Files
libertytoolsio/public/hacking/index.html

1872 lines
85 KiB
HTML
Raw Normal View History

2026-03-16 23:07:23 +00:00
<!DOCTYPE html>
<html lang="en-us" dir="ltr">
<head><script src="/livereload.js?mindelay=10&amp;v=2&amp;port=1313&amp;path=livereload" data-no-instant defer></script>
2026-03-16 23:07:23 +00:00
<!--
Made with Book Theme
https://github.com/alex-shpak/hugo-book
-->
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content=" The truth is revealed by removing things that stand in its light, an art not unlike sculpture, in which the artist creates, not by building, but by hacking away. - Alan Watts
Welcome to the Hacking section of Liberty tools! Hacking should be used to increase your knowledge and harden your defenses. Please use these tools responsibly.
Anonymity# BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.
2026-03-16 23:07:23 +00:00
">
<meta name="theme-color" media="(prefers-color-scheme: light)" content="#ffffff">
<meta name="theme-color" media="(prefers-color-scheme: dark)" content="#343a40">
<meta name="color-scheme" content="light dark"><meta property="og:url" content="http://localhost:1313/hacking/">
2026-03-16 23:07:23 +00:00
<meta property="og:title" content="Hacking">
<meta property="og:description" content="“The truth is revealed by removing things that stand in its light, an art not unlike sculpture, in which the artist creates, not by building, but by hacking away. - Alan Watts
Welcome to the Hacking section of Liberty tools! Hacking should be used to increase your knowledge and harden your defenses. Please use these tools responsibly.
Anonymity# BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.">
2026-03-16 23:07:23 +00:00
<meta property="og:locale" content="en_us">
<meta property="og:type" content="article">
<meta itemprop="name" content="Hacking">
<meta itemprop="description" content="“The truth is revealed by removing things that stand in its light, an art not unlike sculpture, in which the artist creates, not by building, but by hacking away. - Alan Watts
Welcome to the Hacking section of Liberty tools! Hacking should be used to increase your knowledge and harden your defenses. Please use these tools responsibly.
Anonymity# BinGoo - GNU/Linux bash based Bing and Google Dorking Tool.">
<meta itemprop="wordCount" content="4948">
2026-03-16 23:07:23 +00:00
<title>Hacking | </title>
<link rel="icon" href="/favicon.png" >
<link rel="manifest" href="/manifest.json">
<link rel="canonical" href="http://localhost:1313/hacking/">
<link rel="stylesheet" href="/book.min.0edbfa12be0756ec13c02ec8218ae882d32e82be873db98b790ade0a47d58b55.css" integrity="sha256-Dtv6Er4HVuwTwC7IIYrogtMugr6HPbmLeQreCkfVi1U=" crossorigin="anonymous">
2026-03-16 23:07:23 +00:00
<script defer src="/fuse.min.js"></script>
<script defer src="/en.search.min.2d00ab2fa395f1ce09fac9ceac13157e5c77c5a675f0c697a3ac191f5e304c9f.js" integrity="sha256-LQCrL6OV8c4J&#43;snOrBMVflx3xaZ18MaXo6wZH14wTJ8=" crossorigin="anonymous"></script>
2026-03-16 23:07:23 +00:00
</head>
<body dir="ltr" class="book-kind-page book-type-page">
2026-03-16 23:07:23 +00:00
<input type="checkbox" class="hidden toggle" id="menu-control" />
<input type="checkbox" class="hidden toggle" id="toc-control" />
<main class="container flex">
<aside class="book-menu">
<div class="book-menu-content">
2026-03-16 23:07:23 +00:00
<nav>
<h2 class="book-brand">
<a class="flex align-center" href="/"><img src="/logo.jpg" alt="Logo" /><span></span>
</a>
</h2>
<link href="/pagefind/pagefind-ui.css" rel="stylesheet">
<script src="/pagefind/pagefind-ui.js"></script>
<div id="search"></div>
<script>
window.addEventListener('DOMContentLoaded', (event) => {
new PagefindUI({ element: "#search", showSubResults: true });
});
</script>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<a href="/affiliates/" class="">
Affiliates</a>
</li>
<li>
<a href="/agorism/" class="">
Agorism</a>
</li>
<li>
<a href="/books/" class="">
Books</a>
</li>
<li>
<a href="/covid/" class="">
Covid</a>
</li>
<li>
<a href="/deathathletes/" class="">
Death Athletes</a>
</li>
<li>
<a href="/defense/" class="">
Defense</a>
</li>
<li>
<a href="/education/" class="">
Education</a>
</li>
<li>
<a href="/frontends/" class="">
Front Ends</a>
</li>
<li>
<a href="/hacking/" class="active">
Hacking</a>
</li>
<li>
<a href="/health/" class="">
Health</a>
</li>
<li>
<a href="/job-boards/" class="">
Job Boards</a>
</li>
<li>
<a href="/metrics/" class="">
Metrics</a>
</li>
<li>
<a href="/money/" class="">
Money</a>
</li>
<li>
<a href="/organizations/" class="">
Organizations</a>
</li>
<li>
<a href="/osint/" class="">
OSINT</a>
</li>
<li>
<a href="/political-tools/" class="">
Political</a>
</li>
<li>
<a href="/privacy/" class="">
Privacy</a>
</li>
<li>
<a href="/self-hosting/" class="">
Self Hosting</a>
</li>
<li>
<a href="/social-media/" class="">
Social Media</a>
</li>
</ul>
</nav>
<script>(function(){var e=document.querySelector("aside .book-menu-content");addEventListener("beforeunload",function(){localStorage.setItem("menu.scrollTop",e.scrollTop)}),e.scrollTop=localStorage.getItem("menu.scrollTop")})()</script>
</div>
</aside>
2026-03-16 23:07:23 +00:00
<div class="book-page">
<header class="book-header hidden">
2026-03-16 23:07:23 +00:00
<div class="flex align-center justify-between">
<label for="menu-control">
<img src="/icons/menu.svg" class="book-icon" alt="Menu" />
</label>
<h3>Hacking</h3>
<label for="toc-control">
<img src="/icons/toc.svg" class="book-icon" alt="Table of Contents" />
</label>
</div>
<aside class="hidden">
2026-03-16 23:07:23 +00:00
<nav id="TableOfContents">
<ul>
<li>
<ul>
<li><a href="#anonymity"><strong>Anonymity</strong></a></li>
<li><a href="#bug-bounty-platforms">Bug Bounty Platforms</a></li>
<li><a href="#ctfcapture-the-flag"><strong>CTF(Capture the flag)</strong></a></li>
<li><a href="#ddos"><strong>DDoS</strong></a></li>
<li><a href="#defense-evasion"><strong>Defense Evasion</strong></a></li>
<li><a href="#defcon-suggested-reading"><strong>Defcon Suggested Reading</strong></a></li>
<li><a href="#email-spoofing">Email Spoofing</a></li>
<li><a href="#exploit-development"><strong>Exploit Development</strong></a></li>
<li><a href="#file-format-analysis"><strong>File Format Analysis</strong></a></li>
<li><a href="#forensics">Forensics</a></li>
<li><a href="#gnulinux-utilities"><strong>GNU/Linux Utilities</strong></a></li>
<li><a href="#hacking-focused-osint"><strong>Hacking Focused OSINT</strong></a></li>
<li><a href="#hacking-conventions">Hacking Conventions</a></li>
<li><a href="#hash-cracking"><strong>Hash Cracking</strong></a></li>
<li><a href="#hex-editors"><strong>Hex Editors</strong></a></li>
<li><a href="#information-security-magazines"><strong>Information Security Magazines</strong></a></li>
<li><a href="#lock-picking-resources"><strong>Lock Picking Resources</strong></a></li>
<li><a href="#macos-utilities"><strong>macOS Utilities</strong></a></li>
<li><a href="#multi-paradigm-frameworks"><strong>Multi-paradigm Frameworks</strong></a></li>
<li><a href="#network-tools"><strong>Network Tools</strong></a></li>
<li><a href="#operating-systems"><strong>Operating Systems</strong></a></li>
<li><a href="#physical-hacking-tools">Physical Hacking Tools</a></li>
</ul>
</li>
<li><a href="#penetration-testing-resources">Penetration Testing Resources</a>
<ul>
<li><a href="#pentest-tools">Pentest Tools</a></li>
<li><a href="#penetration-testing-distributions"><strong>Penetration Testing Distributions</strong></a></li>
<li><a href="#docker-for-penetration-testing"><strong>Docker for Penetration Testing</strong></a></li>
<li><a href="#penetration-testing-report-templates"><strong>Penetration Testing Report Templates</strong></a></li>
<li><a href="#ransomware-recovery">Ransomware Recovery</a></li>
<li><a href="#reverse-engineering-tools"><strong>Reverse Engineering Tools</strong></a></li>
<li><a href="#security-courses">Security Courses</a></li>
<li><a href="#side-channel-tools"><strong>Side-channel Tools</strong></a></li>
<li><a href="#social-engineering"><strong>Social Engineering</strong></a></li>
<li><a href="#static-analyzers"><strong>Static Analyzers</strong></a></li>
<li><a href="#transport-layer-security-tools"><strong>Transport Layer Security Tools</strong></a></li>
<li><a href="#tools-lists-tutorials-etc"><strong>Tools, Lists, Tutorials etc.</strong></a></li>
<li><a href="#virtual-machines-labs"><strong>Virtual Machines Labs</strong></a></li>
<li><a href="#vulnerability-databases"><strong>Vulnerability Databases</strong></a></li>
<li><a href="#vulnerability-scanners"><strong>Vulnerability Scanners</strong></a></li>
<li><a href="#web-exploitation"><strong>Web Exploitation</strong></a></li>
<li><a href="#web-scanners"><strong>Web Scanners</strong></a></li>
<li><a href="#windows-utilities"><strong>Windows Utilities</strong></a></li>
<li><a href="#wireless-network-hacking"><strong>Wireless Network Hacking</strong></a></li>
</ul>
</li>
</ul>
</nav>
</aside>
</header>
<article class="markdown book-article"></br>
<p><img src="/Images/Headers/Hacking.jpg" alt="Horizpontal.jpeg" /></p>
2026-03-16 23:07:23 +00:00
</br>
<p><em>&ldquo;The truth is revealed by removing things that stand in its light, an art not unlike sculpture, in which the artist creates, not by building, but by hacking away.&rdquo; - Alan Watts</em></p>
<p>Welcome to the Hacking section of Liberty tools! Hacking should be used to increase your knowledge and harden your defenses. Please use these tools responsibly.</p>
<hr>
<h3 id="anonymity"><strong>Anonymity</strong><a class="anchor" href="#anonymity">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/Hood3dRob1n/BinGoo"><strong>BinGoo</strong></a> - GNU/Linux bash based Bing and Google Dorking Tool.</p>
</li>
<li>
<p><a href="https://www.censys.io/"><strong>Censys</strong></a> - Collects data on hosts and websites through daily ZMap and ZGrab scans.</p>
