JR0ch17 / InfosecHouse

Infosec resource center for offensive and defensive security operations.

Home Page:https://infosec.house/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Infosec resource center for offensive and defensive security operations.


Created by m4giktrick


A curated list of many tools and resources for both offensive and defensive security teams. Please visit https://infosec.house/ for our website version of this repo. Found a resources that should be on here? Feel free to submit a pull request or drop it in our Discord server.

Socialize with Us

Organization Hyperlink
Discord https://discord.gg/FWe9bjDBfY
Instagram https://www.instagram.com/InfosecHouse/
Twitter https://twitter.com/InfosecHouse
Telegram https://t.me/InfosecHouse
Twitch https://www.twitch.tv/InfosecHouse
YouTube https://www.youtube.com/channel/UC4PgsAu56TSpzH66aIOqbKQ

Contents

πŸ” ICON DIRECTORY

Icon directory used within the tool and resources table

Icon Description
no-recent-update Aged Resource - There has not been any update to resource in past 2 years.
archive Archived - Tool/Resource is in archived state. No longer updated/maintained.
freemium-service Freemium - Tool/Resource is free but offers premium plan/upgrade of service.
legal Legality - Accessing this resource can be considered illegal. Check your local laws.
malware Malware - Live malware is hosted on this resource and can cause harm/damage to property. Proceed with caution.
opensource Open Source - Source code is freely available and anyone can review it.
paid-product Payment Required - Tool/Service requires payment for usage.
recommended-resource Recommended - Infosec House recommendation of tool/resource
register-profile Registration Required - An account is required to access this resource.
tor-icon TOR Access - This resource has a TOR website. The TOR software is required to access it.
transparency Transparency - Resource has provided Infosec House with transparency report/log.
verified Verified - Verified resource/organization.
winner-1 Winner - Resource was a winner in the Infosec House tool battle arena.

πŸ” Defensive Security

Defensive Security (Blue Team) tools and resources.

πŸ” Asset Management

Keep track of your inventory

πŸ”΅ Endpoint Visibility

Tool Description Directory
LANSweeper Build centralized IT asset inventory. freemium-serviceopensource

πŸ” Forensics

Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.

πŸ”΅ Browser

Tool Description Directory
Hindsight Web browser forensics for Google Chrome/Chromium. opensource

πŸ”΅ ISO's

Tool Description Directory
Bitscout LiveCD/LiveUSB for remote forensic acquisition and analysis N/A
SANS Investigative Forensics Toolkit (SIFT) Linux distribution for forensic analysis N/A
Tsurugi Linux distribution for DFIR N/A
WinFE Windows Forensics N/A

πŸ”΅ Mobile

Tool Description Directory
Andriller Performs read-only, forensically sound, non-destructive acquisition from Android devices. opensource

πŸ”΅ Operating Systems

Tool Description Directory
The Sleuth Kit Forensic toolkit for analyzing Microsoft and UNIX file systems and disks. opensource

πŸ”΅ Scripts

Tool Description Directory
DissectingMalwa.re Lab Download/setup script for malware analysis/software reverse engineering. opensource

πŸ”΅ Tools

Tool Description Directory
Beagle Digital forensics tool which transforms security logs and data into graphs. opensource

πŸ” IDS/IPS

Intrusion Detection Systems and Intrusion Prevention Systems.

πŸ”΅ Platform

Tool Description Directory
Snort Open Source detection software. opensource
Suricata Indpendent open-source threat detection engine. opensource

πŸ” Incident Response

Platforms for defensive security operations.

πŸ”΅ Management Platform

Tool Description Directory
Cyphon Platform that receives, processes, and triages events to create a more efficient analytic workflow archive opensource
DFIRTrack The Incident Response Tracking Application opensource
FIR Fast Incident Response allows for easy creation, tracking, and reporting of cybersecurity incidents. opensource
The Hive A Scalable, Open Source and Free Security Incident Response Platform opensource
Wazuh Capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. opensource

πŸ”΅ Reporting

Tool Description Directory
Cortex Powerful Observable Analysis and Active Response Engine opensource
Response Real-time incident response and reporting tool. opensource
Velociraptor A tool for collecting host based state information using Velocidex Query Language (VQL) queries. opensource

Indicators of Compromise.

πŸ”΅ Scanners

Tool Description Directory
Fenrir Simple Bash IOC Scanner. opensource
Loki Simple IOC and YARA scanner. opensource
Redline FireEye's premier free endpoint security tool, provides host investigative capabilities. opensource
Thor Lite Free IOC and YARA Scanner. freemium-service opensource

πŸ” Malware

All the malware you can wish for to reverse engineer.

πŸ”΅ Distribution Centers

Organization Description Directory
Any.Run Interactive online malware analysis service for dynamic and static research of most types of threats using any environments. malware register-profile
Contagio Malware Dump Password Required. A collection of the latest malware samples, threats, observations, and analyses. malware
Cape Sandbox A malware sandbox derived from Cuckoo and is designed to automate the process of malware analysis with the goal of extracting payloads and configuration from malware. malware register-profile
Das Malwerk The daily zip-file aims to serve you a batch of malware ranging from annoying adware to bank trojans and beyond! malware
Hatching Triage A malware sandboxing solution. It leverages a unique architecture, developed with scaling in mind from the start! malware paid-product register-profile
Hybrid Analysis A free malware analysis service for the community. Using this service you can submit files for in-depth static and dynamic analysis. malware register-profile
InQuest A free malware analysis service for the community. Using this service you can submit files for in-depth static and dynamic analysis. malware register-profile
KernelMode.Info A forum for reverse engineerin, OS internals and malware analysis. malware register-profile
Malshare A free Malware repository providing researchers access to samples, malicious feeds, and Yara results. malware register-profile
Malware Bazaar Project operated by abuse.ch. A project to collect and share malware samples. malware register-profile
Malware Samples An ongoing and updated archive of files collected which are associated with specific public malicious threat reports malware
Malware-DB (theZoo) theZoo is a project created to make the possibility of malware analysis open and available to the public. malware
Objective-See Mac malware samples collected by the Objective-See team malware
Packet Total Simple, free, high-qualityh PCAP file analysis malware
PhishingKitTracker An extensible and freshly updated collection of phishingkits for forensics and future analysis topped with simple stats malware
Polyswarm Threat Intelligence Marketplace malware register-profile
SNDBOX Malware sandbox platform malware register-profile
SoReL-20M Sophos-ReversingLabs 20 Million dataset. HUGE dataset. malware
URLhaus Project operated by abuse.ch. A project to collect and share malware samples. malware register-profile
VirusBay A web-based, collaboration platform that connects security operations center (SOC) professionals with relevant malware researchers. malware register-profile
VirusShare Because Sharing is Caring malware register-profile
VirusSign A huge collection of high quality malware samples malware register-profile
Virus Samples Over 150,000+ malicious files, viruses, malware, trojans, executables, scripts, and other forms of malware payloads across a variety of file types and architectures malware register-profile
VX-Underground Over 150,000+ malicious files, viruses, malware, trojans, executables, scripts, and other forms of malware payloads across a variety of file types and architectures malware
Yori Free sandbox-based file analysis service malware register-profile

