Infosec resource center for offensive and defensive security operations.
A curated list of many tools and resources for both offensive and defensive security teams. Please visit https://infosec.house/ for our website version of this repo. Found a resources that should be on here? Feel free to submit a pull request or drop it in our Discord server.
Icon directory used within the tool and resources table
Icon
Description
Aged Resource - There has not been any update to resource in past 2 years.
Archived - Tool/Resource is in archived state. No longer updated/maintained.
Freemium - Tool/Resource is free but offers premium plan/upgrade of service.
Legality - Accessing this resource can be considered illegal. Check your local laws.
Malware - Live malware is hosted on this resource and can cause harm/damage to property. Proceed with caution.
Open Source - Source code is freely available and anyone can review it.
Payment Required - Tool/Service requires payment for usage.
Recommended - Infosec House recommendation of tool/resource
Registration Required - An account is required to access this resource.
TOR Access - This resource has a TOR website. The TOR software is required to access it.
Transparency - Resource has provided Infosec House with transparency report/log.
Verified - Verified resource/organization.
Winner - Resource was a winner in the Infosec House tool battle arena.
Defensive Security (Blue Team) tools and resources.
Keep track of your inventory
Tool
Description
Directory
LANSweeper
Build centralized IT asset inventory.
Uncover the dirty little secrets of a recovered HDD, Image, malware, and more.
Tool
Description
Directory
Hindsight
Web browser forensics for Google Chrome/Chromium.
Tool
Description
Directory
Andriller
Performs read-only, forensically sound, non-destructive acquisition from Android devices.
Tool
Description
Directory
The Sleuth Kit
Forensic toolkit for analyzing Microsoft and UNIX file systems and disks.
Tool
Description
Directory
DissectingMalwa.re Lab
Download/setup script for malware analysis/software reverse engineering.
Tool
Description
Directory
Beagle
Digital forensics tool which transforms security logs and data into graphs.
Intrusion Detection Systems and Intrusion Prevention Systems.
Tool
Description
Directory
Snort
Open Source detection software.
Suricata
Indpendent open-source threat detection engine.
Platforms for defensive security operations.
Tool
Description
Directory
Cyphon
Platform that receives, processes, and triages events to create a more efficient analytic workflow
DFIRTrack
The Incident Response Tracking Application
FIR
Fast Incident Response allows for easy creation, tracking, and reporting of cybersecurity incidents.
The Hive
A Scalable, Open Source and Free Security Incident Response Platform
Wazuh
Capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments.
Tool
Description
Directory
Cortex
Powerful Observable Analysis and Active Response Engine
Response
Real-time incident response and reporting tool.
Velociraptor
A tool for collecting host based state information using Velocidex Query Language (VQL) queries.
Indicators of Compromise.
Tool
Description
Directory
Fenrir
Simple Bash IOC Scanner.
Loki
Simple IOC and YARA scanner.
Redline
FireEye's premier free endpoint security tool, provides host investigative capabilities.
Thor Lite
Free IOC and YARA Scanner.
All the malware you can wish for to reverse engineer.
π΅ Distribution Centers
Organization
Description
Directory
Any.Run
Interactive online malware analysis service for dynamic and static research of most types of threats using any environments.
Contagio Malware Dump
Password Required. A collection of the latest malware samples, threats, observations, and analyses.
Cape Sandbox
A malware sandbox derived from Cuckoo and is designed to automate the process of malware analysis with the goal of extracting payloads and configuration from malware.
Das Malwerk
The daily zip-file aims to serve you a batch of malware ranging from annoying adware to bank trojans and beyond!
Hatching Triage
A malware sandboxing solution. It leverages a unique architecture, developed with scaling in mind from the start!
Hybrid Analysis
A free malware analysis service for the community. Using this service you can submit files for in-depth static and dynamic analysis.
InQuest
A free malware analysis service for the community. Using this service you can submit files for in-depth static and dynamic analysis.
KernelMode.Info
A forum for reverse engineerin, OS internals and malware analysis.
Malshare
A free Malware repository providing researchers access to samples, malicious feeds, and Yara results.
Malware Bazaar
Project operated by abuse.ch. A project to collect and share malware samples.
Malware Samples
An ongoing and updated archive of files collected which are associated with specific public malicious threat reports
Malware-DB (theZoo)
theZoo is a project created to make the possibility of malware analysis open and available to the public.
Objective-See
Mac malware samples collected by the Objective-See team
Packet Total
Simple, free, high-qualityh PCAP file analysis
PhishingKitTracker
An extensible and freshly updated collection of phishingkits for forensics and future analysis topped with simple stats
Polyswarm
Threat Intelligence Marketplace
SNDBOX
Malware sandbox platform
SoReL-20M
Sophos-ReversingLabs 20 Million dataset. HUGE dataset.
URLhaus
Project operated by abuse.ch. A project to collect and share malware samples.
VirusBay
A web-based, collaboration platform that connects security operations center (SOC) professionals with relevant malware researchers.
VirusShare
Because Sharing is Caring
VirusSign
A huge collection of high quality malware samples
Virus Samples
Over 150,000+ malicious files, viruses, malware, trojans, executables, scripts, and other forms of malware payloads across a variety of file types and architectures
VX-Underground
Over 150,000+ malicious files, viruses, malware, trojans, executables, scripts, and other forms of malware payloads across a variety of file types and architectures
Yori
Free sandbox-based file analysis service
Tool
Description
Directory
GonnaCry
A linux ransomware that encrypts all the user files with a strong encryption scheme.
