Hacker's toolbook

0d1n              Web security tool to make fuzzing at HTTP inputs, made in C with libCurl      webapp     
0trace              A hop enumeration tool      scanner     
3proxy              Tiny free proxy server      proxy     
3proxy-win          Tiny free proxy server      windows     
42zip              Recursive Zip archive bomb      dos     
a2sv              Auto Scanning to SSL Vulnerability      scanner     
abcd              ActionScript ByteCode Disassembler      disassembler     
abuse-ssl-bypass-waf     Bypassing WAF by abusing SSL/TLS Ciphers      webapp     
acccheck          A password dictionary attack tool that targets windows authentication via the SMB protocol      cracker     
ace              Automated Corporate Enumerator A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface      voip     
aclpwn              Active Directory ACL exploitation with BloodHound      exploitation     
activedirectoryenum     Enumerate AD through LDAP      recon     
ad-ldap-enum          An LDAP based Active Directory user and group enumeration tool      recon     
adape-script          Active Directory Assessment and Privilege Escalation Script      windows     
adenum              A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos      exploitation     
adfind              Simple admin panel finder for php,js,cgi,asp and aspx admin panels      webapp     
adfspray          Python tool to perform password spraying against Microsoft Online service using various methods      cracker     
adidnsdump          Active Directory Integrated DNS dumping by any authenticated user      recon     
admid-pack          ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets Very powerful      spoof     
adminpagefinder      This python script looks for a large amount of possible administrative interfaces on a given site      webapp     
admsnmp          ADM SNMP audit scanner      scanner     
aesfix              A tool to find AES key in RAM      cracker     
aeskeyfind          A tool to find AES key in RAM      cracker     
aespipe          Reads data from stdin and outputs encrypted or decrypted results to stdout      crypto     
aesshell          A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA for secure transport      backdoor     
afflib              An extensible open format for the storage of disk images and related forensic information      forensic     
aflplusplus          American Fuzzing Lop fuzzer with community patches and additional features      fuzzer     
afpfs-ng          A client for the Apple Filing Protocol (AFP)      networking     
agafi              A gadget finder and a ROP-Chainer tool for x platforms      windows     
against          A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list      cracker     
aggroargs          Bruteforce commandline buffer overflows, linux, aggressive arguments      exploitation     
aiengine          A packet inspection engine with capabilities of learning without any human intervention      networking     
aimage              A program to create aff-images      forensic     
aiodnsbrute          Python  DNS asynchronous brute force utility      recon     
air              A GUI front-end to dd/dcdd designed for easily creating forensic images      forensic     
aircrack-ng          Key cracker for the  WEP and WPA-PSK protocols      wireless     
airflood          A modification of aireplay that allows for a DoS of the AP This program fills the table of clients of the AP with random MACs doing impossible new connections [Tool in Spanish]      wireless     
airgeddon          Multi-use bash script for Linux systems to audit wireless networks      wireless     
airopy     bfd         Get (wireless) clients and access points      wireless     
airoscript          A script to simplify the use of aircrack-ng tools      wireless     
airpwn              A tool for generic packet injection on an  network      wireless     
ajpfuzzer          A command-line fuzzer for the Apache JServ Protocol (ajp)      fuzzer     
albatar          A SQLi exploitation framework in Python      webapp     
allthevhosts          A vhost discovery tool that scrapes various web applications      scanner     
altdns              Generates permutations, alterations and mutations of subdomains and then resolves them      recon     
amass              In-depth subdomain enumeration written in Go      scanner     
amber              Reflective PE packer      binary     
amoco              Yet another tool for analysing binaries      binary     
analyzemft          Parse the MFT file from an NTFS filesystem      forensic     
analyzepesig          Analyze digital signature of PE file      windows     
androbugs          An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications      mobile     
androguard          Reverse engineering, Malware and goodware analysis of Android applications and more      binary     
androick          A python tool to help in forensics analysis on android      mobile     
android-apktool      A tool for reverse engineering Android apk files      reversing     
android-ndk          Android C/C++ developer kit      mobile     
android-sdk          Google Android SDK      mobile     
android-udev-rules     Android udev rules      mobile     
androidpincrack     Bruteforce the Android Passcode given the hash and salt      mobile     
androidsniffer          A perl script that lets you search for rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more      mobile     
androwarn          Yet another static code analyzer for malicious Android applications      mobile     
angr              The next-generation binary analysis platform from UC Santa Barbaras Seclab      binary     
angr-management     This is the GUI for angr      binary     
angr-py2          The next-generation binary analysis platform from UC Santa Barbaras Seclab      binary     
angrop              A rop gadget finder and chain builder      exploitation     
anontwi          A free software python client designed to navigate anonymously on social networks It supports Identica and Twittercom      social     
anti-xss          A XSS vulnerability scanner      webapp     
antiransom          A tool capable of detect and stop attacks of Ransomware using honeypots      windows     
apache-users          This perl script will enumerate the usernames on a unix system that use the apache module UserDir      scanner     
apacket          Sniffer syn and backscatter packets      networking     
aphopper          A program that automatically hops between access points of different wireless networks      wireless     
apkid              Android Application Identifier for Packers, Protectors, Obfuscators and Oddities      mobile     
apkleaks          Scanning APK file for URIs, endpoints & secrets      mobile     
apkstat          Automated Information Retrieval From APKs For Initial Analysis      mobile     
apkstudio          An IDE for decompiling/editing & then recompiling of android application binaries      reversing     
apnbf              A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device      wireless     
appmon              A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida      mobile     
apt2              Automated penetration toolkit      automation     
aquatone          A Tool for Domain Flyovers      recon     
arachni          A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications      webapp     
aranea              A fast and clean dns spoofing tool      spoof     
arcane              Backdoor iOS packages and create the necessary resources for APT repositories      mobile     
archivebox          The open source self-hosted web archive Takes browser history/bookmarks/Pocket/Pinboard/etc, saves HTML, JS, PDFs, media, and more      misc     
arduino          Arduino prototyping platform SDK      hardware     
argon2              A password-hashing function (reference C implementation)      crypto     
argus              Network monitoring tool with flow control      networking     
argus-clients          Network monitoring client for Argus      networking     
arjun              HTTP parameter discovery suite      webapp     
armitage          A graphical cyber attack management tool for Metasploit      exploitation     
armor              A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners      exploitation     
armscgen          ARM Shellcode Generator (Mostly Thumb Mode)      exploitation     
arp-scan          A tool that uses ARP to discover and fingerprint IP hosts on the local network      networking     
arpalert          Monitor ARP changes in ethernet networks      networking     
arpoison          The UNIX arp cache update utility      exploitation     
arpon              A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks      defensive     
arpstraw          Arp spoof detection tool      defensive     
arptools          A simple tool about ARP broadcast, ARP attack, and data transmission      networking     
arpwner          GUI-based python tool for arp poisoning and dns poisoning attacks      networking     
artillery          A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system      defensive     
artlas              Apache Real Time Logs Analyzer System      defensive     
arybo              Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions      misc     
asleap              Actively recover LEAP/PPTP passwords      cracker     
asp-audit          An ASP fingerprinting tool and vulnerability scanner      fingerprint     
assetfinder          Find domains and subdomains potentially related to a given domain      scanner     
astra              Automated Security Testing For REST API's      webapp     
atear              Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration      wireless     
atftp              Client/server implementation of the TFTP protocol that implements RFCs , , , , and       networking     
athena-ssl-scanner      A SSL cipher scanner that checks all cipher codes It can identify about  different ciphers      scanner     
atlas             Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS      webapp     
atscan              Server, Site and Dork Scanner      scanner     
atstaketools          This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics      windows     
attacksurfacemapper      Tool that aims to automate the reconnaissance process      recon     
attk              Trend Micro Anti-Threat Toolkit      scanner     
aurebeshjs          Translate JavaScript to Other Alphabets      misc     
auto-eap          Automated Brute-Force Login Attacks Against EAP Networks      wireless     
auto-xor-decryptor      Automatic XOR decryptor tool      crypto     
automato          Should help with automating some of the user-focused enumeration tasks during an internal penetration test      automation     
autonessus          This script communicates with the Nessus API in an attempt to help with automating scans      automation     
autonse          Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner      automation     
autopsy          The forensic browser A GUI for the Sleuth Kit      forensic     
autopwn          Specify targets and run sets of tools against them      automation     
autorecon          A multi-threaded network reconnaissance tool which performs automated enumeration of services      automation     
autosint          Tool to automate common osint tasks      recon     
autosploit          Automate the exploitation of remote hosts      exploitation     
autovpn          Easily connect to a VPN in a country of your choice      networking     
avaloniailspy          NET Decompiler (port of ILSpy)      decompiler     
avet              AntiVirus Evasion Tool      binary     
avml              A portable volatile memory acquisition tool for Linux      misc     
aws-extender-cli      Script to test S buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues      scanner     
aws-inventory          Discover resources created in an AWS account      recon     
awsbucketdump          A tool to quickly enumerate AWS S buckets to look for loot      automation     
azazel              A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit      backdoor     
aztarna          A footprinting tool for ROS and SROS systems      recon     
backcookie          Small backdoor using cookie      backdoor     
backdoor-apk          Shell script that simplifies the process of adding a backdoor to any Android APK file      mobile     
backdoor-factory      Patch win/ binaries with shellcode      backdoor     
backdoorme          A powerful utility capable of backdooring Unix machines with a slew of backdoors      backdoor     
backdoorppt          Transform your payloadexe into one fake word doc (ppt)      backdoor     
backfuzz          A network protocol fuzzing toolkit      fuzzer     
backhack          Tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps      mobile     
backoori          Tool aided persistence via Windows URI schemes abuse      exploitation     
backorifice          A remote administration system which allows a user to control a computer across a tcpip connection using a simple console or GUI application      windows     
bad-pdf          Steal NTLM Hashes with Bad-PDF      exploitation     
badkarma          Advanced network reconnaissance toolkit      recon     
badministration      A tool which interfaces with management or administration applications from an offensive standpoint      webapp     
bagbak              Yet another frida based App decryptor      mobile     
balbuzard          A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc)      malware     
bamf-framework          A modular framework designed to be a platform to launch attacks against botnets      malware     
bandicoot          A toolbox to analyze mobile phone metadata      mobile     
barf              A multiplatform open source Binary Analysis and Reverse engineering Framework      binary     
barmie              Java RMI enumeration and attack tool      scanner     
barq              An AWS Cloud Post Exploitation framework      exploitation     
basedump          Extract and decode base strings from files      misc     
basedomainname          Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names      recon     
bashfuscator          Fully configurable and extendable Bash obfuscation framework      automation     
bashscan          A port scanner built to utilize /dev/tcp for network and service discovery      scanner     
batctl              BATMAN advanced control and management tool      wireless     
batman-adv          Batman kernel module, (included upstream since )      wireless     
batman-alfred          Almighty Lightweight Fact Remote Exchange Daemon      wireless     
bbqsql              SQL injection exploit tool      webapp     
bbscan              A tiny Batch web vulnerability Scanner      webapp     
bdfproxy          Patch Binaries via MITM: BackdoorFactory + mitmProxy      proxy     
bdlogparser          This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintenance of your malware collection      malware     
bed              Collection of scripts to test for buffer overflows, format string vulnerabilities      exploitation     
beebug              A tool for checking exploitability      decompiler     
beef              The Browser Exploitation Framework that focuses on the web browser      exploitation     
beeswarm          Honeypot deployment made easy http://wwwbeeswarm-idsorg/      honeypot     
beholder          A wireless intrusion detection tool that looks for anomalies in a wifi environment      wireless     
belati              The Traditional Swiss Army Knife for OSINT      scanner     
beleth              A Multi-threaded Dictionary based SSH cracker      cracker     
bettercap          Swiss army knife for network attacks and monitoring      sniffer     
bettercap-ui          Official Bettercap's Web UI      misc     
bfac              An automated tool that checks for backup artifacts that may disclose the web-application's source code      recon     
bfbtester          Performs checks of single and multiple argument command line overflows and environment variable overflows      exploitation     
bfuzz              Input based fuzzer tool for browsers      fuzzer     
bgp-md5crack          RFC password cracker      cracker     
bgrep              Binary grep      binary     
billcipher          Information Gathering tool for a Website or IP address      recon     
binaryninja-demo      A new kind of reversing platform (demo version)      reversing     
binaryninja-python      Binary Ninja prototype written in Python      binary     
bind              A complete, highly portable implementation of the DNS protocol      networking     
bindead          A static analysis tool for binaries      binary     
bindiff          A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code      binary     
binex              Format String exploit building tool      exploitation     
binflow          POSIX function tracing Much better and faster than ftrace      binary     
bing-ip2hosts          Enumerates all hostnames which Bing has indexed for a specific IP address      recon     
bing-lfi-rfi          Python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities      webapp     
bingoo              A Linux bash based Bing and Google Dorking Tool      scanner     
binnavi          A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code      disassembler     
binproxy          A proxy for arbitrary TCP connections      proxy     
binwalk          Tool for searching a given binary image for embedded files      disassembler     
binwally          Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep)      binary     
bios_memimage          A tool to dump RAM contents to disk (aka cold boot attack)      cracker     
birp              A tool that will assist in the security assessment of mainframe applications served over TN      scanner     
bitdump          A tool to extract database data from a blind SQL injection vulnerability      exploitation     
