnet attack simulation tool
- πŸ”¨ **[DDOS-Exploit](https://github.com/nemesis2020/DDOS-Exploit)** – Exploit kit for DDoS stress testing
- πŸ›‘οΈ **[Fudp](https://github.com/Toph-3r/fudp)** – A multi-threaded UDP flooder for stress testing
- ⚑ **[BlackHAT](https://github.com/j3ssie/BlackHAT)** – A stress testing framework for web applications

## Sniffing & Spoofing

- 🌐 **[Wireshark](https://www.wireshark.org/)** – Network protocol analyzer
- πŸ•΅οΈβ€β™‚οΈ **[Ettercap](https://www.ettercap-project.org/)** – Man-in-the-middle attack tool
- ⚑ **[BetterCAP](https://www.bettercap.org/)** – Flexible network attack & monitoring tool
- πŸ“‘ **[Tcpdump](https://www.tcpdump.org/)** – Command-line packet analyzer
- 🌍 **[Nessus](https://www.tenable.com/products/nessus)** – Vulnerability scanner with sniffing capabilities
- 🐍 **[Scapy](https://scapy.net/)** – Python-based interactive packet manipulation program
- 🌐 **[MITMf](https://github.com/byt3bl33d3r/MITMf)** – Man-in-the-middle framework for network attacks
- 🦊 **[Fakenet-NG](https://github.com/axil/fakenet-ng)** – Fake network traffic generation tool
- 🐾 **[Dsniff](https://github.com/joschi/dsniff)** – Collection of network monitoring tools for penetration testers
- 🎯 **[Responder](https://github.com/SpiderLabs/Responder)** – LLMNR, NBT-NS, and MDNS poisoner for internal network attacks
- πŸ’» **[Ettercap-NG](https://github.com/Ettercap/ettercap)** – Enhanced version of Ettercap with additional features
- πŸ§‘β€πŸ’» **[Arp-Spoof](https://github.com/vanhauser-thc/thc-hydra)** – Tool to intercept network traffic by sending ARP packets
- 🌐 **[WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin)** – WiFi spoofing tool
- 🎣 **[Aircrack-ng](https://www.aircrack-ng.org/)** – Suite for wireless network auditing and cracking WEP/WPA keys
- 🧩 **[Xplico](https://www.xplico.org/)** – Network forensics tool that extracts applications' data from pcap files
- πŸ“Š **[Pry-Fi](https://github.com/Kevin-Robert/Pry-Fi)** – A tool to find and exploit vulnerabilities in wireless networks
- πŸ•΅οΈβ€β™€οΈ **[Kismet](https://kismetwireless.net/)** – Wireless network detector, sniffer, and intrusion detection system
- 🐍 **[Burp Suite](https://portswigger.net/burp)** – Web vulnerability scanner and network attack tool with advanced interception features
- πŸ’» **[Snoopy](https://github.com/marooned/snoopy)** – Sniffing & spoofing tool focused on DNS & HTTP traffic
- πŸ“‘ **[Snort](https://www.snort.org/)** – Open-source network intrusion detection & prevention system