</li>
<li>
<p><a href="https://github.com/ilektrojohn/creepy"><strong>creepy</strong></a> - Geolocation OSINT tool.</p>
</li>
<li>
<p><a href="https://github.com/jgor/dork-cli"><strong>dork-cli</strong></a> - Command line Google dork tool.</p>
</li>
<li>
<p><a href="https://github.com/DanMcInerney/fast-recon"><strong>Fast-recon</strong></a> - Perform Google dorks against a domain.</p>
</li>
<li>
<p><a href="https://github.com/k3170makan/GooDork"><strong>GooDork</strong></a> - Command line Google dorking tool.</p>
</li>
<li>
<p><a href="https://www.exploit-db.com/google-hacking-database"><strong>Google Hacking Database</strong></a> - Database of Google dorks; can be used for recon.</p>
</li>
<li>
<p><a href="https://github.com/JohnTroony/Google-dorks"><strong>Google-dorks</strong></a> - Common Google dorks and others you probably dont know.</p>
</li>
<li>
<p><a href="https://geti2p.net/"><strong>I2P</strong></a> - The Invisible Internet Project.</p>
</li>
<li>
<p><a href="http://www.paterva.com/web7/"><strong>Maltego</strong></a> - One of the Hacking Tools and Proprietary software for open source intelligence and forensics, from Paterva.</p>
</li>
<li>
<p><a href="https://github.com/laramies/metagoofil"><strong>metagoofil</strong></a> - Metadata harvester.</p>
</li>
<li>
<p><a href="https://github.com/GouveaHeitor/nipe"><strong>Nipe</strong></a> - Script to redirect all traffic from the machine to the Tor network.</p>
</li>
<li>
<p><a href="https://onionscan.org/"><strong>OnionScan</strong></a> - One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.</p>
</li>
<li>
<p><a href="https://github.com/lanmaster53/recon-ng"><strong>recon-ng</strong></a> - One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.</p>
</li>
<li>
<p><a href="https://github.com/Smaash/snitch"><strong>snitch</strong></a> - Information gathering via dorks.</p>
</li>
<li>
<p><a href="http://www.spiderfoot.net/"><strong>Spiderfoot</strong></a> - Multi-source OSINT automation tool with a Web UI and report visualizations.</p>
</li>
<li>
<p><a href="https://github.com/laramies/theHarvester"><strong>theHarvester</strong></a> - E-mail, subdomain and people names harvester.</p>
</li>
<li>
<p><a href="https://www.torproject.org/"><strong>Tor</strong></a> - Free software and onion routed overlay network that helps you defend against traffic analysis.</p>
</li>
<li>
<p><a href="https://www.virustotal.com/"><strong>Virus Total</strong></a> - VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.</p>
</li>
<li>
<p><a href="http://webkay.robinlinus.com/"><strong>What Every Browser Knows About You</strong></a> - Comprehensive detection page to test your own Web browsers configuration for privacy and identity leaks.</p>
</li>
<li>
<p><a href="https://www.zoomeye.org/"><strong>ZoomEye</strong></a> - Search engine for cyberspace that lets the user find specific network components.</p>
</li>
</ul>
<hr>
<h3 id="bug-bounty-platforms">Bug Bounty Platforms<a class="anchor" href="#bug-bounty-platforms">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://www.bugcrowd.com/bug-bounty-list/"><strong>Bugcrowd List</strong></a> - List of many companies that provide bug bounties.</li>
</ul>
<hr>
<h3 id="ctfcapture-the-flag"><strong>CTF(Capture the flag)</strong><a class="anchor" href="#ctfcapture-the-flag">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/zardus/ctf-tools"><strong>Ctf-tools</strong></a> - Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.</p>
</li>
<li>
<p><a href="https://github.com/Gallopsled/pwntools"><strong>Pwntools</strong></a> - Rapid exploit development framework built for use in CTFs.</p>
</li>
<li>
<p><a href="https://github.com/sourcekris/RsaCtfTool"><strong>RsaCtfTool</strong></a> - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.</p>
</li>
</ul>
<hr>
<h3 id="ddos"><strong>DDoS</strong><a class="anchor" href="#ddos">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://sourceforge.net/projects/high-orbit-ion-cannon/"><strong>HOIC</strong></a> - Updated version of Low Orbit Ion Cannon, has boosters to get around common counter measures.</p>
</li>
<li>
<p><a href="http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html"><strong>JS LOIC</strong></a> - JavaScript in-browser version of LOIC.</p>
</li>
<li>
<p><a href="https://github.com/NewEraCracker/LOIC/"><strong>LOIC</strong></a> - Open source network stress tool for Windows.</p>
</li>
<li>
<p><a href="https://github.com/gkbrk/slowloris"><strong>SlowLoris</strong></a> - DoS tool that uses low bandwidth on the attacking side.</p>
</li>
<li>
<p><a href="https://sourceforge.net/projects/t50/"><strong>T50</strong></a> - Faster network stress tool.</p>
</li>
<li>
<p><a href="https://github.com/epsylon/ufonet"><strong>UFONet</strong></a> - Abuses OSI layer 7 HTTP to create/manage zombies and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.</p>
</li>
</ul>
<hr>
<h3 id="defense-evasion"><strong>Defense Evasion</strong><a class="anchor" href="#defense-evasion">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/govolution/avet"><strong>AntiVirus Evasion Tool (AVET)</strong></a> - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.</p>
</li>
<li>
<p><a href="http://nullsecurity.net/tools/binary.html"><strong>Hyperion</strong></a> - Runtime encryptor for 32-bit portable executables (“PE .exes”).</p>
</li>
<li>
<p><a href="https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/"><strong>PeCloak.py</strong></a> - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.</p>
</li>
<li>
<p><a href="https://github.com/v-p-b/peCloakCapstone"><strong>PeCloakCapstone</strong></a> - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.</p>
</li>
<li>
<p><a href="https://github.com/Exploit-install/UniByAv"><strong>UniByAv</strong></a> - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.</p>
</li>
<li>
<p><a href="https://github.com/Veil-Framework/Veil"><strong>Veil</strong></a> - Generate metasploit payloads that bypass common anti-virus solutions.</p>
</li>
</ul>
<hr>
<h3 id="defcon-suggested-reading"><strong>Defcon Suggested Reading</strong><a class="anchor" href="#defcon-suggested-reading">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://www.defcon.org/html/links/book-list.html"><strong>Defcon Suggested Reading</strong></a></li>
</ul>
<hr>
<h3 id="email-spoofing">Email Spoofing<a class="anchor" href="#email-spoofing">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://www.spoofbox.com"><strong>SpoofBox</strong></a> - Offers email, SMS, Phone spoofing and lots of other tools. Not a free service. Can also be used to look up phone numbers.</li>
</ul>
<hr>
<h3 id="exploit-development"><strong>Exploit Development</strong><a class="anchor" href="#exploit-development">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/"><strong>Exploit Writing Tutorials</strong></a> - Tutorials on how to develop exploits.</p>
</li>
<li>
<p><a href="http://shell-storm.org/shellcode/"><strong>Shellcode Examples</strong></a> - Shellcodes database.</p>
</li>
<li>
<p><a href="http://www.vividmachines.com/shellcode/shellcode.html"><strong>Shellcode Tutorial</strong></a> - Tutorial on how to write shellcode.</p>
</li>
</ul>
<hr>
<h3 id="file-format-analysis"><strong>File Format Analysis</strong><a class="anchor" href="#file-format-analysis">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://hachoir3.readthedocs.io/"><strong>Hachoir</strong></a> - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.</p>
</li>
<li>
<p><a href="http://kaitai.io/"><strong>Kaitai Struct</strong></a> - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.</p>
</li>
<li>
<p><a href="https://codisec.com/veles/"><strong>Veles</strong></a> - Binary data visualization and analysis tool.</p>
</li>
</ul>
<hr>
<h3 id="forensics">Forensics<a class="anchor" href="#forensics">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.autopsy.com/"><strong>Autopsy</strong></a> - Full suite of open source forensics tools.</p>
</li>
<li>
<p><a href="https://forensictools.dev/listing/caine/"><strong>CAINE</strong></a> - CAINE is Linux Live CD that contains a wealth of digital forensic tools. Features include a user-friendly GUI, semi-automated report creation and tools for Mobile Forensics, Network Forensics, Data Recovery and more.</p>
</li>
<li>
<p><a href="https://www.exterro.com/ftk-imager"><strong>FTK Imager</strong></a> - Open Source Disk imaging tool.</p>
</li>
<li>
<p><a href="https://sumuri.com/product-category/brands/paladin/"><strong>Paladin Forensic Suite</strong></a> - Live Ubuntu distro with lots of tools. Open source with free and paid versions.</p>
</li>
<li>
<p><a href="https://www.sans.org/tools/sift-workstation/"><strong>SIFT Workstation</strong></a> - The SIFT Workstation is a collection of free and open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings, all built inside an Ubuntu VM.</p>
</li>
<li>
<p><a href="https://smart-forensic.com/"><strong>SMART</strong></a> - Open source sampling of many proprietary forensics tools.</p>
</li>
</ul>
<hr>
<h3 id="gnulinux-utilities"><strong>GNU/Linux Utilities</strong><a class="anchor" href="#gnulinux-utilities">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://github.com/PenturaLabs/Linux_Exploit_Suggester"><strong>Linux Exploit Suggester</strong></a> - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.</li>
</ul>
<hr>
<h3 id="hacking-focused-osint"><strong>Hacking Focused OSINT</strong><a class="anchor" href="#hacking-focused-osint">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/michenriksen/aquatone"><strong>AQUATONE</strong></a> - Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.</p>
</li>
<li>
<p><a href="https://github.com/Hood3dRob1n/BinGoo"><strong>BinGoo</strong></a> - GNU/Linux bash based Bing and Google Dorking Tool.</p>
</li>
<li>