bittwist          A simple yet powerful libpcap-based Ethernet packet generator It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic      sniffer     
bkcrack          Crack legacy zip encryption with Biham and Kocher known plaintext attack      cracker     
bkhive              Program for dumping the syskey bootkey from a Windows NT/K/XP system hive      cracker     
blackbox-scanner      Dork scanner & bruteforcing & hash cracker with blackbox framework      scanner     
blackeye          Ultimate phishing tool with ngrok and serveo      social     
blackhash          Creates a filter from system hashes      cracker     
blacknurse          A low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls      dos     
bleah              A BLE scanner for "smart" devices hacking      scanner     
bless              High-quality, full-featured hex editor      misc     
bletchley          A collection of practical application cryptanalysis tools      crypto     
blind-sql-bitshifting      A blind SQL injection module that uses bitshfting to calculate characters      exploitation     
blindelephant          A web application fingerprinter Attempts to discover the version of a (known) web application by comparing static files at known locations      fingerprint     
blindsql          Set of bash scripts for blind SQL injection attacks      database     
blindy              Simple script to automate brutforcing blind sql injection vulnerabilities      scanner     
blisqy              Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)      webapp     
bloodhound          Six Degrees of Domain Admin      recon     
bloodhound-python      Bloodhound python data collector      recon     
bloodyad          An Active Directory Privilege Escalation Framework      exploitation     
blue-hydra          A Bluetooth device discovery service built on top of the bluez library      bluetooth     
bluebox-ng          A GPL VoIP/UC vulnerability scanner      voip     
bluebugger          An implementation of the bluebug technique which was discovered by Martin Herfurt      bluetooth     
bluediving          A Bluetooth penetration testing suite      bluetooth     
bluefog          A tool that can generate an essentially unlimited number of phantom Bluetooth devices      bluetooth     
bluelog          A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode      bluetooth     
bluepot          A Bluetooth Honeypot written in Java, it runs on Linux      bluetooth     
blueprint          A perl tool to identify Bluetooth devices      bluetooth     
blueranger          A simple Bash script which uses Link Quality to locate Bluetooth device radios      automation     
bluescan          A Bluetooth Device Scanner      bluetooth     
bluesnarfer          A bluetooth attacking tool      bluetooth     
bluffy              Convert shellcode into different formats      exploitation     
bluphish          Bluetooth device and service discovery tool that can be used for security assessment and penetration testing      bluetooth     
bluto              Recon, Subdomain Bruting, Zone Transfers      scanner     
bmap-tools          Tool for copying largely sparse files using information from a block map file      forensic     
bmc-tools          RDP Bitmap Cache parser      forensic     
bob-the-butcher      A distributed password cracker package      cracker     
bof-detector          A simple detector of BOF vulnerabilities by source-code-level check      code-audit     
bonesi              The DDoS Botnet Simulator      dos     
boofuzz                           fuzzer     
boopsuite          A Suite of Tools written in Python for wireless auditing and security testing      wireless     
bopscrk          Tool to generate smart wordlists, eg based on lyrics      automation     
botb              A container analysis and exploitation tool for pentesters and engineers      exploitation     
bowcaster          A framework intended to aid those developing exploits      exploitation     
box-js              A tool for studying JavaScript malware      malware     
bqm              Download BloudHound query lists, deduplicate entries and merge them in one file      misc     
braa              A mass snmp scanner      scanner     
braces              A Bluetooth Tracking Utility      bluetooth     
brakeman          A static analysis security vulnerability scanner for Ruby on Rails applications      code-audit     
bridgekeeper          Scrape employee names from search engine LinkedIn profiles Convert employee names to a specified username format      recon     
brosec              An interactive reference tool to help security professionals utilize useful payloads and commands      exploitation     
browselist          Retrieves the browse list ; the output list contains computer names, and the roles they play in the network      windows     
browser-fuzzer          Browser Fuzzer       fuzzer     
brute-force          Brute-Force attack tool for Gmail Hotmail Twitter Facebook Netflix      cracker     
brute12          A tool designed for auditing the cryptography container security in PKCS format      windows     
bruteforce-luks      Try to find the password of a LUKS encrypted volume      cracker     
bruteforce-salted-openssl  Try to find the password of a file that was encrypted with the 'openssl' command      cracker     
bruteforce-wallet      Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc) wallet file      cracker     
brutemap          Penetration testing tool that automates testing accounts to the site's login page      webapp     
brutespray          Brute-Forcing from Nmap output - Automatically attempts default creds on found services      automation     
brutessh          A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks It's multithreads      cracker     
brutex              Automatically brute force all services running on a target      automation     
brutexss          Cross-Site Scripting Bruteforcer      webapp     
brutus              One of the fastest, most flexible remote password crackers you can get your hands on      windows     
bsdiff              bsdiff and bspatch are tools for building and applying patches to binary files      reversing     
bsqlbf              Blind SQL Injection Brute Forcer      webapp     
bsqlinjector          Blind SQL injection exploitation tool written in ruby      webapp     
bss              Bluetooth stack smasher / fuzzer      bluetooth     
bt_audit          Bluetooth audit      bluetooth     
btcrack          The world's first Bluetooth Pass phrase (PIN) bruteforce tool Bruteforces the Passkey and the Link key from captured Pairing exchanges      bluetooth     
btlejack          Bluetooth Low Energy Swiss-army knife      bluetooth     
btproxy-mitm          Man in the Middle analysis tool for Bluetooth      bluetooth     
btscanner          Bluetooth device scanner      bluetooth     
bulk-extractor          Bulk Email and URL extraction tool      forensic     
bully              Retrieve WPA/WPA passphrase from a WPS enabled access point      wireless     
bunny              A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs      fuzzer     
burpsuite          An integrated platform for attacking web applications (community edition) + SHELLING plugin      webapp     
buster              Find emails of a person and return info associated with them      social     
buttinsky          Provide an open source framework for automated botnet monitoring      networking     
bvi              A display-oriented editor for binary files operate like "vi" editor      binary     
byepass          Automates password cracking tasks using optimized dictionaries and mangling rules      automation     
bypass-firewall-dns-history      Firewall bypass script based on DNS history records      networking     
bytecode-viewer     A Java /Android APK Reverse Engineering Suite      binary     
cscan              Vulnerability scanner and information gatherer for the Concrete CMS      webapp     
cachedump          A tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH)      windows     
cadaver          Command-line WebDAV client for Unix      networking     
cafebabe          Java bytecode editor & decompiler      decompiler     
cameradar          Hacks its way into RTSP videosurveillance cameras      scanner     
camover          A camera exploitation tool that allows to disclosure network camera admin password      exploitation     
camscan          A tool which will analyze the CAM table of Cisco switches to look for anamolies      scanner     
can-utils          Linux-CAN / SocketCAN user space applications      automobile     
canalyzatr          Security analysis toolkit for proprietary car protocols      automobile     
canari              Maltego rapid transform development and execution framework      forensic     
cangibrina          Dashboard Finder      scanner     
cansina          A python-based Web Content Discovery Tool      webapp     
cantoolz          Framework for black-box CAN network analysis      automobile     
capfuzz          Capture, fuzz and intercept web traffic      sniffer     
capstone          Lightweight multi-platform, multi-architecture disassembly framework      reversing     
captipper          Malicious HTTP traffic explorer tool      forensic     
cardpwn          OSINT Tool to find Breached Credit Cards Information      social     
carwhisperer          Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys      bluetooth     
casefile          The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information      forensic     
catana              Filter your wordlist according to the specified password policy      misc     
catnthecanary          An application to query the canarypw data set for leaked data      recon     
catphish          For phishing and corporate espionage      social     
ccrawldns          Retrieves from the CommonCrawl data set unique subdomains for a given domain name      recon     
cdpsnarf          Cisco discovery protocol sniffer      sniffer     
cecster          A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols      scanner     
centry              Cold boot & DMA protection      misc     
cero              Scrape domain names from SSL certificates of arbitrary hosts      scanner     
certgraph          Crawl the graph of certificate Alternate Names      recon     
certipy          Active Directory Certificate Services enumeration and abuse      windows     
cewl              A custom word list generator      automation     
cflow              A C program flow analyzer      code-audit     
cfr              Another Java decompiler      decompiler     
chainsaw          A powerful ‘first-response’ capability to quickly identify threats within Windows event logs      defensive     
chameleon          A tool for evading Proxy categorisation      networking     
chameleonmini          Official repository of ChameleonMini, a freely programmable, portable tool for NFC security analysis that can emulate and clone contactless cards, read RFID tags and sniff/log RF data      social     
changeme          A default credential scanner      scanner     
chankro          Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (pe reverse shell) bypassing disable_functions & open_basedir)      webapp     
chaos-client          Go client to communicate with Chaos dataset API      recon     
chaosmap          An information gathering tool and dns / whois / web server scanner      forensic     
chaosreader          A freeware tool to trace tcp, udp etc sessions and fetch application data from snoop or tcpdump logs      networking     
chapcrack          A tool for parsing and decrypting MS-CHAPv network handshakes      cracker     
cheat-sh          The only cheat sheet you need      automation     
check-weak-dh-ssh     Debian OpenSSL weak client Diffie-Hellman Exchange checker      scanner     
checkiban          Checks the validity of an International Bank Account Number (IBAN)      misc     
checksec          Tool designed to test which standard Linux OS and PaX security features are being used      automation     
chiasm-shell          Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone      disassembler     
chipsec          Platform Security Assessment Framework      hardware     
chiron              An all-in-one IPv Penetration Testing Framework      scanner     
chisel              A fast TCP tunnel over HTTP      tunnel     
chkrootkit          Checks for rootkits on a system      defensive     
chntpw              Offline NT Password Editor - reset passwords in a Windows NT SAM user database file      forensic     
chopshop          Protocol Analysis/Decoder Framework      networking     
choronzon          An evolutionary knowledge-based fuzzer      fuzzer     
chownat          Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other      tunnel     
chrome-decode          Chrome web browser decoder tool that demonstrates recovering passwords      windows     
chromefreak          A Cross-Platform Forensic Framework for Google Chrome      forensic     
chromensics          A Google chrome forensics tool      windows     
chwt              Unices chroot breaking tool      exploitation     
cidrrange          Script for listing the IP addresses contained in a CIDR netblock      networking     
cintruder          An automatic pentesting tool to bypass captchas      cracker     
cipherscan          A very simple way to find out which SSL ciphersuites are supported by a target      scanner     
ciphertest          A better SSL cipher checker using gnutls      crypto     
ciphr              A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data      crypto     
cirt-fuzzer          A simple TCP/UDP protocol fuzzer      fuzzer     
cisco-auditing-tool     Perl script which scans cisco routers for common vulnerabilities Checks for default passwords, easily guessable community names, and the IOS history bug Includes support for plugins and scanning multiple hosts      cracker     
cisco-global-exploiter     A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products      exploitation     
cisco-ocs          Cisco Router Default Password Scanner      cracker     
cisco-router-config     Tools to copy and merge Cisco Routers Configuration      misc     
cisco-scanner          Multithreaded Cisco HTTP vulnerability scanner Tested on Linux, OpenBSD and Solaris      cracker     
cisco-snmp-enumeration     Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking      automation     
cisco-snmp-slap     IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices      spoof     
cisco-torch          Cisco Torch mass scanning, fingerprinting, and exploitation tool      exploitation     
ciscocrack          Crypt and decrypt the cisco enable  passwords      cracker     
ciscocrack          Crypt and decrypt the cisco enable  passwords      cracker     
ciscos              Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco      scanner     
citadel          A library of OSINT tools      recon     
cjexploiter          Drag and Drop ClickJacking exploit development assistance tool      webapp     
clair              Vulnerability Static Analysis for Containers      scanner     
clairvoyance          Obtain GraphQL API Schema even if the introspection is not enabled      webapp     
clamscanlogparser     This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection      malware     
clash              A rule based proxy in Go      tunnel     
climber          Check UNIX/Linux systems for privilege escalation      scanner     
cloakify          Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection      misc     
cloud-buster          A tool that checks Cloudflare enabled sites for origin IP leaks      recon     
cloudfail          Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network      recon     
cloudflare-enum      Cloudflare DNS Enumeration Tool for Pentesters      scanner     
cloudget          Python script to bypass cloudflare from command line Built upon cfscrape module      webapp     
cloudlist          A tool for listing Assets from multiple Cloud Providers      recon     
cloudmare          A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS      recon     
cloudsploit          AWS security scanning checks      scanner     
cloudunflare          Reconnaissance Real IP address for Cloudflare Bypass      recon     
clusterd          Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack      automation     
cminer              A tool for enumerating the code caves in PE files      binary     
cmospwd          Decrypts password stored in CMOS used to access BIOS setup      cracker     
cms-explorer          Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running      fingerprint     
cms-few          Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python      webapp     
cmseek              CMS (Content Management Systems) Detection and Exploitation suite      webapp     
cmsfuzz          Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke      webapp     
cmsmap              A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs      scanner     
cmsscan          CMS scanner to identify and find vulnerabilities for Wordpress, Drupal, Joomla, vBulletin      webapp     
cmsscanner          CMS Scanner Framework      webapp     
cnamulator          A phone CNAM lookup utility using the OpenCNAM API      mobile     
cntlm              An NTLM, NTLMSR, and NTLMv authenticating HTTP proxy      proxy     
codeql              The CLI tool for GitHub CodeQL      automation     
codetective          A tool to determine the crypto/encoding algorithm used according to traces of its representation      crypto     
coercer          Coerce a Windows server to authenticate on an arbitrary machine through  methods      exploitation     
comission          WhiteBox CMS analysis      webapp     
commentor          Extract all comments from the specified URL resource      webapp     
commix              Automated All-in-One OS Command Injection and Exploitation Tool      webapp     
commonspeak          Leverages publicly available datasets from Google BigQuery to generate wordlists      automation     
