githubEdit

Hacking Tools

Android Utilities

  • cSploitarrow-up-right - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.

  • Fingarrow-up-right - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.

Anonymity Tools

Tor Tools

See also awesome-torarrow-up-right.

Anti-virus Evasion Tools

Books

See also DEF CON Suggested Readingarrow-up-right.

Malware Analysis Books

See awesome-malware-analysis § Booksarrow-up-right.

CTF Tools

  • CTF Field Guidearrow-up-right - Everything you need to win your next CTF competition.

  • Cipheyarrow-up-right - Automated decryption tool using artificial intelligence and natural language processing.

  • RsaCtfToolarrow-up-right - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.

  • ctf-toolsarrow-up-right - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.

  • shellpoparrow-up-right - Easily generate sophisticated reverse or bind shell commands to help you save time during penetration tests.

Cloud Platform Attack Tools

See also HackingThe.cloudarrow-up-right.

Collaboration Tools

Exploit Development Tools

See also Reverse Engineering Toolsarrow-up-right.

File Format Analysis Tools

  • ExifToolarrow-up-right - Platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.

  • Hachoirarrow-up-right - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.

  • Kaitai Structarrow-up-right - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.

  • peepdfarrow-up-right - Python tool to explore PDF files in order to find out if the file can be harmful or not.

  • Velesarrow-up-right - Binary data visualization and analysis tool.

GNU/Linux Utilities

Hash Cracking Tools

Lock Picking

See awesome-lockpickingarrow-up-right.

macOS Utilities

  • Bellaarrow-up-right - Pure Python post-exploitation data mining and remote administration tool for macOS.

  • EvilOSXarrow-up-right - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.

Multi-paradigm Frameworks

  • Armitagearrow-up-right - Java-based GUI front-end for the Metasploit Framework.

  • AutoSploitarrow-up-right - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.

  • Deckerarrow-up-right - Penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.

  • Faradayarrow-up-right - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.

  • Metasploitarrow-up-right - Software for offensive security teams to help verify vulnerabilities and manage security assessments.

  • Pupyarrow-up-right - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.

Network Tools

  • CrackMapExecarrow-up-right - Swiss army knife for pentesting networks.

  • IKEForcearrow-up-right - Command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.

  • Intercepter-NGarrow-up-right - Multifunctional network toolkit.

  • Legionarrow-up-right - Graphical semi-automated discovery and reconnaissance framework based on Python 3 and forked from SPARTA.

  • Network-Tools.comarrow-up-right - Website offering an interface to numerous basic network utilities like ping, traceroute, whois, and more.

  • Ncrackarrow-up-right - High-speed network authentication cracking tool built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.

  • Praedaarrow-up-right - Automated multi-function printer data harvester for gathering usable data during security assessments.

  • Printer Exploitation Toolkit (PRET)arrow-up-right - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.

  • SPARTAarrow-up-right - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.

  • SigPloitarrow-up-right - Signaling security testing framework dedicated to telecom security for researching vulnerabilites in the signaling protocols used in mobile (cellular phone) operators.

  • Smart Install Exploitation Tool (SIET)arrow-up-right - Scripts for identifying Cisco Smart Install-enabled switches on a network and then manipulating them.

  • THC Hydraarrow-up-right - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.

  • Tsunamiarrow-up-right - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

  • Zarparrow-up-right - Network attack tool centered around the exploitation of local networks.

  • dnstwistarrow-up-right - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.

  • dsniffarrow-up-right - Collection of tools for network auditing and pentesting.

  • impacketarrow-up-right - Collection of Python classes for working with network protocols.

  • pivotsuitearrow-up-right - Portable, platform independent and powerful network pivoting toolkit.

  • routersploitarrow-up-right - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.

  • rshijackarrow-up-right - TCP connection hijacker, Rust rewrite of shijack.

DDoS Tools

Network Reconnaissance Tools

  • ACLightarrow-up-right - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.

  • AQUATONEarrow-up-right - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.

  • CloudFailarrow-up-right - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.

  • DNSDumpsterarrow-up-right - Online DNS recon and search service.

  • Mass Scanarrow-up-right - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

  • OWASP Amassarrow-up-right - Subdomain enumeration via scraping, web archives, brute forcing, permutations, reverse DNS sweeping, TLS certificates, passive DNS data sources, etc.

  • ScanCannonarrow-up-right - POSIX-compliant BASH script to quickly enumerate large networks by calling masscan to quickly identify open ports and then nmap to gain details on the systems/services on those ports.

  • XRayarrow-up-right - Network (sub)domain discovery and reconnaissance automation tool.

  • dnsenumarrow-up-right - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.

  • dnsmaparrow-up-right - Passive DNS network mapper.

  • dnsreconarrow-up-right - DNS enumeration script.

  • dnstracerarrow-up-right - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.

  • fiercearrow-up-right - Python3 port of the original fierce.pl DNS reconnaissance tool for locating non-contiguous IP space.

  • netdiscoverarrow-up-right - Network address discovery scanner, based on ARP sweeps, developed mainly for those wireless networks without a DHCP server.

  • nmaparrow-up-right - Free security scanner for network exploration & security audits.

  • passivedns-clientarrow-up-right - Library and query tool for querying several passive DNS providers.

  • passivednsarrow-up-right - Network sniffer that logs all DNS server replies for use in a passive DNS setup.

  • RustScanarrow-up-right - Lightweight and quick open-source port scanner designed to automatically pipe open ports into Nmap.

  • scanlessarrow-up-right - Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.

  • smbmaparrow-up-right - Handy SMB enumeration tool.

  • subbrutearrow-up-right - DNS meta-query spider that enumerates DNS records, and subdomains.