πŸ”΅ Ransomware

Tool Description Directory
GonnaCry A linux ransomware that encrypts all the user files with a strong encryption scheme. malware

πŸ”΅ Scanners

Organization Description Directory
Hybrid Analysis A free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology. malware register-profile
ID Ransomware Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data. N/A
Jotti Free service that lets you scan suspicious files with several anti-virus programs. freemium-service
Kaspersky Threat Portal Π‘heck any suspicious threat indicator, whether it is a file, file hash, IP address or web address. freemium-service register-profile
Opswat Simply submit suspicious files to MetaDefender Cloud for analysis. freemium-service register-profile
VirusTotal Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community. freemium-service malware register-profile

πŸ” Monitoring

Monitoring tools and resources

πŸ”΅ Network

Tool Description Directory
Zeek A powerful framework for network traffic analysis and security monitoring. opensource

πŸ” Phishing

Tools/Resources for analyzing phishing attacks.

πŸ”΅ Frameworks

Tool Description Directory
Phishalytics Collect and analyse large-scale datasets. opensource
Phishing Tracker Utility to manage sets of phishing links making it easier to track their removal progress over time. opensource

πŸ” Threat Intel

Discover where the threats begin.

πŸ”΅ Forums

Organization Description Directory
RAID Forums Raid forum known for selling databreach leaks, stolen accounts, etc. freemium-service register-profile

πŸ”΅ Frameworks/Platforms

Organization Description Directory
ARTIF An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data. opensource
MISP MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform). opensource

πŸ”΅ Pastes

Organization Description Directory
Ghostbin Ghostbin is a website where you can store and share text online. N/A
Pastebin Pastebin is a website where you can store text online for a set period of time. N/A

πŸ”΅ Ransomware Group Feeds

Organization Description Directory
Arvin Club [TOR] Arvin ransomware team homepage. legal
Avaddon [TOR] Avaddon ransomware team homepage. legal tor-icon
Babuk Locker [TOR] Babuk Locker ransomware team homepage legal tor-icon
CL0P [TOR] CL0P ransomware team homepage. legal tor-icon
CONTI [TOR] CONTI ransomware team homepage. legal tor-icon
Cuba [TOR] Cuba ransomware team homepage. legal tor-icon
DarkSide [TOR] Darkside ransomware team homepage. legal tor-icon
DoppelPaymer [TOR] DoppelPaymer ransomware team hompage. legal tor-icon
Everest [TOR] Everest ransomware team homepage. legal tor-icon
Lorenz [TOR] Lorenz ransomware team hompage. legal tor-icon
LV [TOR] LV ransomware team homepage. legal tor-icon
Mount Locker [TOR] Mount Locker ransomware team homepage. legal tor-icon
N3tw0rm [TOR] N3tw0rm ransomware team homepage. legal tor-icon
Nefilim (Corporate Leaks) [TOR] Nefilm/Corporate Leaks ransomware team hompage. legal tor-icon
Pay2Key [TOR] Pay2Key ransomware team homepage legal tor-icon
PYSA [TOR] PYSA ransomware team homepage legal tor-icon
Ragnar Locker [TOR] Ragnar Locker ransomware team homepage. legal tor-icon
Ragnarok [TOR] Ragnarok ransomware team homepage. legal tor-icon
RansomEXX [TOR] RansomEXX ransomware team homepage. legal tor-icon
Ranzy Locker [TOR] Ranzy Locker ransomware team hompage. legal tor-icon
Sodinokibi (REvil) [TOR] REvil ransomware team hompage. legal tor-icon
Sunscrypt [TOR] Sunscrypt ransomware team homepage. legal tor-icon
SynAck [TOR] SynAck ransomeware team hompage legal tor-icon
Xing Team [TOR] Xing ransomware team hompage legal tor-icon

πŸ”΅ TOR Directory Listings

Organization Description Directory
Dark Dir [TOR TOR Link Directory tor-icon
Hidden Links [TOR] TOR Link Directory tor-icon
Onion Link Directory [TOR] TOR Link Directory tor-icon
Onion Scanner [TOR] Onion Scanner is a unique deepweb shops crawler which gathers reviews for customers’ convenience. tor-icon
Paul's Onion Links [TOR] TOR Link Directory tor-icon
Shops Dir [TOR] ShopsDir is a growing catalogue of all DeepWeb/DarkNet shops, stores and markets tor-icon
Tornode [TOR] TOR Link Directory tor-icon

πŸ”΅ TOR Search Engines

Organization Description Directory
Ahmia Ahmia's mission is to create the premier search engine for services residing on the Tor anonymity network N/A
Hoodle [TOR] A DeepWeb search engine with clear interface and accurate link database tor-icon
Sentor [TOR] TOR Search Engine tor-icon

πŸ” Offensive Security

Offensive Security (Red Team) tools and resources.

Tools and resources for pentesting against API endpoints.

πŸ”΄ Cheetsheets/Checklists

Tool Description Directory
API Security Checklist Checklist of the most important security countermeasures when designing, testing, and releasing your API . opensource
GraphQL OWASP OWASP GraphQL cheat sheet. opensource
Microservices OWASP Microservices Security opensource
OWASP API Top 10 OWASP API security Top 10. opensource
REST Security OWASP OWASP REST security cheat sheet. opensource
REST Assessment OWASP OWASP REST assessment cheat sheet. opensource
Web API Pentesting Web API pentesting GitBook. opensource

πŸ”΄ Documentation

Tool Description Directory
MindAPI Organize your API security assessment by using MindAPI. opensource

πŸ”΄ Manipulation & Testing

Tool Description Directory
Arjun HTTP parameter discovery suite. opensource
Astra Automated Security Testing For REST API's opensource
Apache JMeter Java application designed to load test functional behavior and measure performance. opensource
Automatic API Attack Tool Imperva's API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output. no-recent-update opensource
Burp Suite Arm yourself with the leading toolkit for web security testing. Test, find, and exploit vulnerabilities. freemium-service
Fiddler Everwhere A web debugging proxy for macOS, Windows, and Linux. Capture, inspect, monitor all HTTP(S) traffic between your computer and the Internet, mock requests, and diagnose network issue. freemium-service
Hoppscotch Open source tool that covers the entire testing spectrum (functional, security, load, mocking). opensource
HttpMaster Master HTTP testing & debugging. freemium-service
Insomnia Quickly and easily send REST, SOAP, GraphQL, and GRPC requests directly within Insomnia. freemium-serviceopensource
Karate Test automation made simple. opensource
Kiterunner Contextual Content Discovery Tool. opensource
Postman A collaboration platform for API development. Postman's features simplify each step of building an API and streamline collaboration so you can create better APIsβ€”faster. freemium-service
SoapUI Open source tool that covers the entire testing spectrum (functional, security, load, mocking). opensource
Taurus Taurus improves experience of JMeter, Selenium and others. opensource
Test Mace A modern powerful crossplatform tool for working with an API and creating automated API tests. freemium-serviceopensource
vRESTng Automate API Requests as Runnable Test Cases, just by providing Request Details. Also, Validate API Responses using Test Case Assertions. freemium-service