complemento          A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever      fingerprint     
compp              Company Passwords Profiler helps making a bruteforce wordlist for a targeted company      cracker     
configpush          This is a tool to span /-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices      scanner     
conpot              ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems      honeypot     
conscan          A blackbox vulnerability scanner for the Concre CMS      fuzzer     
cook             Easily create word's permutation and combination to generate complex wordlists and passwords      automation     
cookie-cadger          An auditing tool for Wi-Fi or wired Ethernet connections      fuzzer     
corkscrew          A tool for tunneling SSH through HTTP proxies      tunnel     
corscanner          Fast CORS misconfiguration vulnerabilities scanner      webapp     
corstest          A simple CORS misconfigurations checker      scanner     
corsy              CORS Misconfiguration Scanner      webapp     
cottontail          Capture all RabbitMQ messages being sent through a broker      sniffer     
cowpatty          Wireless WPA/WPA PSK handshake cracking utility      wireless     
cpfinder          Simple script that looks for administrative web interfaces      scanner     
cppcheck          A tool for static C/C++ code analysis      code-audit     
cpptest          A portable and powerful, yet simple, unit testing framework for handling automated tests in C++      code-audit     
crdovr              Search for public leaks for email addresses + check creds against  websites      recon     
crabstick          Automatic remote/local file inclusion vulnerability analysis and exploit tool      webapp     
cracken          A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust      misc     
crackhor          A Password cracking utility      cracker     
crackle          Crack and decrypt BLE encryption      cracker     
crackmapexec          A swiss army knife for pentesting Windows/Active Directory environments      scanner     
crackq              Hashcrackorg GPU-accelerated password cracker      cracker     
crackql          GraphQL password brute-force and fuzzing utility      webapp     
crackserver          An XMLRPC server for password cracking      cracker     
crawlic          Web recon tool (find temporary files, parse robotstxt, search folders, google dorks and search domains hosted on same server)      webapp     
creak              Poison, reset, spoof, redirect MITM script      networking     
create_ap          A shell script to create a NATed/Bridged Software Access Point      wireless     
creddump          A python tool to extract various credentials and secrets from Windows registry hives      cracker     
credmap          The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse      misc     
creds              Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols      sniffer     
credsniper          Phishing framework written with the Python micro-framework Flask and Jinja templating which supports capturing FA tokens      social     
creepy              A geolocation information gatherer Offers geolocation information gathering through social networking platforms      scanner     
cribdrag          An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys      crypto     
crlf-injector          A python script for testing CRLF injecting issues      fuzzer     
crlfuzz          A fast tool to scan CRLF vulnerability written in Go      webapp     
crosslinked          LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping      social     
crosstool-ng          A versatile (cross-)toolchain generator      misc     
crowbar          A brute forcing tool that can be used during penetration tests It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools      cracker     
crozono          A modular framework designed to automate the penetration testing of wireless networks from drones and such unconventional devices      drone     
crunch              A wordlist generator for all combinations/permutations of a given character set      automation     
crypthook          TCP/UDP symmetric encryption tunnel wrapper      crypto     
cryptohazemultiforcer      High performance multihash brute forcer with CUDA support      cracker     
cryptonark          SSL security checker      crypto     
csrftester          The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws      webapp     
ct-exposer          An OSINT tool that discovers sub-domains by searching Certificate Transparency logs      scanner     
ctf-party          A CLI tool & library to enhance and speed up script/exploit writing for CTF players      misc     
ctunnel          Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel      tunnel     
ctypes-sh          Allows you to call routines in shared libraries from within bash      reversing     
cuckoo              Automated malware analysis system      malware     
cudahashcat          Worlds fastest WPA cracker with dictionary mutation engine      cracker     
cupp              Common User Password Profiler      cracker     
cutycapt          A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page      recon     
cve-api          Unofficial api for cvemitreorg      misc     
cve-search          A tool to perform local searches for known vulnerabilities      exploitation     
cvechecker          The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database      scanner     
cybercrowl          A Python Web path scanner tool      webapp     
cyberscan          A Network Pentesting Tool      networking     
cymothoa          A stealth backdooring tool, that inject backdoor's shellcode into an existing process      backdoor     
d-tect              Pentesting the Modern Web      scanner     
dagon              Advanced Hash Manipulation      crypto     
dalfox              Parameter Analysis and XSS Scanning tool      webapp     
damm              Differential Analysis of Malware in Memory      malware     
daredevil          A tool to perform (higher-order) correlation power analysis attacks (CPA)      crypto     
dark-dork-searcher     Dark-Dork Searcher      windows     
darkarmour          Store and execute an encrypted windows binary from inside memory, without a single bit touching disk      windows     
darkbing          A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection      scanner     
darkd0rk3r          Python script that performs dork searching and searches for local file inclusion and SQL injection errors      exploitation     
darkdump          Search The Deep Web Straight From Your Terminal      webapp     
darkjumper          This tool will try to find every website that host at the same server at your target      webapp     
darkmysqli          Multi-Purpose MySQL Injection Tool      exploitation     
darkscrape          OSINT Tool For Scraping Dark Websites      webapp     
darkspiritz          A penetration testing framework for Linux, MacOS, and Windows systems      exploitation     
darkstat          Network statistics gatherer (packet sniffer)      sniffer     
datajackproxy          A proxy which allows you to intercept TLS traffic in native x applications across platform      proxy     
datasploit          Performs automated OSINT and more      recon     
davoset          A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites      dos     
davscan          Fingerprints servers, finds exploits, scans WebDAV      webapp     
davtest          Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target      scanner     
dawnscanner          A static analysis security scanner for ruby written web applications      webapp     
dbd              A Netcat-clone, designed to be portable and offer strong encryption It runs on Unix-like operating systems and on Microsoft Win      misc     
dbpwaudit          A Java tool that allows you to perform online audits of password quality for several database engines      cracker     
dbusmap          Simple utility for enumerating D-Bus endpoints, an nmap for D-Bus      scanner     
dc3dd              A patched version of dd that includes a number of features useful for computer forensics      forensic     
dcfldd              DCFL (DoD Computer Forensics Lab) dd replacement with hashing      forensic     
dcrawl              Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names      scanner     
ddosify          High-performance load testing tool, written in Golang      dos     
ddrescue          GNU data recovery tool      forensic     
de4dot              NET deobfuscator and unpacker      windows     
deathstar         Automate getting Domain Admin using Empire      automation     
debinject          Inject malicious code into *debs      backdoor     
deblaze          Performs method enumeration and interrogation against flash remoting end points      scanner     
decodify          Tool that can detect and decode encoded strings, recursively      crypto     
deen              Generic data encoding/decoding application built with PyQt      crypto     
deepce              Docker Enumeration, Escalation of Privileges and Container Escapes      exploitation     
delldrac          DellDRAC and Dell Chassis Discovery and Brute Forcer      scanner     
delorean          NTP Main-in-the-Middle tool      exploitation     
demiguise          HTA encryption tool for RedTeams      crypto     
densityscout          Calculates density for files of any file-system-path to finally output an accordingly descending ordered list      misc     
depant              Check network for services with default passwords      cracker     
depdep              A merciless sentinel which will seek sensitive files containing critical info leaking through your network      networking     
dependency-check     A tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies      defensive     
depix              A tool for recovering passwords from pixelized screenshots      misc     
det              (extensible) Data Exfiltration Toolkit      networking     
detect-it-easy          A program for determining types of files      binary     
detect-secrets          An enterprise friendly way of detecting and preventing secrets in code      code-audit     
detect-sniffer          Tool that detects sniffers in the network      defensive     
detectem          Detect software and its version on websites      fingerprint     
devaudit          An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams      code-audit     
device-pharmer          Opens K+ IPs or Shodan search results and attempts to login      cracker     
dex2jar          A tool for converting Android's dex format to Java's class format      hardware     
dexpatcher          Modify Android DEX/APK files at source-level using Java      mobile     
dff-scanner          Tool for finding path of predictable resource locations      webapp     
dfir-ntfs          An NTFS parser for digital forensics & incident response      forensic     
dftimewolf          Framework for orchestrating forensic collection, processing and data export       forensic     
dga-detection         DGA Domain Detection using Bigram Frequency Analysis      recon     
dharma              Generation-based, context-free grammar fuzzer      fuzzer     
dhcdrop          Remove illegal dhcp servers with IP-pool underflow      misc     
dhcpf              Passive DHCP fingerprinting implementation      fingerprint     
dhcpig              Enhanced DHCPv and DHCPv exhaustion and fuzzing script written in python using scapy network library      scanner     
dhcpoptinj          DHCP option injector      networking     
didier-stevens-suite      Didier Stevens Suite         
dinouml          A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC      networking     
dirb              A web content scanner, brute forceing for hidden files      scanner     
dirble              Fast directory scanning and scraping tool      webapp     
dirbuster         An application designed to brute force directories and files names on web/application servers      scanner     
dirbuster-ng         C CLI implementation of the Java dirbuster tool      webapp     
directorytraversalscan     Detect directory traversal vulnerabilities in HTTP servers and web applications      windows     
dirhunt          Find web directories without bruteforce      webapp     
dirscanner          This is a python script that scans webservers looking for administrative directories, php shells, and more      scanner     
dirscraper          OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website      webapp     
dirsearch          HTTP(S) directory/file brute forcer      webapp     
dirstalk          Modern alternative to dirbuster/dirb      scanner     
disitool          Tool to work with Windows executables digital signatures      forensic     
dislocker          Read BitLocker encrypted volumes under Linux      crypto     
dissector          This code dissects the internal data structures in ELF files It supports x and x_ archs and runs under Linux      binary     
distorm          Powerful disassembler library for x/AMD      disassembler     
dive              A tool for exploring each layer in a docker image      scanner     
dizzy              A Python based fuzzing framework with many features      fuzzer     
dkmc              Dont kill my cat - Malicious payload evasion tool      exploitation     
dmde              Disk Editor and Data Recovery Software      forensic     
dmg2img          A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format      forensic     
dmitry              Deepmagic Information Gathering Tool      scanner     
dnmap              The distributed nmap framework      scanner     
dns-parallel-prober      PoC for an adaptive parallelised DNS prober      recon     
dns-reverse-proxy      A reverse DNS proxy written in Go      proxy     
dns-spoof          Yet another DNS spoof utility      spoof     
dns2geoip          A simple python script that brute forces DNS and subsequently geolocates the found subdomains      scanner     
dns2tcp          A tool for relaying TCP connections over DNS      tunnel     
dnsa              A dns security swiss army knife      scanner     
dnsbf              Search for available domain names in an IP range      scanner     
dnsbrute          Multi-theaded DNS bruteforcing, average speed  lookups/second with  threads      recon     
dnscan              A python wordlist-based DNS subdomain scanner      scanner     
dnschef          A highly configurable DNS proxy for pentesters      proxy     
dnscobra          DNS subdomain bruteforcing tool with Tor support through torsocks      recon     
dnsdiag          DNS Diagnostics and Performance Measurement Tools      networking     
dnsdrdos          Proof of concept code for distributed DNS reflection DoS      dos     
dnsenum          Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results      recon     
dnsfilexfer          File transfer via DNS      networking     
dnsgoblin          Nasty creature constantly searching for DNS servers It uses standard dns querys and waits for the replies      scanner     
dnsgrep          A utility for quickly searching presorted DNS names      recon     
dnsmap              Passive DNS network mapper      fingerprint     
dnsobserver          A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities      networking     
dnspredict          DNS prediction      scanner     
dnsprobe          Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers      recon     
dnspy              NET debugger and assembly editor      windows     
dnsrecon          Python script for enumeration of hosts, subdomains and emails from a given domain using google      recon     
dnssearch          A subdomain enumeration tool      recon     
dnsspider          A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation      recon     
dnsteal          DNS Exfiltration tool for stealthily sending files over DNS requests      networking     
dnstracer          Determines where a given DNS server gets its information from, and follows the chain of DNS servers      recon     
dnstwist          Domain name permutation engine for detecting typo squatting, phishing and corporate espionage      scanner     
dnsvalidator          Maintains a list of IPv DNS servers by verifying them against baseline servers, and ensuring accurate responses      networking     
dnswalk          A DNS debugger and zone-transfer utility      recon     
dnsx              Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers      recon     
docem              Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids)      webapp     
dockerscan          Docker security analysis & hacking tools      scanner     
domain-analyzer     Finds all the security information for a given domain name      recon     
domain-stats          A web API to deliver domain information from whois and alexa      recon     
domained          Multi Tool Subdomain Enumeration      recon     
domainhunter          Checks expired domains for categorization/reputation and Archiveorg history to determine good candidates for phishing and C domain names      recon     
domato              DOM fuzzer      fuzzer     
domi-owned          A tool used for compromising IBM/Lotus Domino servers      webapp     
domlink          A tool to link a domain with registered organisation names and emails, to other domains      misc     
dontgo403          Tool to bypass X response codes      webapp     
donut              Generates x, x or AMD+x PI shellcode loading NET Assemblies from memory      backdoor     
doona              A fork of the Bruteforce Exploit Detector Tool (BED)      fuzzer     
doork              Passive Vulnerability Auditor      webapp     
doozer              A Password cracking utility      cracker     
dorkbot          Command-line tool to scan Google search results for vulnerabilities      scanner     
dorkme              Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities      scanner     