  • zmaparrow-up-right - Open source network scanner that enables researchers to easily perform Internet-wide network studies.

Protocol Analyzers and Sniffers

See also awesome-pcaptoolsarrow-up-right.

Network Traffic Replay and Editing Tools

  • TraceWranglerarrow-up-right - Network capture file toolkit that can edit and merge pcap or pcapng files with batch editing features.

  • WireEditarrow-up-right - Full stack WYSIWYG pcap editor (requires a free license to edit packets).

  • bittwistarrow-up-right - Simple yet powerful libpcap-based Ethernet packet generator useful in simulating networking traffic or scenario, testing firewall, IDS, and IPS, and troubleshooting various network problems.

  • hping3arrow-up-right - Network tool able to send custom TCP/IP packets.

  • pigarrow-up-right - GNU/Linux packet crafting tool.

  • scapyarrow-up-right - Python-based interactive packet manipulation program and library.

  • tcpreplayarrow-up-right - Suite of free Open Source utilities for editing and replaying previously captured network traffic.

Proxies and Machine-in-the-Middle (MITM) Tools

See also Intercepting Web proxiesarrow-up-right.

Transport Layer Security Tools

  • SSLyzearrow-up-right - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.

  • crackpkcs12arrow-up-right - Multithreaded program to crack PKCS#12 files (.p12 and .pfx extensions), such as TLS/SSL certificates.

  • testssl.sharrow-up-right - Command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

  • tls_proberarrow-up-right - Fingerprint a server's SSL/TLS implementation.

Wireless Network Tools

Network Vulnerability Scanners

  • celerystalkarrow-up-right - Asynchronous enumeration and vulnerability scanner that "runs all the tools on all the hosts" in a configurable manner.

  • kube-hunterarrow-up-right - Open-source tool that runs a set of tests ("hunters") for security issues in Kubernetes clusters from either outside ("attacker's view") or inside a cluster.

  • Nessusarrow-up-right - Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.

  • Netsparker Application Security Scannerarrow-up-right - Application security scanner to automatically find security flaws.

  • Nexposearrow-up-right - Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.

  • OpenVASarrow-up-right - Free software implementation of the popular Nessus vulnerability assessment system.

  • Vulsarrow-up-right - Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.

Web Vulnerability Scanners #webhacking

Penetration Testing Report Templates

Open Sources Intelligence (OSINT) #Osint

See also awesome-osintarrow-up-right.

Data Broker and Search Engine Services

  • Hunter.ioarrow-up-right - Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.

  • Threat Crowdarrow-up-right - Search engine for threats.

  • Virus Totalarrow-up-right - Free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.

  • surfrawarrow-up-right - Fast UNIX command line interface to a variety of popular WWW search engines.

Dorking tools

Email search and analysis tools

Metadata harvesting and analysis

Network device discovery tools

OSINT Online Resources

Source code repository searching tools

See also Web-accessible source code ripping toolsarrow-up-right.

  • vcsmaparrow-up-right - Plugin-based tool to scan public version control systems for sensitive information.

  • Yararrow-up-right - Clone git repositories to search through the whole commit history in order of commit time for secrets, tokens, or passwords.

Web application and resource analysis tools #webhacking

Physical Access Tools

  • AT Commandsarrow-up-right - Use AT commands over an Android device's USB port to rewrite device firmware, bypass security mechanisms, exfiltrate sensitive information, perform screen unlocks, and inject touch events.

  • Bash Bunnyarrow-up-right - Local exploit delivery tool in the form of a USB thumbdrive in which you write payloads in a DSL called BunnyScript.

  • LAN Turtlearrow-up-right - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.

  • PCILeecharrow-up-right - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.

  • Packet Squirrelarrow-up-right - Ethernet multi-tool designed to enable covert remote access, painless packet captures, and secure VPN connections with the flip of a switch.

  • Poisontaparrow-up-right - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.

  • Proxmark3arrow-up-right - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.

  • Thunderclaparrow-up-right - Open source I/O security research platform for auditing physical DMA-enabled hardware peripheral ports.

  • USB Rubber Duckyarrow-up-right - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.

Privilege Escalation Tools

Password Spraying Tools

  • DomainPasswordSprayarrow-up-right - Tool written in PowerShell to perform a password spray attack against users of a domain.

  • SprayingToolkitarrow-up-right - Scripts to make password spraying attacks against Lync/S4B, Outlook Web Access (OWA) and Office 365 (O365) a lot quicker, less painful and more efficient.

Reverse Engineering

See also awesome-reversingarrow-up-right, Exploit Development Toolsarrow-up-right.

Reverse Engineering Books

Reverse Engineering Tools

Shellcoding Guides and Tutorials

Side-channel Tools

  • ChipWhispererarrow-up-right - Complete open-source toolchain for side-channel power analysis and glitching attacks.

  • SGX-Steparrow-up-right - Open-source framework to facilitate side-channel attack research on Intel x86 processors in general and Intel SGX (Software Guard Extensions) platforms in particular.

  • TRRespassarrow-up-right - Many-sided rowhammer tool suite able to reverse engineer the contents of DDR3 and DDR4 memory chips protected by Target Row Refresh mitigations.

Social Engineering

See also awesome-social-engineeringarrow-up-right.

Social Engineering Books

Social Engineering Online Resources

Social Engineering Tools

Static Analyzers

Steganography Tools

Vulnerability Databases

Web Exploitation #Recon

Intercepting Web proxies

See also Proxies and Machine-in-the-Middle (MITM) Toolsarrow-up-right.

Web file inclusion tools

Web injection tools #SQL

Web path discovery and bruteforcing tools

Web shells and C2 frameworks

Web-accessible source code ripping tools

Web Exploitation Books

Windows Utilities

Last updated