We are still actively working on the spam issue.

Difference between revisions of "Cybersecurity - basics and armory"

From InstallGentoo Wiki
Jump to: navigation, search
(OpSec/Privacy/Anonymity: Data broker removal links)
 
(59 intermediate revisions by 4 users not shown)
Line 1: Line 1:
<b>The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019 <br>
+
The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019.
(Wikiformating by @tinfoil-hat 9/2/2020)</b>  
+
<br>
 +
Wikiformating by @tinfoil-hat 9/2/2020.
 +
<br>
 +
Original / 1st version was  [https://pastebin.com/rMw4WbhX here].
 +
<br>
 +
The Arms/Armor section was updated by someone from [https://boards.4chan.org/g/catalog 4chan's /g/] in the summer of 2024.
 +
<br>
  
Original / 1st version here: https://pastebin.com/rMw4WbhX <br>
+
== Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity ==
___________________________________________________________________________________
 
  
== Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity ==
+
These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies on Earth.
 +
 
 +
<br> Networking: Good understanding of OSI layer model / Communication flow through each layer / Functions of each layer / Major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols / IP, ICMP Protocols (layer 3) / TCP, UDP Protocols (layer 4)
 +
 
 +
<br> Overview of TCP/IP Layer model: ARP / Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports
 +
 
 +
<br> Understanding of major (everyday Layer 7) services/protocols: DNS DHCP HTTP HTTP Header Fields HTTP Status Codes - How HTTP maintains state - HTTPS vs HTTP / FTP
  
These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies # on Earth.
+
<br> Active vs Passive data transfer / SSH / SSH handshake / Telnet /Telnet Handshake / SMTP / SMTP handshake (Mail from/ RCPT ) / How attachments are handled Network
  
* Networking: Good understanding of OSI layer model / Communication flow through each layer / Functions of each layer / Major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols / IP, ICMP Protocols (layer 3) / TCP, UDP Protocols (layer 4)
+
<br> Troubleshooting Methodology: Understanding of Network Address Translation (NAT) / Port Address Translation (PAT) / Understanding of Proxies / Overview of Virtual Private Networks (VPNs)
  
* Overview of TCP/IP Layer model: ARP / Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports
+
<br> How to read packet headers - Know common packet header information for IP, TCP, UDP
  
* Understanding of major (everyday Layer 7) services/protocols: DNS DHCP HTTP HTTP Header Fields HTTP Status Codes - How HTTP maintains state - HTTPS vs HTTP / FTP
+
<br> Understand which device operates at which OSI layer: Hub  Switch / Managed vs Unmanaged - Firewall - IDS/IPS
  
* Active vs Passive data transfer / SSH / SSH handshake / Telnet /Telnet Handshake / SMTP / SMTP handshake (Mail from/ RCPT ) / How attachments are handled Network
+
<br> Ability to read device logs: IDS/IPS Firewall Windows
  
* Troubleshooting Methodology: Understanding of Network Address Translation (NAT) / Port Address Translation (PAT) / Understanding of Proxies / Overview of Virtual Private Networks (VPNs)
+
<br> Advanced Concepts: Content Delivery Networks (CDNs) / HTTP Pipelining / IPv4 vs IPv6 addressing scheme / IPv4 & IPv6 differences / Security Security Device Operations : Understanding of IDS/IPS technologies / Signature vs Anomaly based / HIDS vs NIDS / How Snort works / How IPS systems prevent attacks / Drop packets / TCP reset
  
* How to read packet headers - Know common packet header information for IP, TCP, UDP
+
<br> Security Attacks: Detailed understanding of common web attacks:  SQL Injection / Blind SQL Injection / Cross Site Scripting: Stored Reflected  DOM / Cross Site Request Forgery / Local File Inclusion / Remote File Inclusion / Basic understanding of buffer overflow / Denial of Service / Remote Code Execution / PHP attacks / Heartbleed / Shellshock / Brute Force attacks
  
* Understand which device operates at which OSI layer: Hub  Switch / Managed vs Unmanaged - Firewall - IDS/IPS
+
<br> Understanding of the Malware Kill Chain: Worm vs Trojan / Phishing email / Landing redirect page / Exploit Kit / Malware Download / Malware Install / Phone Home / Data Exfiltration / Command and Control
  
* Ability to read device logs: IDS/IPS Firewall Windows
+
<br> Linux: Knowledge of filesystems used / NTFS, FAT vs ext2 3 4 / Overview of a journaling filesystem / Executing commands and command options / Interactive features: job control, history / File Utilities cp mv rm ls (etc.) / Editors: vi vim vimtutor nano / Process Utilities ps kill wait sleep / Filters: cat head tail sort uniq / How to read man pages: man vs info /apropos + man -k <keyword> / Detailed knowledge of tcpdump / Detailed knowledge of grep / Overview of: sed  awk  cut  screen nohup / How to background a process: At start of process Mid-way through the process / How to bring process to foreground.
 +
<br>
 +
== Certs ==
 +
<br>
 +
These are several pastas regarding getting the certs to work in cybsec. The first pasta was posted almost in every thread for a month and did not attract any criticism, so it is safe to say the thread agrees on the specified path.
  
* Advanced Concepts: Content Delivery Networks (CDNs) / HTTP Pipelining / IPv4 vs IPv6 addressing scheme / IPv4 & IPv6 differences / Security Security Device Operations : Understanding of IDS/IPS technologies / Signature vs Anomaly based / HIDS vs NIDS / How Snort works / How IPS systems prevent attacks / Drop packets / TCP reset
+
<br>
 +
Pasta 1
 +
<br>
 +
TryHackMe junior penetration tester path (do the basics before it if you don't have a background in IT) ----> Some Practice on TryHackMe ----> HackTheBox Academy ----> HackTheBox Boxes
  
* Security Attacks: Detailed understanding of common web attacks: SQL Injection / Blind SQL Injection / Cross Site Scripting: Stored Reflected  DOM / Cross Site Request Forgery / Local File Inclusion / Remote File Inclusion / Basic understanding of buffer overflow / Denial of Service / Remote Code Execution / PHP attacks / Heartbleed / Shellshock / Brute Force attacks
+
<br>
 +
I'll add to this and say check out this course:
 +
https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
  
* Understanding of the Malware Kill Chain: Worm vs Trojan / Phishing email / Landing redirect page / Exploit Kit / Malware Download / Malware Install / Phone Home / Data Exfiltration / Command and Control
+
<br>
 +
You can also look into his associated certificate. It's basically a cheaper, and a bit more realistic exam than the OSCP in regards to conducting a pentest end to end. His certs are becoming more well-known in the industry. I work with people that got them.
  
* Linux: Knowledge of filesystems used / NTFS, FAT vs ext2 3 4 / Overview of a journaling filesystem / Executing commands and command options / Interactive features: job control, history / File Utilities cp mv rm ls (etc.) / Editors: vi vim vimtutor nano / Process Utilities ps kill wait sleep / Filters: cat head tail sort uniq / How to read man pages: man vs info /apropos + man -k <keyword> / Detailed knowledge of tcpdump / Detailed knowledge of grep / Overview of: sed  awk  cut  screen nohup / How to background a process: At start of process Mid-way through the process / How to bring process to foreground
 
 
<br>
 
<br>
______________________________________________________________________________________________________________________________
+
I'm not a shill. TCM helped me pass the OSCP back in the day.
  
== Knowledge sources: ==
+
<br>
 +
Pro tip: When you do hackthebox, finish one, then watch how someone like [https://m.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA ippsec] did it to learn how someone better approaches the same target.
  
 +
<br>
 +
Pasta 2
 +
<br>
 +
PNPT is good for someone FRESH into /sec/, they dont know jack for shit etc. its gives them high level in almost everything + the soft skills are nice.
  
* The Mind Maps
+
<br>
 +
BUT.... it's NOTHING compared to the CPTS's difficulty and skills that are required to pass the exam, CPTS wins in terms of sheer quantity of content, quality of content, always updated, shows you all of the different paths, the perfect example of this is if you compare the pivoting module from CPTS and the one from PNPT, absolutely no competition. I think it already speaks volumes that the CPTS is considered to be more difficult than the OSCP even with the 10 days they give you.
  
* The Mind Maps listed below were made by amanhardikar; they are gigantic, well designed, extremely detailed graphics breaking down subjects/knowledge 
+
<br>
 +
TLDR; New to /sec/? do PNPT, Wanna be a god? do CPTS.
  
* pertinent to Hacking, OffSec, Cybersecurity & General Computer Science (which makes them pertinent to InfoSec/OffSec in general).  
+
<br>
 +
Spam retired boxes with Ippsec and practice A LOT (something I wish I did). Do your best to understand WHY, HOW and WHAT is vulnerable. Like really dig into it and read about its theory rather than just copy-pasting the exploit. Try to use the exploit manually rather than a script or better yet create your OWN script for that same exploit. Something you didn't like? Was it too slow? The help menu was annoying? Okay, then make it yourself after you finish the box. Find excuses to dig deeper into something, of course don't dig so deep you lose track but you get the idea.
  
* Even better, amanhardikar has directions on how to create such graphics listed at the site below as well.
+
<br>
 +
Oh yeah last tip, surround yourself with people better than you or same skill level and keep pushing yourself to be better and pushing them.
  
All Mind Maps below found at https://www.amanhardikar.com/mindmaps.html
+
<br>
 +
Pasta 3
 +
<br>
 +
A guy in my network did it with nothing but security+ and network+. He went from helpdesk > technician > analyst and that's all he has.
  
All/Most Mind Maps below are listed in HTML (Full Size) & PNG (Image Only)form.
+
<br>
 +
He got helpdesk with 0 anything then got the intermediate job from helpdesk with them then got security analyst from there. If you have any certs for helpdesk you're already overqualified and underexperienced.
  
 +
== Knowledge sources ==
 +
<br>The Mind Maps listed below are gigantic, well designed, extremely detailed graphics breaking down subjects/knowledge pertinent to Hacking, OffSec, Cybersecurity & General Computer Science (which makes them pertinent to InfoSec/OffSec in general).
 +
<br>Even better, amanhardikar has directions on how to create such graphics listed at the site below as well.
 +
<br> All Mind Maps below were found at https://www.amanhardikar.com/mindmaps.html and are listed in HTML (Full Size) & PNG (Image Only) form.
  
https://www.amanhardikar.com/mindmaps.html# <br>
 
https://www.amanhardikar.com/mindmaps/AWSCompute.html <br>
 
https://www.amanhardikar.com/mindmaps/AWSCompute.png <br>
 
https://www.amanhardikar.com/mindmaps/AWSDatabase.html <br>
 
https://www.amanhardikar.com/mindmaps/AWSDatabase.png <br>
 
https://www.amanhardikar.com/mindmaps/AWSNetworking.html <br>
 
https://www.amanhardikar.com/mindmaps/AWSNetworking.png <br>
 
https://www.amanhardikar.com/mindmaps/AWSStorage.html <br>
 
https://www.amanhardikar.com/mindmaps/AWSStorage.png <br>
 
https://www.amanhardikar.com/mindmaps/BPMN2.0.html <br>
 
https://www.amanhardikar.com/mindmaps/BPMN2.0.png <br>
 
https://www.amanhardikar.com/mindmaps/BigDataSecurity.html <br>
 
https://www.amanhardikar.com/mindmaps/BigDataSecurity.png <br>
 
https://www.amanhardikar.com/mindmaps/BrowserPlugins.html <br>
 
https://www.amanhardikar.com/mindmaps/BrowserPlugins.png <br>
 
https://www.amanhardikar.com/mindmaps/CodeReview.html <br>
 
https://www.amanhardikar.com/mindmaps/CodeReview.png <br>
 
https://www.amanhardikar.com/mindmaps/Cryptography.html <br>
 
https://www.amanhardikar.com/mindmaps/Cryptography.png <br>
 
https://www.amanhardikar.com/mindmaps/ForensicChallenges.html <br>
 
https://www.amanhardikar.com/mindmaps/ForensicChallenges.png <br>
 
https://www.amanhardikar.com/mindmaps/Forensics.html <br>
 
https://www.amanhardikar.com/mindmaps/ISO27001.html <br>
 
https://www.amanhardikar.com/mindmaps/ISO27001.png <br>
 
https://www.amanhardikar.com/mindmaps/Infrastructure.html <br>
 
https://www.amanhardikar.com/mindmaps/Infrastructure.png <br>
 
https://www.amanhardikar.com/mindmaps/PCIDSS.html <br>
 
https://www.amanhardikar.com/mindmaps/PCIDSS.png <br>
 
https://www.amanhardikar.com/mindmaps/PKI.html <br>
 
https://www.amanhardikar.com/mindmaps/PKI.png <br>
 
https://www.amanhardikar.com/mindmaps/Practice.html <br>
 
https://www.amanhardikar.com/mindmaps/Practice.png <br>
 
https://www.amanhardikar.com/mindmaps/PracticeUrls.html <br>
 
https://www.amanhardikar.com/mindmaps/SABSAConcepts.html <br>
 
https://www.amanhardikar.com/mindmaps/SABSAConcepts.png <br>
 
https://www.amanhardikar.com/mindmaps/SABSADesign.html <br>
 
https://www.amanhardikar.com/mindmaps/SABSADesign.png <br>
 
https://www.amanhardikar.com/mindmaps/SABSAOperations.html <br>
 
https://www.amanhardikar.com/mindmaps/SABSAOperations.png <br>
 
https://www.amanhardikar.com/mindmaps/SHC.html <br>
 
https://www.amanhardikar.com/mindmaps/SHC.png <br>
 
https://www.amanhardikar.com/mindmaps/SecurityTests.html <br>
 
https://www.amanhardikar.com/mindmaps/SecurityTests.png <br>
 
https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.html <br>
 
https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.png <br>
 
https://www.amanhardikar.com/mindmaps/VPN.html <br>
 
https://www.amanhardikar.com/mindmaps/VPN.png <br>
 
https://www.amanhardikar.com/mindmaps/VoIP.html <br>
 
https://www.amanhardikar.com/mindmaps/VoIP.png <br>
 
https://www.amanhardikar.com/mindmaps/Wireless.html <br>
 
https://www.amanhardikar.com/mindmaps/Wireless.png <br>
 
https://www.amanhardikar.com/mindmaps/virus-classification.html <br>
 
https://www.amanhardikar.com/mindmaps/webapptest.html <br>
 
https://www.amanhardikar.com/mindmaps/webapptest.png <br>
 
https://www.amanhardikar.com/mindmaps/worm-classification.html <br>
 
  
  
 +
[https://www.amanhardikar.com/mindmaps/AWSCompute.html AWSCompute]
 +
[https://www.amanhardikar.com/mindmaps/AWSCompute.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/AWSDatabase.html AWSDatabase]
 +
[https://www.amanhardikar.com/mindmaps/AWSDatabase.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/AWSNetworking.html AWSNetworking]
 +
[https://www.amanhardikar.com/mindmaps/AWSNetworking.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/AWSStorage.html AWSStorage]
 +
[https://www.amanhardikar.com/mindmaps/AWSStorage.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/BPMN2.0.html BPMN2.0]
 +
[https://www.amanhardikar.com/mindmaps/BPMN2.0.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/BigDataSecurity.html BigDataSecurity]
 +
[https://www.amanhardikar.com/mindmaps/BigDataSecurity.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/BrowserPlugins.html BrowserPlugins]
 +
[https://www.amanhardikar.com/mindmaps/BrowserPlugins.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/CodeReview.html CodeReview]
 +
[https://www.amanhardikar.com/mindmaps/CodeReview.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/Cryptography.html Cryptography]
 +
[https://www.amanhardikar.com/mindmaps/Cryptography.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/ForensicChallenges.html ForensicChallenges]
 +
[https://www.amanhardikar.com/mindmaps/ForensicChallenges.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/Forensics.html Forensics] <br>
 +
[https://www.amanhardikar.com/mindmaps/ISO27001.html ISO27001]
 +
[https://www.amanhardikar.com/mindmaps/ISO27001.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/Infrastructure.html Infrastructure]
 +
[https://www.amanhardikar.com/mindmaps/Infrastructure.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/PCIDSS.html PCIDSS]
 +
[https://www.amanhardikar.com/mindmaps/PCIDSS.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/PKI.html PKI]
 +
[https://www.amanhardikar.com/mindmaps/PKI.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/Practice.html Practice]
 +
[https://www.amanhardikar.com/mindmaps/Practice.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/PracticeUrls.html PracticeUrls]<br>
 +
[https://www.amanhardikar.com/mindmaps/SABSAConcepts.html SABSAConcepts]
 +
[https://www.amanhardikar.com/mindmaps/SABSAConcepts.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/SABSADesign.html SABSADesign]
 +
[https://www.amanhardikar.com/mindmaps/SABSADesign.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/SABSAOperations.html SABSAOperations]
 +
[https://www.amanhardikar.com/mindmaps/SABSAOperations.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/SHC.html SHC]
 +
[https://www.amanhardikar.com/mindmaps/SHC.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/SecurityTests.html SecurityTests]
 +
[https://www.amanhardikar.com/mindmaps/SecurityTests.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.html VMsandLiveCDs]
 +
[https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/VPN.html VPN]
 +
[https://www.amanhardikar.com/mindmaps/VPN.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/VoIP.html VoIP]
 +
[https://www.amanhardikar.com/mindmaps/VoIP.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/Wireless.html Wireless]
 +
[https://www.amanhardikar.com/mindmaps/Wireless.png (png)] <br>
 +
[https://www.amanhardikar.com/mindmaps/virus-classification.html Virus-classification] <br>
 +
[https://www.amanhardikar.com/mindmaps/webapptest.html Webapptest]
 +
[https://www.amanhardikar.com/mindmaps/webapptest.png (png)]<br>
 +
[https://www.amanhardikar.com/mindmaps/worm-classification.html Worm-classification] <br>
  
 
== Basic Training ==
 
== Basic Training ==
Line 197: Line 233:
  
 
== CTFs/Practice Boxes(VMs)/War Games, etc. ==
 
== CTFs/Practice Boxes(VMs)/War Games, etc. ==
<b>NeverendingSecurity has a year long training plan for working through a massive list of practice boxes/wargames/CTFs at his site (link below); though it is from 2015 & a few of the CTF/Practice Boxes/War Games listed there are gone, his post/plan is rock solid & includes a Mind Map PNG as a visual guide </b> (that mind map was attached to my first Twitter post of this updated archive on 6/9/2019.
+
NeverendingSecurity has a year long training plan for working through a massive list of practice boxes/wargames/CTFs at his site (link below); though it is from 2015 & a few of the CTF/Practice Boxes/War Games listed there are gone, his post/plan is rock solid & includes a Mind Map PNG as a visual guide (that mind map was attached to my first Twitter post of this updated archive on 6/9/2019.
  
 
PLEASE NOTE: The resources from the NeverendingSecurity's post (linked directly below) have already been added to this section's list ("CTFs/Practice    # Boxes (VMs)/War Games, etc.") with as many defunct entries removed as possible.
 
PLEASE NOTE: The resources from the NeverendingSecurity's post (linked directly below) have already been added to this section's list ("CTFs/Practice    # Boxes (VMs)/War Games, etc.") with as many defunct entries removed as possible.
Line 297: Line 333:
 
The X2 MS-DOS Programming Archive http://ftp.lanet.lv/ftp/mirror/x2ftp/msdos/programming/00index.html <br>
 
The X2 MS-DOS Programming Archive http://ftp.lanet.lv/ftp/mirror/x2ftp/msdos/programming/00index.html <br>
 
bbLean old Blackbox Windows 7 <br>
 
bbLean old Blackbox Windows 7 <br>
+
 
 
== Info/Blogs/Techniques/Forums, etc. ==
 
== Info/Blogs/Techniques/Forums, etc. ==
  
Line 2,950: Line 2,986:
 
== Grey literature ==
 
== Grey literature ==
  
<b>Grey information includes the following -and more (Academic papers, preprints, proceedings, conference & discussion papers, research reports, marketing reports, technical specifications and standards, dissertations, theses, trade publications, memoranda, government reports and documents not published commercially, translations, newsletters, market survey, draft version of books, articles.</b>
+
Grey information includes the following -and more (Academic papers, preprints, proceedings, conference & discussion papers, research reports, marketing reports, technical specifications and standards, dissertations, theses, trade publications, memoranda, government reports and documents not published commercially, translations, newsletters, market survey, draft version of books, articles.
  
 
Most important Grey literature (academic and scholarly resources) websites can be found in the following list:
 
Most important Grey literature (academic and scholarly resources) websites can be found in the following list:
Line 4,491: Line 4,527:
  
 
== OpSec/Privacy/Anonymity ==
 
== OpSec/Privacy/Anonymity ==
 
+
<br>[https://archive.fo/uIZ5T Deep dot Web Archive]
<br>[https://archive.fo/uIZ5T https://archive.fo/uIZ5T] - Deep dot Web Archive
+
<br> [https://archive.fo/xHVJn Jolly Roger’s Security Guide for Beginners]
<br>[https://web.archive.org/web/201903151546 https://web.archive.org/web/201903151546] - Jolly Roger’s Security Guide for Beginners
 
<br> https://web.archive.org/web/20190315154618/
 
<br> http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/
 
<br> https://archive.fo/xHVJn
 
 
<br> https://tails.boum.org/index.en.html
 
<br> https://tails.boum.org/index.en.html
 
<br> https://www.torproject.org/
 
<br> https://www.torproject.org/
Line 4,505: Line 4,537:
 
<br> https://thatoneprivacysite.net/
 
<br> https://thatoneprivacysite.net/
 
<br> https://www.wilderssecurity.com/
 
<br> https://www.wilderssecurity.com/
<br> https://anonymous-proxy-servers.net/index.html (JonDonym mix network site)
+
<br> [https://anonymous-proxy-servers.net/index.html JonDonym mix network site]
 
<br> https://neverendingsecurity.wordpress.com/
 
<br> https://neverendingsecurity.wordpress.com/
 
<br> https://prism-break.org/en/
 
<br> https://prism-break.org/en/
Line 4,511: Line 4,543:
 
<br> https://digdeeper.neocities.org/
 
<br> https://digdeeper.neocities.org/
 
<br> https://tor.dial.ga/doc
 
<br> https://tor.dial.ga/doc
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/a-few-recommendations/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/always-back-drives-especially-encrypted-drives/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-example-of-really-bad-opsec-smarten-up/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-introduction-to-an-expert-on-opsec-plus-md5-sha-1-checksums/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/another-scam-email-beware/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/are-you-using-safe-mail-net/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/bitcoin-clients-tails-blockchain-electrum/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/capabilities-of-the-nsa/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cold-boot-attacks-unencrypted-ram-extraction/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn-continued/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/connecting-tor-vpn-for-windows-users/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cookies-javascript-revisited-plus-flash-cookies-and-other-browser-tracking/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/exif-data/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/fraudulent-private-messages/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/general-security-precautions-when-posting-online-learn-from-others-mistakes/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/hiding-tor-from-your-isp-part-1-bridges-and-pluggable-transports/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-far-will-law-enforcement-go/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-connect-to-tor-over-top-of-tor/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-verify-your-downloaded-files-are-authentic/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/introduction-to-secure-communication-tor-https-ssl/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/invincibility-mindset-federal-government-bullying-tactics/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/it-is-obvious-when-you-are-using-tor/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/javascript-vulnerabilities-and-removing-personal-metadata-from-files/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-how-they-busted-sabu/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-libertas-dpr-sabu-[censored
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-sabu-became-fbi-informant-and-betrayed-jeremy-hammond/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-1-police-are-watching-it/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-2-thieves-scammers-and-counterfeit-bills/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-3-more-scam-stories/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-4-sellers-busted-for-money-laundering/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/monitoring-you-with-an-antenna/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/obtaining-sending-and-receiving-bitcoins-anonymously/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-continued/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-tails-virtual-box/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgpgpg-email-addresses/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/retaining-a-lawyer-how-to-handle-getting-caught-or-interrogated/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/securing-your-account-from-fbi-monitoring/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/the-strengh-of-cryptography-and-anonymity-when-used-properly/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/they-are-watching-you-viruses-malware-vulnerabilities/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tor-chat/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tracking-cookies/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/verifying-signed-messages-with-signatures-and-signing-your-own-messages/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/where-you-might-consider-running-to-if-you-had-no-other-choice/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-4-sellers-busted-for-money-laundering/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/whole-disk-encryption-and-file-shredding/
 
<br> https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/yet-another-example-of-how-strong-cryptopgraphy-and-proper-opsec-can-protect-even-pedophiles/
 
 
<br> https://b3rn3d.herokuapp.com/blog/2014/01/08/managing-pseudonyms/
 
<br> https://b3rn3d.herokuapp.com/blog/2014/01/08/managing-pseudonyms/
 
<br> https://b3rn3d.herokuapp.com/blog/2014/01/10/ask-him-about-his-threat-model/
 
<br> https://b3rn3d.herokuapp.com/blog/2014/01/10/ask-him-about-his-threat-model/
Line 4,570: Line 4,554:
 
<br> https://b3rn3d.herokuapp.com/blog/2014/03/09/irl-spycraft/
 
<br> https://b3rn3d.herokuapp.com/blog/2014/03/09/irl-spycraft/
  
OPSEC: Because Jail is for wuftpd
+
<br>
Type: Video, conference talk
+
[https://www.youtube.com/watch?v=9XaYdCdwiWU OPSEC: Because Jail is for wuftpd]
URL: https://www.youtube.com/watch?v=9XaYdCdwiWU
+
<br>
Description: This video covering hacker OPSEC is a necessary watch for anyone who is interested in the subject, especially hackers. The Grugq covers some very interesting case studies that allow you to learn from other hackers OPSEC failures.
+
Type: Video, conference talk
 +
<br>
 +
Description: This video covering hacker OPSEC is a necessary watch for anyone who is interested in the subject, especially hackers. The Grugq covers some very interesting case studies that allow you to learn from other hackers OPSEC failures.
  
B3RN3D.com
+
<br>
Type: OPSEC blog
+
[http://www.b3rn3d.com/ B3RN3D.com]
URL: http://www.b3rn3d.com/
+
<br>
Description: B3RN3D is a blogger that is well-versed with topics such as operational security, maintaining anonymity, and mass surveillance. I often reference this blog.
+
Type: OPSEC blog
 +
<br>
 +
Description: B3RN3D is a blogger that is well-versed with topics such as operational security, maintaining anonymity, and mass surveillance. I often reference this blog.
  
 +
<br>
 +
[https://paranoidsbible.tumblr.com/library The Paranoid’s Bible: An anti-dox effort]
 +
<br>
 +
Type: Resource repository
 +
<br>
 +
Description: Self-described as a “repository of knowledge meant to help people remove their information (Dox) from the web and people search engines.” Excellent, credible resource for removing information about your current identity.
  
The Paranoid’s Bible: An anti-dox effort
+
<br>
Type: Resource repository
+
[https://pastebin.com/0CxYx1BD Alpraking's OPSEC guide to being a successful kingpin]
URL: https://paranoidsbible.tumblr.com/library
+
Type: Text guide
Description: Self-described as a “repository of knowledge meant to help people remove their information (Dox) from the web and people search engines.” Excellent, credible resource for removing information about your current identity.
+
<br>
 +
Description: Alpraking is an experienced drug kingpin in the online black market. In this post, he describes how he manages people and his drug operation with respect to operational security. Without great operational security, he would not be in business. This piece offers fantastic perspective from the black market community.
  
Alpraking's OPSEC guide to being a successful kingpin
+
<br>
Type: Text guide
+
[https://www.amazon.com/How-Disappear-Digital-Footprint-Without/dp/1599219778 How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish]
URL: https://pastebin.com/0CxYx1BD
+
<br>
Description: Alpraking is an experienced drug kingpin in the online black market. In this post, he describes how he manages people and his drug operation with respect to operational security. Without great operational security, he would not be in business. This piece offers fantastic perspective from the black market community.
+
Type: Book
 +
<br>
 +
Description: This reading focuses on the offline side of disappearance; Frank Ahearn, an experienced skip tracer, guides us in preventing skip tracers and other parties from tracking our trail. This is an interesting read for anyone whom wishes to conceal his or her real identity. Pro-tip: start by buying this book with cash and a hoodie in a brick-and-mortar bookstore.
  
How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish
+
<br>
Type: Book
+
[https://pastebin.com/tXhiMk36 How to Lie to People: Achieving Anonymity through Disinformation and Data Poisoning]
URL: https://www.amazon.com/How-Disappear-Digital-Footprint-Without/dp/1599219778
+
<br>
Description: This reading focuses on the offline side of disappearance; Frank Ahearn, an experienced skip tracer, guides us in preventing skip tracers and other parties from tracking our trail. This is an interesting read for anyone whom wishes to conceal his or her real identity. Pro-tip: start by buying this book with cash and a hoodie in a brick-and-mortar bookstore.
+
Type: Text guide
 +
<br>
 +
Description: DIzzIE provides helpful insight on how to lie effectively, and explains why and how lying can benefit your persona. This excellent resource can be read on your lunch break.
 +
 
 +
<br>
 +
[https://www.youtube.com/watch?v=BwGsr3SzCZc OPSEC failures of spies]
 +
<br>
 +
Type: Video, conference talk
 +
<br>
 +
Description: A case study on targeted surveillance. Explains how “telling” metadata is, specifically metadata pertaining to cellphone networks. This case study provides the opportunity to learn from the OPSEC failures of spies.
 +
 
 +
<br>
 +
[http://www.historyisaweapon.com/defcon1/secretwork.html How to Master Secret Work]
 +
Type: Text publication
 +
<br>
 +
Description: Discusses the necessity of being able to carry out work and operations with assured secrecy. Governments subject to corruption have used dirty tactics to silence opposition parties in the past, and they will do it again. This resource will aid you in your thinking for illustrating underground operations in secrecy.
 +
 
 +
<br>
 +
[https://themanyhats.club/centralised-pla...resources/ Centralised Place for Privacy Resources]
 +
<br>
 +
Type: Blog, resource repositor
 +
<br>
 +
Description: A list of privacy resources and security technologies. Great resources, it is definitely worth checking this list out to get more familiar with modern day security technologies and pro-privacy solutions.
 +
 
 +
<br>
 +
[https://ssd.eff.org/en Surveillance Self-Defense]
 +
<br>
 +
Type: Resource repository
 +
<br>
 +
Description: Collection of resources, tutorials, and briefings pertaining to counter-surveillance efforts. Includes tutorials for secure deletion, using PGP, OTR, 2FA, Signal, Tor services, etc.
 +
 
 +
<br>
 +
[https://assets.documentcloud.org/documen...Hacked.pdf The Motherboard Guide to Not Getting Hacked]
 +
<br>
 +
Type: Guide (PDF)
 +
<br>
 +
Description: Generally good advice for security practices. Covers security basics, mobile security, privacy, messaging, and avoiding state and police surveillance.
 +
 
 +
<br>
 +
[https://www.youtube.com/watch?v=xCH_q-xn760 DEF CON 22: Blinding The Surveillance State]
 +
<br>
 +
Type: Surveillance conference talk
 +
<br>
 +
Description: Christopher Soghoian discusses the importance of HTTPS for thwarting bulk data collection efforts, the importance of “translating” cybersecurity talk to politicians, lawmakers and court systems, among other things. I would recommend this talk for privacy activists and advocates.
 +
 
 +
<br>
 +
[https://www.whonix.org/wiki/DoNot Things NOT to Do]
 +
<br>
 +
Type: OPSEC Guide
 +
<br>
 +
Description: A list of things that you should not do, with a general focus on the Tor network. Great OPSEC resource.
 +
<br>
 +
[https://github.com/cryptoseb/CryptoPaper The CryptoPaper]
 +
<br>
 +
Type: Personal Security Guide
 +
<br>
 +
Description: "Privacy, Security, and Anonymity For Every Internet User"
 +
== Data Broker Removal Links ==
 +
<br>Start with:
 +
<br> Whitepages, Spokeo, TruePeopleSearch, BeenVerified, FastPeopleSearch, Radaris, InfoTracer & Intelius
 +
 
 +
<br>411.info
 +
https://411.info/manage/
 +
 
 +
<br>www.acxiom.com
 +
https://www.acxiom.com/optout/
  
How to Lie to People: Achieving Anonymity through Disinformation and Data Poisoning
+
<br>www.americaphonebook.com, usapeopledata.com, www.unitedstatesphonebook.com
Type: Text guide
+
https://www.americaphonebook.com/contact.php
URL: https://pastebin.com/tXhiMk36
 
Description: DIzzIE provides helpful insight on how to lie effectively, and explains why and how lying can benefit your persona. This excellent resource can be read on your lunch break.
 
  
OPSEC failures of spies
+
<br>www.beenverified.com, www.dobsearch.com, www.numberguru.com, www.ownerly.com, www.peoplelooker.com
Type: Video, conference talk
+
https://www.beenverified.com/app/optout/search
URL: https://www.youtube.com/watch?v=BwGsr3SzCZc
 
Description: A case study on targeted surveillance. Explains how “telling” metadata is, specifically metadata pertaining to cellphone networks. This case study provides the opportunity to learn from the OPSEC failures of spies.
 
  
How to Master Secret Work
+
<br>www.checkpeople.com
Type: Text publication
+
https://checkpeople.com/do-not-sell-info
URL: http://www.historyisaweapon.com/defcon1/secretwork.html
 
Description: Discusses the necessity of being able to carry out work and operations with assured secrecy. Governments subject to corruption have used dirty tactics to silence opposition parties in the past, and they will do it again. This resource will aid you in your thinking for illustrating underground operations in secrecy.
 
  
Centralised Place for Privacy Resources
+
<br>clustrmaps.com
Type: Blog, resource repository
+
https://clustrmaps.com/bl/opt-out
URL: https://themanyhats.club/centralised-pla...resources/
 
Description: A list of privacy resources and security technologies. Great resources, it is definitely worth checking this list out to get more familiar with modern day security technologies and pro-privacy solutions.
 
  
Surveillance Self-Defense
+
<br>cocofinder.com
Type: Resource repository
+
https://cocofinder.com/remove-my-info
URL: https://ssd.eff.org/en
 
Description: Collection of resources, tutorials, and briefings pertaining to counter-surveillance efforts. Includes tutorials for secure deletion, using PGP, OTR, 2FA, Signal, Tor services, etc.
 
  
The Motherboard Guide to Not Getting Hacked
+
<br>www.cyberbackgroundchecks.com
Type: Guide (PDF)
+
https://www.cyberbackgroundchecks.com/removal
URL: https://assets.documentcloud.org/documen...Hacked.pdf
 
Description: Generally good advice for security practices. Covers security basics, mobile security, privacy, messaging, and avoiding state and police surveillance.
 
  
DEF CON 22: Blinding The Surveillance State
+
<br>emailtracer.com
Type: Surveillance conference talk
+
https://emailtracer.com/contact
URL: https://www.youtube.com/watch?v=xCH_q-xn760
 
Description: Christopher Soghoian discusses the importance of HTTPS for thwarting bulk data collection efforts, the importance of “translating” cybersecurity talk to politicians, lawmakers and court systems, among other things. I would recommend this talk for privacy activists and advocates.
 
  
Things NOT to Do
+
<br>www.fastpeoplesearch.com
Type: OPSEC Guide
+
https://www.fastpeoplesearch.com/removal
URL: https://www.whonix.org/wiki/DoNot
 
Description: A list of things that you should not do, with a general focus on the Tor network. Great OPSEC resource.
 
  
The CryptoPaper
+
<br>gladiknow.com
Type: Personal Security Guide
+
https://gladiknow.com/opt-out
URL: https://github.com/cryptoseb/CryptoPaper
 
Description: "Privacy, Security, and Anonymity For Every Internet User"
 
  
== Arms/Armor ==
+
<br>homemetry.com
<br>
+
https://homemetry.com/control/privacy
'''Name    Version    Description'''
+
 
<br>
+
<br>www.idcrawl.com
<br>[http://jon.oberheide.org/0trace/ 0trace] 1.5 A hop enumeration tool
+
https://www.idcrawl.com/remove-my-information
<br>[http://3proxy.ru/ 3proxy] 0.7.1.1 Tiny free proxy server.
+
 
<br>[http://3proxy.ru/ 3proxy-win32] 0.7.1.1 Tiny free proxy server.
+
<br>www.idtrue.com
<br>[http://blog.fefe.de/?ts=b6cea88d 42zip] 42 Recursive Zip archive bomb.
+
https://www.idtrue.com/optout/
<br>[http://labs.portcullis.co.uk/tools/acccheck/ acccheck] 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol.
+
 
<br>[http://ucsniff.sourceforge.net/ace.html ace] 1.10Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface
+
<br>information.com
<br>[http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html admid-pack] 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
+
https://information.com/remove-my-info/
<br>[http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html adminpagefinder] 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
+
 
<br>[http://citp.princeton.edu/memory/code/ admsnmp] 0.1 ADM SNMP audit scanner.
+
<br>infotracer.com, staterecords.org
<br>[ aesfix ] 1.0.1 A tool to find AES key in RAM
+
https://infotracer.com/optout/
<br>[http://citp.princeton.edu/memory/code/ aeskeyfind] 1.0 A tool to find AES key in RAM
+
 
<br>[http://loop-aes.sourceforge.net/aespipe/ aespipe] 2.4cReads data from stdin and outputs encrypted or decrypted results to stdout.  
+
<br>www.instantcheckmate.com
<br>[http://www.afflib.org afflib] 3.7.3 An extensible open format for the storage of disk images and related forensic information.
+
https://suppression.peopleconnect.us/login
<br>[http://alexthepuffin.googlepages.com/ afpfs-ng] 0.8.1 A client for the Apple Filing Protocol (AFP)
+
 
<br>[http://nullsecurity.net/tools/cracker.html against] 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
+
<br>www.intelius.com, www.addresses.com, www.allareacodes.com, www.peoplefinder.com, www.publicrecords.com, www.ussearch.com, www.zabasearch.com
<br>[https://bitbucket.org/camp0/aiengine/ aiengine] 352.fc452a9 A packet inspection engine with capabilities of learning without any human intervention.
+
https://suppression.peopleconnect.us/login
<br>[http://www.afflib.org aimage] 3.2.5 A program to create aff-images.  
+
 
<br>[http://air-imager.sourceforge.net/ air] 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images.
+
<br>www.lexisnexis.com
<br>[http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html airflood] 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.
+
https://optout.lexisnexis.com
<br>[http://www.aircrack-ng.org airgraph-ng] 2371Graphing tool for the aircrack suite
+
 
<br>[http://midnightresearch.com/projects/wicrawl/ airoscript] 45.0a122eeA script to simplify the use of aircrack-ng tools.
+
<br>www.mylife.com
<br>[http://airpwn.sourceforge.net airpwn] 1.4 A tool for generic packet injection on an 802.11 network.  
+
https://www.mylife.com/ccpa/index.pubview
<br>[http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/ allthevhosts] 1.0 A vhost discovery tool that scrapes various web applications
+
 
<br>[https://code.google.com/p/american-fuzzy-lop/ american-fuzzy-lop] 1.47b A practical, instrumentation-driven fuzzer for binary formats.
+
<br>neighbor.report
<br>[https://code.google.com/p/androguard/ androguard] 1.9 Reverse engineering, Malware and goodware analysis of Android applications and more.
+
https://neighbor.report/remove
<br>[https://github.com/Flo354/Androick androick] 5.35048d7 A python tool to help in forensics analysis on android.
+
 
<br>[http://forum.xda-developers.com/showthread.php?t=1755243 android-apktool] 2.0.0 A tool for reengineering Android apk files.  
+
<br>nuwber.com
<br>[http://developer.android.com/sdk/ndk/index.html android-ndk] r9c Android C/C++ developer kit.
+
https://nuwber.com/removal/link
<br>[http://developer.android.com/sdk/index.html android-sdk-platform-tool-sdk] 21 Platform-Tools for Google Android SDK (adb and fastboot).
+
 
<br>[http://developer.android.com/sdk/index.html android-sdk] r24.0.2 Google Android SDK.
+
<br>www.peekyou.com
<br>[https://github.com/bbqlinux/android-udev-rules android-udev-rules] 135.d5aeca6 Android udev rules.  
+
https://www.peekyou.com/about/contact/ccpa_optout/do_not_sell/
<br>[http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html androidsniffer] 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.
+
 
<br>[http://anontwi.sourceforge.net/ anontwi] 1.0 A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.  
+
<br>www.peoplefinders.com, www.privateeye.com
<br>[http://aphopper.sourceforge.net/ aphopper] 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks.
+
https://www.peoplefinders.com/opt-out
<br>[http://www.c0decafe.de/ apnbf] 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.
+
 
<br>[https://www.arachni-scanner.com arachni] 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.
+
<br>www.peoplewhiz.com, peoplewizard.net, www.peoplewhizr.com
<br>[http://arduino.cc/en/Main/Software arduino] 1.0.5 Arduino SDK (includes patched avrdude and librxtx)
+
https://www.peoplewhiz.com/remove-my-info
<br>[http://qosient.com/argus/ argus] 3.0.8 Network monitoring tool with flow control.
+
 
<br>[http://qosient.com/argus/ argus-clients] 3.0.8 Network monitoring client for Argus.
+
<br>www.persopo.com
<br>[http://www.fastandeasyhacking.com/ armitage] 141120A graphical cyber attack management tool for Metasploit.
+
<br>Note: Email the text of your profile data
<br>[http://www.nta-monitor.com/tools/arp-scan/ arp-scan] 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network
+
 
<br>[http://www.arpalert.org/ arpalert] 2.0.11Monitor ARP changes in ethernet networks.
+
<br>www.privaterecords.net, www.backgroundcheckers.net, www.peoplesearch123.com
<br>[http://www.arpoison.net arpoison] 0.7 The UNIX arp cache update utility
+
https://www.privaterecords.net/optOut/name/landing
<br>[http://arpon.sourceforge.net/ arpon] 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.
+
 
<br>[https://github.com/ntrippar/ARPwner arpwner] 26.f300fdfGUI-based python tool for arp posioning and dns poisoning attacks.
+
<br>publicdatausa.com
<br>[https://www.trustedsec.com/downloads/artillery/ artillery] 1.0.3 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system
+
https://publicdatausa.com/remove.php
<br>[http://www.willhackforsushi.com/Asleap.html asleap] 2.2 Actively recover LEAP/PPTP passwords.
+
 
<br>[http://seclists.org/basics/2006/Sep/128 asp-audit] 2BETA An ASP fingerprinting tool and vulnerability scanner.
+
<br>www.publicinfoservices.com
<br>[http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html athena-ssl-scanner] 0.5.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.
+
https://www.publicinfoservices.com/help-center/remove-me-from-website
<br>[http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html atstaketools] 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.
+
 
<br>[http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/ auto-xor-decryptor] 3.6a1f8f7 Automatic XOR decryptor tool.  
+
<br>radaris.com
<br>[http://www.sleuthkit.org/autopsy autopsy] 2.24A GUI for The Sleuth Kit.
+
https://radaris.com/control/privacy
<br>[https://github.com/chokepoint/azazel azazel] 10.401e3aaA userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.
+
 
<br>[https://blake2.net/ b2sum] 20140114BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.
+
<br>www.searchpeoplefree.com
<br>[https://github.com/mrjopino/backcookie backcookie] 44.cbf5b8bSmall backdoor using cookie.
+
https://www.searchpeoplefree.com/opt-out
<br>[https://github.com/secretsquirrel/the-backdoor-factory backdoor-factory] 118.6237b9f Patch win32/64 binaries with shellcode.
+
 
<br>[https://github.com/localh0t/backfuzz backfuzz] 36.8e54ed6A network protocol fuzzing toolkit.
+
<br>socialcatfish.com
<br>[https://bitbucket.org/decalage/balbuzard/ balbuzard] 67.d6349ef1bc55 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).
+
https://socialcatfish.com/opt-out/
<br>[https://github.com/bwall/BAMF bamf-framework] 35.30d2b4bA modular framework designed to be a platform to launch attacks against botnets.
+
 
<br>[http://www.morningstarsecurity.com/research basedomainname] 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
+
<br>www.spokeo.com, wwv.selfie.systems
<br>[http://www.open-mesh.net/ batman-adv] 2014.4.0Batman kernel module, (included upstream since .38)
+
https://www.spokeo.com/optout
<br>[https://github.com/neohapsis/bbqsql bbqsql] 1.2 SQL injection exploitation tool.
+
 
<br>[https://github.com/secretsquirrel/BDFProxy bdfproxy] 58.79edcb2Patch Binaries via MITM: BackdoorFactory + mitmProxy
+
<br>www.spyfly.com
<br>[http://magikh0e.xyz/ bdlogparser] 1 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
+
https://www.spyfly.com/help-center/remove-me-from-website
<br>[http://www.aldeid.com/wiki/Bed bed] 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
+
 
<br>[http://beefproject.com/ beef] 0.4.5.1.59.g3b46bf1 The Browser Exploitation Framework that focuses on the web browser
+
<br>www.telephonedirectories.us
<br>[http://www.beeswarm-ids.org/https://github.com/honeynet/beeswarm/ beeswarm] 1154.29273e6Honeypot deployment made easy
+
https://www.telephonedirectories.us/Edit_Records
<br>[http://www.beholderwireless.org/ beholder] 0.8.10A wireless intrusion detection tool that looks for anomalies in a wifi environment.
+
 
<br>[https://github.com/chokepoint/Beleth beleth] 36.0963699A Multi-threaded Dictionary based SSH cracker.
+
<br>thatsthem.com
<br>[http://sourceforge.net/projects/bfbtester/ bfbtester] 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
+
https://thatsthem.com/optout
<br>[http://www.c0decafe.de/ bgp-md5crack] 0.1 RFC2385 password cracker
+
 
<br>[http://www.morxploit.com/morxtool binex] 1.0 Format String exploit building tool.
+
<br>www.truepeoplesearch.com
<br>[http://www.morningstarsecurity.com/research/bing-ip2hosts bing-ip2hosts] 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address.
+
https://www.truepeoplesearch.com/removal
<br>[http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html bing-lfi-rfi] 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.
+
 
<br>[http://binwalk.org binwalk] 2.0.1 A tool for searching a given binary image for embedded files.
+
<br>www.truthfinder.com
<br>[https://github.com/bmaia/binwally binwally] 4.0aabd8b Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).
+
https://suppression.peopleconnect.us/login
<br>[http://citp.princeton.edu/memory/code/ bios_memimage] 1.2 A tool to dump RAM contents to disk (aka cold boot attack).
+
 
<br>[https://github.com/sensepost/birp birp] 60.1d7c49fA tool that will assist in the security assessment of mainframe applications served over TN3270.
+
<br>unmask.com
<br>[http://bittwist.sourceforge.net/ bittwist] 2.0 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.
+
https://unmask.com/opt-out/
<br>[http://sourceforge.net/projects/ophcrack bkhive] 1.1.1 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.
+
 
<br>[http://www.blackarch.org/ blackarch-menus] 0.2 BlackArch specific XDG-compliant menu
+
<br>www.usa-people-search.com
<br>[http://16s.us/blackhash/ blackhash] 0.2 Creates a filter from system hashes
+
https://www.usa-people-search.com/contact
<br>[https://code.google.com/p/bletchley/ bletchley] 0.0.1 A collection of practical application cryptanalysis tools.
+
 
<br>[http://blindelephant.sourceforge.net/ blindelephant] 7 A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations
+
<br>www.usphonebook.com
<br>[http://www.enye-sec.org/programas.html blindsql] 1.0 Set of bash scripts for blind SQL injection attacks
+
https://www.usphonebook.com/opt-out
<br>[https://github.com/jesusprubio/bluebox-ng bluebox-ng] 82.22fd93eA GPL VoIP/UC vulnerability scanner.
+
 
<br>[http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html bluebugger] 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt.
+
<br>validnumber.com
<br>[http://www.digifail.com/software/bluelog.shtml bluelog] 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.
+
https://validnumber.com/doc/contact/
<br>[https://code.google.com/p/bluepot/ bluepot] 0.1 A Bluetooth Honeypot written in Java, it runs on Linux
+
 
<br>[http://trifinite.org/trifinite_stuff_blueprinting.html blueprint] 0.1_3 A perl tool to identify Bluetooth devices.
+
<br>veripages.com
<br>[http://www.hackfromacave.com/projects/blueranger.html blueranger] 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios.
+
https://veripages.com/inner/control/privacy
<br>[http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/ bluescan] 1.0.6 A Bluetooth Device Scanner.
+
 
<br>[http://www.alighieri.org/project.html bluesnarfer] 0.1 A bluetooth attacking tool
+
<br>voterrecords.com
<br>[http://git.infradead.org/users/dedekind/bmap-tools.git bmap-tools] 3.2 Tool for copying largely sparse files using information from a block map file.
+
<br>Note: Click "Record Opt-Out"
<br>[http://btb.banquise.net/ bob-the-butcher] 0.7.1 A distributed password cracker package.
+
 
<br>[http://inguma.eu/projects/bokken/ bokken] 397.dfc6c536eab7GUI for radare2 and pyew.
+
<br>www.whitepages.com, www.411.com, peoplesearch.com
<br>[https://github.com/zcutlip/bowcaster bowcaster] 0.1 This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.
+
https://www.whitepages.com/suppression-requests
<br>[http://s-tech.elsat.net.pl/braa/ braa] 0.82A mass snmp scanner
+
 
<br>[http://braces.shmoo.com/ braces] 0.4 A Bluetooth Tracking Utility.
+
<br> https://www.yellowpagesdirectory.com/whitepages/
<br>[http://www.krakowlabs.com/dev.html browser-fuzzer] 3 Browser Fuzzer 3
+
<br>Note: Click "Edit / Delete Person"
<br>[http://www.edge-security.com/edge-soft.php brutessh] 0.5 A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads.
+
 
<br>[http://www.hoobie.net/brutus/ brutus] 2 One of the fastest, most flexible remote password crackers you can get your hands on.
+
<br>Do Not Call
<br>[http://www.daemonology.net/bsdiff/ bsdiff] 4.3 bsdiff and bspatch are tools for building and applying patches to binary files.
+
<br>Use this to include your phone number on the FTC Do Not Call Registry
<br>[http://code.google.com/p/bsqlbf-v2/ bsqlbf] 2.7 Blind SQL Injection Brute Forcer.
+
https://www.donotcall.gov/register.html
<br>[http://www.secuobs.com/news/15022006-bss_0_8.shtml bss] 0.8 Bluetooth stack smasher / fuzzer
+
 
<br>[http://www.betaversion.net/btdsd/download/ bt_audit] 0.1.1 Bluetooth audit
+
<br>Junk Mail
<br>[http://www.nruns.com/_en/security_tools_btcrack.php btcrack] 1.1 The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.
+
<br> Use this to stop offers from Equifax, Experian, Innovis, and TransUnion
<br>[http://www.pentest.co.uk btscanner] 2.1 Bluetooth device scanner.
+
https://www.optoutprescreen.com
<br>bulk-extractor 1.5.5 Bulk Email and URL extraction tool.
+
 
<br>[https://github.com/simsong/bulk_extractor bully] 19.ba33677A wifi-protected-setup (WPS) brute force attack tool. http://code.google.com/p/bully/
+
<br>Search Engines
<br>[http://code.google.com/p/bunny-the-fuzzer/ bunny] 0.93A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.
+
<br>Use this to remove outdated information or submit a suppression request
<br>[http://portswigger.net/burp/ burpsuite] 1.6 An integrated platform for attacking web applications (free edition).
+
https://search.google.com/search-console/remove-outdated-content
<br>[https://github.com/buttinsky/buttinsky buttinsky] 138.1a2a1b2 Provide an open source framework for automated botnet monitoring.
+
https://support.google.com/websearch/troubleshooter/3111061?hl=en
<br>[http://bvi.sourceforge.net/ bvi] 1.4.0 A display-oriented editor for binary files operate like "vi" editor.
+
https://www.microsoft.com/en-us/concern/bing
<br>[https://github.com/Konloch/bytecode-viewer bytecode-viewer] 79.bde746bA Java 8/Android APK Reverse Engineering Suite.
+
https://form.jotform.com/233465872728064
<br>[http://www.webdav.org/cadaver cadaver] 0.23.3Command-line WebDAV client for Unix
+
 
