Awesome Hacking Tools
A collection of awesome lists for hackers, pentesters & security researchers.
A curated list of awesome Hacking Tools. Your contributions are always welcome !
MITM tools
Name |
Description |
Burp Suite |
GUI based tool for testing Web application security. |
mitmproxy |
An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed |
Ettercap |
Ettercap is a comprehensive suite for man in the middle attacks |
BetterCAP |
MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more. |
SQL Injection
Name |
Description |
SQLmap |
Automatic SQL injection and database takeover tool |
SQLninja |
SQL Server injection & takeover tool |
Source Code Analysis Tools
Name |
Description |
Retire.js |
detecting the use of JavaScript libraries with known vulnerabilities |
pyup |
Automated Security and Dependency Updates |
RIPS |
PHP Security Analysis |
Snyk |
find & fix vulnerabilities in dependencies, supports various languages |
Linux Security Tools
Name |
Description |
DefenseMatrix |
Full security solution for Linux Servers |
Exploitation tools
Name |
Description |
Metasploit |
The world’s most used penetration testing framework |
BeEF |
Browser Exploitation Framework (Beef) |
Core Impact |
Core Impact provides vulnerability assessment and penetration security testing throughout your organization. |
Search Engine for Penetration Tester
Name |
Description |
Shodan |
Shodan is the world's first search engine for Internet-connected devices. |
Zoomeye |
search engine for cyberspace that lets the user find specific network components(ip, services, etc.) |
Censys |
Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time |
vulners |
Complete Vulnerability DataBase & Security Scanner |
Awesome Repositories
Repository |
Description |
Xerosploit |
Efficient and advanced man in the middle framework |
HUNT Proxy Extension |
Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite). |
Awesome custom projects / Scripts