πŸ”΄ Training

Tool Description Directory
crAPI Completely ridiculous API (crAPI). opensource
Damn Vulnerable GraphQL App An intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security. opensource
DVMS This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk. opensource
dvws-node Damn Vulnerable Web Service is a vulnerable web service/API/application that can be used to learn webservices/API vulnerabilities. opensource
Kontra A series of free interactive application security training modules that teach developers how to identify and mitigate security vulnerabilities in their web API endpoints. N/A
VAmPI Vulnerable REST API with OWASP top 10 vulnerabilities for APIs. opensource
vAPI Vulnerable Adversely Programmed Interface which is Self-Hostable PHP Interface that mimics OWASP API Top 10 scenarios in the means of Exercises. opensource

πŸ” Blogs

Reading material for offensive security researchers.

πŸ”΄ Corporate

Organization Description Directory
Not so Secure Mix of research N/A
Orange Cyberdefense Mix of research N/A
Security Weekly Mix of research N/A
Trustwave Mix of research N/A

πŸ”΄ Personal

Organization Description Directory
Archangel Amael Mix of research N/A
Attack and Defense Mix of research N/A
carnal0wnage CVE research. N/A
Ch3rn0byl CVE research. N/A
Coldwind Mix of research N/A
Corelan Mix of research N/A
Darknet.org.uk Mix of research. N/A
Digi Ninja Mix of research N/A
GnuCitizen Mix of research N/A
Hacking & Security Mix of research N/A
ihazomgsecurityskills Mix of research N/A
Mad Irish Mix of research N/A
Memset Mix of research N/A
MG.LOL Hardware security research. N/A
Myne-us Hardware security research. N/A
Pentest Blog Mix of research. Vulnerability research team of PRODAFT SARL N/A
Question Defense Mix of research N/A
Reusable Security Password Cracking, Crypto, and General Security Research. N/A
Security Reliks Mix of research N/A
Security Sift CTF Write-ups/Windows Research N/A
Sirdarckcat Web App and Mix of research N/A
Spy Logic Mix of research N/A
Strolling Infosec Mix of research N/A
Weapons of Mass Analysis Mix of research N/A
Wirewatcher Mix of research N/A

πŸ” Bug Bounty

Global bug bounty platform, crowdsourced security, & vulnerability disclosure.

πŸ”΄ Cheatsheets/Checklists

Organization Description Directory
Bug bounty Roadmaps Bug Bounty Roadmaps opensource

πŸ”΄ Platforms

Organization Description Directory
Bugscrowd #1 crowdsourcedc security company. register-profile
HackerOne The platform is the industry standard for hacker-powered security. register-profile
huntr Bug bounty board for securing open-source. register-profile
Integriti Europe's #1 ethical hacking and bug bounty platform. register-profile
Safe Hats Managed Bug Bounty. register-profile
Synack Built by hackers for hackers. register-profile
Yes We Hack Global bug bounty platform crowdsourced security & vulnerability disclosure. register-profile

πŸ”΄ Services

Organization Description Directory
Recon.Dev Collects recon data on bounty targets and provides tools to help quickly find targets and discover bugs. freemium-service register-profile

πŸ” Cloud

Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.

πŸ”΄ AWS

Organization Description Directory
pacu The AWS exploitation framework, designed for testing the security of Amazon Web Services environments. N/A

πŸ”΄ Docker

Organization Description Directory
Dacker Daemon Attack Surface There are four major areas to consider when reviewing Docker security N/A

πŸ”΄ GitHub

Organization Description Directory
gitleaks Scan git repos (or files) for secrets using regex and entropy. opensource
gitrob Reconnaissance tool for GitHub organizations archive no-recent-update opensource
GitRoller GitRoller: A Git Recon Tools opensource
go-gitaudit Git audit is a go package which can be used to audit git repository to find issues. opensource
shhgit Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories. opensource
truffleHog Searches through git repositories for high entropy strings and secrets, digging deep into commit history. opensource
Yar Yar is a tool for plunderin' organizations, users and/or repositories. opensource

πŸ” Courses

Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.

πŸ”΄ Offensive Security Courses/Training

Organization Description Directory
AQ Answers Daily updates on free courses, workshopd, interships, and jobs. N/A
Bug Bounty Hunter Helping you connect the bug to bounty. register-profile
Cybrary The leading cybersecurity professional development platform. freemium-service register-profile
eLearn Security Infosec careers are heating up and candidates are doing everything they can to stand out. paid-product register-profile
Hacker101 A free class for web security. register-profile
HTB Academy Cyber security trainingp by HackTheBox register-profile
INE The premier provider of online it training. paid-product register-profile
Infosec Institute Helps IT and security professionals advance their careers with skills development and certifications paid-product register-profile
Kontra Application Security Training Redefined. freemium-service register-profile
Offensive Security The tech workforce development company. paid-product register-profile
Pentester Academy Courses and Online Labs. paid-product register-profile
Pentester Lab We make learning web hacking easier! freemium-service register-profile
PortSwigger Free, online web security training from the creators of Burp Suite register-profile
Pluralsight The tech workforce development company. paid-product register-profile
Professor Messer Professor Messer IT Certification Training. register-profile
SANS SANS Institute is the most trusted resource for cybersecurity training, certifications and research. paid-product register-profile
TCM Security SANS Institute is the most trusted resource for cybersecurity training, certifications and research. paid-product register-profile
TestOut TestOut Ethical Hacker Pro teaches students to be aware of network attack strategies and common countermeasures. paid-product register-profile
Udemy an online learning and teaching marketplace with over 155,000 courses. paid-product register-profile

πŸ” Cracking

Everything you need to crack all the hashes.

πŸ”΄ Password Cracking

Tool Description Directory
Hashcat Worlds fastest password cracker and only in-kernel rule engine opensource
John the Ripper An Open Source password security auditing and password recovery tool available for many operating systems opensource

πŸ” CTF Offensive

A CTF event is usually timed, and the points are totaled once the time has expired. The winning player/team will be the one that solved the most challenges, and thus, secured the highest score.

πŸ”΄ Continous

Organization Description Directory
Crackmes A place where you can download crackmes to improve your reverse engineering skills. register-profile
Cryptohack A fun free platform for learning modern cryptography. register-profile
CTF Challenge Collection of 12 vulnerable web applications, each one has its own realistic infrastructure built over several subdomains containing vulnerabilities. register-profile
CTFLearn Learn cybersecurity the most beginner-friendly way to get into hacking. register-profile
DomGoat DOM security learning platform N/A
Hack The Box Massive online cyber security training platform, allowing individuals, companies, universities and all kinds of organizations around the world to level up their hacking skills. freemium-serviceregister-profile
pwnable.tw Pwnable.tw is a wargame site for hackers to test and expand their binary exploiting skills. register-profile
pwnable.kr A non-commercial wargame site which provides various pwn challenges regarding system exploitation. register-profile
Try Hack Me (King of the Hill) Making it easier to break into security, all through your browswer. register-profile

πŸ”΄ Seasonal

Organization Description Directory
Hack-a-Sat United States Air Force and United States Space Force jointly presents Hack-A-Sat register-profile

πŸ” Exploits

Gather all your exploits needed to pop that box.

