Pentest and RedTeaming | Cheatsheets | Devices and Services | Geolocation Tracking | Intelligence surveillance | Code Search | Domains | Dorking | OSINT | Attack Surface | Programming | Web History | DNS | Certificates | WiFi | Credential Leaks | Data Leaks | Reverse Engineering | Malware Analysis | Cryptography | Android | CTF Challenges | Threat Intelligence | Browser Extentions | Forensics | Bugbounty | Resources | Misc |
Discovery | Vulnerability Identification | Vulnerability Scanner | Social Engineering | Payload and Staging | Exploitation | Privilege Escalation | Evasion | Credential Dumping | Persistence | Lateral Movement | Tunnelling | Command and Control | Data Exfiltration | Securing Data | Covering Tracks | Reports
engagement, standard process, mitre att&ck, certifications and etc.
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Pentest Standard | Website | (Engagement): A comprehensive framework designed to standardize the process of conducting penetration tests | |
| Red-Team-Infra | Github | (Infrastructure): Disposable and resilient red team infrastructure with Terraform | |
| Red-Team-Infras-Wiki | Github | (Infrastructure): Wiki to collect Red Team infrastructure hardening resources | |
| RedInfraCraft | Github | (Infrastructure):automates the deployment of powerful red team infrastructures! makes it easy to create advanced phishing & payload infras |
notes, methodology , resources, techniques and etc.
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| HackTricks | Website | (General): HackTricks is a comprehensive resource that provides a wide range of information and tips related to pentesting, redteaming and etc. | |
| Payloads All The Things | Github | (General): A list of useful payloads and bypasses for Web Application Security and also a cheatsheets | |
| Atomic RedTeam | Website | (TTPs): Atomic Red Team can be used as a reference for cheatsheets. It provides detailed examples of specific commands, scripts, and guides that can be used to simulate various adversary techniques (TTPs). | |
| OWASP Cheatsheet | Website | (Web-APP): The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. | |
| Internall-all-the-things | Github.io | (General): Active Directory and Internal Pentest Cheatsheets | |
| Arsenal | Github | (Cheatsheets): In arsenal you can search for a command, select one and it's prefilled directly in your terminal. This functionality is independent of the shell used. | |
| cheat.sh | Website | (Cheatsheets): Unified access to the best community driven cheat sheets repositories of the world. Covers 56 programming languages, several DBMSes, and more than 1000 most important UNIX/Linux commands. | |
| THC cheatshets | Github | (Cheatsheets): THC's favourite Tips, Tricks & Hacks (Cheat Sheet) | |
| cheat | Github | (Cheasheets): cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not frequently enough to remember. | |
| RedTeam-Tools | Github | (Resources): A github repository contains a collection of 130+ tools and resources that can be useful for red teaming activities. | |
| BlueTeam-Tools | Github | (Resources): A github repository contains a collection of 65+ tools and resources that can be useful for blue teaming activities. | |
| Activate Directory Cheatsheets | Github | (Cheatsheets): A cheat sheet that contains common enumeration and attack methods for Windows Active Directory. | |
| CloudPentest | Github | (Cheatsheets): 🛡️ Awesome Cloud Security Resources and cheatsheets ⚔️ | |
| RedTeam Guide | Github | (Cheatsheets): Red Team Cheatsheet in constant expansion. | |
| Exploits Notes | Website | (Resources): Search hacking techniques and tools for penetration testings, bug bounty, CTFs. | |
| RedTeam Cheatsheets | Github | (Cheatsheets): Useful C2 techniques and cheatsheets learned from engagements (Cobalt strike and sliver c2) | |
| Appsecexplained | Gitbook | (Cheatsheets): This is a curated repository of notes and experience over many years of testing web applications. | |
| Awesome-Pentest Cheatsheets | Github | Collection of cheat sheets and check lists useful for security and pentesting. The list contains a huge list of very sorted and selected resources, which can help you to save a lot of time. | |
| Awesome-Hacking | Github | (Genreal): A collection of various awesome lists for hackers, pentesters and security researchers | |
| Awesome-Pentest | Github | (General): Awesome Pentest Cheat Sheets a collection of the cheat sheets useful for pentesting | |
| RedTeam Notes 2.0 | Gitbook | (General): It is very beginner friendly and have everything from MITRE with more great images and high level explanations | |
| RedTeam | Website | (General): These are notes about all things focusing on, but not limited to, red teaming and offensive security. | |
| Red Teaming and Malware Analysis | Gitbook | (Resources): Personal notes on red teaming / pentest and malware analysis, various techniques used during assessments. | |
| Offensive Security Cheatsheet | Website | (General): Their are few useful resources for penetration testing and enumerations staff. |
reconnaissance, enumeration, fuzzing, AD DC etc.
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| huntools | GitHub | (General): streamlined solution for managing your entire arsenal | |
| pdtm | GitHub | (General-Recon): ProjectDiscovery's Open Source Tool Manager | |
| ffuf | GitHub | (General-Recon): Fast web fuzzer written in Go. | |
| gobuster | GitHub | (General-Recon): DNS and VHost busting tool written in Go. | |
| Axiom | GitHub | (General-Tool): The dynamic infrastructure framework for hacking! different scanning tools with ease, including nmap, ffuf, masscan, nuclei, meg and many more! | |
| reconftw | GitHub | (General-Recon): Perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities | |
| wappalyzer | GitHub | (Technologies): Identify technology on websites. | |
| Sublist3r | GitHub | (Subdomain): Fast subdomains enumeration tool for penetration testers | |
| katana | GitHub | (Crawling): A next-generation crawling and spidering framework. | |
| BloodHound | GitHub | (AD): BloodHound is a powerful tool used for Active Directory (AD) security assessments. It helps identify and analyze security vulnerabilities and relationships within an Active Directory environment. | |
| CrackMapExec | GitHub | (Network): A swiss army knife for pentesting networks | |
| Recon-AD | GitHub | (AD): recon-ad tool based on ADSI and reflective DLL’s | |
| PSPKIAudit | GitHub | (AD CS): PowerShell toolkit for auditing Active Directory Certificate Services. | |
| powerview 3.0 | GitHub | (AD): Active Directory enumeration tools | |
| ImproHound | GitHub | (AD): sIdentify the attack paths in BloodHound breaking your AD tiering | |
| ADRecon | GitHub | (AD): ADRecon is a tool which gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment. | |
| Amass | GitHub | (Subdomain): In-depth Attack Surface Mapping and Asset Discovery | |
| wfuzz | GitHub | (Fuzzing): Web application fuzzer. | |
| scilla | GitHub | (Subdomain): Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration | |
| httpx | GitHub | (Technologies): Fast and multi-purpose HTTP toolkit for probing. | |
| dirbuster-ng | GitHub | (Directory): dirbuster-ng is C CLI implementation of the Java dirbuster tool. | |
| massdns | GitHub | (DNS): High-performance DNS stub resolver for bulk lookups | |
| Findomain | GitHub | (Subdomain): The fastest and cross-platform subdomain enumerator | |
| RustScan | GitHub | (Ports): The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported). | |
| gitleaks | GitHub | (Web): Gitleaks is a SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos. | |
| s3scanner | GitHub | (Web): Scan for open S3 buckets and dump the contents | |
| Whatwaf | GitHub | (WAF Detector): Detect and bypass web application firewalls and protection systems | |
| cloud_enum | GitHub | (Cloud): Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. | |
| recon-ng | GitHub | (Web): Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources. | |
| witnessme | GitHub | (Web): Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier | |
| spoofcheck | GitHub | (Web): A program that checks if a domain can be spoofed from. The program checks SPF and DMARC records for weak configurations that allow spoofing. | |
| Sudomy | GitHub | (General): Automated reconnaissance tool for bug hunting / pentesting | |
| chaos-client | GitHub | (Subdomain): Go client to communicate with Chaos DNS API | |
| domained | GitHub | (Subdomain): Multi Tool Subdomain Enumeration | |
| shuffledns | GitHub | (Subdomain): Wrapper around massdns for subdomain enumeration with active bruteforce | |
| puredns | GitHub | (Subdomain): Fast domain resolver and subdomain bruteforcing | |
| censys-subdomain-finder | GitHub | (Subdomain): enumeration using Censys certificate transparency logs | |
| Turbolist3r | GitHub | (Subdomain): enumeration tool with analysis features | |
| domain | GitHub | (Subdomain): Setup script for Recon-ng for subdomain enumeration | |
| altdns | GitHub | (Subdomain): Generates permutations, alterations, and mutations of subdomains | |
| brutesubs | GitHub | (Subdomain): Automation framework for running multiple subdomain bruteforcing tools | |
| dns-parallel-prober | GitHub | (Subdomain): Parallelised domain name prober for subdomain enumeration | |
| dnscan | GitHub | (Subdomain): Python wordlist-based DNS subdomain scanner | |
| knock | GitHub | (Subdomain): Enumerate subdomains on a target domain through a wordlist | |
| hakrevdns | GitHub | (DNS): Tool for performing reverse DNS lookups en masse | |
| dnsx | GitHub | (Subdomain): Fast and multi-purpose DNS toolkit for running DNS queries | |
| subfinder | GitHub | (Subdomain): discovery tool that finds valid subdomains for websites | |
| assetfinder | GitHub | (Subdomain): Find domains and subdomains related to a given domain | |
| VHostScan | GitHub | (Vhost): Virtual host scanner that performs reverse lookups | |
| sub3suite | GitHub | (Subdomain): Research-grade suite of tools for subdomain enumeration | |
| cero | GitHub | (Subdomain): Scrape domain names from SSL certificates of arbitrary hosts | |
| shosubgo | GitHub | (Subdomain): Tool to grab subdomains using Shodan API | |
| haktrails | GitHub | (Subdomain): Golang client for querying SecurityTrails API data | |
| bbot | GitHub | (Subdomain): Recursive internet scanner for hackers | |
| webanalyze | GitHub | (Technologies): Port of Wappalyzer to automate mass scanning. | |
| whatweb | GitHub | (Technologies): Next generation web scanner. | |
| retire.js | GitHub | (Technologies): Scanner detecting JavaScript libraries with known vulnerabilities. | |
| fingerprintx | GitHub | (Technologies): Standalone utility for service discovery on open ports. | |
| recursebuster | GitHub | (Content-Discovery): Rapid content discovery tool for recursively querying webservers. | |
| feroxbuster | GitHub | (Content-Discovery): A fast, simple, recursive content discovery tool written in Rust. | |
| dirsearch | GitHub | (Content-Discovery): Web path scanner. | |
| dirsearch | GitHub | (Content-Discovery): A Go implementation of dirsearch. | |
| filebuster | GitHub | (Content-Discovery): An extremely fast and flexible web fuzzer. | |
| dirstalk | GitHub | (Content-Discovery): Modern alternative to dirbuster/dirb. | |
| gospider | GitHub | (Content-Discovery): Gospider - Fast web spider written in Go. | |
| hakrawler | GitHub | (Content-Discovery): Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application. | |
| crawley | GitHub | (Content-Discovery): Fast, feature-rich unix-way web scraper/crawler written in Golang. | |
| LinkFinder | GitHub | (Links): A python script that finds endpoints in JavaScript files. | |
| JS-Scan | GitHub | (Links): A .js scanner built in PHP, designed to scrape URLs and other information. | |
| GoLinkFinder | GitHub | (Links): A fast and minimal JS endpoint extractor. | |
| BurpJSLinkFinder | GitHub | (Links): Burp Extension for passive scanning of JS files for endpoint links. | |
| urlgrab | GitHub | (Links): A Go utility to spider through a website searching for additional links. | |
| waybackurls | GitHub | (Links): Fetches all URLs that the Wayback Machine knows about for a domain. | |
| gau | GitHub | (Links): Fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | |
| getJS | GitHub | (Links): A tool to quickly get all JavaScript sources/files. | |
| linx | GitHub | (Links): Reveals invisible links within JavaScript files. | |
| waymore | GitHub | (Links): Finds more from the Wayback Machine. | |
| xnLinkFinder | GitHub | (Links): A Python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target. | |
| parameth | GitHub | (Parameters): Tool for brute discovering GET and POST parameters. | |
| param-miner | GitHub | (Parameters): Identifies hidden, unlinked parameters, useful for finding web cache poisoning vulnerabilities. | |
| ParamPamPam | GitHub | (Parameters): Tool for brute discovering GET and POST parameters. | |
| Arjun | GitHub | (Parameters): HTTP parameter discovery suite. | |
| ParamSpider | GitHub | (Parameters): Mines parameters from dark corners of Web Archives. | |
| x8 | GitHub | (Parameters): Hidden parameters discovery suite written in Rust. | |
| fuzzdb | GitHub | (Fuzzing): Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery. | |
| IntruderPayloads | GitHub | (Fuzzing): Collection of Burpsuite Intruder payloads, fuzz lists, and web pentesting methodologies. | |
| fuzz.txt | GitHub | (Fuzzing): Potentially dangerous files. | |
| fuzzilli | GitHub | (Fuzzing): JavaScript Engine Fuzzer. | |
| qsfuzz | GitHub | (Fuzzing): Allows building custom rules to fuzz query strings and identify vulnerabilities. | |
| vaf | GitHub | (Fuzzing): Very advanced (web) fuzzer written in Nim. | |
| CMSeeK | GitHub | (CMS Detection): Scan WordPress, Joomla, Drupal and over 180 other CMSs | |
| cms-wordlists | GitHub | (CMS Wordlists): contains wordlists for each versions of common web applications (CMS). Each version contains a wordlist of all the files directories for this version. | |
| GitFive | GitHub | (Git/OSINT): GitFive is an OSINT tool to investigate GitHub profiles. | |
| gixposed | GitHub | (Git/OSINT): Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API keys and access tokens. | |
| Gitdumper | GitHub | (Git): A tool to dump a git repository from a website | |
| Eviltree | GitHub | (Regex): Searching for secrets (passwords/accounts) in files of nested directory structures, being able to visualize which files contain user provided keywords/regex patterns and where those files are located. | |
| Beeceptor | Website | (webhook): Instantly create a webhook and mock a server over HTTPS | |
| webhooks | Github | (webhook): Lightweight HTTP Server with Public Exposure for Pentesting, Red Teaming and Bughunting | |
| assetnote wordlists | Website | (wordlists): This website provides you with wordlists that are up to date and effective against the most popular technologies on the internet. |
servers, IoT, routers and etc.
