mirror of
https://github.com/enaqx/awesome-pentest.git
synced 2024-12-22 05:45:00 -05:00
Various updates
This commit is contained in:
parent
eb79851090
commit
d924f889f4
@ -9,4 +9,4 @@ before_script:
|
|||||||
- wget 'http://cdp.pca.dfn.de/uni-potsdam-ca/pub/cacert/cacert.pem' -O potsdam.pem
|
- wget 'http://cdp.pca.dfn.de/uni-potsdam-ca/pub/cacert/cacert.pem' -O potsdam.pem
|
||||||
- cat bundle.pem dfn.pem potsdam.pem > /tmp/bundle.pem
|
- cat bundle.pem dfn.pem potsdam.pem > /tmp/bundle.pem
|
||||||
script:
|
script:
|
||||||
- SSL_CERT_FILE="/tmp/bundle.pem" awesome_bot README.md --allow-redirect --white-list "www.0day.today,mvfjfugdwgc5uwho.onion,creativecommons.org,zoomeye.org"
|
- SSL_CERT_FILE="/tmp/bundle.pem" awesome_bot README.md --allow-redirect --white-list "www.0day.today,mvfjfugdwgc5uwho.onion,creativecommons.org,zoomeye.org,netsparker.com"
|
||||||
|
@ -4,26 +4,26 @@
|
|||||||
|
|
||||||
## Table of Contents
|
## Table of Contents
|
||||||
|
|
||||||
- [Adding to this list](#adding-to-this-list)
|
* [Adding to this list](#adding-to-this-list)
|
||||||
- [Creating your own awesome list](#creating-your-own-awesome-list)
|
* [Creating your own awesome list](#creating-your-own-awesome-list)
|
||||||
- [Adding something to an awesome list](#adding-something-to-an-awesome-list)
|
* [Adding something to an awesome list](#adding-something-to-an-awesome-list)
|
||||||
- [Updating your Pull Request](#updating-your-pull-request)
|
* [Updating your Pull Request](#updating-your-pull-request)
|
||||||
|
|
||||||
## Adding to this list
|
## Adding to this list
|
||||||
|
|
||||||
Please ensure your pull request adheres to the following guidelines:
|
Please ensure your pull request adheres to the following guidelines:
|
||||||
|
|
||||||
- Search previous suggestions before making a new one, as yours may be a duplicate.
|
* Search previous suggestions before making a new one, as yours may be a duplicate.
|
||||||
- Make sure the item you are adding is useful (and, you know, awesome) before submitting.
|
* Make sure the item you are adding is useful (and, you know, awesome) before submitting.
|
||||||
- Make an individual pull request for each suggestion.
|
* Make an individual pull request for each suggestion.
|
||||||
- Use [title-casing](http://titlecapitalization.com) (AP style).
|
* Use [title-casing](http://titlecapitalization.com) (AP style).
|
||||||
- Use the following format: `[Item Name](link)`
|
* Use the following format: `[Item Name](link)`
|
||||||
- Link additions should be added to the bottom of the relevant category.
|
* Link additions should be added to the bottom of the relevant category.
|
||||||
- New categories or improvements to the existing categorization are welcome.
|
* New categories or improvements to the existing categorization are welcome.
|
||||||
- Check your spelling and grammar.
|
* Check your spelling and grammar.
|
||||||
- Make sure your text editor is set to remove trailing whitespace.
|
* Make sure your text editor is set to remove trailing whitespace.
|
||||||
- The pull request and commit should have a useful title.
|
* The pull request and commit should have a useful title.
|
||||||
- The body of your commit message should contain a link to the repository.
|
* The body of your commit message should contain a link to the repository.
|
||||||
|
|
||||||
Thank you for your suggestions!
|
Thank you for your suggestions!
|
||||||
|
|
||||||
@ -42,4 +42,5 @@ You'll need a [GitHub account](https://github.com/join)!
|
|||||||
|
|
||||||
## Updating your Pull Request
|
## Updating your Pull Request
|
||||||
|
|
||||||
Sometimes, a maintainer of this list will ask you to edit your Pull Request before it is included. This is normally due to spelling errors or because your PR didn't match the awesome-* list guidelines. [Here is a write up on how to change a Pull Request](https://github.com/RichardLitt/docs/blob/master/amending-a-commit-guide.md), and the different ways you can do that.
|
Sometimes, a maintainer of this list will ask you to edit your Pull Request before it is included. This is normally due to spelling errors or because your PR didn't match the awesome-\* list guidelines.
|
||||||
|
|
||||||
|
166
README.md
166
README.md
@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
> A collection of awesome penetration testing resources.
|
> A collection of awesome penetration testing resources.
|
||||||
|
|
||||||
[This project is supported by Netsparker Web Application Security Scanner](https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)
|
**[This project is supported by Netsparker Web Application Security Scanner](https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)**
|
||||||
|
|
||||||
[Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities.
|
[Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities.