dorknet          Selenium powered Python script to automate searching for vulnerable web apps      webapp     
dorkscout          Golang tool to automate google dork scan against the entire internet or specific targets      automation     
dotdotpwn          The Transversal Directory Fuzzer      exploitation     
dotpeek          Free NET Decompiler and Assembly Browser      windows     
dpeparser          Default password enumeration project      cracker     
dpscan              Drupal Vulnerability Scanner      scanner     
dr-checker         A Soundy Vulnerability Detection Tool for Linux Kernel Drivers      exploitation     
dr0p1t-framework     A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks      backdoor     
dracnmap          Tool to exploit the network and gathering information with nmap help      automation     
dradis-ce          An open source framework to enable effective information sharing      recon     
dragon-backdoor      A sniffing, non binding, reverse down/exec, portknocking service Based on cdrc      backdoor     
driftnet          Listens to network traffic and picks out images from TCP streams it observes      scanner     
drinkme          A shellcode testing harness      exploitation     
dripcap          Caffeinated Packet Analyzer      networking     
dripper          A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS      scanner     
droopescan          A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe      webapp     
drozer              A security testing framework for Android - Precompiled binary from official repository      mobile     
drupal-module-enum      Enumerate on drupal modules      webapp     
drupalscan          Simple non-intrusive Drupal scanner      webapp     
drupwn              Drupal enumeration & exploitation tool      webapp     
dscanner          Swiss-army knife for D source code      code-audit     
dsd              Digital Speech Decoder      misc     
dsfs              A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under  lines of code      webapp     
dshell              A network forensic analysis framework      forensic     
dsjs              A fully functional JavaScript library vulnerability scanner written in under  lines of code      webapp     
dsniff              Collection of tools for network auditing and penetration testing      sniffer     
dsss              A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under  lines of code      webapp     
dsstore-crawler      A parser + crawler for DS_Store files exposed publically      webapp     
dsxs              A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under  lines of code      webapp     
dtp-spoof          Python script/security tool to test Dynamic Trunking Protocol configuration on a switch      networking     
dublin-traceroute      NAT-aware multipath tracerouting tool      networking     
ducktoolkit          Encoding Tools for Rubber Ducky      exploitation     
dumb0              A simple tool to dump users in popular forums and CMS      automation     
dump1090          A simple Mode S decoder for RTLSDR devices      networking     
dumpacl          Dumps NTs ACLs and audit settings      windows     
dumpsmbshare          A script to dump files and folders remotely from a Windows SMB share      misc     
dumpusers          Dumps account names and information even though RestrictAnonymous has been set to       windows     
dumpzilla          A forensic tool for firefox      forensic     
duplicut          Remove duplicates from massive wordlist, without sorting it (for dictionnary-based password cracking)      misc     
dutas              Analysis PE file or Shellcode      binary     
dvcs-ripper          Rip web accessible (distributed) version control systems: SVN/GIT/BZR/CVS/HG      scanner     
dwarf              Full featured multi arch/os debugger built on top of PyQt and frida      binary     
dynamorio          A dynamic binary instrumentation framework      binary     
eapeak              Analysis Suite For EAP Enabled Wireless Networks      wireless     
eaphammer          Targeted evil twin attacks against WPA-Enterprise networks Indirect wireless pivots using hostile portal attacks      wireless     
eapmd5pass          An implementation of an offline dictionary attack against the EAP-MD protocol      cracker     
easy-creds          A bash script that leverages ettercap and other tools to obtain credentials      automation     
easyda              Easy Windows Domain Access Script      automation     
easyfuzzer          A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent)      fuzzer     
eazy              This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more      scanner     
ecfs              Extended core file snapshot format      binary     
edb              A cross platform AArch/x/x debugger      debugger     
eggshell          iOS/macOS/Linux Remote Administration Tool      backdoor     
eigrp-tools          This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol      sniffer     
eindeutig          Examine the contents of Outlook Express DBX email repository files (forensic purposes)      forensic     
electric-fence          A malloc() debugger that uses virtual memory hardware to detect illegal memory accesses      debugger     
elettra          Encryption utility by Julia Identity      misc     
elettra-gui          Gui for the elettra crypto application      misc     
elevate          Horizontal domain discovery tool you can use to discover other domains owned by a given company      recon     
elfkickers          Collection of ELF utilities (includes sstrip)      binary     
elfparser          Cross Platform ELF analysis      binary     
elfutils          Handle ELF object files and DWARF debugging information (utilities)      binary     
elidecode          A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code      reversing     
elite-proxy-finder      Finds public elite anonymity proxies and concurrently tests them      proxy     
emailphonenumber     A OSINT tool to obtain a target's phone number just by having his email address      social     
emldump          Analyze MIME files      forensic     
emp3r0r         Linux post-exploitation framework made by linux user      automation     
empire              A PowerShell and Python post-exploitation agent      automation     
enabler          Attempts to find the enable password on a cisco system via brute force      cracker     
encodeshellcode      This is an encoding tool for -bit x shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code      exploitation     
ent              Pseudorandom number sequence test      misc     
enteletaor          Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ      exploitation     
entropy          A set of tools to exploit Netwave and GoAhead IP Webcams      exploitation     
enum-shares          Tool that enumerates shared folders across the network and under a custom user account      scanner     
enum4linux          A tool for enumerating information from Windows and Samba systems      recon     
enum4linux-ng          A next generation version of enumlinux      recon     
enumerate-iam          Enumerate the permissions associated with an AWS credential set      recon     
enumerid          Enumerate RIDs using pure Python      recon     
enumiax          An IAX enumerator      scanner     
enyelkm          Rootkit for Linux x kernels v      backdoor     
eos              Enemies Of Symfony - Debug mode Symfony looter      webapp     
epicwebhoneypot      Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host      webapp     
erase-registrations     An IAX flooder      voip     
eraser              Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns      windows     
eresi              The ERESI Reverse Engineering Software Interface      binary     
erl-matter          Tool to exploit epmd related services such as rabbitmq, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards      exploitation     
espionage          A Network Packet and Traffic Interceptor For Linux Sniff All Data Sent Through a Network      sniffer     
eternal-scanner      An internet scanner for exploit CVE- (Eternal Blue)      scanner     
etherape          Graphical network monitor for various OSI layers and protocols      networking     
etherchange          Can change the Ethernet address of the network adapters in Windows      windows     
etherflood          Floods a switched network with Ethernet frames with random hardware addresses      windows     
ettercap          Network sniffer/interceptor/logger for ethernet LANs - console      sniffer     
evil-ssdp          Spoof SSDP replies to phish for NetNTLM challenge/response on a network      spoof     
evil-winrm          The ultimate WinRM shell for hacking/pentesting      exploitation     
evilclippy          A cross-platform assistant for creating malicious MS Office documents      exploitation     
evilginx          Man-in-the-middle attack framework used for phishing login credentials      social     
evilgrade          Modular framework that takes advantage of poor upgrade implementations by injecting fake updates      misc     
evilize          Tool to create MD colliding binaries      cracker     
evillimiter          Tool that limits bandwidth of devices on the same network without access      networking     
evilmaid          TrueCrypt loader backdoor to sniff volume password      cracker     
evilpdf          Embedding executable files in PDF Documents      backdoor     
evine              Interactive CLI Web Crawler      webapp     
evtkit              Fix acquired evt - Windows Event Log files (Forensics)      forensic     
exabgp              The BGP swiss army knife of networking      networking     
exe2image          A simple utility to convert EXE files to JPEG images and vice versa      backdoor     
exescan          A tool to detect anomalies in PE (Portable Executable) files      binary     
exitmap          A fast and modular scanner for Tor exit relays      recon     
expimp-lookup          Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree      binary     
exploit-db          The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks      exploitation     
exploitdb          Offensive Security’s Exploit Database Archive      exploitation     
exploitpack          Exploit Pack - The next generation exploit framework      exploitation     
expose              A Dynamic Symbolic Execution (DSE) engine for JavaScript      binary     
exrex              Irregular methods on regular expressions      misc     
extended-ssrf-search      Smart ssrf scanner using different methods like parameter brute forcing in post and get      webapp     
extracthosts          Extracts hosts (IP/Hostnames) from files      misc     
extractusnjrnl          Tool to extract the $UsnJrnl from an NTFS volume      forensic     
eyeballer          Convolutional neural network for analyzing pentest screenshots      misc     
eyepwn              Exploit for Eye-Fi Helper directory traversal vulnerability      exploitation     
eyewitness          Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible      webapp     
f-scrack          A single file bruteforcer supports multi-protocol      cracker     
facebash          Facebook Brute Forcer in shellscript using TOR      social     
facebookosint          OSINT tool to replace facebook graph search      social     
facebot          A facebook profile and reconnaissance system      recon     
facebrok          Social Engineering Tool Oriented to facebook      social     
facebrute          This script tries to guess passwords for a given facebook account using a list of passwords (dictionary)      cracker     
factordb-pycli          CLI for factordb and Python API Client      crypto     
fakeap              Black Alchemy's Fake AP generates thousands of counterfeit b access points Hide in plain sight amongst Fake AP's cacophony of beacon frames      honeypot     
fakedns          A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses      proxy     
fakemail          Fake mail server that captures e-mails as files for acceptance testing      misc     
fakenet-ng          Next Generation Dynamic Network Analysis Tool      malware     
fakenetbios          A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN      spoof     
fang              A multi service threaded MD cracker      cracker     
faradaysec          Collaborative Penetration Test and Vulnerability Management Platform      scanner     
fastnetmon          High performance DoS/DDoS load analyzer built on top of multiple packet capture engines      defensive     
fav-up              IP lookup by favicon using Shodan      recon     
favfreak          Weaponizing faviconico for BugBounties , OSINT and what not      recon     
fbht              A Facebook Hacking Tool      webapp     
fbi              An accurate facebook account information gathering      social     
fbid              Show info about the author by facebook photo url      recon     
fcrackzip          Zip file password cracker      cracker     
fdsploit          A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool      webapp     
featherduster          An automated, modular cryptanalysis tool      crypto     
fern-wifi-cracker      WEP, WPA wifi cracker for wireless penetration testing      wireless     
fernflower          An analytical decompiler for Java      decompiler     
fernmelder          Asynchronous mass DNS scanner      scanner     
feroxbuster          A fast, simple, recursive content discovery tool written in Rust      webapp     
ffm              A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement      exploitation     
ffuf              Fast web fuzzer written in Go      webapp     
ffuf-scripts          Scripts and snippets for ffuf payloads      misc     
fgscanner          An advanced, opensource URL scanner      scanner     
fhttp              This is a framework for HTTP related attacks It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more      webapp     
fi6s              IPv network scanner designed to be fast      scanner     
fierce              A DNS reconnaissance tool for locating non-contiguous IP space      recon     
fiked              Fake IDE daemon      honeypot     
filebuster         An extremely fast and flexible web fuzzer      webapp     
filefuzz          A binary file fuzzer for Windows with several options      windows     
filegps          A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it      webapp     
fileintel          A modular Python application to pull intelligence about malicious files      malware     
filibuster          A Egress filter mapping application with additional functionality      networking     
fimap              A little tool for local and remote file inclusion auditing and exploitation      exploitation     
finalrecon         OSINT Tool for All-In-One Web Reconnaissance      recon     
find-dns          A tool that scans networks looking for DNS servers      scanner     
find3              High-precision indoor positioning framework      misc     
findmyhash          Crack different types of hashes using free online services      crypto     
findmyiphone          Locates all devices associated with an iCloud account      mobile     
findomain          The fastest and cross-platform subdomain enumerator, do not waste your time      recon     
findsploit          Find exploits in local and online databases instantly      automation     
fingerprinter          CMS/LMS/Library etc Versions Fingerprinter      webapp     
firecat          A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network      networking     
firefox-decrypt      Extract passwords from Mozilla Firefox, Waterfox, Thunderbird, SeaMonkey profiles      forensic     
firefox-security-toolkit A tool that transforms Firefox browsers into a penetration testing suite      misc     
firewalk          An active reconnaissance network security tool      fuzzer     
firmwalker         Script for searching the extracted firmware file system for goodies      firmware     
firmware-mod-kit      Modify firmware images without recompiling      firmware     
firstexecution          A Collection of different ways to execute code outside of the expected entry points      exploitation     
firstorder          A traffic analyzer to evade Empire communication from Anomaly-Based IDS      sniffer     
fl0p              A passive L flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks      fingerprint     
flare              Flare processes an SWF and extracts all scripts from it      misc     
flare-floss          Obfuscated String Solver - Automatically extract obfuscated strings from malware      malware     
flashlight          Automated Information Gathering Tool for Penetration Testers      recon     
flashscanner          Flash XSS Scanner      scanner     
flashsploit          Exploitation Framework for ATtiny Based HID Attacks      exploitation     
flask-session-cookie-manager2      Decode and encode Flask session cookie      webapp     
flask-session-cookie-manager3      Decode and encode Flask session cookie      webapp     
flasm              Disassembler tool for SWF bytecode      reversing     
flawfinder          Searches through source code for potential security flaws      code-audit     
flowinspect          A network traffic inspection tool      networking     
flunym0us          A Vulnerability Scanner for Wordpress and Moodle      scanner     
fluxion          A security auditing and social-engineering research tool      social     
flyr              Block-based software vulnerability fuzzing framework      fuzzer     
fockcache          Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages      webapp     
forager          Multithreaded threat Intelligence gathering utilizing      recon     
foremost          A console program to recover files based on their headers, footers, and internal data structures      forensic     
foresight          A tool for predicting the output of random number generators      crypto     
