
Footprinting π¦Άπ» and Reconnaissance π΅π»ββοΈ
| Repository |
Description |
| Autopsy |
Fast though an affordable incident response software. |
| Bulkextractor |
Forensic investigation tool for many tasks such as malware and intrusion. |
| Media Acquistion |
Visits that came from someone going to your site from organic search results. |
| Toolsley |
No-hassle tools that are for verifying, hashing, generating and identifying multiple formats of data files. |
Scanning Networks π
| Repository |
Description |
| Nmap |
A free and open source (license) utility for network discovery and security auditing. |
| Wireshark |
The worldβs foremost and widely-used network protocol analyzer. |
| TCPDUMP |
A powerful command-line packet analyzer. |
Enumeration π
| Repository |
Description |
| Network Map |
Designed to rapidly scan large networks, but works fine against single hosts. |
| Dracnmap |
Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap. |
| Port scanning |
Enables port scanning your entire network to determine which ports on your network are open and what services are running on them. |
| Xerosploit |
A pentesting toolkit whose goal is to perform man in the middle attacks for testing purposes. |
| RED HAWK |
|
| ReconSpider |
Framework for scanning IP Address, Emails, Websites, Organizations. |
| Infoga - Email OSINT |
A tool gathering email accounts informations from different public sources. |
| ReconDog |
Main Features = Wizard + CLA interface, extracts targets from STDIN (piped input) and act upon them. |
| Striker |
Recon & Vulnerability Scanning Suite. |
| SecretFinder |
Written to discover sensitive data like apikeys, accesstoken, authorizations, jwt in JavaScript files. |
| Port Scanner |
Converts an unordered list of ports on separate lines in a numerical order. |
| Breacher |
A script to find admin login pages and EAR vulnerabilites. |
| Git-Secret |
Go scripts for finding sensitive data like API key / some keywords in the github repository |
System Hacking π§πΌβπ»
| Repository |
Description |
| Social Engineering ToolKit |
An open-source penetration testing framework designed for social engineering. |
| SocialFish |
A program designed to know social media stats and information related to an account. |
| HiddenEye |
Multi-featured tool for human mistakes exploitation. |
| Evilginx2 |
A man-in-the-middle attack framework used for phishing login credentials along with session cookies. |
| I-See_You |
Tool to find the exact location of the users during social engineering or phishing engagements. |
| SayCheese |
Take webcam shots from target just sending a malicious link. |
| QR Code Jacking |
Port Forwarding using Ngrok or Serveo. |
| BlackPhish |
Super lightweight with many features and blazing fast speeds. |
Payload Creation π¦
| Repository |
Description |
| The FatRat |
Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus. |
| Brutal |
Quickly create various powershell attack, virus attack and launch listener for a Human Interface Device. |
| MSFvenom Payload Creator |
A wrapper to generate multiple types of payloads, based on users choice. |
| Venom Shellcode Generator |
Built to take advantage of apache2 webserver to deliver payloads (LAN). |
| Mob-Droid |
Generate metasploit payloads in easy way without typing long commands and save your time. |
| Enigma |
Multiplatform payload dropper. |
Sniffing πΆ
| Repository |
Description |
| OpenVAS |
A full-featured vulnerability scanner. |
| Nikto |
An Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items. |
| Wapiti |
Audit the security of your websites or web applications. |
| Metasploit |
Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments. |
| Maltego |
Graphical link analysis tool for gathering and connecting information for investigative tasks. |
| Canvas |
Makes available hundreds of exploits, an automated exploitation system. |
| Sn1per |
An automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. |
| Lazyrecon |
Is intended to automate some tedious tasks of reconnaissance and information gathering. |
| Osmedeus |
Run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. |
| Reconness |
Exploit the targets using one specific kind of vulnerability. |
