mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
107 lines
6.4 KiB
Markdown
107 lines
6.4 KiB
Markdown
# Awesome Hacking Tools
|
||
|
||
**A collection of awesome lists for hackers, pentesters & security researchers.**
|
||
|
||
A curated list of awesome Hacking Tools. Your contributions are always welcome !
|
||
|
||
### Awesome Repositories
|
||
Repository | Description
|
||
---- | ----
|
||
[Awesome Malware Analysis](https://github.com/rshipp/awesome-malware-analysis) | A curated list of awesome malware analysis tools and resources
|
||
[Awesome-Hacking](https://github.com/Hack-with-Github/Awesome-Hacking) | A collection of various awesome lists for hackers, pentesters and security researchers
|
||
[fuzzdb](https://github.com/fuzzdb-project/fuzzdb) | Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
|
||
[HUNT Proxy Extension](https://github.com/bugcrowd/HUNT) | Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite).
|
||
[List of Sec talks/videos](https://github.com/PaulSec/awesome-sec-talks) | A curated list of awesome Security talks
|
||
[SecLists](https://github.com/danielmiessler/SecLists) | It is a collection of multiple types of lists used during security assessments
|
||
[Xerosploit](https://github.com/LionSec/xerosploit) | Efficient and advanced man in the middle framework
|
||
[ctf-tools](https://github.com/zardus/ctf-tools) | Some setup scripts for security research tools.
|
||
[PENTEST-WIKI](https://github.com/nixawk/pentest-wiki) | PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
|
||
|
||
|
||
### Awesome custom projects / Scripts
|
||
Name | Description
|
||
---- | ----
|
||
[mimikatz](https://github.com/gentilkiwi/mimikatz) | A useful tool to play with Windows security including extracting plaintext passwords, kerberos tickets, etc.
|
||
[LAZY script v2.1.3](https://github.com/arismelachroinos/lscript) | The LAZY script will make your life easier, and of course faster.
|
||
|
||
### Exploitation tools
|
||
Name | Description
|
||
---- | ----
|
||
[BeEF](http://beefproject.com/) | Browser Exploitation Framework (Beef)
|
||
[Core Impact](https://www.coresecurity.com/core-impact) | Core Impact provides vulnerability assessment and penetration security testing throughout your organization.
|
||
[Metasploit](https://www.metasploit.com/) | The world’s most used penetration testing framework
|
||
|
||
### Linux Security Tools
|
||
Name | Description
|
||
---- | ----
|
||
[DefenseMatrix](https://github.com/K4YT3X/DefenseMatrix) | Full security solution for Linux Servers
|
||
|
||
### Exploit Databases
|
||
Name | Description
|
||
---- | ----
|
||
[0day](http://0day.today/) | Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.
|
||
[cxsecurity](http://cxsecurity.com/exploit) | Exploit Database
|
||
[exploit-db](https://www.exploit-db.com/) | Exploits Database by Offensive Security
|
||
[iedb](http://iedb.ir/) | Iranian Exploit DataBase
|
||
[rapid7](https://rapid7.com/db) | Vulnerability & Exploit Database - Rapid7
|
||
|
||
### MITM tools
|
||
Name | Description
|
||
---- | ----
|
||
[BetterCAP](https://www.bettercap.org/) | MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.
|
||
[Burp Suite](https://portswigger.net/burp) | GUI based tool for testing Web application security.
|
||
[Ettercap](https://ettercap.github.io/ettercap/) | Ettercap is a comprehensive suite for man in the middle attacks
|
||
[MITMf](https://github.com/byt3bl33d3r/MITMf) | Framework for Man-In-The-Middle attacks
|
||
[mitmproxy](https://mitmproxy.org/) | An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed
|
||
|
||
### SQL Injection
|
||
Name | Description
|
||
---- | ----
|
||
[SQLmap](http://sqlmap.org/) | Automatic SQL injection and database takeover tool
|
||
[SQLninja](http://sqlninja.sourceforge.net/) | SQL Server injection & takeover tool
|
||
[SQLiv](https://github.com/Hadesy2k/sqliv) | Massive SQL injection scanner
|
||
|
||
### Post explotation
|
||
Name | Description
|
||
---- | ----
|
||
[Portia](https://github.com/SpiderLabs/portia) | Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
|
||
[RSPET](https://github.com/panagiks/RSPET) | RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
|
||
|
||
|
||
### Search Engine for Penetration Tester
|
||
Name | Description
|
||
---- | ----
|
||
[Censys](https://www.censys.io/) | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time
|
||
[Shodan](http://shodan.io/) | Shodan is the world's first search engine for Internet-connected devices.
|
||
[WiGLE](https://wigle.net/index) | Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
|
||
[Zoomeye](https://www.zoomeye.org/) | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)
|
||
### Security Information and Event Management (SIEM)
|
||
Name | Description
|
||
---- | ----
|
||
[OSSIM](https://www.alienvault.com/products/ossim) | AlienVault’s Open Source Security Information and Event Management (SIEM) product
|
||
|
||
### Network Scanning Tools
|
||
Name | Description
|
||
---- | ----
|
||
[NMAP](https://nmap.org/) | The industry standard in network/port scanning. Widely used.
|
||
[Wireshark](https://www.wireshark.org/) | A versatile and feature-packed packet sniffing/analysis tool.
|
||
|
||
### Source Code Analysis Tools
|
||
Name | Description
|
||
---- | ----
|
||
[pyup](https://pyup.io/) | Automated Security and Dependency Updates
|
||
[RIPS](https://www.ripstech.com/) | PHP Security Analysis
|
||
[Retire.js](http://retirejs.github.io/retire.js/) | detecting the use of JavaScript libraries with known vulnerabilities
|
||
[Snyk](https://snyk.io/) | find & fix vulnerabilities in dependencies, supports various languages
|
||
|
||
### Binary Analysis Tools
|
||
Name | Description
|
||
---- | ----
|
||
[BinNavi](https://github.com/google/binnavi) | BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code
|
||
[Radare2](https://github.com/radare/radare2) | Radare2 is a reverse engineering suite which includes a complete toolkit for reverse enigneering needs.
|
||
|
||
### Collaboration tools
|
||
Name | Description
|
||
---- | ----
|
||
[Dradis](https://dradisframework.com/ce/) | Open-source reporting and collaboration tool for InfoSec professionals
|