<p><a href="https://www.censys.io/"><strong>Censys</strong></a> - Collects data on hosts and websites through daily ZMap and ZGrab scans.</p>
</li>
<li>
<p><a href="https://github.com/ilektrojohn/creepy"><strong>creepy</strong></a> - Geolocation OSINT tool.</p>
</li>
<li>
<p><a href="https://github.com/upgoingstar/datasploit"><strong>DataSploit</strong></a> - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.</p>
</li>
<li>
<p><a href="https://github.com/jgor/dork-cli"><strong>dork-cli</strong></a> - Command line Google dork tool.</p>
</li>
<li>
<p><a href="https://github.com/DanMcInerney/fast-recon"><strong>Fast-recon</strong></a> - Perform Google dorks against a domain.</p>
</li>
<li>
<p><a href="https://github.com/k3170makan/GooDork"><strong>GooDork</strong></a> - Command line Google dorking tool.</p>
</li>
<li>
<p><a href="https://www.exploit-db.com/google-hacking-database"><strong>Google Hacking Database</strong></a> - Database of Google dorks; can be used for recon.</p>
</li>
<li>
<p><a href="https://github.com/JohnTroony/Google-dorks"><strong>Google-dorks</strong></a> - Common Google dorks and others you probably dont know.</p>
</li>
<li>
<p><a href="https://github.com/techgaun/github-dorks"><strong>github-dorks</strong></a> - CLI tool to scan Github repos/organizations for potential sensitive information leak.</p>
</li>
<li>
<p><a href="http://intrigue.io/"><strong>Intrigue</strong></a> - Automated OSINT &amp; Attack Surface discovery framework with powerful API, UI and CLI.</p>
</li>
<li>
<p><a href="http://www.paterva.com/web7/"><strong>Maltego</strong></a> - One of the Hacking Tools and Proprietary software for open source intelligence and forensics, from Paterva.</p>
</li>
<li>
<p><a href="https://github.com/laramies/metagoofil"><strong>metagoofil</strong></a> - Metadata harvester.</p>
</li>
<li>
<p><a href="https://github.com/lanmaster53/recon-ng"><strong>recon-ng</strong></a> - One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.</p>
</li>
<li>
<p><a href="https://www.shodan.io/"><strong>Shodan</strong></a> - Worlds first search engine for Internet-connected devices.</p>
</li>
<li>
<p><a href="https://github.com/Smaash/snitch"><strong>snitch</strong></a> - Information gathering via dorks.</p>
</li>
<li>
<p><a href="https://github.com/1N3/Sn1per"><strong>Sn1per</strong></a> - One of the Hacking Tools for Automated Pentest Recon Scanner.</p>
</li>
<li>
<p><a href="http://www.spiderfoot.net/"><strong>Spiderfoot</strong></a> - Multi-source OSINT automation tool with a Web UI and report visualizations.</p>
</li>
<li>
<p><a href="http://ci-www.threatcrowd.org/"><strong>Threat Crowd</strong></a> - Search engine for threats.</p>
</li>
<li>
<p><a href="https://github.com/laramies/theHarvester"><strong>theHarvester</strong></a> - E-mail, subdomain and people names harvester.</p>
</li>
<li>
<p><a href="https://github.com/melvinsh/vcsmap"><strong>vcsmap</strong></a> - Plugin-based tool to scan public version control systems for sensitive information.</p>
</li>
<li>
<p><a href="https://www.virustotal.com/"><strong>Virus Total</strong></a> - VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.</p>
</li>
<li>
<p><a href="http://webkay.robinlinus.com/"><strong>What Every Browser Knows About You</strong></a> - Comprehensive detection page to test your own Web browsers configuration for privacy and identity leaks.</p>
</li>
<li>
<p><a href="https://www.zoomeye.org/"><strong>ZoomEye</strong></a> - Search engine for cyberspace that lets the user find specific network components.</p>
</li>
</ul>
<hr>
<h3 id="hacking-conventions">Hacking Conventions<a class="anchor" href="#hacking-conventions">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://44con.com/"><strong>44Con</strong></a> - Annual Security Conference held in London.</p>
</li>
<li>
<p><a href="https://globalappsec.org/"><strong>AppSecUSA</strong></a> - Annual conference organized by OWASP.</p>
</li>
<li>
<p><a href="https://www.balccon.org/"><strong>BalCCon</strong></a> - Balkan Computer Congress, annually held in Novi Sad, Serbia.</p>
</li>
<li>
<p><a href="http://www.blackhat.com/"><strong>Black Hat</strong></a> - Annual security conference in Las Vegas.</p>
</li>
<li>
<p><a href="http://brucon.org/"><strong>BruCON</strong></a> - Annual security conference in Belgium.</p>
</li>
<li>
<p><a href="http://www.carolinacon.org/"><strong>CarolinaCon</strong></a> - Infosec conference, held annually in North Carolina.</p>
</li>
<li>
<p><a href="https://events.ccc.de/congress/"><strong>CCC</strong></a> - Annual meeting of the international hacker scene in Germany.</p>
</li>
<li>
<p><a href="https://2016.chcon.nz/"><strong>CHCon</strong></a> - Christchurch Hacker Con, Only South Island of New Zealand hacker con.</p>
</li>
<li>
<p><a href="https://deepsec.net/"><strong>DeepSec</strong></a> - Security Conference in Vienna, Austria.</p>
</li>
<li>
<p><a href="http://def.camp/"><strong>DefCamp</strong></a> - Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.</p>
</li>
<li>
<p><a href="https://www.defcon.org/"><strong>DEF CON</strong></a> - Annual hacker convention in Las Vegas. Known for having a left wing bias.</p>
</li>
<li>
<p><a href="http://www.ekoparty.org/"><strong>Ekoparty</strong></a> - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.</p>
</li>
<li>
<p><a href="http://fsec.foi.hr/"><strong>FSec</strong></a> - FSec - Croatian Information Security Gathering in Varaždin, Croatia.</p>
</li>
<li>
<p><a href="http://hack3rcon.org/"><strong>Hack3rCon</strong></a> - Annual US hacker conference.</p>
</li>
<li>
<p><a href="https://2016.hack.lu/"><strong>Hack.lu</strong></a> - Annual conference held in Luxembourg.</p>
</li>
<li>
<p><a href="https://hackfest.ca/"><strong>Hackfest</strong></a> - Largest hacking conference in Canada.</p>
</li>
<li>
<p><a href="https://conference.hitb.org/"><strong>HITB</strong></a> - Deep-knowledge security conference held in Malaysia and The Netherlands.</p>
</li>
<li>
<p><a href="https://conference.hitb.org/"><strong>Hacking In The Box</strong></a> - Deep-knowledge security conference held in Malaysia and The Netherlands.</p>
</li>
<li>
<p><a href="http://www.infosecurityeurope.com/"><strong>Infosecurity Europe</strong></a> - Europes number one information security event, held in London, UK.</p>
</li>
<li>
<p><a href="http://www.layerone.org/"><strong>LayerOne</strong></a> - Annual US security conference held every spring in Los Angeles.</p>
</li>
<li>
<p><a href="http://nullcon.net/website/"><strong>Nullcon</strong></a> - Annual conference in Delhi and Goa, India.</p>
</li>
<li>
<p><a href="http://phreaknic.info/"><strong>PhreakNIC</strong></a> - Technology conference held annually in middle Tennessee.</p>
</li>
<li>
<p><a href="https://www.rsaconference.com/"><strong>RSA Conference USA</strong></a> - Annual security conference in San Francisco, California, USA.</p>
</li>
<li>
<p><a href="http://shmoocon.org/"><strong>ShmooCon</strong></a> - Annual US East coast hacker convention.</p>
</li>
<li>
<p><a href="http://www.skydogcon.com/"><strong>SkyDogCon</strong></a> - Technology conference in Nashville.</p>
</li>
<li>
<p><a href="http://www.summercon.org/"><strong>SummerCon</strong></a> - One of the oldest hacker conventions, held during Summer.</p>
</li>
<li>
<p><a href="https://www.swisscyberstorm.com/"><strong>Swiss Cyber Storm</strong></a> - Annual security conference in Lucerne, Switzerland.</p>
</li>
<li>
<p><a href="http://thotcon.org/"><strong>ThotCon</strong></a> - Annual US hacker conference held in Chicago.</p>
</li>
<li>
<p><a href="https://www.troopers.de/"><strong>Troopers</strong></a> - Annual international IT Security event with workshops held in Heidelberg, Germany.</p>
</li>
<li>
<p><a href="https://www.virusbulletin.com/conference/index"><strong>Virus Bulletin Conference</strong></a> - Annual conference going to be held in Denver, USA for 2016.</p>
</li>
</ul>
<hr>
<h3 id="hash-cracking"><strong>Hash Cracking</strong><a class="anchor" href="#hash-cracking">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/glv2/bruteforce-wallet"><strong>BruteForce Wallet</strong></a> - Find the password of an encrypted wallet file (i.e. wallet.dat).</p>
</li>
<li>
<p><a href="https://digi.ninja/projects/cewl.php"><strong>CeWL</strong></a> - Generates custom wordlists by spidering a targets website and collecting unique words.</p>
</li>
<li>
<p><a href="http://hashcat.net/hashcat/"><strong>Hashcat</strong></a> - Another One of the Hacking Tools The more fast hash cracker.</p>
</li>
<li>
<p><a href="http://www.openwall.com/john/"><strong>John the Ripper</strong></a> - One of the best Hacking Tools for Fast password cracker.</p>
</li>
<li>
<p><a href="https://github.com/lmammino/jwt-cracker"><strong>JWT Cracker</strong></a> - Simple HS256 JWT token brute force cracker.</p>
</li>
<li>
<p><a href="http://rarcrack.sourceforge.net/"><strong>Rar Crack</strong></a> - RAR bruteforce cracker.</p>
</li>
</ul>
<h3 id="hex-editors"><strong>Hex Editors</strong><a class="anchor" href="#hex-editors">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://web.archive.org/web/20140106172311if_/http://www.suavetech.com:80/0xed/0xed.html"><strong>0xED</strong></a> Native macOS hex editor that supports plug-ins to display custom data types.</p>
</li>
<li>
<p><a href="http://frhed.sourceforge.net/"><strong>Frhed</strong></a> Binary file editor for Windows.</p>
</li>
<li>
<p><a href="https://hexed.it/"><strong>HexEdit.js</strong></a> Browser-based hex editing.</p>
</li>
<li>
<p><a href="https://hexinator.com/"><strong>Hexinator</strong></a> Worlds finest (proprietary, commercial) Hex Editor.</p>
</li>
</ul>
<hr>
<h3 id="information-security-magazines"><strong>Information Security Magazines</strong><a class="anchor" href="#information-security-magazines">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.2600.com/Magazine/DigitalEditions"><strong>2600: The Hacker Quarterly</strong></a> American publication about technology and computer “underground.”</p>