<br>[http://www.canariproject.com/ canari] 1.1 A transform framework for maltego
+
== Arms/Armor ==
<br>[https://github.com/fnk0c/cangibrina cangibrina] 87.fcbc952Dashboard Finder.
+
'''Name    Version    Description'''
<br>[https://github.com/deibit/cansina cansina] 109.be98c12 A python-based Web Content Discovery Tool.
+
<br>[https://jon.oberheide.org/0trace/ 0trace] 1.5 A hop enumeration tool.
<br>[http://www.capstone-engine.org/index.html capstone] 3.0.1 A lightweight multi-platform, multi-architecture disassembly framework.
+
<br>[https://3proxy.ru/ 3proxy] 0.9.3 Tiny free proxy server.
<br>[http://www.omriher.com/2015/01/captipper-malicious-http-traffic.html captipper] 25.d3d79e9Malicious HTTP traffic explorer tool.
+
<br>[https://blog.fefe.de/?ts=b6cea88d 42zip] A recursive Zip archive bomb.
<br>[http://trifinite.org/trifinite_stuff_carwhisperer.html carwhisperer] 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
+
<br>[https://labs.portcullis.co.uk/tools/acccheck/ acccheck] 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol.
<br>[http://www.paterva.com/web6/products/casefile.php casefile] 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information
+
<br>[https://ucsniff.sourceforge.net/ace.html ace] 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface.
<br>[https://github.com/Zapotek/cdpsnarf cdpsnarf] 0.1.6 Cisco discovery protocol sniffer.
+
<br>[https://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html admid-pack] 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
<br>[https://github.com/nccgroup/CECster cecster] 5.15544cb A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols
+
<br>[https://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html adminpagefinder] 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
<br>[https://github.com/0xPoly/Centry centry] 72.6de2868Cold boot & DMA protection
+
<br>[https://citp.princeton.edu/memory/code/ admsnmp] 0.1 ADM SNMP audit scanner.
<br>[http://www.digininja.org/projects/cewl.php cewl] 4.3 A custom word list generator
+
<br>[https://citp.princeton.edu/our-work/memory/code/ aesfix ] 1.0.1 A tool to find AES key in RAM.
<br>[http://www.gnu.org/software/cflow/ cflow] 1.4 A C program flow analyzer.
+
<br>[https://citp.princeton.edu/memory/code/ aeskeyfind] 1.0 A tool to find AES key in RAM.  
<br>[http://freecode.com/projects/chaosmap chaosmap] 1.3 An information gathering tool and dns / whois / web server scanner
+
<br>[https://loop-aes.sourceforge.net/aespipe/ aespipe] 2.4h Reads data from stdin and outputs encrypted or decrypted results to stdout.
<br>[http://chaosreader.sourceforge.net/ chaosreader] 0.94A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.
+
<br>[https://github.com/sshock/AFFLIBv3 afflib] 3.7.20 An extensible open format for the storage of disk images and related forensic information.
<br>[https://github.com/moxie0/chapcrack chapcrack] 17.ae2827fA tool for parsing and decrypting MS-CHAPv2 network handshakes.
+
<br>[https://github.com/simonvetter/afpfs-ng afpfs-ng] 0.8.2 A client for the Apple Filing Protocol (AFP).
 +
<br>[https://nullsecurity.net/tools/cracker.html against] 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
 +
<br>[https://bitbucket.org/camp0/aiengine/ aiengine] 2.1.0 A packet inspection engine with capabilities of learning without any human intervention.
 +
<br>[https://www.huge-man-linux.net/man1/aimage.html aimage] 3.2.5 A program to create aff-images.
 +
<br>[https://air-imager.sourceforge.net/ air] 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images.  
 +
<br>[https://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html airflood] 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.
 +
<br>[https://www.aircrack-ng.org aircrack-ng] 1.7 Aircrack-ng is a complete suite of tools to assess WiFi network security.
 +
<br>[https://github.com/patrickhno/Airoscript airoscript] A script to simplify the use of aircrack-ng tools.
 +
<br>[http://airpwn.sourceforge.net airpwn] 1.4 A tool for generic packet injection on an 802.11 network.  
 +
<br>[http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/ allthevhosts] 1.0 A vhost discovery tool that scrapes various web applications.
 +
<br>[https://lcamtuf.coredump.cx/afl/ american-fuzzy-lop] 2.52b A practical, instrumentation-driven fuzzer for binary formats.
 +
<br>[https://github.com/androguard/androguard/ androguard] 4.1.2 Reverse engineering, Malware and goodware analysis of Android applications and more.
 +
<br>[https://github.com/Flo354/Androick androick] 2.1 A python tool to help in forensics analysis on android.  
 +
<br>[http://forum.xda-developers.com/showthread.php?t=1755243 android-apktool] 2.9.3 A tool for reengineering Android apk files.  
 +
<br>[https://developer.android.com/sdk/ndk/index.html android-ndk] r9c Android C/C++ developer kit.
 +
<br>[https://developer.android.com/tools/releases/platform-tools android-sdk-platform-tools] 35.0.1 Platform-Tools for Google Android SDK (adb and fastboot).
 +
<br>[https://developer.android.com/studio android studio] Google Android SDK.  
 +
<br>[https://github.com/bbqlinux/android-udev-rules android-udev-rules] 1.0.9 Android udev rules.  
 +
<br>[https://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html androidsniffer] 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.
 +
<br>[https://anontwi.03c8.net anontwi] 1.1b A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.  
 +
<br>[https://github.com/BlackArch/aphopper aphopper] AP Hopper is a program that automatically hops between access points of different wireless networks.
 +
<br>[https://www.c0decafe.de/ apnbf] 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.
 +
<br>[https://ecsypno.com/pages/arachni-web-application-security-scanner-framework arachni] 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. Replaced by Codename SCNR.
 +
<br>[https://www.arduino.cc/en/software arduino] 2.3.2 Arduino IDE
 +
<br>[https://github.com/openargus/argus argus] 3.0.8.4 Network monitoring tool with flow control.
 +
<br>[https://github.com/openargus/clients argus-client] 3.0.8.4 Network monitoring client for Argus.
 +
<br>[https://github.com/r00t0v3rr1d3/armitage armitage] 20220123 Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post- exploitation features in the framework.
 +
<br>[https://github.com/royhills/arp-scan arp-scan] 1.10.0 A tool that uses ARP to discover and fingerprint IP hosts on the local network
 +
<br>[https://www.arpalert.org/arpalert.html arpalert] 2.0.12 Monitor ARP changes in ethernet networks.
 +
<br>[http://www.arpoison.net arpoison] 0.7 The UNIX arp cache update utility
 +
<br>[http://arpon.sourceforge.net/ arpon] 3.0-ng A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. Since 3.0-ng rewritten from scratch.
 +
<br>[https://github.com/ntrippar/ARPwner arpwner] 26.f300fdf GUI-based python tool for arp poisoning and dns poisoning attacks.
 +
<br>[https://github.com/BinaryDefense/artillery artillery] A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.
 +
<br>[https://www.willhackforsushi.com/?page_id=41 asleap] 2.2 Actively recover LEAP/PPTP passwords.
 +
<br>[https://seclists.org/basics/2006/Sep/128 asp-audit] 2BETA An ASP fingerprinting tool and vulnerability scanner.
 +
<br>[https://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html athena-ssl-scanner] 0.6.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. Now also a part of BlackArch Linux.
 +
<br>[https://packetstormsecurity.com/files/50718/AtStakeTools.zip.html atstaketools] 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. BlackArch Linux too.
 +
<br>[https://github.com/MRGEffitas/scripts auto-xor-decryptor] Automatic XOR decryptor tool.  
 +
<br>[https://www.sleuthkit.org/autopsy autopsy] 4.21.0 A GUI for The Sleuth Kit.
 +
<br>[https://github.com/chokepoint/azazel azazel] 0.1 userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.
 +
<br>[https://github.com/BLAKE3-team/BLAKE3 b3sum] 1.5.1 Cryptographic hash function.
 +
<br>[https://github.com/mrjopino/backcookie backcookie] Small backdoor using cookie.
 +
<br>[https://github.com/secretsquirrel/the-backdoor-factory backdoor-factory] 01.11.2016 Patch PE, ELF, Mach-O binaries with shellcode. New version in development, available only to sponsors.
 +
<br>[https://github.com/localh0t/backfuzz backfuzz] 0.3.2 A network protocol fuzzing toolkit.
 +
<br>[https://github.com/decalage2/balbuzard balbuzard] 0.20 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). It can also crack malware obfuscation such as XOR, ROL, etc by bruteforcing and checking for those patterns.
 +
<br>[https://github.com/bwall/BAMF bamf-framework] A modular framework designed to be a platform to launch attacks against botnets. Seems to be long gone.  
 +
<br>[https://www.morningstarsecurity.com/research basedomainname] 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
 +
<br>[https://www.open-mesh.net/ batman-adv] 2024.1 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is a routing protocol for multi-hop ad-hoc mesh networks.
 +
<br>[https://github.com/neohapsis/bbqsql bbqsql] 1.2 SQL injection exploitation tool.
 +
<br>[https://github.com/secretsquirrel/BDFProxy bdfproxy] 0.3.8 Patch Binaries via MITM: BackdoorFactory + mitmProxy. New version available for sponsors.
 +
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ bdlogparser] 2.3 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
 +
<br>[https://www.aldeid.com/wiki/Bed bed] 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
 +
<br>[https://beefproject.com/ beef] 0.5.4.0 The Browser Exploitation Framework that focuses on the web browser.
 +
<br>[https://github.com/honeynet/beeswarm beeswarm] 0.7.18 Honeypot deployment made easy.
 +
<br>'''beholder ids''' A wireless intrusion detection tool that looks for anomalies in a wifi environment. The website is long gone and it seems like it has never left the pre-alfa. Looks like it was made to write an academic paper, because that one still exists.
 +
<br>[https://github.com/chokepoint/Beleth beleth]   Multi-threaded Dictionary based SSH cracker.
 +
<br>[https://sourceforge.net/projects/bfbtester/ bfbtester] 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
 +
<br>[https://www.c0decafe.de/ bgp-md5crack] 0.1 RFC2385 password cracker
 +
<br>[https://github.com/BlackArch/blackarch/issues/1881 binex] 1.0 Format String exploit building tool. Gone, maybe now part of BlackArch.
 +
<br>[http://www.morningstarsecurity.com/research/bing-ip2hosts bing-ip2hosts] 1.0.5 A Bing.com web scraper that discovers hostnames by IP address. Enumerates all hostnames which Bing has indexed for a specific IP address.
 +
<br>[https://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html bing-lfi-rfi] 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.
 +
<br>[https://github.com/ReFirmLabs/binwalk binwalk] 2.3.4 A tool for searching a given binary image for embedded files.
 +
<br>[https://github.com/bmaia/binwally binwally]   Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).
 +
<br>[https://citp.princeton.edu/memory/code/ bios_memimage] 1.2 A tool to dump RAM contents to disk (aka cold boot attack).
 +
<br>[https://github.com/sensepost/birp birp] Big Iron Recon & Pwnage, a tool that will assist in the security assessment of mainframe applications served over TN3270.
 +
<br>[https://bittwist.sourceforge.net/ bittwist] 3.8 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.
 +
<br>[https://github.com/mdeverdelhan/Archives/blob/master/Vacarm%20Linux/Resources/Checkinstalled%20packages/bkhive-1.1.0/bkhive.c bkhive] 1.1.0 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.
 +
<br>[https://www.blackarch.org/ blackarch] BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.
 +
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ blackhash] 0.2.8 Creates a filter from system hashes.
 +
<br>[https://code.blindspotsecurity.com/trac/bletchley bletchley] 0.0.1 A collection of practical application cryptanalysis tools.
 +
<br>[https://blindelephant.sourceforge.net/ blindelephant] A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations.
 +
<br>[https://www.enye-sec.org/en/programs/blindsql-v1-0/ blindsql] 1.0 Set of bash scripts for blind SQL injection attacks
 +
<br>[https://github.com/jesusprubio/bluebox-ng bluebox-ng] A GPL VoIP/UC vulnerability scanner.
 +
<br>[https://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html bluebugger] 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt.
 +
<br>[https://github.com/MS3FGX/Bluelog bluelog] 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.
 +
<br>[https://github.com/andrewmichaelsmith/bluepot bluepot] 0.2 A Bluetooth Honeypot written in Java, it runs on Linux.
 +
<br>[https://trifinite.org/trifinite_stuff_blueprinting.html blueprint] 0.1_3 A perl tool to identify Bluetooth devices.
 +
<br>[https://github.com/GIJack/BlueRanger blueranger] 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios.
 +
<br>[https://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/ bluescan] 1.0.6 A Bluetooth Device Scanner.
 +
<br>[https://www.alighieri.org/project.html bluesnarfer] 0.1 A bluetooth attacking tool.
 +
<br>[https://github.com/yoctoproject/bmaptool bmaptool] 3.7.0 Tool for copying largely sparse files using information from a block map file.
 +
<br>[https://github.com/Bodyfarm/bob-the-butcher_distributed_password_cracker bob-the-butcher] 0.7.1 A distributed password cracker package.
 +
<br>[https://github.com/thestr4ng3r/bokken bokken] GUI for radare2 and pyew.
 +
<br>[https://github.com/zcutlip/bowcaster bowcaster] 0.1 This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.
 +
<br>[https://github.com/mteg/braa braa] 0.82 A mass SNMP scanner.
 +
<br>[http://braces.shmoo.com/ braces] 0.4 A Bluetooth Tracking Utility. Seems that their website is broken.
 +
<br>[https://github.com/Microsvuln/Awesome-Browser-Fuzzing browser fuzzing] A curated list of browser fuzzing researches, papers, tools, ...
 +
<br>[https://www.edge-security.com/edge-soft.php brutessh] 0.5 A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks, multithread. Gone, there seems to be other tools named the same.
 +
<br>[https://github.com/LittleBigHack/Brutus-Password-Cracker brutus] One of the fastest, most flexible remote password crackers you can get your hands on (this description is probably outdated).
 +
<br>[https://www.daemonology.net/bsdiff/ bsdiff] 4.3 bsdiff and bspatch are tools for building and applying patches to binary files.
 +
<br>[https://code.google.com/p/bsqlbf-v2/ bsqlbf] 2.7 Blind SQL Injection Brute Forcer.
 +
<br>[https://github.com/hllhll/BluetoothStackSmasher bss] 0.8 Bluetooth stack smasher / fuzzer
 +
<br>[https://www.betaversion.net/btdsd/download/ bt_audit] 0.1.1 Bluetooth audit
 +
<br>[https://github.com/thierryzoller/BTcrack btcrack] 1.1 The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.
 +
<br>[https://salsa.debian.org/pkg-security-team/btscanner btscanner] 2.1 Bluetooth device scanner.
 +
<br>
 +
[https://github.com/simsong/bulk_extractor bulk-extractor] 2.1.1 Bulk Email and URL extraction tool.
 +
<br>[https://github.com/kimocoder/bully bully] 1.4-00 A wifi-protected-setup (WPS) brute force attack tool.
 +
<br>[https://code.google.com/p/bunny-the-fuzzer/ bunny] Bunny The Fuzzer, superseded by American Fuzzy Lop.
 +
<br>[https://portswigger.net/burp/communitydownload burpsuite] 2024.4.5 An integrated platform for attacking web applications (free edition).
 +
<br>[https://github.com/buttinsky/buttinsky buttinsky] Provide an open source framework for automated botnet monitoring.
 +
<br>[https://bvi.sourceforge.net/ bvi] 1.4.2 A display-oriented editor for binary files operate like "vi" editor.
 +
<br>[https://github.com/Konloch/bytecode-viewer bytecode-viewer] 2.12 Java 8/Android APK Reverse Engineering Suite.
 +
<br>[https://notroj.github.io/cadaver/ cadaver]
 +
0.24 Command-line WebDAV client for Unix.
 +
<br>[https://www.canariproject.com/ canari] 1.1 A transform framework for maltego.
 +
<br>[https://github.com/fnk0c/cangibrina cangibrina] Dashboard Finder.
 +
<br>[https://github.com/deibit/cansina cansina] 20-06-2018 A python-based Web Content Discovery Tool.
 +
<br>[https://www.capstone-engine.org/index.html capstone] 5.0 A lightweight multi-platform, multi-architecture disassembly (reverse engineering) framework.
 +
<br>[http://www.omriher.com/2015/01/captipper-malicious-http-traffic.html captipper] Malicious HTTP traffic explorer tool.
 +
<br>[https://trifinite.org/trifinite_stuff_carwhisperer.html carwhisperer] 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
 +
<br>[https://github.com/Zapotek/cdpsnarf cdpsnarf] 0.1.6 Cisco discovery protocol sniffer.
 +
<br>[https://github.com/nccgroup/CECster cecster] A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols.
 +
<br>[https://github.com/0xPoly/Centry centry] Cold boot & DMA protection.
 +
<br>[https://www.digininja.org/projects/cewl.php cewl] 5.2 A custom word list generator.
 +
<br>[https://www.gnu.org/software/cflow/ cflow] 1.7 A C program flow analyzer.
 +
<br>[https://github.com/balle/chaosmap chaosmap] 1.4 An information gathering tool and dns / whois / web server scanner
 +
<br>[https://github.com/brendangregg/Chaosreader chaosreader] 0.96 freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.
 +
<br>[https://github.com/moxie0/chapcrack chapcrack] A tool for parsing and decrypting MS-CHAPv2 network handshakes.
 
<br>[http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html check-weak-dh-ssh] 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker.
 
<br>[http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html check-weak-dh-ssh] 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker.
<br>[http://kernel.embedromix.ro/us/ checkiban] 0.2 Checks the validity of an International Bank Account Number (IBAN).  
+
<br>[https://kernel.embedromix.ro/us/ checkiban] 0.2 Checks the validity of an International Bank Account Number (IBAN).  
<br>[http://www.red-database-security.com/software/checkpwd.html checkpwd] 1.23Oracle Password Checker (Cracker)  
+
<br>[https://www.red-database-security.com/software/checkpwd.html checkpwd] 1.23 Oracle Password Checker (Cracker). Gone.
<br>[http://www.trapkit.de/tools/checksec.html checksec] 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.
+
<br>[https://www.trapkit.de/tools/checksec.html checksec] 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.
<br>[https://github.com/bl4de/Cheetah cheetah] 19.a937193Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.)
+
<br>[https://github.com/aatlasis/Chiron chiron] 1.0 An all-in-one IPv6 Penetration Testing Framework.  
<br>[http://www.secfu.net/tools-scripts/ chiron] 0.7 An all-in-one IPv6 Penetration Testing Framework.  
+
<br>[https://www.chkrootkit.org/ chkrootkit] 0.58b Checks for rootkits on a system (for more than 25 years).
<br>[http://www.chkrootkit.org/ chkrootkit] 0.50Checks for rootkits on a system
+
<br>[https://pogostick.net/~pnh/ntpasswd/ chntpw] 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file.
<br>[http://pogostick.net/~pnh/ntpasswd/ chntpw] 140201Offline NT Password Editor - reset passwords in a Windows NT SAM user database file  
+
<br>[https://samy.pl/chownat/ chownat] 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other.
<br>[http://samy.pl/chownat/ chownat] 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other
+
<br>[https://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html chrome-decode] 0.1 Chrome web browser decoder tool that demonstrates recovering passwords.  
<br>[http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html chrome-decode] 0.1 Chrome web browser decoder tool that demonstrates recovering passwords.  
+
<br>[https://osandamalith.github.io/ChromeFreak/ chromefreak] A Cross-Platform Forensic Framework for Google Chrome.
<br>[http://osandamalith.github.io/ChromeFreak/ chromefreak] 22.336e323A Cross-Platform Forensic Framework for Google Chrome
+
<br>[http://www.cpan.org/authors/id/R/RA/RAYNERLUC cidr2range] 1.0 Script for listing the IP addresses contained in a CIDR netblock.
<br>[http://www.cpan.org/authors/id/R/RA/RAYNERLUC cidr2range] 0.9 Script for listing the IP addresses contained in a CIDR netblock
+
<br>[https://cintruder.03c8.net cintruder] 0.4. An automatic pentesting tool to bypass captchas.
<br>[http://cintruder.sourceforge.net/ cintruder] 0.2.0 An automatic pentesting tool to bypass captchas.
+
<br>[https://github.com/OpenSecurityResearch/ciphertest ciphertest] 0.2-Hotfix A better SSL cipher checker using gnutls.
<br>[https://github.com/OpenSecurityResearch/ciphertest ciphertest] 14.7f49ea7A better SSL cipher checker using gnutls.
+
<br>[https://github.com/frohoff/ciphr ciphr] A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.
<br>[https://github.com/frohoff/ciphr ciphr] 105.db79691 A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.
+
<br>''cirt-fuzzer'' 1.0 A simple TCP/UDP protocol fuzzer. Gone.
<br>[http://www.cirt.dk/ cirt-fuzzer] 1.0 A simple TCP/UDP protocol fuzzer.
+
<br>[https://github.com/foreni-packages/cisco-auditing-tool cisco-auditing-tool] Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.
<br>[http://www.scrypt.net cisco-auditing-tool] 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.
+
<br>[https://github.com/foreni-packages/cisco-global-exploiter cisco-global-exploiter] 1.3 A perl script that detects 14 vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
<br>[http://www.blackangels.it cisco-global-exploiter] 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
+
<br>[https://github.com/BlackArch/cisco-ocs/tree/master cisco-ocs] 0.2 Cisco Router Default Password Scanner.
<br>[http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner cisco-ocs] 0.2 Cisco Router Default Password Scanner.
+
<br>'''cisco-router-config''' 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
<br>[ cisco-router-config ] 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
+
<br>[http://wayreth.eu.org/old_page/ cisco-scanner] 0.2 Multithreaded Cisco HTTP vulnerability scanner. Gone. There are several other scanners.
<br>[http://wayreth.eu.org/old_page/ cisco-scanner] 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris.
+
<br>[https://github.com/nccgroup/cisco-snmp-enumeration Cisc0wn] 1.8 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.
<br>[https://github.com/nccgroup/cisco-snmp-enumeration cisco-snmp-enumeration ] 2.e9b1f93 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.
+
<br>[https://github.com/nccgroup/cisco-snmp-slap cisco-snmp-slap] 0.3.1 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.
<br>[https://github.com/nccgroup/cisco-snmp-slap cisco-snmp-slap] 5.daf0589 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.
+
<br>[https://github.com/foreni-packages/cisco-torch cisco-torch] 0.4b Mass Cisco scanning, fingerprinting, and exploitation tool.
<br>[http://www.arhont.com cisco-torch] 0.4bCisco Torch mass scanning, fingerprinting, and exploitation tool.
+
<br>[https://github.com/madrisan/cisco7crack cisco7crack] Crypt and decrypt the cisco enable 7 passwords.
<br>[https://github.com/madrisan/cisco7crack cisco5crack] 2.c4b228c Crypt and decrypt the cisco enable 5 passwords.
+
<br>'''ciscos''' 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
<br>[https://github.com/madrisan/cisco7crack cisco7crack] 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords.
+
<br>[http://magikh0e.xyz/ clamscanlogparser] 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection. Gone.
<br>[ ciscos ] 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
+
<br>[https://github.com/raffaele-forte/climber climber] UNIX/Linux systems for privilege escalation.
<br>[http://magikh0e.xyz/ clamscanlogparser] 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
+
<br>[https://github.com/hatRiot/clusterd clusterd] 0.5 The toolkit automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.
<br>[https://github.com/raffaele-forte/climber climber] 23.f614304Check UNIX/Linux systems for privilege escalation.
+
<br>[https://www.cgsecurity.org/wiki/CmosPwd cmospwd] 5.0 Decrypts password stored in CMOS used to access BIOS setup.
<br>[https://github.com/hatRiot/clusterd clusterd] 129.0f04a49 Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.
+
<br>[https://code.google.com/p/cms-explorer cms-explorer] 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running.
<br>[http://www.cgsecurity.org/wiki/CmosPwd cmospwd] 5.0 Decrypts password stored in CMOS used to access BIOS setup.
+
<br>[https://packetstormsecurity.com/files/64722/cms_few.py.txt.html cms_few] 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.
<br>[http://code.google.com/p/cms-explorer cms-explorer] 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running
+
<br>[https://github.com/dionach/CMSmap cmsmap] 1.0 A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.
<br>[cms-few http://packetstormsecurity.com/files/64722/cms_few.py.txt.html] 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.
+
<br>[https://github.com/blackthorne/Codetective codetective] 0.8.2 A tool to determine the crypto/encoding algorithm used according to traces of its representation.
<br>[https://www.dionach.com/blog/cmsmap-%E2%80%93-a-simple-cms-vulnerability-scanner cmsmap] 198.437d764 A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.
+
<br>[https://complemento.sourceforge.net complemento] 0.7.7 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever. Included in BackTrack.
<br>[https://www.digitalloft.org/init/plugin_wiki/page/codetective codetective] 39.7f44df4A tool to determine the crypto/encoding algorithm used according to traces of its representation.
+
<br>[https://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html configpush] 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.
<br>[http://complemento.sourceforge.net complemento] 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever
+
<br>[http://conpot.org conpot] 0.6.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.
<br>[http://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html configpush] 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.
+
<br>[https://nullsecurity.net/tools/scanner.html conscan] 1.2 A blackbox vulnerability scanner for the Concre5 CMS.
<br>[http://conpot.org conpot] 0.4.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems
+
<br>[https://github.com/CookieCadger/CookieCadger cookie-cadger] 1.08 An auditing tool for Wi-Fi or wired Ethernet connections.
<br>[http://nullsecurity.net/tools/scanner.html conscan] 1.1 A blackbox vulnerability scanner for the Concre5 CMS.
+
<br> [https://github.com/joswr1ght/cowpatty cowpatty] 4.8 Wireless WPA/WPA2 PSK handshake cracking utility.
<br>[https://cookiecadger.com/ cookie-cadger] 1.08An auditing tool for Wi-Fi or wired Ethernet connections.
+
<br>[https://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html cpfinder] 0.1 This is a simple script that looks for administrative web interfaces.
<br>[http://www.wirelessdefence.org/Contents/Files/ cowpatty] 4.6 Wireless WPA/WPA2 PSK handshake cracking utility
+
<br>[https://github.com/danmar/cppcheck cppcheck] 2.14.1 A tool for static C/C++ code analysis
<br>[http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html cpfinder] 0.1 This is a simple script that looks for administrative web interfaces.
+
<br>[https://cpptest.sourceforge.net/ cpptest] 2.0.0 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.
<br>[http://cppcheck.wiki.sourceforge.net/ cppcheck] 1.68A tool for static C/C++ code analysis
+
<br>[https://github.com/CoalfireLabs/crackHOR crackhor] A Password cracking utility. Now Doozer.
<br>[http://cpptest.sourceforge.net/ cpptest] 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.
+
<br>[https://github.com/mikeryan/crackle/ crackle] Crack and decrypt BLE encryption
<br>[https://github.com/CoalfireLabs/crackHOR crackhor] 2.ae7d83f A Password cracking utility.
+
<br>[https://github.com/averagesecurityguy/crack crackserver] An XMLRPC server for password cracking.
<br>[https://github.com/mikeryan/crackle/ crackle] 39.3e93196Crack and decrypt BLE encryption
+
<br>[https://github.com/oblique/create_ap create_ap] 0.4.6 This script creates a NATed or Bridged WiFi Access Point.
<br>[https://github.com/averagesecurityguy/crack crackserver] 33.e5763abAn XMLRPC server for password cracking.
+
<br>[https://github.com/moyix/creddump creddump] 0.3 A python tool to extract various credentials and secrets from Windows registry hives.  
<br>[https://github.com/oblique/create_ap create_ap] 117.3460580 This script creates a NATed or Bridged WiFi Access Point.
+
<br>[https://github.com/DanMcInerney/creds.py creds] Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. Replaced by net-creds.
<br>[https://code.google.com/p/creddump/ creddump] 0.3 A python tool to extract various credentials and secrets from Windows registry hives.  
+
<br>[http://github.com/ilektrojohn/creepy.git creepy] 1.1 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.
<br>[https://github.com/DanMcInerney/creds.py creds] 17.1ec8297Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.
+
<br>[https://github.com/galkan/crowbar crowbar] 4.2 A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
<br>[http://github.com/ilektrojohn/creepy.git creepy] 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.
+
<br>[https://sourceforge.net/projects/crunch-wordlist/ crunch] 3.6 A wordlist generator for all combinations/permutations of a given character set.
<br>[https://github.com/galkan/crowbar crowbar] 39.839c62bA brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
+
<br>[https://github.com/chokepoint/CryptHook crypthook] 0.1 TCP/UDP symmetric encryption tunnel wrapper.
<br>[http://sourceforge.net/projects/crunch-wordlist/ crunch] 3.6 A wordlist generator for all combinations/permutations of a given character set.
+
<br>[https://blog.techstacks.com/cryptonark.html cryptonark] 0.5.7 SSL security checker.
<br>[https://github.com/chokepoint/CryptHook crypthook] 17.0728cd1TCP/UDP symmetric encryption tunnel wrapper.
+
<br>[https://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project csrftester] 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
<br>[http://blog.techstacks.com/cryptonark.html cryptonark] 0.5.6 SSL security checker.
+
<br>[https://github.com/alienrobotarmy/ctunnel ctunnel] 0.8 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
<br>[http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project csrftester] 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
+
<br>[https://github.com/cuckoosandbox/cuckoo cuckoo] 2.0.6 A malware analysis system.
<br>[http://nardcore.org/ctunnel ctunnel] 0.7 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
+
<br>[http://www.remote-exploit.org/articles/misc_research__amp_code/index.html cupp] 3.0 Common User Password Profiler  
<br>[http://cuckoosandbox.org/ cuckoo] 1.1.1 A malware analysis system.
+
<br>[https://cutycapt.sourceforge.net/ cutycapt] A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
<br>[http://www.remote-exploit.org/?page_id=418 cupp] 3.0 Common User Password Profiler  
+
<br>[https://github.com/sjvermeu/cvechecker/wiki cvechecker] 4.0 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.
<br>[http://cutycapt.sourceforge.net/ cutycapt] 10A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
+
<br>[https://cymothoa.sourceforge.net/ cymothoa] 0.1 A stealth backdooring tool, that inject backdoor's shellcode into an existing process.
<br>[http://cvechecker.sourceforge.net/ cvechecker] 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.
+
<br>[https://github.com/504ensicsLabs/DAMM damm] Differential Analysis of Malware in Memory.  
<br>[http://cymothoa.sourceforge.net/ cymothoa] 1 A stealth backdooring tool, that inject backdoor's shellcode into an existing process.
+
<br>[https://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html darkbing] 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.
<br>[https://github.com/504ensicsLabs/DAMM damm] 28.9af34b4Differential Analysis of Malware in Memory.  
+
<br>[https://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html darkd0rk3r] 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
<br>[http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html darkbing] 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.
+
<br>[https://sourceforge.net/projects/darkjumper/ darkjumper] 5.8 This tool will try to find every website that host at the same server at your target.
<br>[http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html darkd0rk3r] 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
+
<br>[https://github.com/BlackArch/darkmysqli darkmysqli] 1.6 Multi-Purpose MySQL Injection Tool.
<br>[http://sourceforge.net/projects/darkjumper/ darkjumper] 5.8 This tool will try to find every website that host at the same server at your target
+
<br>[https://unix4lyfe.org/darkstat/ darkstat] 3.0.721 Network statistics gatherer (packet sniffer).
<br>[https://github.com/BlackArch/darkmysqli darkmysqli] 1.6 Multi-Purpose MySQL Injection Tool
+
<br>[http://websecurity.com.ua/davoset/ davoset] 1.3.7 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.
<br>[http://dmr.ath.cx/net/darkstat/ darkstat] 3.0.718 Network statistics gatherer (packet sniffer)
+
<br>[https://code.google.com/p/davtest/ davtest] 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target.
<br>[http://websecurity.com.ua/davoset/ davoset] 1.2.3 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.
+
<br>[https://github.com/gitdurandal/dbd dbd] 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.
<br>[http://code.google.com/p/davtest/ davtest] 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target
+
<br>[https://github.com/Seabreg/dbpwaudit dbpwaudit] 0.8 A Java tool that allows you to perform online audits of password quality for several database engines
<br>[https://github.com/gitdurandal/dbd dbd] 1.50A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.
+
<br>[https://sourceforge.net/projects/dc3dd dc3dd] 7.2.641 A patched version of dd that includes a number of features useful for computer forensics.
<br>[http://www.cqure.net/wp/dbpwaudit/ dbpwaudit] 0.8 A Java tool that allows you to perform online audits of password quality for several database engines
+
<br>[https://dcfldd.sourceforge.net/ dcfldd] 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing
<br>[http://sourceforge.net/projects/dc3dd dc3dd] 7.2.641 A patched version of dd that includes a number of features useful for computer forensics.
+
<br>[https://www.gnu.org/software/ddrescue/ddrescue.html ddrescue] 1.28 GNU data recovery tool
<br>[http://dcfldd.sourceforge.net/ dcfldd] 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing
+
<br>[https://github.com/SpiderLabs/deblaze deblaze] 0.3 A remote method enumeration tool for flex servers
<br>[http://www.gnu.org/software/ddrescue/ddrescue.html ddrescue] 1.19GNU data recovery tool
+
<br>[https://github.com/jbarcia/TrustedSec delldrac] 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer.
<br>[http://deblaze-tool.appspot.com/ deblaze] 0.3 A remote method enumeration tool for flex servers
+
<br>[http://midnightresearch.com/projects/depant/ depant] 0.3a Check network for services with default passwords. Gone.
<br>[https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/ delldrac] 0.1aDellDRAC and Dell Chassis Discovery and Brute Forcer.
+
<br>[https://github.com/bedirhan/depdep depdep] 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network.
<br>[http://midnightresearch.com/projects/depant/ depant] 0.3aCheck network for services with default passwords.
+
<br>[https://github.com/horsicq/Detect-It-Easy detect-it-easy] 3.10 A program for determining types of files.
<br>[https://github.com/galkan/depdep depdep] 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network.
+
<br>[https://github.com/DanMcInerney/device-pharmer device-pharmer] Opens 1K+ IPs or Shodan search results and attempts to login.
<br>[https://github.com/horsicq/Detect-It-Easy detect-it-easy] 32.bfbeac1A program for determining types of files.
+
<br>[https://github.com/pxb1988/dex2jar dex2jar] 2.4 A tool for converting Android's .dex format to Java's .class format.
<br>[https://github.com/DanMcInerney/device-pharmer device-pharmer] 35.c1d449eOpens 1K+ IPs or Shodan search results and attempts to login.
+
<br>[https://github.com/Ivan-Markovic/DFFl dff-scanner] 1.1 Tool for finding path of predictable resource locations.
<br>[http://code.google.com/p/dex2jar dex2jar] 0.0.9.15A tool for converting Android's .dex format to Java's .class format
 
<br>[http://netsec.rs/70/tools.html dff-scanner] 1.1 Tool for finding path of predictable resource locations.
 
 
<br>[http://www.netpatch.ru/dhcdrop.html dhcdrop] 0.5 Remove illegal dhcp servers with IP-pool underflow.
 
<br>[http://www.netpatch.ru/dhcdrop.html dhcdrop] 0.5 Remove illegal dhcp servers with IP-pool underflow.
<br>[https://github.com/kamorin/DHCPig dhcpig] 69.cc4109aEnumerates hosts, subdomains, and emails from a given domain using google
+
<br>[https://github.com/kamorin/DHCPig dhcpig] 1.6 Initiates an advanced DHCP exhaustion attack. It will consume all IPs on the LAN, stop new users from obtaining IPs, release any IPs in use, then for good measure send gratuitous ARP and knock all windows hosts offline.
<br>[http://kernel.embedromix.ro/us/ dinouml] 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC
+
<br>[https://kernel.embedromix.ro/us/ dinouml] 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC.
<br>[http://dirb.sourceforge.net/ dirb] 2.04A web content scanner, brute forceing for hidden files
+
<br>[https://dirb.sourceforge.net/ dirb] 2.22 A web content scanner, brute forcing for hidden files.
<br>[http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project dirbuster] 1.0_RC1 An application designed to brute force directories and files names on web/application servers
+
<br>[https://github.com/KajanM/DirBuster dirbuster] 1.0_RC1 An application designed to brute force directories and files names on web/application servers.
<br>[http://sourceforge.net/projects/httpdirscan/ directorytraversalscan] 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications.
+
<br>[https://sourceforge.net/projects/httpdirscan/ directorytraversalscan] 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications.
<br>[https://github.com/maurosoria/dirs3arch dirs3arch] 130.8f37c7d HTTP(S) directory/file brute forcer.
+
<br>[https://github.com/maurosoria/dirs3arch dirs3arch] 0.4.3 HTTP(S) directory/file brute forcer.
<br>[http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html dirscanner] 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more.
+
<br>[https://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html dirscanner] 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more.
<br>[http://www.hsc.fr/ressources/outils/dislocker/ dislocker] 0.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.
+
<br>[https://github.com/Aorimn/dislocker dislocker] 0.7.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.
<br>[http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html dissector] 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.
+
<br>[https://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html dissector] 0.1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.
<br>[http://dissy.googlecode.com/ dissy] 10A graphical frontend to the objdump disassembler for compiler-generated code.
+
<br>[https://github.com/SimonKagstrom/dissy dissy] 10 A graphical frontend to the objdump disassembler for compiler-generated code.
<br>[http://www.c0decafe.de/ dizzy] 0.8.2 A Python based fuzzing framework with many features.
+
<br>[http://www.c0decafe.de/ dizzy] 2.0 A Python based fuzzing framework with many features.
<br>[http://www.mor-pah.net/ dmitry] 1.3aDeepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.
+
<br>[https://mor-pah.net/software/dmitry-deepmagic-information-gathering-tool/ dmitry] 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.
<br>[http://sourceforge.net/projects/dnmap/ dnmap] 0.6 The distributed nmap framework
+
<br>[https://sourceforge.net/projects/dnmap/ dnmap] 0.6 The distributed nmap framework
<br>[https://github.com/StalkR/dns-reverse-proxy dns-reverse-proxy] 11.ef9d062A reverse DNS proxy written in Go.
+
<br>[https://github.com/StalkR/dns-reverse-proxy dns-reverse-proxy] A reverse DNS proxy written in Go.
<br>[https://github.com/maurotfilho/dns-spoof dns-spoof] 12.3918a10Yet another DNS spoof utility.
+
<br>[https://github.com/maurotfilho/dns-spoof dns-spoof] Yet another DNS spoof utility.
<br>[http://packetstormsecurity.com/files/118036/DNS-GeoIP.html dns2geoip] 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains.
+
<br>[https://packetstormsecurity.com/files/118036/DNS-GeoIP.html dns2geoip] 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains.
<br>[http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en dns2tcp] 0.5.2 A tool for relaying TCP connections over DNS.
+
<br>[https://github.com/alex-sector/dns2tcp dns2tcp] 0.5.2 A tool for relaying TCP connections over DNS. There's another tool with such name.
<br>[http://packetfactory.openwall.net/projects/dnsa/index.html dnsa] 0.5 DNSA is a dns security swiss army knife
+
<br>[http://packetfactory.openwall.net/projects/dnsa/index.html dnsa] 0.5 DNSA is a dns security swiss army knife. Gone.
<br>[http://code.google.com/p/dnsbf dnsbf] 0.2 search for available domain names in an IP range
+
<br>[https://code.google.com/p/dnsbf dnsbf] 0.2 search for available domain names in an IP range
<br>[https://github.com/d4rkcat/dnsbrute dnsbrute] 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
+
<br>[https://github.com/d4rkcat/dnsbrute dnsbrute] Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
<br>[http://thesprawl.org/projects/dnschef/ dnschef] 0.3 A highly configurable DNS proxy for pentesters.
+
<br>[https://github.com/iphelix/dnschef dnschef] 0.4 A highly configurable DNS proxy for pentesters.
<br>[http://nullsecurity.net/tools/dos.html dnsdrdos] 0.1 Proof of concept code for distributed DNS reflection DoS.
+
<br>[https://nullsecurity.net/tools/dos.html dnsdrdos] 0.1 Proof of concept code for distributed DNS reflection. DoS.
<br>[http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum dnsenum] 1.2.4.1 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
+
<br>[https://github.com/fwaeytens/dnsenum dnsenum] 1.2.4 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
<br>[http://nullsecurity.net/tools/scanner.html dnsgoblin] 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.
+
<br>[https://nullsecurity.net/tools/scanner.html dnsgoblin] 1.0 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.
<br>[http://dnsmap.googlecode.com dnsmap] 0.30Passive DNS network mapper
+
<br>[https://github.com/shellchocolat/dnsmap dnsmap] 0.30 Passive DNS network mapper
<br>[http://johnny.ihackstuff.com dnspredict] 0.0.2 DNS prediction
+
<br>[http://johnny.ihackstuff.com dnspredict] 0.0.2 DNS prediction. Gone.
<br>[https://github.com/darkoperator/dnsrecon dnsrecon] 0.8.9 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
+
<br>[https://github.com/darkoperator/dnsrecon dnsrecon] 1.2.0 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
<br>[http://nullsecurity.net/tools/scanner.html dnsspider] 0.5 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
+
<br>[https://nullsecurity.net/tools/scanner.html dnsspider] 1.4 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
<br>[http://www.mavetju.org/unix/dnstracer.php dnstracer] 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
+
<br>[https://www.mavetju.org/unix/dnstracer.php dnstracer] 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
<br>[http://www.isc.org/software/bind/ dnsutils] 9.9.2.P2DNS utilities: dig host nslookup
+
<br>[https://github.com/tigeli/bind-utils dnsutils] 9.11.0 P2DNS utilities: dig host nslookup
<br>[http://sourceforge.net/projects/dnswalk/ dnswalk] 2.0.2 A DNS debugger
+
<br>[https://sourceforge.net/projects/dnswalk/ dnswalk] 2.0.2 A DNS debugger.
<br>[http://sourceforge.net/projects/domainanalyzer/ domain-analyzer] 0.8.1 Finds all the security information for a given domain name.
+
<br>[https://sourceforge.net/projects/domainanalyzer/ domain-analyzer] 0.8.1 Finds all the security information for a given domain name.
<br>[https://github.com/wireghoul/doona doona] 127.06cd178 A fork of the Bruteforce Exploit Detector Tool (BED).
+
<br>[https://github.com/wireghoul/doona doona] 1.0 A fork of the Bruteforce Exploit Detector Tool (BED).
<br>[http://dotdotpwn.blogspot.com dotdotpwn] 3.0 The Transversal Directory Fuzzer
+
<br>[https://github.com/wireghoul/dotdotpwn dotdotpwn] 3.0.2 The Directory Traversal Fuzzer
<br>[http://www.toolswatch.org/dpe/ dpeparser] beta002 Default password enumeration project
+
<br>[http://www.toolswatch.org/dpe/ dpeparser] beta002 Default password enumeration project. Gone.
 
<br>[https://github.com/insaneisnotfree/Blue-Sky-Information-Security dpscan] 0.1 Drupal Vulnerabilty Scanner.
 
<br>[https://github.com/insaneisnotfree/Blue-Sky-Information-Security dpscan] 0.1 Drupal Vulnerabilty Scanner.
<br>[http://dradisframework.org/ dradis] 2.9.0 An open source framework to enable effective information sharing.
+
<br>[https://dradis.com/ce/ dradis] 4.10.0 An open source framework to enable effective information sharing.
<br>[http://www.ex-parrot.com/~chris/driftnet/ driftnet] 0.1.6 Listens to network traffic and picks out images from TCP streams it observes.
+
<br>[https://www.ex-parrot.com/~chris/driftnet/ driftnet] 0.1.6 Listens to network traffic and picks out images from TCP streams it observes.
<br>[http://www.blackhatlibrary.net/Dripper dripper] v1.r1.gc9bb0c9A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.
+
<br>[https://github.com/krmaxwell/Dripper dripper] A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.
<br>[https://github.com/Hackerpilot/Dscanner dscanner] 715.63ba816 Swiss-army knife for D source code.
+
<br>[https://github.com/Hackerpilot/Dscanner dscanner] 0.15.2 Swiss-army knife for D source code.
<br>[https://github.com/szechyjs/dsd dsd] 84.60807e0Digital Speech Decoder
+
<br>[https://github.com/szechyjs/dsd dsd] 1.7.0 Digital Speech Decoder.
<br>[http://www.monkey.org/~dugsong/dsniff/ dsniff] 2.4b1 Collection of tools for network auditing and penetration testing
+
<br>[https://www.monkey.org/~dugsong/dsniff/ dsniff] 2.3 Collection of tools for network auditing and penetration testing.
<br>[https://github.com/0verl0ad/Dumb0 dumb0] 19.1493e74A simple tool to dump users in popular forums and CMS.
+
<br>[https://github.com/0verl0ad/Dumb0 dumb0] A simple tool to dump users in popular forums and CMS.
<br>[https://github.com/MalcolmRobb/dump1090 dump1090] 386.bff92c4 A simple Mode S decoder for RTLSDR devices.
+
<br>[https://github.com/MalcolmRobb/dump1090 dump1090] A simple Mode S decoder for RTLSDR devices.
<br>[http://www.systemtools.com/cgi-bin/download.pl?DumpAcl dumpacl] 0.0 Dumps NTs ACLs and audit settings.
+
<br>[https://github.com/dalibo/pg_dumpacl dumpacl] 0.4 Dumps NTs ACLs and audit settings.
<br>[http://www.dumpzilla.org/ dumpzilla] 03152013A forensic tool for firefox.
+
<br>[https://github.com/Busindre/dumpzilla dumpzilla] 03152013 A forensic tool for Firefox.
<br>[https://github.com/kost/dvcs-ripper dvcs-ripper] 12.b4dc17aRip web accessible (distributed) version control systems: SVN/GIT/...
+
<br>[https://github.com/kost/dvcs-ripper dvcs-ripper] Rip web accessible (distributed) version control systems: SVN/GIT/...
<br>[http://www.willhackforsushi.com/?page_id=67 eapmd5pass] 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol
+
<br>[https://www.willhackforsushi.com/?page_id=67 eapmd5pass] 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol.
<br>[https://github.com/brav0hax/easy-credseasy-creds] 3.9 A bash script that leverages ettercap and other tools to obtain credentials.
+
<br>[https://github.com/brav0hax/easy-creds easy-creds] 3.9 A bash script that leverages ettercap and other tools to obtain credentials.
<br>[https://github.com/nccgroup/easyda easyda] 7.0867f9b Easy Windows Domain Access Script.
+
<br>[https://github.com/nccgroup/easyda easyda] 1.0 Easy Windows Domain Access Script.
<br>[http://www.mh-sec.de/downloads.html.en easyfuzzer] 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant).
+
<br>[https://www.mh-sec.de/downloads.html.en easyfuzzer] 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent).
<br>[http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html eazy] 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.
+
<br>[https://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html eazy] 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.
<br>[http://www.codef00.com/projects.php#Debugger edb] 0.9.20A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.
+
<br>[https://www.codef00.com/projects.php#Debugger edb] 1.5.0 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.
<br>[http://www.jonesdykstra.com/ eindeutig] 20050628_1Examine the contents of Outlook Express DBX email repository files (forensic purposes)
+
<br>[http://www.jonesdykstra.com/ eindeutig] Examine the contents of Outlook Express DBX email repository files (forensic purposes). Gone.
<br>[http://www.winstonsmith.info/julia/elettra/ elettra] 1.0 Encryption utility by Julia Identity
+
<br>[https://www.winstonsmith.info/julia/elettra/ elettra] 1.0 Encryption utility by Julia Identity. Has a GUI.
<br>[http://www.winstonsmith.info/julia/elettra/ elettra-gui] 1.0 Gui for the elettra crypto application.
+
<br>[https://github.com/DanMcInerney/elite-proxy-finder elite-proxy-finder] Finds public elite anonymity proxies and concurrently tests them.
<br>[https://github.com/DanMcInerney/elite-proxy-finder elite-proxy-finder] 44.29143adFinds public elite anonymity proxies and concurrently tests them.
+
<br>[https://packetstormsecurity.org/cisco/enabler.c enabler] 1 attempts to find the enable password on a cisco system via brute force.
<br>[http://packetstormsecurity.org/cisco/enabler.c enabler] 1 attempts to find the enable password on a cisco system via brute force.
+
<br>[http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html encodeshellcode] 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
<br>[http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html encodeshellcode] 0.1bThis is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
+
<br>[https://www.fourmilab.ch/random ent] 1.0 Pseudorandom number sequence test.
<br>[http://www.fourmilab.ch/random ent] 1.0 Pseudorandom number sequence test.
+
<br>[https://github.com/dejanlevaja/enum_shares enum-shares] Tool that enumerates shared folders across the network and under a custom user account.
<br>[https://github.com/dejanlevaja/enum_shares enum-shares] 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account.
+
<br>[https://github.com/CiscoCXSecurity/enum4linux enum4linux] 0.9.1 A tool for enumerating information from Windows and Samba systems.
<br>[http://labs.portcullis.co.uk/application/enum4linux/ enum4linux] 0.8.9 A tool for enumerating information from Windows and Samba systems.
+
<br>[https://sourceforge.net/projects/enumiax/ enumiax] 1.0 IAX enumerator.
<br>[http://sourceforge.net/projects/enumiax/ enumiax] 1.0 IAX enumerator
+
<br>
<br>[http://www.enye-sec.org/programas.html enyelkm] 1.2 Rootkit for Linux x86 kernels v2.6.
+
[https://www.enye-sec.org/programas.html enyelkm] 1.2 Rootkit for Linux x86 kernels v2.6.
<br>[http://sourceforge.net/projects/epicwebhoneypot/ epicwebhoneypot] 2.0aTool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
+
<br>[https://sourceforge.net/projects/epicwebhoneypot/ epicwebhoneypot] 2.0a A tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
<br>[http://www.hackingexposedvoip.com/ erase-registrations] 1.0 IAX flooder  
+
<br>[http://www.hackingexposedvoip.com/ erase-registrations] 1.0 IAX flooder. Gone.
<br>[http://etherape.sourceforge.net/ etherape] 0.9.13A graphical network monitor for various OSI layers and protocols
+
<br>[https://etherape.sourceforge.net/ etherape] 0.9.20 A graphical network monitor for various OSI layers and protocols.
<br>[http://ettercap.github.com/ettercap/ ettercap] 0.8.1 A network sniffer/interceptor/logger for ethernet LANs - console
+
<br>[https://github.com/Ettercap/ettercap ettercap] 0.8.3.1 A network sniffer/interceptor/logger for ethernet LANs - console.
<br>[http://www.infobyte.com.ar/developments.html evilgrade] 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates
+
<br>[https://github.com/infobyte/evilgrade evilgrade] 2.0.9 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.
<br>[http://theinvisiblethings.blogspot.com evilmaid] 1.01 TrueCrypt loader backdoor to sniff volume password
+
<br>[https://theinvisiblethings.blogspot.com/2009/10/evil-maid-goes-after-truecrypt.html?m=1 evilmaid] 1.01 TrueCrypt loader backdoor to sniff volume password.
<br>[http://exiv2.org exiv2] 0.24Exif and Iptc metadata manipulation library and tools
+
<br>[https://exiv2.org exiv2] 0.28.2 Exif and Iptc metadata manipulation library and tools.
<br>[http://www.exploit-db.com exploit-db] 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks
+
<br>[https://www.exploit-db.com exploit-db] The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks.
<br>[https://github.com/bwall/ExtractHosts extracthosts] 14.ec8b89cExtracts hosts (IP/Hostnames) from files.
+
<br>[https://github.com/bwall/ExtractHosts extracthosts] Extracts hosts (IP/Hostnames) from files. Gone.
<br>[http://extundelete.sourceforge.net extundelete] 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal
+
<br>[https://extundelete.sourceforge.net extundelete] 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal
<br>[http://www.pentest.co.uk eyepwn] 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability
+
<br>[http://www.pentest.co.uk eyepwn] 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability. Gone.
<br>[https://github.com/ChrisTruncer/EyeWitness eyewitness] 308.db7cb97 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
+
<br>[https://github.com/ChrisTruncer/EyeWitness eyewitness] 03.11.2018 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
<br>[https://github.com/pun1sh3r/facebot facebot] 23.57f6025A facebook profile and reconnaissance system.
+
<br>[https://github.com/pun1sh3r/facebot facebot] 2.0 A facebook profile and reconnaissance system.
<br>[https://github.com/emerinohdz/FaceBrute facebrute] 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).
+
<br>[https://github.com/emerinohdz/FaceBrute facebrute] This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).
<br>[http://www.blackalchemy.to/project/fakeap/ fakeap] 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames.
+
<br>[http://www.blackalchemy.to/project/fakeap/ fakeap] 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. Gone.
<br>[https://github.com/Crypt0s/FakeDns fakedns] 36.90bd7e1A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses.
+
<br>[https://github.com/Crypt0s/FakeDns fakedns] 4/14/2020 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses.
<br>[http://sourceforge.net/projects/fakemail/ fakemail] 1.0 Fake mail server that captures e-mails as files for acceptance testing.
+
<br>[https://sourceforge.net/projects/fakemail/ fakemail] 1.0b Fake mail server that captures e-mails as files for acceptance testing.
<br>[https://github.com/mubix/FakeNetBIOS fakenetbios] 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.
+
<br>[https://github.com/mubix/FakeNetBIOS fakenetbios] A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.
<br>[https://github.com/evilsocket/fang fang] 16.b5cb86dA multi service threaded MD5 cracker.
+
<br>[https://github.com/evilsocket/fang fang] A multi service threaded MD5 cracker.
<br>[http://www.faradaysec.com/ faraday] 858.bf9c1a3 A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.
+
<br>[http://www.faradaysec.com/ faraday] A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.
<br>[https://github.com/chinoogawa/fbht-linux fbht] 53.9e515efA Facebook Hacking Tool
+
<br>[https://github.com/chinoogawa/fbht fbht] Facebook Hacking Tool.
<br>[https://github.com/guelfoweb/fbid fbid] 11.b8106f8Show info about the author by facebook photo url.
+
<br>[https://github.com/guelfoweb/fbid fbid] Show info about the author by facebook photo url.
<br>[http://oldhome.schmorp.de/marc/fcrackzip.html fcrackzip] 1.0 Zip file password cracker
+
<br>[http://oldhome.schmorp.de/marc/fcrackzip.html fcrackzip] 0.2.0 Zip file password cracker.
<br>[http://code.google.com/p/fern-wifi-cracker/ fern-wifi-cracker] 221 WEP, WPA wifi cracker for wireless penetration testing
+
<br>[https://github.com/savio-code/fern-wifi-cracker fern-wifi-cracker] 3.4 WEP, WPA wifi cracker for wireless penetration testing.
<br>[https://github.com/stealth/fernmelder fernmelder] 6.c6d4ebe Asynchronous mass DNS scanner.
+
<br>[https://github.com/stealth/fernmelder fernmelder] Asynchronous mass DNS scanner.
<br>[http://www.fantaghost.com/fgscanner fgscanner] 11.893372cAn advanced, opensource URL scanner.
+
<br>[https://github.com/FantaGhost/FGscanner fgscanner] 1.1 An advanced, opensource URL scanner.
<br>[http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html fhttp] 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.
+
<br>[https://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html fhttp] 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.
<br>[http://ha.ckers.org/fierce/ fierce] 0.9.9 A DNS scanner
+
<br>[https://github.com/mschwager/fierce fierce] 1.5.0 A DNS scanner.
<br>[http://www.roe.ch/FakeIKEd fiked] 0.0.5 Fake IDE daemon
+
<br>[https://www.roe.ch/FakeIKEd fiked] 0.0.5 Fake IDE daemon.
<br>[https://github.com/subinacls/Filibuster filibuster] 161.37b7f9c A Egress filter mapping application with additional functionality.
+
<br>[https://github.com/subinacls/Filibuster filibuster]
<br>[http://code.google.com/p/fimap/ fimap] 1.00A little tool for local and remote file inclusion auditing and exploitation
+
6.28.14 A Egress filter mapping application with additional functionality.
<br>[http://code.google.com/p/findmyhash/ findmyhash] 1.1.2 Crack different types of hashes using free online services
+
<br>[https://github.com/kurobeats/fimap fimap] 1.00 A little tool for local and remote file inclusion auditing and exploitation
<br>[http://packetfactory.openwall.net/projects/firewalk/ firewalk] 5.0 An active reconnaissance network security tool
+
<br>[https://code.google.com/p/findmyhash/ findmyhash] 1.1.2 Crack different types of hashes using free online services
<br>[http://code.google.com/p/firmware-mod-kit firmware-mod-kit] 099 Modify firmware images without recompiling.
+
<br>[http://packetfactory.openwall.net/projects/firewalk/ firewalk] 5.0 An active reconnaissance network security tool. Gone.
<br>[https://github.com/nccgroup/firstexecution firstexecution] 6.a275793 A Collection of different ways to execute code outside of the expected entry points.
+
<br>[https://code.google.com/p/firmware-mod-kit firmware-mod-kit] Modify firmware images without recompiling.
<br>[http://lcamtuf.coredump.cx/ fl0p] 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks.
+
<br>[https://github.com/nccgroup/firstexecution firstexecution] A Collection of different ways to execute code outside of the expected entry points.
<br>[http://www.nowrap.de/flare.html flare] 0.6 Flare processes an SWF and extracts all scripts from it.
+
<br>
<br>[http://www.nowrap.de/flasm.html flasm] 1.62Disassembler tool for SWF bytecode
+
[https://www.nowrap.de/flare.html flare] 0.6 Flare processes an SWF and extracts all scripts from it.
<br>[http://www.dwheeler.com/flawfinder flawfinder] 1.31Searches through source code for potential security flaws.
+
<br>[https://www.nowrap.de/flasm.html flasm] 1.62 Disassembler tool for SWF bytecode.
<br>[https://github.com/7h3rAm/flowinspect flowinspect] 94.01c8921A network traffic inspection tool.
+
<br>[https://www.dwheeler.com/flawfinder flawfinder] 2.0.19 Searches through source code for potential security flaws.
 +
<br>[https://github.com/7h3rAm/flowinspect flowinspect] 0.2 A network traffic inspection tool.
 
<br>[http://code.google.com/p/flunym0us/ flunym0us] 2.0 A Vulnerability Scanner for Wordpress and Moodle.
 