πŸ”΄ Exploit Databases

Organization Description Directory
0-Day Today [TOR] The ultimate database of exploits and vulnerabilties and a great resource for researchers. Private exploits, and 0-Days are sold here. freemium-servicemalware
Android Kernel Android Kernel Exploits no-recent-update
Exploit Database The Exploit Database is maintained by Offensive Security, an information security training company. recommended-resource malware opensource
Linux Kernel Linux kernel exploits. no-recent-update
NIST NVD The National Institute of Standards and Technology. U.S. Department of Commerce N/A
MacOS Kernel MacOS Kernel Exploits no-recent-update
Security Focus From original news content to detailed technical papers and guest columnists, Security Focus is a great resource for all things security related. N/A
Windows Kernel Windows Kernel Exploits N/A
Windows Rootkits Windows Rootkits N/A

πŸ” Hardware

Grab some of the most used hardware within the penetration testing industry.

πŸ”΄ Equipment

Tool Description Directory
Alfa Card The Atheros chipset supports all 6 WiFi modes. Best success rate of various injection attacks using this Wi-Fi adaptor. paid-product
Ardunio Open-source electronic prototyping platform enabling users to create interactive electronic objects. paid-product
Attify Badge A hardware security assessment tool. Used to communicate between a PC and an embedded device over various hardware communication protocols. paid-product
DigiSpark An Attiny85 based microcontroller development board similar to the Arduino line, only cheaper, smaller, and a bit less powerful. paid-product
MultiBlue Dongle Can be connected to another computer via a USB port and control the victims computer via bluetooth. paid-product
O.MG Cable For covert field-use, with features that enhance remote execution, stealth, and forensics evasion. paid-product
OpticSpy a platform to explore, evaluate, and experiment with optical data transmissions. paid-product
Pluggable BT Dongle Survey on nearby bluetooth devices enumerate the services and even send simple data packet to them. paid-product
Raspberry Pi A tiny and affordable computer that you can use to learn programming through fun, practical projects. paid-product
Ubertooth One Ubertooth One is an open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation. paid-product
Wi-fi Pineapple Automate WiFi auditing with all new campaigns and get actionable results from vulnerability assessment reports. paid-product

πŸ”΄ Store

Organization Description Directory
Hacker Gadgets One-stop warehouse, for the best Hacking Gadgets, Pentesting Equipment, Hacker Hardware Tools and everyday Swag. paid-product
Hacker Warehouse Your one-stop shop for all your computer security needs from defense to offense. paid-product
Hak5 Pentest tools for authorized auditing/security analysis only where permitted. paid-product

πŸ” Linux

Tools and resources for pentesting on linux environments.

πŸ”΄ Cheatsheets

Tool Description Directory
GTFOBins A curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems. opensource

πŸ”΄ Post Exploitation

Tool Description Directory
EggShell iOS/macOS/Linux Remote Administration Tool. no-recent-update opensource
Mimipenguin A tool to dump the login password from the current linux user. opensource

πŸ” Mobile

Tools and resources for pentesting on mobile applications.

πŸ”΄ App/File Management

Tool Description Directory
adb Allows you to install packages and evaluate your changes. opensource
Airdroid Transfer files across devices, remote control Android devices, mirror screen, and manage SMS & notification on computer. freemium-service
Android File Transfer Browse and transfer files between your Mac computer and your Android device. opensource
iFunbox General file management software for iPhone and other Apple products. N/A
iMazing Powerful user-friendly iOS device manager for Mac and PC. freemium-service

πŸ”΄ Bug Bounty Reports

Tool Description Directory
Android Reports & Reports Android reports and resources. opensource

πŸ”΄ Dynamic Analysis

Tool Description Directory
Bytecode Viewer A lightweight user friendly Java Bytecode Viewer opensource
CuckooDroid Automated Android Malware Analysis with Cuckoo Sandbox. opensource
Cutter Reverse engineering platform powered by rizin. opensource
DECAF DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. opensource
Droid-FF The android fuzzing framework no-recent-update opensource
Drozer Security testing framework for Android opensource
Hooker Provides various tools and applications that can be use to automatically intercept and modify any API calls no-recent-update opensource
House A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python. opensource
Inspeckage Tool developed to offer dynamic analysis of Android applications no-recent-update opensource
MobSF An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. opensource
PATDroid A collection of tools and data structures for analyzing Android applications and the system itself. no-recent-update opensource
ProbeDroid A dynamic Java code instrumentation for Android apps. Provides APIs for users to craft their own instrumentation tools. no-recent-update opensource
radare2 Set of libraries, tools and plugins to ease reverse engineering tasks. opensource
Runtime Mobile Security (RMS) Powered by FRIDA a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime. opensource

πŸ”΄ Flashing/Sideloading

Tool Description Directory
Cydia Impactor Allows you to install packages and evaluate your changes. N/A
Odin Allows you to install packages and evaluate your changes. N/A

πŸ”΄ Guides & References

Tool Description Directory
Android Application Penetration Testing Checklist Android pentesting checklist mindmap. opensource
iOS Pentesting iOS pentesting mindmap. opensource

πŸ”΄ Jailbreaking/Rooting

Tool Description Directory
canijailbreak A website which tells you whether you can jailbreak your iOS device. opensource
Checkra1n Jailbreak for iPhone 5s through iPhone X, iOS 12.0 and up. N/A
Chimera iOS 12 jailbreak to not only feature a CoreTrust bypass so that binaries don't need to be resigned, but to also support A12 devices, including iPhone Xs, iPhone Xr, and the newest iPads. N/A
Double H3lix Jailbreak for 64-bit 10.x devices. N/A
Etason Jailbreak for all devices running iOS 8.4.1 32 bit. N/A
Evasi0n Jailbreak iPhone, iPad or iPod touch on iOS 7.0 – iOS 7.0.6 N/A
H3lix Jailbreak for 32-bit 10.x devices. N/A
Home Depot Jailbreak for iOS 9.x devices N/A
IPSW Download current and previous versions of Apple's iOS, iPadOS, watchOS, tvOS and audioOS firmware and receive notifications when new firmwares are released. N/A
Magisk Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 5.0. N/A
Pangu Jailbreak Jailbreak for iOS 9.0 - 9.1 N/A
Phoenix Semi-untethered jailbreak for 9.3.5-9.3.6. All 32-bit devices supported. N/A
p0sixspwn iOS Jailbreak for 6.1.X N/A
redsn0w Jailbreak for iOS 3-5 N/A
TaiG Jailbreak for iOS 8.X. N/A
unc0ver A jail​break tool. N/A