</li>
<li>
<p><a href="http://www.phrack.org/"><strong>Phrack Magazine</strong></a> By far the longest running hacker zine.</p>
</li>
<li>
<p><a href="https://unredactedmagazine.com/"><strong>Unredacted Magazine</strong></a> - The official magazine from Michael Bazzell author of Extreme Privacy.</p>
</li>
</ul>
<hr>
<h3 id="lock-picking-resources"><strong>Lock Picking Resources</strong><a class="anchor" href="#lock-picking-resources">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/meitar/awesome-lockpicking"><strong>Awesome Lockpicking</strong></a> Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys.</p>
</li>
<li>
<p><a href="https://www.youtube.com/user/bosnianbill"><strong>Bosnianbill</strong></a> More lockpicking videos.</p>
</li>
<li>
<p><a href="https://www.youtube.com/user/SchuylerTowne/"><strong>Schuyler Towne channel</strong></a> Lockpicking videos and security talks.</p>
</li>
<li>
<p><a href="https://www.reddit.com/r/lockpicking"><strong>/r/lockpicking</strong></a> Resources for learning lockpicking, equipment recommendations.</p>
</li>
</ul>
<hr>
<h3 id="macos-utilities"><strong>macOS Utilities</strong><a class="anchor" href="#macos-utilities">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://github.com/00xkhaled/Bella">Bella</a> Pure Python post-exploitation data mining and remote administration tool for macOS.</li>
</ul>
<hr>
<h3 id="multi-paradigm-frameworks"><strong>Multi-paradigm Frameworks</strong><a class="anchor" href="#multi-paradigm-frameworks">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/blackhatethicalhacking/armitage"><strong>Armitage</strong></a> Java-based GUI front-end for the Metasploit Framework.</p>
</li>
<li>
<p><a href="https://juansacco.gitbooks.io/exploitpack/content/"><strong>ExploitPack</strong></a> Graphical tool for automating penetration tests that ships with many pre-packaged exploits.</p>
</li>
<li>
<p><a href="https://github.com/infobyte/faraday"><strong>Faraday</strong></a> Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.</p>
</li>
<li>
<p><a href="https://www.metasploit.com/"><strong>Metasploit</strong></a> Post exploitation Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.</p>
</li>
<li>
<p><a href="https://github.com/n1nj4sec/pupy"><strong>Pupy</strong></a> Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.</p>
</li>
</ul>
<hr>
<h3 id="network-tools"><strong>Network Tools</strong><a class="anchor" href="#network-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.bettercap.org/"><strong>BetterCAP</strong></a> Modular, portable and easily extensible MITM framework.</p>
</li>
<li>
<p><a href="https://github.com/m0rtem/CloudFail"><strong>CloudFail</strong></a> Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.</p>
</li>
<li>
<p><a href="https://github.com/byt3bl33d3r/CrackMapExec"><strong>CrackMapExec</strong></a> A swiss army knife for pentesting networks.</p>
</li>
<li>
<p><a href="http://www.iwaxx.com/debookee/"><strong>Debookee</strong></a> Simple and powerful network traffic analyzer for macOS.</p>
</li>
<li>
<p><a href="https://github.com/sensepost/DET"><strong>DET</strong></a> Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.</p>
</li>
<li>
<p><a href="http://tgcd.sourceforge.net/"><strong>Dgcd</strong></a> Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.</p>
</li>
<li>
<p><a href="https://github.com/makefu/dnsmap/"><strong>Dnsmap</strong></a> One of the Hacking Tools for Passive DNS network mapper.</p>
</li>
<li>
<p><a href="https://github.com/darkoperator/dnsrecon/"><strong>Dnsrecon</strong></a> One of the Hacking Tools for DNS enumeration script.</p>
</li>
<li>
<p><a href="https://github.com/iphelix/dnschef"><strong>Dnschef</strong></a> Highly configurable DNS proxy for pentesters.</p>
</li>
<li>
<p><a href="https://github.com/fwaeytens/dnsenum/"><strong>Dnsenum</strong></a> Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.</p>
</li>
<li>
<p><a href="http://www.mavetju.org/unix/dnstracer.php"><strong>Dnstracer</strong></a> Determines where a given DNS server gets its information from, and follows the chain of DNS servers.</p>
</li>
<li>
<p><a href="https://dnsdumpster.com/"><strong>DNSDumpster</strong></a> One of the Hacking Tools for Online DNS recon and search service.</p>
</li>
<li>
<p><a href="https://github.com/USArmyResearchLab/Dshell"><strong>Dshell</strong></a> Network forensic analysis framework.</p>
</li>
<li>
<p><a href="https://www.kali.org/tools/dsniff/"><strong>Dsniff</strong></a> Collection of tools for network auditing and pentesting.</p>
</li>
<li>
<p><a href="https://github.com/orinocoz/dripcap"><strong>Dripcap</strong></a> Caffeinated packet analyzer.</p>
</li>
<li>
<p><a href="https://github.com/infobyte/evilgrade"><strong>Evilgrade</strong></a> Modular framework to take advantage of poor upgrade implementations by injecting fake updates.</p>
</li>
<li>
<p><a href="http://www.ettercap-project.org/"><strong>Ettercap</strong></a> Comprehensive, mature suite for machine-in-the-middle attacks.</p>
</li>
<li>
<p><a href="https://github.com/CoreSecurity/impacket"><strong>Impacket</strong></a> A collection of Python classes for working with network protocols.</p>
</li>
<li>
<p><a href="http://sniff.su/"><strong>Intercepter-NG</strong></a> Multifunctional network toolkit.</p>
</li>
<li>
<p><a href="https://github.com/robertdavidgraham/masscan"><strong>Mass Scan</strong></a> Best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.</p>
</li>
<li>
<p><a href="https://github.com/justmao945/mallory"><strong>Mallory</strong></a> HTTP/HTTPS proxy over SSH.</p>
</li>
<li>
<p><a href="https://github.com/mitmproxy/mitmproxy"><strong>Mitmproxy</strong></a> Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.</p>
</li>
<li>
<p><a href="https://github.com/r00t-3xp10it/morpheus"><strong>Morpheus</strong></a> Automated ettercap TCP/IP Hacking Tools.</p>
</li>
<li>
<p><a href="https://github.com/netsniff-ng/netsniff-ng"><strong>Netsniff-ng</strong></a> Swiss army knife for network sniffing.</p>
</li>
<li>
<p><a href="http://network-tools.com/"><strong>Network-Tools.com</strong></a> Website offering an interface to numerous basic network utilities like ping, traceroute, whois, and more.</p>
</li>
<li>
<p><a href="https://nmap.org/"><strong>Nmap</strong></a> Free security scanner for network exploration &amp; security audits.</p>
</li>
<li>
<p><a href="https://github.com/gamelinux/passivedns"><strong>Passivedns</strong></a> Network sniffer that logs all DNS server replies for use in a passive DNS setup.</p>
</li>
<li>
<p><a href="https://github.com/chrislee35/passivedns-client"><strong>Passivedns-client</strong></a> Library and query tool for querying several passive DNS providers.</p>
</li>
<li>
<p><a href="https://github.com/rafael-santiago/pig"><strong>Pig</strong></a> One of the Hacking Tools for GNU/Linux packet crafting.</p>
</li>
<li>
<p><a href="https://github.com/samyk/pwnat"><strong>Pwnat</strong></a> Punches holes in firewalls and NATs.</p>
</li>
<li>
<p><a href="http://h.foofus.net/?page_id=218"><strong>Praeda</strong></a> Automated multi-function printer data harvester for gathering usable data during security assessments.</p>
</li>
<li>
<p><a href="https://github.com/RUB-NDS/PRET"><strong>Printer Exploitation Toolkit (PRET)</strong></a> Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.</p>
</li>
<li>
<p><a href="https://github.com/reverse-shell/routersploit"><strong>Routersploit</strong></a> Open source exploitation framework similar to Metasploit but dedicated to embedded devices.</p>
</li>
<li>
<p><a href="https://github.com/vesche/scanless"><strong>Scanless</strong></a> Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.</p>
</li>
<li>
<p><a href="https://github.com/secdev/scapy"><strong>Scapy</strong></a> Python-based interactive packet manipulation program &amp; library.</p>
</li>
<li>
<p><a href="https://sparta.secforce.com/"><strong>SPARTA</strong></a> Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.</p>
</li>
<li>
<p><a href="https://github.com/jtesta/ssh-mitm"><strong>SSH MITM</strong></a> Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.</p>
</li>
<li>
<p><a href="http://www.tcpdump.org/"><strong>Tcpdump/libpcap</strong></a> Common packet analyzer that runs under the command line.</p>
</li>
<li>
<p><a href="https://www.wireshark.org/"><strong>Wireshark</strong></a> Widely-used graphical, cross-platform network protocol analyzer.</p>
</li>
<li>
<p><a href="https://github.com/evilsocket/xray"><strong>XRay</strong></a> Network (sub)domain discovery and reconnaissance automation tool.</p>
</li>
<li>
<p><a href="https://github.com/hatRiot/zarp"><strong>Zarp</strong></a> Network attack tool centered around the exploitation of local networks.</p>
</li>
<li>
<p><a href="https://zmap.io/"><strong>Zmap</strong></a> Open source network scanner that enables researchers to easily perform Internet-wide network studies.</p>
</li>
</ul>
<hr>
<h3 id="operating-systems"><strong>Operating Systems</strong><a class="anchor" href="#operating-systems">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://n0where.net/best-linux-penetration-testing-distributions/"><strong>Best Linux Penetration Testing Distributions @ CyberPunk</strong></a> Description of main penetration testing distributions.</p>
</li>
<li>
<p><a href="https://github.com/cuckoosandbox/cuckoo"><strong>Cuckoo</strong></a> Open source automated malware analysis system.</p>
</li>
<li>
<p><a href="http://www.caine-live.net/"><strong>Computer Aided Investigative Environment (CAINE)</strong></a> Italian GNU/Linux live distribution created as a digital forensics project.</p>
</li>
<li>