<br>[http://code.google.com/p/flunym0us/ flunym0us] 2.0 A Vulnerability Scanner for Wordpress and Moodle.
<br>[http://foremost.sourceforge.net/ foremost] 1.5.7 A console program to recover files based on their headers, footers, and internal data structures
+
<br>[http://foremost.sourceforge.net/ foremost] 1.5.7 A console program to recover files based on their headers, footers, and internal data structures.
<br>[http://magikh0e.xyz/ forkingportscanner] 1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.
+
<br>[https://www.magikh0e.pl/pubCode/ forkingportscanner] 0.1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.
<br>[https://github.com/kirei/fpdns fpdns] 20130404Program that remotely determines DNS server versions.
+
<br>[https://github.com/kirei/fpdns fpdns] 20190131 Program that remotely determines DNS server versions.
<br>[http://www.fping.org/ fping] 3.10A utility to ping multiple hosts at once
+
<br>[http://www.fping.org/ fping] 5.2 A utility to ping multiple hosts at once.
<br>[http://www.foundstone.com/us/resources/proddesc/fport.htm fport] 2.0 Identify unknown open ports and their associated applications.
+
<br>[http://www.foundstone.com/us/resources/proddesc/fport.htm fport] 2.0 Identify unknown open ports and their associated applications. Gone.
<br>[http://magikh0e.xyz/ fprotlogparser] 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.
+
<br>[https://www.magikh0e.pl/pubCode/ fprotlogparser] 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.
<br>[https://github.com/stealth/fraud-bridge fraud-bridge] 10.775c563ICMP and DNS tunneling via IPv4 and IPv6.
+
<br>[https://github.com/stealth/fraud-bridge fraud-bridge] ICMP and DNS tunneling via IPv4 and IPv6.
<br>[http://www.gnu.org/software/freeipmi/ freeipmi] 1.4.8 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).
+
<br>[https://www.gnu.org/software/freeipmi/ freeipmi] 1.6.4 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).
<br>[http://www.freeradius.org/ freeradius] 3.0.6 The premier open source RADIUS server
+
<br>[https://www.freeradius.org/ freeradius] 3.2.4 The premier open source RADIUS server.
 
<br>[https://github.com/nccgroup/FrisbeeLite frisbeelite] 1.2 A GUI-based USB device fuzzer.
 
<br>[https://github.com/nccgroup/FrisbeeLite frisbeelite] 1.2 A GUI-based USB device fuzzer.
<br>[http://www.fulgursecurity.com/en/content/fs-nyarl fs-nyarl] 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.
+
<br>[http://www.fulgursecurity.com/en/content/fs-nyarl fs-nyarl] 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. Gone.
<br>[http://vladz.devzero.fr/fsnoop.php fsnoop] 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").
+
<br>[https://github.com/v14dz/fsnoop fsnoop] 3.5 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").
<br>[http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html fstealer] 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.
+
<br>[https://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html fstealer] 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.
 
<br>[http://www.inversepath.com/ftester.html ftester] 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.
 
<br>[http://www.inversepath.com/ftester.html ftester] 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.
<br>[http://nullsecurity.net/tools/fuzzer.html ftp-fuzz] 1337The master of all master fuzzing scripts specifically targeted towards FTP server sofware.
+
<br>[https://nullsecurity.net/tools/fuzzer.html ftp-fuzz] 0.1 The master of all master fuzzing scripts specifically targeted towards FTP server sofware.
<br>[ftp-scanner http://wayreth.eu.org/old_page/] 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris.
+
<br>[http://wayreth.eu.org/old_page/ ftp-scanner] 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. Gone.
<br>ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.
+
<br>[https://packetstormsecurity.com/files/35120/ftp-spider.pl.html ftp-spider] 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.
<br>[http://packetstormsecurity.com/files/35120/ftp-spider.pl.html ftpmap] 0.4 scans remote FTP servers to identify what software and what versions they are running.http://wcoserver.googlecode.com/files/
+
<br>[https://github.com/ovpn-to/ftpmap ftpmap] 0.5 Scans remote FTP servers to identify what software and what versions they are running.
<br>[http://bitbucket.org/haypo/fusil/wiki/Home fusil] 1.5 A Python library used to write fuzzing programs.
+
<br>[https://github.com/clem1/segvault/tree/master/fusil fusil] 1.2.2 A Python library used to write fuzzing programs.
<br>[https://github.com/lostincynicism/FuzzAP fuzzap] 14.f13932cA python script for obfuscating wireless networks.
+
<br>[https://github.com/lostincynicism/FuzzAP fuzzap] A python script for obfuscating wireless networks.
<br>[http://nologin.org/ fuzzball] 2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.
+
<br>[http://nologin.org/ fuzzball] 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. Gone.
<br>[https://code.google.com/p/fuzzdb/ fuzzdb] 1.09Attack and Discovery Pattern Database for Application Fuzz Testing
+
<br>[https://github.com/fuzzdb-project/fuzzdb/ fuzzdb] 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing
<br>[http://vsecurity.com/resources/tool fuzzdiff] 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.
+
<br>[http://vsecurity.com/resources/tool fuzzdiff] 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. Gone.
 
<br>[https://code.google.com/p/fuzztalk fuzztalk] 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.
 
<br>[https://code.google.com/p/fuzztalk fuzztalk] 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.
<br>[http://www.ps-auxw.de/ g72x++] 1 Decoder for the g72x++ codec.
+
<br>[https://www.ps-auxw.de/ g72x++] 1 Decoder for the g72x++ codec. Gone.
<br>[http://www.jonesdykstra.com/ galleta] 20040505_1Examine the contents of the IE's cookie files for forensic purposes
+
<br>[https://packages.ubuntu.com/en/source/focal/galleta galleta] Examine the contents of the IE's cookie files for forensic purposes.
<br>[http://www.gnu.org/software/gdb/ gdb] 7.8.2 The GNU Debugger
+
<br>[http://www.gnu.org/software/gdb/ gdb] 14.2 The GNU Debugger.
<br>[ genlist ] 0.1 Generates lists of IP addresses.
+
<br>'''genlist''' 0.1 Generates lists of IP addresses.
<br>[ geoedge ] 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
+
<br>'''geoedge''' 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
<br>[http://www.maxmind.com/app/c geoip] 1.6.2 Non-DNS IP-to-country resolver C library & utils
+
<br>[https://dev.maxmind.com/geoip geoip] 5.2.0 Non-DNS IP-to-country resolver C library & utils
<br>[http://code.google.com/p/geoipgen/ geoipgen] 0.4 GeoIPgen is a country to IP addresses generator.
+
<br>[https://morningstarsecurity.com/research/geoipgen geoipgen] 0.4 GeoIPgen is a country to IP addresses generator.
<br>[http://www.cqure.net/wp/getsids/ getsids] 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’.
+
<br>[https://www.cqure.net/wp/getsids/ getsids] 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. Gone.
<br>[http://www.morningstarsecurity.com/research/gggooglescan gggooglescan] 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.
+
<br>[https://www.morningstarsecurity.com/research/gggooglescan gggooglescan] 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.
<br>[http://www.oldskoolphreak.com/tfiles/ghettotooth.txt ghettotooth] 1.0 Ghettodriving for bluetooth
+
<br>[https://www.oldskoolphreak.com/tfiles/ghettotooth.txt ghettotooth] 1.0 Ghettodriving for bluetooth. Gone.
<br>[http://code.google.com/p/ghost-phisher ghost-phisher] 1.62GUI suite for phishing and penetration attacks
+
<br>[https://github.com/savio-code/ghost-phisher ghost-phisher] 1.62 GUI suite for phishing and penetration attacks.
<br>[http://jeanphix.github.com/Ghost.py/ ghost-py] 0.1b3 Webkit based webclient (relies on PyQT).
+
<br>[https://github.com/jeanphix/Ghost.py ghost-py] 2.0.0 Webkit based webclient (relies on PyQT).
<br>[http://www.giskismet.org giskismet] 20110805A program to visually represent the Kismet data in a flexible manner.
+
<br>[https://github.com/xtr4nge/giskismet giskismet] GISKismet is a wireless recon visualization tool to represent data gathered
<br>[http://gnuradio.org gnuradio] 3.7.6.1 General purpose DSP and SDR toolkit. With drivers for usrp and fcd.
+
using Kismet in a flexible manner.
<br>[http://gnutls.org/ gnutls] 2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2)
+
<br>[https://wiki.gnuradio.org/index.php/InstallingGR gnuradio] 3.10.9.2 General purpose DSP and SDR toolkit. With drivers for usrp and fcd.
<br>[https://github.com/jseidl/GoldenEye goldeneye] 16.7a38fe9A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.  
+
<br>[https://gnutls.org/ gnutls] 3.8.4 A library which provides a secure layer over a reliable transport layer.
<br>[https://github.com/golismero/golismero golismero] 2.0 Opensource web security testing framework.
+
<br>[https://github.com/jseidl/GoldenEye goldeneye] 2016-02-06 HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.  
<br>[http://goo-dork.blogspot.com/ goodork] 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
+
<br>[https://github.com/golismero/golismero golismero] 2.0b3 Opensource web security testing framework.
 +
<br>[https://goo-dork.blogspot.com/ goodork] 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
 
<br>[https://code.google.com/p/goofile/ goofile] 1.5 Command line filetype search
 
<br>[https://code.google.com/p/goofile/ goofile] 1.5 Command line filetype search
<br>[http://www.darkc0de.com/others/goog-mail.py goog-mail] 1.0 Enumerate domain emails from google.
+
<br>[https://github.com/BushidoUK/Goog-mail/blob/main/goog-mail.py goog-mail] 1.0 Enumerate domain emails from google.
 
<br>[https://github.com/zombiesam/googlesub googlesub] 1.2 A python script to find domains by using google dorks.
 
<br>[https://github.com/zombiesam/googlesub googlesub] 1.2 A python script to find domains by using google dorks.
<br>[http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/ gooscan] 1.0.9 A tool that automates queries against Google search appliances, but with a twist.
+
<br>[https://github.com/BlackArch/blackarch/blob/master/packages/gooscan/gooscan.c gooscan] 1.0 A tool that automates queries against Google search appliances, but with a twist. Now part of BlackArch.
<br>[http://gpredict.oz9aec.net/ gpredict] 1.3 A real-time satellite tracking and orbit prediction application.
+
<br>[http://gpredict.oz9aec.net/ gpredict] 2.2.1 A real-time satellite tracking and orbit prediction application.
<br>[http://gqrx.dk/ gqrx] 2.3.2 Interactive SDR receiver waterfall for many devices.
+
<br>[http://gqrx.dk/ gqrx] 2.17 Interactive SDR receiver waterfall for many devices.
 
<br>[http://rgaucher.info/beta/grabber/ grabber] 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website.
 
<br>[http://rgaucher.info/beta/grabber/ grabber] 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website.
 
<br>[http://www.irongeek.com/downloads/grepforrfi.txt grepforrfi] 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2
 
<br>[http://www.irongeek.com/downloads/grepforrfi.txt grepforrfi] 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2
<br>[http://code.google.com/p/grokevt/ grokevt] 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.
+
<br>[https://github.com/ecbftw/grokevt/ grokevt] 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.
<br>[http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html gtalk-decode] 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts.
+
<br>[https://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html gtalk-decode] 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts.
<br>[http://www.c0decafe.de/ gtp-scan] 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.
+
<br>[https://www.c0decafe.de/ gtp-scan] 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.
<br>[http://guymager.sourceforge.net/ guymager] 0.7.4 A forensic imager for media acquisition.
+
<br>[http://guymager.sourceforge.net/ guymager] 0.8.13 A forensic imager for media acquisition.
<br>[http://packetstormsecurity.com/files/62047/gwcheck.c.html gwcheck] 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet.
+
<br>[https://packetstormsecurity.com/files/62047/gwcheck.c.html gwcheck] 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet.
<br>[http://www.gdssecurity.com/l/t/d.php?k=GwtEnum gwtenum] 7.f27a5aa Enumeration of GWT-RCP method calls.
+
<br>[https://github.com/GDSSecurity/GWT-Penetration-Testing-Toolset/blob/master/gwtenum/gwtenum.py gwtenum] 0.2 Enumeration of GWT-RCP method calls.
<br>[http://www.hackersh.org/ hackersh] 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools
+
<br>[https://www.hackersh.org/ hackersh] 0.2. A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.
<br>[http://halberd.superadditive.com/ halberd] 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.
+
<br>[https://github.com/jmbr/halberd halberd] 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.
<br>[http://www.blackhatlibrary.net/Halcyon halcyon] 0.1 A repository crawler that runs checksums for static files found within a given git repository.
+
<br>[http://www.blackhatlibrary.net/Halcyon halcyon] 0.1 A repository crawler that runs checksums for static files found within a given git repository. Gone.
<br>[http://hamster.erratasec.com/ hamster] 2.0.0 Tool for HTTP session sidejacking.
+
<br>[https://www.kali.org/tools/hamster-sidejack/ hamster] 2.0.0 Tool for HTTP session sidejacking.
<br>[http://www.tarasco.org/security/handle/index.html handle] 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..
+
<br>[https://github.com/galkan/hasere hasere] 1.0 Discover the vhosts using Google and Bing.
<br>[https://github.com/galkan/hasere hasere] 1.0 Discover the vhosts using google and bing.
+
<br>[https://code.google.com/p/hash-identifier hash-identifier] 1.1 Identifies the different types of hashes used to encrypt data, especially passwords
<br>[http://code.google.com/p/hash-identifier hash-identifier] 1.1 Identifies the different types of hashes used to encrypt data, especially passwords
+
<br>[https://hashcat.net/hashcat/ hashcat] 6.2.6 A multithreaded cross platform hash cracker.
<br>[http://hashcat.net/hashcat/ hashcat] 0.49A multithreaded cross platform hash cracker.
+
<br>[https://hashcat.net/wiki/doku.php?id=hashcat_utils hashcat-utils] 1.9 Utilites for Hashcat.
<br>[http://hashcat.net/wiki/doku.php?id=hashcat_utils hashcat-utils] 1.1 Utilites for Hashcat
+
<br>[https://github.com/ChrisTruncer/Hasher hasher] 1.1.0 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.
<br>[https://github.com/ChrisTruncer/Hasher hasher] 33.17592edA tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.
+
<br>[https://github.com/rurapenthe/hashfind hashfind] A tool to search files for matching password hash types and other interesting data.
<br>[https://github.com/rurapenthe/hashfind hashfind] 8.e9a9a14 A tool to search files for matching password hash types and other interesting data.
+
<br>[https://github.com/psypanda/hashID hashID] 3.1.4 Software to identify the different types of hashes used to encrypt data.
<br>[https://github.com/psypanda/hashID hashid] 315.3f9cddf Software to identify the different types of hashes used to encrypt data.
+
<br>[https://github.com/miekrr/HashPump hashpump] A tool to exploit the hash length extension attack in various hashing algorithms.
<br>[https://github.com/bwall/HashPump hashpump] 34.0b3c286A tool to exploit the hash length extension attack in various hashing algorithms.
+
<br>[https://github.com/SmeegeSec/HashTag hashtag] 0.41 A python script written to parse and identify password hashes.
<br>[https://github.com/SmeegeSec/HashTag hashtag] 0.41A python script written to parse and identify password hashes.
+
<br>[https://github.com/trolldbois/python-haystack haystack] A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.
<br>[https://github.com/trolldbois/python-haystack haystack] 1035.ac2ffa4A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.
+
<br>[https://sourceforge.net/projects/hcraft/ hcraft] 1.0.0 HTTP Vuln Request Crafter.
<br>[http://www.curesec.com/ hbad] 1.0 This tool allows you to test clients on the heartbleed bug.
+
<br>[https://github.com/rjw57/hdcp-genkey hdcp-genkey] Generate HDCP source and sink keys from the leaked master key.
<br>[http://sourceforge.net/projects/hcraft/ hcraft] 1.0.0 HTTP Vuln Request Crafter
+
<br>[https://github.com/ApertureLabsLtd/hdmi-sniff hdmi-sniff] HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.
<br>[https://github.com/rjw57/hdcp-genkey hdcp-genkey] 18.e8d342dGenerate HDCP source and sink keys from the leaked master key.
+
<br>[https://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt heartbleed-honeypot] 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's.
<br>[https://github.com/ApertureLabsLtd/hdmi-sniff hdmi-sniff] 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.
+
<br>[https://hex2bin.sourceforge.net/ hex2bin] 2.5 Converts Motorola and Intel hex files to binary.
<br>[http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt heartbleed-honeypot] 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's
+
<br>[https://hexinject.sourceforge.net hexinject] 1.6 A very versatile packet injector and sniffer that provides a command-line framework for raw network access.
<br>[http://hex2bin.sourceforge.net/ hex2bin] 1.0.12Converts Motorola and Intel hex files to binary.
+
<br>[https://github.com/savio-code/hexorbase hexorbase] 1.0_all A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).
<br>[http://hexinject.sourceforge.net hexinject] 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access.
+
<br>[https://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html hharp] 1b This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.
<br>[https://code.google.com/p/hexorbase/ hexorbase] 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).
+
<br>[https://mulliner.org/bluetooth/hidattack.php hidattack] 0.1 HID Attack (attacking HID host implementations).
<br>[http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html hharp] 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.
+
<br>[https://github.com/Telefonica/HomePWN homepwn] 0.0.1b Swiss Army Knife for Pentesting of IoT Devices. Bluetooth, NFC, QR.
<br>[http://mulliner.org/bluetooth/hidattack.php hidattack] 0.1 HID Attack (attacking HID host implementations)
+
<br>[https://github.com/DataSoft/Honeyd/ honeyd] 1.6d A small daemon that creates virtual hosts on a network.
<br>[https://github.com/DataSoft/Honeyd/ honeyd] 1.6.7 A small daemon that creates virtual hosts on a network.
+
<br>[https://github.com/tnich/honssh honssh] 1.1.0 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.
<br>[https://code.google.com/p/honssh/ honssh] 49.0c06ee8A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.
+
<br>[https://hookanalyser.blogspot.de/ hookanalyser] 3.4 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
<br>[http://hookanalyser.blogspot.de/ hookanalyser] 3.1 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
+
<br>[https://github.com/Hax0rG1rl/host-extract host-extract] Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.
<br>[https://code.google.com/p/host-extract/ host-extract] 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.
+
<br>[https://packetstormsecurity.com/files/118198/HostBox-SSH-0.1.html hostbox-ssh] 0.1.1 A ssh password/account scanner.
<br>[http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/ hostbox-ssh] 0.1.1 A ssh password/account scanner.
+
<br>[https://github.com/vikasnkumar/wisecracker hotpatch] 1.0 Hot patches executables on Linux using .so file injection.
<br>[http://www.selectiveintellect.com/hotpatch.html hotpatch] 0.2 Hot patches executables on Linux using .so file injection.
+
<br>[https://www.remote-exploit.org/articles/misc_research__amp_code/index.html hotspotter] 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.
<br>[http://www.remote-exploit.org/?page_id=418 hotspotter] 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.
+
<br>[https://github.com/rep/hpfeeds hpfeeds] 3.1.0 Honeynet Project generic authenticated datafeed protocol.
<br>[https://github.com/rep/hpfeeds hpfeeds] 138.249b2f7 Honeynet Project generic authenticated datafeed protocol.
+
<br>[https://github.com/antirez/hping hping] 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer.
<br>[http://www.hping.org hping] 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer.
+
<br>[https://github.com/PaulSec/HQLmap hqlmap] 1.0 A tool to exploit HQL Injections.
<br>[https://github.com/PaulSec/HQLmap hqlmap] 35.081395eA tool to exploit HQL Injections.
+
<br>[https://github.com/Seabreg/htexploit htexploit] 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process.
<br>[http://www.mkit.com.ar/labs/htexploit/ htexploit] 0.77A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process
+
<br>[https://github.com/huayra/htrosbif htrosbif] Active HTTP server fingerprinting and recon tool.
<br>[https://github.com/lkarsten/htrosbif htrosbif] 134.9dc3f86 Active HTTP server fingerprinting and recon tool.
+
<br>[https://github.com/wireghoul/htshells htshells] Self contained web shells and other attacks via .htaccess files.
<br>[https://github.com/wireghoul/htshells htshells] 760b5e9 Self contained web shells and other attacks via .htaccess files.
+
<br>[https://www.thexero.co.uk/tools/automated-http-enumeration http-enum] 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver. Gone.
<br>[https://www.thexero.co.uk/tools/http-enum/ http-enum] 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver.
+
<br>[https://github.com/JonCooperWorks/httpfuzz httpfuzz] A fast HTTP fuzzer written in Go inspired by Burp Intruder.
<br>[ http-fuzz ] 0.1 A simple http fuzzer.
+
<br>[https://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html http-traceroute] 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.
<br>[ http-put ] 1.0 Simple http put perl script
+
<br>[https://sourceforge.net/projects/httpbog/ httpbog] 1.0.0.0 A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.
<br>[http://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html http-traceroute] 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.
+
<br>[https://packetstormsecurity.com/files/98109/HTTPForge.02.01.html httpforge] 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.
<br>[http://sourceforge.net/projects/httpbog/ httpbog] 1.0.0.0 A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.
+
<br>[http://www.vanheusden.com/httping/ httping] 3.6 A 'ping'-like tool for http-requests.
<br>[http://packetstormsecurity.com/files/98109/HTTPForge.02.01.html httpforge] 11.02.01A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.
 
<br>[http://www.vanheusden.com/httping/ httping] 2.3.4 A 'ping'-like tool for http-requests.
 
 
<br>[http://www.net-square.com/httprint.html httprint] 301 A web server fingerprinting tool.
 
<br>[http://www.net-square.com/httprint.html httprint] 301 A web server fingerprinting tool.
<br>[http://net-square.com/httprint httprint-win32] 301 A web server fingerprinting tool (Windows binaries).
+
<br>[https://dumpsterventures.com/jason/httpry/ httpry] 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic.
<br>[http://dumpsterventures.com/jason/httpry/ httpry] 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic.
+
<br>[https://www.sump.org/projects/httpsniff/ httpsniff] 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.
<br>[http://www.sump.org/projects/httpsniff/ httpsniff] 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.
+
<br>[https://github.com/gdwnet/https-scanner httpsscanner] 1.2 A tool to test the strength of a SSL web server.
<br>[https://code.google.com/p/libre-tools/ httpsscanner] 1.2 A tool to test the strength of a SSL web server.
+
<br>[https://www.nocrew.org/software/httptunnel httptunnel] 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests
<br>[http://www.nocrew.org/software/httptunnel httptunnel] 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests
+
<br>[https://github.com/grafov/hulk hulk] A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.
<br>[https://github.com/grafov/hulk hulk] 11.a9b9ad4A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.
+
<br>[https://nullsecurity.net/tools/wireless.html hwk] 0.4 An easy-to-use wireless authentication and deauthentication tool.
<br>[http://www.nullsecurity.net/ hwk] 0.4 Collection of packet crafting and wireless network flooding tools
+
<br>[https://github.com/vanhauser-thc/thc-hydra hydra] 9.5 A very fast network logon cracker which support many different services.
<br>[http://www.thc.org/thc-hydra/ hydra] 8.1 A very fast network logon cracker which support many different services.
+
<br>[https://github.com/r-richter/hyenae-ng/ hyenae-ng] 0.10 Flexible platform independent packet generator.
<br>[http://sourceforge.net/projects/hyenae/ hyenae] 0.36_1flexible platform independent packet generator
+
<br>[https://hyperfox.org/ hyperfox] 2.0.0 A security tool for proxying and recording HTTP and HTTPs traffic.
<br>[https://hyperfox.org/ hyperfox] 45.79ffeb5A security tool for proxying and recording HTTP and HTTPs traffic.
+
<br>[https://nullsecurity.net/tools/binary.html hyperion] 2.3.1 A runtime encrypter for 32-bit portable executables.
<br>[http://nullsecurity.net/tools/binary.html hyperion] 1.2 A runtime encrypter for 32-bit portable executables.
+
<br>
<br>[http://www.hackingexposedvoip.com/ iaxflood] 0.1 IAX flooder.
+
[https://github.com/Seabreg/iaxflood/ iaxflood] 0.1 IAX flooder.
<br>[http://code.google.com/p/iaxscan/ iaxscan] 0.02A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.
+
<br>[https://code.google.com/p/iaxscan/ iaxscan] 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. A lewd link on the page.
<br>[https://github.com/hackappcom/ibrute/ ibrute] 12.3a6a11eAn AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.
+
<br>[https://github.com/hackappcom/ibrute/ ibrute] An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.
<br>[http://www.angio.net/security/ icmpquery] 1.0 Send and receive ICMP queries for address mask and current time.
+
<br>[https://www.angio.net/security/ icmpquery] 1.0.3 Send and receive ICMP queries for address mask and current time.
<br>[http://thomer.com/icmptx/ icmptx] 0.01IP over ICMP
+
<br>[http://thomer.com/icmptx/ icmptx] 0.01 IP over ICMP.
<br>[http://www.hsc.fr/ressources/outils/idswakeup/index.html.en idswakeup] 1.0 A collection of tools that allows to test network intrusion detection systems.
+
<br>[https://github.com/SavSanta/idswakeup idswakeup] 1.0 A collection of tools that allows to test network intrusion detection systems (a SNORT IDS rules tester).
<br>[http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html iheartxor] 0.01iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
+
<br>[https://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html iheartxor] 0.01 A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
<br>[http://www.open-labs.org/ iisbruteforcer] 15HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server.
+
<br>[https://github.com/0xRTH/IISRecon IISRecon] This is bruteforce tool that fetch all IIS shortname thanks to SNS by Sw33tLie and try to bruteforce each one of them with a given wordlist.
<br>[http://www.nta-monitor.com/tools/ike-scan/ ike-scan] 1.9 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers
+
<br>[https://github.com/royhills/ike-scan ike-scan] 2022-10-02 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers.
<br>[http://sourceforge.net/projects/ikecrack/ ikecrack] 1.00An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication
+
<br>[https://sourceforge.net/projects/ikecrack/ ikecrack] 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication.
<br>[http://www.ernw.de/download/ikeprobe.zip ikeprobe] 0.1 Determine vulnerabilities in the PSK implementation of the VPN server.
+
<br>[https://github.com/greenbone/ospd-ikeprobe ikeprobe] 1.0b1 Determine vulnerabilities in the PSK implementation of the VPN server.
<br>[http://ikecrack.sourceforge.net/ ikeprober] 1.12Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors
+
<br>[http://ikecrack.sourceforge.net/ IKECrack] 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifying vendors.
<br>[http://chdir.org/~nico/ilty/ ilty] 1.0 An interception phone system for VoIP network.
+
<br>[https://chdir.org/~nico/ilty/ ilty] 1.0 An interception phone system for VoIP network.
<br>[https://github.com/jklmnn/imagejs imagejs] 48.1faf262Small tool to package javascript into a valid image file.
+
<br>[https://github.com/jklmnn/imagejs imagejs] 0.4.1 A small tool to package javascript into a valid image file.
<br>[http://www.breaknenter.org/projects/inception/ inception] 418.48b6072 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.
+
<br>[https://github.com/carmaa/inception inception] 0.4.2 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. Check pcileech too.
<br>[http://www.williballenthin.com/forensics/mft/indxparse/ indxparse] 162.83dae16 A Tool suite for inspecting NTFS artifacts.
+
<br>[https://github.com/williballenthin/INDXParse indxparse] 1.3.1 A Tool suite for inspecting NTFS artifacts.
<br>[http://www.inetsim.org inetsim] 1.2.5 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
+
<br>[https://www.inetsim.org inetsim] 1.3.2 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
<br>[http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html infip] 0.1 A python script that checks output from netstat against RBLs from Spamhaus.
+
<br>[https://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html infip] 0.1 A python script that checks output from netstat against RBLs from Spamhaus.
<br>[http://inguma.sourceforge.net inguma] 0.1.1 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
+
<br>[https://inguma.sourceforge.net inguma] 0.1.0 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
<br>[http://intercepter.nerf.ru/#down intercepter-ng] 0.9.8 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.
+
<br>[http://sniff.su intercepter-ng] 1.3 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.
 
<br>[https://github.com/carmaa/interrogate interrogate] 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
 
<br>[https://github.com/carmaa/interrogate interrogate] 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
<br>[https://github.com/ohdae/Intersect.5 intersect] 2.5 Post-exploitation framework
+
<br>[https://github.com/deadbits/Intersect-2.5 intersect] 2.5 Post-exploitation framework. Archived. There are several other such tools.
<br>[http://intrace.googlecode.com intrace] 1.5 Traceroute-like application piggybacking on existing TCP connections
+
<br>[https://github.com/robertswiecki/intrace intrace] 1.6 Traceroute-like application piggybacking on existing TCP connections.
<br>[http://inundator.sourceforge.net/ inundator] 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
+
<br>[https://inundator.sourceforge.net/ inundator] 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
<br>[https://code.google.com/p/inurlbr/ inurlbr] 13.66de321Advanced search in the search engines - Inurl scanner, dorker, exploiter.
+
<br>[https://github.com/googleinurl/SCANNER-INURLBR inurlbr]
<br>[https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635 inviteflood] 2.0 Flood a device with INVITE requests
+
Advanced search in the search engines - Inurl scanner, dorker, exploiter.
<br>[http://code.kryo.se/iodine iodine] 0.7.0 Tunnel IPv4 data through a DNS server
+
<br>[https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635 inviteflood] 2.0 Flood a device with INVITE requests.
<br>[https://github.com/Flo354/iOSForensic iosforensic] 1.0 iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic
+
<br>[https://code.kryo.se/iodine iodine] 0.8.0 Tunnel IPv4 data through a DNS server.
<br>[https://github.com/takeshixx/ip-https-tools ip-https-tools] 5.b22e2b3 Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.
+
<br>[https://github.com/Flo354/iOSForensic iosforensic] 1.0 iOS forensic tool.  
<br>[http://ipaudit.sourceforge.net ipaudit] 1.0rc9Monitors network activity on a network.  
+
<br>[https://github.com/takeshixx/ip-https-tools ip-https-tools] Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.
<br>[http://www.ipbackupanalyzer.com/ ipba2] 032013IOS Backup Analyzer
+
<br>[http://ipaudit.sourceforge.net ipaudit] 1.1 Monitors network activity on a network.  
<br>[http://www.loicp.eu/ipdecap#dependances ipdecap] 69.f3a08f6Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.
+
<br>[http://www.ipbackupanalyzer.com/ ipba2] 032013 IOS Backup Analyzer
<br>[http://www.crypticbit.com/zen/products/iphoneanalyzer iphoneanalyzer] 2.1.0 Allows you to forensically examine or recover date from in iOS device.
+
<br>[https://github.com/lpefferkorn/ipdecap ipdecap] 0.7.2 Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.
<br>[http://www.angryziber.com/ ipscan] 3.3.2 Angry IP scanner is a very fast IP address and port scanner.
+
<br>[https://github.com/foreni-packages/iphoneanalyzer iphoneanalyzer] 2.1.0 Allows you to forensically examine or recover date from in iOS device.
<br>[http://www.skbuff.net/iputils/ iputils] 20121221Network monitoring tools, including ping
+
<br>[https://www.angryziber.com/ ipscan] 3.9.1 Angry IP scanner is a very fast IP address and port scanner.
<br>[http://www.si6networks.com/tools/ipv6toolkit/ ipv6toolkit] 2.0beta SI6 Networks' IPv6 Toolkit
+
<br>[http://www.skbuff.net/iputils/ iputils] 20151218 Network monitoring tools, including ping.
<br>[https://github.com/bwall/ircsnapshot ircsnapshot] 93.9ba3c6cTool to gather information from IRC servers.
+
<br>[https://www.si6networks.com/tools/ipv6toolkit/ ipv6toolkit] 2.2 SI6 Networks' IPv6 Toolkit.
<br>[http://phenoelit-us.org/irpas irpas] 0.10Internetwork Routing Protocol Attack Suite.
+
<br>[https://github.com/mb1689/ircsnapshot ircsnapshot] Tool to gather information from IRC servers.
<br>[http://www.infobyte.com.ar/ isr-form] 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.
+
<br>[https://gitlab.com/kalilinux/packages/irpas irpas] 0.10 Internetwork Routing Protocol Attack Suite.
<br>[http://www.varaneckas.com/jad jad] 1.5.8eJava decompiler  
+
<br>[https://www.infobyte.com.ar/ isr-form] 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. Gone.
<br>[https://github.com/skylot/jadx jadx] 0.5.4 Dex to Java command line and GUI decompiler tool that produces Java source code from Android Dex and APK files.
+
<br>[https://www.varaneckas.com/jad jad] 1.5.8e Java decompiler.
<br>[https://code.google.com/p/javasnoop/ javasnoop] 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer
+
<br>[https://github.com/skylot/jadx jadx] 1.5.0 Dex to Java command line and GUI decompiler tool that produces Java source code from Android Dex and APK files.
<br>[https://github.com/SpiderLabs/jboss-autopwn jboss-autopwn] 1.3bc2d29 A JBoss script for obtaining remote shell access.
+
<br>[https://code.google.com/p/javasnoop/ javasnoop] 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer.
<br>[http://sourceforge.net/projects/jbrofuzz/ jbrofuzz] 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing.
+
<br>[https://github.com/SpiderLabs/jboss-autopwn jboss-autopwn] A JBoss script for obtaining remote shell access.
<br>[http://sourceforge.net/projects/jbrute/ jbrute] 0.99Open Source Security tool to audit hashed passwords.
+
<br>[https://sourceforge.net/projects/jbrofuzz/ jbrofuzz] 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing.
<br>[http://java.decompiler.free.fr/?q=jdgui jd-gui] 0.3.5 A standalone graphical utility that displays Java source codes of .class files
+
<br>[https://sourceforge.net/projects/jbrute/ jbrute] 0.99 Open Source Security tool to audit hashed passwords.
<br>[http://www.sentex.net/~mwandel/jhead/ jhead] 2.97EXIF JPEG info parser and thumbnail remover  
+
<br>[https://github.com/java-decompiler/jd-gui jd-gui] 1.6.6 A standalone graphical utility that displays Java source codes of .class files.
<br>[https://github.com/pentestgeek/jigsaw jigsaw] 1.3 A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing.
+
<br>[https://www.sentex.net/~mwandel/jhead/ jhead] 3.04 EXIF JPEG info parser and thumbnail remover.
<br>[http://www.rakudave.ch/jnetmap/?file=introduction jnetmap] 0.5.3 A network monitor of sorts
+
<br>[https://github.com/kurobeats/jigsaw jigsaw] 1.5.3 A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing.
<br>[http://www.openwall.com/john/ john] 1.7.9 John The Ripper - A fast password cracker (jumbo included)
+
<br>[https://www.rakudave.ch/jnetmap/?file=introduction jnetmap] 0.5.5 A network monitor of sorts. You can draw a graphical representation of your network, and jNetMap will periodically check if the devices are still up or a service is still running. You can also set up E-mail notifications or let jNetMap execute a script when a device goes down or comes up again.
<br>[http://openwall.info/wiki/john/johnny johnny] 20120424GUI for John the Ripper.
+
<br>[https://www.openwall.com/john/ john] 1.9.0 John The Ripper - A fast password cracker (jumbo included).
<br>[http://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html jomplug] 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.
+
<br>[http://openwall.info/wiki/john/johnny johnny] 2.2 GUI for John the Ripper.
<br>[http://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html joomlascan] 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files.
+
<br>[https://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html jomplug] 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.
<br>[http://joomscan.sourceforge.net/ joomscan] 2012.03.10Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
+
<br>[https://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html joomlascan] 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files.
<br>[https://github.com/einars/js-beautify js-beautify] 1.5.4 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.
+
<br>[https://joomscan.sourceforge.net/ joomscan] 2012.03.10 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
 +
<br>[https://github.com/einars/js-beautify js-beautify] 1.15.1 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward's popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.
 
<br>[https://code.google.com/p/jsql-injection/ jsql] 0.6 A lightweight application used to find database information from a distant server.
 
<br>[https://code.google.com/p/jsql-injection/ jsql] 0.6 A lightweight application used to find database information from a distant server.
<br>[https://github.com/securactive/junkie junkie] 1338.baa4524A modular packet sniffer and analyzer.
+
<br>[https://github.com/rixed/junkie junkie] 2.8.1 A modular packet sniffer and analyzer.
<br>[https://github.com/katjahahn/JWScan jwscan] 6.b0306f0 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.
+
<br>[https://github.com/katjahahn/JWScan jwscan] 0.2.1 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.
<br>[http://www.blackhatlibrary.net/Jynx2 jynx2] 2.0 An expansion of the original Jynx LD_PRELOAD rootkit
+
<br>[https://github.com/chokepoint/Jynx2 jynx2] 2.0 An expansion of the original Jynx LD_PRELOAD rootkit.
<br>[https://github.com/steve-m/kalibrate-rtl kalibrate-rtl] 11.aae11c8Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices.
+
<br>[https://github.com/steve-m/kalibrate-rtl kalibrate-rtl]
 +
0.4.1 Fork of thre.at/kalibrate/ for use with rtl-sdr devices.
 
<br>[http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html katsnoop] 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.
 
<br>[http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html katsnoop] 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.
<br>[https://github.com/samratashok/Kautilya/releases kautilya] 0.5.5 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.
+
<br>[https://github.com/samratashok/Kautilya kautilya] 0.5.5 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.
<br>[http://code.google.com/p/keimpx/ keimpx] 163.2df1eb2 Tool to verify the usefulness of credentials across a network over SMB.
+
<br>[https://code.google.com/p/keimpx/ keimpx] 0.2 Tool to verify the usefulness of credentials across a network over SMB.
<br>[http://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html khc] 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.
+
<br>[https://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html khc] 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.
<br>[https://code.google.com/p/killerbee/ killerbee] 85Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
+
<br>[https://github.com/riverloopsec/killerbee killerbee] 3.0.0b2 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
<br>[https://github.com/desaster/kippo kippo] 0.9 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.
+
<br>[https://github.com/desaster/kippo kippo] 0.9 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. Firked into Cowrie.
<br>[http://www.kismetwireless.net/ kismet] 2013_03_R1b 802.11 layer2 wireless network detector, sniffer, and intrusion detection system
+
<br>[https://www.kismetwireless.net/ kismet] 2023-07-R1 Kismet is a sniffer, WIDS, and wardriving tool for Wi-Fi, Bluetooth, Zigbee, RF, and more, which runs on Linux and macOS.
<br>[ kismet-earth ] 0.1 Various scripts to convert kismet logs to kml file to be used in Google Earth.
+
<br>[https://github.com/andreagrandi/kismeth2earth kismet2earth] A set of utilities that convert from Kismet logs to Google Earth .kml format.
<br>[http://code.google.com/p/kismet2earth/ kismet2earth] 1.0 A set of utilities that convert from Kismet logs to Google Earth .kml format
+
<br>[https://ntsecurity.nu/toolbox/klogger/ klogger] 1.0 A keystroke logger for the NT-series of Windows. Gone, but the page has many other tools.
<br>[http://ntsecurity.nu/toolbox/klogger/ klogger 1.0 A keystroke logger for the NT-series of Windows.
+
<br>[https://github.com/guelfoweb/knock knock] 7.0.1 Subdomain scanner.
<br>[https://github.com/guelfoweb/knock knock] 27.b1acf04Subdomain scanner.
+
<br>[http://www.blackhatlibrary.net/Kolkata kolkata] 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. Gone and named as an Indian city, so also buried in poo.
<br>[http://www.blackhatlibrary.net/Kolkata kolkata] 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.
+
<br>[https://opensource.srlabs.de/projects/a51-decrypt kraken] A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.
<br>[http://opensource.srlabs.de/projects/a51-decrypt kraken] 32.368a837A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.
+
<br>
<br>[https://github.com/takeshixx/laf laf] 12.7a456b3Login Area Finder: scans host/s for login panels.
+
[https://github.com/kovmir/l2flood l2flood] l2ping with threads to flood attack Bluetooth devices.
<br>[http://github.com/rflynn/lanmap2 lanmap2] 124.4f8afed Passive network mapping tool
+
<br>
<br>[https://github.com/DanMcInerney/LANs.py lans] 164.36797ad A Multithreaded asynchronous packet parsing/injecting arp spoofer.
+
[https://github.com/takeshixx/laf laf] Login Area Finder: scans host/s for login panels.
<br>[http://sourceforge.net/projects/linux-decnet/files/latd/1.31/ latd] 1.31A LAT terminal daemon for Linux and BSD.
+
<br>[https://github.com/rflynn/lanmap2 lanmap2] Passive network mapping tool.
<br>[http://laudanum.inguardians.com/# laudanum] 1.0 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
+
<br>[https://github.com/DanMcInerney/LANs.py lans] Inject code and spy on wifi users.
<br>[http://ge.mine.nu/code/lbd lbd] 20130719Load Balancing detector
+
<br>[https://sourceforge.net/projects/linux-decnet/ latd] 1.31 A LAT terminal daemon for Linux and BSD.
<br>[https://github.com/wireghoul/lbmap lbmap] 145.93e6b71 Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.
+
<br>[https://github.com/jbarcia/Web-Shells/tree/master/laudanum laudanum] 0.8 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
<br>[https://github.com/droope/ldap-brute ldap-brute] 21.acc06e3A semi fast tool to bruteforce values of LDAP injections over HTTP.
+
<br>[https://github.com/craig/ge.mine.nu/tree/master/lbd lbd] 0.1 Load Balancing detector.
<br>[https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/ ldapenum] 0.1 Enumerate domain controllers using LDAP.
+
<br>[https://github.com/wireghoul/lbmap lbmap] Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.
<br>[http://webpages.charter.net/edreamleo/front.html leo] 5.0 Literate programmer's editor, outliner, and project manager.
+
<br>[https://github.com/droope/ldap-brute ldap-brute] A semi fast tool to bruteforce values of LDAP injections over HTTP.
<br>[https://github.com/captainhooligan/Leroy-Jenkins leroy-jenkins] 0.r3.bdc3965A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
+
<br>[https://github.com/CroweCybersecurity/ad-ldap-enum ldap-enum] Enumerate domain controllers using LDAP.
<br>[https://github.com/galkan/levye levye] 84.5406303A brute force tool which is support sshkey, vnckey, rdp, openvpn.
+
<br>[https://github.com/leo-editor/leo-editor leo] 6.8.0 Literate programmer's editor, outliner, and project manager.
<br>[http://www.blackhatlibrary.net/Lfi_autopwn.pl lfi-autopwn] 3.0 A Perl script to try to gain code execution on a remote server via LFI
+
<br>[https://github.com/Seabreg/Leroy-Jenkins leroy-jenkins] A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
<br>[http://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html lfi-exploiter] 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..
+
<br>[https://github.com/arm13/levye levye] A brute force tool which is support sshkey, vnckey, rdp, openvpn.
<br>[http://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html lfi-fuzzploit] 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.
+
<br>[https://github.com/kostas-pa/LFITester LFITester] A Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
<br>[http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html lfi-scanner] 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target.
+
<br>[https://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html lfi-exploiter] 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..
<br>[http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html lfi-sploiter] 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.
+
<br>[https://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html lfi-fuzzploit] 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.
<br>[https://code.google.com/p/lfimap/ lfimap] 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver.
+
<br>[https://packetstormsecurity.com/files/102848/LFI-Scanner.0.html lfi-scanner] 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target.
<br>[http://pwhois.org/lft/ lft] 3.73A layer four traceroute implementing numerous other features.
+
<br>[https://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html lfi-sploiter] 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.
<br>[http://bastard.sourceforge.net/libdisasm.html libdisasm] 0.23A disassembler library.
+
<br>[https://code.google.com/p/lfimap/ lfimap] 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver.  
<br>[http://www.five-ten-sg.com/libpst/ libpst] 0.6.63Outlook .pst file converter
+
<br>[https://github.com/hansmach1ne/LFImap lfimap] Almost 1.0 Local File Inclusion discovery and exploitation tool.
<br>[https://github.com/rotlogix/liffy liffy] 63.238ce6dA Local File Inclusion Exploitation tool.
+
<br>[https://pwhois.org/lft/ lft] 3.91 A layer four traceroute implementing numerous other features.
<br>[https://github.com/rebootuser/LinEnum linenum] 18.b4c2541Scripted Local Linux Enumeration & Privilege Escalation Checks
+
<br>[https://bastard.sourceforge.net/libdisasm.html libdisasm] 0.23 A disassembler library.
<br>[https://github.com/vk496/linset linset] 9.8746b1f Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.
+
<br>[https://www.five-ten-sg.com/libpst/ libpst] 0.6.76 Outlook .pst file converter.
<br>[linux-exploit-suggester https://github.com/PenturaLabs/Linux_Exploit_Suggester] 32.9db2f5aA Perl script that tries to suggest exploits based OS version number.
+
<br>[https://github.com/mzfr/liffy liffy] 2.0 A Local File Inclusion Exploitation tool.
<br>[https://github.com/ant4g0nist/lisa.py lisa.py] 28.5b3156b An Exploit Dev Swiss Army Knife.
+
<br>[https://github.com/rebootuser/LinEnum linenum] 0.982 Scripted Local Linux Enumeration & Privilege Escalation Checks.
<br>[http://www.whoppix.net list-urls] 0.1 Extracts links from webpage
+
<br>[https://github.com/vk496/linset linset] 0.14 Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.
<br>[http://code.google.com/p/littleblackbox/wiki/FAQ littleblackbox] 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.
+
<br>[https://github.com/PenturaLabs/Linux_Exploit_Suggester linux-exploit-suggester] A Perl script that tries to suggest exploits based OS version number.
<br>[http://llvm.org/ lldb] 3.5.1 The LLDB Debugger.
+
<br>[https://github.com/ant4g0nist/lisa.py lisa.py] An Exploit Dev Swiss Army Knife.
<br>[http://www.cqure.net/wp/lodowep/ lodowep] 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
+
<br>[https://code.google.com/p/littleblackbox/wiki/FAQ littleblackbox] [https://github.com/devttys0/littleblackbox git] 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.
<br>[http://logkeys.googlecode.com/ logkeys] 0.1.1aSimple keylogger supporting also USB keyboards.
+
<br>[https://llvm.org/ lldb] 18.1.x The LLDB Debugger.
<br>[http://c0decafe.de/loki.html loki] 0.2.7 Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ lodowep] 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
<br>[http://802.11ninja.net/ lorcon] 2.0.0.20091101Generic library for injecting 802.11 frames
+
<br>[https://github.com/kernc/logkeys logkeys] 0.2.0 A GNU/Linux keylogger supporting also USB keyboards.
<br>[http://packetstormsecurity.com/files/55250/lotophagi.rar.html lotophagi] 0.1 a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.
+
<br>[https://c0decafe.de/loki.html loki] 0.2.7 Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols.
<br>[http://www.synacklabs.net/projects/lsrtunnel/ lsrtunnel] 0.2 lsrtunnel spoofs connections using source routed packets.
+
<br>[https://github.com/kismetwireless/lorcon lorcon] Generic library for injecting 802.11 frames.
<br>[https://github.com/Evrytania/LTE-Cell-Scanner lte-cell-scanner] 57.5fa3df8LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).
+
<br>[https://packetstormsecurity.com/files/55250/lotophagi.rar.html lotophagi] 0.1 A relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.
<br>[http://www.johannes-bauer.com/linux/luksipc luksipc] 0.01A tool to convert unencrypted block devices to encrypted LUKS devices in-place.
+
<br>[https://www.synacklabs.net/projects/lsrtunnel/ lsrtunnel] 0.2 lsrtunnel spoofs connections using source routed packets. Gone.
<br>[https://github.com/deathmarine/Luyten luyten] 0.4.4 An Open Source Java Decompiler Gui for Procyon.
+
<br>[https://github.com/Evrytania/LTE-Cell-Scanner lte-cell-scanner] LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).
<br>[http://www.rootkit.nl/projects/lynis.html lynis] 1.6.4 An auditing tool for Unix (specialists).
+
<br>[https://www.johannes-bauer.com/linux/luksipc luksipc] 0.04 A tool to convert unencrypted block devices to encrypted LUKS devices in-place.
<br>[http://www.sleuthkit.org/mac-robber/download.php mac-robber] 1.02A digital investigation tool that collects data from allocated files in a mounted file system.
+
<br>[https://github.com/Boran/lusas lusas] Linux/Unix Security Auditing Scripts.
<br>[http://ftp.gnu.org/gnu/macchanger macchanger] 1.6.0 A small utility to change your NIC's MAC address
+
<br>[https://github.com/deathmarine/Luyten luyten] 0.5.4 An Open Source Java Decompiler Gui for Procyon.
<br>[https://github.com/paraxor/maclookup maclookup] 0.3 Lookup MAC addresses in the IEEE MA-L/OUI public listing.
+
<br>[https://github.com/CISOfy/lynis lynis] 3.1.1 Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
<br>[http://freshmeat.net/projects/magicrescue/ magicrescue] 1.1.9 Find and recover deleted files on block devices
+
<br>[https://www.sleuthkit.org/mac-robber/download.php mac-robber] 1.02 A digital investigation tool that collects data from allocated files in a mounted file system.
<br>[http://www.gremwell.com magictree] 1.3 A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation
+
<br>[https://ftp.gnu.org/gnu/macchanger macchanger] 1.6.0 A small utility to change your NIC's MAC address.
<br>[http://blog.didierstevens.com/programs/pdf-tools/ make-pdf] 0.1.5 This tool will embed javascript inside a PDF document.
+
<br>[https://gist.github.com/syhe maclookup] 0.3 Lookup MAC addresses in the IEEE MA-L/OUI public listing.
<br>[http://packages.qa.debian.org/m/makepasswd.html makepasswd] 1.10_9Generates true random passwords with the emphasis on security over pronounceability (Debian version)
+
<br>[https://github.com/jbj/magicrescue magicrescue] 1.1.10 Find and recover deleted files on block devices. Deprecated by the author.
 +
<br>[https://www.gremwell.com/what_is_magictree magictree] A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation.
 +
<br>[https://blog.didierstevens.com/programs/pdf-tools/ make-pdf] 0.1.7 This tool will embed javascript inside a PDF document.
 +
<br>[https://packages.qa.debian.org/m/makepasswd.html makepasswd] 1.10_14 Generates true random passwords with the emphasis on security over pronounceability (Debian version).
 
<br>[http://www.mlsec.org/malheur/ malheur] 0.5.4 A tool for the automatic analyze of malware behavior.  
 
<br>[http://www.mlsec.org/malheur/ malheur] 0.5.4 A tool for the automatic analyze of malware behavior.  
<br>[http://www.encripto.no/tools/ maligno] 1.5 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS.
+
<br>[http://www.encripto.no/tools/ maligno] 2.5 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. Now part of the Blue Team Training Toolkit (same page).
<br>[http://sourceforge.net/projects/malmon/ malmon] 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.
+
<br>[https://sourceforge.net/projects/malmon/ malmon] 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.
<br>[http://www.paterva.com/web5 maltego] 3.5.3 An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
+
<br>[https://www.maltego.com maltego] 4.7.0 An open source intelligence (OSINT, not FOS) and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.  
<br>[https://github.com/technoskald/maltrieve maltrieve] 175.8c68c7e Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.
+
<br>[https://github.com/technoskald/maltrieve maltrieve] Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.
<br>malware-check-tool 1.2 Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.
+
<br>[https://github.com/4n6Engineer/MalwareChecker MalwareChecker] 1.5 Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.
<br>[http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html malwareanalyser] 3.3 A freeware tool to perform static and dynamic analysis on malware.http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html
+
<br>[https://github.com/topics/malware-analyzer malware-analyzer] A git topic on malware analysis.
<br>[http://www.virustotal.com malwaredetect] 0.1 Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware
+
<br>[https://github.com/malwarelu/malwasm malwasm] 0.1.1 Offline debugger for malware's reverse engineering.
<br>[https://code.google.com/p/malwasm/ malwasm] 0.2 Offline debugger for malware's reverse engineering.
+
<br>[https://eternal-todo.com/tools/malybuzz-network-fuzzer malybuzz] 1.0b A Python tool focused in discovering programming faults in network software.
<br>[http://eternal-todo.com/tools/malybuzz-network-fuzzer malybuzz] 1.0 A Python tool focused in discovering programming faults in network software.
+
<br>[https://github.com/ApertureLabsLtd/marc4dasm marc4dasm] This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).
<br>[https://github.com/ApertureLabsLtd/marc4dasm marc4dasm] 6.f11860f This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).
+
<br>[https://hashcat.net/wiki/doku.php?id=maskprocessor maskprocessor] 0.73 A High-Performance word generator with a per-position configurable charset.
<br>[http://hashcat.net/wiki/doku.php?id=maskprocessor maskprocessor] 0.72A High-Performance word generator with a per-position configurable charset.
+
<br>[https://github.com/robertdavidgraham/masscan masscan] 1.3.2 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
<br>[https://github.com/robertdavidgraham/masscan masscan] 391.a60cc70 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
+
<br>[https://0xacab.org/jvoisin/mat2 mat] 0.13.4 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
<br>[https://mat.boum.org/ mat] 0.5.2 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
+
<br>[https://matahari.sourceforge.net matahari] 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls.
<br>[http://matahari.sourceforge.net matahari] 0.1.30A reverse HTTP shell to execute commands on remote machines behind firewalls.
+
<br>[https://github.com/uweber/mausezahn mausezahn] 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. Now part of netsniff-ng.
<br>[http://www.perihel.at/sec/mz/ mausezahn] 0.40A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
+
<br>[https://gitlab.com/kalilinux/packages/windows-binaries/-/tree/kali/master/mbenum mbenum] Queries the master browser for whatever information it has registered.
<br>[http://www.cqure.net/wp/mbenum/ mbenum] 1.5.0 Queries the master browser for whatever information it has registered.
+
<br>[https://git.datatipp.se/dspiljar/mboxgrep mboxgrep] 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
<br>[http://mboxgrep.sourceforge.net mboxgrep] 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
+
<br>[https://md5deep.sourceforge.net md5deep] 4.4 Advanced checksum hashing tool.
<br>[http://md5deep.sourceforge.net md5deep] 4.3 Advanced checksum hashing tool
+
<br>[https://github.com/mdbtools/mdbtools mdbtools] 1.0.0 Utilities for viewing data and exporting schema from Microsoft Access Database files.
<br>[http://sourceforge.net/projects/mdbtools/ mdbtools] 0.7.1 Utilities for viewing data and exporting schema from Microsoft Access Database files
+
<br>[https://github.com/Seabreg/MDCrack mdcrack] 1.8.3 MD4/MD5/NTLM1 hash cracker.
<br>[http://c3rb3r.openwall.net/mdcrack/ mdcrack] 1.2 MD4/MD5/NTLM1 hash cracker
+
<br>[https://github.com/aircrack-ng/mdk4 mdk4] WLAN penetration tool.
<br>[http://homepages.tu-darmstadt.de/~p_larbig/wlan/ mdk] 36 WLAN penetration tool
+
<br>[https://github.com/alteholz/mdns-scan mdns-scan] 0.5 Scan mDNS/DNS-SD published services on the local network.
<br>[ mdns-scan ] 0.5 Scan mDNS/DNS-SD published services on the local network.
+
<br>[https://www.foofus.net/jmk/medusa/medusa.html medusa] 2.2 A speedy, massively parallel, modular, login brute-forcer for network.
<br>[http://www.foofus.net/jmk/medusa/medusa.html medusa] 2.1.1 A speedy, massively parallel, modular, login brute-forcer for network.
+
<br>[https://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html melkor] 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).
<br>[http://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html melkor] 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).
+
<br>[https://www.porcupine.org/forensics/tct.html memdump] 1.19 The Coroner's Toolkit. Dumps system memory to stdout, skipping over holes in memory maps. Predecessor to Sleuthkit.
<br>[http://www.porcupine.org/forensics/tct.html memdump] 1.01Dumps system memory to stdout, skipping over holes in memory maps.
+
<br>[https://github.com/citypw/lcamtuf-memfetch memfetch] 0.05b Dumps any userspace process memory without affecting its execution.
<br>[http://lcamtuf.coredump.cx/ memfetch] 0.05b dumps any userspace process memory without affecting its execution
+
<br>[https://metacoretex.sourceforge.net/ metacoretex] 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
<br>[http://metacoretex.sourceforge.net/ metacoretex] 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
+
<br>[https://code.google.com/archive/p/metagoofil/ metagoofil] 1.4b An information gathering tool designed for extracting metadata of public documents.
<br>[http://www.edge-security.com/metagoofil.php metagoofil] 1.4bAn information gathering tool designed for extracting metadata of public documents
+
<br>[https://www.metasploit.com metasploit] An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.
<br>[http://www.metasploit.com metasploit] 30949.ce688f4 An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.
+
<br>[https://github.com/trustedsec/meterssh meterssh] A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.
<br>[https://github.com/trustedsec/meterssh meterssh] 10.ebb6f4eA way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.
+
<br>[https://www.open-labs.org/ metoscan] Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. Gone.
<br>[http://www.open-labs.org/ metoscan] 05 Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.
+
<br>[https://code.google.com/p/mfcuk/ mfcuk] 0.3.8 MIFARE Classic Universal toolKit.
<br>[http://code.google.com/p/mfcuk/ mfcuk] 0.3.8 MIFARE Classic Universal toolKit
+
<br>[https://github.com/nfc-tools/mfoc mfoc] 0.10.7 Mifare Classic Offline Cracker.
<br>[http://code.google.com/p/mfoc/ mfoc] 0.10.7Mifare Classic Offline Cracker
+
<br>[https://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html mfsniffer] 0.1 A python script for capturing unencrypted TSO login credentials.
<br>[http://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html mfsniffer] 0.1 A python script for capturing unencrypted TSO login credentials.
+
<br>[https://www.mibble.org/ mibble] 2.10.1 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
<br>[http://www.mibble.org/ mibble] 2.9.3 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
+
<br>[https://code.google.com/archive/p/middler/ middler] 1.0 A Man in the Middle tool to demonstrate protocol middling attacks.
<br>middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks.
+
<br>[https://github.com/kost/mikrotik-npk mikrotik-npk] Python tools for manipulating Mikrotik NPK format.
<br>[http://code.google.com/p/middler/ mikrotik-npk] 7.88d7e4b Python tools for manipulating Mikrotik NPK format.https://github.com/kost/mikrotik-npk
+
<br>[https://github.com/nullrndtx/blackarch-tools/tree/master/minimysqlator minimysqlator] A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
<br>[http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r minimysqlator] 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
+
<br>[https://code.google.com/p/miranda-upnp/ miranda-upnp] 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
<br>[http://code.google.com/p/miranda-upnp/ miranda-upnp] 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
+
<br>[https://github.com/multiSnow/miredo miredo] 1.3.0 Teredo client and server.
<br>miredo 1.2.6 Teredo client and server.
+
<br>[https://missidentify.sourceforge.net/ missidentify] 1.0 A program to find Win32 applications.
<br>[http://missidentify.sourceforge.net/ missidentify] 1.0 A program to find Win32 applications.
+
<br>[https://github.com/ArduPilot/MissionPlanner missionplanner] 1.3.81 A GroundControl Station for Ardupilot.
<br>[https://code.google.com/p/ardupilot-mega/wiki/Mission missionplanner] 1.2.55A GroundControl Station for Ardupilot.
+
<br>[https://github.com/xdavidhu/mitmAP/tree/master mitmAP] 2.0 A python program to create a fake AP and sniff data.
<br>[http://www.darkoperator.com/tools-and-scripts/ mitmap] 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.
+
<br>[https://github.com/husam212/MITMer mitmer] A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
<br>[https://github.com/husam212/MITMer mitmer] 22.b01c7feA man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
+
<br>[https://github.com/byt3bl33d3r/MITMf mitmf] 0.9.8 A Framework for Man-In-The-Middle attacks written in Python. Author suggests Bettercap.
<br>[https://github.com/byt3bl33d3r/MITMf mitmf] 186.3f6bbb8 A Framework for Man-In-The-Middle attacks written in Python.
+
<br>[https://mitmproxy.org/ mitmproxy] 10.3 SSL-capable man-in-the-middle HTTP proxy.
<br>[http://mitmproxy.org/ mitmproxy] 0.11.1SSL-capable man-in-the-middle HTTP proxy.
 