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Shodan | Website | Search Engine for the Internet of Everything. | |
| Censys Search | Website | Search Engine for every server on the Internet to reduce exposure and improve security. | |
| FOFA | Website | Cyberspace Mapping | |
| Hunter.how | Website | Internet search engine for security researchers. | |
| Onyphe | Website | Cyber Defense search engine for open-source and cyber threat intelligence data. | |
| ZoomEye | Website | Global Cyberspace mapping. | |
| GreyNoise | Website | The source for understanding internet noise. | |
| Netlas | Website | Discove, Research and monitor any assets available online. | |
| Quake | Website | Global Cyberspace Surveying and mapping system. | |
| Qualys SSL Labs | Website | This free online service performs a deep analysis of the configuration of any SSL web server on the public Internet. |
tracking computers, laptop, Androids, iOS, Bluetooth, Realtime tracking, IoT devices, Social Engineering monitoring.
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| HoneyBadgerV3 | Website Github | (WIFI/Phishing/meterpreter): HoneyBadger is an Active Defense tool to determine who the malicious actor is and where they are located in realtime locatio (Desktop, Mobile). | |
| Seeker | Github | (Phishing): Seeker a is host phishing pages to get credentials by hosting a fake page that requests your location like many popular location based websites. | |
| Grabify IP Logger | Website | (SocialEngineering): Grabify IP logger will help you find and track the IP address of any person. | |
| QCSuper | Github | (hardware/triangulation): QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things. | |
| SigPloit | Github | (Mobile/ISMI/SS7): SigPloit: Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP | |
| Silent SMS Ping | Github | (Mobile/Detector/Ping): Silent SMS ping and detector an android application for detecting (and sending) Class-0 silent SMS messages (binary messages) that does not require rooted device. |
HUMINT, SIGINT, COMINT, Telcos, IMSI catcher, Drones Interception, Cellular Interception, WIFI Interception, SMS senders, Jammer, Polygraph, VoIP, LRF, Bluetooth and etc.
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Intercept Monitoring System | Website | (Hardware/Software/Resources/Shops): Note: not-verified. Advanced Interception Systems. Intelligence and surveillance etc. | |
| Discovery Telecom | Original Website | (Note: not-verified Shops): Advanced Interception Systems. Intelligence and surveillance etc. | |
| DragonOS SDR | Website | (SDR/OS/Linux): specifically designed for (SDR) enthusiasts, pre-installed with a wide range of open-source SDR tools and software like GNU Radio, GQRX, easily capture, analyz. |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| NIST NVD | Website | US National Vulnerability Database | |
| MITRE CVE | Website | Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities | |
| CVE Search | Github | The main objective of the "cve search" is to avoid doing direct and public lookups into the public CVE databases. | |
| GitHub Advisory Database | Github | Security vulnerability database inclusive of CVEs and GitHub originated security advisories | |
| AttackerKB | Website | AttackerKB is a technical analysis tool on which you can search vulnerabilities that are rated by the community. | |
| Cloudvulndb.org | Website | The Open Cloud Vulnerability & Security Issue Database | |
| Osv.dev | Website | Open Source Vulnerabilities | |
| Vulners.com | Website | Your Search Engine for Security Intelligence | |
| Opencve.io | Website | Easiest way to track CVE updates and be alerted about new vulnerabilities | |
| Security.snyk.io | Website | Open Source Vulnerability Database | |
| Mend Vulnerability Database | Website | The largest open source vulnerability DB | |
| Rapid7 - DB | Website | Vulnerability & Database | |
| CVE Details | Website | The ultimate security vulnerability datasource | |
| VulnIQ | Website | Vulnerability intelligence and management solution | |
| SynapsInt | Website | The unified OSINT research tool | |
| Aqua Vulnerability Database | Website | Vulnerabilities and weaknesses in open source applications and cloud native infrastructure | |
| VulDB | Website | Number one vulnerability database | |
| ScanFactory | Website | Realtime Security Monitoring | |
| Trend Micro Zero Day Initiative | Website | Publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers | |
| Google Project Zero | Website | Vulnerabilities including Zero Days | |
| Trickest CVE Repository | GitHub | Gather and update all available and newest CVEs with their PoC | |
| Cnvd.org.cn | Website | Chinese National Vulnerability Database | |
| InTheWild.io | Website | Check CVEs in our free, open source feed of exploited vulnerabilities | |
| Vulnerability Lab | Website | Vulnerability research, bug bounties, and vulnerability assessments | |
| Red Hat Security Advisories | Website | Information about security flaws that affect Red Hat products and services in the form of security advisories | |
| Cisco Security Advisories | Website | Security advisories and vulnerability information for Cisco products, including network equipment and software | |
| Microsoft Security Response Center | Website | Reports of security vulnerabilities affecting Microsoft products and services | |
| CISA | Website | Known Exploited Vulnerabilities Catalog | |
| CVEFeed | Website | CVE vulnerability & Threat Intelligence Hub |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Nuclei | GitHub | (Network-Web): Fast and customizable vulnerability scanner based on simple YAML based DSL. | |
| OWASP ZAP | GitHub | (Web): Dynamic application security testing tool for finding vulnerabilities in web applications. | |
| Nmap | GitHub | (Network-Web): Powerful network scanner with built-in vulnerability scanning capabilities. | |
| Vulnscan | GitHub | (Network-Web): Vulnerability scanning and management tool. | |
| vulners | GitHub | (Network-Web): NSE script based on Vulners.com API | |
| Nikto | GitHub | (Web): Web server scanner for detecting vulnerabilities and misconfigurations. | |
| Metasploit | Github | (Network-Web): Computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. | |
| Arachni | GitHub | (Web): Modular web application security scanner. | |
| OpenVAS | GitHub | (Network-Web): Comprehensive vulnerability scanner for network services and applications. | |
| Nexpose | Website | (Network-Web): Nexpose is a comprehensive vulnerability management solution developed by Rapid7. It is designed to help organizations proactively identify, assess, and address security vulnerabilities across their IT environments | |
| Wapiti | GitHub | (Web): vulnerability scanner for black-box scanning. | |
| Vuls | GitHub | (Network-Web): Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices. | |
| Retire.js | GitHub | (Web): Scans for outdated JavaScript libraries with known vulnerabilities. | |
| Clair | GitHub | (Network): Static analysis of vulnerabilities in container images. | |
| Trivy | GitHub | (Network-Web): Vulnerability scanner for container images and other artifacts. | |
| Bandit | GitHub | (Programming): Finds common security issues in Python code. | |
| Grouper | GitHub | (Network): A PowerShell script for helping to find vulnerable settings in AD Group Policy. (deprecated, use Grouper2 instead!) | |
| SecLists | GitHub | (wordlists): Collection of multiple lists used in security assessments. | |
| SonarQube (Community Edition) | GitHub | (Web): Code quality and security analysis tool. | |
| Docker-Bench-Security | GitHub | (Network): Checks Docker containers against best security practices. | |
| Snyk CLI | GitHub | (Network): Finds and fixes vulnerabilities in dependencies and Docker images. | |
| OWASP Dependency-Check | GitHub | (Web): Identifies project dependencies with known vulnerabilities. | |
| Forta | GitHub | (Web): Real-time vulnerability detection for Ethereum smart contracts. | |
| sqlmap | GitHub | (Web): Automatic SQL injection and database takeover tool. | |
| xray | GitHub | (Web): A complete security assessment tool that supports scanning of common web security issues and custom POC | Be sure to read the documentation before using it. | |
| osv-scanner | GitHub | (Web): Vulnerability scanner written in Go which uses the data provided by. | |
| commix | GitHub | (Web): Automated All-in-One OS Command Injection Exploitation Tool. | |
| afrog | GitHub | (Network-Web): afrog is a high-performance vulnerability scanner that is fast and stable. It supports user-defined PoC and comes with several built-in types, such as CVE, CNVD, default passwords, information disclosure, fingerprint identification, unauthorized access, arbitrary file reading, and command execution. | |
| Nettacker | GitHub | (Network): Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management. | |
| Raccoon | GitHub | (Web): A high-performance offensive security tool for reconnaissance and vulnerability scanning. | |
| fuxploider | GitHub | (Web): File upload vulnerability scanner and exploitation tool. | |
| crawlergo | GitHub | (Web): A powerful browser crawler for web vulnerability scanners. | |
| Golismero | GitHub | (Web): Open-source security tool for web application assessment. | |
| Sn1per | GitHub | (Network-Web): Penetration testing tool for vulnerability scanning and enumeration. | |
| WhiteWidow | GitHub | (Web): SQL Vulnerability Scanner | |
| w3af | GitHub | (Web): Application Attack and Audit Framework. |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Exploit-DB | Website | Exploit Database | |
| Sploitus | Website | (PoC): Convenient central place for identifying the newest exploits | |
| Rapid7 - DB | Website | (Databse): Vulnerability & Exploit Database | |
| Vulmon | Website | (Database): Vulnerability and exploit search engine | |
| packetstormsecurity.com | Website | Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers | |
| 0day.today | Website | Ultimate database of exploits and vulnerabilities | |
| LOLBAS | Github | (Windows): Living Off The Land Binaries, Scripts and Libraries | |
| GTFOBins | Github | (Linux-Unix): Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems | |
| XSS Payloads | Website | (WEB-XSS): The wonderland of JavaScript unexpected usages, and more | |
| NetExec | Github Website | (Network): NetExec (a.k.a nxc) is a network service exploitation tool that helps automate assessing the security of large networks. | |
| Reverse Shell generator | Website | (Reverse-Shell): Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode | |
| GTFOArgs | Github | (Linux-Unix): Curated list of Unix binaries that can be manipulated for argument injection | |
| Shell-storm.org/shellcode | Website | (Database): Shellcodes database for study cases | |
| Hacking the Cloud | Website | (TTPs): Encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure | |
| LOLDrivers | Website | (Windows): Open-source project that brings together vulnerable, malicious, and known malicious Windows drivers | |
| PwnWiki | Website | (TTPs): Collection of TTPs (tools, tactics, and procedures) for what to do after access has been gained | |
| CVExploits Search | Website | (Database): Your comprehensive database for CVE exploits from across the internet | |
| nanorobeus | Github | (Windows): A minimalistic tool for managing Kerberos tickets. Supports redteam frameworks | |
| SploitScan | Github | (PoC): SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated proof-of-concept (PoC) exploits. | |
| Sicat | Github | (PoC): SiCat is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively. | |
| DNS Tunnel Keylogger | Github | Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls. | |
| Payloads All The Things | Github | A list of useful payloads and bypasses for Web Application Security | |
| Commix | GitHub | (Command-Injection): Automated All-in-One OS command injection and exploitation tool | |
| Corsy | GitHub | (CORS-Misconfig): CORS Misconfiguration Scanner | |
| CORStest | GitHub | (CORS-Misconfig): A simple CORS misconfiguration scanner | |
| CorsMe | GitHub | (CORS-Misconfig): Cross Origin Resource Sharing MisConfiguration Scanner | |
| CRLFsuite | GitHub | (CRLF-Injection): A fast tool specially designed to scan CRLF injection | |
| crlfuzz | GitHub | (CRLF-Injection): A fast tool to scan CRLF vulnerability written in Go | |
| CRLF-Injection-Scanner | GitHub | (CRLF-Injection): Command line tool for testing CRLF injection on a list of domains | |
| XSRFProbe | GitHub | (CSRF-Injection): The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit | |
| dotdotpwn | GitHub | (Directory-Traversal): DotDotPwn - The Directory Traversal Fuzzer | |
| FDsploit | GitHub | (Directory-Traversal): File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. | |
| off-by-slash | GitHub | (Directory-Traversal): Burp extension to detect alias traversal via NGINX misconfiguration at scale. | |
| liffy | GitHub | (File-Inclusion): Local file inclusion exploitation tool | |
| LFISuite | GitHub | (File-Inclusion): Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner | |
| inql | GitHub | (GraphQL-Injection): InQL - A Burp Extension for GraphQL Security Testing | |
| GraphQLmap | GitHub | (GraphQL-Injection): GraphQLmap is a scripting engine to interact with a GraphQL endpoint for pentesting purposes. | |
| clairvoyance | GitHub | (GraphQL-Injection): Obtain GraphQL API schema despite disabled introspection! | |
| headi | GitHub | (Header-Injection): Customisable and automated HTTP header injection. | |
| ysoserial | GitHub | (Deserialization): A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization. | |
| GadgetProbe | GitHub | (Deserialization): Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths. | |
| ysoserial.net | GitHub | (Deserialization): payload generator for a variety of .NET formatters | |
| phpggc | GitHub | (Deserialization): PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically. | |
| Autorize | GitHub | (IDOR): Automatic authorization enforcement detection extension for Burp Suite written in Jython developed by Barak Tawily | |
| Oralyzer | GitHub | (Open-Redirect): Open Redirection Analyzer | |