|
||||||
|
|
||||||
@ -10,105 +10,108 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
|
|
||||||
## Contents
|
## Contents
|
||||||
|
|
||||||
- [Online Resources](#online-resources)
|
* [Online Resources](#online-resources)
|
||||||
- [Penetration Testing Resources](#penetration-testing-resources)
|
* [Penetration Testing Resources](#penetration-testing-resources)
|
||||||
- [Exploit Development](#exploit-development)
|
* [Exploit Development](#exploit-development)
|
||||||
- [Open Source Intelligence (OSINT) Resources](#osint-resources)
|
* [Open Source Intelligence (OSINT) Resources](#osint-resources)
|
||||||
- [Social Engineering Resources](#social-engineering-resources)
|
* [Social Engineering Resources](#social-engineering-resources)
|
||||||
- [Lock Picking Resources](#lock-picking-resources)
|
* [Lock Picking Resources](#lock-picking-resources)
|
||||||
- [Operating Systems](#operating-systems)
|
* [Operating Systems](#operating-systems)
|
||||||
- [Tools](#tools)
|
* [Tools](#tools)
|
||||||
- [Penetration Testing Distributions](#penetration-testing-distributions)
|
* [Penetration Testing Distributions](#penetration-testing-distributions)
|
||||||
- [Docker for Penetration Testing](#docker-for-penetration-testing)
|
* [Docker for Penetration Testing](#docker-for-penetration-testing)
|
||||||
- [Multi-paradigm Frameworks](#multi-paradigm-frameworks)
|
* [Multi-paradigm Frameworks](#multi-paradigm-frameworks)
|
||||||
- [Vulnerability Scanners](#vulnerability-scanners)
|
* [Network Vulnerability scanners](#network-vulnerability-scanners)
|
||||||
- [Static Analyzers](#static-analyzers)
|
* [Static Analyzers](#static-analyzers)
|
||||||
- [Web Scanners](#web-scanners)
|
* [Web Vulnerability Scanners](#web-vulnerability-scanners)
|
||||||
- [Network Tools](#network-tools)
|
* [Network Tools](#network-tools)
|
||||||
- [Wireless Network Tools](#wireless-network-tools)
|
* [Wireless Network Tools](#wireless-network-tools)
|
||||||
- [Transport Layer Security Tools](#transport-layer-security-tools)
|
* [Transport Layer Security Tools](#transport-layer-security-tools)
|
||||||
- [Web Exploitation](#web-exploitation)
|
* [Web Exploitation](#web-exploitation)
|
||||||
- [Hex Editors](#hex-editors)
|
* [Hex Editors](#hex-editors)
|
||||||
- [File Format Analysis Tools](#file-format-analysis-tools)
|
* [File Format Analysis Tools](#file-format-analysis-tools)
|
||||||
- [Defense Evasion Tools](#defense-evasion-tools)
|
* [Defense Evasion Tools](#defense-evasion-tools)
|
||||||
- [Hash Cracking Tools](#hash-cracking-tools)
|
* [Hash Cracking Tools](#hash-cracking-tools)
|
||||||
- [Windows Utilities](#windows-utilities)
|
* [Windows Utilities](#windows-utilities)
|
||||||
- [GNU/Linux Utilities](#gnulinux-utilities)
|
* [GNU/Linux Utilities](#gnulinux-utilities)
|
||||||
- [macOS Utilities](#macos-utilities)
|
* [macOS Utilities](#macos-utilities)
|
||||||
- [DDoS Tools](#ddos-tools)
|
* [DDoS Tools](#ddos-tools)
|
||||||
- [Social Engineering Tools](#social-engineering-tools)
|
* [Social Engineering Tools](#social-engineering-tools)
|
||||||
- [OSINT Tools](#osint-tools)
|
* [OSINT Tools](#osint-tools)
|
||||||
- [Anonymity Tools](#anonymity-tools)
|
* [Anonymity Tools](#anonymity-tools)
|
||||||
- [Reverse Engineering Tools](#reverse-engineering-tools)
|
* [Reverse Engineering Tools](#reverse-engineering-tools)
|
||||||
- [Physical Access Tools](#physical-access-tools)
|
* [Physical Access Tools](#physical-access-tools)
|
||||||
- [Side-channel Tools](#side-channel-tools)
|
* [Side-channel Tools](#side-channel-tools)
|
||||||
- [CTF Tools](#ctf-tools)
|
* [CTF Tools](#ctf-tools)
|
||||||
- [Penetration Testing Report Templates](#penetration-testing-report-templates)
|
* [Penetration Testing Report Templates](#penetration-testing-report-templates)
|
||||||
- [Books](#books)
|
* [Books](#books)
|
||||||
- [Penetration Testing Books](#penetration-testing-books)
|
* [Penetration Testing Books](#penetration-testing-books)
|
||||||
- [Hackers Handbook Series](#hackers-handbook-series)
|
* [Hackers Handbook Series](#hackers-handbook-series)
|
||||||
- [Defensive Development](#defensive-development)
|
* [Defensive Development](#defensive-development)
|
||||||
- [Network Analysis Books](#network-analysis-books)
|
* [Network Analysis Books](#network-analysis-books)
|
||||||
- [Reverse Engineering Books](#reverse-engineering-books)
|
* [Reverse Engineering Books](#reverse-engineering-books)
|
||||||
- [Malware Analysis Books](#malware-analysis-books)
|
* [Malware Analysis Books](#malware-analysis-books)
|
||||||
- [Windows Books](#windows-books)
|
* [Windows Books](#windows-books)
|
||||||
- [Social Engineering Books](#social-engineering-books)
|
* [Social Engineering Books](#social-engineering-books)
|
||||||
- [Lock Picking Books](#lock-picking-books)
|
* [Lock Picking Books](#lock-picking-books)
|
||||||
- [Defcon Suggested Reading](#defcon-suggested-reading)
|
* [Defcon Suggested Reading](#defcon-suggested-reading)
|
||||||
- [Vulnerability Databases](#vulnerability-databases)
|
* [Vulnerability Databases](#vulnerability-databases)
|
||||||
- [Security Courses](#security-courses)
|
* [Security Courses](#security-courses)
|
||||||
- [Information Security Conferences](#information-security-conferences)
|
* [Information Security Conferences](#information-security-conferences)
|
||||||
- [Information Security Magazines](#information-security-magazines)
|
* [Information Security Magazines](#information-security-magazines)
|
||||||
- [Awesome Lists](#awesome-lists)
|
* [Awesome Lists](#awesome-lists)
|
||||||
|
|
||||||
|
|
||||||
## Online Resources
|
## Online Resources
|
||||||
|
|
||||||
### Penetration Testing Resources
|
### Penetration Testing Resources
|
||||||
|
|
||||||
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course.
|
* [Metasploit Unleashed](https://www.offensive-security.com/metasploit-unleashed/) - Free Offensive Security Metasploit course.
|
||||||
* [Penetration Testing Execution Standard (PTES)](http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
|
* [Penetration Testing Execution Standard (PTES)](http://www.pentest-standard.org/) - Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
|
||||||
* [Open Web Application Security Project (OWASP)](https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
|
* [Open Web Application Security Project (OWASP)](https://www.owasp.org/index.php/Main_Page) - Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
|
||||||
* [PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) - Free online security knowledge library for pentesters and researchers.
|
* [PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) - Free online security knowledge library for pentesters and researchers.