 
<br>[http://mkbrutusproject.github.io/MKBRUTUS/ mkbrutus] 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS.
 
<br>[http://mkbrutusproject.github.io/MKBRUTUS/ mkbrutus] 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS.
<br>[http://savannah.nongnu.org/projects/mobiusft mobiusft] 0.5.21An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.
+
<br>[https://msgpack.org/ msgpack] 0.5.8 MessagePack, a binary-based efficient data interchange format.
<br>[https://code.google.com/p/modscan/ modscan] 0.1 A new tool designed to map a SCADA MODBUS TCP based network.
+
<br>[https://github.com/Seabreg/mobiusft mobiusft] 1.9 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.
<br>[https://github.com/aol/moloch moloch] 0.9.2 An open source large scale IPv4 full PCAP capturing, indexing and database system.
+
<br>[https://github.com/moki-ics/moki moki] ICS/SCADA Tools.
<br>[http://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html monocle] 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
+
<br>[https://github.com/aol/moloch moloch] 5.2.0 An open source large scale IPv4 full PCAP capturing, indexing and database system. Now Arkime. Moloch, really? *cough*
<br>[http://www.morxploit.com/ morxbook] 1.0 A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.
+
<br>[https://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html monocle] 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
<br>[http://www.morxploit.com/morxbrute/ morxbrute] 1.01A customizable HTTP dictionary-based password cracking tool written in Perl  
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxbook] 1.0 A password cracking tool written in Perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.
<br>[http://www.morxploit.com/tools/ morxbtcrack] 1.0 Single Bitcoin private key cracking tool released.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxbrute] 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl.
<br>[http://www.morxploit.com/tools/ morxcoinpwn] 1.0 Mass Bitcoin private keys brute forcing/Take over tool released.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxbtcrack] 1.0 Single Bitcoin private key cracking tool released.
<br>[http://www.morxploit.com/morxcrack/ morxcrack] 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxcoinpwn] 1.0 Mass Bitcoin private keys brute forcing/Take over tool released.
<br>[http://www.morxploit.com/tools/ morxkeyfmt] 1.0 Read a private key from stdin and output formatted data values.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxcrack] 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.
<br>[http://www.morxploit.com/tools/ morxtraversal] 1.0 Path Traversal checking tool.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxkeyfmt] 1.0 Read a private key from stdin and output formatted data values.
<br>[http://www.morxploit.com/tools/ morxtunnel] 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ morxtraversal] 1.0 Path Traversal checking tool.
<br>[http://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html mp3nema] 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data.
+
<br>[https://www.morxploit.com/tools/ morxtunnel] 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool. Gone.
<br>[http://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html mptcp] 1.9.0 A tool for manipulation of raw packets that allows a large number of options.
+
<br>[https://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html mp3nema] 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data.
<br>[https://github.com/Neohapsis/mptcp-abuse mptcp-abuse] 6.b0eeb27 A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.
+
<br>[https://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html mptcp] 1.9.0 A tool for manipulation of raw packets that allows a large number of options.
<br>[http://ms-sys.sourceforge.net/ ms-sys] 2.5.0 A tool to write Win9x-.. master boot records (mbr) under linux - RTM!
+
<br>[https://github.com/Neohapsis/mptcp-abuse mptcp-abuse] A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.
<br>[http://www.cqure.net/wp/mssqlscan/ mssqlscan] 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers.
+
<br>[http://ms-sys.sourceforge.net/ ms-sys] 2.8.0 A tool to write Win9x-.. master boot records (mbr) under linux - RTM!
<br>[https://bitbucket.org/mrabault/msvpwn msvpwn] 65.328921bBypass Windows' authentication via binary patching.
+
<br>[https://archlinux.pkgs.org/rolling/archstrike-x86_64/mssqlscan-0.8.4-3-any.pkg.tar.xz.html mssqlscan] 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers.
<br>[http://www.bitwizard.nl/mtr/ mtr] 0.86Combines the functionality of traceroute and ping into one tool (CLI version)
+
<br>[https://bitbucket.org/mrabault/msvpwn msvpwn] Bypass Windows' authentication via binary patching.
<br>[http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html multiinjector] 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
+
<br>[https://www.bitwizard.nl/mtr/ mtr] Combines the functionality of traceroute and ping into one tool (CLI version).
<br>[http://sourceforge.net/projects/multimac/ multimac] 1.0.3 Multiple MACs on an adapter
+
<br>[https://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html multiinjector] 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
<br>[https://github.com/covertcodes/multitun multitun] 43.9804513Tunnel arbitrary traffic through an innocuous WebSocket.
+
<br>[https://sourceforge.net/projects/multimac/ multimac] 1.0.3 Multiple MACs on an adapter.
<br>[https://bitbucket.org/alone/mutator/ mutator] 51.164132dThis project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012
+
<br>[https://github.com/BlackArch/multitun multitun] 0.10 Tunnel arbitrary traffic through an innocuous WebSocket.
<br>[https://github.com/falcon-lnhg/mwebfp mwebfp] 16.a800b98 Mass Web Fingerprinter.
+
<br>[https://bitbucket.org/alone/mutator/src/master/ mutator] This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012
<br>[https://gist.github.com/esperlu/943776 mysql2sqlite] 14.e5b2c31 Converts a mysqldump file into a Sqlite 3 compatible file.
+
<br>[https://github.com/falcon-lnhg/mwebfp mwebfp] Mass Web Fingerprinter.
<br>[https://github.com/carmaa/nacker nacker] 23.b67bb39A tool to circumvent 802.1x Network Access Control on a wired LAN.
+
<br>[https://gist.github.com/esperlu/943776 mysql2sqlite] Converts a mysqldump file into a Sqlite 3 compatible file.
<br>[http://www.mcgrewsecurity.com/tools/nbnspoof/ nbnspoof] 1.0 NBNSpoof - NetBIOS Name Service Spoofer
+
<br>[https://github.com/carmaa/nacker nacker] A tool to circumvent 802.1x Network Access Control on a wired LAN.
<br>[http://reedarvin.thearvins.com/ nbtenum] 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.
+
<br>[https://github.com/nomex/nbnspoof nbnspoof] 1.0 NBNSpoof - NetBIOS Name Service Spoofer.
<br>[http://wiki.skullsecurity.org/Nbtool nbtool] 2.bf90c76 Some tools for NetBIOS and DNS investigation, attacks, and communication.
+
<br>[https://github.com/interference-security/kali-windows-binaries/blob/master/nbtenum/Source/nbtenum.pl nbtenum] 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.
<br>[http://www.inetcat.net/software/nbtscan.html nbtscan] 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information.
+
<br>[https://wiki.skullsecurity.org/index.php/Nbtool nbtool] 0.04 Some tools for NetBIOS and DNS investigation, attacks, and communication.
<br>[http://www.novell.com/ ncpfs] 2.2.6 Allows you to mount volumes of NetWare servers under Linux.
+
<br>[https://github.com/charlesroelli/nbtscan nbtscan] 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information.
<br>[http://nmap.org/ncrack/ ncrack] 0.4a A high-speed network authentication cracking tool
+
<br>[https://github.com/EnzephaloN/ncpfs_dkms ncpfs] Allows you to mount volumes of NetWare servers under Linux.
<br>[https://github.com/PherricOxide/Neighbor-Cache-Fingerprinter neighbor-cache-fingerprinter] 83.f1e596fAn ARP based Operating System version scanner.
+
<br>[https://nmap.org/ncrack/ ncrack] 0.7 A high-speed network authentication cracking tool. A predecessor to nmap.
<br>[http://nemesis.sourceforge.net/ nemesis] 1.4 command-line network packet crafting and injection utility
+
<br>[https://github.com/PherricOxide/Neighbor-Cache-Fingerprinter neighbor-cache-fingerprinter] An ARP based Operating System version scanner.
<br>[http://netactview.sourceforge.net/index.html netactview] 0.6.3 A graphical network connections viewer for Linux similar in functionality with Netstat
+
<br>[https://nemesis.sourceforge.net/ nemesis] 1.4 Command-line network packet crafting and injection utility.
<br>[http://www.secpoint.com/netbios-share-scanner.html netbios-share-scanner] 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources.
+
<br>[https://netactview.sourceforge.net/index.html netactview] 0.6.4 A graphical network connections viewer for Linux similar in functionality with Netstat.
<br>[https://github.com/evilsocket/netcommander netcommander] 1.3 An easy-to-use arp spoofing tool.
+
<br>[https://www.secpoint.com/netbios-share-scanner.html netbios-share-scanner] 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources.
<br>[http://www.paramecium.org/~leendert/ netcon] 0.1 A network connection establishment and management script.
+
<br>[https://github.com/meh/NetCommander netcommander] 1.2 An easy-to-use arp spoofing tool.
<br>[http://nixgeneration.com/~jaime/netdiscover/ netdiscover] 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
+
<br>[https://www.paramecium.org:4443/~leendert/ netcon] 0.1 A network connection establishment and management script. Gone, but the author's site is up and has other stuff. A Dutchman in... China?
<br>[http://netmap.sourceforge.net netmap] 0.1.3 Can be used to make a graphical representation of the surounding network.  
+
<br>[https://github.com/netdiscover-scanner/netdiscover netdiscover] 0.10 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
<br>[http://packages.qa.debian.org/n/netmask.html netmask] 2.3.12Helps determine network masks
+
<br>[https://sourceforge.net/projects/netmap/ netmap generator] 0.1.3 Can be used to make a graphical representation of the surrounding network.  
<br>[http://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html netreconn] 1.76A collection of network scan/recon tools that are relatively small compared to their larger cousins.
+
<br>[https://tracker.debian.org/pkg/netmask netmask] 2.4.4-4 Helps determine network masks.
<br>[http://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html netscan] 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).
+
<br>[https://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html netreconn] 1.76 A collection of network scan/recon tools that are relatively small compared to their larger cousins.
<br>[http://silicone.homelinux.org/projects/netsed/ netsed] 1.2 Small and handful utility design to alter the contents of packets forwarded thru network in real time.
+
<br>[https://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html netscan] 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).
<br>[http://netsniff-ng.org/ netsniff-ng] 0.5.9 A high performance Linux network sniffer for packet inspection.  
+
<br>[https://silicone.homelinux.org/projects/netsed/ netsed] 1.3 Small and handful utility design to alter the contents of packets forwarded thru network in real time.
<br>[https://github.com/PherricOxide/Network-App-Stress-Tester network-app-stress-tester] 19.df75391Network Application Stress Testing Yammer.
+
<br>[https://netsniff-ng.org/ netsniff-ng] 0.6.7 A high performance Linux network sniffer for packet inspection.  
<br>[http://www.netzob.org/ netzob] 0.4.1 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.
+
<br>[https://github.com/PherricOxide/Network-App-Stress-Tester network-app-stress-tester] Network Application Stress Testing Yammer.
<br>[http://code.google.com/p/nfc-tools nfcutils] 0.3.2 Provides a simple 'lsnfc' command that list tags which are in your NFC device field
+
<br>[https://github.com/netzob/netzob netzob] 2.0.0 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.
<br>[https://code.google.com/p/nfex/ nfex] 2.5 A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.
+
<br>[https://github.com/nfc-tools/ nfcutils] A collection of NFC tools.
 +
<br>[https://github.com/mschiffm/nfex nfex] A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.
 
<br>[https://github.com/bonsaiviking/NfSpy nfspy] 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share.
 
<br>[https://github.com/bonsaiviking/NfSpy nfspy] 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share.
<br>[http://www.paramecium.org/~leendert/ nfsshell] 19980519 Userland NFS command tool.
+
<br>[https://www.paramecium.org:4443/~leendert/projects.html nfsshell] Userland NFS command tool.
<br>[http://ngrep.sourceforge.net/ ngrep] 1.45A grep-like utility that allows you to search for network packets on an interface.
+
<br>[https://github.com/jpr5/ngrep/ ngrep] 1.47 A grep-like utility that allows you to search for network packets on an interface.
<br>[http://nield.sourceforge.net/ nield] 0.6.0 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.
+
<br>[https://github.com/t2mune/nield nield] 0.6.1 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.
<br>[http://www.cirt.net/nikto2 nikto] 2.1.5 A web server scanner which performs comprehensive tests against web servers for multiple items
+
<br>[https://www.cirt.net/nikto2 nikto] 2.5 A web server scanner which performs comprehensive tests against web servers for multiple items.
<br>[https://github.com/andresriancho/nimbostratus nimbostratus] 54.c7c206fTools for fingerprintinging and exploiting Amazon cloud infrastructures.
+
<br>[https://github.com/andresriancho/nimbostratus nimbostratus] Tools for fingerprinting and exploiting Amazon cloud infrastructures.
<br>[https://www.titania-security.com/ nipper] 0.11.7Network Infrastructure Parser
+
<br>[https://github.com/arpitn30/nipper-ng nipper-ng] 0.11.10 Network Infrastructure Parser.
<
+
<br
 
<br>[https://code.google.com/p/simple-ducky-payload-generator simple-ducky] 1.1.1 A payload generator.
 
<br>[https://code.google.com/p/simple-ducky-payload-generator simple-ducky] 1.1.1 A payload generator.
<br>[http://packetstormsecurity.com/files/97353/Simple-LAN-Scanner.0.html simple-lan-scan] 1.0 A simple python script that leverages scapy for discovering live hosts on a network.
+
<br>[https://packetstormsecurity.com/files/97353/Simple-LAN-Scanner.0.html simple-lan-scan] 1.0 A simple python script that leverages scapy for discovering live hosts on a network.
<br>[http://www.networecon.com/tools/sinfp/ sinfp] 1.22A full operating system stack fingerprinting suite.
+
<br>[https://github.com/cesarghali/OS-Fingerprinting sinfp] A full operating system stack fingerprinting suite.
<br>[http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt siparmyknife] 11232011 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
+
<br>[https://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt siparmyknife] 11232011 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
<br>[http://www.remote-exploit.org/codes_sipcrack.html sipcrack] 0.2 A SIP protocol login cracker.
+
<br>[https://github.com/miconda/sipexer sipexer] 1.1.0 Modern and flexible SIP/VoIP cli tool.
<br>[http://sipp.sourceforge.net/ sipp] 3.3 A free Open Source test tool / traffic generator for the SIP protocol.
+
<br>[https://github.com/rbagrov/SIPTools siptools] 0.2.8 Five SIP protocol tools: sipmap, sipwar, sipcrack, sipreport, sipcrash.
<br>[http://sipsak.org sipsak] 0.9.6 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
+
<br>[https://sipp.sourceforge.net/ sipp] 3.4 A free Open Source test tool / traffic generator for the SIP protocol.
<br>[http://www.hackingvoip.com/sec_tools.html sipscan] 0.1 A sip scanner.
+
<br>[https://github.com/nils-ohlmeier/sipsak sipsak] 0.9.8.1 SIP swiss army knife.
<br>[https://github.com/zaf/sipshock sipshock] 6.1d636ab A scanner for SIP proxies vulnerable to Shellshock.
+
<br>[https://github.com/Pepelux/sippts sippts] 4.0 Set of tools to audit SIP based VoIP Systems.
<br>[http://blog.sipvicious.org sipvicious] 0.2.8 Tools for auditing SIP devices
+
<br>[https://github.com/zaf/sipshock sipshock] A scanner for SIP proxies vulnerable to Shellshock.
<br>[http://code.google.com/p/skipfish/ skipfish] 2.10b A fully automated, active web application security reconnaissance tool
+
<br>[https://github.com/EnableSecurity/sipvicious sipvicious] 0.3.4 Tools for auditing SIP devices.
<br>[https://github.com/samyk/skyjack skyjack] 7.5f7a25e Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.
+
<br>[https://code.google.com/p/skipfish/ skipfish] 2.10b A fully automated, active web application security reconnaissance tool.
<br>[http://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html skype-dump] 0.1 This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.
+
<br>[https://github.com/samyk/skyjack skyjack] Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.
<br>[http://osandamalith.github.io/SkypeFreak/ skypefreak] 30.14a81cbA Cross Platform Forensic Framework for Skype.
+
<br>[https://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html skype-dump] 1.0 This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.
<br>[http://www.sleuthkit.org/sleuthkit sleuthkit] 4.1.3 File system and media management forensic analysis tools
+
<br>[https://osandamalith.github.io/SkypeFreak/ skypefreak] A Cross Platform Forensic Framework for Skype.
<br>[http://code.google.com/p/slowhttptest slowhttptest] 1.6 A highly configurable tool that simulates application layer denial of service attacks.
+
<br>[https://www.sleuthkit.org/sleuthkit sleuthkit] 4.12.1 File system and media management forensic analysis tools.
<br>[http://ha.ckers.org/slowloris/ slowloris] 0.7 A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver.
+
<br>[https://github.com/shekyan/slowhttptest slowhttptest] 1.9.0 A highly configurable tool that simulates application layer denial of service attacks.
<br>[http://code.google.com/p/smali/ smali] 2.0.5 An assembler/disassembler for Android's dex format.
+
<br>[https://github.com/topics/slowloris slowloris] A popular tool to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks.
<br>[https://github.com/georgiaw/Smartphone-Pentest-Framework smartphone-pentest-framework] 100.399e6ce Repository for the Smartphone Pentest Framework (SPF).
+
<br>[https://github.com/JesusFreke/smali smali] 2.5.2 An assembler/disassembler for Android's dex format.
<br>[http://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html smbbf] 0.9.1 SMB password bruteforcer.
+
<br>[https://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html smbbf] 0.9.1 SMB password bruteforcer.
<br>[https://github.com/pentestgeek/smbexec smbexec] 148.7827616 A rapid psexec style attack with samba tools.
+
<br>[https://github.com/search?q=smbexec&type=repositories smbexec] A rapid psexec style attack with samba tools. Several versions.
<br>[http://www.tarasco.org/security/smbrelay/ smbrelay] 3 SMB / HTTP to SMB replay attack toolkit.
+
<br>[https://github.com/Seabreg/smbrelay3 smbrelay3] SMB / HTTP to SMB replay attack toolkit.
<br>[ smtp-fuzz ] 1.0 Simple smtp fuzzer
+
<br>[https://github.com/hodor-sec/Fuzzing/blob/master/boofuzz/smtp/smtp_fuzzer.py smtp-fuzz] 1.0 Simple smtp fuzzer.
<br>[http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum smtp-user-enum] 1.2 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
+
<br>[https://github.com/cytopia/smtp-user-enum smtp-user-enum] 0.7.0 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
<br>[ smtp-vrfy ] 1.0 An SMTP Protocol Hacker.
+
<br>[https://github.com/robohack/vrfy smtp-vrfy] A tool to verify electronic mail addresses using SMTP.
<br>[http://www.projectiwear.org/~plasmahh/software.html smtpmap] 0.8.234_BETATool to identify the running smtp software on a given host.
+
<br>[https://www.projectiwear.org/~plasmahh/software.html smtpmap] 0.8.234_B Tool to identify the running smtp software on a given host. Replaced by nmap, but the author has some other thoughts and projects.  
<br>[http://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html smtpscan] 0.5 An SMTP scanner
+
<br>[https://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html smtpscan] 0.5 An SMTP scanner.
<br>[http://www.0x90.se/ smtptx] 1.0 A very simple tool used for sending simple email and do some basic email testing from a pentester perspective.
+
<br>[https://www.0x90.se/smtptx/ smtptx] 1.1b A very simple tool used for sending simple email and do some basic email testing from a pentester perspective. The site is there, but I can't find the download link.
<br>[http://www.nullsecurity.net/tools/automation.html sn00p] 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests.
+
<br>[https://www.nullsecurity.net/tools/automation.html sn00p] 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests. Seems like it is nullscan now?
<br>[https://github.com/thebradbain/snapception snapception] 8.c156f9e Intercept and decrypt all snapchats received over your network.
+
<br>[https://github.com/thebradbain/snapception snapception] Intercept and decrypt all snapchats received over your network.
<br>[http://www.delirandom.net/sniffjoke/ sniffjoke] 0.4.1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
+
<br>[https://github.com/vecna/sniffjoke sniffjoke] 0.4.1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
<br>[https://github.com/SECFORCE/SNMP-Brute snmp-brute] 11.180075bSNMP brute force, enumeration, CISCO config downloader and password cracking script.
+
<br>[https://github.com/SECFORCE/SNMP-Brute snmp-brute] SNMP brute force, enumeration, CISCO config downloader and password cracking script.
<br>[http://www.arhont.com/en/category/resources/tools-utilities/ snmp-fuzzer] 0.1.1 SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.  
+
<br>[https://packetstormsecurity.com/files/36775/snmp-fuzzer-0.1.1.tar.bz2.html snmp-fuzzer] 0.1.1 SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.  
<br>[http://www.c0decafe.de/ snmpattack] 1.8 SNMP scanner and attacking tool.
+
<br>[https://www.c0decafe.de/ snmpattack] SNMP scanner and attacking tool.
<br>[http://www.nothink.org/perl/snmpcheck/ snmpcheck] 1.8 A free open source utility to get information via SNMP protocols.
+
<br>[https://www.nothink.org/perl/snmpcheck/ snmpcheck] 1.9 A free open source utility to get information via SNMP protocols.
<br>[http://www.filip.waeytens.easynet.be/ snmpenum] 1.7 snmp enumerator
+
<br>[https://github.com/ajohnston9/snmpenum snmpenum] Snmp enumerator.
<br>[http://www.nothink.org/perl/snmpscan/index.php snmpscan] 0.1 A free, multi-processes SNMP scanner
+
<br>[https://www.nothink.org/codes/snmpscan/ snmpscan] A free, multi-processes SNMP scanner.
<br>[https://github.com/sensepost/snoopy-ng snoopy-ng] 93.e305420A distributed, sensor, data collection, interception, analysis, and visualization framework.
+
<br>[https://github.com/sensepost/snoopy-ng snoopy-ng] 2.0 A distributed, sensor, data collection, interception, analysis, and visualization framework.
<br>[http://www.snort.org snort] 2.9.7.0 A lightweight network intrusion detection system.
+
<br>[https://www.snort.org snort] 3.3.0.0 A lightweight network intrusion detection system.
<br>[http://darkside.com.au/snow/index.html snow] 20130616 Steganography program for concealing messages in text files.
+
<br>[https://darkside.com.au/snow/index.html snow] 20130616 Steganography program for concealing messages in text files.
<br>[http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx snscan] 1.05A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.
+
<br>[http://www.dest-unreach.org/socat/ socat] 1.8.0.0 Multipurpose relay.
<br>[http://www.dest-unreach.org/socat/ socat] 1.7.3.0 Multipurpose relay
+
<br>[https://packages.debian.org/unstable/main/sockstat sockstat] 0.4.1-1 A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.
<br>[https://packages.debian.org/unstable/main/sockstat sockstat] 0.3 A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.
+
<br>[https://www.sable.mcgill.ca/soot soot] 2.5.0 A Java Bytecode Analysis and Transformation Framework.
<br>[http://www.sable.mcgill.ca/soot soot] 2.5.0 A Java Bytecode Analysis and Transformation Framework.
+
<br>[http://www.hoobie.net/brutus/ spade] A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment. Gone.
<br>[http://www.hoobie.net/brutus/ spade] 114 A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.
+
<br>[https://github.com/SECFORCE/sparta sparta] 2.0 Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
<br>[http://sparta.secforce.com/ sparta] 15.e7bdf7bPython GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
+
<br>[https://github.com/MayankPandey01/Sparty-2.0 sparty] 2.0 An open source tool written in python to audit web applications using sharepoint and frontpage architecture.
<br>[http://sparty.secniche.org/ sparty] 0.1 An open source tool written in python to audit web applications using sharepoint and frontpage architecture.
+
<br>[https://github.com/caljorden/spectools spectools] Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware.
<br>[http://www.kismetwireless.net/spectools/ spectools] 2010_04_R1Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.
+
<br>[https://github.com/yorickpeterse/speedpwn speedpwn] An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.
<br>[https://gitorious.org/speedpwn/ speedpwn] 8.3dd2793 An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.
+
<br>[https://github.com/smicallef/spiderfoot spiderfoot] 4.0 The Open Source Footprinting Tool.
<br>[http://spiderfoot.net/ spiderfoot] 2.2.0 The Open Source Footprinting Tool.
+
<br>[https://code.google.com/p/spiderpig-pdffuzzer/ spiderpig-pdffuzzer] A javascript pdf fuzzer.
<br>[https://code.google.com/p/spiderpig-pdffuzzer/ spiderpig-pdffuzzer] 0.1 A javascript pdf fuzzer
+
<br>[https://github.com/getdual/scripts-n-tools/blob/master/spiga.py spiga] Configurable web resource scanner.
<br>[https://github.com/getdual/scripts-n-tools/blob/master/spiga.py spiga] 7240.3a804acConfigurable web resource scanner
+
<br>[https://github.com/guilhermeferreira/spikepp spike] 2.9 IMMUNITYsec's fuzzer creation kit in C.
<br>[http://www.immunitysec.com/resources-freesoftware.shtml spike] 2.9 IMMUNITYsec's fuzzer creation kit in C
+
<br>[https://spike-proxy.apponic.com spike-proxy] A proxy for detecting vulnerabilities in web applications.
<br>[http://www.immunitysec.com/resources-freesoftware.shtml spike-proxy] 148 A Proxy for detecting vulnerabilities in web applications
+
<br>[https://www.tarsnap.com/spiped.html spiped] 1.6.2 A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
<br>[https://www.tarsnap.com/spiped.html spiped] 1.4.2 A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
+
<br>[https://github.com/PaulSec/SPIPScan spipscan] SPIP (CMS) scanner for penetration testing purpose written in Python.
<br>[https://github.com/PaulSec/SPIPScan spipscan] 69.4ad3235SPIP (CMS) scanner for penetration testing purpose written in Python.
+
<br>[https://www.splint.org/ splint] 3.1.2 A tool for statically checking C programs for security vulnerabilities and coding mistakes.
<br>[http://www.splint.org/ splint] 3.1.2 A tool for statically checking C programs for security vulnerabilities and coding mistakes
+
<br>[https://github.com/BlackArch/sploitctl sploitctl] 3.0.4 Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
<br>[https://github.com/BlackArch/sploitctl sploitctl] 35.23a18caFetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
+
<br>[https://github.com/allfro/sploitego sploitego] Maltego Penetration Testing Transforms.
<br>[https://github.com/allfro/sploitego sploitego] 153.d9568dc Maltego Penetration Testing Transforms.
+
<br>[https://github.com/Telefonica/HomePWN spooftooph] Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight. Part of HomePWN.
<br>[http://www.hackfromacave.com/projects/spooftooph.html spooftooph] 0.5.2 Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight
+
<br>[https://sites.google.com/site/simplepacketsender/ sps] 5.0 A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.
<br>[https://sites.google.com/site/simplepacketsender/ sps] 4.2 A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.
+
<br>[https://github.com/Seabreg/sqid/blob/master/sqid.rb sqid] A SQL injection digger.
<br>[http://sqid.rubyforge.org/ sqid] 0.3 A SQL injection digger.
+
<br>
<br>[http://www.justinclarke.com/archives/2006/03/sqlbrute.html sqlbrute] 1.0 Brute forces data out of databases using blind SQL injection.
+
[https://github.com/muertet/SQLi-Digger sqli-digger]
<br>[http://sqlmap.sourceforge.net sqlmap] 6445.20c272bAn automatic SQL injection tool developed in Python.
+
Automatic SQL injection (sqli) developed in php. This SQL injector has graphical interface.
<br>[http://sqlninja.sourceforge.net/ sqlninja] 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end
+
<br>[https://www.justinclarke.com/archives/2006/03/sqlbrute.html sqlbrute] 1.0 Brute forces data out of databases using blind SQL injection.
<br>[http://www.cqure.net/wp/sqlpat/ sqlpat] 1.0.1 This tool should be used to audit the strength of Microsoft SQL Server passwords offline.
+
<br>[https://sqlmap.sourceforge.net sqlmap] 1.8 An automatic SQL injection tool developed in Python.
<br>[http://www.sqlsecurity.com/downloads sqlping] 4 SQL Server scanning tool that also checks for weak passwords using wordlists.
+
<br>[https://sqlninja.sourceforge.net/ sqlninja] 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end
<br>[http://sqlsus.sourceforge.net/ sqlsus] 0.7.2 An open source MySQL injection and takeover tool, written in perl
+
<br>[http://www.cqure.net/wp/sqlpat/ sqlpat] 1.0.1 This tool should be used to audit the strength of Microsoft SQL Server passwords offline. Gone.
<br>[http://packetstormsecurity.com/files/127994/SSDP-Amplification-Scanner.html ssdp-scanner] 1.0 SSDP amplification scanner written in Python. Makes use of Scapy.
+
<br>[https://www.sqlsecurity.com/downloads sqlping] SQL Server scanning tool that also checks for weak passwords using wordlists.
<br>[https://code.google.com/p/lusas/ ssh-privkey-crack] 0.3 A SSH private key cracker
+
<br>[https://sqlsus.sourceforge.net/ sqlsus] 0.7.2 An open source MySQL injection and takeover tool, written in perl.
<br>[https://github.com/nccgroup/ssh-user-enum ssh-user-enum] 5.3d83131 SSH User Enumeration Script in Python Using The Timing Attack.
+
<br>[https://packetstormsecurity.com/files/127994/SSDP-Amplification-Scanner.html ssdp-scanner] 1.0 SSDP amplification scanner written in Python. Makes use of Scapy.
<br>[http://www.nth-dimension.org.uk/downloads.php?id=34 sshatter] 1.2 Password bruteforcer for SSH
+
<br>[https://github.com/Boran/lusas ssh-privkey-crack] 0.3 A SSH private key cracker.
<br>[https://github.com/getdual/scripts-n-tools/blob/master/sshscan.py sshscan] 7401.3bfd4aeA horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.
+
<br>[https://github.com/nccgroup/ssh_user_enum ssh-user-enum] 0.3 SSH User Enumeration Script in Python Using The Timing Attack.
<br>[http://nullsecurity.net/tools/cracker.html sshtrix] 0.0.2 A very fast multithreaded SSH login cracker.
+
<br>[https://github.com/CiscoCXSecurity/SSHatter sshatter] 1.2 Password bruteforcer for SSH.
<br>[https://github.com/apenwarr/sshuttle sshuttle] 198.9ce2fa0 Transparent proxy server that works as a poor man's VPN. Forwards all TCP packets over ssh (and even DNS requests when using --dns option). Doesn't require admin privileges on the server side.
+
<br>[https://github.com/getdual/scripts-n-tools/blob/master/sshscan.py sshscan] 0.9 A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.
<br>[http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html ssl-hostname-resolver] 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
+
<br>[https://nullsecurity.net/tools/cracker.html sshtrix] 0.0.3 A very fast multithreaded SSH login cracker.
<br>[https://github.com/zombiesam/ssl_phuck3r ssl-phuck3r] 2.0 All in one script for Man-In-The-Middle attacks.
+
<br>[https://github.com/sshuttle/sshuttle sshuttle] 1.1.2 Transparent proxy server that works as a poor man's VPN. Forwards all TCP packets over ssh (and even DNS requests when using --dns option). Doesn't require admin privileges on the server side.
<br>[http://www.bindshell.net/tools/sslcat sslcat] 1.0 SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
+
<br>[https://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html ssl-hostname-resolver] 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
<br>sslcaudit 522.5b6be3e Utility to perform security audits of SSL/TLS clients.
+
<br>
<br>[https://github.com/grwl/sslcaudit ssldump] 0.9b3 an SSLv3/TLS network protocol analyzerhttp://www.rtfm.com/ssldump/
+
[https://github.com/n1tr0-Sec/ssl_phuck3r ssl-phuck3r] 2.0 All in one script for Man-In-The-Middle attacks.
<br>[http://www.rutschle.net/tech/sslh.shtml sslh] 1.16cSSL/SSH/OpenVPN/XMPP/tinc port multiplexer
+
<br>[https://github.com/liamkirton/sslcat sslcat] 0.2.1 SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
<br>[http://thesprawl.org/projects/latest/ sslmap] 0.2.0 A lightweight TLS/SSL cipher suite scanner.
+
<br>[https://github.com/abbbe/sslcaudit sslcaudit] Utility to perform security audits of SSL/TLS clients.
<br>[https://github.com/jtripper/sslnuke sslnuke] 5.c5faeaa Transparent proxy that decrypts SSL traffic and prints out IRC messages.
+
<br>[https://github.com/adulau/ssldump ssldump] 1.8 An SSLv3/TLS network protocol analyzer.
<br>[https://github.com/DinoTools/sslscan sslscan] 239.1328b49 Tests SSL/TLS enabled services to discover supported cipher suites.
+
<br>[https://github.com/yrutschle/sslh sslh] 2.1.3 SSL/SSH/OpenVPN/XMPP/tinc port multiplexer.
<br>[http://www.thoughtcrime.org/software/sslsniff/ sslsniff] 0.8 A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly
+
<br>[https://github.com/iphelix/sslmap sslmap] 0.2.0 A lightweight TLS/SSL cipher suite scanner.
<br>[http://www.roe.ch/SSLsplit sslsplit] 0.4.10A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections.
+
<br>[https://github.com/jtripper/sslnuke sslnuke] Transparent proxy that decrypts SSL traffic and prints out IRC messages.
<br>[http://www.thoughtcrime.org/software/sslstrip sslstrip] 0.9 Transparently hijack http traffic on a network, watch for https links and redirects, then map those links.
+
<br>[https://github.com/DinoTools/sslscan sslscan] Tests SSL/TLS enabled services to discover supported cipher suites.
<br>[https://github.com/nabla-c0d3/sslyze/ sslyze] 0.10Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations.
+
<br>[https://github.com/moxie0/sslsniff sslsniff] 0.8 A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly.
<br>[https://github.com/d4rkcat/stackflow stackflow] 2.2af525d Universal stack-based buffer overfow exploitation tool.
+
<br>[https://www.roe.ch/SSLsplit sslsplit] 0.5.5 A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections.
<br>[https://github.com/ipopov/starttls-mitm starttls-mitm] 7.b257756 A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.
+
<br>[https://github.com/moxie0/sslstrip sslstrip] 0.9 Transparently hijack http traffic on a network, watch for https links and redirects, then map those links.
<br>[http://hashcat.net/wiki/doku.php?id=statsprocessor statsprocessor] 0.083 A high-performance word-generator based on per-position Markov-attack.
+
<br>[https://github.com/nabla-c0d3/sslyze/ sslyze] 6.0.0 SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.)
<br>[http://steghide.sourceforge.net steghide] 0.5.1 Embeds a message in a file by replacing some of the least significant bits
+
<br>[https://github.com/d4rkcat/stackflow stackflow] Universal stack-based buffer overfow exploitation tool.
<br>[http://lcamtuf.coredump.cx/ stompy] 0.0.4 an advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.
+
<br>[https://github.com/ipopov/starttls-mitm starttls-mitm] A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.
<br>[http://packetstormsecurity.com/files/115852/Storm-Ringing-PABX-Test-Tool.html storm-ring] 0.1 This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call).
+
<br>[https://hashcat.net/wiki/doku.php?id=statsprocessor statsprocessor] 0.11 A high-performance word-generator based on per-position Markov-attack.
<br>[http://www.stunnel.org stunnel] 5.10A program that allows you to encrypt arbitrary TCP connections inside SSL
+
<br>[https://steghide.sourceforge.net steghide] 0.5.1 Embeds a message in a file by replacing some of the least significant bits.
<br>[https://github.com/TheRook/subbrute subbrute] 58.ff00d72A python subdomain bruteforce tool for pentesters.
+
<br>[https://packetstormsecurity.com/files/115852/Storm-Ringing-PABX-Test-Tool.html storm-ring] 0.1 This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call).
<br>[http://www.edge-security.com/subdomainer.php subdomainer] 1.2 A tool designed for obtaining subdomain names from public sources.
+
<br>[https://www.stunnel.org stunnel] 5.72 A program that allows you to encrypt arbitrary TCP connections inside SSL.
<br>[http://kinozoa.com subterfuge] 5.0 Automated Man-in-the-Middle Attack Framework
+
<br>[https://github.com/TheRook/subbrute subbrute] A DNS meta-query spider that enumerates DNS records, and subdomains (Python).
<br>[http://labs.portcullis.co.uk/application/sucrack sucrack] 1.2.3 A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su
+
<br>[https://github.com/Cyber-Guy1/Subdomainer subdomainer] A tool designed for obtaining subdomain names from public sources.
<br>[https://github.com/OpenRCE/sulley/ sulley] 1.0.cb5e62c A pure-python fully automated and unattended fuzzing framework.
+
<br>[https://github.com/Subterfuge-Framework/Subterfuge subterfuge] 1.0.1 Automated Man-in-the-Middle Attack Framework.
<br>[http://www.foundstone.com/us/resources/proddesc/superscan.htm superscan] 4 Powerful TCP port scanner, pinger, resolver.
+
<br>[https://labs.portcullis.co.uk/tools/sucrack/ sucrack] 1.2.3 A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su.
<br>[http://openinfosecfoundation.org/index.php/download-suricata suricata] 2.0.6 An Open Source Next Generation Intrusion Detection and Prevention Engine.
+
<br>[https://github.com/jtpereyda/boofuzz sulley] A pure-python fully automated and unattended fuzzing framework. Forked as Boofuzz.
<br>[https://github.com/anantshri/svn-extractor svn-extractor] 28.3af00fbA simple script to extract all web resources by means of .SVN folder exposed over network.
+
<br>[https://suricata.io suricata] 7.0.6 An Open Source Next Generation Intrusion Detection and Prevention Engine.
<br>[http://jetmore.org/john/code/swaks/ swaks] 20130209.0Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH
+
<br>[https://github.com/anantshri/svn-extractor svn-extractor] A simple script to extract all web resources by means of .SVN folder exposed over network.
<br>[http://code.google.com/p/swfintruder/ swfintruder] 0.9.1 First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.
+
<br>[https://jetmore.org/john/code/swaks/ swaks]
<br>[http://thesprawl.org/projects/syn-flooder/ synflood] 0.1 A very simply script to illustrate DoS SYN Flooding attack.
+
20240103.0 Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH.
<br>[http://packetstormsecurity.com/files/69802/synner.c.html synner] 1.1 A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.
+
<br>[https://code.google.com/p/swfintruder/ swfintruder] 0.9.1 First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.
<br>[http://www.digit-labs.org/files/tools/synscan/ synscan] 5.02fast asynchronous half-open TCP portscanner
+
<br>[https://github.com/topics/syn-flood syn-flood] Syn-flood git topic.
<br>[http://www.sysdig.org/ sysdig] 1436.4db7308Open source system-level exploration and troubleshooting tool.
+
<br>[https://packetstormsecurity.com/files/69802/synner.c.html synner] 1.1 A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.
<br>[http://sysinternals.com/ sysinternals-suite] 1.3 Sysinternals tools suite.
+
<br>[https://www.digit-labs.org/files/tools/synscan/ synscan] 5.02 A fast asynchronous half-open TCP portscanner.
<br>[http://t50.sourceforge.net/ t50] 5.4.1 Experimental Multi-protocol Packet Injector Tool
+
<br>[https://sysdig.com/opensource/ sysdig] Open source system-level exploration and troubleshooting tool.
<br>[http://taof.sf.net taof] 0.3.2 Taof is a GUI cross-platform Python generic network protocol fuzzer.
+
<br>[https://learn.microsoft.com/en-us/sysinternals/ sysinternals] Sysinternals tools suite.
<br>[http://freshmeat.net/projects/t-bear tbear] 1.5 Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.
+
<br>[https://t50.sourceforge.net/ t50] 5.8.7b Experimental Multi-protocol Packet Injector Tool (aka F 22 Raptor).
<br>[http://packetstormsecurity.com/files/119146/tcgetkey.1.html tcgetkey] 0.1 A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.
+
<br>[https://sourceforge.net/projects/taof/ taof] 0.3.2 Taof is a GUI cross-platform Python generic network protocol fuzzer.
<br>[https://github.com/Octosec/tckfc tckfc] 21.a32167eTrueCrypt key file cracker.
+
<br>[https://distro.ibiblio.org/blackarch/blackarch/os/aarch64/ tbear] 1.5 Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.
<br>[https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer tcpcontrol-fuzzer] 0.1 2^6 TCP control bit fuzzer (no ECN or CWR).
+
<br>[https://packetstormsecurity.com/files/119146/tcgetkey.1.html tcgetkey] 0.1 A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.
<br>[http://www.tcpdump.org tcpdump] 4.6.2 A tool for network monitoring and data acquisition
+
<br>[https://github.com/Octosec/tckfc tckfc] TrueCrypt key file cracker.
<br>[https://pypi.python.org/pypi/tcpextract/1.1 tcpextract] 1.1 Extracts files from captured TCP sessions. Support live streams and pcap files.
+
<br>[https://www.tcpdump.org tcpdump] 4.99.4 A tool for network monitoring and data acquisition.
<br>[http://afflib.org/software/tcpflow tcpflow] 1.4.4 Captures data transmitted as part of TCP connections then stores the data conveniently
+
<br>[https://github.com/faust/tcpextract tcpextract] 1.1 Extracts files from captured TCP sessions. Support live streams and pcap files.
<br>[http://tcpick.sourceforge.net/ tcpick] 2.1 TCP stream sniffer and connection tracker
+
<br>[https://github.com/simsong/tcpflow tcpflow] 1.5.0 Captures data transmitted as part of TCP connections then stores the data conveniently.
<br>[http://code.google.com/p/tcpjunk tcpjunk] 2.9.03A general tcp protocols testing and hacking utility.
+
<br>[https://tcpick.sourceforge.net/ tcpick] 0.2.1 TCP stream sniffer and connection tracker.
<br>[http://tcpreplay.appneta.com tcpreplay] 4.1.0 Gives the ability to replay previously captured traffic in a libpcap format
+
<br>[https://code.google.com/p/tcpjunk tcpjunk] 2.9.03 A general tcp protocols testing and hacking utility.
<br>[http://michael.toren.net/code/tcptraceroute/ tcptraceroute] 1.5beta7A traceroute implementation using TCP packets.
+
<br>[https://tcpreplay.appneta.com tcpreplay] 4.5.1 Gives the ability to replay previously captured traffic in a libpcap format.
<br>[http://hathawaymix.org/Software/TCPWatch tcpwatch] 1.3.1 A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.
+
<br>[https://github.com/mct/tcptraceroute tcptraceroute] 1.5b7 A traceroute implementation using TCP packets.
<br>[http://tcpxtract.sourceforge.net tcpxtract] 1.0.1 A tool for extracting files from network traffic.
+
<br>[https://pypi.org/project/tcpwatch/ tcpwatch] 1.3.1 A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.
<br>[http://www.hackingexposedvoip.com/ teardown] 1.0 Command line tool to send a BYE request to tear down a call.
+
<br>[https://github.com/sveniu/tcpwatch tcpwatch] A network packet arrival deadline monitor.
<br>[https://github.com/1aN0rmus/TekDefense-Automater tekdefense-automater] 58.a034193IP URL and MD5 OSINT Analysis
+
<br>[https://tcpxtract.sourceforge.net tcpxtract] 1.0.1 A tool for extracting files from network traffic.
<br>[https://code.google.com/p/termineter/ termineter] 0.1.0 Smart meter testing framework
+
<br>[https://github.com/1aN0rmus/TekDefense-Automater tekdefense-automater] 0.21 IP URL and MD5 OSINT Analysis.
<br>[http://www.hackingexposedcisco.com/ tftp-bruteforce] 0.1 TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.
+
<br>[https://github.com/rsmusllp/termineter termineter] Smart meter testing framework.
<br>[http://nullsecurity.net/tools/fuzzer.html tftp-fuzz] 1337Master TFTP fuzzing script as part of the ftools series of fuzzers.
+
<br>[https://github.com/EnableSecurity/tftptheft tftptheft] 0.1 Allows one to quickly scan/bruteforce a tftp server for files and download them instantly.
<br>[http://www.c0decafe.de/ tftp-proxy] 0.1 This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.
+
<br>[https://nullsecurity.net/tools/fuzzer.html tftp-fuzz] 1337Master TFTP fuzzing script as part of the ftools series of fuzzers.
<br>[http://thc.org/thc-ipv6/ thc-ipv6] 2.7 A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.
+
<br>[https://www.c0decafe.de/ tftp-proxy] 0.1 This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.
<br>[https://www.thc.org/releases.php thc-keyfinder] 1.0 Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.
+
<br>[https://github.com/vanhauser-thc/thc-ipv6 thc-ipv6] 3.8 A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.
<br>[http://www.thc.org thc-pptp-bruter] 0.1.4 A brute force program that works against pptp vpn endpoints (tcp port 1723).
+
<br>[https://github.com/hackerschoice/THC-Archive/blob/master/Tools/keyfinder.c thc-keyfinder] 1.0 Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.
<br>[https://www.thc.org/thc-smartbrute/ thc-smartbrute] 1.0 This tool finds undocumented and secret commands implemented in a smartcard.
+
<br>[https://github.com/hackerschoice/THC-Archive/blob/master/Tools/thc-pptp-bruter-0.1.4.tar.gz thc-pptp-bruter] 0.1.4 A brute force program that works against pptp vpn endpoints (tcp port 1723).
<br>[http://www.thc.org/thc-ssl-dos/ thc-ssl-dos] 1.4 A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!
+
<br>[https://github.com/hackerschoice/THC-Archive/blob/master/Tools/thcsmartbrute-1.0.tar.gz thc-smartbrute] 1.0 This tool finds undocumented and secret commands implemented in a smartcard.
<br>[http://www.edge-security.com/theHarvester.php theharvester] 13.56a30e2Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
+
<br>[https://github.com/hackerschoice/THC-Archive/blob/master/Tools/THCSSLCheck.zip thcsslcheck] A tool to verify the performance of SSL.
<br>[http://sourceforge.net/projects/themole/ themole] 0.3 Automatic SQL injection exploitation tool.
+
<br>[https://github.com/xmppadmin/theHarvester theharvester] 2.7 Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
<br>[http://www.nongnu.org/tiger/ tiger] 3.2.3 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
+
<br>[https://sourceforge.net/projects/themole/ themole] 0.3 Automatic SQL injection exploitation tool.
<br>[https://github.com/AeonDave/tilt tilt] 90.2bc2ef2An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
+
<br>[https://www.nongnu.org/tiger/ tiger] 3.2.4 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
<br>[http://bastianborn.de/radio-clock-hack/ timegen] 0.4 This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.
+
<br>[https://github.com/AeonDave/tilt tilt] An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
<br>[http://www.tinc-vpn.org/ tinc] 1.0.25VPN (Virtual Private Network) daemon
+
<br>[https://bastianborn.de/radio-clock-hack/ timegen] 0.4 This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.
<br>[https://github.com/technoskald/tinfoleak/ tinfoleak] 3.6469eb3 Get detailed information about a Twitter user activity.
+
<br>[https://www.tinc-vpn.org/ tinc] 1.0.36 VPN daemon that uses tunnelling and encryption.
<br>[https://banu.com/tinyproxy/ tinyproxy] 1.8.4 A light-weight HTTP proxy daemon for POSIX operating systems.
+
<br>[https://github.com/technoskald/tinfoleak/ tinfoleak] Get detailed information about a Twitter user activity.
<br>[https://github.com/Ayrx/tlsenum tlsenum] 75.6618285A command line tool to enumerate TLS cipher-suites supported by a server.
+
<br>[https://github.com/tinyproxy/tinyproxy tinyproxy] 1.11.2 A light-weight HTTP proxy daemon for POSIX operating systems.
<br>[https://github.com/iSECPartners/tlspretense tlspretense] 0.6.2 SSL/TLS client testing framework
+
<br>[https://github.com/Ayrx/tlsenum tlsenum] 0.3 A command line tool to enumerate TLS cipher-suites supported by a server.
<br>[http://blog.taddong.com/2011/05/tlssled-v10.html tlssled] 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
+
<br>[https://github.com/iSECPartners/tlspretense tlspretense] 0.6.2 SSL/TLS client testing framework.
<br>[http://www.jammed.com/~jwa/hacks/security/tnscmd/ tnscmd] 1.3 a lame tool to prod the oracle tnslsnr process (1521/tcp)
+
<br>[https://www.kali.org/tools/tlssled tlssled] 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
<br>[https://github.com/toperaproject/topera topera] 19.3e230fdAn IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.
+
<br>[https://github.com/mdmonk/perl_snippets/blob/master/tnscmd.pl tnscmd] A tool to prod the oracle tnslsnr process (1521/tcp).
<br>[http://www.torproject.org/ tor] 0.2.5.10Anonymizing overlay network.
+
<br>[https://github.com/toperaproject/topera topera] An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.
<br>[http://www.thesprawl.org/projects/tor-autocircuit/ tor-autocircuit] 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
+
<br>[http://www.torproject.org/ tor] Anonymizing overlay network.
<br>[https://www.torproject.org/projects/torbrowser.html.en tor-browser-en] 4.0.2 Tor Browser Bundle: Anonymous browsing using firefox and tor
+
<br>[https://github.com/iphelix/tor-autocircuit tor-autocircuit] 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
<br>[http://sourceforge.net/projects/torshammer/ torshammer] 1.0 A slow POST Denial of Service testing tool written in Python.
+
<br>[https://sourceforge.net/projects/torshammer/ torshammer] 1.0 A slow POST Denial of Service testing tool written in Python.
<br>[http://code.google.com/p/torsocks torsocks] 2.0.0 Wrapper to safely torify applications
+
<br>[https://gitlab.torproject.org/tpo/core/torsocks/ torsocks] 2.4.0 Wrapper to safely torify applications.
<br>[http://sourceforge.net/projects/tpcat/ tpcat] latest TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest.
+
<br>[https://sourceforge.net/projects/tpcat/ tpcat] latest TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest.
<br>[http://traceroute.sourceforge.net/ traceroute] 2.0.21 Tracks the route taken by packets over an IP network
+
<br>[https://traceroute.sourceforge.net/ traceroute] 2.1.5 Tracks the route taken by packets over an IP network
<br>[http://mark0.net/soft-trid-e.html trid] 2.11An utility designed to identify file types from their binary signatures
+
<br>[https://mark0.net/soft-trid-e.html trid] 2.24 A utility designed to identify file types from their binary signatures.
<br>[http://codemonkey.org.uk/projects/trinity/ trinity] 3749.996e568A Linux System call fuzzer.
+
<br>[https://github.com/kernelslacker/trinity trinity] A Linux System call fuzzer.
<br>[http://nullsecurity.net/tools/backdoor.html trixd00r] 0.0.1 An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.
+
<br>[https://nullsecurity.net/tools/backdoor.html trixd00r] 0.0.1 An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.
<br>[http://code.google.com/p/truecrack/ truecrack] 35Password cracking for truecrypt(c) volumes.
+
<br>[https://github.com/lvaccaro/truecrack truecrack] 3.6 Password cracking for truecrypt(c) volumes.
<br>[http://www.truecrypt.org/ truecrypt] 7.1aFree open-source cross-platform disk encryption software
+
<br>[https://www.truecrypt.org/ truecrypt] Free open-source cross-platform disk encryption software. Outdated, use Veracrypt, BitLocker or LUKS. The page helps to migrate.
<br>[http://packetstormsecurity.com/search/?q=tsh tsh] 0.6 An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.
+
<br>[https://github.com/orangetw/tsh tsh] Tiny SHell, an open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.
<br>[https://github.com/infodox/tsh-sctp tsh-sctp] 2.850a2da An open-source UNIX backdoor.
+
<br>[https://github.com/infodox/tsh-sctp tsh-sctp] TinySHell port to SCTP.
<br>[https://github.com/SECFORCE/Tunna tunna] 14.953f745a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
+
<br>[https://github.com/SECFORCE/Tunna tunna] 1.1a A set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
<br>[http://bitbucket.org/a_atalla/tuxcut/ tuxcut] 5.1 Netcut-like program for Linux written in PyQt.
+
<br>[http://bitbucket.org/a_atalla/tuxcut/ tuxcut] 6.1 Netcut-like program for Linux written in PyQt. Arp spoofing tool.
<br>[http://www.digininja.org/projects/twofi.php twofi] 2.0 Twitter Words of Interest.
+
<br>[https://digi.ninja/projects/twofi.php twofi] 2.0 Twitter Words of Interest.
<br>[http://www.nullsecurity.net/tools/backdoor.html u3-pwn] 2.0 A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install
+
<br>[https://www.nullsecurity.net/tools/backdoor.html u3-pwn] 2.0 A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install.
<br>[http://code.google.com/p/ua-tester/ uatester] 1.06 User Agent String Tester
+
<br>[https://code.google.com/p/ua-tester/ uatester] 1.06 User Agent String Tester.
<br>[http://sourceforge.net/projects/ubertooth/ ubertooth] 2012.10.R1A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only
+
<br>[https://github.com/greatscottgadgets/ubertooth ubertooth] 2020-12-R1 Tools for a 2.4 GHz wireless development board suitable for Bluetooth experimentation.
 