πŸ”΄ Labs/Practice

Tool Description Directory
DIVA DIVA (Damn insecure and vulnerable App) is an Android App intentionally designed to be insecure. no-recent-update opensource
DVHMA Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. no-recent-update opensource
Injured Android A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style. opensource
InsecureBank v2 Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities. opensource
Oversecured Vulnerable Android App An Android app that aggregates all the platform's known and popular security vulnerabilities. opensource
UnCrackable Apps A collection of mobile reverse engineering challenges for iOS and Android. opensource
Vuldroid Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code. opensource
VyAPI The Modern Cloud-Based Vulnerable Hybrid Android App. opensource
WaTF-Bank What a Terrible Failure Mobile Banking Application for Android and iOS. opensource

πŸ”΄ Online Services

Tool Description Directory
Android APK Decompiler Online android decompiler N/A
Ostorlab Online static taint analysis, 3rd party fingerprinting, and vulnerability analysis. freemium-service
Oversecured Android mobile app analyzer vulnerability scanner, designed for DevOps process integration. freemium-service
Quixxi An intelligent and integrated end-to-end mobile app security solution. freemium-service

πŸ”΄ Post Exploitation

Tool Description Directory
EggShell iOS/macOS/Linux Remote Administration Tool. no-recent-update opensource

πŸ”΄ Static Analysis

Tool Description Directory
Android Check Static code analysis plugin for Android project. no-recent-update opensource
Androwarn Static code analyzer for malicious Android applications. no-recent-update opensource
APKLab A tool for reverse engineering 3rd party, closed, binary Android apps. opensource
APKLeaks Scanning APK file for URIs, endpoints & secrets. opensource
APKScanner The objective of this scanner is to find for misconfiguration, sensitive data and insecure components. opensource
APK Studio The objective of this scanner is to find for misconfiguration, sensitive data and insecure components. opensource
APKTool Seamlessly integrates the best open-source tools right inside VS Code. opensource
Argus-SAF Static analysis framework opensource
Checkstyle A tool for checking Java source code for adherence to a Code Standard or set of validation rules. opensource
DeGuard Statistical Deobfuscation for Android. opensource
Deoptfuscator Reverse the control-flow obfuscation performed by DexGuard on open-source Android applications. opensource
Droid-Hunter Android application vulnerability analysis and Android pentest tool. no-recent-update opensource
Error Prone Error Prone is a static analysis tool for Java that catches common programming mistakes at compile-time. opensource
FindBugs Uses static analysis to inspect Java bytecode for occurrences of bug patterns. no-recent-update opensource
Find Security Bugs Find Security Bugs is the SpotBugs plugin for security audits of Java web applications. opensource
FlowDroid Statically computes data flows in Android apps and Java programs. opensource
Gradle Supports many popular static analysis (Checkstyle, PMD, FindBugs, etc) via a set of built-in plugins. opensource
Infer Infer is a static analysis tool for Java, C++, Objective-C, and C. Infer is written in OCaml. opensource
JADX Dex to Java decompiler. opensource
Mobile Audit SAST and Malware Analysis for Android Mobile APKs opensource
MobSF An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. opensource
PMD Finds common programming flaws like unused variables, empty catch blocks, unnecessary object creation, and so forth. opensource
Qark designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs. no-recent-update opensource
Quark An Obfuscation-Neglect Android Malware Scoring System. opensource
Smali An assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. opensource
Smali-CFG Smali Control Flow Graph's opensource
Soot Smali Control Flow Graph's opensource
Sparta Static program analysis for reliable trusted apps. opensource
StaCoAn A crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications archive opensource
Trueseeing A fast, accurate and resillient vulnerabilities scanner for Android apps. opensource
Yaazhini A fast, accurate and resillient vulnerabilities scanner for Android apps. N/A

πŸ”΄ Video Content

Tool Description Directory
B3nac Sec Dedicated mobile ethical hacking N/A

πŸ”΄ Virtualization

Tool Description Directory
Android Tamer Live Platform for Android Security professionals. no-recent-update
AppUse Mobile app security testing, Android and iOS applications. Custom-made tools and scripts created by AppSec Labs. paid-product

πŸ”΄ Whitepapers

Tool Description Directory
Android Rooting:Methods, Detection, and Evastion Written by San-Tsai Sun, Andrea Cuadros, and Konstantin Beznosov. N/A

πŸ” Network

Below are some of the most common hardware pieces owned by most security researchers.

πŸ”΄ Denial of Service

Tool Description Directory
DAVOSET a tool for committing distributed denial of service attacks using execution on other sites. no-recent-update opensource
DDOSIM Layer 7 DDoS Simulator no-recent-update opensource
GoldenEye A HTTP DoS Test Tool archive opensource
HOIC A network stress testing application no-recent-update
Http Unbreakable Load King (HULK) A web server tool generates volumes of unique obfuscated traffic no-recent-update opensource
LOIC A network stress testing application no-recent-update opensource
PyLoris Scriptable tool for testing a services level of DoS handling no-recent-update opensource
R-U-Dead-Yet (RUDY) Attack targeted web applications by starvation of available sessions on the web server no-recent-update opensource
Slowloris An HTTP Denial of Service attack that affects threaded servers opensource
TORs Hammer Slow POST DoS testing tool ran through TOR opensource

πŸ”΄ LAN/WAN

Tool Description Directory
dpkt Fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols. opensource
Ghost Phisher A Wireless and Ethernet security auditing and attack software no-recent-update opensource
Impacket Impacket is a collection of Python classes for working with network protocols. opensource
Libdnet Provides a simplified, portable interface to several low-level networking routines. opensource
Scapy Python-based interactive packet manipulation program & library. opensource

πŸ”΄ Port/Network Scanning

Tool Description Directory
masscan TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. opensource
naabu A fast port scanner written in go with a focus on reliability and simplicity. opensource
NMAP The Network Mapper. opensource
RustScan The Modern Port Scanner. opensource

πŸ”΄ SSL/TLS

Tool Description Directory
TLS-DOS A tool to stress test the SSL handshake by triggering processor intensive calls on the server side no-recent-update opensource

πŸ” Reconnaissance

Understand your target. Perform in-depth research and discover new attack surfaces.