|
||||||
* [Penetration Testing Framework (PTF)](http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
|
* [Penetration Testing Framework (PTF)](http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html) - Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
|
||||||
* [XSS-Payloads](http://www.xss-payloads.com) - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
|
* [XSS-Payloads](http://www.xss-payloads.com) - Ultimate resource for all things cross-site including payloads, tools, games and documentation.
|
||||||
* [Open Source Security Testing Methodology Manual (OSSTMM)](http://www.isecom.org/mirror/OSSTMM.3.pdf) - Framework for providing test cases that result in verified facts on which to base decisions that impact an organization's security.
|
|
||||||
* [MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)](https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior.
|
* [MITRE's Adversarial Tactics, Techniques & Common Knowledge (ATT&CK)](https://attack.mitre.org/) - Curated knowledge base and model for cyber adversary behavior.
|
||||||
|
|
||||||
### Exploit Development
|
### Exploit Development
|
||||||
|
|
||||||
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.
|
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html) - Tutorial on how to write shellcode.
|
||||||
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database.
|
* [Shellcode Examples](http://shell-storm.org/shellcode/) - Shellcodes database.
|
||||||
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.
|
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/) - Tutorials on how to develop exploits.
|
||||||
|
|
||||||
### OSINT Resources
|
### OSINT Resources
|
||||||
|
|
||||||
* [OSINT Framework](http://osintframework.com/) - Collection of various OSINT tools broken out by category.
|
* [OSINT Framework](http://osintframework.com/) - Collection of various OSINT tools broken out by category.
|
||||||
* [Intel Techniques](https://inteltechniques.com/menu.html) - Collection of OSINT tools. Menu on the left can be used to navigate through the categories.
|
* [Intel Techniques](https://inteltechniques.com/menu.html) - Collection of OSINT tools. Menu on the left can be used to navigate through the categories.
|
||||||
* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - Collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).
|
* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - Collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).
|
||||||
* [WiGLE.net](https://wigle.net/) - Information about wireless networks world-wide, with user-friendly desktop and web applications.
|
* [WiGLE.net](https://wigle.net/) - Information about wireless networks world-wide, with user-friendly desktop and web applications.
|
||||||
|
|
||||||
### Social Engineering Resources
|
### Social Engineering Resources
|
||||||
|
|
||||||
* [Social Engineering Framework](http://www.social-engineer.org/framework/general-discussion/) - Information resource for social engineers.
|
* [Social Engineering Framework](http://www.social-engineer.org/framework/general-discussion/) - Information resource for social engineers.
|
||||||
|
|
||||||
### Lock Picking Resources
|
### Lock Picking Resources
|
||||||
|
|
||||||
* [Schuyler Towne channel](https://www.youtube.com/user/SchuylerTowne/) - Lockpicking videos and security talks.
|
* [Schuyler Towne channel](https://www.youtube.com/user/SchuylerTowne/) - Lockpicking videos and security talks.
|
||||||
* [bosnianbill](https://www.youtube.com/user/bosnianbill) - More lockpicking videos.
|
* [bosnianbill](https://www.youtube.com/user/bosnianbill) - More lockpicking videos.
|
||||||
* [/r/lockpicking](https://www.reddit.com/r/lockpicking) - Resources for learning lockpicking, equipment recommendations.
|
* [/r/lockpicking](https://www.reddit.com/r/lockpicking) - Resources for learning lockpicking, equipment recommendations.
|
||||||
|
|
||||||
### Operating Systems
|
### Operating Systems
|
||||||
* [Security related Operating Systems @ Rawsec](http://rawsec.ml/en/security-related-os/) - Complete list of security related operating systems.
|
|
||||||
* [Best Linux Penetration Testing Distributions @ CyberPunk](https://n0where.net/best-linux-penetration-testing-distributions/) - Description of main penetration testing distributions.
|
* [Security related Operating Systems @ Rawsec](http://list.rawsec.ml/operating_systems.html) - Complete list of security related operating systems.
|
||||||
* [Security @ Distrowatch](http://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
|
* [Security @ Distrowatch](http://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
|
||||||
* [cuckoo](https://github.com/cuckoosandbox/cuckoo) - Open source automated malware analysis system.
|
* [cuckoo](https://github.com/cuckoosandbox/cuckoo) - Open source automated malware analysis system.
|
||||||
* [Computer Aided Investigative Environment (CAINE)](http://www.caine-live.net/) - Italian GNU/Linux live distribution created as a digital forensics project.
|
|
||||||
* [Digital Evidence & Forensics Toolkit (DEFT)](http://www.deftlinux.net/) - Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
|
* [Digital Evidence & Forensics Toolkit (DEFT)](http://www.deftlinux.net/) - Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
|
||||||
* [Tails](https://tails.boum.org/) - Live OS aimed at preserving privacy and anonymity.
|
* [Tails](https://tails.boum.org/) - Live OS aimed at preserving privacy and anonymity.
|
||||||
|
|
||||||
## Tools
|
## Tools
|
||||||
|
|
||||||
### Penetration Testing Distributions
|
### Penetration Testing Distributions
|
||||||
|
|
||||||
* [Kali](https://www.kali.org/) - GNU/Linux distribution designed for digital forensics and penetration testing.
|
* [Kali](https://www.kali.org/) - GNU/Linux distribution designed for digital forensics and penetration testing.
|
||||||
* [ArchStrike](https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts.
|
* [ArchStrike](https://archstrike.org/) - Arch GNU/Linux repository for security professionals and enthusiasts.
|
||||||
* [BlackArch](https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers.
|
* [BlackArch](https://www.blackarch.org/) - Arch GNU/Linux-based distribution for penetration testers and security researchers.
|
||||||
* [Network Security Toolkit (NST)](http://networksecuritytoolkit.org/) - Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.
|
* [Network Security Toolkit (NST)](http://networksecuritytoolkit.org/) - Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.
|
||||||
* [Pentoo](http://www.pentoo.ch/) - Security-focused live CD based on Gentoo.
|
|
||||||
* [BackBox](https://backbox.org/) - Ubuntu-based distribution for penetration tests and security assessments.
|
* [BackBox](https://backbox.org/) - Ubuntu-based distribution for penetration tests and security assessments.
|
||||||
* [Parrot](https://www.parrotsec.org/) - Distribution similar to Kali, with multiple architecture.