| OpenRedireX | GitHub | (Open-Redirect): A Fuzzer for OpenRedirect issues | |
| razzer | GitHub | (Race-Condition): A Kernel fuzzer focusing on race bugs | |
| racepwn | GitHub | (Race-Condition): Race Condition framework | |
| requests-racer | GitHub | (Race-Condition): Small Python library that makes it easy to exploit race conditions in web apps with Requests | |
| turbo-intruder | GitHub | (Race-Condition): Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results | |
| race-the-web | GitHub | (Race-Condition): Tests for race conditions in web applications. Includes a RESTful API to integrate into a continuous integration pipeline | |
| http-request-smuggling | GitHub | HTTP Request Smuggling Detection Tool | |
| smuggler | GitHub | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | |
| h2csmuggler | GitHub | (Request-Smuggling): HTTP Request Smuggling over HTTP/2 Cleartext (h2c) | |
| tiscripts | GitHub | (Request-Smuggling): These scripts I use to create Request Smuggling Desync payloads for CLTE and TECL style attacks | |
| SSRFmap | GitHub | (SSRF): Automatic SSRF fuzzer and exploitation tool | |
| Gopherus | GitHub | (SSRF): This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | |
| SSRFire | GitHub | (SSRF): An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirects | |
| httprebind | GitHub | (SSRF): Automatic tool for DNS rebinding-based SSRF attacks | |
| ssrf-sheriff | GitHub | (SSRF): A simple SSRF-testing sheriff written in Go | |
| B-XSSRF | GitHub | (SSRF): Toolkit to detect and keep track on Blind XSS, XXE & SSRF | |
| extended-ssrf-search | GitHub | (SSRF): Smart SSRF scanner using different methods like parameter brute forcing in POST and GET | |
| gaussrf | GitHub | (SSRF): Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and filter URLs with OpenRedirection or SSRF Parameters | |
| lorsrf | GitHub | (SSRF): Bruteforcing on hidden parameters to find SSRF vulnerability using GET and POST methods | |
| Singularity | GitHub | (SSRF): A DNS rebinding attack framework | |
| whonow | GitHub | (SSRF): A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53) | |
| dns-rebind-toolkit | GitHub | (SSRF): A front-end JavaScript toolkit for creating DNS rebinding attacks | |
| dref | GitHub | (SSRF): DNS Rebinding Exploitation Framework | |
| rbndr | GitHub | (SSRF): Simple DNS Rebinding Service | |
| httprebind | GitHub | (SSRF): Automatic tool for DNS rebinding-based SSRF attacks | |
| dnsFookup | GitHub | (SSRF): DNS rebinding toolkit | |
| surf | GitHub | (SSRF): Escalate your SSRF vulnerabilities on modern cloud environments. `surf` allows you to filter a list of hosts, returning a list of viable SSRF candidates | |
| NoSQLMap | GitHub | (SQL Injection): Automated NoSQL database enumeration and web application exploitation tool. | |
| SQLiScanner | GitHub | (SQL Injection): Automatic SQL injection with Charles and sqlmap api | |
| SleuthQL | GitHub | (SQL Injection): Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. | |
| mssqlproxy | GitHub | (SQL Injection): Toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse | |
| sqli-hunter | GitHub | (SQL Injection): Simple HTTP / HTTPS proxy server and a SQLMAP API wrapper that makes digging SQLi easy. | |
| ESC | GitHub | (SQL Injection): Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. | |
| mssqli-duet | GitHub | (SQL Injection): script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing | |
| sqliv | GitHub | (SQL Injection): Massive SQL injection vulnerability scanner | |
| nosqli | GitHub | (SQL Injection): NoSql Injection CLI tool, for finding vulnerable websites using MongoDB. | |
| ghauri | GitHub | (SQL Injection): An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws | |
| XSStrike | GitHub | (XSS Injection): Most advanced XSS scanner. | |
| xssor2 | GitHub | (XSS Injection): XSS'OR - Hack with JavaScript. | |
| ezXSS | GitHub | (XSS Injection): ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting. | |
| xsshunter | GitHub | (XSS Injection): The XSS Hunter service - a portable version of XSSHunter.com | |
| dalfox | GitHub | (XSS Injection): DalFox(Finder Of XSS) / Parameter Analysis and XSS Scanning tool based on golang | |
| xsser | GitHub | (XSS Injection): Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. | |
| XSpear | GitHub | (XSS Injection): Powerful XSS Scanning and Parameter analysis tool&gem | |
| weaponised-XSS-payloads | GitHub | (XSS Injection): XSS payloads designed to turn alert(1) into P1 | |
| tracy | GitHub | (XSS Injection): A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner. | |
| ground-control | GitHub | (XSS Injection): A collection of scripts that run on my web server. Mainly for debugging SSRF, blind XSS, and XXE vulnerabilities. | |
| JSShell | GitHub | (XSS Injection): An interactive multi-user web JS shell | |
| bXSS | GitHub | (XSS Injection): bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting. | |
| docem | GitHub | (XSS Injection): Utility to embed XXE and XSS payloads in docx, odt, pptx, etc (OXML_XEE on steroids) | |
| XSS-Radar | GitHub | (XSS Injection): XSS Radar is a tool that detects parameters and fuzzes them for cross-site scripting vulnerabilities. | |
| findom-xss | GitHub | (XSS Injection): A fast DOM based XSS vulnerability scanner with simplicity. | |
| domdig | GitHub | (XSS Injection): DOM XSS scanner for Single Page Applications | |
| femida | GitHub | (XSS Injection): Automated blind-xss search for Burp Suite | |
| B-XSSRF | GitHub | (XSS Injection): Toolkit to detect and keep track on Blind XSS, XXE & SSRF | |
| xssmap | GitHub | (XSS Injection): XSSMap 是一款基于 Python3 开发用于检测 XSS 漏洞的工具 | |
| XSSCon | GitHub | (XSS Injection): Simple XSS Scanner tool | |
| BitBlinder | GitHub | (XSS Injection):BurpSuite extension to inject custom cross-site scripting payloads on every form/request submitted to detect blind XSS vulnerabilities | |
| shadow-workers | GitHub | (XSS Injection): Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious Service Workers (SW) | |
| dtd-finder | GitHub | (XXE Injection): List DTDs and generate XXE payloads using those local DTDs. | |
| xxeserv | GitHub | (XXE Injection): A mini webserver with FTP support for XXE payloads | |
| xxexploiter | GitHub | (XXE Injection): Tool to help exploit XXE vulnerabilities | |
| XXEinjector | GitHub | (XXE Injection): Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods. | |
| oxml_xxe | GitHub | (XXE Injection): A tool for embedding XXE/XML exploits into different filetypes | |
| tplmap | GitHub | (SSTI): Server-Side Template Injection and Code Injection Detection and Exploitation Tool | |
| SSTImap | GitHub | (SSTI): Automatic SSTI detection tool with interactive interface | |
| SprayingToolkit | Github | (Password): Scripts to make password spraying attacks against Lync/S4B, OWA & O365 quicker, less painful, and more efficient. | |
| o365recon | Github | (Cloud/AD): retrieve information via O365 and AzureAD with a valid cred | |
| CredMaster | Github | (Password): Refactored & improved CredKing password spraying tool. Uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling. | |
| LFImap | Github | (LFI): Local File Inclusion discovery and exploitation tool |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| FullHunt.io | Website | Attack surface database of the entire Internet | |
| BinaryEdge | Website | We scan the web and gather data for you | |
| Censys ASM | Website | Attack Surface Management Solutions | |
| RedHunt Labs | Website | Discover your Attack Surface, Continuously | |
| SecurityTrails | Website | The Total Internet Inventory | |
| Overcast Security | Website | We make tracking your external attack surface easy | |
| IPInfo | Website | The trusted source for IP address data | |
| IPData | Website | IP Geolocation and Threat Intelligence API | |
| NetworksDB | Website | Information about the public IPv4 and IPv6 addresses, networks, and domains owned by companies and organizations across the world | |
| ASNlookup | Website | Quickly lookup updated information about specific Autonomous System Number (ASN), Organization, CIDR, or registered IP addresses (IPv4 and IPv6) among other relevant data | |
| BGPtools | Website | Browse the Internet ecosystem | |
| BGPview | Website | Debug and investigate information about IP addresses, ASN, IXs, BGP, ISPs, Prefixes, and Domain names | |
| BigDataCloud | Website | The API provides comprehensive location and network data | |
| RADb | Website | The world's largest public routing registry | |
| Deepinfo | Website | Empower your security with the most comprehensive Internet data | |
| Detectify | Website | Complete External Attack Surface Management |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| GitHub Code Search | Website | Search globally across all of GitHub, or scope your search to a particular repository or organization | |
| GitLab Code Search | Website | Advanced search for faster, more efficient search across the entire GitLab instance | |
| Sourceforge | Website | Complete Open-Source and Business Software Platform | |
| Grep.app | Website | Search across a half million git repos | |
| Publicwww.com | Website | Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code | |
| SearchCode | Website | Search 75 billion lines of code from 40 million projects | |
| NerdyData | Website | Find companies based on their website's tech stack or code | |
| RepoSearch | Website | Source code search engine that helps you find implementation details, example usages or just analyze code | |
| SourceGraph | Website | Understand and search across your entire codebase | |
| HotExamples | Website | Search code examples from over 1 million projects | |
| WP Directory | Website | Lightning fast regex searching of code in the WordPress Plugin and Theme Directories | |
| Github gist | Website | Instantly share code, notes, and snippets | |
| CodeBerg | Website | Collaboration platform and Git hosting for free and open source software, content and projects | |
| Fedora Pagure | Website | Open Source software code hosting system | |
| LaunchPad | Website | Software collaboration platform that provides: Bug tracking, Code hosting, Code reviews, Ubuntu package building and hosting, Translations... | |
| Repo.or.cz | Website | Public Git hosting site | |
| Gitorious.org | Website | Read-only mirror of the former gitorious.org code hosting website | |
| Sourcehut | Website | Collection of tools useful for software development | |
| Android.googlesource.com | Website | Git repositories on android | |
| Deps.dev | Website | Service developed and hosted by Google to help developers better understand the structure, construction, and security of open source software packages | |
| WebFinery | Website | Search the source code of the web | |
| Google Code Archive | Website | Data found on the Google Code Project Hosting Service, which was turned down in early 2016 | |
| Snipplr | Website | Code snippet search engine that allows users to search and share code snippets across various programming languages and frameworks |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| DomainTyper | PH only Website | The list of Top Websites in the World is based on the Traffic data for the Top 1,000,000 sites globally. In the top 1 million sites there are 590 [lastview: 07-15-24] sites ending with .PH Domain. | |
| PhoneBook | Website | Lists all domains, email addresses, or URLs for the given input domain | |
| IntelligenceX | Website | Search engine and data archive | |
| Omnisint | Website | Subdomain enumeration | |
| RobTex | Website | Various kinds of research of IP numbers, Domain names, etc | |
| CentralOps - DomainDossier | Website | Investigate domains and IP addresses | |
| DomainIQ | Website | Comprehensive Domain Intelligence | |
| Whois.domaintools.com | Website | Industry’s fastest domain discovery engine and broadest, most accurate data | |
| Grayhatwarfare.com - domains | Website | How to search URLs exposed by Shortener services | |
| Whoisology.com | Website | Deep Connections Between Domain Names & Their Owners | |
| Who.is | Website | WHOIS Search, Domain Name, Website, and IP Tools | |
| Pentest Tools | Website | Find the subdomains of an internet domain and determine the attack surface of an organization. | |
| BuiltWith | Website | Find out what websites are Built With | |
| MoonSearch | Website | Backlinks checker & SEO Report | |
| Sitereport.netcraft.com | Website | Find out the infrastructure and technologies used by any site | |
| SynapsInt | Website | The unified OSINT research tool | |
| Statscrop.com | Website | Millions of amazing websites across the web are being analyzed with StatsCrop | |
| Securityheaders.com | Website | Scan your site now | |
| Visualsitemapper.com | Website | Create a visual map of your site | |
| Similarweb.com | Website | The easiest and fastest tool to find out what's really going on online | |
| Buckets.grayhatwarfare.com | Website | Public buckets | |
| C99.nl | Website | Over 57 quality API's and growing! | |
| Wannabe1337.xyz | Website | Online Tools | |
| Subdomainfinder.c99.nl | Website | Scanner that scans an entire domain to find as many subdomains as possible | |
| AnubisDB | Website | Subdomain enumeration and information gathering tool | |
| WhoisXMLAPI | Website | Domain & IP Data Intelligence for Greater Enterprise Security | |
| HypeStat | Website | Free statistics and analytics service, where you can find information about every website | |
| Private Key Project | Website | Information security tools from Private Key Project | |
| SiteDossier | Website | Profiles for millions of sites on the web | |
| SpyOnWeb | Website | Quick and convenient search for the websites that probably belong to the same owner |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| DNSDumpster | Website | DNS recon & research, find & lookup DNS records | |
| Chaos | Website | Enhance research and analyze changes around DNS for better insights | |
| RapidDNS | Website | DNS query tool which makes querying subdomains or sites of the same IP easy | |
| DNSdb | Website | Passive DNS historical database | |
| Omnisint | Website | Reverse DNS lookup | |
| HackerTarget | Website | Collect information about IP Addresses, Networks, Web Pages, and DNS records | |