forkingportscanner     Simple and fast forking port scanner written in perl Can only scan on host at a time, the forking is done on the specified port range Or on the default range of  Has the ability to scan UDP or TCP, defaults to tcp      scanner     
formatstringexploiter      Helper script for working with format string bugs      exploitation     
fortiscan          A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool      scanner     
fpdns              Program that remotely determines DNS server versions      fingerprint     
fping              Utility to ping multiple hosts at once      networking     
fport              Identify unknown open ports and their associated applications      windows     
fprotlogparser          This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection      malware     
fraud-bridge          ICMP and DNS tunneling via IPv and IPv      tunnel     
fred              Cross-platform M$ registry hive editor      windows     
freeipmi          IPMI remote console and system management software      networking     
freeradius          The premier open source RADIUS server      wireless     
freewifi          How to get free wifi      wireless     
frida              Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers      reversing     
frida-extract         Fridare based RunPE (and MapViewOfSection) extraction tool      reversing     
frida-ios-dump          Pull decrypted ipa from jailbreak device      mobile     
fridump          A universal memory dumper using Frida      forensic     
frisbeelite          A GUI-based USB device fuzzer      fuzzer     
fs-exploit          Format string exploit generation      exploitation     
fs-nyarl          A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit      scanner     
fscan              A Security Auditing Tool      scanner     
fsnoop              A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism Its primary purpose is to help detecting file race condition vulnerabilities and since version , to exploit them with loadable DSO modules (also called "payload modules" or "paymods")      scanner     
fssb              A low-level filesystem sandbox for Linux using syscall intercepts      defensive     
fstealer          Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines      automation     
ftester          A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities      fuzzer     
ftp-fuzz          The master of all master fuzzing scripts specifically targeted towards FTP server software      fuzzer     
ftp-scanner          Multithreaded ftp scanner/brute forcer Tested on Linux, OpenBSD and Solaris      cracker     
ftp-spider          FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository      scanner     
ftpmap              Scans remote FTP servers to identify what software and what versions they are running      fingerprint     
ftpscout          Scans ftps for anonymous access      scanner     
fuddly              Fuzzing and Data Manipulation Framework (for GNU/Linux)      fuzzer     
fusil              A Python library used to write fuzzing programs      fuzzer     
fuxploider          Tool that automates the process of detecting and exploiting file upload forms flaws      webapp     
fuzzap              A python script for obfuscating wireless networks      wireless     
fuzzball2          A little fuzzer for TCP and IP options It sends a bunch of more or less bogus packets to the host of your choice      fuzzer     
fuzzbunch          NSA Exploit framework      exploitation     
fuzzdb              Attack and Discovery Pattern Dictionary for Application Fault Injection Testing      fuzzer     
fuzzdiff          A simple tool designed to help out with crash analysis during fuzz testing It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes      fuzzer     
fuzzowski          A Network Protocol Fuzzer made by NCCGroup based on Sulley and BooFuzz      fuzzer     
fuzztalk          An XML driven fuzz testing framework that emphasizes easy extensibility and reusability      windows     
g72x++              Decoder for the gx++ codec      wireless     
gadgetinspector      A byte code analyzer for finding deserialization gadget chains in Java applications      decompiler     
gadgettojscript      NET serialized gadgets that can trigger NET assembly from JS/VBS/VBA based scripts      exploitation     
galleta          Examine the contents of the IE's cookie files for forensic purposes      forensic     
gasmask          All in one Information gathering tool - OSINT      recon     
gatecrasher          Network auditing and analysis tool developed in Python      recon     
gau              Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl      webapp     
gcat              A fully featured backdoor that uses Gmail as a C&C server      malware     
gcpbucketbrute          A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated      scanner     
gcrypt              Simple, secure and performance file encryption tool written in C      crypto     
gdb              The GNU Debugger      debugger     
gdb-common          The GNU Debugger      debugger     
gdbgui              Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust      debugger     
gene              Signature Engine for Windows Event Logs      windows     
genisys          Powerful Telegram Members Scraping and Adding Toolkit      social     
genlist          Generates lists of IP addresses      misc     
geoedge          This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool)      recon     
geoip              Non-DNS IP-to-country resolver C library & utils      networking     
geoipgen          GeoIPgen is a country to IP addresses generator      misc     
gerix-wifi-cracker      A graphical user interface for aircrack-ng and pyrit      wireless     
gethsploit          Finding Ethereum nodes which are vulnerable to RPC-attacks      scanner     
getsids          Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener Like doing ‘lsnrctl service’      database     
getsploit          Command line utility for searching and downloading exploits      exploitation     
gf              A wrapper around grep, to help you grep for things      misc     
gg-images          The application was created to allow anyone to easily download profile pictures from GG      social     
gggooglescan          A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames      scanner     
gh-dork          Github dorking tool      recon     
ghauri              An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws      webapp     
ghettotooth          Ghettodriving for bluetooth      bluetooth     
ghidra              Software reverse engineering framework      reversing     
ghost-phisher          GUI suite for phishing and penetration attacks      scanner     
ghost-py          Webkit based webclient (relies on PyQT)      webapp     
ghostdelivery          Python script to generate obfuscated vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions      exploitation     
gibberish-detector      Train a model and detect gibberish strings with it      misc     
girsh              Automatically spawn a reverse shell fully interactive for Linux or Windows victim      networking     
giskismet          A program to visually represent the Kismet data in a flexible manner      wireless     
git-dump          Dump the contents of a remote git repository without directory listing enabled      scanner     
git-dumper          A tool to dump a git repository from a website      scanner     
git-hound          Pinpoints exposed API keys on GitHub A batch-catching, pattern-matching, patch-attacking secret snatcher      recon     
git-wild-hunt          A tool to hunt for credentials in github wild AKA git*hunt      recon     
gitdorker          Python program to scrape secrets from GitHub through usage of a large repository of dorks      recon     
gitdump          A pentesting tool that dumps the source code from git even when the directory traversal is disabled      webapp     
gitem              A Github organization reconnaissance tool      recon     
gitgraber          Monitor GitHub to search and find sensitive data in real time for different online services      recon     
githack          A `git` folder disclosure exploit      recon     
github-dorks          Collection of github dorks and helper tool to automate the process of checking dorks      recon     
githubcloner          A script that clones Github repositories of users and organizations automatically      misc     
gitleaks          Audit Git repos for secrets and keys      recon     
gitmails          An information gathering tool to collect git commit emails in version control host services      recon     
gitminer          Tool for advanced mining for content on Github      recon     
gitrecon          OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits      recon     
gitrob              Reconnaissance tool for GitHub organizations      scanner     
gittools          A repository with  tools for pwn'ing websites with git repositories available'      webapp     
gloom              Linux Penetration Testing Framework      scanner     
glue              A framework for running a series of tools      automation     
gmsadumper          A tool that Reads any gMSA password blobs the user can access and parses the values      misc     
gnuradio          General purpose DSP and SDR toolkit With drivers for usrp and fcd      wireless     
gnutls2          A library which provides a secure layer over a reliable transport layer (Version )      crypto     
gobd              A Golang covert backdoor      backdoor     
gobuster          Directory/file & DNS busting tool written in Go      webapp     
gocabrito          Super organized and flexible script for sending phishing campaigns      social     
goddi              Dumps Active Directory domain information      recon     
goldeneye          A HTTP DoS test tool Attack Vector exploited: HTTP Keep Alive + NoCache      dos     
golismero          Opensource web security testing framework      webapp     
gomapenum          User enumeration and password bruteforce on Azure, ADFS, OWA, O, Teams and gather emails on Linkedin      cracker     
goodork          A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line      recon     
goofile          Command line filetype search      recon     
goog-mail          Enumerate domain emails from google      recon     
google-explorer      Google mass exploit robot - Make a google search, and parse the results for a especific exploit you define      automation     
googlesub          A python script to find domains by using google dorks      recon     
goohak              Automatically Launch Google Hacking Queries Against A Target Domain      recon     
goop              Perform google searches without being blocked by the CAPTCHA or hitting any rate limits      recon     
gooscan          A tool that automates queries against Google search appliances, but with a twist      automation     
gopherus          Tool generates gopher link for exploiting SSRF and gaining RCE in various servers      webapp     
gophish          Open-Source Phishing Framework      social     
gosint              OSINT framework in Go      recon     
gospider          Fast web spider written in Go      webapp     
gostringsr2          Extract strings from a Go binary using radare      reversing     
gowitness          A golang, web screenshot utility using Chrome Headless      webapp     
gplist              Lists information about the applied Group Policies      windows     
gpocrack          Active Directory Group Policy Preferences cpassword cracker/decrypter      cracker     
gpredict          A real-time satellite tracking and orbit prediction application      radio     
gps-sdr-sim          Software-Defined GPS Signal Simulator      radio     
gqrx              Interactive SDR receiver waterfall for many devices      wireless     
gr-air-modes          Gnuradio tools for receiving Mode S transponder signals, including ADS-B      radio     
gr-gsm              Gnuradio blocks and tools for receiving GSM transmissions      radio     
gr-paint          An OFDM Spectrum Painter for GNU Radio      radio     
grabbb              Clean, functional, and fast banner scanner      scanner     
grabber          A web application scanner Basically it detects some kind of vulnerabilities in your website      webapp     
grabing         Counts all the hostnames for an IP adress      recon     
grabitall          Performs traffic redirection by sending spoofed ARP replies      windows     
graffiti          A tool to generate obfuscated one liners to aid in penetration testing      misc     
grammarinator          A random test generator / fuzzer that creates test cases according to an input ANTLR v grammar      fuzzer     
graphinder          GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce      recon     
graphql-cop          GraphQL vulnerability scanner      scanner     
graphql-path-enum      Tool that lists the different ways of reaching a given type in a GraphQL schema      webapp     
graphqlmap          Scripting engine to interact with a graphql endpoint for pentesting purposes      webapp     
graphw00f          GraphQL endpoint detection and engine fingerprinting      webapp     
graudit          Grep rough source code auditing tool      code-audit     
grepforrfi          Simple script for parsing web logs for RFIs and Webshells v      scanner     
grokevt          A collection of scripts built for reading Windows® NT/K/XP/K eventlog files      forensic     
grr             High-throughput fuzzer and emulator of DECREE binaries      fuzzer     
grype              A vulnerability scanner for container images and filesystems      scanner     
gsd              Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option      windows     
gsocket          Global Socket moving data from here to there securely, fast and trough NAT/Firewalls      networking     
gspoof              A simple GTK/command line TCP/IP packet generator      networking     
gtalk-decode          Google Talk decoder tool that demonstrates recovering passwords from accounts      windows     
gtfo              Search gtfobins and lolbas files from your terminal      misc     
gtfoblookup          Offline command line lookup utility for GTFOBins and LOLBAS      misc     
gtp-scan          A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts      scanner     
guymager          A forensic imager for media acquisition      forensic     
gwcheck          A simple program that checks if a host in an ethernet network is a gateway to Internet      networking     
gwtenum          Enumeration of GWT-RCP method calls      recon     
h2buster          A threaded, recursive, web directory brute-force scanner over HTTP/      scanner     
h2csmuggler          HTTP Request Smuggling over HTTP/ Cleartext (hc)      webapp     
h2spec              A conformance testing tool for HTTP/ implementation      misc     
h2t              Scans a website and suggests security headers to apply      webapp     
h8mail              Email OSINT and password breach hunting      recon     
habu              Python Network Hacking Toolkit      scanner     
hackersh          A shell for with Pythonect-like syntax, including wrappers for commonly used security tools      automation     
hackredis         A simple tool to scan and exploit redis servers      exploitation     
hackrf              Driver for HackRF, allowing general purpose software defined radio (SDR)      radio     
haiti              Hash type identifier (CLI & lib)      crypto     
haka              A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files      networking     
hakku              Simple framework that has been made for penetration testing tools      scanner     
hakrawler          Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application      webapp     
hakrevdns          Small, fast tool for performing reverse DNS lookups en masse      recon     
halberd          Halberd discovers HTTP load balancers It is useful for web application security auditing and for load balancer configuration testing      scanner     
halcyon          A repository crawler that runs checksums for static files found within a given git repository      recon     
halcyon-ide          First IDE for Nmap Script (NSE) Development      misc     
hamster          Tool for HTTP session sidejacking      exploitation     
handle              An small application designed to analyze your system searching for global objects related to running process and display information for every found object, like tokens, semaphores, ports, files,      windows     
harness          Interactive remote PowerShell Payload      backdoor     
harpoon          CLI tool for open source and threat intelligence      automation     
hasere              Discover the vhosts using google and bing      recon     
hash-buster          A python script which scraps online hash crackers to find cleartext of a hash      crypto     
hash-extender          A hash length extension attack tool      crypto     
hash-identifier      Software to identify the different types of hashes used to encrypt data and especially passwords      crypto     
hashcat          Multithreaded advanced password recovery utility      cracker     
hashcat-utils          Set of small utilities that are useful in advanced password cracking      misc     
hashcatch          Capture handshakes of nearby WiFi networks automatically      wireless     
hashcheck          Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method      crypto     
hashdb              A block hash toolkit      crypto     
hashdeep          cross-platform tools to message digests for any number of files      crypto     
hasher              A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally      cracker     
hashfind          A tool to search files for matching password hash types and other interesting data      crypto     
hashid              Software to identify the different types of hashes used to encrypt data      crypto     
hashpump          A tool to exploit the hash length extension attack in various hashing algorithms      crypto     