Organization
Description
Directory
Hybrid Analysis
A free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
ID Ransomware
Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.
N/A
Jotti
Free service that lets you scan suspicious files with several anti-virus programs.
Kaspersky Threat Portal
Π‘heck any suspicious threat indicator, whether it is a file, file hash, IP address or web address.
Opswat
Simply submit suspicious files to MetaDefender Cloud for analysis.
VirusTotal
Analyze suspicious files and URLs to detect types of malware, automatically share them with the security community.
Monitoring tools and resources
Tool
Description
Directory
Zeek
A powerful framework for network traffic analysis and security monitoring.
Tools/Resources for analyzing phishing attacks.
Tool
Description
Directory
Phishalytics
Collect and analyse large-scale datasets.
Phishing Tracker
Utility to manage sets of phishing links making it easier to track their removal progress over time.
Discover where the threats begin.
Organization
Description
Directory
RAID Forums
Raid forum known for selling databreach leaks, stolen accounts, etc.
π΅ Frameworks/Platforms
Organization
Description
Directory
ARTIF
An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.
MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform (formely known as Malware Information Sharing Platform).
Organization
Description
Directory
Ghostbin
Ghostbin is a website where you can store and share text online.
N/A
Pastebin
Pastebin is a website where you can store text online for a set period of time.
N/A
π΅ Ransomware Group Feeds
Organization
Description
Directory
Arvin Club [TOR ]
Arvin ransomware team homepage.
Avaddon [TOR ]
Avaddon ransomware team homepage.
Babuk Locker [TOR ]
Babuk Locker ransomware team homepage
CL0P [TOR ]
CL0P ransomware team homepage.
CONTI [TOR ]
CONTI ransomware team homepage.
Cuba [TOR ]
Cuba ransomware team homepage.
DarkSide [TOR ]
Darkside ransomware team homepage.
DoppelPaymer [TOR ]
DoppelPaymer ransomware team hompage.
Everest [TOR ]
Everest ransomware team homepage.
Lorenz [TOR ]
Lorenz ransomware team hompage.
LV [TOR ]
LV ransomware team homepage.
Mount Locker [TOR ]
Mount Locker ransomware team homepage.
N3tw0rm [TOR ]
N3tw0rm ransomware team homepage.
Nefilim (Corporate Leaks) [TOR ]
Nefilm/Corporate Leaks ransomware team hompage.
Pay2Key [TOR ]
Pay2Key ransomware team homepage
PYSA [TOR ]
PYSA ransomware team homepage
Ragnar Locker [TOR ]
Ragnar Locker ransomware team homepage.
Ragnarok [TOR ]
Ragnarok ransomware team homepage.
RansomEXX [TOR ]
RansomEXX ransomware team homepage.
Ranzy Locker [TOR ]
Ranzy Locker ransomware team hompage.
Sodinokibi (REvil) [TOR ]
REvil ransomware team hompage.
Sunscrypt [TOR ]
Sunscrypt ransomware team homepage.
SynAck [TOR ]
SynAck ransomeware team hompage
Xing Team [TOR ]
Xing ransomware team hompage
π΅ TOR Directory Listings
Organization
Description
Directory
Dark Dir [TOR
TOR Link Directory
Hidden Links [TOR ]
TOR Link Directory
Onion Link Directory [TOR ]
TOR Link Directory
Onion Scanner [TOR ]
Onion Scanner is a unique deepweb shops crawler which gathers reviews for customersβ convenience.
Paul's Onion Links [TOR ]
TOR Link Directory
Shops Dir [TOR ]
ShopsDir is a growing catalogue of all DeepWeb/DarkNet shops, stores and markets
Tornode [TOR ]
TOR Link Directory
Organization
Description
Directory
Ahmia
Ahmia's mission is to create the premier search engine for services residing on the Tor anonymity network
N/A
Hoodle [TOR ]
A DeepWeb search engine with clear interface and accurate link database
Sentor [TOR ]
TOR Search Engine
Offensive Security (Red Team) tools and resources.
Tools and resources for pentesting against API endpoints.
π΄ Cheetsheets/Checklists
Tool
Description
Directory
MindAPI
Organize your API security assessment by using MindAPI.
π΄ Manipulation & Testing
Tool
Description
Directory
Arjun
HTTP parameter discovery suite.
Astra
Automated Security Testing For REST API's
Apache JMeter
Java application designed to load test functional behavior and measure performance.
Automatic API Attack Tool
Imperva's API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output.
Burp Suite
Arm yourself with the leading toolkit for web security testing. Test, find, and exploit vulnerabilities.
Fiddler Everwhere
A web debugging proxy for macOS, Windows, and Linux. Capture, inspect, monitor all HTTP(S) traffic between your computer and the Internet, mock requests, and diagnose network issue.
Hoppscotch
Open source tool that covers the entire testing spectrum (functional, security, load, mocking).
HttpMaster
Master HTTP testing & debugging.
Insomnia
Quickly and easily send REST, SOAP, GraphQL, and GRPC requests directly within Insomnia.
Karate
Test automation made simple.