| Passivedns.mnemonic.no | Website | Web interface for querying passive DNS data collected in our malware lab | |
| Ptrarchive.com | Website | Over 230 billion reverse DNS entries from 2008 to the present | |
| Dnshistory.org | Website | Domain Name System Historical Record Archive | |
| DNSTwister | Website | The anti-phishing domain name search engine and DNS monitoring service | |
| DNSviz | Website | Tool for visualizing the status of a DNS zone | |
| DNSlytics | Website | Find out everything about a domain name, IP address, or provider | |
| Dnsrepo.noc.org | Website | DNS Database Repository Search | |
| DNSSpy | Website | Monitor, validate, and verify your DNS configurations | |
| ZETAlytics | Website | We offer unrivaled geographic diversity and exclusive global network visibility in searchable datasets for use by cybersecurity analysts | |
| AskDNS | Website | Lookup Connected Domain Names and IP Addresses | |
| MXtoolbox | Website | All of your MX record, DNS, blacklist, and SMTP diagnostics in one integrated tool | |
| NSLookup.io | Website | Find all DNS records for a domain name using this online tool | |
| Robtex DNS Lookup | Website | Get detailed information on the nameservers associated with a domain name |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Crt.sh | Website | Certificate Search | |
| CTSearch | Website | Certificate Transparency Search Tool | |
| Tls.bufferover.run | Website | Quickly find certificates in IPv4 space | |
| CertSpotter | Website | Monitors your domains for expiring, unauthorized, and invalid SSL certificates | |
| Censys Search - Certificates | Website | Certificates Search | |
| Certificatedetails | Website | Online certificate viewer. Inspect and download certificates from your browser | |
| FacebookCT | Website | Search for certificates issued for a given domain and subscribe to notifications from Facebook regarding new certificates | |
| ciphersuite | Website | ciphersuite by using IANA, OpenSSL, or GnuTLS name format | |
| certificatedetails.com | Website | Online certificate viewer. Inspect and download certificates from your browser | |
| certs.io | Website | Search TLS certificates across the internet |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Wigle.net | Website | Maps and database of 802.11 wireless networks with statistics | |
| wifimap.io | Website | Connect to all Free WiFi Hotspots using WiFi Map App all over the World! | |
| wificafespots.com | Website | Free WiFi Cafe Spots | |
| wifispc.com | Website | Free map of Wi-Fi passwords anywhere you go! | |
| openwifimap.net | Website | HTML5 map with OpenWiFiMap data | |
| mylnikov.org | Website | Public API implementation of Wi-Fi Geo-Location database |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| MACVendorLookup.com | Website | Look up the vendor for a specific MAC Address | |
| macvendors.com | Website | Find MAC Address Vendors | |
| macaddress.io | Website | MAC address vendor lookup | |
| maclookup.app | Website | Find the vendor name of a device by entering an OUI or a MAC address | |
| macvendors.co | Website | Get vendor name of your network device using its MAC address |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Weakpass: wordlist - dicassassin | Website | weakpass unleash the power of them all at once | |
| Have I Been Pwned | Website | Check if your email or phone is in a data breach | |
| Dehashed | Website | Free deep-web scans and protection against credential leaks | |
| LeakCheck.io | Website | Make sure your credentials haven't been compromised | |
| crackstation.net | Website | Massive pre-computed lookup tables to crack password hashes | |
| HashKiller | Website | Pre-cracked Hashes, easily searchable | |
| LeakedPassword | Website | Search across multiple data breaches to see if your password has been compromised | |
| BugMeNot | Website | Find and share logins | |
| LeakSearch | Github | A tool search and parse plain text passwords using ProxyNova COMB (Combination Of Many Breaches) over the Internet. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| WikiLeaks | Website | News leaks and classified media provided by anonymous sources | |
| BreachForums | Onion Website | Breaches, Data leaks, databases, and more | |
| Snusbase | Website | Stay on top of the latest database breaches | |
| breachdirectory.org | Website | Check if your information was exposed in a data breach | |
| Leak-Lookup | Website | Search across thousands of data breaches |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| MITRE ATT&CK | Website | Globally-accessible knowledge base of adversary tactics and techniques | |
| PulseDive | Website | Threat intelligence made easy | |
| ThreatCrowd | Website | A Search Engine for Threats | |
| ThreatMiner | Website | Data Mining for Threat Intelligence | |
| VirusTotal | Website | Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches | |
| vx-underground.org | Website | The largest collection of malware source code, samples, and papers on the internet | |
| bazaar.abuse.ch | Website | Malware sample database | |
| feodotracker.abuse.ch | Website | List of botnet Command&Control servers | |
| Valhalla YARA Rules | Website | Valhalla is a Malware Detection tools based on YARA rules. | |
| sslbl.abuse.ch | Website | All malicious SSL certificates | |
| urlhaus.abuse.ch | Website | Propose new malware urls | |
| threatfox.abuse.ch | Website | Indicator Of Compromise (IOC) database | |
| yaraify.abuse.ch | Website | Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules | |
| Rescure | Website | Curated cyber threat intelligence for everyone | |
| otx.alienvault | Website | The World's First Truly Open Threat Intelligence Community | |
| urlquery.net | Website | Service for detecting and analyzing web-based malware | |
| socradar.io | Website | Extension to your SOC team | |
| VirusShare | Website | System currently contains 48 million malware samples | |
| PassiveTotal | Website | Security intelligence that scales security operations and response | |
| malapi.io | Website | Windows APIs used for malicious purposes | |
| filesec.io | Website | Latest file extensions being used by attackers | |
| leakix.net | Website | Search engine indexing public information and an open reporting platform linked to the results | |
| tria.ge | Website | Fully automated solution for high-volume malware analysis using advanced sandboxing technology | |
| Polyswarm | Website | Launchpad for new technologies and innovative threat detection methods | |
| Cisco Talos | Website | The threat intelligence organization at the center of the Cisco Security portfolio | |
| scamsearch.io | Website | Find your scammer online & report them | |
| CyberCampaigns | Website | Threat Actor information and Write-Ups | |
| ORKL | Website | The Community Driven Cyber Threat Intelligence Library | |
| Maltiverse | Website | Data from more than 100 different Threat Intelligence sources | |
| Inquest Labs | Website | Threat intelligence from hundreds of public, private, and internal sources to develop new FDR signatures and rules | |
| PhishTank | Website | Collaborative clearing house for data and information about phishing on the Internet | |
| IntelOwl | GitHub | Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale | |
| Lupovis | Website | Analyze and collect data on Internet-wide scans and attacks in real-time. We use this data to identify and classify malicious actors | |
| AbuseIPDB | Website | Check the report history of any IP address to see if anyone else has reported malicious activities | |
| Sucuri SiteCheck | Website | Check websites for known malware, viruses, blacklisting status, website errors, out-of-date software, and malicious code | |
| Spamhaus | Website | Protect and investigate using IP and domain reputation data | |
| ThreatBook | Website | One step ahead of your adversary with high-fidelity, efficient and actionable cyber threat intelligence | |
| ShadowServer | Website | Nonprofit security organization working altruistically behind the scenes to make the Internet more secure for everyone | |
| Team Cymru | Website | Global leader in cyber threat intelligence and attack surface management | |
| BeVigil | Website | Search engine for mobile application security testing | |
| CIRCL | Website | The Computer Incident Response Center Luxembourg is a government-driven initiative designed to gather, review, report and respond to computer security threats and incidents | |
| MetaDefender Cloud | Website | Advanced threat detection and prevention platform | |
| Cybersixgill | Website | Threat intelligence platform that provides access to a wide range of cybersecurity information, including dark web monitoring and threat actor analysis | |
| Hybrid Analysis | Website | Free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology | |
| IBM X-Force Exchange | Website | Threat intelligence sharing platform enabling research on security threats, aggregation of intelligence, and collaboration with peers | |
| C2-Trackers | Github | Free to use IOC feed for various tools/malware. It started out for just C2 tools but has morphed into tracking infostealers and botnets as well. | |
| RansomLook | Website | (Adversaries Monitoring): RansomLook is an open-source project aimed at assisting users in tracking ransomware-group related posts and activities across various sites | |
| Ransomwhere | Website | (Adversaries Monitoring): Ransomwhere Monitoring Cryptocurrencies, a crowdsourced ransomware payment tracker. | |
| yara | Github | (Yara rules): YARA is a tool aimed helping malware researchers to identify and classify malware samples. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| rep+ | chrome extension | rep+ is a Burp-style HTTP Repeater for Chrome DevTools with built‑in AI to explain requests and suggest attacks | |
| Shodan | Firefox Chrome | The Shodan plugin tells you where the website is hosted (country, city), who owns the IP and what other services/ ports are open. | |
| Link Gopher | Firefox Chrome | Extracts all links from web page, sorts them, removes duplicates, and displays them in a new tab for inspection or copy and paste into other systems | |
| Wappalyzer | Firefox Chrome | Identify technologies on websites | |
| Foxyproxy | Firefox Chrome | FoxyProxy is an open-source, advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. | |
| Wayback Machine | Firefox Chrome | The Official Wayback Machine Extension - by the Internet Archive. | |
| Temp-mail | Firefox Chrome | Temporary disposable email address. Protect your email from spam, bots and phishing with Temp-Mail. | |
| Hunter | Firefox Chrome | Find email addresses from anywhere on the web, with just one click. | |
| Hacktools | Firefox Chrome | Hacktools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as reverse shells to test your web application. | |
| CookieManager | Firefox Chrome | Edit cookies related to the current page and all its sub-frames right from a popup | |
| Open-Multiple URLs | Firefox Chrome | Opens a list of URLs | |
| Darkreader | Firefox Chrome | Dark mode for every website. Take care of your eyes, use dark theme for night and daily browsing. | |
| Grammar and Spell Checker | Firefox Chrome | With this extension you can check text with the free style and grammar checker LanguageTool. | |
| Grammarly | Firefox Chrome | Improve your writing with Grammarly's assistance. Get spell check, grammar check, and punctuation check in one tool. | |
| User-Agent Switcher and Manager | Firefox Chrome | Spoof websites trying to gather information about your web navigation—like your browser type and operating system—to deliver distinct content you may not want. | |
| PwnFox | Firefox | PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit | |
| HackBar v2 | Firefox | A HackBar for google chrome/firefox browser. Small tool for pentesting websercurity.Load, split, execute url from address bar and etc. | |
| Modify Header Value | Firefox Chrome | Modify Header Value can add, modify or remove an HTTP-request-header for all requests on a desired website or URL. | |
| Retire.js | Firefox Chrome | Scan a web app for use of vulnerable JavaScript libraries. The goal of Retire.js is to help you detect use of version with known vulnerabilities. | |
| Broken Link Checker | Firefox | A SEO tool to find broken (404) and redirected (301, 307, 308) links in all frames. Easy way to get some bounties by taking over broken social media handles. | |
| APK Downloader | Firefox | If you are into Android pentest or want find some quick bugs with apk static analysis, APK Downloader will make your day. | |
| Altair GraphQL Client | Firefox | A beautiful feature-rich GraphQL Client for all platforms. | |
| Trufflehog | Firefox Chrome | Sniffing out credentials | |
| Disable WebRTC | Firefox | WebRTC leaks your actual IP addresses from behind your VPN, by default. | |
| .Git | Firefox Chrome | An extension to check if .git is exposed in visited websites. | |
| uBlock Origin | Firefox Chrome | Finally, an efficient wide-spectrum content blocker. Easy on CPU and memory. | |
| Code Beautifer/Minifier | Firefox Firefox | This extension For beautify js and css and html. HTML & CSS & JavaScript Beautifier/Minifier |
Acquisition | Browser Forensics | Carving | Diskimage Handling | Distribution | Docker Forensics | Frameworks | Imaging | Live Forensics | Manangement | Memory Forensics | Metadata Forensics | Mobile Forensics | Network Forensics | OSX Forensics | Picture Analysis | Timeline Analysis | Website Forensics | Windows Artifacts | Steganography |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| grr | Github | GRR Rapid Response: remote live forensics for incident response | |
| linux explorer | Github | Easy-to-use live forensics toolbox for Linux endpoints | |
| mig | Github | Distributed & real time digital forensics at the speed of the cloud | |
| osquery | Github | SQL powered operating system instrumentation, monitoring, and analytics. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Fireye redline | Github | provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis and the development of a threat assessment profile. | |
| inVtero.net | Github | High speed memory analysis framework developed in .NET supports all Windows x64, includes code integrity and write support | |