hashtag          A python script written to parse and identify password hashes      cracker     
hatcloud          Bypass CloudFlare with Ruby      recon     
hate-crack          A tool for automating cracking methodologies through Hashcat      automation     
haystack          A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics      binary     
hbad              This tool allows you to test clients on the heartbleed bug      scanner     
hcraft              HTTP Vuln Request Crafter      exploitation     
hcxdumptool          Small tool to capture packets from wlan devices      wireless     
hcxkeys          Set of tools to generate plainmasterkeys (rainbowtables) and hashes for hashcat and John the Ripper      crypto     
hcxtools          Portable solution for capturing wlan traffic and conversion to hashcat and John the Ripper formats      wireless     
hdcp-genkey          Generate HDCP source and sink keys from the leaked master key      crypto     
hdmi-sniff          HDMI DDC (IC) inspection tool It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices      hardware     
heaptrace          Helps visualize heap operations for pwn and debugging      debugger     
heartbleed-honeypot      Script that listens on TCP port  and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's      honeypot     
heartleech          Scans for systems vulnerable to the heartbleed bug, and then download them      exploitation     
hellraiser          Vulnerability Scanner      scanner     
hemingway          A simple and easy to use spear phishing helper      social     
hercules-payload      A special payload generator that can bypass all antivirus software      binary     
hetty              HTTP toolkit for security research Aims to become an open source alternative to commercial software like Burp Suite Pro      webapp     
hexbin              Converts Motorola and Intel hex files to binary      binary     
hexinject          A very versatile packet injector and sniffer that provides a command-line framework for raw network access      sniffer     
hexorbase          A database application designed for administering and auditing multiple database servers simultaneously from a centralized location It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL)      fuzzer     
hexyl              Colored command-line hex viewer      misc     
hharp              This tool can perform man-in-the-middle and switch flooding attacks It has  major functions,  of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method      networking     
hidattack          HID Attack (attacking HID host implementations)      bluetooth     
hiddeneye          Modern phishing tool with advanced functionality      social     
hiddeneye-legacy      Modern Phishing Tool With Advanced Functionality      social     
hikpwn              A simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python       scanner     
hlextend          Pure Python hash length extension module      crypto     
hodor              A general-use fuzzer that can be configured to use known-good input and delimiters in order to fuzz specific locations      fuzzer     
holehe              A tool for Efficiently finding registered accounts from emails      social     
hollows-hunter          Scans all running processes Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches)      windows     
homepwn          Swiss Army Knife for Pentesting of IoT Devices      scanner     
honeycreds          Network credential injection to detect responder and other network poisoners      defensive     
honeyd              A small daemon that creates virtual hosts on a network      honeypot     
honeypy          A low interaction Honeypot      honeypot     
honggfuzz          A general-purpose fuzzer with simple, command-line interface      fuzzer     
honssh              A high-interaction Honey Pot solution designed to log all SSH communications between a client and server      honeypot     
hookanalyser          A hook tool which can be potentially helpful in reversing applications and analyzing malware It can hook to an API in a process and search for a pattern in memory or dump the buffer      windows     
hookshot          Integrated web scraper and email account data breach comparison tool      webapp     
hoover              Wireless Probe Requests Sniffer      wireless     
hoper              Trace URL's jumps across the rel links to obtain the last URL      recon     
hopper              Reverse engineering tool that lets you disassemble, decompile and debug your applications      reversing     
hoppy              A python script which tests http methods for configuration issues leaking information or just to see if they are enabled      scanner     
host-extract         Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL      scanner     
hostapd-wpe          Modified hostapd to facilitate AP impersonation attacks      wireless     
hostbox-ssh          A ssh password/account scanner      cracker     
hosthunter          A recon tool for discovering hostnames using OSINT techniques      recon     
hotpatch          Hot patches executables on Linux using so file injection      backdoor     
hotspotter          Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names      wireless     
howmanypeoplearearound     Count the number of people around you by monitoring wifi signals      recon     
hpfeeds          Honeynet Project generic authenticated datafeed protocol      honeypot     
hping              A command-line oriented TCP/IP packet assembler/analyzer      networking     
hqlmap              A tool to exploit HQL Injections      exploitation     
hsecscan          A security scanner for HTTP response headers      scanner     
htcap              A web application analysis tool for detecting communications between javascript and the server      webapp     
htexploit          A Python script that exploits a weakness in the way that htaccess files can be configured to protect a web directory with an authentication process      exploitation     
htpwdscan          A python HTTP weak pass scanner      cracker     
htrosbif          Active HTTP server fingerprinting and recon tool      fingerprint     
htshells          Self contained web shells and other attacks via htaccess files      exploitation     
http-enum          A tool to enumerate the enabled HTTP methods supported on a webserver      scanner     
http-fuzz          A simple http fuzzer      fuzzer     
http-put          Simple http put perl script      misc     
http-traceroute      This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality      networking     
http2smugl          HttpSmugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/ -> HTTP/ conversion      webapp     
httpbog          A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses      windows     
httpforge          A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages These tools can be used to test, discover, and assert the security of Web servers, apps, and sites An accompanying Python library is available for extensions      webapp     
httpgrep          A python tool which scans for HTTP servers and finds given strings in HTTP body and HTTP response headers      webapp     
httping          A ping-like tool for http-requests      networking     
httppwnly          "Repeater" style XSS post-exploitation tool for mass browser control      webapp     
httprecon          Tool for web server fingerprinting, also known as http fingerprinting      windows     
httprint          A web server fingerprinting tool      fingerprint     
httprint-win32          A web server fingerprinting tool (Windows binaries)      windows     
httprobe          Take a list of domains and probe for working HTTP and HTTPS servers      scanner     
httpry              A specialized packet sniffer designed for displaying and logging HTTP traffic      sniffer     
httpscreenshot         A tool for grabbing screenshots and HTML of large numbers of websites      misc     
httpsniff          Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review      sniffer     
httpsscanner          A tool to test the strength of a SSL web server      scanner     
httptunnel          Creates a bidirectional virtual data connection tunnelled in HTTP requests      tunnel     
httpx              A fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library      webapp     
httrack          An easy-to-use offline browser utility      misc     
hubbit-sniffer          Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api      sniffer     
hulk              A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features      dos     
hungry-interceptor      Intercepts data, does something with it, stores it      sniffer     
hurl              Hexadecimal & URL (en/de)coder      misc     
hwk              Collection of packet crafting and wireless network flooding tools      dos     
hxd              Freeware Hex Editor and Disk Editor      misc     
hyde             Just another tool in C to do DDoS (with spoofing)      networking     
hydra              Very fast network logon cracker which support many different services      cracker     
hyenae              Flexible platform independent packet generator      networking     
hyperfox          A security tool for proxying and recording HTTP and HTTPs traffic      networking     
hyperion-crypter     A runtime encrypter for -bit and -bit portable executables      windows     
i2pd              A full-featured C++ implementation of the IP router      networking     
iaito              Qt and C++ GUI for radare reverse engineering framework      reversing     
iaxflood          IAX flooder      dos     
iaxscan          A Python based scanner for detecting live IAX/ hosts and then enumerating (by bruteforce) users on those hosts      scanner     
ibrute              An AppleID password bruteforce tool It uses Find My Iphone service API, where bruteforce protection was not implemented      cracker     
icloudbrutter          Tool for AppleID Bruteforce      cracker     
icmpquery          Send and receive ICMP queries for address mask and current time      scanner     
icmpsh              Simple reverse ICMP shell      backdoor     
icmptx              IP over ICMP tunnel      tunnel     
id-entify          Search for information related to a domain: Emails - IP addresses - Domains - Information on WEB technology - Type of Firewall - NS and MX records      recon     
idb              A tool to simplify some common tasks for iOS pentesting and research      mobile     
identywaf          Blind WAF identification tool      webapp     
idswakeup          A collection of tools that allows to test network intrusion detection systems      recon     
ifchk              A network interface promiscuous mode detection tool      defensive     
ifuzz              A binary file fuzzer with several options      fuzzer     
iheartxor          A tool for bruteforcing encoded strings within a boundary defined by a regular expression It will bruteforce the key value range of x through x      cracker     
iis-shortname-scanner      An IIS shortname Scanner      scanner     
iisbruteforcer          HTTP authentication cracker It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server      cracker     
ike-scan          A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers      scanner     
ikecrack          An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication      cracker     
ikeforce          A command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities      cracker     
ikeprobe          Determine vulnerabilities in the PSK implementation of the VPN server      windows     
ikeprober          Tool crafting IKE initiator packets and allowing many options to be manually set Useful to find overflows, error conditions and identifiyng vendors      fuzzer     
ilo4-toolbox          Toolbox for HPE iLO analysis      scanner     
ilty              An interception phone system for VoIP network      voip     
imagegrep          Grep word in pdf or image based on OCR      misc     
imagejs          Small tool to package javascript into a valid image file      binary     
imagemounter          Command line utility and Python package to ease the (un)mounting of forensic disk images      forensic     
imhex              A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at  AM      misc     
impacket          Collection of classes for working with network protocols      networking     
impulse          Modern Denial-of-service ToolKit      dos     
inception          A FireWire physical memory manipulation and hacking tool exploiting IEEE  SBP DMA      exploitation     
indx2csv          An advanced parser for INDX records      forensic     
indxcarver          Carve INDX records from a chunk of data      forensic     
indxparse          A Tool suite for inspecting NTFS artifacts      forensic     
inetsim          A software suite for simulating common internet services in a lab environment, eg for analyzing the network behaviour of unknown malware samples      defensive     
infection-monkey      Automated security testing tool for networks      networking     
infip              A python script that checks output from netstat against RBLs from Spamhaus      scanner     
infoga              Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers)      recon     
inguma              A free penetration testing and vulnerability discovery toolkit entirely written in python Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler      cracker     
injectus          CRLF and open redirect fuzzer      webapp     
innounp          Inno Setup Unpacker      reversing     
inquisitor          OSINT Gathering Tool for Companies and Organizations      recon     
insanity          Generate Payloads and Control Remote Machines       exploitation     
instagramosint          An Instagram Open Source Intelligence Tool      social     
instashell          Multi-threaded Instagram Brute Forcer without password limit      cracker     
intelmq          A tool for collecting and processing security feeds using a message queuing protocol      misc     
intelplot          OSINT Tool to Mark Points on Offline Map      recon     
intensio-obfuscator      Obfuscate a python code  and       misc     
interactsh-client      Open-Source Solution for Out of band Data Extraction      webapp     
intercepter-ng          A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc      windows     
interlace         Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support      networking     
interrogate          A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage      forensic     
intersect          Post-exploitation framework      automation     
intrace          Traceroute-like application piggybacking on existing TCP connections      recon     
inundator          An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack      misc     
inurlbr          Advanced search in the search engines - Inurl scanner, dorker, exploiter      scanner     
inviteflood          Flood a device with INVITE requests      dos     
invoke-cradlecrafter      PowerShell Remote Download Cradle Generator & Obfuscator      automation     
invoke-dosfuscation      Cmdexe Command Obfuscation Generator & Detection Test Harness      automation     
invoke-obfuscation      PowerShell Obfuscator      automation     
inzider          This is a tool that lists processes in your Windows system and the ports each one listen on      windows     
iodine              Tunnel IPv data through a DNS server      tunnel     
iosforensic          iOS forensic tool https://wwwowasporg/indexphp/Projects/OWASP_iOSForensic      forensic     
ip-https-tools          Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol      tunnel     
ip-tracer          Track and retrieve any ip address information      recon     
ip2clue          A small memory/CPU footprint daemon to lookup country (and other info) based on IP (v and v)      recon     
ipaudit          Monitors network activity on a network      networking     
ipba2              IOS Backup Analyzer      forensic     
ipcountry          Fetches IPv ranges of given country in host and cidr format      misc     
ipdecap          Can decapsulate traffic encapsulated within GRE, IPIP, in, ESP (ipsec) protocols, and can also remove IEEE Q (virtual lan) header      networking     
iphoneanalyzer          Allows you to forensically examine or recover date from in iOS device      forensic     
ipmipwn          IPMI cipher  attack tool      cracker     
ipmitool          Command-line interface to IPMI-enabled devices      networking     
ipobfuscator          A simple tool to convert the IP to a DWORD IP      misc     
ipscan              A very fast IP address and port scanner      scanner     
ipsourcebypass          This Python script can be used to bypass IP source restrictions using HTTP headers      webapp     
iptodomain          This tool extract domains from IP address based in the information saved in virustotal      recon     
iptv              Search and brute force illegal iptv server      scanner     
iputils          Network monitoring tools, including ping      networking     
ipv4bypass          Using IPv to Bypass Security      networking     
ipv666              Golang IPv address enumeration      recon     
ipv6toolkit          SI Networks' IPv Toolkit      scanner     
ircsnapshot          Tool to gather information from IRC servers      recon     
irpas              Internetwork Routing Protocol Attack Suite      exploitation     
isf              An exploitation framework based on Python      exploitation     
isip              Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks      voip     
isme              Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN      voip     
isr-form          Simple html parsing tool that extracts all form related information and generates reports of the data Allows for quick analyzing of data      recon     
issniff          Internet Session Sniffer      sniffer     
ivre              Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow,      recon     