Kiterunner
Contextual Content Discovery Tool.
Postman
A collaboration platform for API development. Postman's features simplify each step of building an API and streamline collaboration so you can create better APIsβfaster.
SoapUI
Open source tool that covers the entire testing spectrum (functional, security, load, mocking).
Taurus
Taurus improves experience of JMeter, Selenium and others.
Test Mace
A modern powerful crossplatform tool for working with an API and creating automated API tests.
vRESTng
Automate API Requests as Runnable Test Cases, just by providing Request Details. Also, Validate API Responses using Test Case Assertions.
Tool
Description
Directory
crAPI
Completely ridiculous API (crAPI).
Damn Vulnerable GraphQL App
An intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
DVMS
This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk.
dvws-node
Damn Vulnerable Web Service is a vulnerable web service/API/application that can be used to learn webservices/API vulnerabilities.
Kontra
A series of free interactive application security training modules that teach developers how to identify and mitigate security vulnerabilities in their web API endpoints.
N/A
VAmPI
Vulnerable REST API with OWASP top 10 vulnerabilities for APIs.
vAPI
Vulnerable Adversely Programmed Interface which is Self-Hostable PHP Interface that mimics OWASP API Top 10 scenarios in the means of Exercises.
Reading material for offensive security researchers.
Global bug bounty platform, crowdsourced security, & vulnerability disclosure.
π΄ Cheatsheets/Checklists
Organization
Description
Directory
Bugscrowd
#1 crowdsourcedc security company.
HackerOne
The platform is the industry standard for hacker-powered security.
huntr
Bug bounty board for securing open-source.
Integriti
Europe's #1 ethical hacking and bug bounty platform.
Safe Hats
Managed Bug Bounty.
Synack
Built by hackers for hackers.
Yes We Hack
Global bug bounty platform crowdsourced security & vulnerability disclosure.
Organization
Description
Directory
Recon.Dev
Collects recon data on bounty targets and provides tools to help quickly find targets and discover bugs.
Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
Organization
Description
Directory
pacu
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
N/A
Organization
Description
Directory
gitleaks
Scan git repos (or files) for secrets using regex and entropy.
gitrob
Reconnaissance tool for GitHub organizations
GitRoller
GitRoller: A Git Recon Tools
go-gitaudit
Git audit is a go package which can be used to audit git repository to find issues.
shhgit
Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.
truffleHog
Searches through git repositories for high entropy strings and secrets, digging deep into commit history.
Yar
Yar is a tool for plunderin' organizations, users and/or repositories.
Training and courses to master your craft. Some of the below courses do offer professional certifications as add-ons to course purchase.
π΄ Offensive Security Courses/Training
Organization
Description
Directory
AQ Answers
Daily updates on free courses, workshopd, interships, and jobs.
N/A
Bug Bounty Hunter
Helping you connect the bug to bounty.
Cybrary
The leading cybersecurity professional development platform.
eLearn Security
Infosec careers are heating up and candidates are doing everything they can to stand out.
Hacker101
A free class for web security.
HTB Academy
Cyber security trainingp by HackTheBox
INE
The premier provider of online it training.
Infosec Institute
Helps IT and security professionals advance their careers with skills development and certifications
Kontra
Application Security Training Redefined.
Offensive Security
The tech workforce development company.
Pentester Academy
Courses and Online Labs.
Pentester Lab
We make learning web hacking easier!
PortSwigger
Free, online web security training from the creators of Burp Suite
Pluralsight
The tech workforce development company.
Professor Messer
Professor Messer IT Certification Training.
SANS
SANS Institute is the most trusted resource for cybersecurity training, certifications and research.
TCM Security
SANS Institute is the most trusted resource for cybersecurity training, certifications and research.
TestOut
TestOut Ethical Hacker Pro teaches students to be aware of network attack strategies and common countermeasures.
Udemy
an online learning and teaching marketplace with over 155,000 courses.
Everything you need to crack all the hashes.
Tool
Description
Directory
Hashcat
Worlds fastest password cracker and only in-kernel rule engine
John the Ripper
An Open Source password security auditing and password recovery tool available for many operating systems
A CTF event is usually timed, and the points are totaled once the time has expired. The winning player/team will be the one that solved the most challenges, and thus, secured the highest score.
Organization
Description
Directory
Crackmes
A place where you can download crackmes to improve your reverse engineering skills.
Cryptohack
A fun free platform for learning modern cryptography.
CTF Challenge
Collection of 12 vulnerable web applications, each one has its own realistic infrastructure built over several subdomains containing vulnerabilities.
CTFLearn
Learn cybersecurity the most beginner-friendly way to get into hacking.
DomGoat
DOM security learning platform
N/A
Hack The Box
Massive online cyber security training platform, allowing individuals, companies, universities and all kinds of organizations around the world to level up their hacking skills.
pwnable.tw
Pwnable.tw is a wargame site for hackers to test and expand their binary exploiting skills.
pwnable.kr
A non-commercial wargame site which provides various pwn challenges regarding system exploitation.
Try Hack Me (King of the Hill)
Making it easier to break into security, all through your browswer.
Organization
Description
Directory
Hack-a-Sat
United States Air Force and United States Space Force jointly presents Hack-A-Sat
Gather all your exploits needed to pop that box.