| MemProcFS | Github | MemProcFS is an easy and convenient way of viewing physical memory as files in a virtual file system. | |
| rekall | Github | Memory Forensic Framework | |
| volatility | Github | An advanced memory forensics framework | |
| VolUtility | Github | Web Interface for Volatility Memory Analysis framework |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| NitworkMiner | Website | NetworkMiner is an open source network forensics tool that extracts artifacts, such as files, images, emails and passwords, from captured network traffic in PCAP files. | |
| xplico | Website | extract from an internet traffic capture the applications data contained. from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP contents, each VoIP call (SIP), FTP, TFTP, and so on. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS | |
|---|---|---|---|---|
| beagle | Github | Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs. | ||
| Fred | Website | Cross-platform microsoft registry hive editor | ||
| LastActivityView | Website | LastActivityView by Nirsoftis a tool for Windows operating system that collects information from various sources on a running system, and displays a log of actions made by the user and events occurred on this computer. | ||
| LogonTracer | Github | Investigate malicious Windows logon by visualizing and analyzing Windows event log | ||
| python-evt | Github | Pure Python parser for classic Windows Event Log files (.evt) | ||
| RegRipper3.0 | Github | RegRipper is an open source Perl tool for parsing the Registry and presenting it for analysis. | ||
| MFTextractor | Github | extract filesystem information of record or for a range of records | ||
| Ntfs-linker | Github | ntfs-linker operates off of a directory of input containing $UsnJrnl, $Logfile, and $MFT. | ||
| NTFStool | Github | Forensics tool for NTFS (parser, mft, bitlocker, deleted files | ||
| NTFS USN Journal parser | Github | The NTFS USN Change journal is a volume-specific log which records metadata changes to files. It is a treasure trove of information during a forensic investigation. | ||
| RecuperaBit | Github | Reconstruct and recover NTFS data |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| APFS FUSE | Github | FUSE driver for APFS (Apple File System) | |
| APOLLO | Github | Gather database files on macOS and jailbroken iOS devices, gather_macos and gather_ios (IP/Port required) | |
| Disk-Arbitrator | Github | A Mac OS X forensic utility which manages file system mounting in support of forensic procedures. | |
| MAC OSX Artifacts | Github | locations artifacts by mac4n6 group | |
| mac_apt - macOS (and iOS) Artifact Parsing Tool | Github | mac_apt is a DFIR (Digital Forensics and Incident Response) tool to process Mac computer full disk images (or live machines) and extract data/metadata useful for forensic investigation. | |
| Mac Locations Scraper | Github | macOS/iOS database location scraper to extract location data | |
| macMRU-Parser | Github | Python script to parse the Most Recently Used (MRU) plist files on macOS into a more human friendly format. | |
| OSX-Auditor | Github | OS X Auditor is a free Mac OS X computer forensics tool | |
| OSXCollector | Github | A forensic evidence collection & analysis toolkit for OS X |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Andriller | Github | A collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. | |
| ALEAPP | Github | An Android Logs Events and Protobuf Parser | |
| iOS Frequent Locations Dumper | Github | Dump the iOS Frequent Location binary plist files | |
| MEAT | Github | This toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices | |
| MobSF | Github | About Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. | |
| OpenBackupExtractor | Github | A free program for extracting data (like voicemails) from iPhone and iPad backups. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| DOF | Github | A toolkit for the post-mortem examination of Docker containers from forensic HDD copies | |
| Docker Explorer | Github | A tool to help forensicate offline docker acquisitions |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| ChromeCacheView | Website | by Nirsoft is a small utility that reads the cache folder of Google Chrome Web browser, and displays the list of all files currently stored in the cache | |
| Hindsight | Github | Web browser forensics for Google Chrome/Chromium | |
| Unfurl | Github | Extract and Visualize Data from URLs using Unfurl |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Exiftool | Github | Metadata viewer | |
| Exiv2 | Website | Exiv2 is a Cross-platform C++ library and a command line utility to manage image metadata. | |
| FOCA | Github | Tool to find metadata and hidden information in the documents. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Fit | Github | FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| bitscout | Github | LiveCD/LiveUSB for remote forensic acquisition and analysis | |
| CAINE | Website | CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. | |
| GRML-Forensic | Website | Grml-Forensic is a system designed for forensic investigations and data rescue tasks | |
| REMnux | Website | REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. | |
| Santoku | Website | Santoku is dedicated to mobile forensics, analysis, and security, and packaged in an easy to use, Open Source platform. | |
| WINFe | Website | Windows Forensic Environment | |
| Predator OS | Website | Linux distribution for forensic analysis |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Autopsy | Github | Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® | |
| The Sleuth Kit | Github | The Sleuth Kit is an open source forensic toolkit for analyzing Microsoft and UNIX file systems and disks. | |
| DFF | Github | DFF is a Forensics Framework coming with command line and graphical interfaces. DFF can be used to investigate hard drives and volatile memory and create reports about user and system activities. | |
| dexter | Github | Forensics acquisition framework designed to be extensible and secure | |
| IntelMQ | Github | IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol. | |
| Kuiper | Github | Kuiper is a digital investigation platform that provides a capabilities for the investigation team and individuals to parse, search, visualize collected evidences (evidences could be collected by fast triage script like Hoarder) | |
| regrippy | Github | A modern Python-3-based alternative to RegRipper | |
| Turbinia | Github | Automation and Scaling of Digital Forensics Tools | |
| IPED Digital Forensic Tool | Github | It is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private examiners. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Paraben e3 | Website | Paraben Corporation’s E3 Forensic Platform offers DFIR, OSINT, Social Media accounts. | |
| artifactcollector | Github | The artifactcollector is a customizable agent to collect forensic artifacts on any Windows, macOS or Linux system | |
| ram-capturer | Website | by Belkasoft is a free tool to dump the data from a computer’s volatile memory. It’s compatible with Windows OS. | |
| AVML | Github | Acquire Volatile Memory for Linux | |
| FireEye Memoryze | Website | Memoryze™ is free memory forensic software that helps incident responders find evil in live memory. | |
| Fuji: Forensic Unattended Juicy Imaging | Github | MacOS forensic acquisition made simple | |
| LiME | Github | LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. | |
| Velociraptor | Github | a tool for collecting host based state information using The Velociraptor Query Language (VQL) queries. | |
| UFADE | Github | Extract files from Apple devices on Windows, Linux and MacOS. Mostly a wrapper for pymobiledevice3. Creates iTunes-style backups and "advanced logical backups" |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Belkasoft Acquisition Tool | Website | by Belkasoft allows you to create images of hard and removable disks, Android and iOS devices and download data from the cloud. | |
| dc3dd | Website | Improved version of dd | |
| FTK imager | Website | Free imageing tool for windows | |
| Guymager | Website | Open source version for disk imageing on linux systems |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| bstrings | Github | A better strings utility! | |
| bulk extractor | Github | high-performance tool it is a "get evidence" button that rapidly scans any kind of input (disk images, files, directories of files, etc) and extracts structured information such as email addresses, credit card numbers, JPEGs and JSON snippets without parsing the file system or file system structures. | |
| FLARE-floss | Github | Static analysis tool to automatically deobfuscate strings from malware binaries | |
| PhotoRec | Website | recover lost files including video, documents and archives from hard disks (HD,SSD), CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory. | |
| swap_digger | Github | It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| DFTimewolf | Github | A framework for orchestrating forensic collection, processing and data export | |
| Plaso | Github | Extract timestamps from various files and aggregate them | |
| timeliner | Github | A rewrite of mactime, a bodyfile reader | |
| Timesketch | Github | Collaborative forensic timeline analysis |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Disk-Arbitrator | Github | A Mac OS X forensic utility designed to help the user ensure correct forensic procedures are followed during imaging of a disk device | |
| imagemounter | Github | Command line utility and Python package to ease the (un)mounting of forensic disk images | |
| libewf | Github | Libewf is a library and some tools to access the Expert Witness Compression Format (EWF, E01) | |
| OSFMount | Github | It allows you to mount local disk image files (bit-for-bit copies of an entire disk or disk partition) in Windows as a physical disk or a logical drive letter | |
| xmount | Website | Convert between different disk image formats |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| dfirtrack | Github | Digital Forensics and Incident Response Tracking application, track systems | |
| INCIDENTS | Github | Web application for organizing non-trivial security investigations. Built on the idea that incidents are trees of tickets, where some tickets are leads |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| sherloq | Github | An open-source digital image forensic toolset |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| binwalk | Github | Binwalk can identify, and optionally extract, files and data that have been embedded inside of other files. | |
| foremost | Github | Foremost is a console program to recover files based on their headers, footers, and internal data structures. | |
| sonicvisualiser | Website | designed to be the first program you reach for when want to study a music recording closely. It's designed for musicologists, archivists, signal-processing researchers. | |
| Steghide | Github | Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files | |
| stegsolve | Github | analyze images in different planes by taking off bits of the image | |
| WavSteg | Github | A steganographic coder for WAV files | |
| zsteg | Github | detect stegano-hidden data in PNG & BMP | |
| Audacity | Github | an easy-to-use, multi-track audio editor and recorder |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| simple badges | Github badges Icons | (Github-Badge): 3161+ awesome Simple Icons on your favorite Shields.io Badges | |
| linkedint | Github | (Recon): LinkedIn Recon Tool | |
| Gologin | Websites | (Browser): GoLogin allows users to create and manage multiple browser profiles, each with a unique digital fingerprint. This feature is essential for those managing multiple online identities or accounts. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Bugbounty-Platform | Github Page | Bug Bounty Platforms: Open-Sourced Collection of Bug Bounty Platforms | |
| bounty-targets-data | Github | This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports | |
| Hackerone-reports | Github | Tops of HackerOne reports | |
| HackerOne hacktivity | Website | (Disclosures): See the latest hacker activity on HackerOne | |
| Bugcrowd Crowdstream | Website | (Disclosures): Showcase of accepted and disclosed submissions on Bugcrowd programs |
resources, blogs, vlogs, ctf-writeups, certifications, tips&tricks, anonymity etc.
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| John Hammond | YouTube | (Educational): cybersecurity researcher, educator and content creator. | |
| IppSec | YouTube | (CTF-HTB): Cyber Security Trainer at HTB, content creator, CTF player | |
| NahamSec | YouTube | (Bug-Bounty): security researcher and content creator, educator, trainer | |
| CyberMentor | YouTube | (Pentesting): penetration testing, compliance, content creator, trainer, TCM CEO | |
| Hackersploit | YouTube | (RedTeaming): Provider of free Infosec and cybersecurity training, Red Teamer, Content creator | |
| LiveOverflow | YouTube | (Pwning): Content creator, binary, pwning, crypto, educator | |
| Jack Rhysider | YouTube | (Diaries): Darknet Diaries is an investigative podcast, stories about cybercrime, malware, cryptography, internet privacy, etc. | |
| 0xdf | GitLab | (CTF-HTB): Principal Lab Architect at HackTheBox, CTF player, educator | |
| Hak5 | Shop | (Hardware): leading hardware hacker tools, WiFi Pineapple, USB Rubber Ducky, educator | |
| Infosecmatter | Website | (Blog): Sharing knowledge about cyber security, writing howtos, tips and tricks about penetration testing, red teaming, but also defense. | |
| Hacking Articles | Website | (Blog): Hacking Articles is a discursive source of knowledge on cyber security including Penetration Testing, Red teaming, Web pentesting, CTF challenge. | |
| Anonymousplanet | Website | (Anonymity): The comprehensive guide for online anonymity and OpSec. | |
| InfoCon | Website | (Conference): InfoCon is an archive of hacking and security conference videos from around the world. |
programming languages, bootcamp, online GDB, tutorials, documentations and etc.