<br>[https://code.google.com/p/ubitack/ ubitack] 0.3 Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.
 
<br>[https://code.google.com/p/ubitack/ ubitack] 0.3 Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.
<br>[http://udis86.sourceforge.net/ udis] 861.7.2 A minimalistic disassembler library
+
<br>[https://udis86.sourceforge.net/ udis] 1.7.2 A minimalistic disassembler library.
<br>[http://code.google.com/p/udptunnel/ udptunnel] 19Tunnels TCP over UDP packets.
+
<br>[https://code.google.com/p/udptunnel/ udptunnel] Tunnels TCP over UDP packets.
<br>[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] 103.9d4d220 Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc
+
<br>[https://github.com/theopolis/uefi-firmware-parser uefi-firmware-parser] 1.11 Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc
<br>[http://www.ufo-wardriving.com/ ufo-wardriving] 4 Allows you to test the security of wireless networks by detecting their passwords based on the router model
+
<br>[https://github.com/awker/ufo-wardriving ufo-wardriving] Allows you to test the security of wireless networks by detecting their passwords based on the router model.
<br>[https://github.com/epsylon/ufonet ufonet] 12.dc92621A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet.
+
<br>[https://github.com/epsylon/ufonet ufonet] 1.8 A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet.
<br>[https://github.com/nccgroup/umap umap] 25.3ad8121 The USB host security assessment tool.
+
<br>[https://sourceforge.net/projects/umit/ umap] The USB host security assessment tool.
 
<br>[http://www.umitproject.org/ umit] 1.0 A powerful nmap frontend.
 
<br>[http://www.umitproject.org/ umit] 1.0 A powerful nmap frontend.
<br>[http://sourceforge.net/projects/unhide/ unhide] 20130526A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.
+
<br>[https://sourceforge.net/projects/unhide/ unhide] 20210124 A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.
<br>[https://github.com/GDSSecurity/Unibrute unibrute] 1.b3fb4b7 Multithreaded SQL union bruteforcer.
+
<br>[https://github.com/GDSSecurity/Unibrute unibrute] Multithreaded SQL union bruteforcer.
<br>[https://github.com/trustedsec/unicorn unicorn] 12.fd8cd18A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.
+
<br>[https://github.com/trustedsec/unicorn unicorn] 3.17 A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.
<br>[http://www.unicornscan.org/ unicornscan] 0.4.7 A new information gathering and correlation engine.
+
<br>[https://github.com/dneufeld/unicornscan unicornscan] An information gathering and correlation engine.
<br>[http://nullsecurity.net/tools/fuzzer.html uniofuzz] 1337 The universal fuzzing tool for browsers, web services, files, programs and network services/ports
+
<br>[https://nullsecurity.net/tools/fuzzer.html uniofuzz] 0.1.2-beta The universal fuzzing tool for browsers, web services, files, programs and network services/ports.
<br>[http://sourceforge.net/projects/uniscan/ uniscan] 6.2 A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
+
<br>[https://sourceforge.net/projects/uniscan/ uniscan] 6.2 A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
<br>[http://pentestmonkey.net/tools/audit/unix-privesc-check unix-privesc-check] 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases)
+
<br>[https://pentestmonkey.net/tools/audit/unix-privesc-check unix-privesc-check] 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases).
<br>[http://www.sniperx.net/ unsecure] 1.2 Bruteforces network login masks.
 
 
<br>[https://github.com/nccgroup/UPnP-Pentest-Toolkit upnp-pentest-toolkit] 1.1 UPnP Pentest Toolkit for Windows.
 
<br>[https://github.com/nccgroup/UPnP-Pentest-Toolkit upnp-pentest-toolkit] 1.1 UPnP Pentest Toolkit for Windows.
<br>[http://www.cqure.net/wp/upnpscan/ upnpscan] 0.4 Scans the LAN or a given address range for UPnP capable devices.
+
<br>[https://packages.gentoo.org/packages/net-analyzer/upnpscan upnpscan] 0.4 Scans the LAN or a given address range for UPnP capable devices.
<br>[http://upx.sourceforge.net/ upx] 3.91Ultimate executable compressor.
+
<br>[https://upx.github.io upx] 4.2.4 Ultimate executable compressor.
<br>[http://www.morningstarsecurity.com/research/urlcrazy urlcrazy] 0.5 Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
+
<br>[https://morningstarsecurity.com/research/urlcrazy urlcrazy] 0.5 Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
<br>[https://code.google.com/p/urldigger/ urldigger] 02c A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code
+
<br>[https://code.google.com/p/urldigger/ urldigger] 02c A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code.
<br>[http://www.morningstarsecurity.com/research/username-anarchy username-anarchy] 0.2 Tools for generating usernames when penetration testing.
+
<br>[https://morningstarsecurity.com/research/username-anarchy username-anarchy] 0.5 Tools for generating usernames when penetration testing.
<br>[https://github.com/jseidl/usernamer usernamer] 7.813139d Pentest Tool to generate usernames/logins based on supplied names.
+
<br>[https://github.com/jseidl/usernamer usernamer] Pentest Tool to generate usernames/logins based on supplied names.
<br>[http://uberwall.org/bin/download/45/UWloveimap.tgz uw-loveimap] 0.1 Multi threaded imap bounce scanner.
+
<br>[https://uberwall.org/bin/download/45/UWloveimap.tgz uw-loveimap] 0.1 Multi threaded imap bounce scanner.
<br>[http://uberwall.org/bin/download/42/UW_offish.1.tar.gz uw-offish] 0.1 Clear-text protocol simulator.
+
<br>[https://uberwall.org/bin/download/42/UW_offish-0.1.tar.gz uw-offish] 0.1 Clear-text protocol simulator.
 
<br>[http://uberwall.org/bin/download/44/UWudpscan.tar.gz uw-udpscan] 0.1 Multi threaded udp scanner.
 
<br>[http://uberwall.org/bin/download/44/UWudpscan.tar.gz uw-udpscan] 0.1 Multi threaded udp scanner.
<br>[http://uberwall.org/bin/download/43/UWzone.tgz uw-zone] 0.1 Multi threaded, randomized IP zoner.
+
<br>[https://uberwall.org/bin/download/43/UWzone.tgz uw-zone] 0.1 Multi threaded, randomized IP zoner.
<br>[https://github.com/v3n0m-Scanner/V3n0M-Scanner v3n0m] 77.cdaf14ePopular linux version of Balthazar/NovaCygni's 'v3n0m' scanner. Searches 18k+ dorks over 13 search engines.
+
<br>[https://github.com/v3n0m-Scanner/V3n0M-Scanner v3n0m] Release-425 Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns. Searches 18k+ dorks over 13 search engines.
<br>[http://valgrind.org/ valgrind] 3.10.1A tool to help find memory-management problems in programs
+
<br>[https://valgrind.org/ valgrind] 3.23.0 A tool to help find memory-management problems in programs.
<br>[https://github.com/delvelabs/vane vane] 1853.9cea741A vulnerability scanner which checks the security of WordPress installations using a black box approach.
+
<br>[https://github.com/delvelabs/vane vane] A vulnerability scanner which checks the security of WordPress installations using a black box approach.
<br>[http://packetstormsecurity.com/files/110603/Vanguard-Pentesting-Scanner.html vanguard] 0.1 A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications.
+
<br>[https://packetstormsecurity.com/files/110603/Vanguard-Pentesting-Scanner.html vanguard] 0.1 A comprehensive web penetration testing tool written in Perl that identifies vulnerabilities in web applications.
<br>[https://github.com/nccgroup/vbrute vbrute] 1.11dda8b Virtual hosts brute forcer.
+
<br>[https://github.com/nccgroup/vbrute vbrute] Virtual hosts brute forcer.
<br>[https://github.com/subgraph/Vega/wiki vega] 1.0 An open source platform to test the security of web applications
+
<br>[https://github.com/subgraph/Vega vega] 1.0 An open source platform to test the security of web applications
<br>[https://github.com/veil-evasion/Veil veil] 307.63130a3 A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
+
<br>[https://github.com/Veil-Framework/Veil veil] 3.1.x A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
<br>[http://veracrypt.codeplex.com/ veracrypt] 1.0f_1Free disk encryption software, TrueCrypt fork.
+
<br>[https://www.veracrypt.fr/en/Home.html veracrypt] 1.26.7 Free disk encryption software, TrueCrypt fork.
<br>[http://www.toolswatch.org/vfeed vfeed] 36.a0fdf06Open Source Cross Linked and Aggregated Local Vulnerability Database main repository.
+
<br>[https://github.com/toolswatch/vFeed vfeed] The Correlated CVE Vulnerability And Threat Intelligence Database API.
<br>[https://www.torproject.org/vidalia vidalia] 0.2.21Controller GUI for Tor
+
<br> '''vidalia''' Controller GUI for Tor. Replaced by Tor Launcher.
<br>[http://ucsniff.sourceforge.net/videosnarf.html videosnarf] 0.63A new security assessment tool for pcap analysis
+
<br>[https://ucsniff.sourceforge.net/videosnarf.html videosnarf] 0.63-1 A security assessment tool for pcap analysis.
<br>[http://vinetto.sourceforge.net vinetto] 0.07betaA forensics tool to examine Thumbs.db files
+
<br>[https://vinetto.sourceforge.net vinetto] 0.07b A forensics tool to examine Thumbs.db files.
<br>[https://github.com/botherder/viper viper] 633.e35789e A Binary analysis framework.
+
<br>[https://github.com/viper-framework/viper2 viper2] Binary analysis and management framework. It aims to provide a solution to easily organize your collection of malware and exploit samples as well as your collection of scripts you created or found over the time to facilitate your daily research.
<br>[http://viproy.com/ viproy-voipkit] 2.5 VoIP Pen-Test Kit for Metasploit Framework
+
<br>[https://github.com/fozavci/viproy-voipkit viproy-voipkit] 4.1 VoIP Pen-Test Kit for Metasploit Framework.
<br>[http://visi.kenshoto.com/ vivisect] 20140803A Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto
+
<br>[https://github.com/vivisect/vivisect vivisect] 1.2.0 A combined disassembler/static analysis/symbolic execution/debugger framework.
<br>[https://github.com/nccgroup/vlan-hopping vlan-hopping] 14.b944d17Easy 802.1Q VLAN Hopping
+
<br>[https://github.com/nccgroup/vlan-hopping vlan-hopping] Easy 802.1Q VLAN Hopping.
<br>[https://www.isecpartners.com/vnak.html vnak] 1.cf0fda7 Aim is to be the one tool a user needs to attack multiple VoIP protocols.
+
<br>[https://github.com/BlackArch/vnak vnak] Aim is to be the one tool a user needs to attack multiple VoIP protocols.
<br>[http://pentester.fr/resources/tools/techno/VNC/VNC_bypauth/ vnc-bypauth] 0.0.1 Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.
+
<br>[https://github.com/curesec/tools/blob/master/vnc/vnc-authentication-bypass.py vnc-bypauth] Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.
<br>[http://phenoelit-us.org/vncrack vncrack] 1.21What it looks like: crack VNC.
+
<br>[https://github.com/randombit/vnccrack vncrack] 2.1 What it looks like: crack VNC.
<br>[http://voiper.sourceforge.net/ voiper] 0.07A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.
+
<br>[https://voiper.sourceforge.net/ voiper] 0.07 A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.
<br>[http://voiphopper.sourceforge.net/ voiphopper] 2.04A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
+
<br>[https://voiphopper.sourceforge.net/ voiphopper] 2.04 A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
<br>[http://www.enderunix.org/voipong/ voipong] 2.0 A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.
+
<br>[https://github.com/EnderUNIX/VoIPong voipong] 2.0 A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.
<br>[https://www.volatilesystems.com/default/volatility volatility] 2.4.1 A memory forensics toolkit.
+
<br>[https://github.com/volatilityfoundation/volatility volatility] 2.6 A memory forensics toolkit.
<br>[http://www.wendzel.de/dr.org/files/Projects/vstt/ vstt] 0.5.0 VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.
+
<br>[https://github.com/volatilityfoundation/volatility vstt] 0.5.3 VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.
<br>[http://www.computec.ch/projekte/vulscan/ vulscan] 2.0 A module which enhances nmap to a vulnerability scanner
+
<br>[https://github.com/scipag/vulscan vulscan] 2.1 A module which enhances nmap to a vulnerability scanner.
<br>[http://w3af.sourceforge.net/ w3af] 1.6 Web Application Attack and Audit Framework.
+
<br>[https://github.com/andresriancho/w3af w3af] 1.6.49 Web Application Attack and Audit Framework.
<br>[http://code.google.com/p/waffit/ waffit] 30A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website
+
<br>[https://github.com/EnableSecurity/wafw00f waffit] 2.2.0 A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website.
<br>[http://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html wafp] 0.01_26c3 An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.
+
<br>[https://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html wafp] 0.01 An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.
<br>[https://github.com/SYWorks/waidps waidps] 16.ff8d270Wireless Auditing, Intrusion Detection & Prevention System.
+
<br>[https://github.com/SYWorks/waidps waidps] Wireless Auditing, Intrusion Detection & Prevention System.
<br>[http://wapiti.sourceforge.net/ wapiti] 2.3.0 A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...
+
<br>[https://wapiti.sourceforge.net/ wapiti] 3.1.8 A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...
<br>[http://eden-feed.erg.abdn.ac.uk/wavemon/ wavemon] 0.7.6 Ncurses-based monitoring application for wireless network devices
+
<br>[https://github.com/uoaerg/wavemon wavemon] 0.9.6 Ncurses-based monitoring application for wireless network devices.
<br>[http://packetstormsecurity.com/files/122064/Web-Soul-Scanner.html web-soul 2 A plugin based scanner for attacking and data mining web sites written in Perl.]
+
<br>[https://packetstormsecurity.com/files/122064/Web-Soul-Scanner.html web-soul] A plugin based scanner for attacking and data mining web sites written in Perl.
<br>[https://bechtsoudis.com/webacoo/ webacoo] 0.2.3 Web Backdoor Cookie Script-Kit.
+
<br>[https://github.com/anestisb/WeBaCoo webacoo] 0.2.3 Web Backdoor Cookie Script-Kit.
<br>[http://code.google.com/p/webenum/ webenum] 0.1 Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.
+
<br>[https://code.google.com/p/webenum/ webenum] 0.1 Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.
<br>[https://github.com/lnxg33k/webhandler webhandler] 321.bcd2263 A handler for PHP system functions & also an alternative 'netcat' handler.
+
<br>[https://github.com/lnxg33k/webhandler webhandler] A handler for PHP system functions & also an alternative 'netcat' handler.
<br>[https://github.com/zigoo0/webpwn3r webpwn] 3r35.3fb27bbA python based Web Applications Security Scanner.
+
<br>[https://github.com/zigoo0/webpwn3r webpwn3r] A python based Web Applications Security Scanner.
<br>[https://github.com/BlackArch/webrute webrute] 3.3 Web server directory brute forcer.
+
<br>[https://github.com/BlackArch/webrute webrute] Web server directory brute forcer.
<br>[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project webscarab] 20120422.001828 Framework for analysing applications that communicate using the HTTP and HTTPS protocols
+
<br>[https://wiki.owasp.org/index.php/Category:OWASP_WebScarab_Project webscarab] Framework for analysing applications that communicate using the HTTP and HTTPS protocols.
<br>[http://www.scrt.ch/en/attack/downloads/webshag webshag] 1.10A multi-threaded, multi-platform web server audit tool.
+
<br>[https://github.com/wereallfeds/webshag webshag] A multi-threaded, multi-platform web server audit tool.
<br>[https://github.com/BlackArch/webshells webshells] 1.c6a790b Web Backdoors.
+
<br>[https://github.com/BlackArch/webshells webshells] Web Backdoors.
<br>[https://code.google.com/p/webslayer/ webslayer] 5 A tool designed for brute forcing Web Applications
+
<br>[https://code.google.com/p/webslayer/ webslayer] A tool designed for brute forcing Web Applications.
<br>[http://github.com/kanaka/websockify websockify] 0.6.0 WebSocket to TCP proxy/bridge.
+
<br>[https://github.com/kanaka/websockify websockify] 0.12.0 WebSocket to TCP proxy/bridge.
<br>[http://sourceforge.net/projects/webspa/ webspa] 0.8 A web knocking tool, sending a single HTTP/S to run O/S commands.
+
<br>[https://sourceforge.net/projects/webspa/ webspa] 0.8 A web knocking tool, sending a single HTTP/S to run O/S commands.
<br>[http://code.google.com/p/websploit/ websploit] 3.0.0 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks
+
<br>[https://github.com/f4rih/websploit websploit] 4.0.3 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks.
<br>[http://epinna.github.io/Weevely/ weevely] 1.1 Stealth tiny web shell
+
<br>[https://github.com/epinna/weevely3 weevely3] 4.0.2 Weaponized web shell.
<br>[http://code.google.com/p/wepbuster/ wepbuster] 1.0_beta_0.7script for automating aircrack-ng
+
<br>[https://code.google.com/p/wepbuster/ wepbuster] 1.0_beta_0.7 A script for automating aircrack-ng.
<br>[https://github.com/xmendez/wfuzz wfuzz] 32.db8d1f6Utility to bruteforce web applications to find their not linked resources.
+
<br>[https://github.com/xmendez/wfuzz wfuzz] 3.1.0 Utility to bruteforce web applications to find their not linked resources. A web fuzzer.
<br>[http://www.morningstarsecurity.com/research/whatweb whatweb] 4023.36d2a13Next generation web scanner that identifies what websites are running.
+
<br>[https://www.morningstarsecurity.com/research/whatweb whatweb] 0.5.5 Next generation web scanner that identifies what websites are running.
<br>[http://wi-feye.za1d.com/download.php wi-feye] 1.0 An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.
+
br>[https://packetstormsecurity.com/files/122960/Wi-fEye-Wireless-Pentesting-Tool-1.0-Beta.html wi-feye]
<br>[http://www.digininja.org/projects/wifi_honey.php wifi-honey] 1.0 A management tool for wifi honeypots
+
An automated wireless penetration testing tool written in python , its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.
<br>[https://github.com/DanMcInerney/wifi-monitor wifi-monitor] 0.r22.71340a3 Prints the IPs on your local network that're sending the most packets
+
<br>[https://github.com/wi-feye/wi-feye wi-feye] A service that uses Wi-Fi probe requests in a building to do crowd behavior analysis and detect common patterns, points of interest and anomalies inside the building.
<br>[https://github.com/oblique/wificurse wificurse] 0.3.9 WiFi jamming tool.
+
<br>[https://digi.ninja/projects/wifi_honey.php wifi-honey] 1.0 A management tool for wifi honeypots.
<br>[https://github.com/DanMcInerney/wifijammer wifijammer] 52.20c9b70A python script to continuosly jam all wifi clients within range.
+
<br>[https://github.com/DanMcInerney/wifi-monitor wifi-monitor] Prints the IPs on your local network that're sending the most packets
<br>[https://github.com/sophron/wifiphisher wifiphisher] 71.dc13fe8Fast automated phishing attacks against WPA networks.
+
<br>[https://github.com/oblique/wificurse wificurse] WiFi jamming tool.
<br>[https://github.com/GDSSecurity/wifitap wifitap] 2b16088 WiFi injection tool through tun/tap device.
+
<br>[https://github.com/DanMcInerney/wifijammer wifijammer] A python script to continuosly jam all wifi clients within range.
<br>[http://code.google.com/p/wifite/ wifite] 2.28fc5cd A tool to attack multiple WEP and WPA encrypted networks at the same time.
+
<br>[https://github.com/sophron/wifiphisher wifiphisher] Fast automated phishing attacks against WPA networks.
<br>[https://github.com/jekyc/wig wig] 365.e56b2bf WebApp Information Gatherer.
+
<br>[https://github.com/GDSSecurity/wifitap wifitap] 0.4.1 WiFi injection tool through tun/tap device.
<br>[https://github.com/zombiesam/wikigen wikigen] 8.348aa99 A script to generate wordlists out of wikipedia pages.
+
<br>[https://github.com/derv82/wifite2 wifite2] A tool to attack multiple WEP and WPA encrypted networks at the same time.
<br>[http://sourceforge.net/projects/winexe/ winexe] 1.00Remotely execute commands on Windows NT/2000/XP/2003 systems.
+
<br>[https://github.com/jekyc/wig wig] 0.6 WebApp Information Gatherer.
<br>[http://www.ntsecurity.nu/toolbox/winfo/ winfo] 2.0 Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.
+
<br>[https://github.com/zombiesam/wikigen wikigen] A script to generate wordlists out of wikipedia pages.
<br>[https://github.com/SYWorks/wireless-ids wireless-ids] 24.b132071Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
+
<br>[https://sourceforge.net/projects/winexe/ winexe] 1.00 Remotely execute commands on Windows NT/2000/XP/2003 systems.
<br>[http://www.wireshark.org/ wireshark-cli] 1.12.3a free network protocol analyzer for Unix/Linux and Windows - CLI version
+
<br>[https://www.ntsecurity.nu/toolbox/winfo/ winfo] 2.0 Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.
<br>[http://www.wireshark.org/ wireshark-gtk] 1.12.3a free network protocol analyzer for Unix/Linux and Windows - GTK frontend
+
<br>[https://github.com/SYWorks/wireless-ids wireless-ids] Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
<br>[http://www.salvatorefresta.net/tools/ wirouter-keyrec] 1.1.2 A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).
+
<br>[https://www.wireshark.org/ wireshark] 4.2.6 A free network protocol analyzer for Unix/Linux and Windows.
<br>[http://packetstormsecurity.com/files/97465/Witchxtool-Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool.1.html witchxtool] 1.1 A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.
+
<br>[https://www.salvatorefresta.net/tools/ wirouter-keyrec] 1.1.2 A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).
<br>[http://www.willhackforsushi.com/?page_id=79 wlan2eth] 1.3 re-writes 802.11 captures into standard Ethernet frames.
+
<br>[https://packetstormsecurity.com/files/97465/Witchxtool-Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool.1.html witchxtool] 1.1 A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.
<br>[http://netsec.rs/70/tools.html wmat] 0.1 Automatic tool for testing webmail accounts
+
<br>[https://www.willhackforsushi.com/?page_id=79 wlan2eth] 1.3 Re-writes 802.11 captures into standard Ethernet frames.
<br>[http://nullsecurity.net/tools/automation.html wnmap] 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.
+
<br>[https://github.com/Ivan-Markovic/WMAT wmat] Automatic tool for testing webmail accounts
<br>[http://code.google.com/p/wol-e/ wol-e] 2.0 A suite of tools for the Wake on LAN feature of network attached computers
+
<br>[https://nullsecurity.net/tools/automation.html wnmap] 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.
<br>[http://www.homelab.it/index.php/2014/11/03/wordpress-brute-force-multithreading/ wordbrutepress] 1.0 Python script that performs brute forcing against WordPress installs using a wordlist.
+
<br>[https://github.com/RutAnimalJunk/wol-e wol-e] 2.0 A suite of tools for the Wake on LAN feature of network attached computers
<br>[https://github.com/gbrindisi/wordpot wordpot] 37.e42eedaA Wordpress Honeypot.
+
<br>[https://github.com/claudioviviani/wordbrutepress wordbrutepress] 2.1 Wordpress Brute Force Multithreading with standard and xml-rpc login.
<br>[https://github.com/SYWorks/wpa-bruteforcer wpa-bruteforcer] 4.d5f8586 Attacking WPA/WPA encrypted access point without client.
+
<br>[https://github.com/gbrindisi/wordpot wordpot] Wordpress Honeypot.
<br>[https://github.com/dejanlevaja/wpbf wpbf] 7.11b6ac1 Multithreaded WordPress brute forcer.
+
<br>[https://github.com/SYWorks/wpa-bruteforcer wpa-bruteforcer] Attacking WPA/WPA encrypted access point without client.
<br>[http://wpscan.org wpscan] 1868.6e01e1bA vulnerability scanner which checks the security of WordPress installations using a black box approach.
+
<br>[https://github.com/dejanlevaja/wpbf wpbf] Multithreaded WordPress brute forcer.
<br>[http://ws-attacker.sourceforge.net/ ws-attacker] 1.3 A modular framework for web services penetration testing.
+
<br>[https://github.com/wpscanteam/wpscan wpscan] 3.8.25 A vulnerability scanner which checks the security of WordPress installations using a black box approach.
<br>[https://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project wsfuzzer] 1.9.5 A Python tool written to automate SOAP pentesting of web services.
+
<br>[https://ws-attacker.sourceforge.net/ ws-attacker] 1.7 A modular framework for web services penetration testing.
<br>[http://www.remote-exploit.org/?page_id=418 wyd] 0.2 Gets keywords from personal files. IT security/forensic tool.
+
<br>[https://wiki.owasp.org/index.php/Category:OWASP_WSFuzzer_Project wsfuzzer] 1.9.5 A Python tool written to automate SOAP pentesting of web services.
<br>[http://www.xfocus.org/ x-scan] 3.3 A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.
+
<br>[http://www.remote-exploit.org/articles/misc_research__amp_code/index.html wyd] 0.2 Gets keywords from personal files. IT security/forensic tool.
<br>[https://github.com/nccgroup/xcavator xcavator] 5.bd9e2d8 Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
+
<br>[http://www.xfocus.org/ x-scan] 3.3 A general network vulnerabilities scanner. Gone.
<br>[http://www.spice-space.org/ xf86-video-qxl-git] r541.cbe70e9Xorg X11 qxl video driver.
+
<br>[https://github.com/nccgroup/xcavator xcavator] Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
<br>[http://eternal-todo.com/category/bruteforce xorbruteforcer] 0.1 Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.
+
<br>[https://eternal-todo.com/category/bruteforce xorbruteforcer] 0.1 Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.
<br>[http://blog.didierstevens.com/programs/xorsearch/ xorsearch] 1.11.1Program to search for a given string in an XOR, ROL or ROT encoded binary file.
+
<br>[https://blog.didierstevens.com/programs/xorsearch/ xorsearch] 1.11.4 Program to search for a given string in an XOR, ROL or ROT encoded binary file.
<br>[https://github.com/hellman/xortool/ xortool] 0.96A tool to analyze multi-byte xor cipher.
+
<br>[https://github.com/hellman/xortool/ xortool] A tool to analyze multi-byte xor cipher.
<br>[http://www.xplico.org/ xplico] 33.0f6d8bcInternet Traffic Decoder. Network Forensic Analysis Tool (NFAT).
+
<br>[https://www.xplico.org/ xplico] Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT).
<br>[http://sourceforge.net/apps/mediawiki/xprobe/index.php?title=Main_Page xprobe2] 0.3 An active OS fingerprinting tool.
+
<br>[https://sourceforge.net/apps/mediawiki/xprobe/index.php?title=Main_Page xprobe2] 0.3 An active OS fingerprinting tool.
<br>[http://www.freshports.org/security/xspy/ xspy] 1.0cA utility for monitoring keypresses on remote X servers
+
<br>
<br>[http://xsser.sourceforge.net/ xsser] 1.6 A penetration testing tool for detecting and exploiting XSS vulnerabilites.
+
[https://github.com/azizz98/xSMTP xSMTP] 1.2 Lightning
<br>[https://github.com/mandatoryprogrammer/xssless xssless] 35.9eee648An automated XSS payload generator written in python.
+
fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.
<br>[http://www.sven.de/xsss/ xsss] 0.40b A brute force cross site scripting scanner.
+
<br>
<br>[https://github.com/gwroblew/detectXSSlib xssscan] 17.7f1ea90Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.
+
[http://www.freshports.org/security/xspy/ xspy] 1.0c A utility for monitoring keypresses on remote X servers
<br>[https://github.com/gbrindisi/xsssniper xsssniper] 0.9 An automatic XSS discovery tool
+
<br>[https://xsser.03c8.net xsser] 1.8.4 A penetration testing tool for detecting and exploiting XSS vulnerabilites.
<br>[https://github.com/yehia-mamdouh/XSSYA xssya] 13.15ebdfeA Cross Site Scripting Scanner & Vulnerability Confirmation.
+
<br>[https://github.com/mandatoryprogrammer/xssless xssless] An automated XSS payload generator written in python.
<br>[https://github.com/Plasticoo/YAAF yaaf] 7.4d6273a Yet Another Admin Finder.
+
<br>[https://www.sven.de/xsss/ xsss] 0.40b A brute force cross site scripting scanner.
<br>[https://plusvic.github.io/yara/ yara] 3.3.0 A malware identification and classification tool.
+
<br>[https://github.com/gwroblew/detectXSSlib xssscan] Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.
<br>[http://packetstormsecurity.com/files/98546/yCrawler-Web-Crawling-Utility.html ycrawler] 0.1 A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. It has proxy and log file support.
+
<br>[https://github.com/gbrindisi/xsssniper xsssniper] 0.9.1 An automatic XSS discovery tool
<br>[http://www.yersinia.net/ yersinia] 0.7.3 A network tool designed to take advantage of some weakness in different network protocols.
+
<br>[https://github.com/yehia-mamdouh/XSSYA-V-2.0 xssya] A Cross Site Scripting Scanner & Vulnerability Confirmation.
<br>[http://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html yinjector] 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
+
<br>
<br>zackattack 5.1f96c14 A new tool set to do NTLM Authentication relaying unlike any other tool currently out there.
+
[https://github.com/Plasticoo/YAAF yaaf] Yet Another Admin Finder.
<br>[https://github.com/urbanesec/ZackAttack/ zaproxy] 2.3.1 A local intercepting proxy with integrated penetration testing tool for finding vulnerabilities in web applications.http://code.google.com/p/zaproxy/
+
<br>[https://virustotal.github.io/yara/ yara] 4.5.1 A malware identification and classification tool.
<br>[https://defense.ballastsecurity.net/wiki/index.php/Zarp zarp] 0.1.5 A network attack tool centered around the exploitation of local networks.  
+
<br>[https://packetstormsecurity.com/files/98546/yCrawler-Web-Crawling-Utility.html ycrawler] 0.1 A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. Proxy and log file support.
<br>[http://zerowine.sf.net/ zerowine] 0.0.2 Malware Analysis Tool - research project to dynamically analyze the behavior of malware
+
<br>[https://github.com/tomac/yersinia yersinia] 0.8.2 A framework for layer 2 attacks.
<br>[https://zmap.io/ zmap] 1.2.1 Fast network scanner designed for Internet-wide network surveys.
+
<br>[https://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html yinjector] 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
<br>[http://sourceforge.net/projects/zulu-wireless/ zulu] 0.1 A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.
+
<br>[https://github.com/urbanesec/ZackAttack zackattack] 0.1.1 Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS! (12 years ago...)
<br>[http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html zykeys] 0.1 Demonstrates how default wireless settings are derived on some models of ZyXEL routers.
+
<br>[https://github.com/zaproxy/zaproxy zaproxy] 2.15.0 The Zed Attack Proxy, a local intercepting proxy with integrated penetration testing tool for finding vulnerabilities in web applications.
<br>[http://sam.zoy.org/zzuf/ zzuf] 0.13Transparent application input fuzzer.
+
<br>[https://github.com/hatRiot/zarp zarp] 1.5 A network attack tool centered around the exploitation of local networks.  
 +
<br>[https://zerowine.sf.net/ zerowine] 2.0 Malware Analysis Tool - research project to dynamically analyze the behavior of malware.
 +
<br>[https://zmap.io/ zmap] 4.2.0 Fast network scanner designed for Internet-wide network surveys. Check out their other tools too.
 +
<br>[https://sourceforge.net/projects/zulu-wireless/ zulu] 0.1 A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.
 +
<br>[https://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html zykeys] 0.1 Demonstrates how default wireless settings are derived on some models of ZyXEL routers.
 +
<br>[https://github.com/samhocevar/zzuf zzuf] 0.15 Transparent application input fuzzer.
 +
 
  
The [[Category:Hacking]], [[Category:OffSec]], [[Category:Cybersecurity]] & [[Category:OSINT] resources archive/study guide is finished. Added many hundreds, maybe thousands of new resources, cleaned up study guide, huge lists of #OSINT, [[Category:OPSEC]] content added. Also, llinks to graphics like below. https://hastebin.com/qamiyawiwo.nginx …
+
[[Category:Pastebin guide]]
 +
[[Category:HowTo]]
 +
[[Category:Security]]
 +
[[Category:Hacking]]

Latest revision as of 09:29, 18 August 2024

The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019.
Wikiformating by @tinfoil-hat 9/2/2020.
Original / 1st version was here.
The Arms/Armor section was updated by someone from 4chan's /g/ in the summer of 2024.

Contents

Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity

These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies on Earth.


Networking: Good understanding of OSI layer model / Communication flow through each layer / Functions of each layer / Major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols / IP, ICMP Protocols (layer 3) / TCP, UDP Protocols (layer 4)


Overview of TCP/IP Layer model: ARP / Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports


Understanding of major (everyday Layer 7) services/protocols: DNS DHCP HTTP HTTP Header Fields HTTP Status Codes - How HTTP maintains state - HTTPS vs HTTP / FTP


Active vs Passive data transfer / SSH / SSH handshake / Telnet /Telnet Handshake / SMTP / SMTP handshake (Mail from/ RCPT ) / How attachments are handled Network


Troubleshooting Methodology: Understanding of Network Address Translation (NAT) / Port Address Translation (PAT) / Understanding of Proxies / Overview of Virtual Private Networks (VPNs)


How to read packet headers - Know common packet header information for IP, TCP, UDP


Understand which device operates at which OSI layer: Hub Switch / Managed vs Unmanaged - Firewall - IDS/IPS


Ability to read device logs: IDS/IPS Firewall Windows


Advanced Concepts: Content Delivery Networks (CDNs) / HTTP Pipelining / IPv4 vs IPv6 addressing scheme / IPv4 & IPv6 differences / Security Security Device Operations : Understanding of IDS/IPS technologies / Signature vs Anomaly based / HIDS vs NIDS / How Snort works / How IPS systems prevent attacks / Drop packets / TCP reset


Security Attacks: Detailed understanding of common web attacks: SQL Injection / Blind SQL Injection / Cross Site Scripting: Stored Reflected DOM / Cross Site Request Forgery / Local File Inclusion / Remote File Inclusion / Basic understanding of buffer overflow / Denial of Service / Remote Code Execution / PHP attacks / Heartbleed / Shellshock / Brute Force attacks


Understanding of the Malware Kill Chain: Worm vs Trojan / Phishing email / Landing redirect page / Exploit Kit / Malware Download / Malware Install / Phone Home / Data Exfiltration / Command and Control


Linux: Knowledge of filesystems used / NTFS, FAT vs ext2 3 4 / Overview of a journaling filesystem / Executing commands and command options / Interactive features: job control, history / File Utilities cp mv rm ls (etc.) / Editors: vi vim vimtutor nano / Process Utilities ps kill wait sleep / Filters: cat head tail sort uniq / How to read man pages: man vs info /apropos + man -k <keyword> / Detailed knowledge of tcpdump / Detailed knowledge of grep / Overview of: sed awk cut screen nohup / How to background a process: At start of process Mid-way through the process / How to bring process to foreground.

Certs


These are several pastas regarding getting the certs to work in cybsec. The first pasta was posted almost in every thread for a month and did not attract any criticism, so it is safe to say the thread agrees on the specified path.


Pasta 1
TryHackMe junior penetration tester path (do the basics before it if you don't have a background in IT) ----> Some Practice on TryHackMe ----> HackTheBox Academy ----> HackTheBox Boxes


I'll add to this and say check out this course: https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course


You can also look into his associated certificate. It's basically a cheaper, and a bit more realistic exam than the OSCP in regards to conducting a pentest end to end. His certs are becoming more well-known in the industry. I work with people that got them.


I'm not a shill. TCM helped me pass the OSCP back in the day.


Pro tip: When you do hackthebox, finish one, then watch how someone like ippsec did it to learn how someone better approaches the same target.


Pasta 2
PNPT is good for someone FRESH into /sec/, they dont know jack for shit etc. its gives them high level in almost everything + the soft skills are nice.


BUT.... it's NOTHING compared to the CPTS's difficulty and skills that are required to pass the exam, CPTS wins in terms of sheer quantity of content, quality of content, always updated, shows you all of the different paths, the perfect example of this is if you compare the pivoting module from CPTS and the one from PNPT, absolutely no competition. I think it already speaks volumes that the CPTS is considered to be more difficult than the OSCP even with the 10 days they give you.


TLDR; New to /sec/? do PNPT, Wanna be a god? do CPTS.


Spam retired boxes with Ippsec and practice A LOT (something I wish I did). Do your best to understand WHY, HOW and WHAT is vulnerable. Like really dig into it and read about its theory rather than just copy-pasting the exploit. Try to use the exploit manually rather than a script or better yet create your OWN script for that same exploit. Something you didn't like? Was it too slow? The help menu was annoying? Okay, then make it yourself after you finish the box. Find excuses to dig deeper into something, of course don't dig so deep you lose track but you get the idea.


Oh yeah last tip, surround yourself with people better than you or same skill level and keep pushing yourself to be better and pushing them.


Pasta 3
A guy in my network did it with nothing but security+ and network+. He went from helpdesk > technician > analyst and that's all he has.


He got helpdesk with 0 anything then got the intermediate job from helpdesk with them then got security analyst from there. If you have any certs for helpdesk you're already overqualified and underexperienced.

Knowledge sources


The Mind Maps listed below are gigantic, well designed, extremely detailed graphics breaking down subjects/knowledge pertinent to Hacking, OffSec, Cybersecurity & General Computer Science (which makes them pertinent to InfoSec/OffSec in general).
Even better, amanhardikar has directions on how to create such graphics listed at the site below as well.
All Mind Maps below were found at https://www.amanhardikar.com/mindmaps.html and are listed in HTML (Full Size) & PNG (Image Only) form.


AWSCompute (png)
AWSDatabase (png)
AWSNetworking (png)
AWSStorage (png)
BPMN2.0 (png)
BigDataSecurity (png)
BrowserPlugins (png)
CodeReview (png)
Cryptography (png)
ForensicChallenges (png)
Forensics
ISO27001 (png)
Infrastructure (png)
PCIDSS (png)
PKI (png)
Practice (png)
PracticeUrls
SABSAConcepts (png)
SABSADesign (png)
SABSAOperations (png)
SHC (png)
SecurityTests (png)
VMsandLiveCDs (png)
VPN (png)
VoIP (png)
Wireless (png)
Virus-classification
Webapptest (png)
Worm-classification

Basic Training

General/Basic Exploitation

http://www.pentest-standard.org/index.php/Main_Page
https://www.offensive-security.com/metasploit-unleashed/
http://null-byte.wonderhowto.com/how-to/metasploit-basics/
https://www.owasp.org/index.php/Main_Page
https://github.com/nixawk/pentest-wiki
https://github.com/beefproject/beef
https://portswigger.net/burp/
https://www.metasploit.com/
http://exploitpack.com/
https://github.com/commixproject/commix
https://github.com/reverse-shell/routersploit

OffSec Distros

https://www.kali.org/
https://www.blackarch.org/
https://www.parrotsec.org/
https://www.backbox.org/
https://www.pentoo.ch/
https://s-t-d.org/

Vulnscanner/Sniffer/Tools/Web Exploitation

http://www.askapache.com/security/computer-security-toolbox-2/#common_security_programs
https://pastebin.com/kP04r4PM
http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/netdiscover
http://www.tenable.com/products/nessus-vulnerability-scanner
https://www.rapid7.com/products/nexpose/
https://cirt.net/nikto2
https://nmap.org/
https://github.com/netsniff-ng/netsniff-ng
https://www.wireshark.org/
https://github.com/fwaeytens/dnsenum/
https://github.com/makefu/dnsmap/
http://www.tcpdump.org/
http://sqlmap.org/
https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
https://wpscan.org/
http://networksecuritytoolkit.org/nst/index.html
https://github.com/droope/droopescan
https://github.com/andresriancho/w3af
https://www.netsparker.com/

Password Cracker

http://www.openwall.com/john/
http://hashcat.net/hashcat/

Online Tools

http://crackstation.net
http://www.tcpiputils.com/
https://shodan.io
https://urlscan.io/
https://dnsdumpster.com/
https://censys.io/
https://www.zoomeye.org/
http://crimeflare.org:82/

Exploits (Exploit/Vulnerability Databases)

https://exploit-db.com/
http://kernel-exploits.com
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://nvd.nist.gov/
https://www.us-cert.gov/
https://blog.osvdb.org/
http://www.securityfocus.com/
http://seclists.org/fulldisclosure/
https://technet.microsoft.com/en-us/security/bulletins
https://technet.microsoft.com/en-us/security/advisories
https://packetstormsecurity.com/
http://www.securiteam.com/
http://cxsecurity.com/
https://www.vulnerability-lab.com/

Payloads/Reverse Shells

https://www.veil-framework.com/framework/veil-evasion/
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://highon.coffee/blog/reverse-shell-cheat-sheet/

CTFs/Practice Boxes(VMs)/War Games, etc.

NeverendingSecurity has a year long training plan for working through a massive list of practice boxes/wargames/CTFs at his site (link below); though it is from 2015 & a few of the CTF/Practice Boxes/War Games listed there are gone, his post/plan is rock solid & includes a Mind Map PNG as a visual guide (that mind map was attached to my first Twitter post of this updated archive on 6/9/2019.

PLEASE NOTE: The resources from the NeverendingSecurity's post (linked directly below) have already been added to this section's list ("CTFs/Practice # Boxes (VMs)/War Games, etc.") with as many defunct entries removed as possible.

NeverendingSecurity's Penetration Testing Practice Lab - Vulnerable Apps / Systems
https://neverendingsecurity.wordpress.com/category/mobile-phones-tabs/

NeverendingSecurity's Mind Map PNG for the material linked above
https://www.amanhardikar.com/mindmaps/Practice.png

Vulnerable Web Applications:

OWASP BWA: http://code.google.com/p/owaspbwa
OWASP Hackademic: http://hackademic1.teilar.gr
OWASP SiteGenerator: https://www.owasp.org/index.php/Owasp_SiteGenerator
OWASP Bricks: http://sourceforge.net/projects/owaspbricks & http://sechow.com/bricks
OWASP Security Shepherd: https://www.owasp.org/index.php/OWASP_Security_Shepherd
Damn Vulnerable Web App (DVWA): http://www.dvwa.co.uk
Damn Vulnerable Web Services (DVWS): http://dvws.professionallyevil.com
WebGoat.NET: https://github.com/jerryhoff/WebGoat.NET
PentesterLab: https://pentesterlab.com
Butterfly Security Project: http://thebutterflytmp.sourceforge.net
LAMPSecurity: http://sourceforge.net/projects/lampsecurity
Moth: http://www.bonsai-sec.com/en/research/moth.php
WackoPicko: https://github.com/adamdoupe/WackoPicko & http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf
BadStore: http://www.badstore.net
WebSecurity Dojo: http://www.mavensecurity.com/web_security_dojo
BodgeIt Store: http://code.google.com/p/bodgeit
hackxor: http://hackxor.sourceforge.net/cgi-bin/index.pl
SecuriBench: http://suif.stanford.edu/~livshits/securibench
SQLol: https://github.com/SpiderLabs/SQLol
CryptOMG: https://github.com/SpiderLabs/CryptOMG
XMLmao: https://github.com/SpiderLabs/XMLmao
Exploit KB Vulnerable Web App: http://exploit.co.il/projects/vuln-web-app & http://sourceforge.net/projects/exploitcoilvuln
PHDays iBank CTF: http://blog.phdays.com/2012/05/once-again-about-remote-banking.html
GameOver: http://sourceforge.net/projects/null-gameover
Zap WAVE: http://code.google.com/p/zaproxy/downloads/detail?name=zap-wave-0.1.zip
PuzzleMall: http://code.google.com/p/puzzlemall
VulnApp: http://www.nth-dimension.org.uk/blog.php?id=88
sqli-labs: https://github.com/Audi-1/sqli-labs
bWAPP: http://www.mmeit.be/bwapp & http://sourceforge.net/projects/bwapp/files/bee-box & http://www.itsecgames.com
NOWASP / Mutillidae 2: http://sourceforge.net/projects/mutillidae
SocketToMe: http://digi.ninja/projects/sockettome.php
Project GameOver: http://null.co.in/2012/06/14/gameover-web-pentest-learning-platform
OWASP Vicnum Project: https://sourceforge.net/projects/vicnum & http://vicnum.ciphertechs.com
Hackademic Challenges: http://www.hackademic.eu


Vulnerable Operating System Installations:

Damn Vulnerable Linux: http://sourceforge.net/projects/virtualhacking/files/os/dvl & http://www.damnvulnerablelinux.org
Metasploitable: http://sourceforge.net/projects/virtualhacking/files/os/metasploitable & https://sourceforge.net/projects/metasploitable
LAMPSecurity: http://sourceforge.net/projects/lampsecurity
UltimateLAMP: http://www.amanhardikar.com/mindmaps/practice-links.html & http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip
heorot: DE-ICE, hackerdemia http://hackingdojo.com/downloads/iso/De-ICE_S1.100.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.110.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.120.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S2.100.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.123.iso
De-ICE HackerPedia PenTest LiveCDs http://de-ice.net/hackerpedia/index.php/De-ICE.net_PenTest_Disks
pWnOS: http://www.pwnos.com & http://www.krash.in/bond00/pWnOS%20v1.0.zip & http://www.backtrack-linux.org/forums/backtrack-videos/2748-%5Bvideo%5D-attacking-pwnos.html
Holynix: http://sourceforge.net/projects/holynix/files & http://pynstrom.net/index.php?page=holynix.php
Kioptrix: http://www.kioptrix.com/blog/?page_id=135
exploit-exercises – nebula, protostar, fusion: http://exploit-exercises.com/download
PenTest Laboratory: http://pentestlab.org/lab-in-a-box
RebootUser Vulnix: http://www.rebootuser.com/?page_id=1041
neutronstar: http://neutronstar.org/goatselinux.html
scriptjunkie.us: http://www.scriptjunkie.us/2012/04/the-hacker-games
21LTR: http://21ltr.com/scenes
SecGame # 1 Sauron: http://sg6-labs.blogspot.co.uk/2007/12/secgame-1-sauron.html
Pentester Lab: https://www.pentesterlab.com/exercises
Vulnserver: http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
TurnKey Linux: http://www.turnkeylinux.org
Bitnami: https://bitnami.com/stacks
Elastic Server: http://elasticserver.com
CentOS: http://www.centos.org
Katana: http://www.hackfromacave.com/katana.html
Virtual Hacking Lab: http://sourceforge.net/projects/virtualhacking/files
Hacking-Lab: http://www.hacking-lab.com/hl_livecd

Vendor demo Sites to run security testing software against:

Acunetix acuforum: http://testasp.vulnweb.com
Acunetix acublog: http://testaspnet.vulnweb.com
Acunetix acuart: http://testphp.vulnweb.com
Cenzic crackmebank: http://crackme.cenzic.com
HP freebank: http://zero.webappsecurity.com
IBM altoromutual: http://demo.testfire.net
Mavituna testsparker: http://aspnet.testsparker.com
Mavituna testsparker: http://php.testsparker.com
NTOSpider Test Site: http://www.webscantest.com

Sites for Downloading Older Versions of Various Software to Practice Exploiting:

Old Version: http://www.oldversion.com
Old Apps: http://www.oldapps.com
VirtualHacking Repo: http://sourceforge.net/projects/virtualhacking/files/apps%40realworld
Huge collection of old/obscure web browsers https://browsers.evolt.org/
The X2 MS-DOS Programming Archive http://ftp.lanet.lv/ftp/mirror/x2ftp/msdos/programming/00index.html
bbLean old Blackbox Windows 7

Info/Blogs/Techniques/Forums, etc.

http://wiki.bash-hackers.org/scripting/style
https://www.corelan.be/index.php/articles/
https://www.veracode.com/security/xss
http://www.thegeekstuff.com/2012/02/xss-attack-examples/
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://thehackernews.com/
http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html
https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/
https://hakin9.org/voip-hacking-techniques/
https://greysec.net/
https://themanyhats.club/
https://kapeli.com/cheat_sheets/Chromium_Command_Line_Switches.docset/Contents/Resources/Documents/index
https://www.andreafortuna.org/2018/07/18/tcpdump-a-simple-cheatsheet/
https://www.andreafortuna.org/2018/07/16/finding-malware-on-memory-dumps-using-volatility-and-yara-rules/
http://hacker-club-cvd.tripod.com/id20.html

Sites for Improving Your Hacking Skills:

EnigmaGroup: http://www.enigmagroup.org

Exploit Exercises: http://exploit-exercises.com
Google Gruyere: http://google-gruyere.appspot.com
Gh0st Lab: http://www.gh0st.net
Hack This Site: http://www.hackthissite.org
HackThis: http://www.hackthis.co.uk
HackQuest: http://www.hackquest.com
Hack.me: https://hack.me
Hacking-Lab: https://www.hacking-lab.com
Hacker Challenge: http://www.dareyourmind.net
Hacker Test: http://www.hackertest.net
hACME Game: http://www.hacmegame.org
Hax.Tor: http://hax.tor.hu
OverTheWire: http://www.overthewire.org/wargames
PentestIT: http://www.pentestit.ru/en
pwn0: https://pwn0.com/home.php
RootContest: http://rootcontest.com
Root Me: http://www.root-me.org/?lang=en
Security Treasure Hunt: http://www.securitytreasurehunt.com
Smash The Stack: http://www.smashthestack.org
TheBlackSheep and Erik: http://www.bright-shadows.net
ThisIsLegal: http://thisislegal.com
Try2Hack: http://www.try2hack.nl
WabLab: http://www.wablab.com/hackme
XSS – Can You XSS This?: http://canyouxssthis.com/HTMLSanitizer
XSS – ProgPHP: http://xss.progphp.com
CTFtime (Details of CTF Challenges): http://ctftime.org/ctfs
shell-storm Repo: http://shell-storm.org/repo/CTF
CAPTF Repo: http://captf.com

Mobile Apps:

ExploitMe Mobile Android Labs: http://securitycompass.github.io/AndroidLabs
ExploitMe Mobile iPhone Labs: http://securitycompass.github.io/iPhoneLabs
OWASP iGoat: http://code.google.com/p/owasp-igoat
OWASP Goatdroid: https://github.com/jackMannino/OWASP-GoatDroid-Project
Damn Vulnerable iOS App (DVIA): http://damnvulnerableiosapp.com
Damn Vulnerable Android App (DVAA): https://code.google.com/p/dvaa
Damn Vulnerable FirefoxOS Application (DVFA): https://github.com/pwnetrationguru/dvfa
NcN Wargame: http://noconname.org/evento/wargame
Hacme Bank Android: http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx
InsecureBank: http://www.paladion.net/downloadapp.html

Miscellaneous:

VulnVPN: http://ww
VulnVoIP: http://www.rebootuser.com/?page_id=1041
NETinVM: http://informatica.uv.es/~carlos/docencia/netinvm
GNS3: http://sourceforge.net/projects/gns-3
XAMPP: https://www.apachefriends.org/index.html

Lists

https://code.google.com/archive/p/hacktooldepot/downloads
http://tools.kali.org/tools-listing
http://sectools.org/
https://github.com/fffaraz/awesome-cpp
https://github.com/fffaraz/awesome-cpp
https://github.com/alebcay/awesome-shell
https://github.com/dreikanter/ruby-bookmarks
https://github.com/sorrycc/awesome-javascript
https://github.com/sindresorhus/awesome-nodejs
https://github.com/dloss/python-pentest-tools
https://github.com/ashishb/android-security-awesome
https://github.com/bayandin/awesome-awesomeness
https://github.com/paragonie/awesome-appsec
https://github.com/apsdehal/awesome-ctf
https://github.com/carpedm20/awesome-hacking
https://github.com/paralax/awesome-honeypots
https://github.com/clowwindy/Awesome-Networking
https://github.com/onlurking/awesome-infosec
https://github.com/rshipp/awesome-malware-analysis
https://github.com/caesar0301/awesome-pcaptools
https://github.com/sbilly/awesome-security
https://github.com/sindresorhus/awesome
https://github.com/danielmiessler/SecLists
https://github.com/PaulSec/awesome-sec-talks


Site with content for attacking VAX: rare, tough machines

Vax/Ultrix-32M http://ftpmirror.your.org/pub/misc/unixarchive/


Search / Research

The main search engines used by users.

   Advangle
   Aol
   Ask
   Bing
   Better Search
   Dothop
   DuckDuckGo - an Internet search engine that emphasizes protecting searchers' privacy.
   Ecosia
   Entireweb
   Exalead 
   Factbites
   Gigablast
   Goodsearch
   Google Search - Most popular search engine.
   Infospace
   Instya
   Impersonal.me
   iSEEK Education
   ixquick
   Lycos
   Parseek (Iran)
   Peeplo
   Search.com
   SurfCanyon
   Teoma
   Wolfram Alpha
   Yahoo! Search
   Yippy
   I Search From: simulate using Google Search from a different location or device, or perform a search with custom search settings.
   millionshort: Allows you to remove the top of the search engine results (e.g Remove top 100,1000,10000)

Main National Search Engines

Localized search engines by country.

    Onet: (Poland)
    Alleba (Philippines) - Philippines search engine
    Aonde: (Brazil)
    Arabo: (Arabic)
    Baidu (China) - The major search engine used in China
    Daum (South Korea)
    Eniro (Sweden)
    Goo (Japan)
    Lableb: (Arabic)
    Najdsi (Slovenia)
    Naver (South Korea)
    Onet.pl (Poland)
    Orange (France)
    Parseek (Iran)
    SAPO (Portugal)
    Search.ch (Switzerland)
    Walla (Israel)
    Yandex (Russia)

Privacy-oriented search engines

     DuckDuckGo: Online investigators usually use it to search the surface web while using the Tor Browser.
     Startpage: Fetch results from Google without tracking its users.
     Peekier: Privacy oriented search engines that fetch its results using its own search algorithm.
     Qwant: Based in France.
     Oscobo: Based in UK.
     Swisscows:  Privacy safe WEB-search based in Switzerland.
     Privatelee:  Search for web and images privately.
     Gigablast: Open source search engine.
     Gibiru:  Uncensored and anonymous search engine.
     jivesearch

Exploits search engines

   sploitus
   Google Hacking Database (GHDB)
   exploit-db

Meta Search

Lesser known and used search engines.

    All-in-One
    AllTheInternet
    Etools
    Excite
    FaganFinder
    Glearch
    Goofram
    iZito
    Nextaris
    Metabear
    MetaGer
    Myallsearch
    Qrobe
    Qwant
    Search
    Searx
    Sputtr
    Trovando
    WebOasis
    WiinkZ
    Zapmeta

etools:

Compile its results from major international search engines, keep user privacy by not collecting or sharing personal information of its users. This search engine is very fast and show a summary for each search query -on the right side- detailing the source of its results.