Organization
Description
Directory
0-Day Today [TOR ]
The ultimate database of exploits and vulnerabilties and a great resource for researchers. Private exploits, and 0-Days are sold here.
Android Kernel
Android Kernel Exploits
Exploit Database
The Exploit Database is maintained by Offensive Security, an information security training company.
Linux Kernel
Linux kernel exploits.
NIST NVD
The National Institute of Standards and Technology. U.S. Department of Commerce
N/A
MacOS Kernel
MacOS Kernel Exploits
Security Focus
From original news content to detailed technical papers and guest columnists, Security Focus is a great resource for all things security related.
N/A
Windows Kernel
Windows Kernel Exploits
N/A
Windows Rootkits
Windows Rootkits
N/A
Grab some of the most used hardware within the penetration testing industry.
Tool
Description
Directory
Alfa Card
The Atheros chipset supports all 6 WiFi modes. Best success rate of various injection attacks using this Wi-Fi adaptor.
Ardunio
Open-source electronic prototyping platform enabling users to create interactive electronic objects.
Attify Badge
A hardware security assessment tool. Used to communicate between a PC and an embedded device over various hardware communication protocols.
DigiSpark
An Attiny85 based microcontroller development board similar to the Arduino line, only cheaper, smaller, and a bit less powerful.
MultiBlue Dongle
Can be connected to another computer via a USB port and control the victims computer via bluetooth.
O.MG Cable
For covert field-use, with features that enhance remote execution, stealth, and forensics evasion.
OpticSpy
a platform to explore, evaluate, and experiment with optical data transmissions.
Pluggable BT Dongle
Survey on nearby bluetooth devices enumerate the services and even send simple data packet to them.
Raspberry Pi
A tiny and affordable computer that you can use to learn programming through fun, practical projects.
Ubertooth One
Ubertooth One is an open source 2.4 GHz wireless development platform suitable for Bluetooth experimentation.
Wi-fi Pineapple
Automate WiFi auditing with all new campaigns and get actionable results from vulnerability assessment reports.
Organization
Description
Directory
Hacker Gadgets
One-stop warehouse, for the best Hacking Gadgets, Pentesting Equipment, Hacker Hardware Tools and everyday Swag.
Hacker Warehouse
Your one-stop shop for all your computer security needs from defense to offense.
Hak5
Pentest tools for authorized auditing/security analysis only where permitted.
Tools and resources for pentesting on linux environments.
Tool
Description
Directory
GTFOBins
A curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.
Tool
Description
Directory
EggShell
iOS/macOS/Linux Remote Administration Tool.
Mimipenguin
A tool to dump the login password from the current linux user.
Tools and resources for pentesting on mobile applications.
Tool
Description
Directory
adb
Allows you to install packages and evaluate your changes.
Airdroid
Transfer files across devices, remote control Android devices, mirror screen, and manage SMS & notification on computer.
Android File Transfer
Browse and transfer files between your Mac computer and your Android device.
iFunbox
General file management software for iPhone and other Apple products.
N/A
iMazing
Powerful user-friendly iOS device manager for Mac and PC.
Tool
Description
Directory
Bytecode Viewer
A lightweight user friendly Java Bytecode Viewer
CuckooDroid
Automated Android Malware Analysis with Cuckoo Sandbox.
Cutter
Reverse engineering platform powered by rizin.
DECAF
DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU.
Droid-FF
The android fuzzing framework
Drozer
Security testing framework for Android
Hooker
Provides various tools and applications that can be use to automatically intercept and modify any API calls
House
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
Inspeckage
Tool developed to offer dynamic analysis of Android applications
MobSF
An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework.
PATDroid
A collection of tools and data structures for analyzing Android applications and the system itself.
ProbeDroid
A dynamic Java code instrumentation for Android apps. Provides APIs for users to craft their own instrumentation tools.
radare2
Set of libraries, tools and plugins to ease reverse engineering tasks.
Runtime Mobile Security (RMS)
Powered by FRIDA a powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.
π΄ Flashing/Sideloading
Tool
Description
Directory
Cydia Impactor
Allows you to install packages and evaluate your changes.
N/A
Odin
Allows you to install packages and evaluate your changes.
N/A
π΄ Jailbreaking/Rooting
Tool
Description
Directory
canijailbreak
A website which tells you whether you can jailbreak your iOS device.
Checkra1n
Jailbreak for iPhone 5s through iPhone X, iOS 12.0 and up.
N/A
Chimera
iOS 12 jailbreak to not only feature a CoreTrust bypass so that binaries don't need to be resigned, but to also support A12 devices, including iPhone Xs, iPhone Xr, and the newest iPads.
N/A
Double H3lix
Jailbreak for 64-bit 10.x devices.
N/A
Etason
Jailbreak for all devices running iOS 8.4.1 32 bit.
N/A
Evasi0n
Jailbreak iPhone, iPad or iPod touch on iOS 7.0 β iOS 7.0.6
N/A
H3lix
Jailbreak for 32-bit 10.x devices.
N/A
Home Depot
Jailbreak for iOS 9.x devices
N/A
IPSW
Download current and previous versions of Apple's iOS, iPadOS, watchOS, tvOS and audioOS firmware and receive notifications when new firmwares are released.
N/A
Magisk
Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 5.0.