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| stackoverflow | Website | Stack Overflow is the largest, most trusted online community for developers to learn, share their programming knowledge, and build their careers. | |
| GeeksforGeeks | Website | A Computer Science portal for geeks. It contains well written, well thought and well explained computer science and programming. | |
| W3Schools | Website | W3Schools is optimized for learning and training. Examples might be simplified to improve reading and learning. | |
| DEV | Website | A constructive and inclusive social network for software developers. With you every step of your journey. | |
| tutorialspoint | Website | Learn the latest technologies and programming languages including Smart Grid Technology, Prompt Engineering, Generative AI, Python, DSA, C, C++, Java, PHP, etc. | |
| Python Docs | Website | Python documentation and tutorials, search lib, modules, environment variables and etc. | |
| code beautifier | Website | js-beautify (v1.15.1). Beautify JavaScript, JSON, React.js, HTML, CSS, SCSS, SASS and etc. | |
| JavaScript Obfuscator | Website | A free and efficient obfuscator for JavaScript (including support of ES2022). Make your code harder to copy and prevent people from stealing your work. | |
| explainshell | Website | explainshell is a tool (with a web interface) capable of parsing man pages, extracting options and explaining a given command-line by matching each argument |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Web Archive | Website | Explore more than 702 billion web pages saved over time | |
| Archive.ph | Website | Create a copy of a webpage that will always be up even if the original link is down | |
| stored.website | Website | View cached web pages/website | |
| CommonCrawl | Website | Open repository of web crawl data | |
| UK Web Archive | Website | Collects millions of websites each year, preserving them for future generations | |
| Arquivo | Website | Non-profit service that maintains information published on the web of interest to the Portuguese community | |
| Archive-It | Website | An archive of digital government and non-government organization (NGO) documents and reports | |
| HAW | Website | Croatian Web Archive |
Tools Phone Numbers | Reverse Images | Mail Address | URL | Hidden Services | Device Information | Surveillance Cameras
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| spiderfoot | Github | (Attack surface): SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. | |
| sherlock | Github | (Username): Hunt down social media accounts by username across social networks | |
| OSINT Framework | Website | (General): OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. | |
| linkscope | Github | (Entities): LinkScope Client Online Investigation software that allows you to perform online investigations by representing information as discrete pieces of data, called Entities. | |
| URLCrazy | Github | (OSINT): Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. | |
| OSINT Map | Github | (OSINT): Malfrat's OSINT Map is an online tree of selected useful tools made for OSINT purposes, made to help you during your investigations | |
| linkedin2username | Github | (OSINT): Generate username lists for companies on LinkedIn |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Phoneinfoga | Github | Information gathering framework for phone numbers | |
| NumLookup | Website | Free reverse phone lookup | |
| SpyDialer | Website | Free Reverse Lookup Search | |
| WhitePages | Website | Find people, contact info & background checks | |
| National Cellular Directory | Website | Begin your comprehensive people search now | |
| Phone Validator | Website | Is it a cell phone or is it a landline or is it a fake? | |
| Free Carrier Lookup | Website | Enter a phone number and we'll return the carrier name | |
| RocketReach | Website | Your first-degree connection to any professional | |
| sync.me | Website | Find out who called | |
| EmobileTracker | Website | Track Mobile Owner Name, Location and Mobile Service Provider | |
| Reverse Phone Lookup | Website | Find Out The Owner Of A Phone Number | |
| ThatsThem | Website | Reverse phone lookup | |
| thisnumber | Website | International Phone Directories | |
| truepeoplesearch | Website | Get current address, cell phone number, email address, relatives, friends and a lot more | |
| Tellows | Website | Who is calling? The phone number reverse search | |
| ValidNumber | Website | Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada | |
| CellIdFinder | Website | Nonprofit project which helps you to find GSM BTS by MCC, MNC, LAC and CellID | |
| OldPhoneBook | Website | Instantly search a large selection from the past 20 years of USA phone listings | |
| Spokeo | Website | Search by name, phone, address, or email to confidentially lookup information about people you know | |
| Intelius Phone Lookup | Website | Look up a phone number to find owner information, carrier details, and more | |
| ZabaSearch Phone Lookup | Website | Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More | |
| AnyWho Phone Lookup | Website | Find out information associated with a phone number | |
| Radaris Phone Lookup | Website | Look up any phone number to see its owner and identify who's calling or texting you |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| TinEye | Website | TinEye is an image search and recognition company. We are experts in computer vision, pattern recognition, neural networks, and machine learning. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| urlencoder | Website | URL encoder and decoder used for bug-hunting and penetration testing | |
| PhoneBook | Website | Lists all domains, email addresses, or URLs for the given input domain | |
| IntelligenceX | Website | Search engine and data archive | |
| URLScan | Website | A sandbox for the web | |
| HackerTarget | Website | Collect information about IP Addresses, Networks, Web Pages, and DNS records | |
| MOZ Link Explorer | Website | The world's best backlink checker with over 40 trillion links | |
| shorteners.grayhatwarfare.com | Website | Search URLs exposed by Shortener services | |
| CommonCrawl Index | Website | Open repository of web crawl data | |
| URLVoid | Website | Check the online reputation/safety of a website | |
| Norton SafeWeb | Website | Look up a site, Get our rating |
Hidden Services
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| AHMIA | Website | (Search Engine): Search hidden services on the Tor network | |
| thehiddenwiki.org | Website | (Onion Links): The darknet guide | |
| tor.link | Website | (Search Engine): Free anonymous deepweb / Darknet search engine | |
| deepweblinks.net | Website | (Onion Links): Darkweb links and services | |
| onionengine.com | Website | (Search Engine): A search engine for services accessible on the Tor network | |
| OnionLand | Website | (Onion Links): Discover Hidden Services and access to Tor's onion sites | |
| Katana | GitHub | (Search Engine): Katana is a powerful Dark Web search engine tool designed to help you discover hidden websites and information within the Tor network. | |
| OnionSearch | GitHub | (Onion Indexing): OnionSearch is a tool for searching and indexing onion websites on the Dark Web, making it easier to find specific content. | |
| Darkdump | GitHub | (Onion Crawler): Darkdump is an open source intelligence tool that scrapes information about Tor websites, including website titles, IPs, and more, helping you gather data from the Dark Web. | |
| Onionscan | GitHub | (Onion Links): Onionscan is a powerful tool for scanning onion websites, helping you identify potential vulnerabilities and security issues. | |
| Onioff | GitHub | (Onion Links): Onioff is an OSINT tool designed to analyze and extract information from onion websites, providing insights into their characteristics and content. | |
| Onion-nmap | GitHub | (Onion Links): Onion-nmap is a Docker container for running Nmap scans on onion websites, helping you gather information about open ports and services. | |
| Hunchly | Website | (Onion Links): Hunchly is a comprehensive OSINT platform that includes features for collecting and tracking onion links and Dark Web content. | |
| TorBot | GitHub | (Onion Crawling): TorBot is an OSINT tool designed for crawling and collecting data from the Dark Web. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| go-dork | Github | The fastest dork scanner written in Go | |
| github-dorks | Github | Github dorks can reveal sensitive personal and/or organizational information such as private keys, credentials, authentication tokens, etc. | |
| GooFuzz | Github | GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking). | |
| NetoGraph | Website | Captures and indexes detailed, low-level snapshots of website behavior | |
| DorkSearch | Website | Speed up your Dorking | |
| usersearch.org | Website | Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs | |
| Pastebin | Website | Website where you can store text online for a set period of time | |
| pagodo | Github | pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Hunter.io | Website | Find professional email addresses in seconds | |
| GHunt | Website Github | GHunt (v2) is an offensive Google framework, designed to evolve efficiently. It's currently focused on OSINT, but any use related with Google is possible. | |
| xeuledoc | Github | Google Account information gathering (Google Docs) | |
| buster | Github | An advanced tool for email reconnaissance | |
| Reacher.email | Website | Open-Source Email Verification | |
| RocketReach | Website | Your first-degree connection to any professional | |
| email-format.com | Website | Find the email address formats in use at thousands of companies | |
| EmailHippo | Website | Email address verification technology | |
| ThatsThem | Website | Reverse email lookup | |
| verify-email.org | Website | Checks whether the mailbox exists or not | |
| Melissa - Emailcheck | Website | Check email addresses and verify they are live | |
| VoilaNorbert | Website | I can find anyone's email address | |
| skymem.info | Website | Find email addresses of companies and people | |
| findemails.com | Website | Find Anyone's Email Address in Seconds | |
| Experte email finder | Website | Find the right email address, even if you only know the name and the company | |
| EmailSherlock | Website | Search for the Person behind the Email address and find our reputation score | |
| Anymail Finder | Website | Find verified emails | |
| Tomba.io | Website | With 430+ million email addresses indexed, effective search filters, and deliverability checks, Tomba's email finder is its most powerful tool |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Insecam.org | Website | The world biggest directory of online surveillance security cameras | |
| Surveillance under Surveillance | Website | Cameras and guards watching you almost everywhere |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| SET Toolkit | Github | The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here. | |
| Evilginx3 | Github | MITM attack framework used for phishing credentials and session cookies from any Web service | |
| Gophish | Website | Open-Source Phishing Framework (Phishing Website) | |
| PS2EXE | Github | Compile powershell scripts to real windows executable file. | |
| King Phisher | Github | Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content. | |
| wifiphisher | Github | Automated phishing attacks against Wi-Fi networks | |
| PhishingFrenzy | Website | Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. | |
| Lucy Phishing Server | Github | (commercial) tool to perform security awareness trainings for employees including custom phishing campaigns, malware attacks etc. Includes many useful attack templates as well as training materials to raise security awareness. | |
| GoReport | Github | GoReport is a tool for generating phishing reports. | |
| Lure | Github | Lure is a phishing toolkit designed to attract targets with bait. | |
| FiercePhish | Github | FiercePhish is a full-fledged phishing framework. | |
| ReelPhish | Github | ReelPhish is a phishing toolkit developed by FireEye. | |
| Fishing Cat Server | Github | Fishing Cat Server is a phishing server framework. | |
| CredSniper | Github | CredSniper is a phishing toolkit for capturing credentials. | |
| PwnAuth | Github | PwnAuth is a phishing authentication framework. | |
| sptoolkit | Github | sptoolkit is a phishing toolkit for social engineering. | |
| Phishing pretexts | Github | Phishing pretexts is a toolkit for creating believable phishing scenarios. | |
| Mercure | Github | Mercure is a phishing toolkit for malicious URL generation. | |
| PoT - Phishing On Twitter | Website | PoT - Phishing On Twitter is a phishing tool targeting Twitter users. | |
| Domain Hunter | Github | Domain Hunter is a phishing tool for discovering domain targets. | |
| BlackEye | Github | BlackEye is a phishing tool for creating fake login pages. | |
| HiddenEye | Github | Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ] | |
| SocialFish | Github | SocialFish is a phishing toolkit for social media platforms. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Shhhloader | Github | Shhhloader is a work in progress shellcode loader. It takes raw shellcode as input and compiles a C++ stub that does a bunch of different things to try and bypass AV/EDR. | |
| ScareCrow | Github | Payload creation framework designed around EDR bypass. | |
| Ivy | Github | Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. | |
| Donut | Github | Donut is a position-independent code that enables in-memory execution of VBScript, JScript, EXE, DLL files and dotNET assemblies. | |
| PEzor | Github | Open-Source PE Packer. | |
| NimPlant | Github | A light first-stage C2 implant written in Nim and Python | |
| GadgetToJScript | Github | A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from JS/VBS/VBA scripts. | |
| Mystikal | Github | macOS Initial Access Payload Generator. | |
| charlotte | Github | C++ fully undetected shellcode launcher. | |
| InvisibilityCloak | Github | Proof-of-concept obfuscation toolkit for C# post-exploitation tools. | |
| Dendrobate | Github | Dendrobate is a framework that facilitates the development of payloads that hook unmanaged code through managed .NET code. | |
| Offensive VBA and XLS Entanglement | Github | This repo provides examples of how VBA can be used for offensive purposes beyond a simple dropper or shell injector. As we develop more use cases, the repo will be updated. | |
| xlsGen | Github | Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in *.xls. | |
| darkarmour | Github | Windows AV Evasion. | |
| InlineWhispers | Github | Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF). | |
| EvilClippy | Github | A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows. | |
| OfficePurge | Github | VBA purge your Office documents with OfficePurge. VBA purging removes P-code from module streams within Office documents. | |
| ThreatCheck | Github | Identifies the bytes that Microsoft Defender / AMSI Consumer flags on. | |
| CrossC2 | Github | Generate CobaltStrike's cross-platform payload. | |
| Ruler | Github | Ruler is a tool that allows you to interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP protocol. | |
| DueDLLigence | Github | Shellcode runner framework for application whitelisting bypasses and DLL side-loading. The shellcode included in this project spawns calc.exe. | |
| RuralBishop | Github | RuralBishop is practically a carbon copy of UrbanBishop by b33f, but all P/Invoke calls have been replaced with D/Invoke. | |
| TikiTorch | Github | TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, allocates a region of memory, then uses CreateRemoteThread to run the desired shellcode within that target process. Both the process and shellcode are specified by the user. | |
| SharpShooter | Github | SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS, VBS and WSF. | |
| SharpSploit | Github | SharpSploit is a .NET post-exploitation library written in C#. | |
| MSBuildAPICaller | Github | MSBuild Without MSBuild.exe. | |
| macro_pack | Github | Macro_pack is a tool used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments. | |
| inceptor | Github | Template-Driven AV/EDR Evasion Framework. | |
| mortar | Github | Evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR). | |
| ProtectMyTooling | Github | Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You feed it with your implant, it does a lot of sneaky things and spits out obfuscated executable. | |
| Freeze | Github | Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods. | |