πŸ”΄ Content Discovery

Organization Description Directory
content-discovery Tool to support with "Content Discovery" during mapping of a web applications/sites. opensource
dirble Fast directory scanning and scraping tool. opensource
DirBuster a multi threaded java application designed to brute force directories and files names on web/application servers. opensource
dirsearch Web path scanner. opensource
Forexbuster A fast, simple, recursive content discovery tool written in Rust. opensource
ffuf Fast web fuzzer written in Go. opensource
GoBuster Directory/File, DNS and VHost busting tool written in Go. opensource
Kiterunner Contextual Content Discovery Tool. opensource
LinkFinder A python script that finds endpoints in JavaScript files. opensource
ParamSpider Mining parameters from dark corners of Web Archives. opensource
Raccoon A high performance offensive security tool for reconnaissance and vulnerability scanning. opensource
RecurseBuster Rapid content discovery tool for recursively querying webservers. no-recent-update opensource
Scilla Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration. opensource
x8 Hidden parameters discovery suite written in Rust. opensource

πŸ”΄ DNS

Organization Description Directory
aiodnsbrute Python 3.5+ DNS asynchronous brute force utility. no-recent-update opensource
dnsdumpter dns recon & research, find & lookup dns records N/A
dnssearch A subdomain enumeration tool. no-recent-update opensource
dnsX Fast and multi-purpose DNS toolkit allow to run multiple DNS queries. opensource
Fierce A DNS reconnaissance tool for locating non-contiguous IP space. opensource
MassDNS A high-performance DNS stub resolver for bulk lookups and reconnaissance opensource
Raccoon A high performance offensive security tool for reconnaissance and vulnerability scanning. opensource
SubBrute A DNS meta-query spider that enumerates DNS records, and subdomains. no-recent-update opensource

πŸ”΄ Domains

Organization Description Directory
Altdns Generates permutations, alterations and mutations of subdomains and then resolves them. no-recent-update opensource
Amass In-depth Attack Surface Mapping and Asset Discovery. opensource
Assetfinder Find domains and subdomains potentially related to a given domain. opensource
crt.sh Certificate search on domains. N/A
ctfr Abusing Certificate Transparency logs for getting HTTPS websites subdomains. no-recent-update opensource
Discover Custom bash scripts to automate various pentesting tasks including recon. opensource
findomain The complete solution for domain recognition. freemium-service opensource register-profile
findsubdomains.com (spyse) subdomain finder in order to make your reconnaissance process faster and effortless. freemium-service register-profile
Knock Knock Subdomain Scan. opensource
OneForAll A powerful subdomain integration tool opensource
PD Actions Continous reconnaissance and vuln assesment using Github Actions opensource
Raccoon A high performance offensive security tool for reconnaissance and vulnerability scanning. opensource
Robtex Robtex is used for various kinds of research of IP numbers, Domain names, etc. N/A
Scilla Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration. opensource
sigurlfind3r A reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. opensource
subfinder Fast passive subdomian enumeration tool opensource
sublist3r Fast subdomains enumeration tool for penetration testers. opensource
Turbolist3r Subdomain enumeration tool with analysis features for discovered domains. opensource

πŸ”΄ Dorking

Tool Description Directory
Dorkbot Command line dorking tool opensource

πŸ”΄ Frameworks

Organization Description Directory
Osmedeus Fully automated offensive security framework for reconnaissance and vulnerability scanning. freemium-service register-profile opensource
sn1per Discover the attack surface and prioritize risks with our continuous Attack Surface Management. freemium-service register-profile opensource

πŸ”΄ Search Engines

Organization Description Directory
Censys Highly-indexed Internet-wide scan data at scale freemium-service
Google Dataset Indexed datasets N/A
Mamont Open FTP Indexer N/A
Napalm Open FTP Indexer N/A
OCCRP Aleph Global archive of research material N/A
OnionScan TOR scanner no-recent-update opensource
Shodan The security search engine. Search everything IoT freemium-service
Wayback Machine Internet archive of saved web pages N/A

πŸ”΄ Wordlists

Tool Description Directory
API Endpoints & Objects A list of 3203 common API endpoints and objects designed for fuzzing. opensource
Funny Fuzzing Wordlist Funny Fuzzing Wordlist. opensource
SecLists A collection of multiple types of lists used during security assessments, collected in one place. opensource

πŸ” Social Engineering

Manipulation techniques that exploits human error to gain private information, access, or valuables.

πŸ”΄ Phishing

Tool Description Directory
Evilgnix MITM attack framework used for phishing credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. opensource
Fierce Phish A full-fledged phishing framework to manage all phishing engagements opensource
GoPhish Phishing toolkit designed for businesses and penetration testers opensource
Judas A pluggable phishing proxy. opensource
King Phisher A tool for testing and promoting user awareness by simulating real world phishing attacks. opensource
Lucy Allows companies to take on the role of an attacker to discover and eliminate existing weaknesses. freemium-service
Phishing Frenzy Ruby on Rails Phishing Framework opensource
Shell Phish A Phishing tool to replicate various opensource
Social Engineering Toolkit Penetration testing framework designed for social engineering opensource
Social Fish Phishing framework opensource
SpeedPhish Framework Tool designed to allow for quick recon and deployment of simple social engineering phishing exercises. opensource
SPT Project Phishing education toolkit that aims to help in securing the mind as opposed to securing computers. opensource

πŸ”΄ SMS

Tool Description Directory
SMSSpoof Send an SMS message to someone and change who it's from (the Sender) opensource

πŸ” Vulnerability Scanners

Discover vulnerabilities fast, and automate some of the heavy loads.

πŸ”΄ Scanners

Tool Descrption Directory
Acunetix a complete web application security testing solution that can be used both standalone and as part of complex environments. paid-product register-profile
Alibaba Cloud Security Scanner CSS utilizes data, white hat pentesting, and ML to provide an all-in-one security solution for domains and other online assets. paid-product register-profile
Amazon Inspector Automated security assessment service to help improve the security and compliance of applications deployed on AWS. paid-product register-profile
AT&T Managed Vulnerability Program Vulnerability management services that fit your business. paid-product register-profile
Burp Suite PortSwigger's world-leading research to help its users find a wide range of vulnerabilities in web applications, automatically. freemium-service register-profile
ManageEngine Gain 360 degree visibility into your security exposure. paid-product register-profile
Nessus Proprietary vulnerability scanner developed by Tenable, Inc. paid-product register-profile
Nexpose Your on-prem vulnerability scanner. paid-product register-profile
nuclei Fast and customisable vulnerability scanner based on simple YAML based DSL. opensource
OpenVAS A full-featured vulnerability scanner. freemium-service register-profile
ZAP World's most widely used web app scanner. opensource

πŸ” Windows

Microsoft Windows pentesting tools/resouces.

πŸ”΄ Active Directory

Tool Descrption Directory
BloodHound Six Degrees of Domain Admin. opensource
CrackMapExec A swiss army knife for pentesting networks. opensource

πŸ”΄ Bitlocker

Tool Descrption Directory
Bitleaker This tool can decrypt a BitLocker-locked partition with the TPM vulnerability. opensource

πŸ”΄ Cheatsheets

Tool Description Directory
LOLBAS Living Off The Land Binaries and Scripts. opensource

πŸ”΄ Kerberos

Tool Descrption Directory
Kerberoast A series of tools for attacking MS Kerberos implementations. opensource
Pykek A python library to manipulate KRB5-related data. opensource
Rubeus A C# toolset for raw Kerberos interaction and abuses. opensource

πŸ”΄ Memory

Tool Descrption Directory
Blackbone DLL scatter manual mapper. opensource

πŸ”΄ Post Exploitation

Tool Descrption Directory
Mimikatz Experiments with Windows security. opensource

πŸ”΄ Powershell

Tool Descrption Directory
Pentestly Python and Powershell internal penetration testing framework opensource
Powershell Suite A collection of PowerShell utilities. opensource

πŸ”΄ RDP

Tool Descrption Directory
SharpRDP Remote Desktop Protocol .NET Console Application for Authenticated Command Execution. opensource

πŸ”΄ Scripts

Tool Descrption Directory
LOLBAS Living Off The Land Binaries and Scripts opensource
Windows-Pentest Windows Pentest Scripts opensource

πŸ” Web Application

Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

πŸ”΄ Cross-Site Scripting

Tool Descrption Directory
XSS'OR XSS'OR - Hack with JavaScript. opensource

πŸ”΄ Protocols

Tool Descrption Directory
http-request-smuggling HTTP Request Smuggling Detection Tool. opensource

πŸ” Wireless

Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.