N/A
Pangu Jailbreak
Jailbreak for iOS 9.0 - 9.1
N/A
Phoenix
Semi-untethered jailbreak for 9.3.5-9.3.6. All 32-bit devices supported.
N/A
p0sixspwn
iOS Jailbreak for 6.1.X
N/A
redsn0w
Jailbreak for iOS 3-5
N/A
TaiG
Jailbreak for iOS 8.X.
N/A
unc0ver
A jailβbreak tool.
N/A
Tool
Description
Directory
DIVA
DIVA (Damn insecure and vulnerable App) is an Android App intentionally designed to be insecure.
DVHMA
Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.
Injured Android
A vulnerable Android application that shows simple examples of vulnerabilities in a ctf style.
InsecureBank v2
Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities.
Oversecured Vulnerable Android App
An Android app that aggregates all the platform's known and popular security vulnerabilities.
UnCrackable Apps
A collection of mobile reverse engineering challenges for iOS and Android.
Vuldroid
Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code.
VyAPI
The Modern Cloud-Based Vulnerable Hybrid Android App.
WaTF-Bank
What a Terrible Failure Mobile Banking Application for Android and iOS.
Tool
Description
Directory
Android APK Decompiler
Online android decompiler
N/A
Ostorlab
Online static taint analysis, 3rd party fingerprinting, and vulnerability analysis.
Oversecured
Android mobile app analyzer vulnerability scanner, designed for DevOps process integration.
Quixxi
An intelligent and integrated end-to-end mobile app security solution.
Tool
Description
Directory
EggShell
iOS/macOS/Linux Remote Administration Tool.
Tool
Description
Directory
Android Check
Static code analysis plugin for Android project.
Androwarn
Static code analyzer for malicious Android applications.
APKLab
A tool for reverse engineering 3rd party, closed, binary Android apps.
APKLeaks
Scanning APK file for URIs, endpoints & secrets.
APKScanner
The objective of this scanner is to find for misconfiguration, sensitive data and insecure components.
APK Studio
The objective of this scanner is to find for misconfiguration, sensitive data and insecure components.
APKTool
Seamlessly integrates the best open-source tools right inside VS Code.
Argus-SAF
Static analysis framework
Checkstyle
A tool for checking Java source code for adherence to a Code Standard or set of validation rules.
DeGuard
Statistical Deobfuscation for Android.
Deoptfuscator
Reverse the control-flow obfuscation performed by DexGuard on open-source Android applications.
Droid-Hunter
Android application vulnerability analysis and Android pentest tool.
Error Prone
Error Prone is a static analysis tool for Java that catches common programming mistakes at compile-time.
FindBugs
Uses static analysis to inspect Java bytecode for occurrences of bug patterns.
Find Security Bugs
Find Security Bugs is the SpotBugs plugin for security audits of Java web applications.
FlowDroid
Statically computes data flows in Android apps and Java programs.
Gradle
Supports many popular static analysis (Checkstyle, PMD, FindBugs, etc) via a set of built-in plugins.
Infer
Infer is a static analysis tool for Java, C++, Objective-C, and C. Infer is written in OCaml.
JADX
Dex to Java decompiler.
Mobile Audit
SAST and Malware Analysis for Android Mobile APKs
MobSF
An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework.
PMD
Finds common programming flaws like unused variables, empty catch blocks, unnecessary object creation, and so forth.
Qark
designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs.
Quark
An Obfuscation-Neglect Android Malware Scoring System.
Smali
An assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation.
Smali-CFG
Smali Control Flow Graph's
Soot
Smali Control Flow Graph's
Sparta
Static program analysis for reliable trusted apps.
StaCoAn
A crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications
Trueseeing
A fast, accurate and resillient vulnerabilities scanner for Android apps.
Yaazhini
A fast, accurate and resillient vulnerabilities scanner for Android apps.
N/A
Tool
Description
Directory
B3nac Sec
Dedicated mobile ethical hacking
N/A
Tool
Description
Directory
Android Tamer
Live Platform for Android Security professionals.
AppUse
Mobile app security testing, Android and iOS applications. Custom-made tools and scripts created by AppSec Labs.
Below are some of the most common hardware pieces owned by most security researchers.
Tool
Description
Directory
DAVOSET
a tool for committing distributed denial of service attacks using execution on other sites.
DDOSIM
Layer 7 DDoS Simulator
GoldenEye
A HTTP DoS Test Tool
HOIC
A network stress testing application
Http Unbreakable Load King (HULK)
A web server tool generates volumes of unique obfuscated traffic
LOIC
A network stress testing application
PyLoris
Scriptable tool for testing a services level of DoS handling
R-U-Dead-Yet (RUDY)
Attack targeted web applications by starvation of available sessions on the web server
Slowloris
An HTTP Denial of Service attack that affects threaded servers
TORs Hammer
Slow POST DoS testing tool ran through TOR
Tool
Description
Directory
dpkt
Fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols.
Ghost Phisher
A Wireless and Ethernet security auditing and attack software
Impacket
Impacket is a collection of Python classes for working with network protocols.
Libdnet
Provides a simplified, portable interface to several low-level networking routines.
Scapy
Python-based interactive packet manipulation program & library.
π΄ Port/Network Scanning
Tool
Description
Directory
masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
naabu
A fast port scanner written in go with a focus on reliability and simplicity.
NMAP
The Network Mapper.