## Password Attacks

- πŸ”₯ **[John the Ripper](https://www.openwall.com/john/)** – Password cracking tool for various password hashes.
- πŸ§‘β€πŸ’» **[Hydra](https://github.com/vanhauser-thc/thc-hydra)** – Brute-force tool that supports a wide range of protocols.
- ⚑ **[Hashcat](https://github.com/hashcat/hashcat)** – Advanced password recovery using GPUs.
- 🐍 **[Medusa](https://github.com/jmk-foofus/medusa)** – A speedy, parallelized login brute-forcer.
- 🌐 **[Aircrack-ng](https://www.aircrack-ng.org/)** – WiFi password cracking suite.
- πŸ” **[Wifite](https://github.com/derv82/wifite2)** – Wireless network attack tool focused on WPA/WPA2.
- 🧠 **[THC-Hydra](https://github.com/vanhauser-thc/thc-hydra)** – A very fast network login cracker.
- 🎯 **[Hash-Toolkit](https://github.com/rapid7/hash_toolkit)** – A tool for password hash cracking.
- πŸ› οΈ **[Brutus](https://www.hoobie.net/brutus/)** – An old but reliable password cracker for HTTP, FTP, and more.
- πŸ”‘ **[Burp Suite](https://portswigger.net/burp)** – A popular web vulnerability scanner with password attack features.
- πŸ§‘β€πŸ’» **[Ophcrack](http://ophcrack.sourceforge.net/)** – A Windows password cracker using rainbow tables.
- πŸ’» **[Cain & Abel](https://www.oxid.it/cain.html)** – A versatile tool for cracking various password hashes, sniffing networks, and decoding passwords.
- πŸ” **[L0phtCrack](https://www.l0phtcrack.com/)** – Windows password auditing and recovery tool.
- 🧩 **[CrackStation](https://crackstation.net/)** – A free online service for cracking password hashes using dictionary attacks.
- πŸ”“ **[RainbowCrack](https://project-rainbowcrack.com/)** – A tool that utilizes rainbow tables to crack passwords.
- πŸ§‘β€πŸ’» **[Medusa](https://github.com/jmk-foofus/medusa)** – Parallelized login brute-forcer for multiple protocols.
- πŸ”₯ **[Patator](https://github.com/lanjelot/patator)** – A multi-purpose brute-forcing tool that supports numerous protocols.
- πŸ›‘οΈ **[RSMangler](https://github.com/s0md3v/Hash-Buster)** – A hash bruteforce tool for creating password dictionaries.
- πŸ§‘β€πŸ’» **[CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec)** – A post-exploitation tool for automating credential validation.
- πŸ•΅οΈβ€β™€οΈ **[SudoKiller](https://github.com/TH3xACE/SudoKiller)** – A tool for privilege escalation that can be used for password cracking in Unix-based systems.

## Web Application Analysis

- πŸ§‘β€πŸ’» [**Burp Suite**](https://portswigger.net/burp) – Web security testing toolkit.
- πŸ•΅οΈ [**OWASP ZAP**](https://www.zaproxy.org/) – Open-source web application scanner.
- 🐍 [**SQLmap**](https://github.com/sqlmapproject/sqlmap) – Automated SQL injection tool.
- πŸ“œ [**Wappalyzer**](https://www.wappalyzer.com/) – Identify technologies on websites.
- πŸ§‘β€πŸ’» [**Dirb**](https://gitlab.com/kalilinux/packages/dirb) – Web content scanner.
- πŸ“‚ [**Gobuster**](https://github.com/OJ/gobuster) – Directory and DNS brute-forcing.
- πŸ” [**Nikto**](https://github.com/sullo/nikto) – Web server vulnerability scanner.
- πŸ§‘β€πŸ’» [**Sublist3r**](https://github.com/aboul3la/Sublist3r) – Subdomain enumeration.
- πŸ•΅οΈ [**Amass**](https://github.com/owasp-amass/amass) – Network mapping and subdomain enumeration.
- πŸ“ [**Httpx**](https://github.com/projectdiscovery/httpx) – Fast HTTP probing.
- 🌐 [**FFUF**](https://github.com/ffuf/ffuf) – Fast web fuzzer.
- πŸ§‘β€πŸ’» [**WhatWeb**](https://github.com/urbanadventurer/WhatWeb) – Identify web technologies.
- πŸ› οΈ [**Nuclei**](https://github.com/projectdiscovery/nuclei) – Vulnerability scanning and templating.
- πŸ§‘β€πŸ’» [**XSStrike**](https://github.com/s0md3v/XSStrike) – XSS detection and exploitation.
- 🐞 [**Commix**](https://github.com/commixproject/commix) – Automated command injection.
- πŸ”₯ [**WPScan**](https://github.com/wpscanteam/wpscan) – WordPress security scanner.
- πŸ›‘οΈ [**Cmsmap**](https://github.com/Dionach/CMSmap) – CMS detection and exploitation.
- πŸ” [**Arachni**](https://github.com/Arachni/arachni) – Advanced web vulnerability scanner.
- πŸ•΅οΈ [**Waybackurls**](https://github.com/tomnomnom/waybackurls) – Fetch URLs from Wayback Machine.
- πŸ§‘β€πŸ’» [**Unfurl**](https://github.com/tomnomnom/unfurl) – Extract URLs and data from URLs.
- πŸ“‚ [**Dirsearch**](https://github.com/maurosoria/dirsearch) – A fast and powerful scanner that uses brute-force to find hidden directories and files on web servers. It discovers inaccessible content with customizable wordlists.