<p><a href="https://csilinux.com/"><strong>CSILinux</strong></a> - CSI&rsquo;s mission is to equip you with the most advanced tools in digital forensics, OSINT, and incident response.</p>
</li>
<li>
<p><a href="https://archiveos.org/deft/"><strong>Digital Evidence &amp; Forensics Toolkit (DEFT)</strong></a> Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.</p>
</li>
<li>
<p><a href="https://github.com/tyki6/rawsec_cli"><strong>Security related Operating Systems @ Rawsec</strong></a> Penetration testing tools &amp; Hacking Tools list Related Complete list of security operating systems.</p>
</li>
<li>
<p><a href="http://distrowatch.com/search.php?category=Security"><strong>Security @ Distrowatch</strong></a> Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.</p>
</li>
<li>
<p><a href="https://tails.boum.org/"><strong>Tails</strong></a> Live OS aimed at preserving privacy and anonymity.</p>
</li>
</ul>
<hr>
<h3 id="physical-hacking-tools">Physical Hacking Tools<a class="anchor" href="#physical-hacking-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/Anof-cyber/APTRS"><strong>Anof-cyber/APTRS</strong></a> - APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities.</p>
</li>
<li>
<p><a href="https://canarytokens.org/generate"><strong>Canarytokens.org</strong></a> - Canarytokens are a free, quick, painless way to help defenders discover they&rsquo;ve been breached by having attackers announce themselves. These are digital honeypots you can configure on your own network.</p>
</li>
<li>
<p><a href="https://flipperzero.one/"><strong>Flipperzero.one</strong></a> - Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. It loves hacking digital stuff, such as radio protocols, access control systems, hardware and more. It&rsquo;s fully open-source and customizable, so you can extend it in whatever way you like. Check out more firmware options <a href="https://flipper-xtre.me/asset-packs/"><strong>here</strong></a></p>
</li>
<li>
<p><a href="https://shop.hak5.org/"><strong>Hak5.org</strong></a> - Sells many hacking for wifi pentesting, hotplug attacks, implants, remote access field kits and more. <a href="https://www.youtube.com/watch?v=6F7EHO4niCw"><strong>Breakdown of multiple tools</strong></a></p>
</li>
<li>
<p><a href="https://lanturtle.com/"><strong>LAN Turtle</strong></a> Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.</p>
</li>
<li>
<p><a href="https://samy.pl/poisontap/"><strong>Poisontap</strong></a> Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.</p>
</li>
<li>
<p><a href="http://usbrubberducky.com/"><strong>USB Rubber Ducky</strong></a> Customizable keystroke injection attack platform masquerading as a USB thumbdrive.</p>
</li>
<li>
<p><a href="https://www.wifipineapple.com/"><strong>WiFi Pineapple</strong></a> Wireless auditing and penetration testing platform.</p>
</li>
</ul>
<hr>
<h2 id="penetration-testing-resources">Penetration Testing Resources<a class="anchor" href="#penetration-testing-resources">#</a></h2>
<h3 id="pentest-tools">Pentest Tools<a class="anchor" href="#pentest-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.offsec.com/metasploit-unleashed/"><strong>Metasploit Unleashed</strong></a> - Free Offensive Security Metasploit course.</p>
</li>
<li>
<p><a href="https://attack.mitre.org/"><strong>MITREs Adversarial Tactics, Techniques &amp; Common Knowledge (ATT&amp;CK)</strong></a> Curated knowledge base and model for cyber adversary behavior.</p>
</li>
<li>
<p><a href="http://www.isecom.org/mirror/OSSTMM.3.pdf"><strong>Open Source Security Testing Methodology Manual (OSSTMM)</strong></a> Framework for providing test cases that result in verified facts on which to base decisions that impact an organizations security.</p>
</li>
<li>
<p><a href="https://www.owasp.org/index.php/Main_Page"><strong>Open Web Application Security Project (OWASP)</strong></a> Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.</p>
</li>
<li>
<p><a href="http://www.pentest-standard.org/"><strong>Penetration Testing Execution Standard (PTES)</strong></a> Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.</p>
</li>
<li>
<p><a href="http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html"><strong>Penetration Testing Framework (PTF)</strong></a> Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.</p>
</li>
<li>
<p><a href="https://github.com/nixawk/pentest-wiki"><strong>PENTEST-WIKI</strong></a> Free online security knowledge library for pentesters and researchers.</p>
</li>
<li>
<p><a href="https://github.com/tyki6/rawsec_cli"><strong>Security related Operating Systems @ Rawsec</strong></a> Penetration testing tools &amp; Hacking Tools list Related Complete list of security operating systems.</p>
</li>
<li>
<p><a href="http://shell-storm.org/shellcode/"><strong>Shellcode Examples</strong></a> Shellcodes database.</p>
</li>
<li>
<p><a href="http://www.vividmachines.com/shellcode/shellcode.html"><strong>Shellcode Tutorial</strong></a> Tutorial on how to write shellcode.</p>
</li>
<li>
<p><a href="http://www.xss-payloads.com/"><strong>XSS-Payloads</strong></a> Ultimate resource for all things cross-site including payloads, tools, games and documentation.</p>
</li>
</ul>
<h3 id="penetration-testing-distributions"><strong>Penetration Testing Distributions</strong><a class="anchor" href="#penetration-testing-distributions">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://archstrike.org/"><strong>ArchStrike</strong></a> Arch GNU/Linux repository for security professionals and enthusiasts.</p>
</li>
<li>
<p><a href="https://github.com/adi0x90/attifyos"><strong>AttifyOS</strong></a> GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.</p>
</li>
<li>
<p><a href="https://backbox.org/"><strong>BackBox</strong></a> Ubuntu-based distribution for penetration tests and security assessments.</p>
</li>
<li>
<p><a href="https://www.blackarch.org/"><strong>BlackArch</strong></a> Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.</p>
</li>
<li>
<p><a href="https://labs.fedoraproject.org/en/security/"><strong>Fedora Security Lab</strong></a> Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.</p>
</li>
<li>
<p><a href="https://www.kali.org/"><strong>Kali</strong></a> GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools.</p>
</li>
<li>
<p><a href="http://networksecuritytoolkit.org/"><strong>Network Security Toolkit (NST)</strong></a> Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.</p>
</li>
<li>
<p><a href="https://www.parrotsec.org/"><strong>Parrot</strong></a> Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.</p>
</li>
<li>
<p><a href="http://www.pentoo.ch/"><strong>Pentoo</strong></a> Security-focused live CD based on Gentoo.</p>
</li>
<li>
<p><a href="https://github.com/trustedsec/ptf"><strong>The Pentesters Framework</strong></a> Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.</p>
</li>
</ul>
<h3 id="docker-for-penetration-testing"><strong>Docker for Penetration Testing</strong><a class="anchor" href="#docker-for-penetration-testing">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>docker pull kalilinux/kali-linux-docker</li>
<li>docker pull owasp/zap2docker-stable</li>
<li>docker pull wpscanteam/wpscan</li>
<li>docker pull citizenstig/dvwa</li>
<li>docker pull wpscanteam/vulnerablewordpress</li>
<li>docker pull hmlio/vaas-cve-2014-6271</li>
<li>docker pull hmlio/vaas-cve-2014-0160</li>
<li>docker pull opendns/security-ninjas</li>
<li>docker pull diogomonica/docker-bench-security</li>
<li>docker pull ismisepaul/securityshepherd</li>
<li>docker pull danmx/docker-owasp-webgoat</li>
<li>docker-compose build &amp;&amp; docker-compose up</li>
<li>docker pull citizenstig/nowasp</li>
<li>docker pull bkimminich/juice-shop</li>
<li>docker pull phocean/msf</li>
</ul>
<h3 id="penetration-testing-report-templates"><strong>Penetration Testing Report Templates</strong><a class="anchor" href="#penetration-testing-report-templates">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://lucideus.com/pdf/stw.pdf"><strong>Pentesting Report Template</strong></a> lucideus.com template.</p>
</li>
<li>
<p><a href="https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf"><strong>Pentesting Report Template</strong></a> pcisecuritystandards.org template.</p>
</li>
<li>
<p><a href="https://github.com/juliocesarfort/public-pentesting-reports"><strong>Public Pentesting Reports</strong></a> Curated list of public penetration test reports released by several consulting firms and academic security groups.</p>
</li>
</ul>
<h3 id="ransomware-recovery">Ransomware Recovery<a class="anchor" href="#ransomware-recovery">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="https://www.nomoreransom.org/en/index.html"><strong>Nomoreransom</strong></a> - Help detect what kind of ransomware encryption youre affected by and free tools to unlock it, in many but not all cases.</li>
</ul>
<h3 id="reverse-engineering-tools"><strong>Reverse Engineering Tools</strong><a class="anchor" href="#reverse-engineering-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/devttys0/binwalk"><strong>Binwalk</strong></a> Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.</p>
</li>
<li>
<p><a href="http://www.capstone-engine.org/"><strong>Capstone</strong></a> Lightweight multi-platform, multi-architecture disassembly framework.</p>
</li>
<li>
<p><a href="https://github.com/0xd4d/dnSpy"><strong>dnSpy</strong></a> One of the Hacking Tools to reverse engineer .NET assemblies.</p>
</li>
<li>
<p><a href="http://www.codef00.com/projects#debugger"><strong>Evans Debugger</strong></a> OllyDbg-like debugger for GNU/Linux.</p>
</li>
<li>
<p><a href="https://www.frida.re/"><strong>Frida</strong></a> Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.</p>
</li>
<li>
<p><a href="http://debugger.immunityinc.com/"><strong>Immunity Debugger</strong></a> Powerful way to write exploits and analyze malware.</p>
</li>
<li>
