Awesome Hacking Tools

A collection of awesome lists for hackers, pentesters & security researchers.

A curated list of awesome Hacking Tools. Your contributions are always welcome !

Awesome Repositories

Repository
Description

A curated list of awesome malware analysis tools and resources

A collection of various awesome lists for hackers, pentesters and security researchers

A curated list of amazingly awesome OSINT

Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.

Identify common parameters vulnerable to certain vulnerability classes (HUNT Scanner, availible for Burp Suite PRO and ZAProxy). Organize testing methodologies (currently avalible only inside of Burp Suite).

A curated list of awesome Security talks

The toolbox of open source scanners

It is a collection of multiple types of lists used during security assessments

Efficient and advanced man in the middle framework

Some setup scripts for security research tools.

PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.

Awesome custom projects / Scripts

Name
Description

A useful tool to play with Windows security including extracting plaintext passwords, kerberos tickets, etc.

The LAZY script will make your life easier, and of course faster.

XSStrike is a program which can fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs.

Exploitation tools

Name
Description

Browser Exploitation Framework (Beef)

Core Impact provides vulnerability assessment and penetration security testing throughout your organization.

The world’s most used penetration testing framework

Linux Security Tools

Name
Description

Full security solution for Linux Servers

kernel privilege escalation enumeration and exploitation framework

Security auditing tool for Linux, macOS, and UNIX-based systems.

Easy-to-use live forensics toolbox for Linux endpoints

Exploit Databases

Name
Description

Inj3ct0r is the ultimate database of exploits and vulnerabilities and a great resource for vulnerability researchers and security professionals.

Exploit Database

Exploits Database by Offensive Security

Iranian Exploit DataBase

Vulnerability & Exploit Database - Rapid7

MITM tools

Name
Description

MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.

GUI based tool for testing Web application security.

Ettercap is a comprehensive suite for man in the middle attacks

Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.

Framework for Man-In-The-Middle attacks

An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed

SQL Injection

Name
Description

Automatic SQL injection and database takeover tool

SQL Server injection & takeover tool

Massive SQL injection scanner

Post explotation

Name
Description

Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

Search Engine for Penetration Tester

Name
Description

Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time

Shodan is the world's first search engine for Internet-connected devices.

Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.

search engine for cyberspace that lets the user find specific network components(ip, services, etc.)

### Security Information and Event Management (SIEM)

Name

Description

----

----

AlienVault’s Open Source Security Information and Event Management (SIEM) product

Network Scanning Tools

Name
Description

The industry standard in network/port scanning. Widely used.

A versatile and feature-packed packet sniffing/analysis tool.

Source Code Analysis Tools

Name
Description

Automated Security and Dependency Updates

PHP Security Analysis

detecting the use of JavaScript libraries with known vulnerabilities

find & fix vulnerabilities in dependencies, supports various languages

Binary Analysis Tools

Name
Description

BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code

Radare2 is a reverse engineering suite which includes a complete toolkit for reverse enigneering needs.

Collaboration tools

Name
Description

Open-source reporting and collaboration tool for InfoSec professionals

Linux privilege escalation

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://www.kernel-exploits.com/
https://github.com/rebootuser/LinEnum
https://github.com/PenturaLabs/Linux\_Exploit\_Suggester
https://www.securitysift.com/download/linuxprivchecker.py
http://pentestmonkey.net/tools/audit/unix-privesc-check
https://github.com/mzet-/linux-exploit-suggester
http://www.darknet.org.uk/2015/06/unix-privesc-check-unixlinux-user-privilege-escalation-scanner/
https://www.youtube.com/watch?v=dk2wsyFiosg
http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/\#gref
https://www.rebootuser.com/?p=1758

Last updated