RustScan
The Modern Port Scanner.
Tool
Description
Directory
TLS-DOS
A tool to stress test the SSL handshake by triggering processor intensive calls on the server side
Understand your target. Perform in-depth research and discover new attack surfaces.
Organization
Description
Directory
content-discovery
Tool to support with "Content Discovery" during mapping of a web applications/sites.
dirble
Fast directory scanning and scraping tool.
DirBuster
a multi threaded java application designed to brute force directories and files names on web/application servers.
dirsearch
Web path scanner.
Forexbuster
A fast, simple, recursive content discovery tool written in Rust.
ffuf
Fast web fuzzer written in Go.
GoBuster
Directory/File, DNS and VHost busting tool written in Go.
Kiterunner
Contextual Content Discovery Tool.
LinkFinder
A python script that finds endpoints in JavaScript files.
ParamSpider
Mining parameters from dark corners of Web Archives.
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning.
RecurseBuster
Rapid content discovery tool for recursively querying webservers.
Scilla
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration.
x8
Hidden parameters discovery suite written in Rust.
Organization
Description
Directory
aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility.
dnsdumpter
dns recon & research, find & lookup dns records
N/A
dnssearch
A subdomain enumeration tool.
dnsX
Fast and multi-purpose DNS toolkit allow to run multiple DNS queries.
Fierce
A DNS reconnaissance tool for locating non-contiguous IP space.
MassDNS
A high-performance DNS stub resolver for bulk lookups and reconnaissance
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning.
SubBrute
A DNS meta-query spider that enumerates DNS records, and subdomains.
Organization
Description
Directory
Altdns
Generates permutations, alterations and mutations of subdomains and then resolves them.
Amass
In-depth Attack Surface Mapping and Asset Discovery.
Assetfinder
Find domains and subdomains potentially related to a given domain.
crt.sh
Certificate search on domains.
N/A
ctfr
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.
Discover
Custom bash scripts to automate various pentesting tasks including recon.
findomain
The complete solution for domain recognition.
findsubdomains.com (spyse)
subdomain finder in order to make your reconnaissance process faster and effortless.
Knock
Knock Subdomain Scan.
OneForAll
A powerful subdomain integration tool
PD Actions
Continous reconnaissance and vuln assesment using Github Actions
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning.
Robtex
Robtex is used for various kinds of research of IP numbers, Domain names, etc.
N/A
Scilla
Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration.
sigurlfind3r
A reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine.
subfinder
Fast passive subdomian enumeration tool
sublist3r
Fast subdomains enumeration tool for penetration testers.
Turbolist3r
Subdomain enumeration tool with analysis features for discovered domains.
Tool
Description
Directory
Dorkbot
Command line dorking tool
Organization
Description
Directory
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning.
sn1per
Discover the attack surface and prioritize risks with our continuous Attack Surface Management.
Organization
Description
Directory
Censys
Highly-indexed Internet-wide scan data at scale
Google Dataset
Indexed datasets
N/A
Mamont
Open FTP Indexer
N/A
Napalm
Open FTP Indexer
N/A
OCCRP Aleph
Global archive of research material
N/A
OnionScan
TOR scanner
Shodan
The security search engine. Search everything IoT
Wayback Machine
Internet archive of saved web pages
N/A
Tool
Description
Directory
API Endpoints & Objects
A list of 3203 common API endpoints and objects designed for fuzzing.
Funny Fuzzing Wordlist
Funny Fuzzing Wordlist.
SecLists
A collection of multiple types of lists used during security assessments, collected in one place.
Manipulation techniques that exploits human error to gain private information, access, or valuables.
Tool
Description
Directory
Evilgnix
MITM attack framework used for phishing credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection.
Fierce Phish
A full-fledged phishing framework to manage all phishing engagements
GoPhish
Phishing toolkit designed for businesses and penetration testers
Judas
A pluggable phishing proxy.
King Phisher
A tool for testing and promoting user awareness by simulating real world phishing attacks.
Lucy
Allows companies to take on the role of an attacker to discover and eliminate existing weaknesses.
Phishing Frenzy
Ruby on Rails Phishing Framework
Shell Phish
A Phishing tool to replicate various
Social Engineering Toolkit
Penetration testing framework designed for social engineering
Social Fish
Phishing framework
SpeedPhish Framework
Tool designed to allow for quick recon and deployment of simple social engineering phishing exercises.
SPT Project
Phishing education toolkit that aims to help in securing the mind as opposed to securing computers.
Tool
Description
Directory
SMSSpoof
Send an SMS message to someone and change who it's from (the Sender)
π Vulnerability Scanners
Discover vulnerabilities fast, and automate some of the heavy loads.
Tool
Descrption
Directory
Acunetix
a complete web application security testing solution that can be used both standalone and as part of complex environments.
Alibaba Cloud Security Scanner
CSS utilizes data, white hat pentesting, and ML to provide an all-in-one security solution for domains and other online assets.
Amazon Inspector
Automated security assessment service to help improve the security and compliance of applications deployed on AWS.
AT&T Managed Vulnerability Program
Vulnerability management services that fit your business.
Burp Suite
PortSwigger's world-leading research to help its users find a wide range of vulnerabilities in web applications, automatically.
ManageEngine
Gain 360 degree visibility into your security exposure.