## Reverse Engineering

- 🧠 [**Ghidra**](https://ghidra-sre.org/) – Open-source software reverse engineering framework.
- πŸ”Ž [**Radare2**](https://github.com/radareorg/radare2) – Command-line reverse engineering toolkit.
- πŸ› οΈ [**OllyDbg**](http://www.ollydbg.de/) – 32-bit assembler-level debugger for Windows.
- πŸ§‘β€πŸ’» [**IDA Pro**](https://hex-rays.com/ida-pro/) – Industry-standard interactive disassembler.
- 🐍 [**Binary Ninja**](https://binary.ninja/) – Interactive binary analysis platform.
- πŸ›‘οΈ [**x64dbg**](https://x64dbg.com/) – Open-source Windows debugger for x64 and x86.
- 🧬 [**Cutter**](https://cutter.re/) – GUI for Radare2 with advanced analysis features.
- πŸ“ [**Hopper**](https://www.hopperapp.com/) – Mac & Linux disassembler with powerful analysis.
- πŸ§‘β€πŸ’» [**dnSpy**](https://github.com/dnSpy/dnSpy) – .NET debugger and assembly editor.
- πŸ”„ [**RetDec**](https://retdec.com/) – Open-source decompiler for machine code.
- βš™οΈ [**angr**](https://angr.io/) – Python framework for binary analysis.
- πŸ§‘β€πŸ’» [**Frida**](https://frida.re/) – Dynamic instrumentation toolkit.
- πŸ”— [**Binary Analysis Toolkit (BAT)**](https://github.com/cea-sec/BAT) – Malware analysis and binary inspection.
- πŸ› [**Rizin**](https://rizin.re/) – Fork of Radare2 with a focus on usability.
- πŸ—‚οΈ [**PEiD**](https://www.softpedia.com/get/Programming/File-Editors/PEiD.shtml) – Detect packers, cryptors, and compilers.
- πŸ§‘β€πŸ’» [**DiE (Detect It Easy)**](https://github.com/horsicq/Detect-It-Easy) – Portable executable identifier.
- πŸ“Š [**LIEF**](https://lief.quarkslab.com/) – Library for parsing and modifying executables.
- πŸ” [**Snowman**](https://derevenets.com/) – Native code to C++ decompiler.
- πŸ§‘β€πŸ’» [**APKTool**](https://github.com/iBotPeaches/Apktool) – Decompile and rebuild Android APKs.
- πŸ”“ [**JEB Decompiler**](https://www.pnfsoftware.com/jeb/) – Commercial decompiler for Android and other platforms.