ivre-docs          Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (documentation)      recon     
ivre-web          Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (web application)      recon     
ja3              Standard for creating SSL client fingerprints in an easy to produce and shareable way      crypto     
jaadas              Joint Advanced Defect assEsment for android applications      scanner     
jackdaw          Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions      recon     
jad              Java decompiler      reversing     
jadx              Command line and GUI tools to produce Java source code from Android Dex and APK files      decompiler     
jaeles              The Swiss Army knife for automated Web Application Testing      webapp     
jaidam              Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan      webapp     
jast              Just Another Screenshot Tool      webapp     
javasnoop          A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer      reversing     
jboss-autopwn          A JBoss script for obtaining remote shell access      exploitation     
jbrofuzz          Web application protocol fuzzer that emerged from the needs of penetration testing      fuzzer     
jbrute              Open Source Security tool to audit hashed passwords      cracker     
jcrack              A utility to create dictionary files that will crack the default passwords of select wireless gateways      wireless     
jd-cli              Command line Java Decompiler      decompiler     
jd-gui              A standalone graphical utility that displays Java source codes of class files      decompiler     
jdeserialize          A library that interprets Java serialized objects It also comes with a command-line tool that can generate compilable class declarations, extract block data, and print textual representations of instance values      webapp     
jeangrey          A tool to perform differential fault analysis attacks (DFA)      cracker     
jeb-android          Android decompiler      reversing     
jeb-arm          Arm decompiler      reversing     
jeb-intel          Intel decompiler      reversing     
jeb-mips          Mips decompiler      reversing     
jeb-webasm          WebAssembly decompiler      reversing     
jeopardize          A low(zero) cost threat intelligence & response tool against phishing domains      defensive     
jexboss          Jboss verify and Exploitation Tool      webapp     
jhead              EXIF JPEG info parser and thumbnail remover      defensive     
jira-scan         A simple remote scanner for Atlassian Jira      webapp     
jndi-injection-exploit     A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc      exploitation     
jnetmap          A network monitor of sorts      networking     
john              John the Ripper password cracker      cracker     
johnny              GUI for John the Ripper      cracker     
jok3r              Network and Web Pentest Framework      webapp     
jomplug          This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components      webapp     
jondo              Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests      proxy     
jooforce          A Joomla password brute force tester      webapp     
joomlascan          Joomla scanner scans for known vulnerable remote file inclusion paths and files      webapp     
joomlavs          A black box, Ruby powered, Joomla vulnerability scanner      webapp     
joomscan          Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site      webapp     
jpegdump          Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them      binary     
jpexs-decompiler      JPEXS Free Flash Decompiler      decompiler     
jsearch          Simple script that grep infos from javascript files      recon     
jsfuck              Write any JavaScript with  Characters: []()!+      misc     
jshell              Get a JavaScript shell with XSS      webapp     
jsonbee          A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP)      webapp     
jsparser          Parse javascript using Tornado and JSBeautifier to discover interesting enpoints      webapp     
jsql-injection          A Java application for automatic SQL database injection      webapp     
jstillery          Advanced JavaScript Deobfuscation via Partial Evaluation      webapp     
juicy-potato          A sugared version of RottenPotatoNG, with a bit of juice      windows     
junkie              A modular packet sniffer and analyzer      sniffer     
justdecompile          The decompilation engine of JustDecompile      windows     
juumla              Python tool created to identify Joomla version, scan for vulnerabilities and search for config files      webapp     
jwscan              Scanner for Jar to EXE wrapper like Launchj, Exej, JSmooth, JarExe      reversing     
jwt-cracker          JWT brute force cracker written in C      cracker     
jwt-hack          A tool for hacking / security testing to JWT      webapp     
jwt-key-recovery      Recovers the public key used to sign JWT tokens      crypto     
jwt-tool          Toolkit for validating, forging and cracking JWTs (JSON Web Tokens)      cracker     
jwtcat              Script performs offline brute-force attacks against JSON Web Token (JWT)      cracker     
jynx2              An expansion of the original Jynx LD_PRELOAD rootkit      backdoor     
k55              Linux x_ Process Injection Utility      backdoor     
kacak              Tools for penetration testers that can enumerate which users logged on windows system      recon     
kadimus          LFI Scan & Exploit Tool      webapp     
kalibrate-rtl          Fork of http://threat/kalibrate/ for use with rtl-sdr devices      mobile     
kamerka          Build interactive map of cameras from Shodan      recon     
katana              A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others)      exploitation     
katsnoop          Utility that sniffs HTTP Basic Authentication information and prints the base decoded form      sniffer     
kautilya         Pwnage with Human Interface Devices using Teensy++ and Teensy  devices      hardware     
kcptun              A Secure Tunnel Based On KCP with N:M Multiplexing      tunnel     
keimpx              Tool to verify the usefulness of credentials across a network over SMB      cracker     
kekeo              A little toolbox to play with Microsoft Kerberos in C      windows     
kerbcrack          Kerberos sniffer and cracker for Windows      windows     
kerberoast          Kerberoast attack -pure python-      exploitation     
kerbrute          A tool to perform Kerberos pre-auth bruteforcing      cracker     
kernelpop          Kernel privilege escalation enumeration and exploitation framework      exploitation     
keye              Recon tool detecting changes of websites based on content-length differences      recon     
khc              A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents      cracker     
kickthemout          Kick devices off your network by performing an ARP Spoof attack      networking     
killcast          Manipulate Chromecast Devices in your Network      exploitation     
killerbee          Framework and tools for exploiting ZigBee and IEEE  networks      exploitation     
kimi              Script to generate malicious debian packages (debain trojans)      backdoor     
kippo              A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker      honeypot     
kismet               layer wireless network detector, sniffer, and intrusion detection system      wireless     
kismet-earth          Various scripts to convert kismet logs to kml file to be used in Google Earth      wireless     
kismet2earth          A set of utilities that convert from Kismet logs to Google Earth kml format      wireless     
kismon              GUI client for kismet (wireless scanner/sniffer/monitor)      wireless     
kiterunner          Contextual Content Discovery Tool      webapp     
kitty-framework      Fuzzing framework written in python      fuzzer     
klar              Integration of Clair and Docker Registry      exploitation     
klee              A symbolic virtual machine built on top of the LLVM compiler infrastructure      binary     
klogger          A keystroke logger for the NT-series of Windows      windows     
knock              Subdomain scanner      scanner     
knxmap              KNXnet/IP scanning and auditing tool for KNX home automation installations      scanner     
koadic              A Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire      automation     
kolkata          A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion      webapp     
konan              Advanced Web Application Dir Scanner      webapp     
kraken              A project to encrypt A/ GSM signaling using a Time/Memory Tradeoff Attack      crypto     
krbrelayx          Kerberos unconstrained delegation abuse toolkit      scanner     
kube-hunter          Hunt for security weaknesses in Kubernetes clusters      scanner     
kubesploit          Cross-platform post-exploitation HTTP/ Command & Control server      scanner     
kubestriker          A Blazing fast Security Auditing tool for Kubernetes      scanner     
kubolt              Utility for scanning public kubernetes clusters      webapp     
kwetza              Python script to inject existing Android applications with a Meterpreter payload      backdoor     
l0l              The Exploit Development Kit      exploitation     
laf              Login Area Finder: scans host/s for login panels      scanner     
lanmap2          Passive network mapping tool      recon     
lans              A Multithreaded asynchronous packet parsing/injecting arp spoofer      spoof     
latd              A LAT terminal daemon for Linux and BSD      networking     
laudanum          A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments      misc     
lazagne          An open source application used to retrieve lots of passwords stored on a local computer      forensic     
lazydroid          Tool written as a bash script to facilitate some aspects of an Android Assessment      mobile     
lbd              Load Balancing detector,      recon     
lbmap              Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia       fingerprint     
ld-shatner          ld-linux code injector      backdoor     
ldap-brute          A semi fast tool to bruteforce values of LDAP injections over HTTP      cracker     
ldapdomaindump          Active Directory information dumper via LDAP      scanner     
ldapenum          Enumerate domain controllers using LDAP      recon     
ldapscripts          Simple shell scripts to handle POSIX entries in an LDAP directory      automation     
ldeep              In-depth ldap enumeration utility      recon     
ldsview          Offline search tool for LDAP directory dumps in LDIF format      forensic     
leaklooker          Find open databases with Shodan      scanner     
leena              Symbolic execution engine for JavaScript      binary     
legion              Automatic Enumeration Tool based in Open Source tools      recon     
leo              Literate programmer's editor, outliner, and project manager      misc     
leroy-jenkins          A python tool that will allow remote execution of commands on a Jenkins server and its nodes      exploitation     
lethalhta          Lateral Movement technique using DCOM and HTA      windows     
letmefuckit-scanner      Scanner and Exploit Magento      scanner     
leviathan          A mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities      scanner     
levye              A brute force tool which is support sshkey, vnckey, rdp, openvpn      cracker     
lfi-autopwn          A Perl script to try to gain code execution on a remote server via LFI      exploitation     
lfi-exploiter          This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability      webapp     
lfi-fuzzploit          A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications      webapp     
lfi-image-helper      A simple script to infect images with PHP Backdoors for local file inclusion attacks      webapp     
lfi-scanner          This is a simple perl script that enumerates local file inclusion attempts when given a specific target      scanner     
lfi-sploiter          This tool helps you exploit LFI (Local File Inclusion) vulnerabilities Post discovery, simply pass the affected URL and vulnerable parameter to this tool You can also use this tool to scan a URL for LFI vulnerabilities      webapp     
lfifreak          A unique automated LFi Exploiter with Bind/Reverse Shells      webapp     
lfimap              Local file inclusion discovery and exploitation tool      webapp     
lfisuite          Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner      scanner     
lfle              Recover event log entries from an image by heurisitically looking for record structures      forensic     
lft              A layer four traceroute implementing numerous other features      recon     
lhf              A modular recon tool for pentesting      recon     
libbde              A library to access the BitLocker Drive Encryption (BDE) format      crypto     
libc-database          Database of libc offsets to simplify exploitation      reversing     
libdisasm          A disassembler library      disassembler     
libfvde          Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes      forensic     
libosmocore          Collection of common code used in various sub-projects inside the Osmocom family of projects      radio     
libparistraceroute          A library written in C dedicated to active network measurements with examples, such as paris-ping and paris-traceroute      networking     
libpst              Outlook pst file converter      misc     
libtins          High-level, multiplatform C++ network packet sniffing and crafting library      networking     
lief              Library to Instrument Executable Formats      disassembler     
liffy              A Local File Inclusion Exploitation tool      webapp     
lightbulb          Python framework for auditing web applications firewalls      webapp     
ligolo-ng          An advanced, yet simple, tunneling tool that uses a TUN interface      tunnel     
limeaide          Remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host      forensic     
limelighter          A tool for generating fake code signing certificates or signing real ones      exploitation     
linenum          Scripted Local Linux Enumeration & Privilege Escalation Checks      scanner     
linikatz          Tool to attack AD on UNIX      automation     
linkedin2username      OSINT Tool: Generate username lists for companies on LinkedIn      social     
linkfinder          Discovers endpoint and their parameters in JavaScript files      webapp     
linset              Evil Twin Attack Bash script - An automated WPA/WPA hacker      automation     
linux-exploit-suggester A Perl script that tries to suggest exploits based OS version number      recon     
linux-exploit-suggestersh     Linux privilege escalation auditing tool      recon     
linux-inject          Tool for injecting a shared object into a Linux process      backdoor     
linux-smart-enumeration Linux enumeration tool for pentesting and CTFs with verbosity levels      scanner     
lisapy              An Exploit Dev Swiss Army Knife      exploitation     
list-urls          Extracts links from webpage      webapp     
littleblackbox          Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices      scanner     
littlebrother          OSINT tool to get informations on French, Belgian and Swizerland people      recon     
lldb              Next generation, high-performance debugger      debugger     
loadlibrary          Porting Windows Dynamic Link Libraries to Linux      binary     
local-php-security-checker    A command line tool that checks your PHP application packages with known security vulnerabilities      code-audit     
locasploit          Local enumeration and exploitation framework      scanner     
lodowep          Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system      cracker     
log-file-parser      Parser for $LogFile on NTFS      forensic     
log4j-bypass          Logj web app tester that includes WAF bypasses      webapp     
log4j-scan          A fully automated, accurate, and extensive scanner for finding logj RCE CVE-      webapp     
logkeys          A GNU/Linux keylogger that worked      keylogger     
logmepwn          A fully automated, reliable, super-fast, mass scanning and validation toolkit for the LogJ RCE CVE- vulnerability      scanner     
loic              An open source network stress tool for Windows      networking     
loki-scanner          Simple IOC and Incident Response Scanner      forensic     
lolbas              Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)      windows     
loot              Sensitive information extraction tool      recon     
lorcon              Generic library for injecting  frames      wireless     
lorg              Apache Logfile Security Analyzer      defensive     
lorsrf              Find the parameters that can be used to find SSRF or Out-of-band resource load      webapp     
lotophagi          a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases      scanner     
lsrtunnel          Spoofs connections using source routed packets      spoof     
lte-cell-scanner      LTE SDR cell scanner optimized to work with very low performance RF front ends (bit A/D, dB noise figure)      scanner     
ltrace              Tracks runtime library calls in dynamically linked programs      binary     
luksipc          A tool to convert unencrypted block devices to encrypted LUKS devices in-place      crypto     
lulzbuster          A very fast and smart web directory and file enumeration tool written in C      webapp     
lunar              A UNIX security auditing tool based on several security frameworks      scanner     
luyten              An Open Source Java Decompiler Gui for Procyon      decompiler     