Nessus
Proprietary vulnerability scanner developed by Tenable, Inc.
Nexpose
Your on-prem vulnerability scanner.
nuclei
Fast and customisable vulnerability scanner based on simple YAML based DSL.
OpenVAS
A full-featured vulnerability scanner.
ZAP
World's most widely used web app scanner.
Microsoft Windows pentesting tools/resouces.
Tool
Descrption
Directory
BloodHound
Six Degrees of Domain Admin.
CrackMapExec
A swiss army knife for pentesting networks.
Tool
Descrption
Directory
Bitleaker
This tool can decrypt a BitLocker-locked partition with the TPM vulnerability.
Tool
Description
Directory
LOLBAS
Living Off The Land Binaries and Scripts.
Tool
Descrption
Directory
Kerberoast
A series of tools for attacking MS Kerberos implementations.
Pykek
A python library to manipulate KRB5-related data.
Rubeus
A C# toolset for raw Kerberos interaction and abuses.
Tool
Descrption
Directory
Blackbone
DLL scatter manual mapper.
Tool
Descrption
Directory
Mimikatz
Experiments with Windows security.
Tool
Descrption
Directory
Pentestly
Python and Powershell internal penetration testing framework
Powershell Suite
A collection of PowerShell utilities.
Tool
Descrption
Directory
SharpRDP
Remote Desktop Protocol .NET Console Application for Authenticated Command Execution.
Tool
Descrption
Directory
LOLBAS
Living Off The Land Binaries and Scripts
Windows-Pentest
Windows Pentest Scripts
Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.
π΄ Cross-Site Scripting
Tool
Descrption
Directory
XSS'OR
XSS'OR - Hack with JavaScript.
Discover tools and resources for exploiting Wi-Fi, bluetooth, RFID, and more.
Tool
Descrption
Directory
bettercap
Swiss army knife for WiFi, Bluetooth, HID, and ethernet network.
Bluelog
Linux bluetooth scanner
hcitool
Bluetooth host controller CLI tool for sending HCI commands on MacOS and Linux.
Tool
Descrption
Directory
Aircrack-NG
A complete suite of tools assess WiFi network security.
bettercap
Swiss army knife for WiFi, Bluetooth, HID, and ethernet network.
Reaver
Brute force attack against Wi-Fi Protected Setups (WPS)
Watch your tracks you leave across the internet. Up your operation security (OpSec) and don't get caught slipping.
The quality or state of being anonymous. Seek out technologies and methods of remaining anonymous in the day and age of mass surveillance.
Tools
Description
Directory
I2P
An anonymous network layer that allows for censorship resistant, peer to peer communication.
N/A
Pantoclick
See how trackers view your browser
N/A
TOR
Free and open-source software for enabling anonymous communication.
WEBKAY
A web app to show what every browser knows about you.
N/A
Organization
Description
Directory
Monero
Secure, private, untraceable.
ZCash
Proxies without limits. Take your business to a higher level.
π» Cryptocurrency Wallets
Organization
Description
Directory
Bitlox
Bitcoin mobile hardware wallet bluetooth low energy high security.
Exodus
Laptop and Desktop crypto wallet.
Samourai
A bitcoin wallet for the streets
Wasabi
Bitcoin privacy wallet with built-in CoinJoin
Organization
Description
Directory
Njalla [TOR]
A privacy-aware domain service..
Organization
Description
Directory
Proxy Shop
Proxy Shop with 8M+ locations, 160+ countries, and 50+ states.
Smarter Proxy
Proxies without limits. Take your business to a higher level.
Organization
Description
Directory
Comparision Sheet
VPN comparision sheet.
Mullvad VPN [TOR ]
Service that helps keep your online activity, identity, and location private.
ProtonVPN
High-speed Swiss VPN that safeguards your privacy.
Organization
Description
Directory
Global Leaks [TOR ]
Free and open source whistleblowing software, under the AGPL License
SecureDrop [TOR ]
Share and accept documents securely.
Secure your authentication methods with 2-Factor Authentication
Tool
Description
Directory
Hyper
Strong Authentication Products.
OnlyKey
A hardware password manager, two-factor security key, and file encryption token in one.
SoloKeys
Secure Login. Open Source. Easy.
Thetis
Security key.
Titan
Google MFA security key.
YubiKey
Security key, enabling strong two-factor, multi-factor and passwordless authentication.
Tool
Description
Directory
2FAS
Protect your online accounts and services.
N/A
Aegis Authenticator
A free, secure, and open source 2FA app for android.
N/A
andOTP
A Two-Factor authentication app for Android 5.1+
Authy
Enable 2FA for your favorite sites.
N/A
Duo
Protect your workforce with simple, powerful access security.
FreeOPT
A two-factor authentication application for systems utilizing one-time password protocols.
Google Authenticator
Multi-Factor authenticator for iOS and Android. Open-Source Version.
Microsoft Authenticator
Access your account easily, and securely.
N/A
Okta Verify iOS Android
Lightweight app that allows you to securely access your apps via 2-step verification.
N/A
TOTP Authenticator
Making 2-factor authentication simple and secure.
N/A
Tool
Description
Directory
Aerobase Server
Simple secure and seamless authentication.
LinOTP
Open source solution for two factor authentication.
PrivacyIDEA
A free, secure, and open source 2FA app for android.