<p><a href="https://www.hex-rays.com/products/ida/"><strong>Interactive Disassembler (IDA Pro)</strong></a> Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, <a href="https://www.hex-rays.com/products/ida/support/download_freeware.shtml">IDA Free</a>.</p>
</li>
<li>
<p><a href="https://github.com/wisk/medusa"><strong>Medusa</strong></a> Open source, cross-platform interactive disassembler.</p>
</li>
<li>
<p><a href="http://www.ollydbg.de/"><strong>OllyDbg</strong></a> x86 debugger for Windows binaries that emphasizes binary code analysis.</p>
</li>
<li>
<p><a href="https://github.com/longld/peda"><strong>Peda</strong></a> Python Exploit Development Assistance for GDB.</p>
</li>
<li>
<p><a href="https://github.com/joelpx/plasma"><strong>Plasma</strong></a> Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.</p>
</li>
<li>
<p><a href="https://github.com/Cisco-Talos/pyrebox"><strong>PyREBox</strong></a> Python scriptable Reverse Engineering sandbox by Cisco-Talos.</p>
</li>
<li>
<p><a href="http://rada.re/r/index.html"><strong>Radare2</strong></a> Open source, crossplatform reverse engineering framework.</p>
</li>
<li>
<p><a href="https://github.com/fireeye/rVMI"><strong>rVMI</strong></a> Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.</p>
</li>
<li>
<p><a href="https://github.com/snare/voltron"><strong>Voltron</strong></a> Extensible debugger UI toolkit written in Python.</p>
</li>
<li>
<p><a href="https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx"><strong>WDK/WinDbg</strong></a> Windows Driver Kit and WinDbg.</p>
</li>
<li>
<p><a href="http://x64dbg.com/"><strong>x64dbg</strong></a> Open source x64/x32 debugger for windows.</p>
</li>
</ul>
<h3 id="security-courses">Security Courses<a class="anchor" href="#security-courses">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://azcwr.org/"><strong>ARIZONA CYBER WARFARE RANGE</strong></a> 24×7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.</p>
</li>
<li>
<p><a href="http://computersecuritystudent.com/"><strong>Computer Security Student</strong></a> Many free tutorials, great for beginners, $10/mo membership unlocks all content.</p>
</li>
<li>
<p><a href="https://trailofbits.github.io/ctf/"><strong>CTF Field Guide</strong></a> Everything you need to win your next CTF competition.</p>
</li>
<li>
<p><a href="http://cybrary.it/"><strong>Cybrary</strong></a> Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book Penetration Testing for Highly-Secured Environments.</p>
</li>
<li>
<p><a href="https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material"><strong>European Union Agency for Network and Information Security</strong></a> ENISA Cyber Security Training material.</p>
</li>
<li>
<p><a href="https://www.offensive-security.com/information-security-training/"><strong>Offensive Security Training</strong></a> Training from BackTrack/Kali developers.</p>
</li>
<li>
<p><a href="http://opensecuritytraining.info/"><strong>Open Security Training</strong></a> Training material for computer security classes.</p>
</li>
<li>
<p><a href="http://www.sans.org/"><strong>SANS Security Training</strong></a> Computer Security Training &amp; Certification.</p>
</li>
</ul>
<h3 id="side-channel-tools"><strong>Side-channel Tools</strong><a class="anchor" href="#side-channel-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li><a href="http://chipwhisperer.com/"><strong>ChipWhisperer</strong></a> Complete open-source toolchain for side-channel power analysis and glitching attacks.</li>
</ul>
<h3 id="social-engineering"><strong>Social Engineering</strong><a class="anchor" href="#social-engineering">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/4w4k3/BeeLogger"><strong>Beelogger</strong></a> Tool for generating keylooger.</p>
</li>
<li>
<p><a href="https://github.com/ring0lab/catphish"><strong>Catphish</strong></a> Tool for phishing and corporate espionage written in Ruby.</p>
</li>
<li>
<p><a href="https://github.com/kgretzky/evilginx"><strong>Evilginx</strong></a> MITM attack framework used for phishing credentials and session cookies from any Web service.</p>
</li>
<li>
<p><a href="https://github.com/securestate/king-phisher"><strong>King Phisher</strong></a> One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.</p>
</li>
<li>
<p><a href="https://github.com/trustedsec/social-engineer-toolkit"><strong>Social Engineer Toolkit (SET)</strong></a> Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.</p>
</li>
<li>
<p><a href="http://www.social-engineer.org/framework/general-discussion/"><strong>Social Engineering Framework</strong></a> Information resource for social engineers.</p>
</li>
<li>
<p><a href="https://github.com/sophron/wifiphisher"><strong>wifiphisher</strong></a> Automated phishing attacks against WiFi networks.</p>
</li>
</ul>
<h3 id="static-analyzers"><strong>Static Analyzers</strong><a class="anchor" href="#static-analyzers">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://pypi.python.org/pypi/bandit/"><strong>Bandit</strong></a> Security oriented static analyser for python code.</p>
</li>
<li>
<p><a href="https://github.com/presidentbeef/brakeman"><strong>Brakeman</strong></a> Static analysis security vulnerability scanner for Ruby on Rails applications.</p>
</li>
<li>
<p><a href="http://cppcheck.sourceforge.net/"><strong>Cppcheck</strong></a> Extensible C/C++ static analyzer focused on finding bugs.</p>
</li>
<li>
<p><a href="http://findbugs.sourceforge.net/"><strong>FindBugs</strong></a> Free software static analyzer to look for bugs in Java code.</p>
</li>
<li>
<p><a href="https://github.com/nccgroup/sobelow"><strong>Sobelow</strong></a> Security-focused static analysis for the Phoenix Framework.</p>
</li>
</ul>
<h3 id="transport-layer-security-tools"><strong>Transport Layer Security Tools</strong><a class="anchor" href="#transport-layer-security-tools">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/nabla-c0d3/sslyze"><strong>SSLyze</strong></a> Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.</p>
</li>
<li>
<p><a href="https://github.com/WestpointLtd/tls_prober"><strong>TLS Prober</strong></a> Fingerprint a servers SSL/TLS implementation.</p>
</li>
<li>
<p><a href="https://github.com/drwetter/testssl.sh"><strong>Testssl.sh</strong></a> Command line tool which checks a servers service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.</p>
</li>
</ul>
<h3 id="tools-lists-tutorials-etc"><strong>Tools, Lists, Tutorials etc.</strong><a class="anchor" href="#tools-lists-tutorials-etc">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://scribe.froth.zone/@kuwaitison/active-directory-lateral-movement-and-post-exploitation-cheat-sheet-3170982a7055"><strong>AD Exploit guides</strong></a> - Detailed guide on methods to exploit Active Directory.</p>
</li>
<li>
<p><a href="https://github.com/ashishb/android-security-awesome"><strong>Android Security</strong></a> Collection of Android security-related resources.</p>
</li>
<li>
<p><a href="https://github.com/paragonie/awesome-appsec"><strong>AppSec</strong></a> Resources for learning about application security.</p>
</li>
<li>
<p><a href="https://github.com/bayandin/awesome-awesomeness"><strong>Awesome Awesomness</strong></a> The List of the Lists.</p>
</li>
<li>
<p><a href="https://github.com/fffaraz/awesome-cpp"><strong>C/C++ Programming</strong></a> One of the main language for open source security tools.</p>
</li>
<li>
<p><a href="https://github.com/apsdehal/awesome-ctf"><strong>CTFs</strong></a> Capture The Flag frameworks, libraries, etc.</p>
</li>
<li>
<p><a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/"><strong>Exploit Writing Tutorials</strong></a> Tutorials on how to develop exploits.</p>
</li>
<li>
<p><a href="https://github.com/Cugu/awesome-forensics"><strong>Forensics</strong></a> Free (mostly open source) forensic analysis tools and resources.</p>
</li>
<li>
<p><a href="https://gbhackers.com/hacking-tools-list/"><strong>GB Hackers Tools List</strong></a> - Massive list of Tools.</p>
</li>
<li>
<p><a href="https://www.hackerone.com/ethical-hacker/100-hacking-tools-and-resources"><strong>Hackerone Tools List</strong></a> - Massive list of Tools.</p>
</li>
<li>
<p><a href="https://github.com/carpedm20/awesome-hacking"><strong>Hacking</strong></a> Tutorials, tools, and resources.</p>
</li>
<li>
<p><a href="https://github.com/paralax/awesome-honeypots"><strong>Honeypots</strong></a> Honeypots, tools, components, and more.</p>
</li>
<li>
<p><a href="https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges"><strong>InfoSec § Hacking challenges</strong></a> Comprehensive directory of CTFs, wargames, hacking challenge websites, Penetration testing tools list practice lab exercises, and more.</p>
</li>
<li>
<p><a href="https://github.com/onlurking/awesome-infosec"><strong>Infosec</strong></a> Information security resources for pentesting, forensics, and more.</p>
</li>
<li>
<p><a href="https://github.com/sorrycc/awesome-javascript"><strong>JavaScript Programming</strong></a> In-browser development and scripting.</p>
</li>
<li>
<p><a href="https://gbhackers.com/kalitutorials/"><strong>Kali Linux Tools</strong></a> List of Hacking tools present in Kali Linux.</p>
</li>
<li>
<p><a href="https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/"><strong>Malware Analysis</strong></a> Tools and resources for analysts.</p>
</li>
<li>
<p><a href="https://github.com/sindresorhus/awesome-nodejs"><strong>Node.js Programming</strong></a> Curated list of delightful Node.js packages and resources.</p>
</li>
<li>
<p><a href="https://github.com/caesar0301/awesome-pcaptools"><strong>PCAP Tools</strong></a> Tools for processing network traffic.</p>
</li>
<li>
<p><a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets"><strong>Penetration Testing Cheat Sheets</strong></a> Awesome Pentest Cheat Sheets.</p>
</li>
<li>