All the interne:

query major search engines including shopping site like Amazon and eBay.

izito:

Aggregate data from multiple sources (Yahoo, Bing, Wikipedia, YouTube and other) to generate optimal results which includes images, videos, news and articles.

Metacrawler:

 Aggregate results from Google and Yahoo!.

My all search:

Aggregates results through Bing, DuckDuckGo, AOL Search, Ask, Oscobo, Mojeek, ZapMeta, MetaCrawler.

Carrot2:

Open Source Search Results Clustering Engine aggregate results from GoogleAPI, Bing API, eTools Meta Search, Lucene, SOLR, and more.

elocalfinder:

Fetch results from Google, Yahoo!, Ask and Bing .

Opentext:

Metasearch engine based on Google, Yahoo!, Ask, Bing, Wikipedia, and Open Directory.

Niche Search Engines

     Secret Search Engine Labs: Showing you the less popular search results often omitted by mainstream search giants.
     AllAreaCodes: Phone and Area Code Search

Other Search engines for specific information or topics.

    2lingual Search
    Biznar
    CiteSeerX
    FindTheCompany
    Digle
    Google Custom Search
    Harmari (Unified Listings Search)
    Internet Archive
    Million Short
    WorldWideScience.org
    Zanran

Document and Slides Search

Search for data located on PDFs, Word documents, presentation slides, and more.

    Authorstream
    Find-pdf-doc
    Free Full PDF
    Hashdoc
    Offshore Leak Database
    PasteLert
    PDF Search Engine
    PPTHunter
    RECAP
    Scribd
    SlideShare
    Slideworld
    soPDF.com

Web Directories

   Search Engine Colossus
   The Ultimate Search Engine Links Page
   The WWW Virtual Library
   A web directory based on the DMOZ data
   Best of the Web
   GoWorkable – Global Business Listing
   01webdirectory

Image Search

    7Photos
    Baidu Images
    Bing Images
    Clarify
    Flickr
    GoodSearch Image Search
    Google Image
    Gramfeed
    Creativecommons
    Image Identification Project
    Image Raider
    Imgur
    KarmaDecay
    Lycos Image Search
    MyPicsMap
    PhotoBucket
    Picsearch
    PicTriev
    Reverse Image Search
    StolenCameraFinder
    Smug mug
    TinEye - Reverse image search engine.
    Websta
    Worldcam
    Yahoo Image Search
    Yandex Images

Reverse image search

    Google reverse search
    Karmadecay
    TinEye
    REVERSE IMAGE SEARCH
    Imagebrief
    Cam finds App: this is an App available for both Android and Apple devices. It uses visual search technology to recognize uploaded picture and give instant results about it like related images, local shopping results and a vast selection of web results.
    Image Identification Project

Images shared across social media sites

    Lakako
    Flickr
    Flicker map:
    My Pics map: View Flickr photos on a Google map.
    idGettr: Find Flicker ID number (also works for groups).
    Flickr Hive Mind: Data mining tool for the Flickr database of photography.
    Instagram
    Websta: Advanced search for Instagram website.
    Stalkture: Instagram Online Web Viewer.
    Mininsta: Advanced Instagram search engine.
    Pinterest

Specialized sites that hold images appeared in the press / news media

    Gettyimages: Contains images from news, entertainment, fashion, sports and archival imagery.
    Reuters pictures
    News press
    Associated Press images portal
    PA images
    European pressphoto agency
    Canadian Press images archive

Visual Search and Clustering Search Engines

Search engines that scrape multiple sites (Google, Yahoo, Bing, Goo, etc) at the same time and return results.

    Carrot2 - Organizes your search results into topics.
    Cluuz - Generates easier to understand search results through graphs, images, and tag clouds.
    Yippy - Search using multiple sources at once

Patent Search Engines

   Google Advanced Patent Search Engine
   European Patent Office
   Israel Patent Office Database
   Norwegian Industrial Property Office
   Swedish Patent and Registration Office
   Switzerland 
   Taiwan Intellectual Property Office
   Japan Patent Office
   World Intellectual Property Organization (WIPO) 
   Korean Intellectual Property Rights Information Service (KIPRIS)
   State Intellectual Property Office (SIPO) of the People’s Republic of China
   Australia Patent Search
   Canadian Intellectual Property Office
   Danish Patent and Trademark Office
   Finnish Patent and Registration Office
   France Patent Search
   Germany Patent Office
   UK Patent Search Engine
   India Patent Office
   stopfakes: The International Trade Administration (ITA), U.S. Department of Commerce, manages STOPfakes.gov to assist U.S. businesses protect and enforce their intellectual property rights against counterfeits and pirated goods in the global marketplace.
   FreePatentsOnline: Patent metadata search engine.
   Patent Lens
   Directory of Intellectual Property Offices Worldwide

Social Media Search/Tools

Real-Time Search, Social Media Search, and General Social Media Tools

    Audiense
    Bottlenose
    Brandwatch
    Buffer
    Buzz sumo
    Flumes
    Gaddr
    Geocreepy
    Geofeedia
    Hootsuite
    HowSociable
    Hashtatit
    Icerocket
    Klear
    Klout
    Kred
    MustBePresent
    Netvibes
    OpinionCrawl
    Rival IQ
    RSS Social Analyzer
    SmashFuse
    SocialBakers
    SociaBlade
    Social DownORNot
    Social Mention
    Social Searcher
    Tagboard
    Trackur
    UVRX


Twitter

    Backtweets
    Blue Nod
    burrrd.
    Crate
    Custom Twitter Tools
    doesfollow
    Fake Follower Check
    FirstTweet
    First Tweet
    Foller.me
    FollowCheck
    Followerwonk
    Geochirp
    GeoSocial Footprint
    GetTwitterID
    Gigatweeter
    Ground Signal
    HappyGrumpy
    Harvard TweetMap
    Hashtagify
    Hashtags.org
    InTweets
    ManageFlitter
    Mentionmapp
    OneMillionTweetMap
    Queryfeed
    Rank Speed
    Riffle
    RiteTag
    Sentiment140
    Silver Bird
    SnapBird
    Sleeping Time
    Social Bearing
    Social Rank First Follower
    Spoonbill
    Tagdef
    TeachingPrivacy
    Tinfoleak
    Trends24
    TrendsMap
    Twazzup
    twbirthday
    TwChat
    tweepsect
    Tweet4me
    TweetArchivist
    Tweet Chat
    TweetDeck
    Tweeten
    TweetMap
    TweetMap
    Tweetpaths
    TweetPsych
    Tweetreach
    TweetStats
    Tweet Tag
    TweetTunnel
    Twellow
    Tweriod
    Twiangulate
    Twicsy
    Twilert
    Twipho
    Twitonomy
    TwitRSS
    Twitter Advanced Search
    Twitter Audit
    Twitter Chat Schedule
    Twitter Counter
    Twitterfall
    Twitter Search
    Twitter Search Tools
    TWUBS Twitter Chat
    Schedule Warble

Facebook

    Agora Pulse
    Commun.it
    Custom Facebook Tools
    ExtractFace
    Fanpage Karma
    Facebook Search
    Facebook Search Tool
    Facebook Search Tools
    FaceLIVE
    Fb-sleep-stats
    Find my Facebook ID
    LikeAlyzer
    Lookup-ID.com
    SearchIsBack
    Socialsearching
    Wallfux
    Wolfram Alpha Facebook Report
    Zesty Facebook Search

Google+

    CircleCount
    Google Plus Search
    PlusFeed

Instagram

    Custom Instagram Search Tools
    Hashtagify
    Iconosquare
    Ink361
    Picodash
    SnapMap
    Social Rank
    Tofo.me
    Websta (Instagram)
    Worldcam

Pinterest

    Pingroupie
    Pin Search

Reddit

Tools to help discover more about a reddit user or subreddit.

    Imgur - The most popular image hosting website used by redditors.
    Metareddit - Explore various subreddits.
    Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
    Reddit Archive - Historical archives of reddit posts.
    Reddit Suite - Enhances your reddit experience.
    Reddit Investigator - Investigate a reddit users history.
    Reddit Metrics - Keeps track of the growth of a subreddit.
    Reddit User Analyser - reddit user account analyzer.
    SnoopSnoo - Provides reddit user and subreddits analytics.
    Subreddits - Discover new subreddits.
    Reddit Comment Search - Analyze a reddit users by comment history.

VKontakte

Perform various OSINT on Russian social media site VKontakte.

    Дезертир
    Barkov.net
    Find Face - Search for people on VK by photo.
    Report Tree
    Social Stats
    Spotlight
    Snradar - Search pictures by time and location they were taken
    Target Hunter
    Target Log
    VK5
    VK Community Search
    VK Parser - A tool to search for a target audience and potential customers.
    VK People Search
    VK to RSS Appspot

Tumblr

    Searchlr - Search engine for tumblr posts.
    Tumblr Search

LinkedIn

    FTL - Browser plugin that finds emails of people's profiles in LinkedIn.

Similar Sites Search

Find websites that are similar. Good for business competition research.

    Google Similar Pages
    SimilarPages - Find pages similar to each other
    SimilarSites - Discover websites that are similar to each other
    SitesLike - Find similar websites by category

Files Search Engines

    Faganfinder
    General-Search
    ShareDir

FTP search engines

     Global file search
     Archie
     File watcher
     Mamont
     NAPALM FTP Indexer

Pastebins

Find information that has been uploaded to Pastebin.

    Custom Pastebin Search - A custom search page that indexes 57 different paste sites.
    PasteLert - PasteLert is a simple system to search pastebin.com and set up alerts (like google alerts) for pastebin.com entries.

Custom Search Engines

    Google Custom Search Engines Finder
    300+ Social Networking Sites
    250+ Video Sharing Sites
    File Sharing Sites Search
    FTP and File Search Engine
    Github Awesome Custom Search Engine
    OSINT Tools, Resources & News Search
    Torrent Search
    Social Media Custom Search Engine
    IFTTT Applet Finder
    WordPress Content Hacker Search Engine
    Short URL Search Engine
    Raw Git Hacker Custom Search Engine

Code Search

Search by website source code

    CoCaBu - Search engine that augments user query into code-friendly for retrieving precise examples.
    FaCoY - Search engine that retrieves code examples that are syntactically and semantically similar.
    NerdyData - Search engine for source code.
    SearchCode - Help find real world examples of functions, API's and libraries across 10+ sources.

Job Hunt

Business Search Business Annual Records

   Annual Reports: Lists thousands of annual records from 5,333 companies worldwide.
   Reporter Link: Contains more than 60 Million searchable tables, figures and datasets.
   Gov.Uk
   U.S. Securities and exchange commission
   Sedar
   Company registration around the world: Give a list of government, commercial registers websites around the globe.

Business Profiles

   Open corporates: The largest open database of companies in the world.
   crunchbase
   Zoom info: List companies in the U.S categorized by industry and offer information
   corporationwiki: Allows you to search for any company and visualize the connection between people working within it
   Kompass: This is a global B2B portal with information about companies in more than 60 countries.
   Infobel
   Orbis directory
   Manta: Business directory for U.S businesses
   Canadian Company Capabilities
   Canadian Importers Database
   LittleSisThis is a powerful profiling website that lists a wealth of information about 185,000 people and 67,000 organizations in varying stages of completion.
   Companies House
   CDREX
   EUROPAGES
   Vault
   Owler
   The United Kingdom Limited Liability Company list
   International White and Yellow Pages
   Google finance

Major Social Networks

    Draugiem (Latvia)
    Facebook
    Facenama (Iran)
    Google+
    Instagram
    Linkedin
    Mixi (Japan)
    Odnoklassniki (Russia)
    Pinterest
    Qzone (China)
    Reddit
    Taringa (Latin America)
    Tinder
    Tumblr
    Twitter
    Weibo (China)
    VKontakte
    Xing

Blog Search

   BlogSearchEngine
   Icerocket
   NetworkedBlogs
   Notey - Blog post search engine.
   Sphere
   Twingly

Forums and Discussion Boards Search

   Boardreader
   Facebook Groups
   Google Groups
   Linkedin Groups
   Ning
   Omgili
   Xing Groups
   Yahoo Groups

Username Check

   Check User Names
   Custom Username Tools
   Gaddr - Scan 50+ different websites for usernames.
   Knowem - Search for a username on over 500 popular social networks.
   Name Chk
   Name Checkr
   User Search

People Investigations

   411 (US)
   192 (UK)
   Alumni.net
   Ancestry
   Canada411
   Cedar
   Charlie App
   Classmates
   CrunchBase
   Custom Person Search Tools
   CVGadget
   Data 24-7
   Gaddr
   facesearch - Search for images of a person by name.
   Family Search
   Family Tree Now
   Federal Bureau of Prisons - Inmate Locator (US) - Find an inmate that is in the Federal Bureau of Prisons system.
   Fold3 (US Military Records) - Browse records of US Military members.
   Forebears
   Genealogy Bank
   Genealogy Links
   Hey Press (Search for Journalists)
   Homemetry
   Infobel
   Infospace White Pages
   Interment
   International White and Yellow Pages
   Itools
   Kompass
   LookUpUK
   Lullar
   MarketVisual
   MelissaDATA
   My Life People Search
   The National Archives (UK)
   PeekYou
   People Search (Australia)
   PeopleSearch.net
   Pipl
   Rapportive
   RecordsPedia
   Recruitem
   Reunion
   Rootsweb
   SearchBug
   Skip Ease
   snitch.name
   SnoopStation
   Spokeo
   Switchboard
   That’sThem
   USSearch
   WebMiii
   White Pages (US)
   Wink
   Yasni
   Zabasearch
   Zoominfo

E-mail Search / E-mail Check

   Breach OR Clear
   Custom Email Search Tools
   BriteVerify Email Verification
   Email Address Validator
   Email Format
   EmailHippo
   Email Hunter
   Email Permutator+
   Emails4corporations
   EmailSearch.net
   Email Validator
   Email Validator Tool
   Have I Been Pwned - Search across multiple data breaches to see if your email address has been compromised.
   MailTester
   Peepmail
   Pipl
   ReverseGenie
   TCIPUTILS.com Email Test
   ThatsThem
   Toofr
   Verify Email
   VoilaNorbert - Find anyone's contact information for lead research or talent acquisition.

Phone Number Research

   National Cellular Directory - was created to help people research and reconnect with one another by performing cell phone lookups. The lookup products includes have billions of records that can be accessed at any time, as well as free searches one hour a day, every day.
   NumSpy-API - find details of any mobile number in india for free and get a JSON formated output, inspired by NumSpy.
   Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
   Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
   Twilio - Look up a phone numbers carrier type, location, etc.
   Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.

Expert Search

   Academia
   AllExperts
   CanLaw
   ExpertiseFinder
   ExpertGuide
   ExpertPages
   Experts.com
   HARO
   HerSay
   GlobalExperts
   Idealist
   Innocentive
   Internet Experts
   Library of Congress: Ask a Librarian
   Maven
   MuckRack
   National Speakers Association
   Newswise
   Patent Attorneys/Agent Search
   PRNewswire
   ProfNet
   ReseacherID
   ScholarUniverse
   SheSource
   Speakezee
   Sources
   TRExpertWitness
   Zintro

Company Research

   AllStocksLinks
   Battle of the Internet Giants
   Better Business Bureau
   Bizeurope
   Biznar
   Bloomberg
   Business Source
   Bureau Van Dijk
   Canadian Business Research
   Canadian Business Resource
   Central and Eastern European Business Directory
   Company Registration Round the World
   Company Research Resources by Country Comparably
   CompeteShark
   Corporate Information
   CrunchBase
   Data.com Connect
   EDGAR Online
   Europages
   European Business Register
   Ezilon
   Factiva
   FindtheCompany
   Glassdoor
   Global Business Register
   globalEdge
   GuideStar
   Hoovers
   Inc. 5000
   InstantLogoSearch
   iSpionage
   Knowledge guide to international company registration
   Linkedin
   National Company Registers
   MarketVisual
   Mergent Intellect
   Mergent Online
   Morningstar Research
   Notablist
   Orbis directory
   opencorporates
   Owler
   Overseas Company Registers
   Plunkett Research
   Scoot
   SEMrush
   Serpstat
   SpyFu
   Forbes Global 2000
   Tradezone Europages
   Vault
   Xing

Job Search Resources

   Beyond
   CampusCareerCenter
   CareerBuilder
   College Recruiter
   Craiglist
   CVFox
   Dice
   Eluta (Canada)
   Eurojobs
   Fish4Jobs
   Glassdoor
   Headhunter
   Indeed
   Jobs (Poland)
   Jobsite (UK)
   Linkedin
   Monster
   Naukri (India)
   Reed (UK)
   Seek (Australia)
   SimplyHired
   Xing
   ZipRecruiter

Q&A Sites

   Answers.com
   Ask
   ChaCha
   eHow
   Quora
   StackExchange
   Wiselike
   Yahoo Answers

Domain and IP Research

   Accuranker
   ahrefs - A tool for backlink research, organic traffic research, keyword research, content marketing & more.
   Alexa
   Bing Webmaster Tools
   BuiltWith
   Central Ops
   Custom Domain Search Tools
   Custom IP Address Search Tools
   Dedicated or Not
   DNSDumpster
   DNS History
   DNSStuff
   DNSViz
   Domain Big Data
   Domain Crawler
   Domain Dossier
   Domain History
   Domain Tools - Whois lookup and domain/ip historical data.
   Easy whois
   Exonera Tor - A database of IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date.
   Follow.net
   GraphyStories
   HypeStat
   Infosniper
   intoDNS
   IP Checking
   IP Location
   IP 2 Geolocation
   IP 2 Location
   IPFingerprints
   IPVoid - IP address toolset.
   IntelliTamper
   Kloth
   NetworkTools
   Majestic
   MaxMind
   MXToolbox - MX record lookup tool.
   Netcraft Site Report
   OpenLinkProfiler
   Open Site Explorer
   PageGlimpse
   Pentest-Tools.com
   PhishStats
   Pulsedive
   Quantcast
   Quick Sprout
   RedirectDetective
   Remote DNS Lookup
   Robtex
   SameID
   SecurityTrails - API to search current and historical DNS records, current and historical WHOIS, technologies used by sites and whois search for phone, email, address, IPs etc.
   SEMrush
   SEO Chat Tools
   SEOTools for Excel
   Similar Web - Compare any website traffic statistics & analytics.
   SmallSEOTools
   StatsCrop
   Squatm3gator - Enumerate available domains generated modifying the original domain name through different cybersquatting techniques
   TCPIPUTILS.com
   urlQuery
   URLVoid - Analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites.
   Wappalyzer
   WebMeUp
   Website Informer
   WhatIsMyIPAddress
   Who.is - Domain whois information.
   Whois Arin Online
   WhoIsHostingThis
   WhoisMind
   Whoisology
   WhoIsRequest
   w3snoop
   Verisign
   ViewDNS.info
   You Get Signal

Keywords Discovery and Research

   Google Adwords - Get monthly keyword volume data and stats.
   Google Keyword Suggest Tool: Gives keywords suggestions for Google, Bing, Amazon and YouTube.
   Google Trends - See how many users are searching for specific keywords.
   Google Correlate
   Keyword Discovery
   Keyword Spy
   KeywordTool
   KWFinder
   Keyword Shitter
   One Look Reverse Dictionary
   Word Tracker
   Soovle
   Ubersuggest
   One Look: Enter a word, phrase, sentence, or pattern to search for related words.
   Ubersuggest: suggest keywords not available in the Google Keyword Planner.

Web History and Website Capture

   Archive.is
   BlackWidow
   CashedPages
   CachedView
   Screenshots.com
   Wayback Machine - Explore the history of a website.
   Wayback Machine Archiver

Language / Translation

Translation services

   Google translator
   Google Input Tools: <i>Allows a user to enter text in any supported language using his/her English (Latin) keyboard and the text will get converted into its native script.</i>
   Apertium
   Babylon
   Bing translate
   Dictionary
   Wiktionary
   Free translator
   No slang

Language Tools

    2lingual
    Apertium
    Babelfish
    Bablic
    Babylon
    Bing Translator
    Dict.cn
    Dictionary.com: Translation
    FreeTranslation
    Free Translator
    Free Website Translation
    Frengly
    Gengo
    Google Input Tools - Makes it easy to type in the language you choose, anywhere on the web.
    Google Translate
    Google Tranlslate Extension
    IdiomaX Translation
    India Typing
    imTranslator
    iTranslate
    iTranslate Voice
    Lexicool Translation
    Linguee
    LingvoSoftOnline
    Microsoft Translator
    Noslang
    OdysseyTranslator
    Pleco
    PROMT-Online
    Reddit/r/translator
    Reverso
    Slangit
    Systran
    Translate.com
    Unbabel
    WorldLingo
    WorldReference.com
    Yamli (Arabic Search Engine)
    Yandex Translate

Video Search Engines

    YouTube
    Google video
    Yahoo video search
    Bing videos
    AOL videos
    StartPage video search
    Veoh
    Vimeo
    360daily
    Official Facebook video search
    Crowd tangle (Facebook video search)
    Internet archive open source movies
    Live Leak
    Facebook live video map
    Meta Tube
    Geo Search Tool: Search for all movies according to a specific query entered by the user – the result set will be further filtered according to the distance from a specific location (city, village, intersection) and according to a specific time frame (past hour, past two or three hours ..etc.).
    Earth Cam
    Insecam

Internet Of Things (IoT) devices search engines

    Shodan: Shodan is the world’s first search engine for Internet-connected devices.
    ZoomEye
    123cam
    Airport webcams
    Insecam
    Lookr
    Earthcam
    Openstreetcam
    Opentopia
    Pictimo
    Reolink – list of unsecured cameras
    The webcam network
    Thingful
    Thingiverse
    Webcam.nl (NL)
    Webcams.travel
    Worldcam
    censys

Image Analysis

   ExifTool
   Exif Search
   FotoForensics
   Gbimg.org
   Ghiro
   ImpulseAdventure
   Izitru
   Jeffreys Image Metadata Viewer
   JPEGsnoop
   Metapicz

Stock Images

   AlltheFreeStock
   Death to Stock
   Freeimages
   Freestocks.org
   Gratisography
   IM Free
   ISO Republic
   iStockphoto
   Kaboompics
   LibreStock
   Life of Pix
   NegativeSpace
   New Old Stock
   Pixabay
   Pexels
   Stocksnap
   Shutterstock
   tookapic
   Unsplash - Free high-resolution photos.

Video Search and Other Video Tools

   Aol Videos
   Bing Videos
   Blinkx
   Clarify
   Clip Blast
   Custom YouTube Search Tools
   DailyMotion
   Deturl
   DownloadHealper
   Earthcam
   Frame by Frame - Browser plugin that allows you to watch YouTube videos frame by frame.
   Geosearch
   Internet Archive: Open Source Videos
   LiveLeak
   Metacafe
   Metatube
   Montage
   Reverse Image Search Tools
   Veoh
   Vimeo
   Voxalead
   Yahoo Video Search
   YouTube
   YouTube Data Viewer
   ccSUBS - Download Closed Captions & Subtitles from YouTube

Radio and Podcasts Tools

   Clammr
   iTunes Podcasts
   Listelive
   Pocket Casts
   Podcast Chart
   Podcast Directory
   Podkicker

Academic Resources and Grey Literature

   Academia
   Academic Journals
   African Journal Online
   American Society of Civil Engineers
   Base
   Bibsonomy
   Cambridge Journals
   The Collection of Computer Science Bibliographies - The CCSB is a collection of bibliographies of scientific literature in computer science from various sources, covering most aspects of computer science.
   Core
   Elsevier
   Google Scholar
   Grey Guide
   Grey Literature (HLWIKI International)
   Grey Literature – List of Gateways
   Grey Literature Report
   Grey Literature Strategies
   GreyNet International
   HighWire: Free Online Full-text Articles
   Journal Guide
   Journal Seek
   JSTOR - Search over 10 million academic journal articles, books, and primary sources.
   Lazy Scholar
   Leibniz Information Centre For Science and Technology University Library - indexes all reports of German publicly funded projects and many scientific papers.
   Microsoft Academic
   NRC Research Press
   Open Access Scientific Journals
   Open Grey
   The Open Syllabus Project
   Oxford Journals
   PubMed - Search more than 27 millions citations for biomedical literature from MEDLINE, life science journals, and online books.
   Quetzal Search
   Research Gate
   SAGE Journals
   ScienceDirect
   SCIRP
   Springer
   ScienceDomain
   Science Publications
   Taylor & Francis Online
   Wiley
   World Digital Library
   World Science
   Zetoc

Books and Reading

   Amazon Cheap Books
   Blinkist
   Bookbub
   Bookish
   Booklikes
   Bookmate
   Bookseer
   Books on the Knob
   Calibre
   Daily Cheap Reads
   ExplainToMe
   Favobooks
   Free Book Search.net
   Free Kindle Books
   Gnooks
   Google Books
   Goodreads
   Groundera
   How Long To Read
   I love my Kindle
   Internet Archive Texts
   Jellybooks
   Just Free Books
   Keendly
   KindleFeeder
   KindleNationDay
   KindleWorld
   Leatherbound
   Lendle
   LibraryThing
   Librivox
   Loyal Books
   Many Books
   MobiPocket
   Narro
   Open Culture: Free Audiobooks
   OpeningtheBook
   Overdrive
   ParrotRead
   Pixel of Ink
   Project Gutenberg
   Read
   Reader IQ
   Readgeek
   Readism
   Riffle
   SendtoKindle
   Shelfie
   TasteKid: Books
   TheBooksProject
   TheFrugaleReader
   Tinderizer
   WhatShouldIReadNext
   YourNextRead

Geospatial Research and Mapping Tools

   Animaps
   Atlasify
   Batchgeo
   Bing Maps
   CartoDB
   Colorbrewer
   CrowdMap
   CTLRQ Address Lookup
   Custom Satellite View Tools
   Dominoc925
   DualMaps
   GeoGig
   GeoNames
   Esri
   Flash Earth
   Follow Your World
   Google Earth
   Google Maps
   Google Maps Streetview Player
   Google My Maps
   GPSVisualizer
   GrassGIS
   Here
   Hyperlapse
   Inspire Geoportal
   InstantAtlas
   Instant Google Street View
   Kartograph
   Leaflet
   MapAList
   MapBox
   Mapbuildr
   Mapchart.net
   Maperitive
   MapHub
   MapJam
   Mapline
   Mapquest
   Modest Maps
   NGA GEOINT
   OpenLayers
   Polymaps
   Perry Castaneda Library
   Open Street Map
   QGIS
   QuickMaps
   StoryMaps
   Scribble Maps
   Terrapattern
   Tableau
   Timescape
   View in Google Earth
   Wikimapia
   World Aeronautical Database
   WorldMap Harvard
   ViaMichelin
   Yahoo Maps
   Zeemaps

News

News/Newspaper Search Engines

   1stHeadlines: Breaking news headline.
   Google News Archive
   Google Newspaper Archive
   News Now
   Newspaper Archives: Contains Newspaper Archives 1607-2017 and Obituaries & Family History Records.
   All you can read
   Newspapers Search
   Findmypast: US and world  historical( China, Denmark, France, Germany, Jamaica, and South Africa are also searchable within the collection) Newspaper archive.
   Daily Earth
   Search U.S. Newspaper Directory, 1690-Present
   Newspaper Map
   World News
   The paperboy
   Newsography: International relations and armed conflicts global news aggregator and historical database.
   Online Newspapers: Online Newspaper Directory for the World.
   YouGotTheNews: Search Engine for US News – Search thousands of national, business, and local news sources.
   Library of Congress Newspapers directory  & 100 Years Ago Today: Search U.S. Newspaper Directory, 1690-Present using these two links from the Library of Congress.

News Sites

    1st Headlines
    ABYZNewsLinks
    AllYouCanRead
    AP
    Associated France Press (AFP)
    BBC News
    Bing News
    CNN
    Cyber Alert
    DailyEarth
    DPA International
    The Economist Explorer
    Euronews
    Europe Media Monitor (EMM)
    NewsExplorer
    Factiva
    France24
    Google News
    Google News Print Archive
    HeadlineSpot
    Itar-Tass
    List of Newspapers.com
    MagPortal
    News Map
    News Now
    Newseum - Today Front Pages
    Newslink
    NewsLookup
    Newspaper Map
    Newspaperindex
    Newspapers.com
    NewsWhip
    OnlineNewspapers
    Paperboy
    PR Newswire
    Press Reader
    Reuters
    Silobreaker
    Topix
    WorldNews
    World-Newspapers
    Yahoo News

Fake News Detection

    Snopes: Discovers false news, stories, urban legends and research/validate rumors to see whether it is true.
    Hoaxy: Check the spread of false claims (like a hoax, rumor, satire, news report) across social media sites. The site derives its results from reputable fact checking organizations to return the most accurate results.
    FactCheck: This site is partnered with Facebook to help identify and label fake news reported by its users. It also monitors different media for the false info covering a wide range of topics like health, science, hoaxes spread through Spam emails.
    ReviewMeta: Analysis Amazon user reviews.
    Reporter Lab: Gives a map of global fact-checking sites.
    Truth Or Fiction: Discover fake news in different topics like politics, nature, health, space, crime, police and terrorism…etc.
    Hoax-Slayer: Focuses on email scam and social media hoaxes.
    Verification Handbook: A definitive guide to verifying digital content for emergency coverage available in different languages.
    Verification junkie: This is a directory of tools for verifying, fact checking and assessing the validity of eyewitness reports and user self-published content online.
    citizen evidence: tools and lessons to teach people how to authenticate user-generated online contents. Managed by Amnesty International.

News Digest and Discovery Tools

   Flipboard
   Hubii
   Inshorts
   Inside
   News360
   NewsBot
   Newsinshorts
   Nod
   Nuzzle
   Quibb
   Reeder
   Spike
   Storyful
   Superdesk
   Trooclick

Fact Checking

   About Urban Legends
   Captin Fact
   Churnalism
   Check
   Citizen Desk
   Emergent
   Fact Check
   Full Fact
   MediaBugs
   Snopes - The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
   Verification Handbook
   Verification Junkie
   Verily

Data and Statistics

   AGOA Data Center
   AidData
   ADB Statistics and Databases
   AWS Public Datasets
   Bank for International Settlements Statistics
   BP Statistical Review of World Energy
   Berkely Library: Data Lab
   CIA World Factbook
   Center for International Earth Science Information Network
   CEPII
   Colombia University Library: General Statistical Sources, International Statistics
   Data.gov.uk
   DBPedia
   European Commission Eurobarometer
   European Union Open Data Portal
   Eurostat
   FAOSTAT
   Freebase
   Gapminder World
   GEOHIVE
   globalEDGE Database of International Business Statistics
   Google Finance
   Google Public Data Explorer
   Government of Canada Open Data
   HIS Piers
   Human Development Reports
   IDEA Databases
   International Labour Comparisons
   International Trade Center
   ILOSTAT
   ILO World Employment and Social Outlook Trends
   IMF World Economic Outlook Database
   Index Mundi
   International Data Base
   International Energy Agency Energy Atlas
   International Energy Agency Statistics
   International Finance Corporation Data and Indicators
   Junar
   Knoema
   LandMatrix
   Latinobarometro
   Library, University of Michigan: Statistics and Datasets
   Nation Master
   OECD Aid Database
   OECD Data
   OECD Factbook
   OECD Statistics Directorate
   OFFSTATS
   Open Data Network
   Open Government Data
   Paul Hensel’s General Informational Data Page
   Penn World Table
   Pew Research Center
   Population Reference Bureau Data Finder
   PRS Risk Indicators
   Scylla - Various scans and database dumps.
   SESRIC Basic Social and Economic Indicators
   SESRIC Databases
   Statista
   The Atlas of Economic Complexity
   The Data and Story Library
   Trading Economics
   Transparency.org Corruption Perception Index
   UN COMTRADE Database
   UNCTAD Country Fact Sheets
   UNCTAD Investment Country Profiles
   UNCTAD STAT
   UN Data
   UNDPs Human Development Index
   UNECE
   UNESCO Institute for Statistics
   UNIDO Statistical Databases
   UNStats Social Indicators
   Upsala Conflict Data Program
   US Data and Statistics
   WHO Data
   World Bank Data
   World Bank Data
   World Bank Doing Business
   World Bank Enterprise Surveys
   World Bank Investing Across Borders
   World Integrated Trade Solution
   WTO Statistics
   Vizala
   Zanran

Web Monitoring

   AlertBox
   Alltop
   Awasu
   Bridge.Leslibres
   Bridge.Suumitsu
   ChangeDetect
   ChangeDetection
   CurioStudio
   Deltafeed
   DiggReader
   Feed43
   FeedBooster
   Feederator
   Feed Exileed
   Feed Filter Maker
   Feedly
   FeedReader
   FetchRSS
   Flipboard
   FollowThatPage
   Google Alerts - A content change detection and notification service.
   InfoMinder
   IQAlerts
   Mention
   Netvibes
   Newsblur
   NewsRSSTicker
   OmeaReader
   OnWebChange
   Reeder
   RSS Bridge
   RSS Feed Reader
   RSS Micro
   RSS Search Engine
   RSS Search Hub
   RSSOwl
   RSS Subscription Extension
   Sage
   Selfoss
   Silobreaker
   Talkwalker
   The Old Reader
   versionista
   visualping
   WebReader
   WebSite Watcher
   Winds

Bookmarking

   Bibsonomy
   BonzoBox
   Booky
   Buttons
   Candybank
   ChannelKit
   Clipix
   Curabase
   Diigo
   Dragdis
   Evernote
   Dropmark
   eLink
   FAVable
   Google Bookmarks
   Instapaper
   Juxtapost
   Keeeb
   Klart
   Linkman Pro
   Linkstash
   LiveBinders
   Memit
   Memonic
   Microsoft OneNote
   mochimarks
   Papaly
   Paperwork
   Pearltrees
   Pocket
   Raindrop
   Refind
   Scoop.it
   Scrapbook
   Scrible
   Sitehoover
   Spaaze
   Stache
   start.me
   Thinkery
   Trackplanet
   Wepware
   Wonderpage
   xmarks
   Zotero

Startpages

   allmyfaves
   ighome
   iloggo
   Kadaza
   Myfav.es
   My Yahoo
   Protopage
   Start.io
   start.me
   Symbaloo
   uStart.org
   Yourport
   Zeadoo
   Zenstart

Browsers

   Brave
   CentBrowser
   Chrome
   Comodo Dragon
   Coowon
   Edge
   Firefox
   Maxthon
   Opera
   Safari
   Sleipnir
   Slimjet
   SRWare Iron
   Tor Browser - Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet.
   Torch
   UCBrowser
   Vivaldi
   Yandex Browser

Offline Browsing

   A1 Website Download - Download entire websites to disk.
   Cyotek WebCopy
   gmapcatcher
   Hooey webprint
   HTTrack - Allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.
   Offliberty
   Resolver
   SiteSucker
   WebAssistant
   Website Ripper Copier

VPN Services

   TorrentFreak List of VPNs

Note-taking

   Cherrytree
   Evernote
   Fetchnotes
   Google Keep
   inkdrop
   Kl1p
   Laverna
   Listacular
   Microsoft OneNote
   Notebook
   Scribble
   Simplenote
   somnote
   Squid
   Tomboy
   Workflowy
   wridea
   Calculist

Annotation Tools

   A.nnotate
   Annotator
   Diigo
   Easy Annotate
   Hypothesis
   Note Anywhere
   Pith.li
   Pund.it
   Skitch

Writing and Office Tools

   Arguman
   Bibme
   Cite This For Me
   Classeur.io
   FreeOffice
   Grammarly
   GoogleDocs
   KingSoft
   LibreOffice
   MS Office
   Office Online
   OmniOutliner
   OnlyOffice
   oTranscribe
   Scrivener
   TextExpander
   UltraEdit
   WriteApp

Slide Show and Presentation Tools

   Canva
   Convert Words to Time - Converts the number of words in a presentation or speech to how many minutes it will take to read.
   Deckset
   emaze
   GoogleDocs
   Haiku Deck
   Keyonote
   KingSoft
   KnowledgeVision
   LibreOffice
   Live Slides
   Mighty Meeting
   Movenote
   MS Office
   MySlidePresenter
   Powtoon
   Presentation Next
   presenterswall
   Prezi
   Slidedog
   Slideidea
   SlidePresenter
   SlideRocket
   Slides
   SpeechInMinutes
   Sway
   vcasmo
   Visme
   Zoho Docs

Digital Publishing

   Canva
   Doclayer
   Issuu
   Lucidpress
   Mag.io
   My eBook
   Omeka
   Scribd
   Yudu

Newsletter Tools

   AWeber
   BombBomb
   Campayn
   Canva
   ConstantContact
   Freshmail
   GetResponse
   iContact
   MadMimi
   Mailchimp
   Mailjet
   Mailup
   Newsletter Creator for Gmail
   sendinblue
   Sendicate
   Sendloop
   Signupto
   TinyLetter
   VerticalResponse
   Vision6

Digital Storytelling

   Adobe Voice
   Animatron
   Animoto
   Atavist
   Capzles
   Closr
   eStory
   Exposure
   Interlude
   Klynt
   MakeBeliefsComix
   Metta
   Neatline
   Odyssey
   Pageflow
   Photodex
   Piclits
   Racontr
   RaptMedia
   RawShorts
   Shorthand Social
   Slate
   Steller
   Storify
   Storyboard
   Storyform
   StoryMap
   StoryMaps
   Sway
   Thinglink
   Tripline
   Wevideo
   VideoScribe
   Zaption
   Zooburst

Infographics and Data Visualization

   Adobe Color CC
   Aeon
   Arbor.js
   Beaker
   Befunky
   Bizint
   Cacoo
   Canva
   chartblocks
   Charted
   Chartico
   Chart.js
   Circos
   creately
   Crossfilter
   csvkit
   Data Visualization Catalogue
   D3js
   Datawrapper
   Dropmark
   dygraphs
   easely
   Exhibit
   Flot
   FusionCharts
   Google Developers: Charts
   GraphX
   Helpmeviz
   Highcharts
   Hohli
   Inkscape
   Infogr.am
   Java Infovis Toolkit
   JpGraph
   jqPlot
   Kartograph
   Knoema
   Leaflet
   Listify
   Linkuroius
   LocalFocus
   Lucidchart
   Mapline
   Nodebox
   OpenLayers
   Palladio
   Piktochart
   Pixcone
   Pixxa
   Plotly
   SpicyNodes
   StoryMap
   QlikView
   Quadrigram
   Raphael
   RAW
   RichChartLive
   Shanti Interactive
   Silk
   Snappa
   Statpedia
   Tableau
   Tableau Public
   Tagul
   Textures.js
   Tiki-toki
   Tik-tok
   Timeflow
   Timeglider
   Timeline
   Timeline
   Timescape
   Timetoast
   Weave
   Wordle
   Venngage
   Visage
   Vis.js
   Visme
   Visualize Free
   Visualize.me
   visually
   Vortex
   ZingChart

Image and Photo Editing

   Apple Photos
   Aviary
   Befunky
   Croppola
   FastSTone
   Fotor
   Foto Flexer
   Gimp
   Hugin
   Image Composite Editor
   Image Tricks Lite
   Irfanview
   LightZone
   Lunapic
   OnlineImageSplitter
   Paint.NET
   PhotoPlus
   Photoscape
   Photoshop
   picfull
   PicMoneky
   Pixlr
   Polarr
   Seashore
   SumoPaint
   TinyPNG

Productivity Tools

   2Do
   Any.do
   Asana
   Dapulse
   Droptask
   Flask
   Focus booster
   Freecamp
   Good night Chrome
   Leechblock
   MorningRoutine
   MyLifeOrganized
   Pintask
   PomodoroTechnique
   Producteev
   Remember the Milk
   RescueTime
   Restya
   StayFocusd
   Taskade
   Taskboard
   TikiTiki
   Tinygain
   Trello
   Todo.ly
   Todo
   Todoist
   Toggle
   Tomighty
   Toodledo
   Workflowy
   Wunderlist

E-mail Management

   ActiveInbox
   AutoHotkey
   Batched Inbox
   Baydin
   BetterGmail
   Block Sender
   Boomerang Mail
   ClearContext
   Cleanfox
   CloudMagic
   Complete
   FindBigMail
   Followupthen
   Gpum
   Hiver
   Integrated gmail
   Mailstore
   Hubspotsales
   Minimalist
   NudgeMail
   Rapportive
   Sanebox
   Send for Gmail
   Sortd
   TrueNew
   Ugly Email
   Unroll.me - Easily unsubscribe in one click from email subscriptions.
   Wisestamp

Document and Reference Management

   Colwiz
   DocumentCloud
   Endnote
   F1000
   Investigative Dashboard Search
   ManualsLib - Database of More Than 2.6M Manuals.
   Mendeley
   Omnity
   Overview
   Papers
   Readcube
   RefME
   Zotero

PDF Management

   Foxit Reader
   ilovepdf
   PDFExpert
   PDFx
   Smallpdf
   Tabula
   XODO
   Xpdf
   Sejda

OCR Tools

   I2OCR
   Free Online OCR
   OCRmyPDF
   Online OCR

Cloud Storage and File Sharing

   4Shared
   ADrive
   Amazon Cloud drive
   Box
   Boxcryptor
   Cloudapp
   CloudFuze
   CloudHQ
   Copy
   Dropbox
   Dropcanvas
   Droplr
   DropSend
   Duplicati
   Egnyte
   Ge.TT
   GoodSync
   Google Drive
   hubiC
   iCloud
   Mediafire
   Mega
   Mindbox
   Mozy
   Multicloud
   Onedrive
   Onehub
   Otixo
   pCloud
   Sendthisfile
   Sendspace
   Simple.Savr
   Spideroak
   SugarSync
   Syncthing
   TransferBigFiles
   Tresorit
   WeTransfer

Web Automation

   Cloud Work
   Dropbox
   IFTTT
   Sikuli
   WeWiredWeb
   Workflow
   Zapier

Dashboard Tools

   Analytics Portfolio
   Chartio
   Clicdata
   Cyfe
   Dashthis
   DataDeck
   Geckoboard
   Happy Metrics
   Klipfolio
   Qlik
   Visually

Wikis

   DokuWiki
   Foswiki
   MediaWiki
   PmWiki
   Scribbleton
   TiddlyWiki
   Tiki Wiki
   Torchpad
   TWiki
   Wikia
   Wikidot
   Wikispaces
   wikidPad
   Zim

Collaboration and Project Management

   10kinsights
   15Five
   92fiveApp
   5pm
   ActionMint
   ActiveCollab
   Advanseez
   Agilewords
   Agilezen
   AllThings
   Any.do
   Apollo
   Asana
   Authorea
   AWW
   Azendoo
   Basecamp
   Binfire
   Breeze
   Canvanizer
   Casual
   Cardboardit
   Cardsmith - Build visual collaboration systems with the familiarity of sticky notes on a white board.
   CloudApp
   Cnverg
   Collabtive
   CollaborateCloud
   Comindwork
   Conceptboard
   Confluence
   CoSketch
   Crowdbase
   Dayboard
   Deekit
   Draw.to
   eGroupWare
   Elegantt
   Encrypted Cloud
   Firepad
   Firesub
   Flask
   Float
   Flockdraw
   Flow
   Frame
   Freedcamp
   GetDoneDone
   Glasscubes
   GQueues
   GroupZap
   Hightail
   hitask
   Huddle
   KabanTool
   Kanboard
   Kerika
   Linky dink
   Listacular
   Loomio
   LumoFlow
   Mammoth
   MyKanzen
   Nozbe
   Nutcache
   Minute
   Mural
   OmniGroup
   OnlyOffice
   Padlet
   Piematrix
   Pinstriped
   PivotalTracker
   Plan
   Planleaf
   Planzone
   Podio
   PrimaryPad
   ProjectManager
   ProjectPlace
   ProofHub
   Quip
   Quire
   Realtimeboard
   Redbooth
   Restya
   Reverb
   ScadaPlan
   Scribblar
   SeavusProjectViewer
   Smartsheet
   Stackfield
   Stormboard
   Sync.in
   SyncSpace
   Taiga
   TargetProcess
   Taskboard
   TeamAllocator
   Team.fm
   Teamgum
   Team Pad
   TeamWork
   TeamWorklive
   TitanPad
   Todoyu - Original project discontinued - now maintained at Todoyu-PHP7.x
   Transparent Business
   Trello
   Tuzzit
   Twiddla
   Twoodo
   updatey
   Web Whiteboard
   Weekdone
   Wekan
   wePaste
   Whiteboard
   Whiteboard
   Whiteboard Fox
   Worknoard
   Workfront
   Wrike
   Yammer
   YouTrack
   Zoho

Communication Tools

   Adobe Connect
   AnyDesk
   AnyMeeting
   Auralink
   Babblebay
   BeamYourScreen
   Blackboard
   blind
   Campfire
   clearvale
   Digital Samba
   Discourse
   eBLVD
   Ekiga
   Encrypted Cloud
   Exo Platform
   FaceFlow
   Fleep
   Flowdock
   FreeConferenceCall
   FreeScreenSharing
   Friends
   Glance
   GoToMeeting
   Highfive
   HipChat
   Icq
   iLinc
   Infinite
   Intercall
   iWowWe
   Jam vee
   Jitsi
   Join.me
   Jostle
   Lets Chat
   lifesize
   Linphone
   Live Conference Pro
   Lucid Meetings
   LumoFlow
   Mashme tv
   Meet.fm
   MeetingOne
   MeWe
   mikogo
   mobilimeet
   MyBB
   omNovia
   ooVoo
   Open Whisper Systems
   Personify
   PGi iMeet
   Phorum
   Polycom
   Quicktopic
   ReadyTalk
   RingCentral
   Rocket.Chat
   screenleap
   Sharetronix
   sifonr
   Simple Signal
   Skarpline
   Skype
   Slack
   Socialtext
   StartMeeting
   Talky
   Teamviewer
   Telegram
   Tibbr
   Tixeo
   Toc
   TrueConf
   Twchat
   Unicorns
   Vanilla Forums
   Veeting rooms
   VeriShow
   Viadesk
   VideoLink2
   Vivicom
   VMukti
   Webex
   WhatsApp
   worklife
   Yugma
   Zeetings
   Zoho Meeting
   Zoom
   Zulip
   Zyncro

Calendars and Scheduling

   Assistant
   Bunchapp
   Calendly
   Cozi
   Doodle
   Foogi
   Meekan
   Meetin.gs
   MyMemorizer
   ScheduleOnce
   TeamUp
   Teamweek

Mind Mapping, Concept Mapping and Idea Generation Tools

   The Brain
   Bubbl.us
   Comapping
   Coogle
   Creately
   Edynco
   Fast Idea Generator
   Freemind
   Freeplane
   Germ
   GroupMap
   iMindMap
   iMindQ
   InstaGrok
   Lucidchart
   Mattermap
   Mind42
   Mind Genius
   Mindjet
   Mind Manager
   Mind Map
   Mindmeister
   Mindomo
   MindMup
   Popplet
   Realtimeboard
   Scapple
   Sketchboard
   Slatebox
   Spicynodes
   Spiderscribe
   StoryMap
   Wise Maping
   yWorks
   Xmind

Social Network Analysis

   Gephi
   NodeXL
   ORA
   Sentinel Visualizer
   Wynyard Group
   Visual Investigative Scenarios

Privacy and Encryption Tools

   Abine
   AdblockPlus
   Adium
   Axcrypt
   Blender
   boxcryptor
   CCleaner
   Chatsecure
   ClearConsole
   Click&Clean
   Crypto.cat
   Disconnect
   Do Not Track
   Duck Duck Go Search Engine
   EncSF MP
   Encrypted Cloud
   Epic Privacy Browser
   Eraser
   FileVault
   Ghostery
   Gmelius for Inbox by Gmail
   GNU PG
   GPG Tools
   Guardian Project
   Guerrilla Mail
   Hotspot Shield
   HTTPs Everywhere
   I2P
   IBackup
   IPLeak
   Ixquick Search Engine
   justdeleteme
   KeePass Password Safe
   Lastpass
   Lockbin
   Mailbox
   Mailvelope
   Master Password
   Motherpipe
   Nixory
   NoScript
   Open DNS
   Open PGP
   Open Whisper Systems
   Oscobo Search Engine
   OSSEC
   Panopticlick
   Peerblock
   Pidgin
   Pixel Block
   Policeman
   Privacy Badger
   Privacy Pal
   Privazer
   Proton Mail
   Qubes
   Ricochet
   Script Safe
   Securesha
   Silent circle
   Snort
   Spideroak
   Surveilliance Self Defense
   Tails
   Thunderbird
   Tor Project
   uBlock
   Unseen.is
   Wickr
   WOT
   VeraCrypt
   Viivo - End Of Life annoucement. EOL = July 1 2018.
   ZMail

DNS

Amass

The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations. Written in Go.

Other Tools

  • Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
  • Belati - Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
  • Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
  • The Harvester - Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
  • Intrigue Core - Framework for attack surface discovery.
  • Maltego - Interactive data mining tool that renders directed graphs for link analysis.
  • OpenRefine - Free & open source power tool for working with messy data and improving it.
  • Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
  • OSINT Framework - Web based framework for OSINT.
  • OsintStalker - Python script for Facebook and geolocation OSINT.
  • Outwit - Find, grab and organize all kinds of data and media from online sources.
  • Photon - Crawler designed for OSINT
  • Pown Recon - Target reconnaissance framework powered by graph theory.
  • QuickCode - Python and R data analysis environment.
  • Recon-ng - Full-featured Web Reconnaissance framework written in python.
  • SecApps Recon - Information gathering and target reconnaissance tool and UI.
  • sn0int - Semi-automatic OSINT framework and package manager.
  • Zen - Find email addresses of Github users

Grey literature

Grey information includes the following -and more (Academic papers, preprints, proceedings, conference & discussion papers, research reports, marketing reports, technical specifications and standards, dissertations, theses, trade publications, memoranda, government reports and documents not published commercially, translations, newsletters, market survey, draft version of books, articles.

Most important Grey literature (academic and scholarly resources) websites can be found in the following list:

    Academia
    Academic index
    Academic torrents
    American Doctoral Dissertations
    ArchiveGrid
    Google scholar
    Bielefeld academic search engine
    Archive portal Europe
    Social Science Research Network
    National library of Australia
    ScienceDirect
    PQDT Open
    The national archive of the United Kingdom
    Oxford academic
    Page Press
    CERN Document Server
    High wire
    Grey guide
    Beyond citation
    Crossref

Data Leak Websites

   WikiLeaks
   Cryptome
   GlobaLeaks: is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives
   BalkanLeaks: Focus on exposing organized crime and political corruption in Balkan.
   Al Jazeera’s Investigative Unit: Leaks focusing on  Arabic countries.