N/A
Everything for your temporary needs
Organization
Description
Directory
DeadFake
Let's you send free fake emails
N/A
E-Mail Fake
Burner e-mail server. No IP logging.
N/A
Fake E-Mail Generatort
The Fake Mail Generator is an absolutely free disposable email system.
N/A
FakeMail
Temp Mail Address Protects Your Privacy.
N/A
Temp Mail Gen
A disposable, throwaway, temporary,one-click email. No IP logging.
N/A
Organization
Description
Directory
BurnerApp
phone number app for calling, texting and picture messaging.
Hushed
Temporary & Second Phone Numbers for Talk & Texting.
Protect your SMS messages, voice calls, and e-mails. Big brother is always watching.
Organization
Description
Directory
CTemplar [TOR ]
Anonymous E2EE (End to End Encrypted) email.
Noxe [TOR ]
E-Mail provider
SecMail [TOR ]
Secure mail service in TOR.
Premium Vendor
E-Mail provider utilized by vendors all around the world.
Protonmail
Secure E-Mail based in Switzerland.
SAFe-mail
Bulletproof e-mail service
TorBox [TOR ]
Hidden mail service.
Organization
Description
Directory
Adamant
Decentralized Messenger.
Briar
Secure messaging, anywhere.
Element
A messenger that gives you the privacy you expect from a conversation in your own home, but with everyone across the globe.
Ricochet
Ricochet is a different approach to instant messaging that doesnβt trust anyone in protecting your privacy.
Telegram
A new era of messaging.
Organization
Description
Directory
Signal
Speak Freely
Want to check compliance status of an XMPP server? Check out https://compliance.conversations.im/ .
Organization
Description
Directory
404 City
Cipher-punk community in federation XMPP. Our goal is to protect the privacy of personal life.
Creep [TOR ]
Free XMPP/Jabber server in France. IP's not logged. XSF standards.
CRIME
Secure & Unmonitored XMPP. Encryption Required. Registration Open.
Hella (Shadow)
Free XMPP service for secure unmonitored communications.
Hell XMPP
Russian XMPP service
JabberX
Free Private XMPP Chat Service. Designed in Sweeded and Hosted in Germany.
Resources/Tools utilized by both red/blue teams.
Tools for editing/viewing files.
Tool
Descrption
Directory
CyberChef
A fantastic tool for data transformation, extraction & manipulation in your web-browser.
Hexed.it
Browser based online and offline hex editing.
N/A
Hexyl
A command-line hex viewer
Organization
Description
Directory
Al-Khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
DumpsterFire
A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events.
Silver
Adversary Emulation Framework.
Network tools both offensive and defensive operations can utilize.
Organization
Description
Directory
ngrep
A PCAP-based tool that allows you to specify an extended regular or hexadecimal expression to match against data payloads of packets.
Open-Source Intel. Get all the information needed for your target.
Organization
Description
Directory
Dehashed
DeHashed is constantly obtaining new and private datasets that other services simply do not have. We are always the first to respond.
HaveIBeenPwned
Have I Been Pwned allows you to search across multiple data breaches to see if your email address has been compromised.
N/A
Leaked source
Leaked Source is a collaboration of data found online in the form of a lookup.
Snusbase
Snusbase indexes information from websites that have been hacked and had their database leaked.
WeLeakInfo V2 (Un-confirmed official site)
Another Indexed databreach website. Proceed with caution as this is a reboot version.
Tool
Description
Directory
Holehe
Allows you to check if the email is used on different sites and will retrieve information on sites with the forgotten password function.
π£ Frameworks/Platforms
Tool
Description
Directory
IntelOwl
OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale.
OpenCTI
Open Cyber Threat Intelligence Platform.
OSweep
Don't Just Search OSINT. Sweep It.
QueryTool
Querytool is an OSINT framework based on Google Spreadsheets.
Tool
Description
Directory
GeoSocial Footprint
Provides twitter users with an opportunity to view their geosocial footprint.
N/A
One Million Tweet Map
Displays last 24h geolocalized tweets delivered. Real Time.
N/A
Sherlock
Hunt down social media accounts by username.
Social Analyzer
API, CLI & Web App for analyzing & finding a person's profile across +800 social media.
Social Searcher
Social Media Search Engine.
Toutatis
a tool that allows you to extract information from instagrams accounts such as e-mails, phone numbers and more.
WhatsMyName
Unified data required to perform user and username enumeration on various websites
Reverse engineering tools both offensive and defensive operations can utilize.
Tool
Descrption
Directory
Quark
Android Malware Analysis/Scoring System
Tool
Descrption
Directory
Ghidra
Ghidra is a software reverse engineering (SRE) framework.
IDA Pro
State of the art binary code analysis.
Resource
Descrption
Directory
Ghidra Class - HackadayU
This is Class 1 in Reverse Engineering with Ghidra taught by Matthew Alt.
N/A
Write-ups both offensive and defensive operataions can utilize.
Some extra content. Infosec related of course.
Tool
Description
Directory
HackListX
A list of Hacking Streamers.
InfoSec Streamers
InfoSec streamers list sorted based on 14-day activity to help you find active streamers more easily.
Shoutout to the following amazing individuals for suggesting and adding resources!
chadb_n00b , EightBitOni , footpics4sale , GoProSlowYo , RySkill , theGwar .