| IronWASP |
Used for web application vulnerability testing. |
Social Engineering π±
Denial Of Service π
| Repository |
Description |
| Asyncrone |
Multifunction SYN Flood DDoS Weapon. |
| UFOnet |
Cryptographic -disruptive toolkit- that allows to perform DoS and DDoS attacks. |
| GoldenEye |
An HTTP DoS Test Tool. |
Session Hijacking π½
| Repository |
Description |
| Debinject |
Inject malicious code into .debs |
| Pixload |
Set of tools for hiding backdoors creating/injecting payload into images. |
Evading IDS, Firewalls and Honeypots π
| Repository |
Description |
| Bluetooth Honeypot |
The system allows monitoring of attacks via a graphical user interface. |
| Kippo |
SSH honeypot designed to log brute force attacks. |
| MushMush |
The foundation is dedicated to the advancement and development of open source software. |
| Formidable Honeypot |
Easy, non-instrusive SPAM protection. |
| Elastic Honey |
A Simple Elasticsearch Honeypot. |
| Honey Thing |
A honeypot for Internet of TR-069 routers/devices. |
Hacking Web Applications π§πΌβπ»
SQL Injection π
| Repository |
Description |
| Sqlmap tool |
Automates the process of detecting and exploiting SQL injection flaws. |
| NoSqlMap |
Audit for as well as automate injection attacks and exploit default configuration weaknesses in databases. |
| Damn Small SQLi Scanner |
SQL injection vulnerability scanner written in under 100 lines of code. |
| Explo |
A simple tool to describe web security issues in a human and machine readable format. |
| Blisqy |
Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability. |
| Leviathan |
A mass audit toolkit which has wide range service discovery, brute force, etc. |
| SQLScan |
Quick web scanner for find an sql inject point on a website. |
Hacking Wireless Networks πΈ
| Repository |
Description |
| WiFi-Pumpkin |
A powerful framework which allows and offers security researchers, to mount a wireless network to conduct MITM. |
| pixiewps |
Used to bruteforce offline the WPS PIN exploiting the low or non-existing entropy of some software implementations |
| Bluetooth Honeypot GUI Framework. |
Allows monitoring of attacks via a GUI that provides graphs, lists, a dashboard and further detailed analysis from log files. |
| Fluxion |
It's a remake by Mr. SAGE with less bugs and more functionality. |
| Wifiphisher |
A Framework for conducting red team engagements or Wi-Fi security testing. |
| Wifite |
Designed to use all known methods for retrieving the password of a wireless access point (router). |
| EvilTwin |
A script to perform Evil Twin Attack, by getting credentials using a Fake page and Fake Access Point. |
| Fastssh |
Performs multi-threaded scan and brute force attack against SSH protocol using the most commonly credentials. |
| Aircrack-ng |
Aircrack- ng is a complete suite of tools to assess WiFi network security. |
| Kismet |
Kismet is a wireless network and device detector, sniffer, wardriving tool, and WIDS framework. |
Hacking Mobile Platforms π±
IoT Hacking π€
| Repository |
Description |
| Vehicle Security |
A curated list about vehicle security, car hacking, and tinkering with the functionality of your car. |
Cryptography π
| Repository |
Description |
| Awesome Cryptography |
A curated list of cryptography resources and links. |
| dCode |
Toolkit website for decryption, ciphertexts, solve riddles, treasure hunts, etc. |
Capture The Flag (Beginner) π©
| Repository |
Description |
| CTFTime |
List of CTF events to participate. |
| Writeups |
Best way to learn through writeups. |
| CTF101 |
Introduction to CTFs and Useful tools. |
| Guide |
Beginner's Guide to CTF Field. |
| PicoCTF |
Beginner friendly CTF to compete. |
| CryptoHack |
Best free platform for learning modern cryptography. |
| HackThisSite |
Practice and expand your hacking skills. |
| Cyber Talents |
Hands-on practical scenariosin different cyber security fields. |
| OverTheWire |
Practice security concepts in the form of fun-filled games. |
OSINT (Open Source INTelligence)
| Repository |
Description |
| Awesome OSINT |
A curated list of amazingly awesome open source intelligence tools and resources. |
Encryption π
ExploitDB