OSINT

Awesome-OSINT - Domains/Sources

https://github.com/jivoi/awesome-osint 

http://7photos.net/
http://92fiveapp.com/
http://a.nnotate.com/
http://academia.edu/
http://academic.research.microsoft.com/
http://advangle.com/
http://adwords.google.com/
http://agoa.info/
http://aiddata.org/
http://all-io.net/
http://allthefreestock.com/
http://alltop.com/
http://andrewmohawk.com/
http://annotatorjs.org/
http://answers.yahoo.com/
http://anydesk.com/
http://app.graphystories.com/
http://app.teachingprivacy.com/
http://arborjs.org/
http://archive.is/
http://archive.org/
http://archive.recapthelaw.org/
http://ascelibrary.org/
http://atlas.cid.harvard.edu/
http://auralink.com/
http://aws.amazon.com/
http://backtweets.com/
http://barometer.agorapulse.com/
http://batchgeo.com/
http://beakernotebook.com/
http://bitreading.com/
http://biznar.com/
http://blog.booksontheknob.org/
http://blog.inside.com/
http://bluenod.com/
http://boardreader.com/
http://bombbomb.com/
http://bonzobox.com/
http://booklikes.com/
http://bookseer.com/
http://booky.io/
http://bottlenose.com/
http://breachorclear.jesterscourt.cc/
http://brianfolts.com/
http://builtwith.com/
http://bunchapp.io/
http://buzzsumo.com/
http://cachedview.com/
http://campayn.com/
http://cardsmith.co/
http://ccsubs.com/
http://centralops.net/
http://channelkit.com/
http://chartico.com/
http://charts.hohli.com/
http://circos.ca/
http://citeseer.ist.psu.edu/
http://clarify.io/
http://classeur.io/
http://code-search.uni.lu/
http://collabtive.o-dyn.de/
http://colorbrewer2.org/
http://com.lullar.com/
http://commun.it/
http://competeshark.com/
http://comtrade.un.org/
http://coowon.com/
http://cosketch.com/
http://create.visual.ly/
http://creately.com/
http://creativecommons.org/
http://croppola.com/
http://crowdbase.com/
http://crowdriff.com/
http://csulb.libguides.com/
http://ctrlq.org/
http://dailyearth.com/
http://data.mashedworld.com/
http://data.un.org/
http://data.worldbank.org/
http://datatopics.worldbank.org/
http://datavizcatalogue.com/
http://dcpu.ru/
http://deathtothestockphoto.com/
http://dedicatedornot.com/
http://deturl.com/
http://dict.cn/
http://digg.com/
http://diytoolkit.org/
http://dmitrybaranovskiy.github.io/
http://dnshistory.org/
http://dnssec-debugger.verisignlabs.com/
http://dnsviz.net/
http://domainbigdata.com/
http://donottrack.us/
http://doodle.com/
http://dothop.com/
http://draw.to/
http://dropcanvas.com/
http://dygraphs.com/
http://e-mailvalidator.com/
http://ec.europa.eu/
http://edition.cnn.com/
http://education.iseek.com/
http://ekiga.org/
http://email-format.com/
http://emm.newsexplorer.eu/
http://en.arguman.org/
http://encfsmp.sourceforge.net/
http://endnote.com/
http://energyatlas.iea.org/
http://eraser.heidi.ie/
http://eu.wiley.com/
http://evernote.com/
http://exif.regex.info/
http://expertpages.com/
http://f1000.com/
http://facenama.com/
http://facesaerch.com/
http://faostat3.fao.org/
http://favobooks.com/
http://feed.exileed.com/
http://feed.janicek.co/
http://feed43.com/
http://fetchrss.com/
http://findface.ru/
http://flask.io/
http://flipboard.com/
http://flockdraw.com/
http://flumes.com/
http://foller.me/
http://follow.net/
http://followcheck.com/
http://followerwonk.com/
http://forebears.io/
http://forums.peerblock.com/
http://foswiki.org/
http://fotoflexer.com/
http://free-website-translation.com/
http://freekindlebooks.org/
http://freemind.sourceforge.net/
http://freeplane.sourceforge.net/
http://freestocks.org/
http://frengly.com/
http://freshmail.com/
http://gbimg.org/
http://ge.tt/
http://generator.acmi.net.au/
http://gengo.com/
http://geogig.org/
http://geosocialfootprint.com/
http://get-nod.com/
http://getpocket.com/
http://getstache.com/
http://gettwitterid.com/
http://gigablast.com/
http://gigatweeter.com/
http://globaledge.msu.edu/
http://googleplussearch.chromefans.org/
http://grass.osgeo.org/
http://greyguide.isti.cnr.it/
http://greylitstrategies.info/
http://groundera.com/
http://groupzap.com/
http://hashtagify.me/
http://hdlab.stanford.edu/
http://hdr.undp.org/
http://helpmeviz.com/
http://here.com/
http://highwire.stanford.edu/
http://hiverhq.com/
http://hlwiki.slais.ubc.ca/
http://home.rootsweb.ancestry.com/
http://hootsuite.com/
http://hosted.ap.org/
http://hubii.com/
http://hugin.sourceforge.net/
http://iab.worldbank.org/
http://iconosquare.com/
http://iloggo.com/
http://image.baidu.com/
http://imgur.com/
http://imindmap.com/
http://imtranslator.net/
http://indiatyping.com/
http://infinitekind.com/
http://infospace.com/
http://ink361.com/
http://inspire-geoportal.ec.europa.eu/
http://instantlogosearch.com/
http://intweets.com/
http://ip2geolocation.com/
http://iqalerts.com/
http://isorepublic.com/
http://itools.com/
http://itranslatevoice.com/
http://journals.cambridge.org/
http://journalseek.net/
http://jpgraph.net/
http://junar.com/
http://justdelete.me/
http://kaboompics.com/
http://kanbantool.com/
http://karmadecay.com/
http://kartograph.org/
http://keeeb.com/
http://keendly.com/
http://keepass.info/
http://kerika.com/
http://kerrick.github.io/
http://keywordtool.io/
http://kindlenationdaily.com/
http://kindleworld.blogspot.com/
http://kl1p.com/
http://klear.com/
http://klout.com/
http://kred.com/
http://ksosoft.com/
http://landmatrix.org/
http://le-tools.com/
http://leafletjs.com/
http://lendle.me/
http://lib.stat.cmu.edu/
http://library.columbia.edu/
http://library.morningstar.com/
http://lightzoneproject.org/
http://likealyzer.com/
http://link.springer.com/
http://linkurio.us/
http://linkydink.io/
http://listify.okfnlabs.org/
http://literatureandlatte.com/
http://losangeles.craigslist.org/
http://mag.io/
http://mailchimp.com/
http://mailtester.com/
http://manageflitter.com/
http://manybooks.net/
http://mapalist.com/
http://mapd.csail.mit.edu/
http://maperitive.net/
http://mapjam.com/
http://masterpasswordapp.com/
http://mediabugs.org/
http://mentionmapp.com/
http://metapicz.com/
http://metareddit.com/
http://metricsparrow.com/
http://mind42.com/
http://mobilimeet.com/
http://modestmaps.com/
http://moose-team.github.io/
http://mozy.com/
http://muckrack.com/
http://mustbepresent.com/
http://myfav.es/
http://neatline.org/
http://negativespace.co/
http://netbootcamp.org/
http://network-tools.com/
http://news.google.com/
http://news.yahoo.com/
http://newsblur.com/
http://newsinshorts.com/
http://newsmap.jp/
http://newspapermap.com/
http://nixory.sourceforge.net/
http://nodexl.codeplex.com/
http://nos.twnsnd.co/
http://nuzzel.com/
http://odysseytranslator.com/
http://office.microsoft.com/
http://offliberty.com/
http://oicweave.org/
http://ok.ru/
http://omeka.org/
http://omgili.com/
http://on.aol.com/
http://onemilliontweetmap.com/
http://online-barcode-reader.inliteresearch.com/
http://online.sagepub.com/
http://onwebchange.com/
http://open-data.europa.eu/
http://open.canada.ca/
http://opengovernmentdata.org/
http://openlayers.org/
http://opensyllabusproject.org/
http://orbisdirectory.bvdinfo.com/
http://origin.mxtoolbox.com/
http://osintframework.com/
http://otranscribe.com/
http://pageflow.io/
http://papersapp.com/
http://parrotread.com/
http://pennystocks.la/
http://philogb.github.io/
http://photobucket.com/
http://pingroupie.com/
http://pinstriped.com/
http://pith.li/
http://plusfeed.frosas.net/
http://polymaps.org/
http://pomodorotechnique.com/
http://popplet.com/
http://primarypad.com/
http://privazer.com/
http://qgis.org/
http://qrobe.it/
http://quibb.com/
http://qzone.qq.com/
http://rapportive.com/
http://raw.densitydesign.org/
http://recordspedia.com/
http://recruitin.net/
http://redditmetrics.com/
http://redirectdetective.com/
http://reederapp.com/
http://restya.com/
http://reunion.com/
http://reverbapp.com/
http://ricks-apps.com/
http://sameid.net/
http://scadaplan.com/
http://scribble.wreally.com/
http://scribblemaps.com/
http://scribbleton.com/
http://scylla.sh/
http://sdelements.github.io/
http://search.aol.com/
http://search.carrot2.org/
http://search.fb.com/
http://search.lycos.com/
http://search.twitter.com/
http://searchlr.net/
http://seashore.sourceforge.net/
http://selfoss.aditu.de/
http://seotoolsforexcel.com/
http://sharetronix.com/
http://simplenote.com/
http://sketchboard.io/
http://slangit.com/
http://sleepingtime.org/
http://slidedog.com/
http://slideidea.com/
http://smallpdf.com/
http://smallseotools.com/
http://smashfuse.com/
http://snapbird.org/
http://snoopsnoo.com/
http://snoopstation.com/
http://snradar.azurewebsites.net/
http://social.downornot.com/
http://socialblade.com/
http://socialmention.com/
http://socialrank.com/
http://socialsearching.info/
http://socialstats.ru/
http://softbytelabs.com/
http://somcloud.com/
http://spark.apache.org/
http://spoonbill.io/
http://spotlight.svezet.ru/
http://spydialer.com/
http://square.github.io/
http://squidnotes.com/
http://stackexchange.com/
http://start.io/
http://statpedia.com/
http://storyful.com/
http://storymaps.arcgis.com/
http://subreddits.org/
http://sunlightfoundation.com/
http://sync.in/
http://tabula.technology/
http://targetolog.com/
http://thebooksproject.co/
http://theoldreader.com/
http://thepund.it/
http://thinkery.me/
http://tiddlywiki.com/
http://timeglider.com/
http://timeline.knightlab.com/
http://tinderizer.com/
http://tinyletter.com/
http://toc.im/
http://todotxt.com/
http://toolbar.netcraft.com/
http://tools.seochat.com/
http://translate.reference.com/
http://translation.babylon.com/
http://translation2.paralink.com/
http://transparentbusiness.com/
http://trends24.in/
http://trendsmap.com/
http://trooclick.com/
http://trueconf.com/
http://twbirthday.com/
http://twchat.com/
http://tweepsect.com/
http://tweet4.me/
http://tweeten.xyz/
http://tweetpsych.com/
http://tweetreach.com/
http://tweetreports.com/
http://tweettunnel.com/
http://twicsy.com/
http://twiki.org/
http://twittercounter.com/
http://twitterfall.com/
http://twubs.com/
http://ubersuggest.org/
http://unctad.org/
http://unctadstat.unctad.org/
http://unstats.un.org/
http://updatey.com/
http://urbanlegends.about.com/
http://urlquery.net/
http://vanillaforums.org/
http://verificationhandbook.com/
http://verificationjunkie.com/
http://verify-email.org/
http://versionista.com/
http://video.search.yahoo.com/
http://viewdns.info/
http://visjs.org/
http://visual.ly/
http://visualizefree.com/
http://vizualize.me/
http://vk-to-rss.appspot.com/
http://vk.barkov.net/
http://vk.com/
http://vk5.city4me.com/
http://vkparser.ru/
http://voxalead.labs.exalead.com/
http://w3.unece.org/
http://wappwolf.com/
http://webboar.com.w3snoop.com/
http://webmeup.com/
http://website.informer.com/
http://websta.me/
http://webwhiteboard.com/
http://weibo.com/
http://whatismyipaddress.com/
http://whiteboard.co/
http://whiteboard.drewwilson.com/
http://whois.domaintools.com/
http://whoisrequest.com/
http://wiki.dbpedia.org/
http://wikidpad.sourceforge.net/
http://wikimapia.org/
http://winds.getstream.io/
http://wits.worldbank.org/
http://wn.com/
http://worldaerodata.com/
http://worldc.am/
http://worldmap.harvard.edu/
http://worldwidescience.org/
http://wridea.com/
http://www.timetoast.com/
http://www.todoyu.com/
http://www.tomighty.org/
http://www.topix.com/
http://www.torchbrowser.com/
http://www.trackur.com/
http://www.tradezone.com/
http://www.tradingeconomics.com/
http://www.transparency.org/
http://www.tripline.net/
http://www.trovando.it/
http://www.tumblr.com/
http://www.twazzup.com/
http://www.tweet-tag.com/
http://www.tweetarchivist.com/
http://www.tweetchat.com/
http://www.tweetpaths.com/
http://www.tweetstats.com/
http://www.twellow.com/
http://www.tweriod.com/
http://www.twiangulate.com/
http://www.twiddla.com/
http://www.twilert.com/
http://www.twingly.com/
http://www.twipho.net/
http://www.twitonomy.com/
http://www.twittersentiment.appspot.com/
http://www.ubicolor.com/
http://www.ucweb.com/
http://www.uis.unesco.org/
http://www.ultraedit.com/
http://www.unido.org/
http://www.urlvoid.com/
http://www.usersearch.org/
http://www.ussearch.com/
http://www.ustart.org/
http://www.uvrx.com/
http://www.vault.com/
http://www.vcasmo.com/
http://www.veoh.com/
http://www.verishow.com/
http://www.verticalresponse.com/
http://www.viadesk.com/
http://www.viamichelin.com/
http://www.videoscribe.co/
http://www.viseyes.org/
http://www.vision6.com.au/
http://www.visme.co/
http://www.vivicom.de/
http://www.vmukti.com/
http://www.walla.co.il/
http://www.wayp.com/
http://www.wdl.org/
http://www.webex.com/
http://www.webmii.com/
http://www.wepaste.com/
http://www.wepware.com/
http://www.whatshouldireadnext.com/
http://www.whitepages.com/
http://www.who.int/
http://www.whoishostingthis.com/
http://www.whoismind.com/
http://www.wiinkz.com/
http://www.wikia.com/
http://www.wikidot.com/
http://www.wikispaces.com/
http://www.wisemapping.com/
http://www.wolframalpha.com/
http://www.wonderpage.com/
http://www.wordle.net/
http://www.wordreference.com/
http://www.workboard.com/
http://www.world-newspapers.com/
http://www.worldc.am/
http://www.worldlingo.com/
http://www.xing.com/
http://www.xmarks.com/
http://www.xmind.net/
http://www.xrayz.co.uk/
http://www.yahoo.com/
http://www.yamli.com/
http://www.yandex.com/
http://www.yasni.com/
http://www.yougetsignal.com/
http://www.yournextread.com/
http://www.yourport.com/
http://www.yworks.com/
http://www.zabasearch.com/
http://www.zapmeta.com/
http://www.zaption.com/
http://www.zeadoo.com/
http://www.zeetings.com/
http://www.zenstart.com/
http://www.zingchart.com/
http://www.zoominfo.com/
http://www.zotero.org/
http://www.zyncro.com/
http://www124.lunapic.com/
http://xodo.com/
http://yippy.com/
http://yudu.com/
http://zanran.com/
http://zesty.ca/
http://zetoc.jisc.ac.uk/
http://zim-wiki.org/
http://zmail.sourceforge.net/
http://zooburst.com/




OSINT vs. Signal Communications


https://numpi.com/
https://opencorporates.com/
https://phoneowner.com/
https://psbdmp.ws/
https://publicrecords.directory/
https://searchherenow.com/
https://speedyhunt.com/
https://unicourt.com/
https://www.callersmart.com/
https://www.peoplelooker.com/
https://www.phonesearchfree.com/
https://www.research.com/
https://www.snapdex.com/
https://www.spytox.com/
http://publicemailrecords.com/
http://publicsearchengine.com/
http://snapcode.net/
http://sometag.com/
http://ufind.name/
http://www.ivycall.com/
http://www.keecall.us/
http://www.peoplebyname.com/
https://golookup.com/
https://homemetry.com/

Defind OSINT sources


https://adium.im/
https://ahrefs.com/
https://analyticsportfolio.com/
https://animoto.com/
https://app.calculist.io/
https://archive.org/
https://asana.com/
https://atavist.com/
https://atomiks.github.io/
https://awwapp.com/
https://basecamp.com/
https://bhattsameer.github.io/
https://bitbucket.org/
https://bookmate.com/
https://books.google.com/
https://brave.com/
https://bridge.leslibres.org/
https://bridge.suumitsu.eu/
https://browser.yandex.com/
https://bubbl.us/
https://buffer.com/
https://burrrd.com/
https://cacoo.com/
https://calendly.com/
https://camo.githubusercontent.com/
https://canvanizer.com/
https://captainfact.io/
https://cardboardit.com/
https://cartodb.com/
https://cartodb.github.io/
https://casual.pm/
https://charlieapp.com/
https://chartio.com/
https://chatsecure.org/
https://chema.ga/
https://chrome.google.com/
https://cloudmagic.com/
https://cloudwork.com/
https://cnverg.com/
https://coggle.it/
https://color.adobe.com/
https://complete.li/
https://conceptboard.com/
https://connect.data.com/
https://core.ac.uk/
https://crowdmap.com/
https://crypto.cat/
https://ctrlq.org/
https://d3js.org/
https://dapulse.com/
https://dashthis.com/
https://data.gov.uk/
https://data.occrp.org/
https://data.oecd.org/
https://datanews.github.io/
https://datawrapper.de/
https://dayboard.co/
https://desktop.github.com/
https://developer.apple.com/
https://developer.github.com/
https://developers.google.com/
https://disconnect.me/
https://discover.twitter.com/
https://dnsdumpster.com/
https://docs.google.com/
https://doesfollow.com/
https://dominoc925-pages.appspot.com/
https://dragdis.com/
https://droplr.com/
https://duckduckgo.com/
https://education.github.com/
https://ejfox.github.io/
https://elegantt.com/
https://elink.io/
https://emailhunter.co/
https://en.mention.com/
https://en.todoist.com/
https://en.wikipedia.org/
https://enterprise.github.com/
https://evernote.com/
https://exonerator.torproject.org/
https://explaintome.herokuapp.com/
https://exposure.co/
https://fakers.statuspeople.com/
https://familysearch.org/
https://findmyfbid.in/
https://firepad.io/
https://firesub.com/
https://fleep.io/
https://flipboard.com/
https://followyourworld.appspot.com/
https://frame.io/
https://freedcamp.com/
https://fullfact.org/
https://gaddr.me/
https://geofeedia.com/
https://gephi.org/
https://germ.io/
https://getcrate.co/
https://geti2p.net/
https://getnewsbot.com/
https://github.blog/
https://github.com/
https://github.community/
https://githubstatus.com/
https://global.factiva.com/
https://gpgtools.org/
https://groups.google.com/
https://groups.yahoo.com/
https://guardianproject.info/
https://haveibeenpwned.com/
https://help.github.com/
https://highfive.com/
https://hitask.com/
https://homemetry.com/
https://hubic.com/
https://hypothes.is/
https://icq.com/
https://ifttt.com/
https://ilmk.wordpress.com/
https://images.google.com/
https://images.search.yahoo.com/
https://info.tiki.org/
https://infogr.am/
https://inkscape.org/
https://inteltechniques.com/
https://interlude.fm/
https://issuu.com/
https://itunes.apple.com/
https://jitsi.org/
https://kanboard.net/
https://keep.google.com/
https://klart.co/
https://knoema.com/
https://lab.github.com/
https://lastpass.com/
https://laverna.cc/
https://librestock.com/
https://librivox.org/
https://liinwww.ira.uka.de/
https://lockbin.com/
https://lookup-id.com/
https://lumoflow.com/
https://madmimi.com/
https://mailbox.org/
https://majestic.com/
https://mammothhq.com/
https://mapbuildr.com/
https://mapchart.net/
https://maphub.net/
https://mapline.com/
https://maps.yahoo.com/
https://medium.com/
https://meedan.com/
https://meekan.com/
https://meet.fm/
https://mega.nz/
https://metaproductsrevolver.com/
https://mewe.com/
https://millionshort.com/
https://minbox.com/
https://mixi.jp/
https://mochimarks.com/
https://montage.storyful.com/
https://motherpipe.com/
https://moz.com/
https://mural.co/
https://my.yahoo.com/
https://mykanzen.com/
https://news.google.com/
https://news360.com/
https://noscript.net/
https://nozbe.com/
https://numspy.pythonanywhere.com/
https://oedci.uspto.gov/
https://offshoreleaks.icij.org/
https://onedrive.live.com/
https://opencorporates.com/
https://opensource.guide/
https://oscobo.co.uk/
https://ossec.github.io/
https://padlet.com/
https://panopticlick.eff.org/
https://papaly.com/
https://pdfexpert.com/
https://pentest-tools.com/
https://phishstats.info/
https://piktochart.com/
https://pintask.me/
https://pipl.com/
https://pixabay.com/
https://pixlr.com/
https://plan.io/
https://play.google.com/
https://plot.ly/
https://plus.google.com/
https://podio.com/
https://prezi.com/
https://prnmedia.prnewswire.com/
https://products.office.com/
https://protonmail.com/
https://public.tableau.com/
https://pulsedive.com/
https://queryfeed.net/
https://quickcode.io/
https://quip.com/
https://quire.io/
https://racontr.com/
https://raindrop.io/
https://rapportive.com/
https://realtimeboard.com/
https://redbooth.com/
https://redditcommentsearch.com/
https://refind.com/
https://remote.12dt.com/
https://research.microsoft.com/
https://riccardoscalco.github.io/
https://ricochet.im/
https://ritetag.com/
https://rocket.chat/
https://scholar.google.com/
https://search.nerdydata.com/
https://searchcode.com/
https://searchisback.com/
https://secapps.com/
https://secure.flickr.com/
https://securesha.re/
https://securitytrails.com/
https://sendloop.com/
https://serpstat.com/
https://shorthand.com/
https://sites.google.com/
https://skarpline.com/
https://slack.com/
https://slate.adobe.com/
https://slatebox.com/
https://slides.com/
https://smilesoftware.com/
https://snapmap.knightlab.com/
https://snappa.io/
https://sourceforge.net/
https://spideroak.com/
https://ssd.eff.org/
https://standaert.net/
https://standout.adobe.com/
https://steller.co/
https://stock.tookapic.com/
https://stocksnap.io/
https://storify.com/
https://storyform.co/
https://storymap.knightlab.com/
https://support.apple.com/
https://sway.com/
https://syncthing.net/
https://tagboard.com/
https://tagdef.com/
https://tagul.com/
https://taiga.io/
https://tails.boum.org/
https://talky.io/
https://targethunter.net/
https://taskade.com/
https://taskboard.matthewross.me/
https://team.fm/
https://teamweek.com/
https://telegram.org/
https://thatsthem.com/
https://ticktick.com/
https://tineye.com/
https://tinfoleak.com/
https://tinygain.com/
https://tinypng.com/
https://titanpad.com/
https://todo.ly/
https://tofo.me/
https://tools.verifyemailaddress.io/
https://torchpad.com/
https://torrentfreak.com/
https://trackpanel.net/
https://training.github.com/
https://translate.google.com/
https://translate.yandex.ru/
https://trello.com/
https://tresorit.com/
https://trexpertwitness.com/
https://twitrss.me/
https://twitter.com/
https://uglyemail.com/
https://unbabel.com/
https://unicorns.io/
https://unroll.me/
https://unseen.is/
https://unsplash.com/
https://us.teamblind.com/
https://venngage.com/
https://veracrypt.codeplex.com/
https://veri.ly/
https://videolink2.me/
https://viivo.com/
https://vimeo.com/
https://vis.occrp.org/
https://visage.co/
https://visualping.io/
https://visualstudio.github.com/
https://vivaldi.com/
https://vizala.com/
https://vk.com/
https://wappalyzer.com/
https://warble.co/
https://weboas.is/
https://weekdone.com/
https://wekan.io/
https://wewiredweb.com/
https://whispersystems.org/
https://whiteboardfox.com/
https://who.is/
https://whois.arin.net/
https://whoisology.com/
https://wickr.com/
https://wiki.gnome.org/
https://wiselike.com/
https://wordstotime.com/
https://workflow.is/
https://workflowy.com/
https://writeapp.me/
https://www.veeting.com/
https://www.visualintelligence.co.nz/
https://www.voilanorbert.com/
https://www.wallflux.com/
https://www.wbginvestmentclimate.org/
https://www.wetransfer.com/
https://www.wevideo.com/
https://www.whatsapp.com/
https://www.wordtracker.com/
https://www.workfront.com/
https://www.worklife.com/
https://www.wrike.com/
https://www.wto.org/
https://www.wunderlist.com/
https://www.xing.com/
https://www.yammer.com/
https://www.yandex.com/
https://www.youtube.com/
https://www.yugma.com/
https://www.zeemaps.com/
https://www.zintro.com/
https://www.ziprecruiter.com/
https://www.zoho.com/
https://www.zotero.org/
https://www.zulip.org/
https://wynyardgroup.com/
https://yvoschaap.com/
https://zapier.com/
https://zoom.us/


General OSINT sources - by Domain


http://123cam.com/
http://academictorrents.com/
http://airportwebcams.net/
http://archie.icm.edu.pl/
http://camfindapp.com/
http://cdrex.com/
http://cn.bhanvad.com/
http://dailyearth.com/
http://dirpopulus.org/
http://discovery.nationalarchives.gov.uk/
http://dothop.com/
http://eng.kipris.or.kr/
http://english.sipo.gov.cn/
http://facebook.com/
http://flickrhivemind.net/
http://fqs.opentext.com/
http://globalfilesearch.com/
http://google.com/
http://greyguide.isti.cnr.it/
http://highwire.stanford.edu/
http://image.baidu.com/
http://images.yahoo.com/
http://infospace.com/
http://ipindia.nic.in/
http://isearchfrom.com/
http://karmadecay.com/
http://keywordshitter.com/
http://mininsta.net/
http://newsography.com/
http://newspapermap.com/
http://osint.link/
http://pericles.ipaustralia.gov.au/
http://photobucket.com/
http://pictures.reuters.com/
http://search.carrot2.org/
http://stalkture.com/
http://strategis.ic.gc.ca/
http://tools.seochat.com/
http://translate.reference.com/
http://translation.babylon-software.com/
http://trove.nla.gov.au/
http://verificationhandbook.com/
http://verificationjunkie.com/
http://vlib.org/
http://www.01webdirectory.com/
http://www.360daily.com/
http://www.academicindex.net/
http://www.alleba.com/
http://www.allyoucanread.com/
http://www.annualreports.com/
http://www.aol.com/
http://www.aonde.com/
http://www.apimages.com/
http://www.arabo.com/
http://www.archivesportaleurope.net/
http://www.beyondcitation.org/
http://www.bing.com/
http://www.cpimages.com/
http://www.crowdtangle.com/
http://www.dkpto.org/
http://www.earthcam.com/
http://www.elocalfinder.com/
http://www.epa.eu/
http://www.etools.ch/
http://www.excite.com/
http://www.factbites.com/
http://www.factcheck.org/
http://www.faganfinder.com/
http://www.filewatcher.com/
http://www.free-translator.com/
http://www.freepatentsonline.com/
http://www.general-search.com/
http://www.gettyimages.com/
http://www.gibiru.com/
http://www.goo.ne.jp/
http://www.google.com/
http://www.goworkable.com/
http://www.hoax-slayer.com/
http://www.ic.gc.ca/
http://www.ilpatsearch.justice.gov.il/
http://www.imagebrief.com/
http://www.infobel.com/
http://www.insecam.org/
http://www.izito.com/
http://www.lycos.com/
http://www.metacrawler.com/
http://www.metatube.com/
http://www.mmnt.ru/
http://www.mypicsmap.com/
http://www.newsnow.co.uk/
http://www.onelook.com/
http://www.onlinenewspapers.com/
http://www.opendissertations.com/
http://www.opentopia.com/
http://www.pagepress.org/
http://www.parseek.com/
http://www.picsearch.com/
http://www.reverse-image-search.com/
http://www.sciencedirect.com/
http://www.searchenginecolossus.com/
http://www.searchenginelinks.co.uk/
http://www.secretsearchenginelabs.com/
http://www.sedar.com/
http://www.teoma.com/
http://www.the-webcam-network.com/
http://www.tineye.com/
http://www.truthorfiction.com/
http://www.vault.com/
http://www.veoh.com/
http://www.wayp.com/
http://www.yahoo.com/
http://yippy.com/
http://youtube.github.io/
https://academic.oup.com/
https://adwords.google.com/
https://all-io.net/
https://andrewmohawk.com/
https://archive.org/
https://balkanleaks.eu/
https://beta.companieshouse.gov.uk/
https://beta.worldcat.org/
https://botw.org/
https://ccsearch.creativecommons.org/
https://cdsweb.cern.ch/
https://censys.io/
https://chroniclingamerica.loc.gov/
https://citizenevidence.org/
https://cryptome.org/
https://cse.google.com/
https://duckduckgo.com/
https://facebook.com/
https://finance.google.com/
https://hoaxy.iuni.iu.edu/
https://images.google.com/
https://imgur.com/
https://inteltechniques.com/
https://keywordtool.io/
https://kwfinder.com/
https://littlesis.org/
https://metager.org/
https://millionshort.com/
https://news.google.com/
https://newspaperarchive.com/
https://newspapers.com/
https://opencorporates.com/
https://orbisdirectory.bvdinfo.com/
https://oscobo.co.uk/
https://osint.link/
https://pastebin.com/
https://patent.prh.fi/
https://patentscope.wipo.int/
https://peekier.com/
https://pqdtopen.proquest.com/
https://privatelee.com/
https://reolink.com/
https://reporterslab.org/
https://reviewmeta.com/
https://scholar.google.com/
https://search.crossref.org/
https://search.findmypast.com/
https://searx.me/
https://sharedir.com/
https://sploitus.com/
https://strategis.ic.gc.ca/
https://swisscows.com/
https://translate.google.com/
https://twitter.com/
https://twpat.tipo.gov.tw/
https://ubersuggest.io/
https://video.search.yahoo.com/
https://vimeo.com/
https://webcam.nl/
https://websta.me/
https://wikileaks.org/
https://wn.com/
https://worldcam.eu/
https://worldwide.espacenet.com/
https://www.1stheadlines.com/
https://www.academia.edu/
https://www.aljazeera.com/
https://www.allareacodes.com/
https://www.alltheinternet.com/
https://www.aol.com/
https://www.apertium.org/
https://www.baidu.com/
https://www.base-search.net/
https://www.bing.com/
https://www.commercial-register.sg.ch/
https://www.companiesintheuk.co.uk/
https://www.corporationwiki.com/
https://www.crunchbase.com/
https://www.daum.net/
https://www.dpma.de/
https://www.ecosia.org/
https://www.eniro.se/
https://www.entireweb.com/
https://www.europages.co.uk/
https://www.exalead.com/
https://www.exploit-db.com/
https://www.facebook.com/
https://www.flickr.com/
https://www.gigablast.com/
https://www.globaleaks.org/
https://www.goodsearch.com/
https://www.google.com/
https://www.gov.uk/
https://www.graphene-theme.com/
https://www.imageidentify.com/
https://www.inpi.fr/
https://www.instagram.com/
https://www.j-platpat.inpit.go.jp/
https://www.jivesearch.com/
https://www.keyworddiscovery.com/
https://www.kompass.com/
https://www.lableb.com/
https://www.lakako.com/
https://www.lens.org/
https://www.liveleak.com/
https://www.lookr.com/
https://www.manta.com/
https://www.myallsearch.com/
https://www.news-press.com/
https://www.noslang.com/
https://www.onet.pl/
https://www.openstreetcam.org/
https://www.owler.com/
https://www.paimages.co.uk/
https://www.patentstyret.no/
https://www.pictimo.com/
https://www.pinterest.com/
https://www.prv.se/
https://www.qwant.com/
https://www.reportlinker.com/
https://www.sapo.pt/
https://www.search.ask.com/
https://www.search.ch/
https://www.search.com/
https://www.searchftps.net/
https://www.sec.gov/
https://www.shodan.io/
https://www.smugmug.com/
https://www.snopes.com/
https://www.so.com/
https://www.ssrn.com/
https://www.startpage.com/
https://www.stopfakes.gov/
https://www.swissreg.ch/
http://10minutemail.com/
http://a.placebetween.us/
http://academia.edu/
http://aprs.fi/
http://archive.is/
http://archive.org/
http://backtweets.com/
http://baidu.com/
http://biznar.com/
http://boardreader.com/
http://brupt.com/
http://canlii.com/
http://casa-query.funnelback.com/
http://centralops.net/
http://citationmachine.net/
http://cnac.ca/
http://companycheck.co.uk/
http://copac.jisc.ac.uk/
http://cpic-cipc.ca/
http://creafy.com/
http://data.worldbank.org/
http://emm.newsbrief.eu/
http://en.utrace.de/
http://epic.org/
http://eric.ed.gov/
http://exif.regex.info/
http://fb.com/
http://finance.yahoo.com/
http://fotoforensics.com/
http://freecarrierlookup.com/
http://geosocialfootprint.com/
http://groups.yahoo.com/
http://hashtagify.me/
http://hola.org/
http://humantraffickingsearch.net/
http://image.baidu.com/
http://itools.com/
http://jurn.org/
http://justdelete.me/
http://karmadecay.com/
http://keep-tube.com/
http://keyhole.co/
http://knowem.com/
http://libguides.com/
http://mailinator.com/
http://metrocosm.com/
http://mintbusinessinfo.com/
http://mulpix.com/
http://namechk.com/
http://nationalarchives.gov.uk/
http://network-tools.com/
http://news.google.com/
http://news.silobreaker.com/
http://newspapermap.com/
http://newstrust.net/
http://oa.anu.edu.au/
http://onemilliontweetmap.com/
http://openknowledgemaps.org/
http://panopticlick.eff.org/
http://pdfmyurl.com/
http://phototracker.ru/
http://publicrecords.searchsystems.net/
http://rootabout.com/
http://scholar.google.com/
http://search.carrot2.org/
http://search.mibbit.com/
http://search.yahoo.com/
http://snitch.name/
http://socialmention.com/
http://sqoop.com/
http://syndie.i2p2.de/
http://toddington.wpengine.com/
http://translate.google.com/
http://trendsmap.com/
http://tubechop.com/
http://twitterfall.com/
http://typelink.net/
http://ucbswww.bank-banque-canada.ca/
http://vault.fbi.gov/
http://verificationhandbook.com/
http://viewdns.info/
http://waqi.info/
http://webmii.com/
http://websiteoutlook.com/
http://wikileaks.org/
http://wikistats.co/
http://wn.com/
http://worldaerodata.com/
http://worldc.am/
http://worldlii.org/
http://www.2lingual.com/
http://www.allmyfaves.com/
http://www.allyoucanread.com/
http://www.answers.com/
http://www.archives.gov/
http://www.ask.com/
http://www.bikudo.com/
http://www.bing.com/
http://www.blackbookonline.info/
http://www.blinkx.com/
http://www.blogdigger.com/
http://www.chatslang.com/
http://www.citeulike.org/
http://www.cluuz.com/
http://www.cmegroup.com/
http://www.companieshouse.gov.uk/
http://www.corporationwiki.com/
http://www.data360.org/
http://www.deeperweb.com/
http://www.dmoz.org/
http://www.dogpile.com/
http://www.domaintools.com/
http://www.europages.co.uk/
http://www.europeana.eu/
http://www.ewhois.com/
http://www.exalead.com/
http://www.facesaerch.com/
http://www.factmonster.com/
http://www.feedmyinbox.com/
http://www.flickr.com/
http://www.freetranslation.com/
http://www.geocreepy.com/
http://www.getlinkinfo.com/
http://www.globalincidentmap.com/
http://www.globalsecurity.org/
http://www.google.com/
http://www.goorulearning.org/
http://www.gramfeed.com/
http://www.gutenberg.org/
http://www.hashatit.com/
http://www.hathitrust.org/
http://www.hurisearch.org/
http://www.icc-ccs.org/
http://www.icerocket.com/
http://www.imf.org/
http://www.instya.com/
http://www.kidrex.org/
http://www.kidsclick.org/
http://www.linguee.com/
http://www.livejournal.com/
http://www.mahalo.com/
http://www.moreofit.com/
http://www.mozbot.com/
http://www.n2yo.com/
http://www.nosi.org/
http://www.noslang.com/
http://www.oanda.com/
http://www.omgili.com/
http://www.opengrey.eu/
http://www.opensiteexplorer.org/
http://www.osira.net/
http://www.pbs.org/
http://www.peekyou.com/
http://www.phonebookoftheworld.com/
http://www.photobucket.com/
http://www.police.uk/
http://www.pressdisplay.com/
http://www.proxy4free.com/
http://www.publicproxyservers.com/
http://www.quertle.info/
http://www.refdesk.com/
http://www.reference.com/
http://www.refseek.com/
http://www.reuters.com/
http://www.samair.ru/
http://www.scholaruniverse.com/
http://www.shipais.com/
http://www.shodanhq.com/
http://www.similarsites.com/
http://www.slideshare.net/
http://www.spokeo.com/
http://www.springo.com/
http://www.sputtr.com/
http://www.start.umd.edu/
http://www.stayinvisible.com/
http://www.stolencamerafinder.com/
http://www.stratfor.com/
http://www.sweetsearch.com/
http://www.systransoft.com/
http://www.tcij.org/
http://www.technorati.com/
http://www.thetimenow.com/
http://www.thetimezoneconverter.com/
http://www.tineye.com/
http://www.topix.com/
http://www.topmarks.co.uk/
http://www.truecaller.com/
http://www.urbandictionary.com/
http://www.vesseltracker.com/
http://www.visualcapitalist.com/
http://www.wdl.org/
http://www.webcitation.org/
http://www.wikipedia.org/
http://www.wolframalpha.com/
http://www.worldlingo.com/
http://www.yamli.com/
http://www.yandex.com/
http://www.yoname.com/
http://www.zabasearch.com/
http://www.zamzar.com/
http://www.zoominfo.com/
http://www.zotero.org/
http://wwwapps.tc.gc.ca/
http://yippy.com/
http://zesty.ca/
http://zetoc.jisc.ac.uk/
https://29a.ch/
https://academic.microsoft.com/
https://addons.mozilla.org/
https://app.echosec.net/
https://berify.com/
https://bestvpn.org/
https://blog.pinterest.com/
https://censys.io/
https://connectonline.asic.gov.au/
https://core.ac.uk/
https://duckduckgo.com/
https://followyourworld.appspot.com/
https://freenetproject.org/
https://geti2p.net/
https://giphy.com/
https://globaledge.msu.edu/
https://gnunet.org/
https://groups.google.com/
https://hunter.io/
https://intel.malwaretech.com/
https://intelx.io/
https://justice.gov.bc.ca/
https://keitharm.me/
https://livingatlas.arcgis.com/
https://lookup-id.com/
https://m.facebook.com/
https://noscript.net/
https://onion.cab/
https://onionview.com/
https://online.maryville.edu/
https://opencorporates.com/
https://oscobo.co.uk/
https://peekyou.com/
https://pipl.com/
https://pixelprivacy.com/
https://prism-break.org/
https://privacy.net/
https://search.creativecommons.org/
https://searchisback.com/
https://searx.me/
https://snitch.name/
https://sometag.org/
https://swisscows.com/
https://thatsthem.com/
https://translate.yandex.com/
https://transparencytoolkit.org/
https://twitter.com/
https://unfollowgram.com/
https://vimeo.com/
https://websta.me/
https://whoisology.com/
https://www.accountkiller.com/
https://www.anonymox.net/
https://www.base-search.net/
https://www.bellingcat.com/
https://www.cia.gov/
https://www.cloudwards.net/
https://www.comparitech.com/
https://www.downloadhelper.net/
https://www.earthcam.com/
https://www.facebook.com/
https://www.familysearch.org/
https://www.fbiic.gov/
https://www.geograph.org/
https://www.ghostery.com/
https://www.grammarcheck.net/
https://www.imageidentify.com/
https://www.instagram.com/
https://www.ixmaps.ca/
https://www.izito.com/
https://www.linkedin.com/
https://www.loc.gov/
https://www.numberway.com/
https://www.peoplefinders.com/
https://www.pinterest.com/
https://www.profilr.social/
https://www.pwnedlist.com/
https://www.quandl.com/
https://www.quora.com/
https://www.qwant.com/
https://www.reddit.com/
https://www.robtex.com/
https://www.safetydetective.com/
https://www.sansar.com/
https://www.searchencrypt.com/
https://www.sec.gov/
https://www.semanticscholar.org/
https://www.social-searcher.com/

OpSec/Privacy/Anonymity


Deep dot Web Archive
Jolly Roger’s Security Guide for Beginners
https://tails.boum.org/index.en.html
https://www.torproject.org/
https://geti2p.net/en/
https://freenetproject.org/author/freenet-project-inc.html
https://www.whonix.org/
https://heads.dyne.org/
https://thatoneprivacysite.net/
https://www.wilderssecurity.com/
JonDonym mix network site
https://neverendingsecurity.wordpress.com/
https://prism-break.org/en/
https://spyware.neocities.org/articles/
https://digdeeper.neocities.org/
https://tor.dial.ga/doc
https://b3rn3d.herokuapp.com/blog/2014/01/08/managing-pseudonyms/
https://b3rn3d.herokuapp.com/blog/2014/01/10/ask-him-about-his-threat-model/
https://b3rn3d.herokuapp.com/blog/2014/01/13/braintricks-for-opsec/
https://b3rn3d.herokuapp.com/blog/2014/01/22/burner-phone-best-practices/
https://b3rn3d.herokuapp.com/blog/2014/01/31/tools-to-evade-stylometrics/
https://b3rn3d.herokuapp.com/blog/2014/02/04/event-boundaries-helping-to-compartmentalize-your-operations/
https://b3rn3d.herokuapp.com/blog/2014/02/10/for-aaron/
https://b3rn3d.herokuapp.com/blog/2014/02/17/perspectives-of-opsec-models/
https://b3rn3d.herokuapp.com/blog/2014/03/05/tor-country-codes/
https://b3rn3d.herokuapp.com/blog/2014/03/09/irl-spycraft/


OPSEC: Because Jail is for wuftpd
Type: Video, conference talk
Description: This video covering hacker OPSEC is a necessary watch for anyone who is interested in the subject, especially hackers. The Grugq covers some very interesting case studies that allow you to learn from other hackers OPSEC failures.


B3RN3D.com
Type: OPSEC blog
Description: B3RN3D is a blogger that is well-versed with topics such as operational security, maintaining anonymity, and mass surveillance. I often reference this blog.


The Paranoid’s Bible: An anti-dox effort
Type: Resource repository
Description: Self-described as a “repository of knowledge meant to help people remove their information (Dox) from the web and people search engines.” Excellent, credible resource for removing information about your current identity.


Alpraking's OPSEC guide to being a successful kingpin Type: Text guide
Description: Alpraking is an experienced drug kingpin in the online black market. In this post, he describes how he manages people and his drug operation with respect to operational security. Without great operational security, he would not be in business. This piece offers fantastic perspective from the black market community.


How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish
Type: Book
Description: This reading focuses on the offline side of disappearance; Frank Ahearn, an experienced skip tracer, guides us in preventing skip tracers and other parties from tracking our trail. This is an interesting read for anyone whom wishes to conceal his or her real identity. Pro-tip: start by buying this book with cash and a hoodie in a brick-and-mortar bookstore.


How to Lie to People: Achieving Anonymity through Disinformation and Data Poisoning
Type: Text guide
Description: DIzzIE provides helpful insight on how to lie effectively, and explains why and how lying can benefit your persona. This excellent resource can be read on your lunch break.


OPSEC failures of spies
Type: Video, conference talk
Description: A case study on targeted surveillance. Explains how “telling” metadata is, specifically metadata pertaining to cellphone networks. This case study provides the opportunity to learn from the OPSEC failures of spies.


How to Master Secret Work Type: Text publication
Description: Discusses the necessity of being able to carry out work and operations with assured secrecy. Governments subject to corruption have used dirty tactics to silence opposition parties in the past, and they will do it again. This resource will aid you in your thinking for illustrating underground operations in secrecy.


Centralised Place for Privacy Resources
Type: Blog, resource repositor
Description: A list of privacy resources and security technologies. Great resources, it is definitely worth checking this list out to get more familiar with modern day security technologies and pro-privacy solutions.


Surveillance Self-Defense
Type: Resource repository
Description: Collection of resources, tutorials, and briefings pertaining to counter-surveillance efforts. Includes tutorials for secure deletion, using PGP, OTR, 2FA, Signal, Tor services, etc.


The Motherboard Guide to Not Getting Hacked
Type: Guide (PDF)
Description: Generally good advice for security practices. Covers security basics, mobile security, privacy, messaging, and avoiding state and police surveillance.


DEF CON 22: Blinding The Surveillance State
Type: Surveillance conference talk
Description: Christopher Soghoian discusses the importance of HTTPS for thwarting bulk data collection efforts, the importance of “translating” cybersecurity talk to politicians, lawmakers and court systems, among other things. I would recommend this talk for privacy activists and advocates.


Things NOT to Do
Type: OPSEC Guide
Description: A list of things that you should not do, with a general focus on the Tor network. Great OPSEC resource.
The CryptoPaper
Type: Personal Security Guide
Description: "Privacy, Security, and Anonymity For Every Internet User"

Data Broker Removal Links


Start with:
Whitepages, Spokeo, TruePeopleSearch, BeenVerified, FastPeopleSearch, Radaris, InfoTracer & Intelius


411.info https://411.info/manage/


www.acxiom.com https://www.acxiom.com/optout/


www.americaphonebook.com, usapeopledata.com, www.unitedstatesphonebook.com https://www.americaphonebook.com/contact.php


www.beenverified.com, www.dobsearch.com, www.numberguru.com, www.ownerly.com, www.peoplelooker.com https://www.beenverified.com/app/optout/search


www.checkpeople.com https://checkpeople.com/do-not-sell-info


clustrmaps.com https://clustrmaps.com/bl/opt-out


cocofinder.com https://cocofinder.com/remove-my-info


www.cyberbackgroundchecks.com https://www.cyberbackgroundchecks.com/removal


emailtracer.com https://emailtracer.com/contact


www.fastpeoplesearch.com https://www.fastpeoplesearch.com/removal


gladiknow.com https://gladiknow.com/opt-out


homemetry.com https://homemetry.com/control/privacy


www.idcrawl.com https://www.idcrawl.com/remove-my-information


www.idtrue.com https://www.idtrue.com/optout/


information.com https://information.com/remove-my-info/


infotracer.com, staterecords.org https://infotracer.com/optout/


www.instantcheckmate.com https://suppression.peopleconnect.us/login


www.intelius.com, www.addresses.com, www.allareacodes.com, www.peoplefinder.com, www.publicrecords.com, www.ussearch.com, www.zabasearch.com https://suppression.peopleconnect.us/login


www.lexisnexis.com https://optout.lexisnexis.com


www.mylife.com https://www.mylife.com/ccpa/index.pubview


neighbor.report https://neighbor.report/remove


nuwber.com https://nuwber.com/removal/link


www.peekyou.com https://www.peekyou.com/about/contact/ccpa_optout/do_not_sell/


www.peoplefinders.com, www.privateeye.com https://www.peoplefinders.com/opt-out


www.peoplewhiz.com, peoplewizard.net, www.peoplewhizr.com https://www.peoplewhiz.com/remove-my-info


www.persopo.com
Note: Email the text of your profile data


www.privaterecords.net, www.backgroundcheckers.net, www.peoplesearch123.com https://www.privaterecords.net/optOut/name/landing


publicdatausa.com https://publicdatausa.com/remove.php


www.publicinfoservices.com https://www.publicinfoservices.com/help-center/remove-me-from-website


radaris.com https://radaris.com/control/privacy


www.searchpeoplefree.com https://www.searchpeoplefree.com/opt-out


socialcatfish.com https://socialcatfish.com/opt-out/


www.spokeo.com, wwv.selfie.systems https://www.spokeo.com/optout


www.spyfly.com https://www.spyfly.com/help-center/remove-me-from-website


www.telephonedirectories.us https://www.telephonedirectories.us/Edit_Records


thatsthem.com https://thatsthem.com/optout


www.truepeoplesearch.com https://www.truepeoplesearch.com/removal


www.truthfinder.com https://suppression.peopleconnect.us/login


unmask.com https://unmask.com/opt-out/


www.usa-people-search.com https://www.usa-people-search.com/contact


www.usphonebook.com https://www.usphonebook.com/opt-out


validnumber.com https://validnumber.com/doc/contact/


veripages.com https://veripages.com/inner/control/privacy


voterrecords.com
Note: Click "Record Opt-Out"


www.whitepages.com, www.411.com, peoplesearch.com https://www.whitepages.com/suppression-requests


https://www.yellowpagesdirectory.com/whitepages/
Note: Click "Edit / Delete Person"


Do Not Call
Use this to include your phone number on the FTC Do Not Call Registry https://www.donotcall.gov/register.html


Junk Mail
Use this to stop offers from Equifax, Experian, Innovis, and TransUnion https://www.optoutprescreen.com


Search Engines
Use this to remove outdated information or submit a suppression request https://search.google.com/search-console/remove-outdated-content https://support.google.com/websearch/troubleshooter/3111061?hl=en https://www.microsoft.com/en-us/concern/bing https://form.jotform.com/233465872728064

