x0x8x / awesome-pentester

Awestome list of pentesting resources.

Home Page:https://projects.miguelpiedrafita.com/awesome-pentester/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Awesome Pentest Awesome

A collection of awesome penetration testing resources

Contents:

  • Online Resources
    • Penetration Testing Resources
  • Tools
    • Penetration Testing Distributions
    • Basic Penetration Testing Tools
    • Vulnerability Scanners
    • Network Tools
    • Wireless Network Tools
    • SSL Analysis Tools
    • Web exploitation
    • Social Engineering Tools
    • OSInt Tools
    • Anonymity Tools
    • Reverse Engineering Tools
    • CTF Tools
  • Books
    • Penetration Testing Books
    • Hackers Handbook Series
    • Network Analysis Books
    • Reverse Engineering Books
    • Malware Analysis Books
    • Windows Books
    • Social Engineering Books
    • Lock Picking Books
  • Vulnerability Databases
  • Security Courses
  • Information Security Conferences
  • Awesome Lists

Online resources:

  • Penetration Testing Resources
  • Metasploit Unleashed - Free Offensive Security metasploit course
  • PTES - Penetration Testing Execution Standard
  • OWASP - Open Web Application Security Project

Tools:

  • Penetration Testing Distributions

  • Kali - A Linux distribution designed for digital forensics and penetration testing

  • ArchStrike - An Arch Linux repository for security professionals and enthusiasts

  • BlackArch - Arch Linux-based distribution for penetration testers and security researchers

  • NST - Network Security Toolkit distribution

  • Pentoo - Security-focused livecd based on Gentoo

  • BackBox - Ubuntu-based distribution for penetration tests and security assessments

  • Parrot - A distribution similar to Kali, with multiple architecture

  • Basic Penetration Testing Tools

  • Metasploit Framework - World's most used penetration testing software

  • Burp Suite - An integrated platform for performing security testing of web applications

  • ExploitPack - Graphical tool for penetration testing with a bunch of exploits

  • BeeF - The Browser Exploitation Framework Project

  • faraday - Collaborative Penetration Test and Vulnerability Management Platform

  • evilgrade - The update explotation framework

  • commix - Automated All-in-One OS Command Injection and Exploitation Tool

  • routersploit - Automated penetration testing software for router

  • Vulnerability Scanners

  • Netsparker - Web Application Security Scanner

  • Nexpose - Vulnerability Management & Risk Management Software

  • Nessus - Vulnerability, configuration, and compliance assessment

  • Nikto - Web application vulnerability scanner

  • OpenVAS - Open Source vulnerability scanner and manager

  • OWASP Zed Attack Proxy - Penetration testing tool for web applications

  • Secapps - Integrated web application security testing environment

  • w3af - Web application attack and audit framework

  • Wapiti - Web application vulnerability scanner

  • WebReaver - Web application vulnerability scanner for Mac OS X

  • DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR

  • arachni - Web Application Security Scanner Framework

  • Network Tools

  • nmap - Free Security Scanner For Network Exploration & Security Audits

  • pig - A Linux packet crafting tool

  • tcpdump/libpcap - A common packet analyzer that runs under the command line

  • Wireshark - A network protocol analyzer for Unix and Windows

  • Network Tools - Different network tools: ping, lookup, whois, etc

  • netsniff-ng - A Swiss army knife for for network sniffing

  • Intercepter-NG - a multifunctional network toolkit

  • SPARTA - Network Infrastructure Penetration Testing Tool

  • dnschef - A highly configurable DNS proxy for pentesters

  • DNSDumpster - Online DNS recon and search service

  • dnsenum - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results

  • dnsmap - Passive DNS network mapper

  • dnsrecon - DNS Enumeration Script

  • dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers

  • passivedns-client - Provides a library and a query tool for querying several passive DNS providers

  • passivedns - A network sniffer that logs all DNS server replies for use in a passive DNS setup

  • Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

  • Zarp - Zarp is a network attack tool centered around the exploitation of local networks

  • mitmproxy - An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers

  • mallory - HTTP/HTTPS proxy over SSH

  • Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols

  • DET - DET is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time

  • pwnat - punches holes in firewalls and NATs

  • dsniff - a collection of tools for network auditing and pentesting

  • tgcd - a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls

  • smbmap - a handy SMB enumeration tool

  • scapy - a python-based interactive packet manipulation program & library

  • Wireless Network Tools

  • Aircrack-ng - a set of tools for auditing wireless network

  • Fluxion - proffessional wifi cracker that combines traditional wifi hacking and social engineering

  • Kismet - Wireless network detector, sniffer, and IDS

  • Reaver - Brute force attack against Wifi Protected Setup

  • Wifite - Automated wireless attack tool

  • wifiphisher - Automated phishing attacks against Wi-Fi networks

  • SSL Analysis Tools

  • SSLyze - SSL configuration scanner

  • sslstrip - a demonstration of the HTTPS stripping attacks

  • sslstrip2 - SSLStrip version to defeat HSTS

  • tls_prober - fingerprint a server's SSL/TLS implementation

  • Web exploitation

  • WPScan - Black box WordPress vulnerability scanner

  • SQLmap - Automatic SQL injection and database takeover tool

  • weevely3 - Weaponized web shell

  • Wappalyzer - Wappalyzer uncovers the technologies used on websites

  • cms-explorer - CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.

