Commit Graph

468 Commits

Author SHA1 Message Date
Meitar M
761465cba4
Add pwnagotchi, an "AI" that augments BetterCAP for Wi-Fi cracking. 2019-09-26 12:29:25 -04:00
Samar Dhwoj Acharya
ef6693cb33
Update README.md 2019-09-23 10:05:51 -05:00
SecureThisShit
95811e5046
Add WinPwn, Internal Penetrationtest Script 2019-09-21 21:50:07 +02:00
Meitar M
37235ae8eb
Add dnscat2, a command and control channel over the DNS protocol. 2019-09-21 00:11:24 -04:00
Meitar M
bcd02be15e
Update URL for recon-ng, which has moved to GitHub from BitBucket. 2019-09-12 21:28:20 -04:00
Meitar M
29bb5a5464
Add pivotsuite, a portable, standalone client-server pivot toolkit. 2019-09-12 21:20:48 -04:00
Meitar M
49db1f671c
Add dorkbot, modular CLI tool to find vulnerabilities based on SERPs. 2019-09-04 12:59:59 -04:00
Meitar M
c5208dbb01
Add CarbonCopy code signing spoofer tool used for AV evasion. 2019-08-29 14:56:11 -04:00
Meitar M
1095a01786
Update URL for mitmproxy. 2019-08-10 21:33:12 -04:00
Meitar M
2b22b33b56
Update URLs for No Starch Press (www.nostarch.com -> nostarch.com). 2019-08-07 16:15:16 -04:00
Meitar M
559d7d9001
Add TrevorC2, a masked C2 and data exfil tool using "legitimate" HTTP. 2019-08-07 16:10:33 -04:00
Meitar M
3f96c213e8
Update the URL for Immunity Debugger. 2019-08-05 00:20:53 -04:00
Meitar M
e7f89e9b85
Add new section for Android-based software, and three tools to it. 2019-08-05 00:10:32 -04:00
Meitar M
6a964e150f
Add WhatBreach, script to find database breaches based on email address. 2019-07-30 15:46:29 -04:00
Meitar M
f656127663
Move hping3, pig, and scapy to new, more specific section. 2019-07-26 14:29:24 -04:00
Meitar M
365786a014
Add TraceWrangler, a powerful pcap and pcapng file editor. 2019-07-26 14:26:39 -04:00
Meitar M
fb35ce1de1
Add new section ("Network Packet Replay…") with three tools. 2019-07-26 14:19:22 -04:00
Meitar M
62066aa565
Add Vulmon.com, a vulnerability search engine and database. 2019-07-24 17:27:53 -04:00
Meitar M
980c85e77c
Add sylkie, replace ampersand with full word and. 2019-07-16 14:22:27 -04:00
Meitar M
0943194460
Reword the description of cwe_checker for clarity and style conformance. 2019-07-10 18:55:01 -04:00
Thomas Barabosch
49f8be6734
Added cwe_checker
cwe_checker finds vulnerable patterns in binary executables
2019-07-04 08:47:37 +02:00
Meitar M
a65a9a07d3
Merge pull request #296 from meitar/master
Add celerystalk.
2019-05-07 18:11:27 -04:00
Meitar M
0307260feb
Add celerystalk. 2019-05-07 18:06:45 -04:00
Jake Jarvis
d4875dbe93
Add Shodan search queries list 2019-04-26 09:49:45 -04:00
Meitar M
89b6134ff6
Closes #293: Removes OSINT-SPY. 2019-04-10 12:59:01 -04:00
Meitar M
52a2c73e72
Add "See also" link to another good ICS security list. 2019-04-08 11:34:44 -04:00
Meitar M
2bf587dcad
Add Covenant, fix grammar, move Commando VM to Windows section. 2019-04-03 00:15:44 -04:00
Opentuned
da73b5a93f
Adding Command VM
Saw an article about a new windows VM for red team testing that might be useful...
2019-04-02 09:05:09 +01:00
Meitar M
52db8f18d3
Move oregano to the MITM tools section, alphabetize the Network Tools. 2019-03-29 03:48:11 -04:00
Meitar M
1265b15c53
This commit proposes a massive reorganization of the list categories.
In this commit, the primary change is alphabetizing both the table of
contents as well as the line items for each category. This is done in
order to make it easier for readers to locate their desired information
with their naked eyes. The list is long, and as such should at least
have a consistent scheme for ordering the items within it.
Alphabetization also side-steps the issue of favoritism since the sort
order is lexicographical.

Additionally, this commit changes several headings to more clearly
describe its contents. For example, most of the subheadings under the
"Online Resources" category have been renamed to "Online [Topic]
Resources", where "[Topic]" was the old heading. Similarly, I split the
Docker Container section into two, one for distros and for tools, since
the previous section muddled those two distinct categories of containers
together. (The main list does not do this, so that was anomalous.)

Another major change is the removal of the top-level "Tools" section.
This section had clearly become a catch-all and also prevented us from
being able to use sub-headings to more intelligently categorize the
individual tools without running afoul of the Awesome List guidelines
that restrict us to one level of subheading per category. This continues
the work that was begun in #290 of moving, e.g., the "Network Tools"
section to its own top-level heading.