Arms/Armor

Name Version Description
0trace 1.5 A hop enumeration tool.
3proxy 0.9.3 Tiny free proxy server.
42zip A recursive Zip archive bomb.
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol.
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface.
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
admsnmp 0.1 ADM SNMP audit scanner.
aesfix 1.0.1 A tool to find AES key in RAM.
aeskeyfind 1.0 A tool to find AES key in RAM.
aespipe 2.4h Reads data from stdin and outputs encrypted or decrypted results to stdout.
afflib 3.7.20 An extensible open format for the storage of disk images and related forensic information.
afpfs-ng 0.8.2 A client for the Apple Filing Protocol (AFP).
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
aiengine 2.1.0 A packet inspection engine with capabilities of learning without any human intervention.
aimage 3.2.5 A program to create aff-images.
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images.
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.
aircrack-ng 1.7 Aircrack-ng is a complete suite of tools to assess WiFi network security.
airoscript A script to simplify the use of aircrack-ng tools.
airpwn 1.4 A tool for generic packet injection on an 802.11 network.
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications.
american-fuzzy-lop 2.52b A practical, instrumentation-driven fuzzer for binary formats.
androguard 4.1.2 Reverse engineering, Malware and goodware analysis of Android applications and more.
androick 2.1 A python tool to help in forensics analysis on android.
android-apktool 2.9.3 A tool for reengineering Android apk files.
android-ndk r9c Android C/C++ developer kit.
android-sdk-platform-tools 35.0.1 Platform-Tools for Google Android SDK (adb and fastboot).
android studio Google Android SDK.
android-udev-rules 1.0.9 Android udev rules.
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.
anontwi 1.1b A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.
aphopper AP Hopper is a program that automatically hops between access points of different wireless networks.
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.
arachni 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. Replaced by Codename SCNR.
arduino 2.3.2 Arduino IDE
argus 3.0.8.4 Network monitoring tool with flow control.
argus-client 3.0.8.4 Network monitoring client for Argus.
armitage 20220123 Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post- exploitation features in the framework.
arp-scan 1.10.0 A tool that uses ARP to discover and fingerprint IP hosts on the local network
arpalert 2.0.12 Monitor ARP changes in ethernet networks.
arpoison 0.7 The UNIX arp cache update utility
arpon 3.0-ng A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. Since 3.0-ng rewritten from scratch.
arpwner 26.f300fdf GUI-based python tool for arp poisoning and dns poisoning attacks.
artillery A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.
asleap 2.2 Actively recover LEAP/PPTP passwords.
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner.
athena-ssl-scanner 0.6.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. Now also a part of BlackArch Linux.
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. BlackArch Linux too.
auto-xor-decryptor Automatic XOR decryptor tool.
autopsy 4.21.0 A GUI for The Sleuth Kit.
azazel 0.1 userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.
b3sum 1.5.1 Cryptographic hash function.
backcookie Small backdoor using cookie.
backdoor-factory 01.11.2016 Patch PE, ELF, Mach-O binaries with shellcode. New version in development, available only to sponsors.
backfuzz 0.3.2 A network protocol fuzzing toolkit.
balbuzard 0.20 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). It can also crack malware obfuscation such as XOR, ROL, etc by bruteforcing and checking for those patterns.
bamf-framework A modular framework designed to be a platform to launch attacks against botnets. Seems to be long gone.
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.
batman-adv 2024.1 B.A.T.M.A.N. (better approach to mobile ad-hoc networking) is a routing protocol for multi-hop ad-hoc mesh networks.
bbqsql 1.2 SQL injection exploitation tool.
bdfproxy 0.3.8 Patch Binaries via MITM: BackdoorFactory + mitmProxy. New version available for sponsors.
bdlogparser 2.3 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities.
beef 0.5.4.0 The Browser Exploitation Framework that focuses on the web browser.
beeswarm 0.7.18 Honeypot deployment made easy.
beholder ids A wireless intrusion detection tool that looks for anomalies in a wifi environment. The website is long gone and it seems like it has never left the pre-alfa. Looks like it was made to write an academic paper, because that one still exists.
beleth Multi-threaded Dictionary based SSH cracker.
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows
bgp-md5crack 0.1 RFC2385 password cracker
binex 1.0 Format String exploit building tool. Gone, maybe now part of BlackArch.
bing-ip2hosts 1.0.5 A Bing.com web scraper that discovers hostnames by IP address. Enumerates all hostnames which Bing has indexed for a specific IP address.
bing-lfi-rfi 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.
binwalk 2.3.4 A tool for searching a given binary image for embedded files.
binwally Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).
bios_memimage 1.2 A tool to dump RAM contents to disk (aka cold boot attack).
birp Big Iron Recon & Pwnage, a tool that will assist in the security assessment of mainframe applications served over TN3270.
bittwist 3.8 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.
bkhive 1.1.0 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.
blackarch BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers.
blackhash 0.2.8 Creates a filter from system hashes.
bletchley 0.0.1 A collection of practical application cryptanalysis tools.
blindelephant A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations.
blindsql 1.0 Set of bash scripts for blind SQL injection attacks
bluebox-ng A GPL VoIP/UC vulnerability scanner.
bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt.
bluelog 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.
bluepot 0.2 A Bluetooth Honeypot written in Java, it runs on Linux.
blueprint 0.1_3 A perl tool to identify Bluetooth devices.
blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios.
bluescan 1.0.6 A Bluetooth Device Scanner.
bluesnarfer 0.1 A bluetooth attacking tool.
bmaptool 3.7.0 Tool for copying largely sparse files using information from a block map file.
bob-the-butcher 0.7.1 A distributed password cracker package.
bokken GUI for radare2 and pyew.
bowcaster 0.1 This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.
braa 0.82 A mass SNMP scanner.
braces 0.4 A Bluetooth Tracking Utility. Seems that their website is broken.
browser fuzzing A curated list of browser fuzzing researches, papers, tools, ...
brutessh 0.5 A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks, multithread. Gone, there seems to be other tools named the same.
brutus One of the fastest, most flexible remote password crackers you can get your hands on (this description is probably outdated).
bsdiff 4.3 bsdiff and bspatch are tools for building and applying patches to binary files.
bsqlbf 2.7 Blind SQL Injection Brute Forcer.
bss 0.8 Bluetooth stack smasher / fuzzer
bt_audit 0.1.1 Bluetooth audit
btcrack 1.1 The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.
btscanner 2.1 Bluetooth device scanner.
bulk-extractor 2.1.1 Bulk Email and URL extraction tool.
bully 1.4-00 A wifi-protected-setup (WPS) brute force attack tool.
bunny Bunny The Fuzzer, superseded by American Fuzzy Lop.
burpsuite 2024.4.5 An integrated platform for attacking web applications (free edition).
buttinsky Provide an open source framework for automated botnet monitoring.
bvi 1.4.2 A display-oriented editor for binary files operate like "vi" editor.
bytecode-viewer 2.12 Java 8/Android APK Reverse Engineering Suite.
cadaver 0.24 Command-line WebDAV client for Unix.
canari 1.1 A transform framework for maltego.
cangibrina Dashboard Finder.
cansina 20-06-2018 A python-based Web Content Discovery Tool.
capstone 5.0 A lightweight multi-platform, multi-architecture disassembly (reverse engineering) framework.
captipper Malicious HTTP traffic explorer tool.
carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.
cdpsnarf 0.1.6 Cisco discovery protocol sniffer.
cecster A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols.
centry Cold boot & DMA protection.
cewl 5.2 A custom word list generator.
cflow 1.7 A C program flow analyzer.
chaosmap 1.4 An information gathering tool and dns / whois / web server scanner
chaosreader 0.96 freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.
chapcrack A tool for parsing and decrypting MS-CHAPv2 network handshakes.
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker.
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN).
checkpwd 1.23 Oracle Password Checker (Cracker). Gone.
checksec 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.
chiron 1.0 An all-in-one IPv6 Penetration Testing Framework.
chkrootkit 0.58b Checks for rootkits on a system (for more than 25 years).
chntpw 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file.
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other.
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords.
chromefreak A Cross-Platform Forensic Framework for Google Chrome.
cidr2range 1.0 Script for listing the IP addresses contained in a CIDR netblock.
cintruder 0.4. An automatic pentesting tool to bypass captchas.
ciphertest 0.2-Hotfix A better SSL cipher checker using gnutls.
ciphr A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. Gone.
cisco-auditing-tool Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.
cisco-global-exploiter 1.3 A perl script that detects 14 vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.
cisco-ocs 0.2 Cisco Router Default Password Scanner.
cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Gone. There are several other scanners.
Cisc0wn 1.8 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.
cisco-snmp-slap 0.3.1 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.
cisco-torch 0.4b Mass Cisco scanning, fingerprinting, and exploitation tool.
cisco7crack Crypt and decrypt the cisco enable 7 passwords.
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
clamscanlogparser 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection. Gone.
climber UNIX/Linux systems for privilege escalation.
clusterd 0.5 The toolkit automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.
cmospwd 5.0 Decrypts password stored in CMOS used to access BIOS setup.
cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running.
cms_few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.
cmsmap 1.0 A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.
codetective 0.8.2 A tool to determine the crypto/encoding algorithm used according to traces of its representation.
complemento 0.7.7 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever. Included in BackTrack.
configpush 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.
conpot 0.6.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.
conscan 1.2 A blackbox vulnerability scanner for the Concre5 CMS.
cookie-cadger 1.08 An auditing tool for Wi-Fi or wired Ethernet connections.
cowpatty 4.8 Wireless WPA/WPA2 PSK handshake cracking utility.
cpfinder 0.1 This is a simple script that looks for administrative web interfaces.
cppcheck 2.14.1 A tool for static C/C++ code analysis
cpptest 2.0.0 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.
crackhor A Password cracking utility. Now Doozer.
crackle Crack and decrypt BLE encryption
crackserver An XMLRPC server for password cracking.
create_ap 0.4.6 This script creates a NATed or Bridged WiFi Access Point.
creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives.
creds Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. Replaced by net-creds.
creepy 1.1 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.
crowbar 4.2 A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set.
crypthook 0.1 TCP/UDP symmetric encryption tunnel wrapper.
cryptonark 0.5.7 SSL security checker.
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.
ctunnel 0.8 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.
cuckoo 2.0.6 A malware analysis system.
cupp 3.0 Common User Password Profiler
cutycapt A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.
cvechecker 4.0 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.
cymothoa 0.1 A stealth backdooring tool, that inject backdoor's shellcode into an existing process.
damm Differential Analysis of Malware in Memory.
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors.
darkjumper 5.8 This tool will try to find every website that host at the same server at your target.
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool.
darkstat 3.0.721 Network statistics gatherer (packet sniffer).
davoset 1.3.7 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.
davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target.
dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines
dc3dd 7.2.641 A patched version of dd that includes a number of features useful for computer forensics.
dcfldd 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing
ddrescue 1.28 GNU data recovery tool
deblaze 0.3 A remote method enumeration tool for flex servers
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer.
depant 0.3a Check network for services with default passwords. Gone.
depdep 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network.
detect-it-easy 3.10 A program for determining types of files.
device-pharmer Opens 1K+ IPs or Shodan search results and attempts to login.
dex2jar 2.4 A tool for converting Android's .dex format to Java's .class format.
dff-scanner 1.1 Tool for finding path of predictable resource locations.
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow.
dhcpig 1.6 Initiates an advanced DHCP exhaustion attack. It will consume all IPs on the LAN, stop new users from obtaining IPs, release any IPs in use, then for good measure send gratuitous ARP and knock all windows hosts offline.
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC.
dirb 2.22 A web content scanner, brute forcing for hidden files.
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers.
directorytraversalscan 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications.
dirs3arch 0.4.3 HTTP(S) directory/file brute forcer.
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more.
dislocker 0.7.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.
dissector 0.1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.
dissy 10 A graphical frontend to the objdump disassembler for compiler-generated code.
dizzy 2.0 A Python based fuzzing framework with many features.
dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.
dnmap 0.6 The distributed nmap framework
dns-reverse-proxy A reverse DNS proxy written in Go.
dns-spoof Yet another DNS spoof utility.
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains.
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS. There's another tool with such name.
dnsa 0.5 DNSA is a dns security swiss army knife. Gone.
dnsbf 0.2 search for available domain names in an IP range
dnsbrute Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.
dnschef 0.4 A highly configurable DNS proxy for pentesters.
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection. DoS.
dnsenum 1.2.4 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
dnsgoblin 1.0 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.
dnsmap 0.30 Passive DNS network mapper
dnspredict 0.0.2 DNS prediction. Gone.
dnsrecon 1.2.0 Python script for enumeration of hosts, subdomains and emails from a given domain using google.
dnsspider 1.4 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers
dnsutils 9.11.0 P2DNS utilities: dig host nslookup
dnswalk 2.0.2 A DNS debugger.
domain-analyzer 0.8.1 Finds all the security information for a given domain name.
doona 1.0 A fork of the Bruteforce Exploit Detector Tool (BED).
dotdotpwn 3.0.2 The Directory Traversal Fuzzer
dpeparser beta002 Default password enumeration project. Gone.
dpscan 0.1 Drupal Vulnerabilty Scanner.
dradis 4.10.0 An open source framework to enable effective information sharing.
driftnet 0.1.6 Listens to network traffic and picks out images from TCP streams it observes.
dripper A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.
dscanner 0.15.2 Swiss-army knife for D source code.
dsd 1.7.0 Digital Speech Decoder.
dsniff 2.3 Collection of tools for network auditing and penetration testing.
dumb0 A simple tool to dump users in popular forums and CMS.
dump1090 A simple Mode S decoder for RTLSDR devices.
dumpacl 0.4 Dumps NTs ACLs and audit settings.
dumpzilla 03152013 A forensic tool for Firefox.
dvcs-ripper Rip web accessible (distributed) version control systems: SVN/GIT/...
eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol.
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials.
easyda 1.0 Easy Windows Domain Access Script.
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent).
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.
edb 1.5.0 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.
eindeutig Examine the contents of Outlook Express DBX email repository files (forensic purposes). Gone.
elettra 1.0 Encryption utility by Julia Identity. Has a GUI.
elite-proxy-finder Finds public elite anonymity proxies and concurrently tests them.
enabler 1 attempts to find the enable password on a cisco system via brute force.
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.
ent 1.0 Pseudorandom number sequence test.
enum-shares Tool that enumerates shared folders across the network and under a custom user account.
enum4linux 0.9.1 A tool for enumerating information from Windows and Samba systems.
enumiax 1.0 IAX enumerator.
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6.
epicwebhoneypot 2.0a A tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.
erase-registrations 1.0 IAX flooder. Gone.
etherape 0.9.20 A graphical network monitor for various OSI layers and protocols.
ettercap 0.8.3.1 A network sniffer/interceptor/logger for ethernet LANs - console.
evilgrade 2.0.9 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates.
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password.
exiv2 0.28.2 Exif and Iptc metadata manipulation library and tools.
exploit-db The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks.
extracthosts Extracts hosts (IP/Hostnames) from files. Gone.
extundelete 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability. Gone.
eyewitness 03.11.2018 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
facebot 2.0 A facebook profile and reconnaissance system.
facebrute This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).
fakeap 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. Gone.
fakedns 4/14/2020 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses.
fakemail 1.0b Fake mail server that captures e-mails as files for acceptance testing.
fakenetbios A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.
fang A multi service threaded MD5 cracker.
faraday A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.
fbht Facebook Hacking Tool.
fbid Show info about the author by facebook photo url.
fcrackzip 0.2.0 Zip file password cracker.
fern-wifi-cracker 3.4 WEP, WPA wifi cracker for wireless penetration testing.
fernmelder Asynchronous mass DNS scanner.
fgscanner 1.1 An advanced, opensource URL scanner.
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.
fierce 1.5.0 A DNS scanner.
fiked 0.0.5 Fake IDE daemon.
filibuster 6.28.14 A Egress filter mapping application with additional functionality.
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation
findmyhash 1.1.2 Crack different types of hashes using free online services
firewalk 5.0 An active reconnaissance network security tool. Gone.
firmware-mod-kit Modify firmware images without recompiling.
firstexecution A Collection of different ways to execute code outside of the expected entry points.
flare 0.6 Flare processes an SWF and extracts all scripts from it.
flasm 1.62 Disassembler tool for SWF bytecode.
flawfinder 2.0.19 Searches through source code for potential security flaws.
flowinspect 0.2 A network traffic inspection tool.
flunym0us 2.0 A Vulnerability Scanner for Wordpress and Moodle.
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures.
forkingportscanner 0.1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.
fpdns 20190131 Program that remotely determines DNS server versions.
fping 5.2 A utility to ping multiple hosts at once.
fport 2.0 Identify unknown open ports and their associated applications. Gone.
fprotlogparser 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.
fraud-bridge ICMP and DNS tunneling via IPv4 and IPv6.
freeipmi 1.6.4 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).
freeradius 3.2.4 The premier open source RADIUS server.
frisbeelite 1.2 A GUI-based USB device fuzzer.
fs-nyarl 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. Gone.
fsnoop 3.5 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.
ftp-fuzz 0.1 The master of all master fuzzing scripts specifically targeted towards FTP server sofware.
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. Gone.
ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.
ftpmap 0.5 Scans remote FTP servers to identify what software and what versions they are running.
fusil 1.2.2 A Python library used to write fuzzing programs.
fuzzap A python script for obfuscating wireless networks.
fuzzball 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. Gone.
fuzzdb 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. Gone.
fuzztalk 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.
g72x++ 1 Decoder for the g72x++ codec. Gone.
galleta Examine the contents of the IE's cookie files for forensic purposes.
gdb 14.2 The GNU Debugger.
genlist 0.1 Generates lists of IP addresses.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
geoip 5.2.0 Non-DNS IP-to-country resolver C library & utils
geoipgen 0.4 GeoIPgen is a country to IP addresses generator.
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. Gone.
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.
ghettotooth 1.0 Ghettodriving for bluetooth. Gone.
ghost-phisher 1.62 GUI suite for phishing and penetration attacks.
ghost-py 2.0.0 Webkit based webclient (relies on PyQT).
giskismet GISKismet is a wireless recon visualization tool to represent data gathered using Kismet in a flexible manner.
gnuradio 3.10.9.2 General purpose DSP and SDR toolkit. With drivers for usrp and fcd.
gnutls 3.8.4 A library which provides a secure layer over a reliable transport layer.
goldeneye 2016-02-06 HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.
golismero 2.0b3 Opensource web security testing framework.
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.
goofile 1.5 Command line filetype search
goog-mail 1.0 Enumerate domain emails from google.
googlesub 1.2 A python script to find domains by using google dorks.
gooscan 1.0 A tool that automates queries against Google search appliances, but with a twist. Now part of BlackArch.
gpredict 2.2.1 A real-time satellite tracking and orbit prediction application.
gqrx 2.17 Interactive SDR receiver waterfall for many devices.
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website.
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts.
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.
guymager 0.8.13 A forensic imager for media acquisition.
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet.
gwtenum 0.2 Enumeration of GWT-RCP method calls.
hackersh 0.2. A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. Gone.
hamster 2.0.0 Tool for HTTP session sidejacking.
hasere 1.0 Discover the vhosts using Google and Bing.
hash-identifier 1.1 Identifies the different types of hashes used to encrypt data, especially passwords
hashcat 6.2.6 A multithreaded cross platform hash cracker.
hashcat-utils 1.9 Utilites for Hashcat.
hasher 1.1.0 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.
hashfind A tool to search files for matching password hash types and other interesting data.
hashID 3.1.4 Software to identify the different types of hashes used to encrypt data.
hashpump A tool to exploit the hash length extension attack in various hashing algorithms.
hashtag 0.41 A python script written to parse and identify password hashes.
haystack A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.
hcraft 1.0.0 HTTP Vuln Request Crafter.
hdcp-genkey Generate HDCP source and sink keys from the leaked master key.
hdmi-sniff HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's.
hex2bin 2.5 Converts Motorola and Intel hex files to binary.
hexinject 1.6 A very versatile packet injector and sniffer that provides a command-line framework for raw network access.
hexorbase 1.0_all A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).
hharp 1b This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.
hidattack 0.1 HID Attack (attacking HID host implementations).
homepwn 0.0.1b Swiss Army Knife for Pentesting of IoT Devices. Bluetooth, NFC, QR.
honeyd 1.6d A small daemon that creates virtual hosts on a network.
honssh 1.1.0 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.
hookanalyser 3.4 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.
host-extract Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.
hostbox-ssh 0.1.1 A ssh password/account scanner.
hotpatch 1.0 Hot patches executables on Linux using .so file injection.
hotspotter 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.
hpfeeds 3.1.0 Honeynet Project generic authenticated datafeed protocol.
hping 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer.
hqlmap 1.0 A tool to exploit HQL Injections.
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process.
htrosbif Active HTTP server fingerprinting and recon tool.
htshells Self contained web shells and other attacks via .htaccess files.
http-enum 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver. Gone.
httpfuzz A fast HTTP fuzzer written in Go inspired by Burp Intruder.
http-traceroute 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.
httpbog 1.0.0.0 A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.
httpforge 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.
httping 3.6 A 'ping'-like tool for http-requests.
httprint 301 A web server fingerprinting tool.
httpry 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic.
httpsniff 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.
httpsscanner 1.2 A tool to test the strength of a SSL web server.
httptunnel 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests
hulk A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.
hwk 0.4 An easy-to-use wireless authentication and deauthentication tool.
hydra 9.5 A very fast network logon cracker which support many different services.
hyenae-ng 0.10 Flexible platform independent packet generator.
hyperfox 2.0.0 A security tool for proxying and recording HTTP and HTTPs traffic.
hyperion 2.3.1 A runtime encrypter for 32-bit portable executables.
iaxflood 0.1 IAX flooder.
iaxscan 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. A lewd link on the page.
ibrute An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.
icmpquery 1.0.3 Send and receive ICMP queries for address mask and current time.
icmptx 0.01 IP over ICMP.
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems (a SNORT IDS rules tester).
iheartxor 0.01 A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.
IISRecon This is bruteforce tool that fetch all IIS shortname thanks to SNS by Sw33tLie and try to bruteforce each one of them with a given wordlist.
ike-scan 2022-10-02 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers.
ikecrack 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication.
ikeprobe 1.0b1 Determine vulnerabilities in the PSK implementation of the VPN server.
IKECrack 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifying vendors.
ilty 1.0 An interception phone system for VoIP network.
imagejs 0.4.1 A small tool to package javascript into a valid image file.
inception 0.4.2 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces. Check pcileech too.
indxparse 1.3.1 A Tool suite for inspecting NTFS artifacts.
inetsim 1.3.2 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.
infip 0.1 A python script that checks output from netstat against RBLs from Spamhaus.
inguma 0.1.0 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.
intercepter-ng 1.3 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.
interrogate 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.
intersect 2.5 Post-exploitation framework. Archived. There are several other such tools.
intrace 1.6 Traceroute-like application piggybacking on existing TCP connections.
inundator 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.
inurlbr Advanced search in the search engines - Inurl scanner, dorker, exploiter.
inviteflood 2.0 Flood a device with INVITE requests.
iodine 0.8.0 Tunnel IPv4 data through a DNS server.
iosforensic 1.0 iOS forensic tool.
ip-https-tools Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.
ipaudit 1.1 Monitors network activity on a network.
ipba2 032013 IOS Backup Analyzer
ipdecap 0.7.2 Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.
iphoneanalyzer 2.1.0 Allows you to forensically examine or recover date from in iOS device.
ipscan 3.9.1 Angry IP scanner is a very fast IP address and port scanner.
iputils 20151218 Network monitoring tools, including ping.
ipv6toolkit 2.2 SI6 Networks' IPv6 Toolkit.
ircsnapshot Tool to gather information from IRC servers.
irpas 0.10 Internetwork Routing Protocol Attack Suite.
isr-form 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. Gone.
jad 1.5.8e Java decompiler.
jadx 1.5.0 Dex to Java command line and GUI decompiler tool that produces Java source code from Android Dex and APK files.
javasnoop 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer.
jboss-autopwn A JBoss script for obtaining remote shell access.
jbrofuzz 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing.
jbrute 0.99 Open Source Security tool to audit hashed passwords.
jd-gui 1.6.6 A standalone graphical utility that displays Java source codes of .class files.
jhead 3.04 EXIF JPEG info parser and thumbnail remover.
jigsaw 1.5.3 A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing.
jnetmap 0.5.5 A network monitor of sorts. You can draw a graphical representation of your network, and jNetMap will periodically check if the devices are still up or a service is still running. You can also set up E-mail notifications or let jNetMap execute a script when a device goes down or comes up again.
john 1.9.0 John The Ripper - A fast password cracker (jumbo included).
johnny 2.2 GUI for John the Ripper.
jomplug 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.
joomlascan 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files.
joomscan 2012.03.10 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.
js-beautify 1.15.1 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward's popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.
jsql 0.6 A lightweight application used to find database information from a distant server.
junkie 2.8.1 A modular packet sniffer and analyzer.
jwscan 0.2.1 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.
jynx2 2.0 An expansion of the original Jynx LD_PRELOAD rootkit.
kalibrate-rtl 0.4.1 Fork of thre.at/kalibrate/ for use with rtl-sdr devices.
katsnoop 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.
kautilya 0.5.5 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.
keimpx 0.2 Tool to verify the usefulness of credentials across a network over SMB.
khc 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.
killerbee 3.0.0b2 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.
kippo 0.9 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. Firked into Cowrie.
kismet 2023-07-R1 Kismet is a sniffer, WIDS, and wardriving tool for Wi-Fi, Bluetooth, Zigbee, RF, and more, which runs on Linux and macOS.
kismet2earth A set of utilities that convert from Kismet logs to Google Earth .kml format.
klogger 1.0 A keystroke logger for the NT-series of Windows. Gone, but the page has many other tools.
knock 7.0.1 Subdomain scanner.
kolkata 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. Gone and named as an Indian city, so also buried in poo.
kraken A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.
l2flood l2ping with threads to flood attack Bluetooth devices.
laf Login Area Finder: scans host/s for login panels.
lanmap2 Passive network mapping tool.
lans Inject code and spy on wifi users.
latd 1.31 A LAT terminal daemon for Linux and BSD.
laudanum 0.8 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.
lbd 0.1 Load Balancing detector.
lbmap Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.
ldap-brute A semi fast tool to bruteforce values of LDAP injections over HTTP.
ldap-enum Enumerate domain controllers using LDAP.
leo 6.8.0 Literate programmer's editor, outliner, and project manager.
leroy-jenkins A python tool that will allow remote execution of commands on a Jenkins server and its nodes.
levye A brute force tool which is support sshkey, vnckey, rdp, openvpn.
LFITester A Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.
lfi-exploiter 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..
lfi-fuzzploit 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.
lfi-scanner 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target.
lfi-sploiter 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.
lfimap 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver.
lfimap Almost 1.0 Local File Inclusion discovery and exploitation tool.
lft 3.91 A layer four traceroute implementing numerous other features.
libdisasm 0.23 A disassembler library.
libpst 0.6.76 Outlook .pst file converter.
liffy 2.0 A Local File Inclusion Exploitation tool.
linenum 0.982 Scripted Local Linux Enumeration & Privilege Escalation Checks.
linset 0.14 Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.
linux-exploit-suggester A Perl script that tries to suggest exploits based OS version number.
lisa.py An Exploit Dev Swiss Army Knife.
littleblackbox git 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.
lldb 18.1.x The LLDB Debugger.
lodowep 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.
logkeys 0.2.0 A GNU/Linux keylogger supporting also USB keyboards.
loki 0.2.7 Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols.
lorcon Generic library for injecting 802.11 frames.
lotophagi 0.1 A relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.
lsrtunnel 0.2 lsrtunnel spoofs connections using source routed packets. Gone.
lte-cell-scanner LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).
luksipc 0.04 A tool to convert unencrypted block devices to encrypted LUKS devices in-place.
lusas Linux/Unix Security Auditing Scripts.
luyten 0.5.4 An Open Source Java Decompiler Gui for Procyon.
lynis 3.1.1 Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
mac-robber 1.02 A digital investigation tool that collects data from allocated files in a mounted file system.
macchanger 1.6.0 A small utility to change your NIC's MAC address.
maclookup 0.3 Lookup MAC addresses in the IEEE MA-L/OUI public listing.
magicrescue 1.1.10 Find and recover deleted files on block devices. Deprecated by the author.
magictree A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation.
make-pdf 0.1.7 This tool will embed javascript inside a PDF document.
makepasswd 1.10_14 Generates true random passwords with the emphasis on security over pronounceability (Debian version).
malheur 0.5.4 A tool for the automatic analyze of malware behavior.
maligno 2.5 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. Now part of the Blue Team Training Toolkit (same page).
malmon 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.
maltego 4.7.0 An open source intelligence (OSINT, not FOS) and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.
maltrieve Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.
MalwareChecker 1.5 Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.
malware-analyzer A git topic on malware analysis.
malwasm 0.1.1 Offline debugger for malware's reverse engineering.
malybuzz 1.0b A Python tool focused in discovering programming faults in network software.
marc4dasm This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).
maskprocessor 0.73 A High-Performance word generator with a per-position configurable charset.
masscan 1.3.2 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
mat 0.13.4 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.
matahari 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls.
mausezahn 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. Now part of netsniff-ng.
mbenum Queries the master browser for whatever information it has registered.
mboxgrep 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.
md5deep 4.4 Advanced checksum hashing tool.
mdbtools 1.0.0 Utilities for viewing data and exporting schema from Microsoft Access Database files.
mdcrack 1.8.3 MD4/MD5/NTLM1 hash cracker.
mdk4 WLAN penetration tool.
mdns-scan 0.5 Scan mDNS/DNS-SD published services on the local network.
medusa 2.2 A speedy, massively parallel, modular, login brute-forcer for network.
melkor 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).
memdump 1.19 The Coroner's Toolkit. Dumps system memory to stdout, skipping over holes in memory maps. Predecessor to Sleuthkit.
memfetch 0.05b Dumps any userspace process memory without affecting its execution.
metacoretex 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.
metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents.
metasploit An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.
meterssh A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.
metoscan Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. Gone.
mfcuk 0.3.8 MIFARE Classic Universal toolKit.
mfoc 0.10.7 Mifare Classic Offline Cracker.
mfsniffer 0.1 A python script for capturing unencrypted TSO login credentials.
mibble 2.10.1 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.
middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks.
mikrotik-npk Python tools for manipulating Mikrotik NPK format.
minimysqlator A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices
miredo 1.3.0 Teredo client and server.
missidentify 1.0 A program to find Win32 applications.
missionplanner 1.3.81 A GroundControl Station for Ardupilot.
mitmAP 2.0 A python program to create a fake AP and sniff data.
mitmer A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
mitmf 0.9.8 A Framework for Man-In-The-Middle attacks written in Python. Author suggests Bettercap.
mitmproxy 10.3 SSL-capable man-in-the-middle HTTP proxy.
mkbrutus 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS.
msgpack 0.5.8 MessagePack, a binary-based efficient data interchange format.
mobiusft 1.9 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.
moki ICS/SCADA Tools.
moloch 5.2.0 An open source large scale IPv4 full PCAP capturing, indexing and database system. Now Arkime. Moloch, really? *cough*
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.
morxbook 1.0 A password cracking tool written in Perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.
morxbrute 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl.
morxbtcrack 1.0 Single Bitcoin private key cracking tool released.
morxcoinpwn 1.0 Mass Bitcoin private keys brute forcing/Take over tool released.
morxcrack 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.
morxkeyfmt 1.0 Read a private key from stdin and output formatted data values.
morxtraversal 1.0 Path Traversal checking tool.
morxtunnel 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool. Gone.
mp3nema 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data.
mptcp 1.9.0 A tool for manipulation of raw packets that allows a large number of options.
mptcp-abuse A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.
ms-sys 2.8.0 A tool to write Win9x-.. master boot records (mbr) under linux - RTM!
mssqlscan 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers.
msvpwn Bypass Windows' authentication via binary patching.
mtr Combines the functionality of traceroute and ping into one tool (CLI version).
multiinjector 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.
multimac 1.0.3 Multiple MACs on an adapter.
multitun 0.10 Tunnel arbitrary traffic through an innocuous WebSocket.
mutator This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012
mwebfp Mass Web Fingerprinter.
mysql2sqlite Converts a mysqldump file into a Sqlite 3 compatible file.
nacker A tool to circumvent 802.1x Network Access Control on a wired LAN.
nbnspoof 1.0 NBNSpoof - NetBIOS Name Service Spoofer.
nbtenum 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.
nbtool 0.04 Some tools for NetBIOS and DNS investigation, attacks, and communication.
nbtscan 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information.
ncpfs Allows you to mount volumes of NetWare servers under Linux.
ncrack 0.7 A high-speed network authentication cracking tool. A predecessor to nmap.
neighbor-cache-fingerprinter An ARP based Operating System version scanner.
nemesis 1.4 Command-line network packet crafting and injection utility.
netactview 0.6.4 A graphical network connections viewer for Linux similar in functionality with Netstat.
netbios-share-scanner 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources.
netcommander 1.2 An easy-to-use arp spoofing tool.
netcon 0.1 A network connection establishment and management script. Gone, but the author's site is up and has other stuff. A Dutchman in... China?
netdiscover 0.10 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.
netmap generator 0.1.3 Can be used to make a graphical representation of the surrounding network.
netmask 2.4.4-4 Helps determine network masks.
netreconn 1.76 A collection of network scan/recon tools that are relatively small compared to their larger cousins.
netscan 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).
netsed 1.3 Small and handful utility design to alter the contents of packets forwarded thru network in real time.
netsniff-ng 0.6.7 A high performance Linux network sniffer for packet inspection.
network-app-stress-tester Network Application Stress Testing Yammer.
netzob 2.0.0 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.
nfcutils A collection of NFC tools.
nfex A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.
nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share.
nfsshell Userland NFS command tool.
ngrep 1.47 A grep-like utility that allows you to search for network packets on an interface.
nield 0.6.1 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.
nikto 2.5 A web server scanner which performs comprehensive tests against web servers for multiple items.
nimbostratus Tools for fingerprinting and exploiting Amazon cloud infrastructures.
nipper-ng 0.11.10 Network Infrastructure Parser.
nishang 0.7.6 Offensive PowerShell for red team, penetration testing and offensive security.
nkiller 2.0 A TCP exhaustion/stressing tool.
nmap 7.95 Utility for network discovery and security auditing.
nmbscan 1.2.6 Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.
nomorexor 0.1 Tool to help guess a files 256 byte XOR key by using frequency analysis.
notspikefile 0.1 A Linux based file format fuzzing tool.
nsdtool 0.1 A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password.
nsec3walker 2017.01.22 Enumerates domain names using DNSSEC.
nsia 1.0.6 A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.
nsoq 1.9.5 A Network Security Tool for packet manipulation that allows a large number of options.
ntds-decode 0.1b This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.

Arms/Armor 2

Name Version Description
o-saft 24.03.24 A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.
oat 1.3.1 A toolkit that could be used to audit security within Oracle database servers.
obexstress 0.1 Script for testing remote OBEX service for some potential vulnerabilities.
obfsproxy 0.2.13 A pluggable transport proxy written in Python.
oclhashcat 6.2.6 Worlds fastest WPA cracker with dictionary mutation engine.
ocs 0.2 Compact mass scanner for Cisco routers with default telnet/enable passwords.
odat 5.1.1 Oracle Database Attacking Tool.
ohrwurm 0.1 A small and simple RTP fuzzer.
oletools 0.56 Tools to analyze Microsoft OLE2 files.
ollydbg 2.01 A 32-bit assembler-level analysing debugger.
onesixtyone 0.3.4 An SNMP scanner that sends multiple SNMP requests to multiple IP addresses.
onionshare 2.6.2 Securely and anonymously share a file of any size.
openstego 0.8.6 A steganography application that provides two functionalities: a) Data Hiding: It can hide any data within an image file. b) Watermarking: Watermarking image files with an invisible signature.
opensvp A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.
ophcrack 3.8.0 A free Windows password cracker based on rainbow tables. Portable, open-source.
orakelcrackert 1.00 This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm. Gone.
origami 2.1.0 Aims at providing a scripting tool to generate and analyze malicious PDF files. "Written in pure Ruby".
oscanner 1.0.6 An Oracle assessment framework developed in Java. Gone.
ostinato 1.3.0 An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.
osueta A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities.
outguess 0.2 A universal steganographic tool.
owabf2 A password spraying OWA bruteforcer featuring 3 different modes of bruteforcing.
owasp-bywaf A web application penetration testing framework (WAPTF).
owtf 2.5.0 The Offensive (Web) Testing Framework.
p0f 3.09b Purely passive TCP/IP traffic fingerprinting tool.
pack Password Analysis and Cracking Kit.
packerid Script which uses a PEiD database to identify which packer (if any) is being used by a binary.
packet-o-matic A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.
packeth 2.0 A Linux GUI packet generator tool for ethernet.
packetsender 8.7.1 An open source utility to allow sending and receiving TCP, UDP, SSL, HTTP packets.
packit 1.8.1 A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.
pacumen Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).
padbuster Automated script for performing Padding Oracle attacks.
paketto 1.10 Advanced TCP/IP Toolkit (for 2002).
panhunt Searches for credit card numbers (PANs) in directories.
panoptic A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.
paranoic 1.7 A simple vulnerability scanner written in Perl.
paros Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc. Part of ZAProxy now.
parsero 0.75 A robots.txt audit tool.
pasco 20040505_1 Examines the contents of Internet Explorer's cache files for forensic purposes. Gone.
passe-partout 0.1 Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns. Gone.
passhunt Search drives for documents containing passwords.
passivedns 1.2.0 A network sniffer that logs all DNS server replies for use in a passive DNS setup.
pastenum 0.4.1 Searches sites github.com, gist.github.com, pastebin.com, pastee.org, and pastie.org. for content. Fork from nullthreat corelan pastenum2.
patator A multi-purpose bruteforcer with a modular design and a flexible usage.
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities. Gone.
pcapfix 1.1.7 Tries to repair your broken pcap and pcapng files.
pcapsipdump 0.2 A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions).
pcredz A tool that extracts credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.
pdf-parser 0.7.9 Parses a PDF document to identify the fundamental elements used in the analyzed file.
pdfbook-analyzer v2 Utility for facebook memory forensics.
pdfcrack 0.20 Password recovery tool for PDF-files.
pdfid 0.2.8 Scan a file to look for certain PDF keywords.
pdfresurrect 0.12 A tool aimed at analyzing PDF documents.
pdgmail 1.0 A password dictionary attack tool that targets windows authentication via the SMB protocol
peach A SmartFuzzer that is capable of performing both generation and mutation based fuzzing.
peda 1.2 Python Exploit Development Assistance for GDB.
peepdf 0.4 A Python tool to explore PDF files in order to find out if the file can be harmful or not.
peframe 6.0.3 Tool to perform static analysis on (portable executable) malware.
pemcrack Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.
pentbox 1.8 A security suite that packs security and stability testing oriented tools for networks and systems.
perl-image-exiftool 12.76 Reader and rewriter of EXIF informations that supports raw files.
perl-tftp 1.0b3 TFTP - TFTP Client class for perl
pev 0.84 Command line based tool for PE32/PE32+ file analysis.
pextractor 0.18b A forensics tool that can extract all files from an executable file created by a joiner or similar.
pgdbf Convert XBase / FoxPro databases to PostgreSQL.
phemail 0.13 A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.
phoss 0.1.13 Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins. A very old http website.
php-mt-seed 4.0 PHP mt_rand() seed cracker.
php-rfi-payload-decoder Decode and analyze RFI payloads developed in PHP.
php-vulnerability-hunter 1.4.0.20 A whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.
phpstress A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.
phrasendrescher 1.2.2 A modular and multi processing pass phrase cracking tool.
pip3line 2.7.1 The Swiss army knife of byte manipulation.
pipal 2.0 A password analyser.
pirana 0.3.1 Exploitation framework that tests the security of a email content filter. Gone.
plcscan 0.1 This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.
plecost 0.2.2.9b Wordpress fingerprinter tool search and retrieve information about the plugins versions installed in Wordpress systems.
plown A security scanner for Plone CMS.
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).
pnscan 1.14.1 A parallel network scanner that can be used to survey TCP network services.
pompem 0.2.0 A python exploit tool finder.
portspoof This program's primary goal is to enhance OS security through a set of new techniques.
posttester 0.1 A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.
powerfuzzer Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others.
powersploit 3.0.0 A PowerShell Post-Exploitation Framework.
praeda 0.02.3.117b An automated data/information harvesting tool designed to gather critical information from various embedded devices.
procyon 0.6.0 A suite of Java metaprogramming tools focused on code generation and analysis.
prometheus A Firewall analyzer written in Ruby.
propecia A fast class scanner that scans for a specified open port with banner grabbing.
protos-sip SIP test suite. Case files.
proxychains-ng 4.17 A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies.
proxycheck 0.1 This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver.
proxyp Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.
proxyscan 0.3 A security penetration testing tool to scan for hosts and ports through a Web proxy server.
proxytunnel 1.9.0 Connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy.
pscan A limited problem scanner for C source files.
pshitt A lightweight fake SSH server designed to collect authentication data sent by intruders.
pstoreview 1.0 Lists the contents of the Protected Storage. Gone. Similar tool.
ptunnel 0.72 A tool for reliably tunneling TCP connections over ICMP echo request and reply packets.
pwd-hash 2.0 A password hashing tool that use the crypt function to generate the hash of a string given on standard input. This one is gone, but here's a whole git topic.
pwdump 7.1 Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.
pwnat A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other. Nice use explanation.
pwntools 4.12.0 The CTF framework used by #Gallopsled in every CTF. Exploit development library.
pyew 3.x A python tool to analyse malware.
pyexfil 1.3.3 A Python Package for Data Exfiltration.
pyfiscan A web-application vulnerability and version scanner.
pyinstaller 6.8.0 A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX.
pyminifakedns Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record.
pyrasite 2.0 Code injection and introspection of running Python processes. gui
pyrit 0.4.0 WPA/WPA2-PSK attacking with gpu and cluster. Author has a blog with some interesting articles
pytacle 0.2 Automates the task of sniffing GSM frames.
pytbull-ng A python based flexible IDS/IPS testing framework shipped with more than 300 tests.
python-utidylib 0.10 Python bindings for Tidy HTML parser/cleaner.
python2-binaryornot 0.4.4 Ultra-lightweight pure Python package to check if a file is binary or text.
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.
radamsa 0.6 General purpose data fuzzer.
radare2 5.9.2 UNIX-like reverse engineering framework and command-line toolset.
radiography 2.0 A forensic tool which grabs as much information as possible from a Windows system.
rainbowcrack 1.8 Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches.
rarcrack 1.09.7 This program uses bruteforce algorithm to find correct password (rar, 7z, zip). Now JPassword Recovery Tool.
ratproxy A passive web application security assessment tool.
ratproxy A simple reverse proxy for testing AWS lambda functions locally.
rawr Rapid Assessment of Web Resources. A web enumerator.
rcracki-mt0 0.6 A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com
rdesktop-brute 1.9.0 It connects to Windows terminal servers - Bruteforce patch included.
reaver 1.6.x Implements a brute force attack against wifi protected setup WPSregistrar PINs in order to recover WPA/WPA2 passphrases.
rebind0 0.3.4 DNS Rebinding Tool.
recon-ng 5.1.2 A full-featured Web Reconnaissance framework written in Python.
recoverjpeg 2.6.3 Recover jpegs from damaged devices.
recstudio 4.1 Cross platform interactive decompiler.
redfang 2.5 Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().
redirectpoison 1.1 A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses. Gone.
redpoint Digital Bond's ICS Enumeration Tools.
regeorg The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
reglookup 1.0.1 Command line utility for reading and querying Windows NT registries.
replayproxy Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file.
responder 3.1.4.0 A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
rfcat 2.0.1 ChipCon-based Attack Toolset.
rfdump 1.6 A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible.
rfidiot An open source python library for exploring RFID devices.
rfidtool 1.2.1 A tool for logging data/testing devices with a Wiegand Interface. Can be used to create a portable RFID reader or installed directly into an existing installation.
rid_enum A null session RID cycle attack for brute forcing domain controllers.
rifiuti2 0.8.1 A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file.
rinetd 0.73 Internet redirection server.
ripdc 0.3 A script which maps domains related to a given ip address or domainname.
rkhunter 1.4.6 Checks machines for the presence of rootkits and other unwanted tools.
rlogin-scanner An rlogin scanner.
rootbrute Local root account bruteforcer.
ropeadope 1.1 A linux log cleaner.
ropeme A set of python scripts to generate ROP gadgets and payload.
ropgadge 7.4 Lets you search your gadgets on your binaries to facilitate your ROP exploitation.
ropper It can show information about files in different file formats and you can find gadgets to build rop chains for different architectures. For disassembly uses Capstone Framework.
roputils A Return-oriented Programming toolkit.
rpdscan Remmina Password Decoder and scanner.
rrs 1.70 A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more. Very old and gone.
rsakeyfind 1.0 A tool to find RSA key in RAM.
rsmangler 1.5 Will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.
rtlamr An rtl-sdr receiver for smart meters operating in the 900MHz ISM band.
rtlizer 2.1 Simple spectrum analyzer.
rtlsdr-scanner 1.3.2 A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library.
rtp-flood RTP flooder.
rtpbreak Detects, reconstructs and analyzes any RTP session.
rubilyn 0.0.1 64-bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host.
ruby-ronin 2.0.5 A Ruby platform for exploit development and security research.
ruby-ronin-support Support libraries for Ronin.
ruby-uri-query_params 0.8.2 Access the query parameters of a URI, just like in PHP.
rww-attack 0.9.2 The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out.
safecopy 1.7 A disk data recovery tool to extract data from damaged media.
sagan 2.0.2 Sagan is a multi-threads, high performance log analysis engine. At it's core, Sagan similar to Suricata/Snort but with logs rather than network packets.
sakis3g 0.2.0e An all-in-one script for connecting with 3G
sambascan2 0.5.0 Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds.
samdump2 3.0.0 Dump password hashes from a Windows NT/2k/XP installation.
samydeluxe Automatic samdump creation script.
sandy An open-source Samsung phone encryption assessment framework.
sasm 3.13.4 A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages.
sb0x 2.0.x A simple and Lightweight framework for Penetration testing.
sbd Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more.
scalpel 2.0 A frugal, high performance file carver
scanmem 0.17 A utility used to locate the address of a variable in an executing process.
scanssh 2.1 Fast SSH server and open proxy scanner.
scapy 2.5.0 A powerful interactive packet manipulation program written in Python.
schnappi-dhcp 0.1 schnappi can fuck network with no DHCP.
scout2 3.2.1 Security auditing tool for AWS environments. Migrated to
scoutsuite 5.14.0 An open source multi-cloud security-auditing tool, which enables security posture assessment of cloud environments.
scrape-dns Searches for interesting cached DNS entries.
scrapy 2.11.2 A fast high-level scraping and web crawling framework.
scrounge-ntfs Data recovery program for NTFS file systems.
sctpscan 1.0 A network scanner for discovery and security. Seems to be gone, but there's a plenty of other tools on the page.
seat 0.3 Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities.
secscan 1.5 Web Apps Scanner and Much more utilities.
secure-delete 3.1 Secure file, disk, swap, memory erasure utilities. Very old.
sees Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain.
sessionlist 1.0 Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth.
set 8.0.3 Social-engineer toolkit. Aimed at penetration testing around Social-Engineering.
sfuzz 0.7.0 A simple fuzzer.
sfuzz High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques.
sfuzz Slice-based Fuzzing for Real-Time Operating Systems. In Proceedings of the 29th ACM Conference on Computer and Communications Security (ACM CCS 2022).
sfuzz Fuzzing tool for smart contract vulnerability detection.
shellcodecs 0.1 A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process. Gone.
shellme Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.
shellnoob 2.1 A toolkit that eases the writing and debugging of shellcode.
shocker A tool to find and exploit servers vulnerable to Shellshock.
shodan 1.28.0 Python library for Shodan
shortfuzzy 0.1 A web fuzzing script written in perl.
siege 4.1.6 An http regression testing and benchmarking utility.
silk 3.22.2 A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks.
simple-ducky 1.1.1 A payload generator.
simple-lan-scan 1.0 A simple python script that leverages scapy for discovering live hosts on a network.
sinfp A full operating system stack fingerprinting suite.
siparmyknife 11232011 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.
sipexer 1.1.0 Modern and flexible SIP/VoIP cli tool.
siptools 0.2.8 Five SIP protocol tools: sipmap, sipwar, sipcrack, sipreport, sipcrash.
sipp 3.4 A free Open Source test tool / traffic generator for the SIP protocol.
sipsak 0.9.8.1 SIP swiss army knife.
sippts 4.0 Set of tools to audit SIP based VoIP Systems.
sipshock A scanner for SIP proxies vulnerable to Shellshock.
sipvicious 0.3.4 Tools for auditing SIP devices.
skipfish 2.10b A fully automated, active web application security reconnaissance tool.
skyjack Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.
skype-dump 1.0 This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.
skypefreak A Cross Platform Forensic Framework for Skype.
sleuthkit 4.12.1 File system and media management forensic analysis tools.
slowhttptest 1.9.0 A highly configurable tool that simulates application layer denial of service attacks.
slowloris A popular tool to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks.
smali 2.5.2 An assembler/disassembler for Android's dex format.
smbbf 0.9.1 SMB password bruteforcer.
smbexec A rapid psexec style attack with samba tools. Several versions.
smbrelay3 SMB / HTTP to SMB replay attack toolkit.
smtp-fuzz 1.0 Simple smtp fuzzer.
smtp-user-enum 0.7.0 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.
smtp-vrfy A tool to verify electronic mail addresses using SMTP.
smtpmap 0.8.234_B Tool to identify the running smtp software on a given host. Replaced by nmap, but the author has some other thoughts and projects.
smtpscan 0.5 An SMTP scanner.
smtptx 1.1b A very simple tool used for sending simple email and do some basic email testing from a pentester perspective. The site is there, but I can't find the download link.
sn00p 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests. Seems like it is nullscan now?
snapception Intercept and decrypt all snapchats received over your network.
sniffjoke 0.4.1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.
snmp-brute SNMP brute force, enumeration, CISCO config downloader and password cracking script.
snmp-fuzzer 0.1.1 SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.
snmpattack SNMP scanner and attacking tool.
snmpcheck 1.9 A free open source utility to get information via SNMP protocols.
snmpenum Snmp enumerator.
snmpscan A free, multi-processes SNMP scanner.
snoopy-ng 2.0 A distributed, sensor, data collection, interception, analysis, and visualization framework.
snort 3.3.0.0 A lightweight network intrusion detection system.
snow 20130616 Steganography program for concealing messages in text files.
socat 1.8.0.0 Multipurpose relay.
sockstat 0.4.1-1 A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.
soot 2.5.0 A Java Bytecode Analysis and Transformation Framework.
spade A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment. Gone.
sparta 2.0 Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
sparty 2.0 An open source tool written in python to audit web applications using sharepoint and frontpage architecture.
spectools Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware.
speedpwn An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.
spiderfoot 4.0 The Open Source Footprinting Tool.
spiderpig-pdffuzzer A javascript pdf fuzzer.
spiga Configurable web resource scanner.
spike 2.9 IMMUNITYsec's fuzzer creation kit in C.
spike-proxy A proxy for detecting vulnerabilities in web applications.
spiped 1.6.2 A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.
spipscan SPIP (CMS) scanner for penetration testing purpose written in Python.
splint 3.1.2 A tool for statically checking C programs for security vulnerabilities and coding mistakes.
sploitctl 3.0.4 Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
sploitego Maltego Penetration Testing Transforms.
spooftooph Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight. Part of HomePWN.
sps 5.0 A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.
sqid A SQL injection digger.
sqli-digger Automatic SQL injection (sqli) developed in php. This SQL injector has graphical interface.
sqlbrute 1.0 Brute forces data out of databases using blind SQL injection.
sqlmap 1.8 An automatic SQL injection tool developed in Python.
sqlninja 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end
sqlpat 1.0.1 This tool should be used to audit the strength of Microsoft SQL Server passwords offline. Gone.
sqlping SQL Server scanning tool that also checks for weak passwords using wordlists.
sqlsus 0.7.2 An open source MySQL injection and takeover tool, written in perl.
ssdp-scanner 1.0 SSDP amplification scanner written in Python. Makes use of Scapy.
ssh-privkey-crack 0.3 A SSH private key cracker.
ssh-user-enum 0.3 SSH User Enumeration Script in Python Using The Timing Attack.
sshatter 1.2 Password bruteforcer for SSH.
sshscan 0.9 A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.
sshtrix 0.0.3 A very fast multithreaded SSH login cracker.
sshuttle 1.1.2 Transparent proxy server that works as a poor man's VPN. Forwards all TCP packets over ssh (and even DNS requests when using --dns option). Doesn't require admin privileges on the server side.
ssl-hostname-resolver 1 CN (Common Name) grabber on X.509 Certificates over HTTPS.
ssl-phuck3r 2.0 All in one script for Man-In-The-Middle attacks.
sslcat 0.2.1 SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.
sslcaudit Utility to perform security audits of SSL/TLS clients.
ssldump 1.8 An SSLv3/TLS network protocol analyzer.
sslh 2.1.3 SSL/SSH/OpenVPN/XMPP/tinc port multiplexer.
sslmap 0.2.0 A lightweight TLS/SSL cipher suite scanner.
sslnuke Transparent proxy that decrypts SSL traffic and prints out IRC messages.
sslscan Tests SSL/TLS enabled services to discover supported cipher suites.
sslsniff 0.8 A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly.
sslsplit 0.5.5 A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections.
sslstrip 0.9 Transparently hijack http traffic on a network, watch for https links and redirects, then map those links.
sslyze 6.0.0 SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.)
stackflow Universal stack-based buffer overfow exploitation tool.
starttls-mitm A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.
statsprocessor 0.11 A high-performance word-generator based on per-position Markov-attack.
steghide 0.5.1 Embeds a message in a file by replacing some of the least significant bits.
storm-ring 0.1 This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call).
stunnel 5.72 A program that allows you to encrypt arbitrary TCP connections inside SSL.
subbrute A DNS meta-query spider that enumerates DNS records, and subdomains (Python).
subdomainer A tool designed for obtaining subdomain names from public sources.
subterfuge 1.0.1 Automated Man-in-the-Middle Attack Framework.
sucrack 1.2.3 A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su.
sulley A pure-python fully automated and unattended fuzzing framework. Forked as Boofuzz.
suricata 7.0.6 An Open Source Next Generation Intrusion Detection and Prevention Engine.
svn-extractor A simple script to extract all web resources by means of .SVN folder exposed over network.
swaks 20240103.0 Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH.
swfintruder 0.9.1 First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.
syn-flood Syn-flood git topic.
synner 1.1 A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.
synscan 5.02 A fast asynchronous half-open TCP portscanner.
sysdig Open source system-level exploration and troubleshooting tool.
sysinternals Sysinternals tools suite.
t50 5.8.7b Experimental Multi-protocol Packet Injector Tool (aka F 22 Raptor).
taof 0.3.2 Taof is a GUI cross-platform Python generic network protocol fuzzer.
tbear 1.5 Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.
tcgetkey 0.1 A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.
tckfc TrueCrypt key file cracker.
tcpdump 4.99.4 A tool for network monitoring and data acquisition.
tcpextract 1.1 Extracts files from captured TCP sessions. Support live streams and pcap files.
tcpflow 1.5.0 Captures data transmitted as part of TCP connections then stores the data conveniently.
tcpick 0.2.1 TCP stream sniffer and connection tracker.
tcpjunk 2.9.03 A general tcp protocols testing and hacking utility.
tcpreplay 4.5.1 Gives the ability to replay previously captured traffic in a libpcap format.
tcptraceroute 1.5b7 A traceroute implementation using TCP packets.
tcpwatch 1.3.1 A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.
tcpwatch A network packet arrival deadline monitor.
tcpxtract 1.0.1 A tool for extracting files from network traffic.
tekdefense-automater 0.21 IP URL and MD5 OSINT Analysis.
termineter Smart meter testing framework.
tftptheft 0.1 Allows one to quickly scan/bruteforce a tftp server for files and download them instantly.
tftp-fuzz 1337Master TFTP fuzzing script as part of the ftools series of fuzzers.
tftp-proxy 0.1 This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.
thc-ipv6 3.8 A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.
thc-keyfinder 1.0 Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.
thc-pptp-bruter 0.1.4 A brute force program that works against pptp vpn endpoints (tcp port 1723).
thc-smartbrute 1.0 This tool finds undocumented and secret commands implemented in a smartcard.
thcsslcheck A tool to verify the performance of SSL.
theharvester 2.7 Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).
themole 0.3 Automatic SQL injection exploitation tool.
tiger 3.2.4 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
tilt An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.
timegen 0.4 This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.
tinc 1.0.36 VPN daemon that uses tunnelling and encryption.
tinfoleak Get detailed information about a Twitter user activity.
tinyproxy 1.11.2 A light-weight HTTP proxy daemon for POSIX operating systems.
tlsenum 0.3 A command line tool to enumerate TLS cipher-suites supported by a server.
tlspretense 0.6.2 SSL/TLS client testing framework.
tlssled 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
tnscmd A tool to prod the oracle tnslsnr process (1521/tcp).
topera An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.
tor Anonymizing overlay network.
tor-autocircuit 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.
torshammer 1.0 A slow POST Denial of Service testing tool written in Python.
torsocks 2.4.0 Wrapper to safely torify applications.
tpcat latest TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest.
traceroute 2.1.5 Tracks the route taken by packets over an IP network
trid 2.24 A utility designed to identify file types from their binary signatures.
trinity A Linux System call fuzzer.
trixd00r 0.0.1 An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.
truecrack 3.6 Password cracking for truecrypt(c) volumes.
truecrypt Free open-source cross-platform disk encryption software. Outdated, use Veracrypt, BitLocker or LUKS. The page helps to migrate.
tsh Tiny SHell, an open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.
tsh-sctp TinySHell port to SCTP.
tunna 1.1a A set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.
tuxcut 6.1 Netcut-like program for Linux written in PyQt. Arp spoofing tool.
twofi 2.0 Twitter Words of Interest.
u3-pwn 2.0 A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install.
uatester 1.06 User Agent String Tester.
ubertooth 2020-12-R1 Tools for a 2.4 GHz wireless development board suitable for Bluetooth experimentation.
ubitack 0.3 Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.
udis 1.7.2 A minimalistic disassembler library.
udptunnel Tunnels TCP over UDP packets.
uefi-firmware-parser 1.11 Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc
ufo-wardriving Allows you to test the security of wireless networks by detecting their passwords based on the router model.
ufonet 1.8 A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet.
umap The USB host security assessment tool.
umit 1.0 A powerful nmap frontend.
unhide 20210124 A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.
unibrute Multithreaded SQL union bruteforcer.
unicorn 3.17 A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.
unicornscan An information gathering and correlation engine.
uniofuzz 0.1.2-beta The universal fuzzing tool for browsers, web services, files, programs and network services/ports.
uniscan 6.2 A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
unix-privesc-check 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases).
upnp-pentest-toolkit 1.1 UPnP Pentest Toolkit for Windows.
upnpscan 0.4 Scans the LAN or a given address range for UPnP capable devices.
upx 4.2.4 Ultimate executable compressor.
urlcrazy 0.5 Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
urldigger 02c A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code.
username-anarchy 0.5 Tools for generating usernames when penetration testing.
usernamer Pentest Tool to generate usernames/logins based on supplied names.
uw-loveimap 0.1 Multi threaded imap bounce scanner.
uw-offish 0.1 Clear-text protocol simulator.
uw-udpscan 0.1 Multi threaded udp scanner.
uw-zone 0.1 Multi threaded, randomized IP zoner.
v3n0m Release-425 Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns. Searches 18k+ dorks over 13 search engines.
valgrind 3.23.0 A tool to help find memory-management problems in programs.
vane A vulnerability scanner which checks the security of WordPress installations using a black box approach.
vanguard 0.1 A comprehensive web penetration testing tool written in Perl that identifies vulnerabilities in web applications.
vbrute Virtual hosts brute forcer.
vega 1.0 An open source platform to test the security of web applications
veil 3.1.x A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
veracrypt 1.26.7 Free disk encryption software, TrueCrypt fork.
vfeed The Correlated CVE Vulnerability And Threat Intelligence Database API.
vidalia Controller GUI for Tor. Replaced by Tor Launcher.
videosnarf 0.63-1 A security assessment tool for pcap analysis.
vinetto 0.07b A forensics tool to examine Thumbs.db files.
viper2 Binary analysis and management framework. It aims to provide a solution to easily organize your collection of malware and exploit samples as well as your collection of scripts you created or found over the time to facilitate your daily research.
viproy-voipkit 4.1 VoIP Pen-Test Kit for Metasploit Framework.
vivisect 1.2.0 A combined disassembler/static analysis/symbolic execution/debugger framework.
vlan-hopping Easy 802.1Q VLAN Hopping.
vnak Aim is to be the one tool a user needs to attack multiple VoIP protocols.
vnc-bypauth Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.
vncrack 2.1 What it looks like: crack VNC.
voiper 0.07 A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.
voiphopper 2.04 A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
voipong 2.0 A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.
volatility 2.6 A memory forensics toolkit.
vstt 0.5.3 VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.
vulscan 2.1 A module which enhances nmap to a vulnerability scanner.
w3af 1.6.49 Web Application Attack and Audit Framework.
waffit 2.2.0 A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website.
wafp 0.01 An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.
waidps Wireless Auditing, Intrusion Detection & Prevention System.
wapiti 3.1.8 A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...
wavemon 0.9.6 Ncurses-based monitoring application for wireless network devices.
web-soul A plugin based scanner for attacking and data mining web sites written in Perl.
webacoo 0.2.3 Web Backdoor Cookie Script-Kit.
webenum 0.1 Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.
webhandler A handler for PHP system functions & also an alternative 'netcat' handler.
webpwn3r A python based Web Applications Security Scanner.
webrute Web server directory brute forcer.
webscarab Framework for analysing applications that communicate using the HTTP and HTTPS protocols.
webshag A multi-threaded, multi-platform web server audit tool.
webshells Web Backdoors.
webslayer A tool designed for brute forcing Web Applications.
websockify 0.12.0 WebSocket to TCP proxy/bridge.
webspa 0.8 A web knocking tool, sending a single HTTP/S to run O/S commands.
websploit 4.0.3 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks.
weevely3 4.0.2 Weaponized web shell.
wepbuster 1.0_beta_0.7 A script for automating aircrack-ng.
wfuzz 3.1.0 Utility to bruteforce web applications to find their not linked resources. A web fuzzer.
whatweb 0.5.5 Next generation web scanner that identifies what websites are running. br>wi-feye An automated wireless penetration testing tool written in python , its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.
wi-feye A service that uses Wi-Fi probe requests in a building to do crowd behavior analysis and detect common patterns, points of interest and anomalies inside the building.
wifi-honey 1.0 A management tool for wifi honeypots.
wifi-monitor Prints the IPs on your local network that're sending the most packets
wificurse WiFi jamming tool.
wifijammer A python script to continuosly jam all wifi clients within range.
wifiphisher Fast automated phishing attacks against WPA networks.
wifitap 0.4.1 WiFi injection tool through tun/tap device.
wifite2 A tool to attack multiple WEP and WPA encrypted networks at the same time.
wig 0.6 WebApp Information Gatherer.
wikigen A script to generate wordlists out of wikipedia pages.
winexe 1.00 Remotely execute commands on Windows NT/2000/XP/2003 systems.
winfo 2.0 Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.
wireless-ids Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.
wireshark 4.2.6 A free network protocol analyzer for Unix/Linux and Windows.
wirouter-keyrec 1.1.2 A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).
witchxtool 1.1 A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.
wlan2eth 1.3 Re-writes 802.11 captures into standard Ethernet frames.
wmat Automatic tool for testing webmail accounts
wnmap 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.
wol-e 2.0 A suite of tools for the Wake on LAN feature of network attached computers
wordbrutepress 2.1 Wordpress Brute Force Multithreading with standard and xml-rpc login.
wordpot Wordpress Honeypot.
wpa-bruteforcer Attacking WPA/WPA encrypted access point without client.
wpbf Multithreaded WordPress brute forcer.
wpscan 3.8.25 A vulnerability scanner which checks the security of WordPress installations using a black box approach.
ws-attacker 1.7 A modular framework for web services penetration testing.
wsfuzzer 1.9.5 A Python tool written to automate SOAP pentesting of web services.
wyd 0.2 Gets keywords from personal files. IT security/forensic tool.
x-scan 3.3 A general network vulnerabilities scanner. Gone.
xcavator Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.
xorbruteforcer 0.1 Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.
xorsearch 1.11.4 Program to search for a given string in an XOR, ROL or ROT encoded binary file.
xortool A tool to analyze multi-byte xor cipher.
xplico Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT).
xprobe2 0.3 An active OS fingerprinting tool.
xSMTP 1.2 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.
xspy 1.0c A utility for monitoring keypresses on remote X servers
xsser 1.8.4 A penetration testing tool for detecting and exploiting XSS vulnerabilites.
xssless An automated XSS payload generator written in python.
xsss 0.40b A brute force cross site scripting scanner.
xssscan Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.
xsssniper 0.9.1 An automatic XSS discovery tool
xssya A Cross Site Scripting Scanner & Vulnerability Confirmation.
yaaf Yet Another Admin Finder.
yara 4.5.1 A malware identification and classification tool.
ycrawler 0.1 A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. Proxy and log file support.
yersinia 0.8.2 A framework for layer 2 attacks.
yinjector 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
zackattack 0.1.1 Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS! (12 years ago...)
zaproxy 2.15.0 The Zed Attack Proxy, a local intercepting proxy with integrated penetration testing tool for finding vulnerabilities in web applications.
zarp 1.5 A network attack tool centered around the exploitation of local networks.
zerowine 2.0 Malware Analysis Tool - research project to dynamically analyze the behavior of malware.
zmap 4.2.0 Fast network scanner designed for Internet-wide network surveys. Check out their other tools too.
zulu 0.1 A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.
zykeys 0.1 Demonstrates how default wireless settings are derived on some models of ZyXEL routers.
zzuf 0.15 Transparent application input fuzzer.