## Reporting Tools

- πŸ“„ [**Dradis**](https://dradisframework.com/) – Collaboration and reporting platform for pentesters.
- πŸ§‘β€πŸ’» [**Faraday**](https://faradaysec.com/) – Multi-user penetration testing IDE.
- 🌳 [**MagicTree**](http://www.magictree.org/) – Pentesting productivity tool for data aggregation and reporting.
- πŸ“Š [**Serpico**](https://github.com/SerpicoProject/Serpico) – Simplifying pentest reporting using templates.
- πŸ“ [**LaTeX**](https://www.latex-project.org/) – High-quality typesetting system often used for security reports.
- πŸ“‘ [**reNgine**](https://github.com/yogeshojha/rengine) – Automated reconnaissance framework with reporting.
- πŸ§‘β€πŸ’» [**ReconNote**](https://github.com/nahamsec/recon_note) – Web-based notes manager for recon and reporting.
- πŸ“ [**Pentracker**](https://github.com/noraj/pentracker) – Pentest reporting and management tool.
- πŸ“„ [**Markdown**](https://www.markdownguide.org/) – Lightweight markup language for clean report writing.
- πŸ“„ [**Ghostwriter**](https://github.com/GhostManager/Ghostwriter) – Reporting and engagement management platform.
- πŸ“Š [**VulnReport**](https://github.com/salesforce/vulnreport) – Automated vulnerability reporting platform.
- πŸ“‹ [**Katana Framework**](https://github.com/PowerScript/KatanaFramework) – Post-exploitation and reporting utility.
- πŸ“‘ [**Pentest-Report-Template**](https://github.com/adamjdeacon/Pentest-Report-Template) – Professional pentest report LaTeX template.
- πŸ“„ [**ProofSuite**](https://github.com/danielfuentes/proofsuite) – Automated proof of concept and reporting tool.
- πŸ§‘β€πŸ’» [**VulnWhisperer**](https://github.com/austin-taylor/VulnWhisperer) – Vulnerability management reporting with Nessus, Qualys, and OpenVAS.
- πŸ“œ [**RiskSense**](https://www.risksense.com/) – Risk-based vulnerability management and reporting.
- πŸ“ [**Pentestly**](https://github.com/praetorian-code/pentestly) – Powershell-based post-exploitation and reporting.
- πŸ“„ [**SecReport**](https://github.com/Matir/secreport) – Report generation tool for pentesters.
- πŸ“‹ [**PwnDoc**](https://github.com/pwndoc/pwndoc) – Pentest reporting tool with customizable templates.
- πŸ§‘β€πŸ’» [**PenTest-Wiki**](https://github.com/nixawk/pentest-wiki) – Knowledge base for pentesting & reporting references.

## Social Engineering Tools

- πŸ§‘β€πŸ’» [**SET (Social-Engineer Toolkit)**](https://github.com/trustedsec/social-engineer-toolkit) – Advanced framework for social engineering attacks.
- πŸ“§ [**King Phisher**](https://github.com/rsmusllp/king-phisher) – Phishing campaign toolkit for testing and training.
- 🎣 [**Phishing Frenzy**](https://github.com/pentestgeek/phishing-frenzy) – Phishing campaign automation platform.
- πŸͺ€ [**Gophish**](https://github.com/gophish/gophish) – Open-source phishing toolkit for awareness and testing.
- πŸ“© [**Evilginx2**](https://github.com/kgretzky/evilginx2) – Phishing toolkit using reverse proxy for capturing credentials & tokens.
- πŸ•΅οΈβ€β™€οΈ [**HiddenEye**](https://github.com/DarkSecDevelopers/HiddenEye) – Modern phishing tool with advanced social engineering features.
- πŸ”₯ [**BlackEye**](https://github.com/An0nUD4Y/blackeye) – Phishing tool with site cloning capabilities.
- πŸ›œ [**Zphisher**](https://github.com/htr-tech/zphisher) – Advanced phishing tool with tunneling support.
- πŸ“‘ [**SocialFish**](https://github.com/UndeadSec/SocialFish) – Social engineering phishing framework.
- πŸ§‘β€πŸ’» [**HiddenEye Reborn**](https://github.com/DarkSecDevelopers/HiddenEyeReborn) – Improved version of HiddenEye for phishing & spoofing.
- πŸ§‘β€πŸ’» [**EvilPhish**](https://github.com/An0nNiemus/EvilPhish) – Social engineering tool for phishing websites.
- πŸ“¬ [**ShellPhish**](https://github.com/thelinuxchoice/shellphish) – Automated phishing tool supporting multiple templates.
- πŸ§‘β€πŸ’» [**CamPhish**](https://github.com/techchipnet/CamPhish) – Webcam phishing attack tool.
- πŸ•΅οΈ [**Weeman**](https://github.com/evait-security/weeman) – HTTP server-based phishing framework.
- πŸ“² [**QRGen**](https://github.com/sdushantha/qrgen) – QR code phishing generator.
- πŸ•΅οΈ [**PyPhisher**](https://github.com/KasRoudra/PyPhisher) – Python-based phishing toolkit with multiple site templates.
- πŸ•ΈοΈ [**AdvPhishing**](https://github.com/Ignitetch/AdvPhishing) – Advanced phishing tool with login page cloning.
- 🎯 [**SocialBox**](https://github.com/samsesh/SocialBox) – Brute-force social media hacking toolkit.
- πŸ§‘β€πŸ’» [**XPhisher**](https://github.com/htr-tech/xphisher) – Advanced phishing tool with inbuilt tunneling.
- 🌐 [**CredSniper**](https://github.com/ustayready/CredSniper) – Phishing framework with two-factor authentication bypass support.