Further, I have removed several tools that are strictly either forensics
or malware analysis utilities, such as cuckoo sandbox. I feel that this
more accurately aligns this list with its stated purpose: Penetration
Testing. While related, listing forensics of malware analysis tools that
cannot also be used for vulnerability discovery or exploit development
seems like an invitation to suffer from scope creep. Instead of listing
those tools directly, I have therefore added "See also" lines with links
to more appropriate places (often other Awesome lists) for their topic.

Finally, several links were upgraded from their listed HTTP to HTTPS
versions, after I confirmed that those Web servers did indeed respond to
TLS requests. I also removed `www.defcon.org` from the `awesome_bot`'s
white list, since that link works just fine for me as well.
2019-03-28 15:47:23 -04:00
ZJ
19a96f2e22
regroup some of the netowrk tools, based on awesome-lint headers 2019-03-27 13:06:58 -04:00
ZJ
6f072af3ad
awesome-lint: reformat docker-pull links 2019-03-27 12:56:59 -04:00
ZJ
2dbb9edc6e
awesome-lint: fix header levels 2019-03-27 12:37:31 -04:00
Meitar M
c1b2d06543
Re-add ZoomEye.org to whitelist (403'ing again), remove 404'd ExploitPack link. 2019-03-19 00:09:40 -04:00
Meitar M
abfe33a506
Fix spacing issue in Legion, rephrase its description for clarity. 2019-03-18 23:28:51 -04:00
Robin Rainwalker
5984df5db0
Added Legion to Network Vulnerability Scanners
[Legion](https://github.com/GoVanguard/legion) -  Open source semi-automated discovery and reconnaissance network penetration testing framework by @GoVanguard
2019-03-15 12:58:02 -04:00
Fabian Martinez Portantier
98b783417f Update README.md
Added Habu - Python Network Hacking Toolkit
2019-03-13 18:40:18 -04:00
Samar Dhwoj Acharya
a67537ee04
Merge pull request #278 from Gymmasssorla/patch-2
Offer the "Anevicon" DDoS tool
2019-03-13 10:54:30 -05:00
Samar Dhwoj Acharya
7feb98e35b
Merge pull request #285 from meitar/uefitool
Add UEFITool, a UEFI firmware image viewer, extractor, and editor.
2019-03-13 09:39:46 -05:00
Samar Dhwoj Acharya
8fcdce285b
Merge pull request #286 from meitar/ghidra
Add Ghidra; NSA's SRE tool suite officially released as free software.
2019-03-13 09:39:25 -05:00
Meitar M
88d5f3986b
Add Ghidra; NSA's SRE tool suite officially released as free software. 2019-03-11 13:50:30 -04:00
Meitar M
a017aeef88
Add UEFITool, a UEFI firmware image viewer, extractor, and editor. 2019-03-07 17:20:14 -05:00
Meitar M
e491345460
Address numerous Awesome linter errors for sindresorhus/awesome#1366 PR.
This commit removes the bolding from the Netsparker referral link
because it lints as a heading. (The referral URL itself was not
deleted.) It also adds the word `culture` at the end of the 2600 list
item so that line item won't end in a quotation mark, but a period (as
the pedantic linter requires). This commit also fixes the headline level
for the License section and uses the new Awesome badge SVG sources.
2019-03-04 14:57:58 -05:00
Samar Dhwoj Acharya
df5a353b39
Merge pull request #283 from meitar/resource-reorg
General re-organization of some Tools sections, adds several tools.
2019-03-03 18:04:56 -06:00
Meitar M
fadcb9fc27
General re-organization of some Tools sections, adds several tools.
This commit makes a substantial change by moving two sections that were
previously in "Tools" into the "Online Resources" category instead.
Specifically, the "Penetration Testing Report Templates" and "Code
examples for Penetration Testing" sections, each of which contained
references to documents rather than immediately-usable software, were
moved out of the "Tools" category. This was done because there is now a
clear distinction between "places to go to get more information about a
topic" (a resource) and "software to download that is immediately usable
in a pentest" (a tool).

Additionally, this commit adds a new section of Tools for pentests
tentatively called "Collaboration Tools" and adds RedELK, a Red Team's
SIEM, to that section. RedELK is an example of a multiple teamserver
analysis framework intended for use during long-term engagements for
keeping tabs on Blue Team activities, so it is not exactly like any
other tool in this list.

Finally, another tool (Cloakify) was added to the data exfiltration
section.
2019-03-02 03:17:39 -05:00
Meitar M
e276175b87
Add LinEnum, a privesc and enumeration shell script for GNU/Linux. 2019-02-26 01:19:42 -05:00
Samar Dhwoj Acharya
971bfb2b61
Merge pull request #281 from meitar/fix-build
Fix Awesome-Bot build errors: ComputerSecurityStudent.com is gone.
2019-02-19 22:57:06 -06:00
Meitar M
8f0d4c7ba5
Fix Awesome-Bot build errors: ComputerSecurityStudent.com is gone.
This commit also adds GhostProject.fr to the whitelist, as they use
CloudFlare's JavaScript DDoS detection and return an HTTP 503 error.

This commit also removes `zoomeye.org` from the whitelist,
because they seem to be returning HTTP 200 OK responses reliably now.
2019-02-19 22:32:55 -05:00
Samar Dhwoj Acharya
950dba9668
Merge pull request #280 from meitar/checksec.sh
Add checksec.sh, script to test what Linux security features are used.
2019-02-19 19:50:31 -06:00
Meitar M
3ee5e65e58
Add checksec.sh, script to test what Linux security features are used. 2019-02-19 18:04:31 -05:00