πŸ”΄ Bluetooth

Tool Descrption Directory
bettercap Swiss army knife for WiFi, Bluetooth, HID, and ethernet network. opensource
Bluelog Linux bluetooth scanner opensource
hcitool Bluetooth host controller CLI tool for sending HCI commands on MacOS and Linux. opensource

πŸ”΄ Wi-Fi

Tool Descrption Directory
Aircrack-NG A complete suite of tools assess WiFi network security. opensource
bettercap Swiss army knife for WiFi, Bluetooth, HID, and ethernet network. opensource
Reaver Brute force attack against Wi-Fi Protected Setups (WPS) opensource

πŸ” Operation Security

Watch your tracks you leave across the internet. Up your operation security (OpSec) and don't get caught slipping.

πŸ” Anonymity

The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.

πŸ‘» Browsing

Tools Description Directory
I2P An anonymous network layer that allows for censorship resistant, peer to peer communication. N/A
Pantoclick See how trackers view your browser N/A
TOR Free and open-source software for enabling anonymous communication. opensource
WEBKAY A web app to show what every browser knows about you. N/A

πŸ‘» Cryptocurrency

Organization Description Directory
Monero Secure, private, untraceable. paid-product
ZCash Proxies without limits. Take your business to a higher level. paid-product

πŸ‘» Cryptocurrency Wallets

Organization Description Directory
Bitlox Bitcoin mobile hardware wallet bluetooth low energy high security. opensource
Exodus Laptop and Desktop crypto wallet. opensource
Samourai A bitcoin wallet for the streets opensource
Wasabi Bitcoin privacy wallet with built-in CoinJoin opensource

πŸ‘» Domain Registrars

Organization Description Directory
Njalla [TOR] A privacy-aware domain service.. paid-product register-profile

πŸ‘» Proxies

Organization Description Directory
Proxy Shop Proxy Shop with 8M+ locations, 160+ countries, and 50+ states. paid-product register-profile
Smarter Proxy Proxies without limits. Take your business to a higher level. paid-product register-profile

πŸ‘» VPN

Organization Description Directory
Comparision Sheet VPN comparision sheet. opensource
Mullvad VPN [TOR] Service that helps keep your online activity, identity, and location private. opensource tor-icon
ProtonVPN High-speed Swiss VPN that safeguards your privacy. freemium-service opensource register-profile

πŸ‘» Whistleblowing

Organization Description Directory
Global Leaks [TOR] Free and open source whistleblowing software, under the AGPL License opensource tor-icon
SecureDrop [TOR] Share and accept documents securely. opensource tor-icon

πŸ” Authentication

Secure your authentication methods with 2-Factor Authentication

πŸ‘» MFA Hardware

Tool Description Directory
Hyper Strong Authentication Products. paid-product
OnlyKey A hardware password manager, two-factor security key, and file encryption token in one. paid-product
SoloKeys Secure Login. Open Source. Easy. opensource paid-product
Thetis Security key. paid-product
Titan Google MFA security key. paid-product
YubiKey Security key, enabling strong two-factor, multi-factor and passwordless authentication. paid-product

πŸ‘» MFA Mobile Apps

Tool Description Directory
2FAS Protect your online accounts and services. N/A
Aegis Authenticator A free, secure, and open source 2FA app for android. N/A
andOTP A Two-Factor authentication app for Android 5.1+ opensource
Authy Enable 2FA for your favorite sites. N/A
Duo Protect your workforce with simple, powerful access security. freemium-service
FreeOPT A two-factor authentication application for systems utilizing one-time password protocols. opensource
Google Authenticator Multi-Factor authenticator for iOS and Android. Open-Source Version. opensource
Microsoft Authenticator Access your account easily, and securely. N/A
Okta Verify iOS Android Lightweight app that allows you to securely access your apps via 2-step verification. N/A
TOTP Authenticator Making 2-factor authentication simple and secure. N/A

πŸ‘» MFA Systems

Tool Description Directory
Aerobase Server Simple secure and seamless authentication. opensource
LinOTP Open source solution for two factor authentication. opensource
PrivacyIDEA A free, secure, and open source 2FA app for android. N/A

πŸ” Burners

Everything for your temporary needs

πŸ‘» E-Mail

Organization Description Directory
DeadFake Let's you send free fake emails N/A
E-Mail Fake Burner e-mail server. No IP logging. N/A
Fake E-Mail Generatort The Fake Mail Generator is an absolutely free disposable email system. N/A
FakeMail Temp Mail Address Protects Your Privacy. N/A
Temp Mail Gen A disposable, throwaway, temporary,one-click email. No IP logging. N/A

πŸ‘» Phone Numbers

Organization Description Directory
BurnerApp phone number app for calling, texting and picture messaging. freemium-service register-profile
Hushed Temporary & Second Phone Numbers for Talk & Texting. freemium-service register-profile

πŸ” Communication

Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.

πŸ‘» E-Mail Services

Organization Description Directory
CTemplar [TOR] Anonymous E2EE (End to End Encrypted) email. freemium-service register-profile tor-icon
Noxe [TOR] E-Mail provider register-profile tor-icon
SecMail [TOR] Secure mail service in TOR. freemium-service register-profile tor-icon
Premium Vendor E-Mail provider utilized by vendors all around the world. register-profile
Protonmail Secure E-Mail based in Switzerland. freemium-service register-profile
SAFe-mail Bulletproof e-mail service register-profile
TorBox [TOR] Hidden mail service. register-profile tor-icon

πŸ‘» Messaging Services

Organization Description Directory
Adamant Decentralized Messenger. opensource
Briar Secure messaging, anywhere. opensource
Element A messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe. freemium-service opensource register-profile
Ricochet Ricochet is a different approach to instant messaging that doesn’t trust anyone in protecting your privacy. no-recent-update opensource
Telegram A new era of messaging. opensource

πŸ‘» SMS

Organization Description Directory
Signal Speak Freely opensource register-profile

πŸ‘» XMPP Services

Want to check compliance status of an XMPP server? Check out https://compliance.conversations.im/.