## Miscellaneous

- πŸ‰ **[Kali Linux](https://www.kali.org/)** – Advanced penetration testing and security auditing OS.
- 🦜 **[Parrot Security OS](https://www.parrotsec.org/)** – Security-focused OS for pentesting and privacy.
- πŸ§‘β€πŸ’» **[BackBox](https://www.backbox.org/)** – Ubuntu-based Linux distro for penetration testing.
- πŸ•΅οΈ **[BlackArch Linux](https://blackarch.org/)** – Arch-based OS with 2800+ hacking tools.
- πŸ”Ž **[Pentoo](https://www.pentoo.ch/)** – Security-focused Gentoo-based Linux.
- πŸ§‘β€πŸ’» **[Tails](https://tails.boum.org/)** – Privacy and anonymity-focused live OS.
- πŸ§ͺ **[CAINE](https://www.caine-live.net/)** – Digital forensics live Linux distro.
- πŸ§‘β€πŸ’» **[Bugtraq](https://bugtraq-team.com/)** – Linux distro for pentesting & malware analysis.
- πŸ”’ **[Whonix](https://www.whonix.org/)** – Anonymous OS based on Tor.
- 🧠 **[DEFT Linux](https://www.deftlinux.net/)** – Digital evidence & forensics toolkit.
- 🌐 **[Subgraph OS](https://subgraph.com/)** – Secure Linux distro with hardened kernel.
- πŸ§‘β€πŸ’» **[ArchStrike](https://archstrike.org/)** – Arch Linux repository for security tools.
- πŸ§‘β€πŸ’» **[Fedora Security Lab](https://labs.fedoraproject.org/security/)** – Fedora spin for security auditing.
- πŸ§‘β€πŸ’» **[SamuraiWTF](https://github.com/SamuraiWTF/samuraiwtf)** – Web application penetration testing environment.
- πŸ”Ž **[Cyborg Hawk](https://cyborg.ztrela.com/)** – Security distro for penetration testing.
- πŸ§‘β€πŸ’» **[Matriux Krypton](https://www.matriux.com/)** – Debian-based security distribution.
- πŸ”₯ **[NodeZero](https://sourceforge.net/projects/nodezero/)** – Ubuntu-based penetration testing OS.
- πŸ§‘β€πŸ’» **[GnackTrack](https://sourceforge.net/projects/gnacktrack/)** – Linux live distribution for penetration testing.
- πŸ›‘οΈ **[SELKS](https://www.stamus-networks.com/open-source)** – Suricata-based IDS/IPS platform.
- πŸ•΅οΈβ€β™‚οΈ **[PentestBox](https://pentestbox.org/)** – Penetration testing toolkit for Windows.

---

### Support

You can support this project **directly** using **Ko-fi**:

[![ko-fi](https://ko-fi.com/img/githubbutton_sm.svg)](https://ko-fi.com/W7W116EDDL)

> Every contribution, small or large, helps keep open-source cybersecurity alive. Thank you for supporting **Hacking-Tools**! πŸ›‘οΈ