  • joomscan - Joomla CMS scanner

  • WhatWeb - Website Fingerprinter

  • BlindElephant - Web Application Fingerprinter

  • fimap - Find, prepare, audit, exploit and even google automatically for LFI/RFI bugs

  • Kadabra - Automatic LFI exploiter and scanner

  • Kadimus - LFI scan and exploit tool

  • liffy - LFI exploitation tool

  • LOIC - An open source network stress tool for Windows

  • JS LOIC - JavaScript in-browser version of LOIC

  • T50 - The more fast network stress tool

  • Social Engineering Tools

  • SET - The Social-Engineer Toolkit from TrustedSec

  • OSInt Tools

  • Maltego - Proprietary software for open source intelligence and forensics, from Paterva.

  • theHarvester - E-mail, subdomain and people names harvester

  • creepy - A geolocation OSINT tool

  • metagoofil - Metadata harvester

  • Google Hacking Database - a database of Google dorks; can be used for recon

  • Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans

  • Shodan - Shodan is the world's first search engine for Internet-connected devices

  • ZoomEye - A cyberspace search engine for Internet-connected devices and websites using Xmap and Wmap

  • recon-ng - A full-featured Web Reconnaissance framework written in Python

  • github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak

  • Anonymity Tools

  • Tor - The free software for enabling onion routing online anonymity

  • I2P - The Invisible Internet Project

  • Nipe - Script to redirect all traffic from the machine to the Tor network.

  • Reverse Engineering Tools

  • IDA Pro - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger

  • IDA Free - The freeware version of IDA v5.0

  • WDK/WinDbg - Windows Driver Kit and WinDbg

  • OllyDbg - An x86 debugger that emphasizes binary code analysis

  • Radare2 - Opensource, crossplatform reverse engineering framework.

  • x64_dbg - An open-source x64/x32 debugger for windows.

  • Pyew - A Python tool for static malware analysis.

  • Bokken - GUI for Pyew Radare2.

  • Immunity Debugger - A powerful new way to write exploits and analyze malware

  • Evan's Debugger - OllyDbg-like debugger for Linux

  • Medusa disassembler - An open source interactive disassembler

  • plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

  • CTF Tools

  • Pwntools - CTF framework for use in CTFs

Books:

Information Security Conferences:

  • DEF CON - An annual hacker convention in Las Vegas
  • Black Hat - An annual security conference in Las Vegas
  • BSides - A framework for organising and holding security conferences
  • CCC - An annual meeting of the international hacker scene in Germany
  • DerbyCon - An annual hacker conference based in Louisville
  • PhreakNIC - A technology conference held annually in middle Tennessee
  • ShmooCon - An annual US east coast hacker convention
  • CarolinaCon - An infosec conference, held annually in North Carolina
  • HOPE - A conference series sponsored by the hacker magazine 2600
  • SummerCon - One of the oldest hacker conventions, held during Summer
  • Hack.lu - An annual conference held in Luxembourg
  • HITB - Deep-knowledge security conference held in Malaysia and The Netherlands
  • Hack3rCon - An annual US hacker conference
  • ThotCon - An annual US hacker conference held in Chicago
  • LayerOne - An annual US security conference held every spring in Los Angeles
  • DeepSec - Security Conference in Vienna, Austria
  • SkyDogCon - A technology conference in Nashville
  • SECUINSIDE - Security Conference in Seoul
  • DefCamp - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania
  • AppSecUSA - An annual conference organised by OWASP
  • BruCON - An annual security conference in Belgium
  • Infosecurity Europe - Europe's number one information security event, held in London, UK
  • Nullcon - An annual conference in Delhi and Goa, India
  • RSA Conference USA - An annual security conference in San Francisco, California, USA
  • Swiss Cyber Storm - An annual security conference in Lucerne, Switzerland
  • Virus Bulletin Conference - An annual conference going to be held in Denver, USA for 2016
  • Ekoparty - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina
  • 44Con - Annual Security Conference held in London
  • BalCCon - Balkan Computer Congress, annualy held in Novi Sad, Serbia
  • FSec - FSec - Croatian Information Security Gathering in Varaždin, Croatia

Awesome lists:

About

Awestome list of pentesting resources.

https://projects.miguelpiedrafita.com/awesome-pentester/

License:Creative Commons Zero v1.0 Universal