Organization Description Directory
404 City Cipher-punk community in federation XMPP. Our goal is to protect the privacy of personal life. register-profile
Creep [TOR] Free XMPP/Jabber server in France. IP's not logged. XSF standards. register-profile tor-icon
CRIME Secure & Unmonitored XMPP. Encryption Required. Registration Open. register-profile
Hella (Shadow) Free XMPP service for secure unmonitored communications. register-profile
Hell XMPP Russian XMPP service register-profile
JabberX Free Private XMPP Chat Service. Designed in Sweeded and Hosted in Germany. register-profile

πŸ” Purple Security

Resources/Tools utilized by both red/blue teams.

πŸ” Editors and Viewers

Tools for editing/viewing files.

🟣 Tools

Tool Descrption Directory
CyberChef A fantastic tool for data transformation, extraction & manipulation in your web-browser. opensource
Hexed.it Browser based online and offline hex editing. N/A
Hexyl A command-line hex viewer opensource

πŸ” Emulation

🟣 Adversary

Organization Description Directory
Al-Khaser Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. opensource
DumpsterFire A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. opensource
Silver Adversary Emulation Framework. opensource

πŸ” Network

Network tools both offensive and defensive operations can utilize.

🟣 Analysis

Organization Description Directory
ngrep A PCAP-based tool that allows you to specify an extended regular or hexadecimal expression to match against data payloads of packets. opensource

πŸ” OSINT

Open-Source Intel. Get all the information needed for your target.

🟣 Business

Organization Description Directory
Black Book Public records index N/A
Corporation Wiki Person and Company Wiki register-profile
Government of Canada Federal corporation lookup N/A
Open Gov US Open Government data in U.S. N/A
Spoke Business, People, and more N/A

🟣 Data Breach Dumps

Organization Description Directory
Dehashed DeHashed is constantly obtaining new and private datasets that other services simply do not have. We are always the first to respond. legal
HaveIBeenPwned Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised. N/A
Leaked source Leaked Source is a collaboration of data found online in the form of a lookup. legal
Snusbase Snusbase indexes information from websites that have been hacked and had their database leaked. legal
WeLeakInfo V2 (Un-confirmed official site) Another Indexed databreach website. Proceed with caution as this is a reboot version. legal

🟣 E-Mail

Tool Description Directory
Holehe Allows you to check if the email is used on different sites and will retrieve information on sites with the forgotten password function. opensource

🟣 Frameworks/Platforms

Tool Description Directory
IntelOwl OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale. opensource
OpenCTI Open Cyber Threat Intelligence Platform. opensource
OSweep Don't Just Search OSINT. Sweep It. opensource
QueryTool Querytool is an OSINT framework based on Google Spreadsheets. opensource

🟣 People

Organization Record Opt-Out/Removal Directory
411 (White Pages) CCPA Suppression Requests freemium-serviceregister-profile
Addresses (Intelius) CCPA freemiumregister-profile
Advanced Background Checks Link freemium-serviceregister-profile
AnyWho (Intelius) Link freemium-serviceregister-profile
Been Verified Link freemium-serviceregister-profile
Black Book N/A N/A
Check Them Link freemium-service
Classmates (PeopleConnect) Link freemium-serviceregister-profile
Corporation Wiki Link register-profile
DOB Search Link freemium-serviceregister-profile
Family Tree Now Link N/A
ID True Link freemium-serviceregister-profile
Instant Checkmate Link freemium-serviceregister-profile
Instant People Finder (Intelius) Link freemium-serviceregister-profile
Intelius Link freemium-service
Melissa Link freemium-serviceregister-profile
My Life CCPA freemium-serviceregister-profile
Nuwber Link freemium-serviceregister-profile
Open Gov US N/A N/A
PeekYou Link freemium-service
People Finder (Intelius) Link freemium-serviceregister-profile
People Finders Link freemium-serviceregister-profile
People Search Now Link N/A
People Smart (Been Verified) Link freemium-serviceregister-profile
Pipl Link paid-product register-profile
Private Eye Link freemium-serviceregister-profile
Public Info Directory Link freemium-serviceregister-profile
Public Records (Intelius) Link freemium-serviceregister-profile
Radaris E-Mail freemium-serviceregister-profile
Radio Reference N/A N/A
Spokeo Link freemium-serviceregister-profile
That's Them Link N/A
True People Search Link N/A
TruthFinder Link freemium-serviceregister-profile
USSearch Link freemium-serviceregister-profile
Voter Records Link N/A
Webmii N/A N/A
White Pages CCPA Suppression Request freemium-serviceregister-profile
Yasni datenschutz@yasni.de N/A
Zaba Search (Intelius) Link freemium-serviceregister-profile

🟣 Phone Numbers

Organization/Tool Description Record Opt-Out/Removal Directory
Telephone Directories Phone number directoy lookup Link N/A
Caller Smart Phone number directoy lookup Link register-profile
All Area Codes Phone number directoy lookup Link N/A
People by Name Phone number directoy lookup Link paid-product register-profile
PhoneInfoga Advanced information gathering & OSINT framework for phone numbers N/A opensource

🟣 Physical Address

Organization Record Opt-Out/Removal Directory
Neighbor Who (Been Verified) Link paid-product register-profile

🟣 Social Media

Tool Description Directory
GeoSocial Footprint Provides twitter users with an opportunity to view their geosocial footprint. N/A
One Million Tweet Map Displays last 24h geolocalized tweets delivered. Real Time. N/A
Sherlock Hunt down social media accounts by username. opensource
Social Analyzer API, CLI & Web App for analyzing & finding a person's profile across +800 social media. opensource
Social Searcher Social Media Search Engine. freemium-serviceregister-profile
Toutatis a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more. opensource
WhatsMyName Unified data required to perform user and username enumeration on various websites opensource

πŸ” Reverse Engineering

Reverse engineering tools both offensive and defensive operations can utilize.

🟣 Mobile

Tool Descrption Directory
Quark Android Malware Analysis/Scoring System freemium-service

🟣 Tools

Tool Descrption Directory
Ghidra Ghidra is a software reverse engineering (SRE) framework. opensource
IDA Pro State of the art binary code analysis. freemium-service

🟣 Videos

Resource Descrption Directory
Ghidra Class - HackadayU This is Class 1 in Reverse Engineering with Ghidra taught by Matthew Alt. N/A

πŸ” Write-Ups

Write-ups both offensive and defensive operataions can utilize.

🟣 Documents

Organization Description Directory
Cybercrime Campaign Collections APT & CyberCriminal Campaign Collection. opensource

πŸ” Xtras

Some extra content. Infosec related of course.

πŸ” Video

🟒 Livestreamers

Tool Description Directory
HackListX A list of Hacking Streamers. opensource
InfoSec Streamers InfoSec streamers list sorted based on 14-day activity to help you find active streamers more easily. opensource

πŸ” Thanks

Shoutout to the following amazing individuals for suggesting and adding resources!

chadb_n00b, EightBitOni, footpics4sale, GoProSlowYo, RySkill, theGwar.

About

Infosec resource center for offensive and defensive security operations.

https://infosec.house/