<p><a href="https://scribe.rip/@kuwaitison/pivoting-and-tunneling-for-oscp-and-beyond-cheat-sheet-3435d1d6022"><strong>Pivoting and Tunneling Guide</strong></a> - Detailed guide on methods to exploit.</p>
</li>
<li>
<p><a href="https://github.com/svaksha/pythonidae"><strong>Python Programming 1</strong></a> General Python programming.</p>
</li>
<li>
<p><a href="https://github.com/vinta/awesome-python"><strong>Python Programming 2</strong></a> General Python programming.</p>
</li>
<li>
<p><a href="https://github.com/dloss/python-pentest-tools"><strong>Python tools for penetration testers</strong></a> Lots of pentesting tools are written in Python.</p>
</li>
<li>
<p><a href="https://github.com/dreikanter/ruby-bookmarks"><strong>Ruby Programming 1</strong></a> The de-facto language for writing exploits.</p>
</li>
<li>
<p><a href="https://github.com/markets/awesome-ruby"><strong>Ruby Programming 2</strong></a> The de-facto</p>
</li>
</ul>
<hr>
<h3 id="virtual-machines-labs"><strong>Virtual Machines Labs</strong><a class="anchor" href="#virtual-machines-labs">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://ctftime.org"><strong>CFTtime</strong></a> - Free capture the flag hacking games.</p>
</li>
<li>
<p><a href="http://www.amanhardikar.com/mindmaps/Practice.html"><strong>MindMaps</strong></a> - Massive list of smaller sites that provide individual hacking challenges.</p>
</li>
<li>
<p><a href="https://www.pentesterlab.com"><strong>Pentesterlab</strong></a> - Free and paid Pentesting training with labs.</p>
</li>
<li>
<p><a href="https://github.com/nccgroup/sadcloud"><strong>Sadcloud</strong></a> - Sadcloud is a tool for spinning up insecure AWS infrastructure with Terraform.</p>
</li>
<li>
<p><a href="https://www.vulnhub.com/"><strong>Vulnerability Hub</strong></a> - Free Virtual machines to hack, provided by the community.</p>
</li>
<li>
<p><a href="https://vulnmachines.com"><strong>Vulnmachines</strong></a> - A place to learn and improve penetration testing/ethical hacking skills for FREE. The labs consist of 100+ real world scenarios to practice the latest exploits and cutting edge hacking techniques.</p>
</li>
</ul>
<hr>
<h3 id="vulnerability-databases"><strong>Vulnerability Databases</strong><a class="anchor" href="#vulnerability-databases">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://www.securityfocus.com/bid/"><strong>Bugtraq (BID)</strong></a> Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.</p>
</li>
<li>
<p><a href="https://cve.mitre.org/"><strong>Common Vulnerabilities and Exposures (CVE)</strong></a> Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.</p>
</li>
<li>
<p><a href="https://cxsecurity.com/"><strong>CXSecurity</strong></a> Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.</p>
</li>
<li>
<p><a href="https://www.exploit-db.com/"><strong>Exploit-DB</strong></a> Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.</p>
</li>
<li>
<p><a href="http://seclists.org/fulldisclosure/"><strong>Full-Disclosure</strong></a> Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.</p>
</li>
<li>
<p><a href="https://www.0day.today/"><strong>Inj3ct0r</strong></a> (<a href="http://mvfjfugdwgc5uwho.onion/">Onion service</a>) Exploit marketplace and vulnerability information aggregator.</p>
</li>
<li>
<p><a href="https://technet.microsoft.com/en-us/security/advisories#APUMA"><strong>Microsoft Security Advisories</strong></a> Archive of security advisories impacting Microsoft software.</p>
</li>
<li>
<p><a href="https://technet.microsoft.com/en-us/security/bulletins#sec_search"><strong>Microsoft Security Bulletins</strong></a> Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).</p>
</li>
<li>
<p><a href="https://www.mozilla.org/security/advisories/"><strong>Mozilla Foundation Security Advisories</strong></a> Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.</p>
</li>
<li>
<p><a href="https://nvd.nist.gov/"><strong>National Vulnerability Database (NVD)</strong></a> United States governments National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.</p>
</li>
<li>
<p><a href="https://packetstormsecurity.com/files/"><strong>Packet Storm</strong></a> Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.</p>
</li>
<li>
<p><a href="http://www.securiteam.com/"><strong>SecuriTeam</strong></a> Independent source of software vulnerability information.</p>
</li>
<li>
<p><a href="https://www.kb.cert.org/vuls/"><strong>US-CERT Vulnerability Notes Database</strong></a> Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).</p>
</li>
<li>
<p><a href="https://www.vulnerability-lab.com/"><strong>Vulnerability Lab</strong></a> Open forum for security advisories organized by category of exploit target.</p>
</li>
<li>
<p><a href="https://vulners.com/"><strong>Vulners</strong></a> Security database of software vulnerabilities.</p>
</li>
<li>
<p><a href="http://zerodayinitiative.com/advisories/published/"><strong>Zero Day Initiative</strong></a> Bug bounty program with the publicly accessible archive of published security advisories, operated by TippingPoint.</p>
</li>
</ul>
<hr>
<h3 id="vulnerability-scanners"><strong>Vulnerability Scanners</strong><a class="anchor" href="#vulnerability-scanners">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.rapid7.com/products/nexpose/"><strong>Nexpose</strong></a> Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.</p>
</li>
<li>
<p><a href="https://www.tenable.com/products/nessus-vulnerability-scanner"><strong>Nessus</strong></a> Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable. Free for under 25 devices.</p>
</li>
<li>
<p><a href="http://www.openvas.org/"><strong>OpenVAS</strong></a> Free open source software implementation of the popular Nessus vulnerability assessment system.</p>
</li>
<li>
<p><a href="https://github.com/future-architect/vuls"><strong>Vuls</strong></a> Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.</p>
</li>
</ul>
<hr>
<h3 id="web-exploitation"><strong>Web Exploitation</strong><a class="anchor" href="#web-exploitation">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/"><strong>Autochrome</strong></a> Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.</p>
</li>
<li>
<p><a href="http://blindelephant.sourceforge.net/"><strong>BlindElephant</strong></a> Web application fingerprinter.</p>
</li>
<li>
<p><a href="https://github.com/beefproject/beef"><strong>Browser Exploitation Framework (BeEF)</strong></a> Command and control server for delivering exploits to commandeered Web browsers.</p>
</li>
<li>
<p><a href="https://portswigger.net/burp/"><strong>Burp Suite</strong></a> One of the Hacking Tools integrated platform for performing security testing of web applications.</p>
</li>
<li>
<p><a href="https://github.com/commixproject/commix"><strong>Commix</strong></a> Automated all-in-one operating system command injection and exploitation tool.</p>
</li>
<li>
<p><a href="https://github.com/kost/dvcs-ripper"><strong>DVCS Ripper</strong></a> Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.</p>
</li>
<li>
<p><a href="https://github.com/ChrisTruncer/EyeWitness"><strong>EyeWitness</strong></a> Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.</p>
</li>
<li>
<p><a href="https://www.telerik.com/fiddler"><strong>Fiddler</strong></a> Free cross-platform web debugging proxy with user-friendly companion tools.</p>
</li>
<li>
<p><a href="https://github.com/kurobeats/fimap"><strong>Fimap</strong></a> Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.</p>
</li>
<li>
<p><a href="https://github.com/fuzzdb-project/fuzzdb"><strong>FuzzDB</strong></a> Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.</p>
</li>
<li>
<p><a href="https://github.com/internetwache/GitTools"><strong>GitTools</strong></a> One of the Hacking Tools that Automatically find and download Web accessible .git repositories.</p>
</li>
<li>
<p><a href="https://github.com/D35m0nd142/Kadabra"><strong>Kadabra</strong></a> Automatic LFI exploiter and scanner.</p>
</li>
<li>
<p><a href="https://github.com/P0cL4bs/Kadimus"><strong>Kadimus</strong></a> LFI scan and exploit tool.</p>
</li>
<li>
<p><a href="https://github.com/hvqzao/liffy"><strong>Liffy</strong></a> LFI exploitation tool.</p>
</li>
<li>
<p><a href="http://nosqlmap.net/"><strong>NoSQLmap</strong></a> Automatic NoSQL injection and database takeover tool.</p>
</li>
<li>
<p><a href="https://www.owasp.org/index.php/OWASP_OWTF"><strong>Offensive Web Testing Framework (OWTF)</strong></a> Python-based framework for pentesting Web applications based on the OWASP Testing Guide.</p>
</li>
<li>
<p><a href="https://www.thoughtcrime.org/software/sslstrip/"><strong>Sslstrip</strong></a> One of the Hacking Tools Demonstration of the HTTPS stripping attacks.</p>
</li>
<li>
<p><a href="https://github.com/LeonardoNve/sslstrip2"><strong>Sslstrip2</strong></a> SSLStrip version to defeat HSTS.</p>
</li>
<li>
<p><a href="http://sqlmap.org/"><strong>sqlmap</strong></a> Automatic SQL injection and database takeover tool.</p>
</li>
<li>
<p><a href="https://github.com/epinna/tplmap"><strong>Tplmap</strong></a> Automatic server-side template injection and Web server takeover Hacking Tools.</p>
</li>
<li>
<p><a href="https://github.com/codingo/VHostScan"><strong>VHostScan</strong></a> A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.</p>
</li>
<li>
<p><a href="https://github.com/epinna/weevely3"><strong>Weevely3</strong></a> Weaponized web shell.</p>
</li>
<li>
<p><a href="https://github.com/maaaaz/webscreenshot"><strong>Webscreenshot</strong></a> A simple script to take screenshots of list of websites.</p>
</li>
<li>
<p><a href="https://github.com/urbanadventurer/WhatWeb"><strong>WhatWeb</strong></a> Website fingerprinter.</p>
</li>
<li>
<p><a href="https://www.wappalyzer.com/"><strong>Wappalyzer</strong></a> Wappalyzer uncovers the technologies used on websites.</p>
</li>
<li>