|
* [Parrot](https://www.parrotsec.org/) - Distribution similar to Kali, with multiple architecture.
|
||||||
* [Buscador](https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators.
|
* [Buscador](https://inteltechniques.com/buscador/) - GNU/Linux virtual machine that is pre-configured for online investigators.
|
||||||
@ -117,6 +120,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [AttifyOS](https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
|
* [AttifyOS](https://github.com/adi0x90/attifyos) - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
|
||||||
|
|
||||||
### Docker for Penetration Testing
|
### Docker for Penetration Testing
|
||||||
|
|
||||||
* `docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
|
* `docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
|
||||||
* `docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
|
* `docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
|
||||||
* `docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
|
* `docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
|
||||||
@ -135,26 +139,32 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* `docker pull phocean/msf` - [docker-metasploit](https://hub.docker.com/r/phocean/msf/)
|
* `docker pull phocean/msf` - [docker-metasploit](https://hub.docker.com/r/phocean/msf/)
|
||||||
|
|
||||||
### Multi-paradigm Frameworks
|
### Multi-paradigm Frameworks
|
||||||
|
|
||||||
* [Metasploit](https://www.metasploit.com/) - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
|
* [Metasploit](https://www.metasploit.com/) - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
|
||||||
* [Armitage](http://fastandeasyhacking.com/) - Java-based GUI front-end for the Metasploit Framework.
|
* [Armitage](http://fastandeasyhacking.com/) - Java-based GUI front-end for the Metasploit Framework.
|
||||||
* [Faraday](https://github.com/infobyte/faraday) - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
|
* [Faraday](https://github.com/infobyte/faraday) - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
|
||||||
* [ExploitPack](https://github.com/juansacco/exploitpack) - Graphical tool for automating penetration tests that ships with many pre-packaged exploits.
|
* [ExploitPack](https://github.com/juansacco/exploitpack) - Graphical tool for automating penetration tests that ships with many pre-packaged exploits.
|
||||||
* [Pupy](https://github.com/n1nj4sec/pupy) - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
|
* [Pupy](https://github.com/n1nj4sec/pupy) - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
|
||||||
|
|
||||||
### Vulnerability Scanners
|
### Network Vulnerability Scanners
|
||||||
|
|
||||||
|
* [Netsparker Application Security Scanner](https://www.netsparker.com/) - Application security scanner to automatically find security flaws.
|
||||||
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
|
* [Nexpose](https://www.rapid7.com/products/nexpose/) - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
|
||||||
* [Nessus](https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
|
* [Nessus](https://www.tenable.com/products/nessus-vulnerability-scanner) - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
|
||||||
* [OpenVAS](http://www.openvas.org/) - Free software implementation of the popular Nessus vulnerability assessment system.
|
* [OpenVAS](http://www.openvas.org/) - Free software implementation of the popular Nessus vulnerability assessment system.
|
||||||
* [Vuls](https://github.com/future-architect/vuls) - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
|
* [Vuls](https://github.com/future-architect/vuls) - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
|
||||||
|
|
||||||
#### Static Analyzers
|
#### Static Analyzers
|
||||||
|
|
||||||
* [Brakeman](https://github.com/presidentbeef/brakeman) - Static analysis security vulnerability scanner for Ruby on Rails applications.
|
* [Brakeman](https://github.com/presidentbeef/brakeman) - Static analysis security vulnerability scanner for Ruby on Rails applications.
|
||||||
* [cppcheck](http://cppcheck.sourceforge.net/) - Extensible C/C++ static analyzer focused on finding bugs.
|
* [cppcheck](http://cppcheck.sourceforge.net/) - Extensible C/C++ static analyzer focused on finding bugs.
|
||||||
* [FindBugs](http://findbugs.sourceforge.net/) - Free software static analyzer to look for bugs in Java code.
|
* [FindBugs](http://findbugs.sourceforge.net/) - Free software static analyzer to look for bugs in Java code.
|
||||||
* [sobelow](https://github.com/nccgroup/sobelow) - Security-focused static analysis for the Phoenix Framework.
|
* [sobelow](https://github.com/nccgroup/sobelow) - Security-focused static analysis for the Phoenix Framework.
|
||||||
* [bandit](https://pypi.python.org/pypi/bandit/) - Security oriented static analyser for python code.
|
* [bandit](https://pypi.python.org/pypi/bandit/) - Security oriented static analyser for python code.
|
||||||
|
|
||||||
#### Web Scanners
|
#### Web Vulnerability Scanners
|
||||||
|
|
||||||
|
* [Netsparker Application Security Scanner](https://www.netsparker.com/) - Application security scanner to automatically find security flaws.
|
||||||
* [Nikto](https://cirt.net/nikto2) - Noisy but fast black box web server and web application vulnerability scanner.
|
* [Nikto](https://cirt.net/nikto2) - Noisy but fast black box web server and web application vulnerability scanner.
|
||||||
* [Arachni](http://www.arachni-scanner.com/) - Scriptable framework for evaluating the security of web applications.
|
* [Arachni](http://www.arachni-scanner.com/) - Scriptable framework for evaluating the security of web applications.
|
||||||
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework.
|
* [w3af](https://github.com/andresriancho/w3af) - Web application attack and audit framework.
|
||||||
@ -167,6 +177,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [ACSTIS](https://github.com/tijme/angularjs-csti-scanner) - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
|
* [ACSTIS](https://github.com/tijme/angularjs-csti-scanner) - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
|
||||||
|
|
||||||
### Network Tools
|
### Network Tools
|
||||||
|
|
||||||
* [zmap](https://zmap.io/) - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
|
* [zmap](https://zmap.io/) - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
|
||||||
* [nmap](https://nmap.org/) - Free security scanner for network exploration & security audits.
|
* [nmap](https://nmap.org/) - Free security scanner for network exploration & security audits.
|
||||||
* [pig](https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.
|
* [pig](https://github.com/rafael-santiago/pig) - GNU/Linux packet crafting tool.
|
||||||
@ -214,6 +225,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [ACLight](https://github.com/cyberark/ACLight) - A script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
|
* [ACLight](https://github.com/cyberark/ACLight) - A script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
|
||||||
|
|
||||||
### Wireless Network Tools
|
### Wireless Network Tools
|
||||||
|
|
||||||
* [Aircrack-ng](http://www.aircrack-ng.org/) - Set of tools for auditing wireless networks.