| pwndrop | Github | Self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV. | |
| C2concealer | Github | Command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. | |
| FindFrontableDomains | Github | Tool to search for potential frontable domains. | |
| Domain Hunter | Github | Checks expired domains for categorization, reputation, and Archive.org history to find good candidates for phishing and C2 domains. | |
| RedWarden | Github | Flexible Cobalt Strike Malleable Redirector. | |
| AzureC2Relay | Github | Azure Function that validates and relays Cobalt Strike beacon traffic based on a Malleable C2 profile. | |
| Chameleon | Github | Tool for evading proxy categorization. | |
| Malleable C2 Design and Reference Guide | Github | Guide for designing and referencing Cobalt Strike Malleable C2 profiles. | |
| redirect.rules | Github | Dynamic generator for redirect.rules to assist in evasion. | |
| CobaltBus | Github | Integration of Cobalt Strike External C2 with Azure Servicebus for C2 traffic. | |
| SourcePoint | Github | C2 profile generator for Cobalt Strike servers designed to ensure evasion. | |
| RedGuard | Github | C2 front flow control tool to evade Blue Teams, AVs, and EDRs. | |
| skyhook | Github | Obfuscated HTTP file transfer setup built to bypass IDS detections. | |
| GraphStrike | Github | Cobalt Strike HTTPS beaconing over Microsoft Graph API. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Mimikatz | Github | Mimikatz is an open-source application that allows users to view and save authentication credentials like Kerberos tickets. | |
| Dumpert | Github | LSASS memory dumper using direct system calls and API unhooking. | |
| CredBandit | Github | CredBandit is a proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that back through your already existing Beacon communication channel. | |
| CloneVault | Github | CloneVault allows a red team operator to export and import entries including attributes from Windows Credential Manager. | |
| SharpLAPS | Github | Retrieve LAPS password from LDAP. | |
| SharpDPAPI | Github | SharpDPAPI is a C# port of some DPAPI functionality from @gentilkiwi's Mimikatz project. | |
| KeeThief | Github | Allows for the extraction of KeePass 2.X key material from memory, as well as the backdooring and enumeration of the KeePass trigger system. | |
| SafetyKatz | Github | SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subtee's .NET PE Loader. | |
| forkatz | Github | Credential dump using forshaw technique using SeTrustedCredmanAccessPrivilege. | |
| PPLKiller | Github | Tool to bypass LSA Protection (aka Protected Process Light). | |
| LaZagne | Github | The LaZagne project is an open-source application used to retrieve lots of passwords stored on a local computer. | |
| AndrewSpecial | Github | AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019. | |
| Net-GPPPassword | Github | .NET implementation of Get-GPPPassword. Retrieves the plaintext password and other information for accounts pushed through Group Policy Preferences. | |
| SharpChromium | Github | .NET 4.0 CLR Project to retrieve Chromium data, such as cookies, history and saved logins. | |
| Chlonium | Github | Chlonium is an application designed for cloning Chromium Cookies. | |
| SharpCloud | Github | SharpCloud is a simple C# utility for checking for the existence of credential files related to Amazon Web Services, Microsoft Azure, and Google Compute. | |
| pypykatz | Github | Mimikatz implementation in pure Python. At least a part of it :) | |
| nanodump | Github | A Beacon Object File that creates a minidump of the LSASS process. | |
| Koh | Github | Koh is a C# and Beacon Object File (BOF) toolset that allows for the capture of user credential material via purposeful token/logon session leakage. | |
| PPLBlade | Github | Protected Process Dumper Tool that supports obfuscating memory dumps and transferring them to remote workstations without dropping them onto the disk. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| PEASS-ng | Github | (Windows, Linux, Mac): PEASS-ng is tools search for local privilege escalation | |
| WLPE | Github | (Windows): Local Privilege Escalation Cookbook | |
| LinWinPwn | Github | (Linux): Swiss-Army knife for Active Directory Pentesting using Linux | |
| PrivescCheck | Github | (Windows): Privilege Escalation Enumeration Script for Windows | |
| ADCPwn | Github | (Linux): A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and relaying to the certificate service. | |
| ElevateKit | Github | (Windows-Linux): The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload. | |
| Checksec.sh | Github | (Linux): Checksec is a bash script to check the properties of executables (like PIE, RELRO, Canaries, ASLR, Fortify Source). | |
| LinEnum | Github | (Linux): Scripted Local Linux Enumeration & Privilege Escalation Checks | |
| pspy: unpriv linux proc snooping | Github | (Linux): pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. | |
| LES | Github | (Linux): LES tool is designed to assist in detecting security deficiencies for a given Linux kernel/Linux-based machine. | |
| linuxprivchecker.py | Wget | (Linux): Linuxprivchecker executed locally on a Linux box to enumerate basic system info and search for common privilege escalation vectors | |
| Watson | Github | (Windows): Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities. | |
| SharpUp | Github | (Windows): SharpUp is a C# port of various PowerUp functionality. Currently, only the most common checks have been ported; no weaponization functions have yet been implemented. | |
| dazzleUP | Github | (Windows): A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. | |
| SweetPotato | Github | (Windows): A collection of various native Windows privilege escalation techniques from service accounts to SYSTEM. | |
| MultiPotato | Github | (Windows): Another Potato to get SYSTEM via SeImpersonate privileges. | |
| KrbRelayUp | Github | (Windows): A universal no-fix local privilege escalation in Windows domain environments where LDAP signing is not enforced (the default settings). | |
| GodPotato | Github | (Windows): As Long as You Have the ImpersonatePrivilege Permission, Then You are the SYSTEM! | |
| PrivKit | Github | (Windows): PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS. | |
| hackshell | Github | (Linux): Make BASH stealthy and hacker friendly with lots of bash functions |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| RefleXXion | Github | RefleXXion is a utility designed to aid in bypassing user-mode hooks utilized by AV/EPP/EDR etc. | |
| EDRSandBlast | Github | EDRSandBlast is a tool written in C that weaponizes a vulnerable signed driver to bypass EDR detections (Kernel callbacks and ETW TI provider) and LSASS protections. | |
| unDefender | Github | Killing your preferred antimalware by abusing native symbolic links and NT paths. | |
| Backstab | Github | A tool to kill antimalware protected processes. | |
| SPAWN - Cobalt Strike BOF | Github | Cobalt Strike BOF that spawns a sacrificial process, injects it with shellcode, and executes payload. | |
| .NET CobaltStrike BOF | Github | BOF.NET is a small native BOF object combined with the BOF.NET managed runtime that enables the development of Cobalt Strike BOFs. | |
| NetLoader | Github | Loads any C# binary from filepath or URL, patching AMSI and bypassing Windows Defender on runtime. | |
| FindObjects-BOF | Github | A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific modules or process handles. | |
| SharpUnhooker | Github | C# Based Universal API Unhooker - Automatically Unhook API Hives (ntdll.dll, kernel32.dll, user32.dll, advapi32.dll, and kernelbase.dll). | |
| EvtMute | Github | Apply a filter to the events being reported by Windows event logging. | |
| InlineExecute-Assembly | Github | InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) | |
| Phant0m | Github | Windows Event Log Killer. | |
| SharpBlock | Github | A method of bypassing EDR's active protection DLLs by preventing entry point execution. | |
| DarkLoadLibrary | Github | LoadLibrary for offensive operations. | |
| KillDefenderBOF | Github | Beacon Object File PoC implementation of KillDefender. | |
| Mangle | Github | Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs. | |
| AceLdr | Github | Cobalt Strike UDRL for memory scanner evasion. | |
| AtomLdr | Github | CA DLL loader with advanced evasive features. | |
| Inline-Execute-PE | Github | Execute unmanaged Windows executables in CobaltStrike Beacons. | |
| SigFlip | Github | SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) without invalidating or breaking the existing signature. | |
| Blackout | Github | Kill anti-malware protected processes (BYOVD). | |
| ShellGhost | Github | A memory-based evasion technique which makes shellcode invisible from process start to end. | |
| PoolPartyBof | Github | A beacon object file implementation of PoolParty Process Injection Technique by @SafeBreach and @0xDeku, that abuses Windows Thread Pools. | |
| EDRSilencer | Github | A tool that uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server. | |
| bincrypter | Github | Pack/Encrypt/Obfuscate ELF + SHELL scripts |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| SharpStay | Github | (windows): .NET project for installing Persistence. | |
| SharPersist | Github | (windows): Windows persistence toolkit written in C#. | |
| SharpHide | Github | (windows): Tool to create hidden registry keys. | |
| DoUCMe | Github | (windows): Leverages the NetUserAdd Win32 API to create a new computer account. | |
| A Black Path Toward The Sun | Github | (web): TCP tunneling over HTTP for web application servers. | |
| pivotnacci | Github | (protocols): A tool to make socks connections through HTTP agents. | |
| DAMP | Github | (host): The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification. | |
| IIS-Raid | Github | (windows): A native backdoor module for Microsoft IIS (Internet Information Services). | |
| SharPyShell | Github | (web): Tiny and obfuscated ASP.NET webshell for C# web applications. | |
| ScheduleRunner | Github | (windows): A C# tool with more flexibility to customize scheduled tasks for both persistence and lateral movement in red team operations. | |
| SharpEventPersist | Github | (windows): Persistence by writing/reading shellcode from Event Log. | |
| Kraken | Github | (web): Kraken, a modular multi-language webshell coded by @secu_x11. | |
| HiddenDesktop | Github | (windows): HVNC for Cobalt Strike BOF. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| impacket | Github | A collection of Python classes for working with network protocols, focusing on low-level access to SMB1-3 and MSRPC. | |
| Liquid Snake | Github | Fileless lateral movement tool using WMI Event Subscriptions and GadgetToJScript. | |
| PowerUpSQL | Github | A PowerShell Toolkit for Attacking SQL Server. | |
| SQLRecon | Github | A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. | |
| SCShell | Github | Fileless lateral movement tool using ChangeServiceConfigA to run commands. | |
| SharpRDP | Github | Remote Desktop Protocol Console Application for Authenticated Command Execution. | |
| MoveKit | Github | An extension of built-in Cobalt Strike lateral movement leveraging SharpMove and SharpRDP .NET assemblies. | |
| SharpNoPSExec | Github | Fileless command execution tool for lateral movement. | |
| Responder/MultiRelay | Github | LLMNR/NBT-NS/mDNS Poisoner and NTLMv1/2 Relay. | |
| Farmer | Github | Project for collecting NetNTLM hashes in a Windows domain. | |
| CIMplant | Github | C# port of WMImplant using CIM or WMI to query remote systems. | |
| PowerLessShell | Github | Relies on MSBuild.exe to remotely execute PowerShell scripts without spawning powershell.exe. | |
| SharpGPOAbuse | Github | Exploits user's edit rights on a Group Policy Object (GPO) to compromise controlled objects. | |
| kerbrute | Github | Tool for bruteforcing and enumerating valid Active Directory accounts through Kerberos Pre-Authentication. | |
| mssqlproxy | Github | Toolkit for lateral movement through a compromised Microsoft SQL Server via socket reuse. | |
| Invoke-TheHash | Github | PowerShell utilities for Pass The Hash techniques. | |
| InveighZero | Github | .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers. | |
| SharpSpray | Github | Windows domain password spraying tool written in .NET C#. | |
| MalSCCM | Github | Abuses SCCM servers to deploy malicious applications to managed hosts. | |
| Coercer | Github | Python script for coercing Windows server authentication on arbitrary machines through multiple methods. | |
| SharpSploit | Github | .NET post-exploitation library for highlighting .NET attack surface and making offensive .NET easier. | |
| orpheus | Github | Bypasses Kerberoast detections with modified KDC options and encryption types. | |
| SharpWSUS | Github | SharpWSUS is a CSharp tool for lateral movement through WSUS. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| HackTheBox | Online Platform | An acclaimed platform where users refine their penetration testing skills by maneuvering through a variety of virtual machines (VMs) primed for exploitation. | |
| TryHackMe | Online Platform | Distinguished for its range of virtual machines, TryHackMe is a popular platform catering to all expertise levels. | |
| Root-Me | Online Platform | Root-Me covers diverse domains like web application security, cryptography, and reverse engineering. | |
| PentesterLab | Online Platform | This platform specializes in web application security challenges, serving as an adept learning ground for both novices and experts. | |
| VulnHub | Offline Platform | Offering an extensive collection of real-world scenario-based VMs, VulnHub invites users to explore and exploit. | |
| OverTheWire | Online Platform | Known for its assorted challenges spanning network security, cryptography, and web exploitation. | |
| picoCTF | Online Platform | A free online platform focused on computer security, cryptography, reverse engineering, and web exploitation. | |
| 0x0539 | Online Platform | Online CTF challenges. | |
| 247CTF | Online Platform | Free Capture The Flag Hacking Environment. | |
| Archive.ooo | Online Platform | Live, playable archive of DEF CON CTF challenges. | |
| Atenea | Online Platform | Spanish CCN-CERT CTF platform. | |
| CTFlearn | Online Platform | Online platform built to help ethical hackers learn, practice, and compete. | |
| CTF365 | Online Platform | Security Training Platform. | |
| Crackmes.One | Online Platform | Reverse Engineering Challenges. | |
| CryptoHack | Online Platform | Cryptography Challenges. | |
| Cryptopals | Online Platform | Cryptography Challenges. | |
| Defend the Web | Online Platform | An Interactive Cyber Security Platform. | |
| Dreamhack.io | Online Platform | Online wargame. | |
| echoCTF.RED | Online Platform | Online Hacking Laboratories. | |
| Flagyard | Online Platform | An Online Playground of Hands-on Cybersecurity Challenges. | |
| HackBBS | Online Platform | Online wargame. | |
| Hacker101 | Online Platform | CTF Platform by HackerOne. | |
| Hackropole | Online Platform | This platform allows you to replay the challenges of the France Cybersecurity Challenge. | |
| HackThisSite | Online Platform | Free, safe and legal training ground for hackers. | |
| HBH | Online Platform | Community designed to teach methods and tactics used by malicious hackers to access systems and sensitive information. | |
| Komodo | Online Platform | This is a game designed to challenge your application hacking skills. | |
| MicroCorruption | Online Platform | Embedded Security CTF. | |
| MNCTF | Online Platform | Online cybersecurity challenges. | |
| Pwn.college | Online Platform | Education platform to learn about, and practice, core cybersecurity concepts. | |
| PWN.TN | Online Platform | Educational and non-commercial wargame. | |
| Pwnable.kr | Online Platform | Pwn/Exploiting platform. | |
| Pwnable.tw | Online Platform | Pwn/Exploiting platform. | |
| Pwnable.xyz | Online Platform | Pwn/Exploiting platform. | |
| Reversing.kr | Online Platform | Reverse Engineering platform. | |
| VibloCTF | Online Platform | CTF training platform. | |
| W3Challs | Online Platform | Hacking/CTF platform. | |
| Hacking-Lab | Online Platform | Offering a blend of challenges and competitions mirroring real-world scenarios | |
| DVWA | Offline Platform | An intentionally vulnerable web application designed for honing web application security skills. | |
| WebGoat | Ofline Platform | Another deliberately vulnerable web application designed for hands-on teaching of web application security. | |
| OWASP Juice Shop | Ofline Platform | OWASP Juice Shop: Probably the most modern and sophisticated insecure web application |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Moukthar RAT | Github | Android remote administration tool | |