<p><a href="https://github.com/EnableSecurity/wafw00f"><strong>wafw00f</strong></a> Identifies and fingerprints Web Application Firewall (WAF) products.</p>
</li>
<li>
<p><a href="https://github.com/rastating/wordpress-exploit-framework"><strong>WordPress Exploit Framework</strong></a> Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.</p>
</li>
<li>
<p><a href="https://github.com/espreto/wpsploit"><strong>WPSploit</strong></a> Exploit WordPress-powered websites with Metasploit.</p>
</li>
</ul>
<hr>
<h3 id="web-scanners"><strong>Web Scanners</strong><a class="anchor" href="#web-scanners">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://www.arachni-scanner.com/"><strong>Arachni</strong></a> Scriptable framework for evaluating the security of web applications.</p>
</li>
<li>
<p><a href="https://code.google.com/archive/p/cms-explorer/"><strong>Cms-explorer</strong></a> Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.</p>
</li>
<li>
<p><a href="https://cirt.net/nikto2"><strong>Nikto</strong></a> Noisy but fast black box web server and web application vulnerability scanner.</p>
</li>
<li>
<p><a href="https://secapps.com/"><strong>SecApps</strong></a> In-browser web application security testing suite.</p>
</li>
<li>
<p><a href="https://www.webreaver.com/"><strong>WebReaver</strong></a> Commercial, graphical web application vulnerability scanner designed for macOS.</p>
</li>
<li>
<p><a href="https://github.com/andresriancho/w3af"><strong>w3af</strong></a> Hacking Tools for Web application attack and audit framework.</p>
</li>
<li>
<p><a href="https://wpscan.org/"><strong>WPScan</strong></a> Hacking Tools of Black box WordPress vulnerability scanner.</p>
</li>
<li>
<p><a href="http://wapiti.sourceforge.net/"><strong>Wapiti</strong></a> Black box web application vulnerability scanner with built-in fuzzer.</p>
</li>
<li>
<p><a href="https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project"><strong>Joomscan</strong></a> One of the best Hacking Tools for Joomla vulnerability scanner.</p>
</li>
<li>
<p><a href="https://github.com/tijme/angularjs-csti-scanner"><strong>ACSTIS</strong></a> Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.</p>
</li>
</ul>
<hr>
<h3 id="windows-utilities"><strong>Windows Utilities</strong><a class="anchor" href="#windows-utilities">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="https://github.com/adaptivethreat/Bloodhound/wiki"><strong>Bloodhound</strong></a> Graphical Active Directory trust relationship explorer.</p>
</li>
<li>
<p><a href="https://github.com/byt3bl33d3r/DeathStar"><strong>DeathStar</strong></a> Python script that uses Empires RESTful API to automate gaining Domain Admin rights in Active Directory environments.</p>
</li>
<li>
<p><a href="https://www.powershellempire.com/"><strong>Empire</strong></a> Pure PowerShell post-exploitation agent.</p>
</li>
<li>
<p><a href="https://github.com/rabbitstack/fibratus"><strong>Fibratus</strong></a> Tool for exploration and tracing of the Windows kernel.</p>
</li>
<li>
<p><a href="https://github.com/trustedsec/unicorn"><strong>Magic Unicorn</strong></a> Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or certutil (using fake certificates).</p>
</li>
<li>
<p><a href="http://blog.gentilkiwi.com/mimikatz"><strong>Mimikatz</strong></a> Credentials extraction tool for Windows operating system.</p>
</li>
<li>
<p><a href="https://github.com/PowerShellMafia/PowerSploit"><strong>PowerSploit</strong></a> PowerShell Post-Exploitation Framework.</p>
</li>
<li>
<p><a href="https://github.com/nccgroup/redsnarf"><strong>redsnarf</strong></a> Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.</p>
</li>
<li>
<p><a href="https://github.com/SpiderLabs/Responder"><strong>Responder</strong></a> LLMNR, NBT-NS and MDNS poisoner.</p>
</li>
<li>
<p><a href="https://technet.microsoft.com/en-us/sysinternals/bb842062"><strong>Sysinternals Suite</strong></a> The Sysinternals Troubleshooting Utilities.</p>
</li>
<li>
<p><a href="https://labs.mwrinfosecurity.com/tools/wepwnise/"><strong>wePWNise</strong></a> Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.</p>
</li>
<li>
<p><a href="http://www.ampliasecurity.com/research/windows-credentials-editor/"><strong>Windows Credentials Editor</strong></a> Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.</p>
</li>
<li>
<p><a href="https://github.com/GDSSecurity/Windows-Exploit-Suggester"><strong>Windows Exploit Suggester</strong></a> Detects potential missing patches on the target.</p>
</li>
</ul>
<hr>
<h3 id="wireless-network-hacking"><strong>Wireless Network Hacking</strong><a class="anchor" href="#wireless-network-hacking">#</a></h3>
2026-03-16 23:07:23 +00:00
<ul>
<li>
<p><a href="http://www.aircrack-ng.org/"><strong>Aircrack-ng</strong></a> Set of Penetration testing &amp; Hacking Tools list for auditing wireless networks.</p>
</li>
<li>
<p><a href="https://github.com/FluxionNetwork/fluxion"><strong>Fluxion</strong></a> Suite of automated social engineering based WPA attacks.</p>
</li>
<li>
<p><a href="https://kismetwireless.net/"><strong>Kismet</strong></a> Wireless network detector, sniffer, and IDS.</p>
</li>
<li>
<p><a href="https://code.google.com/archive/p/reaver-wps"><strong>Reaver</strong></a> Brute force attack against WiFi Protected Setup.</p>
</li>
<li>
<p><a href="https://github.com/derv82/wifite"><strong>Wifite</strong></a> Automated wireless attack tool.</p>
</li>
</ul>
</article>
<footer class="book-footer">
<div class="flex flex-wrap justify-between">
<div>
</div>
<div>
</div>
</div>
<div class="flex flex-wrap justify-between">
<span>
<a href="/frontends/" class="flex align-center">
<img src="/icons/backward.svg" class="book-icon" alt="Backward" />
<span>Front Ends</span>
</a>
</span>
<span>
<a href="/health/" class="flex align-center">
<span>Health</span>
<img src="/icons/forward.svg" class="book-icon" alt="Forward" />
</a>
</span>
</div>
<div class="book-comments">
</div>
<script>(function(){document.querySelectorAll("pre:has(code)").forEach(e=>{e.addEventListener("click",e.focus),e.addEventListener("copy",function(t){if(t.preventDefault(),navigator.clipboard){const t=window.getSelection().toString()||e.textContent;navigator.clipboard.writeText(t)}})})})()</script>
</footer>
2026-03-16 23:07:23 +00:00
<label for="menu-control" class="hidden book-menu-overlay"></label>
</div>
<aside class="book-toc">
<div class="book-toc-content">
2026-03-16 23:07:23 +00:00
<nav id="TableOfContents">
<ul>
<li>
<ul>
<li><a href="#anonymity"><strong>Anonymity</strong></a></li>
<li><a href="#bug-bounty-platforms">Bug Bounty Platforms</a></li>
<li><a href="#ctfcapture-the-flag"><strong>CTF(Capture the flag)</strong></a></li>
<li><a href="#ddos"><strong>DDoS</strong></a></li>
<li><a href="#defense-evasion"><strong>Defense Evasion</strong></a></li>
<li><a href="#defcon-suggested-reading"><strong>Defcon Suggested Reading</strong></a></li>
<li><a href="#email-spoofing">Email Spoofing</a></li>
<li><a href="#exploit-development"><strong>Exploit Development</strong></a></li>
<li><a href="#file-format-analysis"><strong>File Format Analysis</strong></a></li>
<li><a href="#forensics">Forensics</a></li>
<li><a href="#gnulinux-utilities"><strong>GNU/Linux Utilities</strong></a></li>
<li><a href="#hacking-focused-osint"><strong>Hacking Focused OSINT</strong></a></li>
<li><a href="#hacking-conventions">Hacking Conventions</a></li>
<li><a href="#hash-cracking"><strong>Hash Cracking</strong></a></li>
<li><a href="#hex-editors"><strong>Hex Editors</strong></a></li>
<li><a href="#information-security-magazines"><strong>Information Security Magazines</strong></a></li>
<li><a href="#lock-picking-resources"><strong>Lock Picking Resources</strong></a></li>
<li><a href="#macos-utilities"><strong>macOS Utilities</strong></a></li>
<li><a href="#multi-paradigm-frameworks"><strong>Multi-paradigm Frameworks</strong></a></li>
<li><a href="#network-tools"><strong>Network Tools</strong></a></li>
<li><a href="#operating-systems"><strong>Operating Systems</strong></a></li>
<li><a href="#physical-hacking-tools">Physical Hacking Tools</a></li>
</ul>
</li>
<li><a href="#penetration-testing-resources">Penetration Testing Resources</a>
<ul>
<li><a href="#pentest-tools">Pentest Tools</a></li>
<li><a href="#penetration-testing-distributions"><strong>Penetration Testing Distributions</strong></a></li>
<li><a href="#docker-for-penetration-testing"><strong>Docker for Penetration Testing</strong></a></li>
<li><a href="#penetration-testing-report-templates"><strong>Penetration Testing Report Templates</strong></a></li>
<li><a href="#ransomware-recovery">Ransomware Recovery</a></li>
<li><a href="#reverse-engineering-tools"><strong>Reverse Engineering Tools</strong></a></li>
<li><a href="#security-courses">Security Courses</a></li>
<li><a href="#side-channel-tools"><strong>Side-channel Tools</strong></a></li>
<li><a href="#social-engineering"><strong>Social Engineering</strong></a></li>
<li><a href="#static-analyzers"><strong>Static Analyzers</strong></a></li>
<li><a href="#transport-layer-security-tools"><strong>Transport Layer Security Tools</strong></a></li>
<li><a href="#tools-lists-tutorials-etc"><strong>Tools, Lists, Tutorials etc.</strong></a></li>
<li><a href="#virtual-machines-labs"><strong>Virtual Machines Labs</strong></a></li>
<li><a href="#vulnerability-databases"><strong>Vulnerability Databases</strong></a></li>
<li><a href="#vulnerability-scanners"><strong>Vulnerability Scanners</strong></a></li>
<li><a href="#web-exploitation"><strong>Web Exploitation</strong></a></li>
<li><a href="#web-scanners"><strong>Web Scanners</strong></a></li>
<li><a href="#windows-utilities"><strong>Windows Utilities</strong></a></li>
<li><a href="#wireless-network-hacking"><strong>Wireless Network Hacking</strong></a></li>
</ul>
</li>
</ul>
</nav>
</div>
</aside>
2026-03-16 23:07:23 +00:00
</main>
</body>
</html>