|
* [Aircrack-ng](http://www.aircrack-ng.org/) - Set of tools for auditing wireless networks.
|
||||||
* [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS.
|
* [Kismet](https://kismetwireless.net/) - Wireless network detector, sniffer, and IDS.
|
||||||
* [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup.
|
* [Reaver](https://code.google.com/archive/p/reaver-wps) - Brute force attack against WiFi Protected Setup.
|
||||||
@ -221,11 +233,13 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Fluxion](https://github.com/FluxionNetwork/fluxion) - Suite of automated social engineering based WPA attacks.
|
* [Fluxion](https://github.com/FluxionNetwork/fluxion) - Suite of automated social engineering based WPA attacks.
|
||||||
|
|
||||||
### Transport Layer Security Tools
|
### Transport Layer Security Tools
|
||||||
|
|
||||||
* [SSLyze](https://github.com/nabla-c0d3/sslyze) - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
|
* [SSLyze](https://github.com/nabla-c0d3/sslyze) - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
|
||||||
* [tls_prober](https://github.com/WestpointLtd/tls_prober) - Fingerprint a server's SSL/TLS implementation.
|
* [tls_prober](https://github.com/WestpointLtd/tls_prober) - Fingerprint a server's SSL/TLS implementation.
|
||||||
* [testssl.sh](https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.
|
* [testssl.sh](https://github.com/drwetter/testssl.sh) - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.
|
||||||
|
|
||||||
### Web Exploitation
|
### Web Exploitation
|
||||||
|
|
||||||
* [OWASP Zed Attack Proxy (ZAP)](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
|
* [OWASP Zed Attack Proxy (ZAP)](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
|
||||||
* [Fiddler](https://www.telerik.com/fiddler) - Free cross-platform web debugging proxy with user-friendly companion tools.
|
* [Fiddler](https://www.telerik.com/fiddler) - Free cross-platform web debugging proxy with user-friendly companion tools.
|
||||||
* [Burp Suite](https://portswigger.net/burp/) - Integrated platform for performing security testing of web applications.
|
* [Burp Suite](https://portswigger.net/burp/) - Integrated platform for performing security testing of web applications.
|
||||||
@ -257,17 +271,20 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [webscreenshot](https://github.com/maaaaz/webscreenshot) - A simple script to take screenshots of list of websites.
|
* [webscreenshot](https://github.com/maaaaz/webscreenshot) - A simple script to take screenshots of list of websites.
|
||||||
|
|
||||||
### Hex Editors
|
### Hex Editors
|
||||||
|
|
||||||
* [HexEdit.js](https://hexed.it) - Browser-based hex editing.
|
* [HexEdit.js](https://hexed.it) - Browser-based hex editing.
|
||||||
* [Hexinator](https://hexinator.com/) - World's finest (proprietary, commercial) Hex Editor.
|
* [Hexinator](https://hexinator.com/) - World's finest (proprietary, commercial) Hex Editor.
|
||||||
* [Frhed](http://frhed.sourceforge.net/) - Binary file editor for Windows.
|
* [Frhed](http://frhed.sourceforge.net/) - Binary file editor for Windows.
|
||||||
* [0xED](http://www.suavetech.com/0xed/0xed.html) - Native macOS hex editor that supports plug-ins to display custom data types.
|
* [0xED](http://www.suavetech.com/0xed/0xed.html) - Native macOS hex editor that supports plug-ins to display custom data types.
|
||||||
|
|
||||||
### File Format Analysis Tools
|
### File Format Analysis Tools
|
||||||
|
|
||||||
* [Kaitai Struct](http://kaitai.io/) - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
|
* [Kaitai Struct](http://kaitai.io/) - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
|
||||||
* [Veles](https://codisec.com/veles/) - Binary data visualization and analysis tool.
|
* [Veles](https://codisec.com/veles/) - Binary data visualization and analysis tool.
|
||||||
* [Hachoir](http://hachoir3.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
|
* [Hachoir](http://hachoir3.readthedocs.io/) - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
|
||||||
|
|
||||||
### Defense Evasion Tools
|
### Defense Evasion Tools
|
||||||
|
|
||||||
* [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions.
|
* [Veil](https://www.veil-framework.com/) - Generate metasploit payloads that bypass common anti-virus solutions.
|
||||||
* [shellsploit](https://github.com/Exploit-install/shellsploit-framework) - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
|
* [shellsploit](https://github.com/Exploit-install/shellsploit-framework) - Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
|
||||||
* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE `.exe`s").
|
* [Hyperion](http://nullsecurity.net/tools/binary.html) - Runtime encryptor for 32-bit portable executables ("PE `.exe`s").
|
||||||
@ -277,6 +294,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
|
* [UniByAv](https://github.com/Mr-Un1k0d3r/UniByAv) - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
|
||||||
|
|
||||||
### Hash Cracking Tools
|
### Hash Cracking Tools
|
||||||
|
|
||||||
* [John the Ripper](http://www.openwall.com/john/) - Fast password cracker.
|
* [John the Ripper](http://www.openwall.com/john/) - Fast password cracker.
|
||||||
* [Hashcat](http://hashcat.net/hashcat/) - The more fast hash cracker.
|
* [Hashcat](http://hashcat.net/hashcat/) - The more fast hash cracker.
|
||||||
* [CeWL](https://digi.ninja/projects/cewl.php) - Generates custom wordlists by spidering a target's website and collecting unique words.
|
* [CeWL](https://digi.ninja/projects/cewl.php) - Generates custom wordlists by spidering a target's website and collecting unique words.
|
||||||
@ -285,6 +303,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [BruteForce Wallet](https://github.com/glv2/bruteforce-wallet) - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
|
* [BruteForce Wallet](https://github.com/glv2/bruteforce-wallet) - Find the password of an encrypted wallet file (i.e. `wallet.dat`).
|
||||||
|
|
||||||
### Windows Utilities
|
### Windows Utilities
|
||||||
|
|
||||||
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities.