| APKDeepLens | Github | APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities | |
| Apktool | Website | A tool for reverse engineering Android apk files. | |
| Apk2url | Github | An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling | |
| DroidLysis | Github | Property extractor for Android apps | |
| Drozer | Github | drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Android Runtime, other apps' IPC endpoints and the underlying OS. | |
| apkmonk | Website | Download APK from Desktop browser | |
| APKleaks | Website | Scanning APK file for URIs, endpoints & secrets. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Chisel | Github | Fast TCP/UDP tunnel transported over HTTP, secured via SSH. Single executable includes both client and server. | |
| Ligolo-ng | Github | An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface. | |
| frp | Github | Fast reverse proxy for exposing a local server behind a NAT or firewall to the Internet. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Privacy.sexy | Website Github | (Windows, Linux, macOS): An online/offline and open-source tool that can clean up logs and personal activities. | |
| moonwalk | Github | (Linux): Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. | |
| Auditpol | Website | (Windows): Microsoft tool to manipulate audit policies. |
client-server, redirectors, BoF, container, provisioning, workflow, cloud, local, configuration, shops, domain, VPS
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Metasploit | Github | Computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. | |
| Cobalt Strike | Website | Software for Adversary Simulations and Red Team Operations (commercial). | |
| Sliver | Github | General purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. | |
| Havoc c2 | Github | Havoc is a modern and malleable post-exploitation command and control framework, created by @C5pider (most suggested if you dont have cobalt-strike). | |
| Empire | Github | Post-exploitation framework that includes a pure-PowerShell2.0 Windows agent, and a pure Python 2.6/2.7 Linux/OS X agent. | |
| Villain C2 Framework | Github | Villain is a high level C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells . | |
| Pupy | Github | Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python. | |
| Merlin | Github | Cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang. | |
| GC2-sheet | Github | GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive. | |
| brute ratel | Website | A Customized Command and Control Center for Red Team and Adversary Simulation (commercial) | |
| mythic | Github | Cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. | |
| AsyncRat C# | Github | Remote Access Tool designed to remotely monitor and control other computers through a secure encrypted connection. | |
| Baby Shark | Github | Basic C2 generic server written in Python and Flask. | |
| C3 | Github | Framework that extends other red team tooling, such as the commercial Cobalt Strike (CS) product via ExternalC2, which is supported at release. | |
| Caldera | Github | Built on the MITRE ATT&CK™ framework and an active research project at MITRE. | |
| CHAOS | Github | PoC that allows payloads generation and control of remote operating systems. | |
| Dali | Github | Image-based C2 channel which utilizes Imgur to host images and task agents. | |
| Covenant | Github | .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. | |
| Silent Trinity | Github | Post-exploitation agent powered by Python, IronPython, C#/.NET. | |
| Faction C2 | Github | C2 framework which uses websockets based API that allows for interacting with agents and transports. | |
| Godoh | Github | godoh is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. | |
| iBombshell | Github | Tool to deploy a post-exploitation prompt at any time | |
| HARS | Github | HTTP/S Asynchronous Reverse Shell. | |
| Ninja | Github | Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs. | |
| NorthStarC2 | Github | Open-source command and control framework developed for penetration testing and red teaming purposes. | |
| EvilOSX | Github | An evil RAT (Remote Administration Tool) for macOS / OS X. | |
| Nuages | Github | A modular C2 framework | |
| Octopus | Github | Open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP/S. | |
| PoshC2 | Github | Proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. | |
| Powerhub | Github | Convenient post exploitation tool for PowerShell which aids a pentester in transferring data, in particular code which may get flagged by endpoint protection. | |
| Prismatica | Github | Modular C2 Interface hooked into the Diagon Command and Control Toolkit. | |
| QuasarRAT | Github | Fast and light-weight remote administration tool coded in C#. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you. | |
| Trevor C2 | Github | Legitimate website (browsable) that tunnels client/server communications for covert command execution. | |
| Meterpreter | Github | C2 Powershell Command & Control Framework with BuiltIn Commands | |
| ReverseTCPShell | Github | PowerShell ReverseTCP Shell - Framework. | |
| SHAD0W | Github | Modular C2 framework designed to use a range of methods to evade EDR and AV. | |
| Gcat | Github | Stealthy Python based backdoor that uses Gmail as a command and control server. | |
| Cloudflare redirector | Github | (redirector): command and control Redirector using CloudFlare | |
| RedCaddy | Github | (redirector): Block IP by GEOIP country, Allow requests by header matcher, User-agent & IP blacklist, Support multiple redirection, TeamServer port warden | |
| c2-redirectors | Github | (redirector): Automate c2 redirector deployments. | |
| RedGuard | Github | (redirector): RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check. |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| PyExfil | GitHub | (protocols) - Python tool for exfiltration using different protocols including HTTP, FTP, DNS, ICMP, and custom TCP/UDP. | |
| CovertUtils | GitHub | (protocols) - Tools for covert communication over various protocols including HTTP, ICMP, DNS, and more. | |
| DNSExfiltrator | GitHub | (protocols) - Data exfiltration over DNS request covert channel | |
| Egress-Assess | GitHub | (protocols) - Egress-Assess is a tool used to test egress data detection capabilities | |
| PacketWhisper | GitHub | (protocols) - Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. | |
| Tunna | GitHub | (protocols) - Network tunneling tool that uses HTTP/HTTPS for data exfiltration. | |
| Badcookie | GitHub | (base64) - exfiltrates d ata via base64 encoded HTTP cookies. | |
| Powershell-RAT | GitHub | (e-mail) - Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment. | |
| StegCloak | GitHub | (encrypted-data) - Hide secrets with invisible characters in plain text securely using password-based encryption. | |
| Iodine | GitHub | (protocols) - Tunnel IPv4 data through a DNS server. It allows you to send data between systems that are behind firewalls. | |
| WebExfil | GitHub | (protocols) - A tool for data exfiltration through HTTP and HTTPS connections. | |
| Dnscat2 | GitHub | (protocols) - A DNS covert channel tool that can send data between a client and a server using DNS requests and responses. | |
| SMBetray | GitHub | (protocols) - A tool to exfiltrate data over SMB protocol. |
static anaylsis, source code analysis/review, debugging and etc.
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Ghidra | Website | (Disassemblers & Decompilers): Open-source reverse engineering tool developed by NSA | |
| IDA Pro | Website | (Disassemblers): Interactive DisAssembler with a powerful analysis engine | |
| ImHex | Github | (HexEditor): a tool to display, decode and analyze binary data to reverse engineer their format, extract informations and etc. | |
| pwndbg | Github | (Debuggers): Exploit Development and Reverse Engineering with GDB Made Easy | |
| x64dbg | Website | (Debugging): Open-source x64/x32 debugger for Windows | |
| objdump | Website | (Disassemblers): Utility to display information from object files | |
| gdb | Website | (Debugging): GNU Debugger for various programming languages | |
| HxD | Website | (Hex Editor): Hex and Disk Editor | |
| 010 Editor | Website | (Hex Editor): Advanced Hex Editor with Template System | |
| Hex Workshop | Website | (Hex Editor): Hexworkshop is and hex editor with Advanced Features | |
| HexFiend | Website | (Hex Editor): Hex edit for macOS | |
| Hiew | Website | (Hex Editor) hex and Disassembler | |
| Binary Ninja | Website | (Disassemblers): Modern binary analysis platform with a focus on usability | |
| JEB | Website | (Disassemblers): Decompiler and reverse engineering framework for Android and more | |
| Radare | Website | (Disassemblers): Open-source framework for reverse engineering and binary analysis | |
| Hopper | Website | (Disassemblers): Disassembler and decompiler for macOS and Linux | |
| Capstone | Website | (Disassemblers): Multi-architecture disassembly framework | |
| Retdec | Website | (Disassemblers): Retargetable decompiler with support for multiple architectures | |
| Snowman | Website | (Disassemblers): decompilers and reverse engineering tool | |
| Bytecode Viewer | Website | (Bytecode Analysis): Tool for viewing and analyzing Java bytecode | |
| JPEXS Flash Decompiler | Website | (Bytecode Analysis): Decompiler for Flash (SWF) files | |
| WinDbg | Website | (Debugging): Powerful debugger for Windows from Microsoft | |
| vdb | Github | (Debugging): Debugger and disassembler library | |
| lldb | Website | (Debugging): Debugger from the LLVM project | |
| qira | Website | (Debugging): Dynamic binary analysis tool | |
| ILSpy | Github | (Decompiler): ILSpy is the open-source .NET assembly browser and decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform! | |
| JWT | Website | (Debugger/Decoder): JWT.IO allows you to decode, verify and generate JSON Web Tokens. | |
| unicorn | Github | (Debugging): Lightweight multi-platform, multi-architecture CPU emulator |
| IMAGE | NAMES | LINKS | DESCRIPTIONS |
|---|---|---|---|
| Process Monitor | Website | (Dynamic Analysis - Windows): Process Monitor is an advanced monitoring tool for Windows that shows real-time file system, Registry and process/thread activity. | |
| ProcessHacker | Website | (Dynamic Analysis - Windows ): Powerful tool for viewing and managing processes | |
| Process Explorer | Website | (Dynamic Analysis - Windows): Advanced process management tool from Microsoft | |
| systinternals | Website | (Dynamic Analysis - Windows): Sysinternals Live is a service that enables you to run Sysinternals tools directly from the Web without manually downloading them. | |
| TcpView | Website | (Dynamic Analysis - Windows): TCPView is a Windows program that will show you detailed listings of all TCP and UDP endpoints on your system. | |
| Autoruns | Website | (Dynamic Analysis): Shows which programs are configured to run at system boot | |
| Noriben | Github | (Sandbox): Malware analysis sandbox tool | |
| API Monitor | Website | (Dynamic Analysis): Tool for monitoring API calls and other system interactions | |
| iNetSim | Website | (Dynamic Analysis): Network simulation tool for malware analysis | |
| Virustotal | Website | (Behavior Analysis): Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community. | |
| Cuckoo | Website | (Sandbox): Automated malware analysis system | |
| Joesandbox | Website | (Sandbox): Automated malware analysis system, detects and analyzes potential malicious files and URLs on Windows, Mac OS, and Linux for suspicious activities. | |
| Anyrun | Website | (Sandbox/Commercial): Interactive malware Hunting service, Innovative cloud-based sandbox with full interactive access, Track behavior activities | |
| triage | Website | (Sandbox): Analyze malware samples free. A state-of-the–art malware analysis sandbox, with all the features you need. | |
| Intezer Analyze | Website | (Sandbox): The Autonomous SOC platform triages alerts and investigates incidents for your team 24/7. Using AI-powered analysis, smart recommendations, and auto remediation ... |
| IMAGE | NAME | Category | LINKS | DESCRIPTION |
|---|---|---|---|---|
| Hashes | Password Cracking | Website | Decrypt MD5, SHA1, MySQL, NTLM, SHA256, MD5 Email, SHA256 Email, SHA512 hashes | |
| Crackingstation | Password Cracking | Website | CrackStation uses massive pre-computed lookup tables to crack password hashes. |
| IMAGE | NAME | Category | LINKS | DESCRIPTION |
|---|---|---|---|---|
| OpenSSL | Cross Platform | Website | Toolkit for SSL/TLS protocols, can also be used for data encryption. | |
| VeraCrypt | Cross Platform | Website | Disk encryption software that encrypts entire drives or creates encrypted virtual disks. | |
| KeePass | Cross Platform | Website | Free and open-source password manager that can securely store and encrypt sensitive information. | |
| TAR | Cross-Platform | Website | Archiving utility that can be used with encryption methods to protect files. | |
| RAR | Cross-Platform | Website | Archiving tool with built-in encryption for compressing and securing files. | |
| BitLocker | Windows | Website | Disk encryption program included with Microsoft Windows that encrypts entire volumes. | |
| Gpg4win | Windows | Website | Suite of encryption tools for Windows, including GPG for securing files and communications. | |
| Cryptsetup | Linux | Website | Command-line tool to manage disk encryption using LUKS. | |
| OpenSSH | Cross-Platform | Website | Suite of secure networking utilities based on the SSH protocol, including secure file transfers. | |
| AxCrypt | Windows | Website | File encryption software providing AES-128 or AES-256 encryption. | |
| 7-Zip | Cross Platform | Website | File archiver with encryption capabilities using AES-256. | |
| GPG (GNU Privacy Guard) | Cross Platform | Website | Open-source encryption tool for encrypting files and communications. | |
| Cryptomator | Cross Platform | Website | Open-source tool for encrypting files in the cloud, providing client-side encryption. | |
| FileVault | macOS | Website | Built-in disk encryption program for macOS that encrypts the entire startup disk. |
| IMAGE | NAME | LINKS | DESCRIPTION |
|---|---|---|---|
| Public Pentest Reports (PDF) | GitHub | A list of public penetration test reports published by several consulting firms and academic security groups. | |
| APTRS | GitHub | APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. | |
| AttackForge | Website | AttackForge helps you manage your penetration testing programs, and deliver large-scale pentesting services. | |
| Cyver Core | Website | Change the way you deliver pentests, with cloud pentest management tools, complete with automated reporting & everything you need to deliver Pentest-as-a-Service. | |
| Dradis Framework | Website | Dradis is an open-source reporting and collaboration tool trusted by 1,000s of InfoSec professionals around the world. | |
| FACTION | Website | PenTesting Report Generation and Collaboration Framework | |
| Faraday | Website | Faraday normalizes, tracks, and identifies assets and vulnerability data coming from more than +80 security tools. | |
| HaxHQ | Website | Fast and easy to use, with PingCastle support, streamlined library and an integrated CA for client certificate authentication. | |
| Hexway Hive & Apiary | Website | Hive is the ultimate solution to bring penetration testing to the next level. | |
| Pentest-Collaboration-Framework | GitLab | Opensource, cross-platform and portable toolkit for automating routine processes when carrying out various works for testing! | |
| PeTeReport | GitHub | PeTeReport (PenTest Report) is an open-source application vulnerability reporting tool designed to assist pentesting/redteaming. | |
| PlexTrac | Website | PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs. | |
| PwnDoc | GitHub | PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx report. | |
| Reconmap | GitHub | Reconmap is an open-source penetration testing and report generation tool for Infosec teams | |
| reNgine | GitHub | reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process. | |
| Reporter | Website | Reporter is an all-in-one pentest reporting workspace to boost quality and efficiency to a higher level with collaboration tools | |
| SysReptor | GitHub | Easy pentest reporting tool to write findings in markdown, design and customize reports in HTML and VueJS, render to PDF. | |
| VULNRΞPO | GitHub | Free vulnerability report generator and repository end-to-end encrypted. | |
| WriteHat | GitHub | A pentest reporting tool written in Python. Free yourself from Microsoft Word. |