|
* [Sysinternals Suite](https://technet.microsoft.com/en-us/sysinternals/bb842062) - The Sysinternals Troubleshooting Utilities.
|
||||||
* [Windows Credentials Editor](http://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
|
* [Windows Credentials Editor](http://www.ampliasecurity.com/research/windows-credentials-editor/) - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
|
||||||
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
|
* [mimikatz](http://blog.gentilkiwi.com/mimikatz) - Credentials extraction tool for Windows operating system.
|
||||||
@ -300,12 +319,15 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [DeathStar](https://github.com/byt3bl33d3r/DeathStar) - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
|
* [DeathStar](https://github.com/byt3bl33d3r/DeathStar) - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
|
||||||
|
|
||||||
### GNU/Linux Utilities
|
### GNU/Linux Utilities
|
||||||
|
|
||||||
* [Linux Exploit Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
|
* [Linux Exploit Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
|
||||||
|
|
||||||
### macOS Utilities
|
### macOS Utilities
|
||||||
|
|
||||||
* [Bella](https://github.com/Trietptm-on-Security/Bella) - Pure Python post-exploitation data mining and remote administration tool for macOS.
|
* [Bella](https://github.com/Trietptm-on-Security/Bella) - Pure Python post-exploitation data mining and remote administration tool for macOS.
|
||||||
|
|
||||||
### DDoS Tools
|
### DDoS Tools
|
||||||
|
|
||||||
* [LOIC](https://github.com/NewEraCracker/LOIC/) - Open source network stress tool for Windows.
|
* [LOIC](https://github.com/NewEraCracker/LOIC/) - Open source network stress tool for Windows.
|
||||||
* [JS LOIC](http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html) - JavaScript in-browser version of LOIC.
|
* [JS LOIC](http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html) - JavaScript in-browser version of LOIC.
|
||||||
* [SlowLoris](https://github.com/gkbrk/slowloris) - DoS tool that uses low bandwidth on the attacking side.
|
* [SlowLoris](https://github.com/gkbrk/slowloris) - DoS tool that uses low bandwidth on the attacking side.
|
||||||
@ -314,6 +336,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [UFONet](https://github.com/epsylon/ufonet) - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
|
* [UFONet](https://github.com/epsylon/ufonet) - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; `GET`/`POST`, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
|
||||||
|
|
||||||
### Social Engineering Tools
|
### Social Engineering Tools
|
||||||
|
|
||||||
* [Social Engineer Toolkit (SET)](https://github.com/trustedsec/social-engineer-toolkit) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
|
* [Social Engineer Toolkit (SET)](https://github.com/trustedsec/social-engineer-toolkit) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
|
||||||
* [King Phisher](https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
|
* [King Phisher](https://github.com/securestate/king-phisher) - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
|
||||||
* [Evilginx](https://github.com/kgretzky/evilginx) - MITM attack framework used for phishing credentials and session cookies from any Web service.
|
* [Evilginx](https://github.com/kgretzky/evilginx) - MITM attack framework used for phishing credentials and session cookies from any Web service.
|
||||||
@ -322,6 +345,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Beelogger](https://github.com/4w4k3/BeeLogger) - Tool for generating keylooger.
|
* [Beelogger](https://github.com/4w4k3/BeeLogger) - Tool for generating keylooger.
|
||||||
|
|
||||||
### OSINT Tools
|
### OSINT Tools
|
||||||
|
|
||||||
* [Maltego](http://www.paterva.com/web7/) - Proprietary software for open source intelligence and forensics, from Paterva.
|
* [Maltego](http://www.paterva.com/web7/) - Proprietary software for open source intelligence and forensics, from Paterva.
|
||||||
* [theHarvester](https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester.
|
* [theHarvester](https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester.
|
||||||
* [creepy](https://github.com/ilektrojohn/creepy) - Geolocation OSINT tool.
|
* [creepy](https://github.com/ilektrojohn/creepy) - Geolocation OSINT tool.
|
||||||
@ -347,8 +371,8 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Intrigue](http://intrigue.io) - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
|
* [Intrigue](http://intrigue.io) - Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.
|
||||||
* [ZoomEye](https://www.zoomeye.org/) - Search engine for cyberspace that lets the user find specific network components.
|
* [ZoomEye](https://www.zoomeye.org/) - Search engine for cyberspace that lets the user find specific network components.
|
||||||
|
|
||||||
|
|
||||||
### Anonymity Tools
|
### Anonymity Tools
|
||||||
|
|
||||||
* [Tor](https://www.torproject.org/) - Free software and onion routed overlay network that helps you defend against traffic analysis.
|
* [Tor](https://www.torproject.org/) - Free software and onion routed overlay network that helps you defend against traffic analysis.
|
||||||
* [OnionScan](https://onionscan.org/) - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
|
* [OnionScan](https://onionscan.org/) - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
|
||||||
* [I2P](https://geti2p.net/) - The Invisible Internet Project.
|
* [I2P](https://geti2p.net/) - The Invisible Internet Project.
|
||||||
@ -356,6 +380,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [What Every Browser Knows About You](http://webkay.robinlinus.com/) - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
|
* [What Every Browser Knows About You](http://webkay.robinlinus.com/) - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
|
||||||
|
|
||||||
### Reverse Engineering Tools
|
### Reverse Engineering Tools
|
||||||
|
|
||||||
* [Interactive Disassembler (IDA Pro)](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
|
* [Interactive Disassembler (IDA Pro)](https://www.hex-rays.com/products/ida/) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, [IDA Free](https://www.hex-rays.com/products/ida/support/download_freeware.shtml).
|
||||||
* [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
|
* [WDK/WinDbg](https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx) - Windows Driver Kit and WinDbg.
|
||||||
* [OllyDbg](http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.
|
* [OllyDbg](http://www.ollydbg.de/) - x86 debugger for Windows binaries that emphasizes binary code analysis.
|
||||||
@ -375,6 +400,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Frida](https://www.frida.re/) - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
|
* [Frida](https://www.frida.re/) - Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
|
||||||
|
|
||||||
### Physical Access Tools
|
### Physical Access Tools
|
||||||
|
|
||||||
* [LAN Turtle](https://lanturtle.com/) - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
|
* [LAN Turtle](https://lanturtle.com/) - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
|
||||||
* [USB Rubber Ducky](http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
|
* [USB Rubber Ducky](http://usbrubberducky.com/) - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
|
||||||
* [Poisontap](https://samy.pl/poisontap/) - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
|
* [Poisontap](https://samy.pl/poisontap/) - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
|
||||||
@ -382,14 +408,17 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
|
* [Proxmark3](https://proxmark3.com/) - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
|
||||||
|
|
||||||
### Side-channel Tools
|
### Side-channel Tools
|
||||||
|
|
||||||
* [ChipWhisperer](http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.
|
* [ChipWhisperer](http://chipwhisperer.com) - Complete open-source toolchain for side-channel power analysis and glitching attacks.
|
||||||
|
|
||||||
### CTF Tools
|
### CTF Tools
|
||||||
|
|
||||||
* [ctf-tools](https://github.com/zardus/ctf-tools) - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
|
* [ctf-tools](https://github.com/zardus/ctf-tools) - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
|
||||||
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
|
* [Pwntools](https://github.com/Gallopsled/pwntools) - Rapid exploit development framework built for use in CTFs.
|
||||||
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
|
* [RsaCtfTool](https://github.com/sourcekris/RsaCtfTool) - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
|
||||||
|
|
||||||
### Penetration Testing Report Templates
|
### Penetration Testing Report Templates
|
||||||
|
|
||||||
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.
|
* [Public Pentesting Reports](https://github.com/juliocesarfort/public-pentesting-reports) - Curated list of public penetration test reports released by several consulting firms and academic security groups.
|
||||||
* [Pentesting Report Template](https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - testandverification.com template.
|
* [Pentesting Report Template](https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf) - testandverification.com template.
|
||||||
* [Pentesting Report Template](https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf) - hitachi-systems-security.com template.
|
* [Pentesting Report Template](https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf) - hitachi-systems-security.com template.
|
||||||
@ -398,7 +427,9 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Pentesting Report Template](https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf) - pcisecuritystandards.org template.
|
* [Pentesting Report Template](https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf) - pcisecuritystandards.org template.
|
||||||
|
|
||||||
## Books
|
## Books
|
||||||
|
|
||||||
### Penetration Testing Books
|
### Penetration Testing Books
|
||||||
|
|
||||||
* [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm)
|
* [The Art of Exploitation by Jon Erickson, 2008](https://www.nostarch.com/hacking2.htm)
|
||||||
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](https://www.nostarch.com/metasploit)
|
* [Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011](https://www.nostarch.com/metasploit)
|
||||||
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](https://www.nostarch.com/pentesting)
|
* [Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014](https://www.nostarch.com/pentesting)
|
||||||
@ -417,6 +448,7 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Advanced Penetration Testing by Wil Allsopp, 2017](https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)
|
* [Advanced Penetration Testing by Wil Allsopp, 2017](https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/)
|
||||||
|
|
||||||
### Hackers Handbook Series
|
### Hackers Handbook Series
|
||||||
|
|
||||||
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
|
* [The Database Hacker's Handbook, David Litchfield et al., 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html)
|
||||||
* [The Shellcoders Handbook by Chris Anley et al., 2007](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
|
* [The Shellcoders Handbook by Chris Anley et al., 2007](http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html)
|
||||||
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
|
* [The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html)
|
||||||
@ -433,12 +465,14 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Holistic Info-Sec for Web Developers (Fascicle 1)](https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)
|
* [Holistic Info-Sec for Web Developers (Fascicle 1)](https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications)
|
||||||
|
|
||||||
### Network Analysis Books
|
### Network Analysis Books
|
||||||
|
|
||||||
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](https://nmap.org/book/)
|
* [Nmap Network Scanning by Gordon Fyodor Lyon, 2009](https://nmap.org/book/)
|
||||||
* [Practical Packet Analysis by Chris Sanders, 2011](https://www.nostarch.com/packet2.htm)
|
* [Practical Packet Analysis by Chris Sanders, 2011](https://www.nostarch.com/packet2.htm)
|
||||||
* [Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012](https://www.amazon.com/Wireshark-Network-Analysis-Second-Certified/dp/1893939944)
|
* [Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012](https://www.amazon.com/Wireshark-Network-Analysis-Second-Certified/dp/1893939944)
|
||||||
* [Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012](http://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace-ebook/dp/B008CG8CYU/)
|
* [Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012](http://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace-ebook/dp/B008CG8CYU/)
|
||||||
|
|
||||||
### Reverse Engineering Books
|
### Reverse Engineering Books
|
||||||
|
|
||||||
* [Reverse Engineering for Beginners by Dennis Yurichev](http://beginners.re/)
|
* [Reverse Engineering for Beginners by Dennis Yurichev](http://beginners.re/)
|
||||||
* [Hacking the Xbox by Andrew Huang, 2003](https://www.nostarch.com/xbox.htm)
|
* [Hacking the Xbox by Andrew Huang, 2003](https://www.nostarch.com/xbox.htm)
|
||||||
* [The IDA Pro Book by Chris Eagle, 2011](https://www.nostarch.com/idapro2.htm)
|
* [The IDA Pro Book by Chris Eagle, 2011](https://www.nostarch.com/idapro2.htm)
|
||||||
@ -446,15 +480,18 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)
|
* [Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015](http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386)
|
||||||
|
|
||||||
### Malware Analysis Books
|
### Malware Analysis Books
|
||||||
|
|
||||||
* [Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012](https://www.nostarch.com/malware)
|
* [Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012](https://www.nostarch.com/malware)
|
||||||
* [The Art of Memory Forensics by Michael Hale Ligh et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html)
|
* [The Art of Memory Forensics by Michael Hale Ligh et al., 2014](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html)
|
||||||
* [Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html)
|
* [Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html)
|
||||||
|
|
||||||
### Windows Books
|
### Windows Books
|
||||||
|
|
||||||
* [Windows Internals by Mark Russinovich et al., 2012](http://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735/)
|
* [Windows Internals by Mark Russinovich et al., 2012](http://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735/)
|
||||||
* [Troubleshooting with the Windows Sysinternals Tools by Mark Russinovich & Aaron Margosis, 2016](https://www.amazon.com/Troubleshooting-Windows-Sysinternals-Tools-2nd/dp/0735684448/)
|
* [Troubleshooting with the Windows Sysinternals Tools by Mark Russinovich & Aaron Margosis, 2016](https://www.amazon.com/Troubleshooting-Windows-Sysinternals-Tools-2nd/dp/0735684448/)
|
||||||
|
|
||||||
### Social Engineering Books
|
### Social Engineering Books
|
||||||
|
|
||||||
* [The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
* [The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html)
|
||||||
* [The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
* [The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005](http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html)
|
||||||
* [Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
|
* [Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011](http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/)
|
||||||
@ -464,15 +501,18 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014](https://www.mhprofessional.com/product.php?isbn=0071818464)
|
* [Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014](https://www.mhprofessional.com/product.php?isbn=0071818464)
|
||||||
|
|
||||||
### Lock Picking Books
|
### Lock Picking Books
|
||||||
|
|
||||||
* [Practical Lock Picking by Deviant Ollam, 2012](https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7)
|
* [Practical Lock Picking by Deviant Ollam, 2012](https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7)
|
||||||
* [Keys to the Kingdom by Deviant Ollam, 2012](https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5)
|
* [Keys to the Kingdom by Deviant Ollam, 2012](https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5)
|
||||||
* [Lock Picking: Detail Overkill by Solomon](https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0)
|
* [Lock Picking: Detail Overkill by Solomon](https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0)
|
||||||
* [Eddie the Wire books](https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0)
|
* [Eddie the Wire books](https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0)
|
||||||
|
|
||||||
### Defcon Suggested Reading
|
### Defcon Suggested Reading
|
||||||
|
|
||||||
* [Defcon Suggested Reading](https://www.defcon.org/html/links/book-list.html)
|
* [Defcon Suggested Reading](https://www.defcon.org/html/links/book-list.html)
|
||||||
|
|
||||||
## Vulnerability Databases
|
## Vulnerability Databases
|
||||||
|
|
||||||
* [Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
|
* [Common Vulnerabilities and Exposures (CVE)](https://cve.mitre.org/) - Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
|
||||||
* [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
|
* [National Vulnerability Database (NVD)](https://nvd.nist.gov/) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
|
||||||
* [US-CERT Vulnerability Notes Database](https://www.kb.cert.org/vuls/) - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
|
* [US-CERT Vulnerability Notes Database](https://www.kb.cert.org/vuls/) - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
|
||||||
@ -493,16 +533,18 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
|
* [HPI-VDB](https://hpi-vdb.de/) - Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.
|
||||||
|
|
||||||
## Security Courses
|
## Security Courses
|
||||||
|
|
||||||
* [Offensive Security Training](https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers.
|
* [Offensive Security Training](https://www.offensive-security.com/information-security-training/) - Training from BackTrack/Kali developers.
|
||||||
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification.
|
* [SANS Security Training](http://www.sans.org/) - Computer Security Training & Certification.
|
||||||
* [Open Security Training](http://opensecuritytraining.info/) - Training material for computer security classes.
|
* [Open Security Training](http://opensecuritytraining.info/) - Training material for computer security classes.
|
||||||
* [CTF Field Guide](https://trailofbits.github.io/ctf/) - Everything you need to win your next CTF competition.
|
* [CTF Field Guide](https://trailofbits.github.io/ctf/) - Everything you need to win your next CTF competition.
|
||||||
* [ARIZONA CYBER WARFARE RANGE](http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
|
* [ARIZONA CYBER WARFARE RANGE](http://azcwr.org/) - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
|
||||||
* [Cybrary](http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Environments'.
|
* [Cybrary](http://cybrary.it) - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Environments'.
|
||||||
* [Computer Security Student](http://computersecuritystudent.com) - Many free tutorials, great for beginners, $10/mo membership unlocks all content.
|
* [Computer Security Student](http://computersecuritystudent.com) - Many free tutorials, great for beginners, $10/mo membership unlocks all content.
|
||||||
* [European Union Agency for Network and Information Security](https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.
|
* [European Union Agency for Network and Information Security](https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material) - ENISA Cyber Security Training material.
|
||||||
|
|
||||||
## Information Security Conferences
|
## Information Security Conferences
|
||||||
|
|
||||||
* [DEF CON](https://www.defcon.org/) - Annual hacker convention in Las Vegas.
|
* [DEF CON](https://www.defcon.org/) - Annual hacker convention in Las Vegas.
|
||||||
* [Black Hat](http://www.blackhat.com/) - Annual security conference in Las Vegas.
|
* [Black Hat](http://www.blackhat.com/) - Annual security conference in Las Vegas.
|
||||||
* [BSides](http://www.securitybsides.com/) - Framework for organising and holding security conferences.
|
* [BSides](http://www.securitybsides.com/) - Framework for organising and holding security conferences.
|
||||||
@ -537,10 +579,12 @@ Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Plea
|
|||||||
* [FSec](http://fsec.foi.hr) - FSec - Croatian Information Security Gathering in Varaždin, Croatia.
|
* [FSec](http://fsec.foi.hr) - FSec - Croatian Information Security Gathering in Varaždin, Croatia.
|
||||||
|
|
||||||
## Information Security Magazines
|
## Information Security Magazines
|
||||||
|
|
||||||
* [2600: The Hacker Quarterly](https://www.2600.com/Magazine/DigitalEditions) - American publication about technology and computer "underground."
|
* [2600: The Hacker Quarterly](https://www.2600.com/Magazine/DigitalEditions) - American publication about technology and computer "underground."
|
||||||
* [Phrack Magazine](http://www.phrack.org/) - By far the longest running hacker zine.
|
* [Phrack Magazine](http://www.phrack.org/) - By far the longest running hacker zine.
|
||||||
|
|
||||||
## Awesome Lists
|
## Awesome Lists
|
||||||
|
|
||||||
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
|
* [Kali Linux Tools](http://tools.kali.org/tools-listing) - List of tools present in Kali Linux.
|
||||||
* [SecTools](http://sectools.org/) - Top 125 Network Security Tools.
|
* [SecTools](http://sectools.org/) - Top 125 Network Security Tools.
|
||||||
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.
|
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Awesome Pentest Cheat Sheets.
|
||||||
|
Loading…
Reference in New Issue
Block a user