lynis              Security and system auditing tool to harden Unix/Linux systems      scanner     
lyricpass          Tool to generate wordlists based on lyrics      automation     
m3-gen              Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose      exploitation     
mac-robber         A digital investigation tool that collects data from allocated files in a mounted file system      forensic     
macchanger          A small utility to change your NIC's MAC address      networking     
machinae          A tool for collecting intelligence from public sites/feeds about various security-related pieces of data      recon     
maclookup         Lookup MAC addresses in the IEEE MA-L/OUI public listing      networking     
magescan          Scan a Magento site for information      webapp     
magicrescue         Find and recover deleted files on block devices      forensic     
magictree          A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation      misc     
maigret          OSINT username checker Collect a dossier on a person by username from a huge number of sites      social     
mail-crawl         Tool to harvest emails from website      recon     
mailsend-go          A multi-platform command line tool to send mail via SMTP protocol      spoof     
make-pdf         This tool will embed javascript inside a PDF document      forensic     
maketh              A packet generator that supports forging ARP, IP, TCP, UDP, ICMP and the ethernet header as well      networking     
malboxes          Builds malware analysis Windows VMs so that you don't have to      malware     
malcom              Analyze a system's network communication using graphical representations of network traffic      networking     
malheur         A tool for the automatic analyze of malware behavior      forensic     
malice              VirusTotal Wanna Be - Now with % more Hipster      defensive     
maligno         An open source penetration testing tool written in python, that serves Metasploit payloads It generates shellcode with msfvenom and transmits it over HTTP or HTTPS      scanner     
mallory          HTTP/HTTPS proxy over SSH      proxy     
malmon              Hosting exploit/backdoor detection daemon      defensive     
malscan          A Simple PE File Heuristics Scanner      malware     
maltego         An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc      forensic     
maltrail          Malicious traffic detection system      defensive     
maltrieve          Originated as a fork of mwcrawler It retrieves malware directly from the sources as listed at a number of sites      malware     
malware-check-tool     Python script that detects malicious files via checking md hashes from an offline set or via the virustotal site It has http proxy support and an update feature      malware     
malwareanalyser     A freeware tool to perform static and dynamic analysis on malware      windows     
malwaredetect          Submits a file's SHA sum to VirusTotal to determine whether it is a known piece of malware      forensic     
malwasm          Offline debugger for malware's reverse engineering      reversing     
malybuzz          A Python tool focused in discovering programming faults in network software      fuzzer     
mana              A toolkit for rogue access point (evilAP) attacks first presented at Defcon       wireless     
mandome          Web Command Injection Tool      webapp     
manspider         Spider entire networks for juicy files sitting on SMB shares Search filenames or file content - regex supported!      scanner     
manticore         Symbolic execution tool      binary     
manul              A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS      fuzzer     
mara-framework         A Mobile Application Reverse engineering and Analysis Framework      mobile     
marc4dasm          This python-based tool is a disassembler for the Atmel MARC (a  bit Harvard micro)      disassembler     
marshalsec         Java Unmarshaller Security - Turning your data into code execution      exploitation     
maryam              Full-featured Web Identification framework written in Python      scanner     
maskprocessor          A High-Performance word generator with a per-position configurable charset      automation     
massbleed          SSL Vulnerability Scanner      recon     
masscan          TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under  minutes      scanner     
masscan-automation     Masscan integrated with Shodan API      automation     
massdns          A high-performance DNS stub resolver in C      networking     
massexpconsole         A collection of tools and exploits with a cli ui for mass exploitation      automation     
mat              Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library      defensive     
mat2              Metadata removal tool, supporting a wide range of commonly used file formats      defensive     
matahari          A reverse HTTP shell to execute commands on remote machines behind firewalls      tunnel     
matroschka          Python steganography tool to hide images or text in images      stego     
mausezahn         A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet      dos     
mbenum              Queries the master browser for whatever information it has registered      windows     
mboxgrep          A small, non-interactive utility that scans mail folders for messages matching regular expressions It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats      forensic     
mdbtools          Utilities for viewing data and exporting schema from Microsoft Access Database files      forensic     
mdcrack         MD/MD/NTLM hash cracker      cracker     
mdk3              WLAN penetration tool      wireless     
mdk4              A tool to exploit common IEEE  protocol weaknesses      wireless     
mdns-recon          An mDNS recon tool written in Python      recon     
meanalyzer         Intel Engine Firmware Analysis Tool      firmware     
medusa              Speedy, massively parallel and modular login brute-forcer for network      cracker     
meg              Fetch many paths for many hosts - without killing the hosts      webapp     
melkor              An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base)      fuzzer     
memdump          Dumps system memory to stdout, skipping over holes in memory maps      forensic     
memfetch          Dumps any userspace process memory without affecting its execution      forensic     
memimager          Performs a memory dump using NtSystemDebugControl      windows     
mentalist          Graphical tool for custom wordlist generation      automation     
merlin-server          Merlin is a cross-platform post-exploitation HTTP/ Command & Control server and agent written in golang      automation     
metabigor          Intelligence Tool but without API key      recon     
metacoretex          MetaCoretex is an entirely JAVA vulnerability scanning framework for databases      database     
metafinder          Search for documents in a domain through Search Engines (Google, Bing and Baidu) The objective is to extract metadata      recon     
metaforge          Auto Scanning to SSL Vulnerability      misc     
metagoofil         An information gathering tool designed for extracting metadata of public documents      recon     
metame              A simple metamorphic code engine for arbitrary executables      binary     
metasploit          Advanced open-source platform for developing, testing, and using exploit code      exploitation     
metasploit-autopwn     db_autopwn plugin of metasploit      automation     
meterssh          A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection      backdoor     
metoscan          Tool for scanning the HTTP methods supported by a webserver It works by testing a URL and checking the responses for the different requests      webapp     
mfcuk              MIFARE Classic Universal toolKit      wireless     
mfoc              MiFare Classic Universal toolKit      cracker     
mfsniffer          A python script for capturing unencrypted TSO login credentials      sniffer     
mft2csv          Extract $MFT record info and log it to a csv file      forensic     
mftcarver          Carve $MFT records from a chunk of data (for instance a memory dump)      forensic     
mftrcrd          Command line $MFT record decoder      forensic     
mftrefname          Resolve file index number to name or vice versa on NTFS      forensic     
mibble              An open-source SNMP MIB parser (or SMI parser) written in Java It can be used to read SNMP MIB files as well as simple ASN files      misc     
microsploit          Fast and easy create backdoor office exploitation using module metasploit packet, Microsoft Office, Open Office, Macro attack, Buffer Overflow      backdoor     
middler          A Man in the Middle tool to demonstrate protocol middling attacks      networking     
mikrotik-npk          Python tools for manipulating Mikrotik NPK format      reversing     
mildew              Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs      recon     
mimikatz          A little tool to play with Windows security      windows     
mimipenguin          A tool to dump the login password from the current linux user      forensic     
mingsweeper          A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification      windows     
minimodem          A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols      misc     
minimysqlator          A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities      exploitation     
miranda-upnp          A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices      exploitation     
missidentify          A program to find Win applications      recon     
missionplanner          A GroundControl Station for Ardupilot      drone     
mitm6              A simple yet effective python script to perform DNS spoofing via ARP poisoning      networking     
mitm-relay          Hackish way to intercept and modify non-HTTP protocols through Burp & others      proxy     
mitm              Pwning IPv via IPv      scanner     
mitmap              A python program to create a fake AP and sniff data      wireless     
mitmap-old          Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation      automation     
mitmer             A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook      sniffer     
mitmf              A Framework for Man-In-The-Middle attacks written in Python      exploitation     
mitmproxy          SSL-capable man-in-the-middle HTTP proxy      proxy     
mkbrutus         Password bruteforcer for MikroTik devices or boxes running RouterOS      cracker     
mkyara              Tool to generate YARA rules based on binary code      misc     
mobiusft          An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions      forensic     
mobsf              An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing      mobile     
modlishka          A powerful and flexible HTTP reverse proxy      proxy     
modscan          A new tool designed to map a SCADA MODBUS TCP based network      scanner     
moloch              An open source large scale IPv full PCAP capturing, indexing and database system      networking     
mongoaudit          A powerful MongoDB auditing and pentesting tool       scanner     
monocle          A local network host discovery tool In passive mode, it will listen for ARP request and reply packets In active mode, it will send ARP requests to the specific IP range The results are a list of IP and MAC addresses present on the local network      recon     
monsoon          A fast HTTP enumerator that allows you to execute a large number of HTTP requests      webapp     
mooscan          A scanner for Moodle LMS      webapp     
morpheus          Automated Ettercap TCP/IP Hijacking Tool      automation     
morxbook          A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS      cracker     
morxbrute          A customizable HTTP dictionary-based password cracking tool written in Perl      cracker     
morxbtcrack          Single Bitcoin private key cracking tool released      cracker     
morxcoinpwn          Mass Bitcoin private keys brute forcing/Take over tool released      cracker     
morxcrack          A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords      cracker     
morxkeyfmt          Read a private key from stdin and output formatted data values      crypto     
morxtraversal          Path Traversal checking tool      webapp     
morxtunel          Network Tunneling using TUN/TAP interfaces over TCP tool      tunnel     
mosca              Static analysis tool to find bugs like a grep unix command      code-audit     
mosquito          XSS exploitation tool - access victims through HTTP proxy      exploitation     
mots              Man on the Side Attack - experimental packet injection and detection      sniffer     
motsa-dns-spoofing      ManOnTheSideAttack-DNS Spoofing      spoof     
mousejack         Wireless mouse/keyboard attack with replay/transmit poc      wireless     
mp3nema          A tool aimed at analyzing and capturing data that is hidden between frames in an MP file or stream, otherwise noted as "out of band" data      forensic     
mptcp              A tool for manipulation of raw packets that allows a large number of options      networking     
mptcp-abuse          A collection of tools and resources to explore MPTCP on your network Initially released at Black Hat USA       networking     
mqtt-pwn          A one-stop-shop for IoT Broker penetration-testing and security assessment operations      scanner     
mrsip             SIP-Based Audit and Attack Tool      voip     
mrtparse         A module to read and analyze the MRT format data      misc     
ms-sys              A tool to write Winx- master boot records (mbr) under linux - RTM!      backdoor     
msf-mpc         Msfvenom payload creator      automation     
msfdb              Manage the metasploit framework database      misc     
msfenum          A Metasploit auto auxiliary script      automation     
msmailprobe          Office  and Exchange Enumeration tool      scanner     
mssqlscan          A small multi-threaded tool that scans for Microsoft SQL Servers      scanner     
msvpwn              Bypass Windows' authentication via binary patching      windows     
mtr              Combines the functionality of traceroute and ping into one tool (CLI version)      networking     
mtscan              Mikrotik RouterOS wireless scanner      wireless     
mubeng              An incredibly fast proxy checker & IP rotator with ease      proxy     
multiinjector          Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation      webapp     
multimac          Multiple MACs on an adapter      spoof     
multimon-ng          An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei      radio     
multiscanner          Modular file scanning/analysis framework      scanner     
multitun          Tunnel arbitrary traffic through an innocuous WebSocket      tunnel     
munin-hashchecker      Online hash checker for Virustotal and other services      defensive     
muraena          Almost-transparent reverse proxy to automate phishing and post-phishing activities      social     
mutator          This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> Crprtn_      automation     
mwebfp              Mass Web Fingerprinter      fingerprint     
mxtract          Memory Extractor & Analyzer      forensic     
mybff              A Brute Force Framework      cracker     
myjwt              This cli is for pentesters, CTF players, or dev You can modify your jwt, sign, inject, etc      exploitation     
mylg              Network Diagnostic Tool      networking     
mysql2sqlite          Converts a mysqldump file into a Sqlite  compatible file      database     
nqlmap              An NQL exploitation tool      exploitation     
naabu              A fast port scanner written in go with focus on reliability and simplicity      scanner     
nacker              A tool to circumvent x Network Access Control on a wired LAN      networking     
naft              Network Appliance Forensic Toolkit      forensic     
narthex          Modular personalized dictionary generator      misc     
nasnum              Script to enumerate network attached storages      recon     
nbname              Decodes and displays all NetBIOS name packets it receives on UDP port  and more!      windows     
nbnspoof          NetBIOS Name Service Spoofer      spoof     
nbtenum          A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts      windows     
nbtool              Some tools for NetBIOS and DNS investigation, attacks, and communication      networking     
nbtscan          Scan networks searching for NetBIOS information      scanner     
ncpfs              Allows you to mount volumes of NetWare servers under Linux      networking     
ncrack              High-speed network authentication cracking tool      cracker     
necromant          Python Script that search unused Virtual Hosts in Web Servers      recon     
needle              The iOS Security Testing Framework      mobile     
neglected          Facebook CDN Photo Resolver      recon     
neighbor-cache-fingerprinter      An ARP based Operating System version scanner      fingerprint     
nemesis          A command-line network packet crafting and injection utility      networking     
neo-regeorg          Improved version of reGeorg, HTTP tunneling pivot tool      tunnel     
net-creds          Sniffs sensitive data from interface or pcap      sniffer     
netactview          A graphical network connections viewer similar in functionality to netstat      networking     
netattack          Python script to scan and attack wireless networks      wireless     
netbios-share-scanner     This tool could be used to check windows workstations and servers if they have accessible shared resources      scanner     
netbus              NetBus remote administration tool      windows     
netcommander          An easy-to-use arp spoofing tool      spoof     
netcon              A network connection establishment and management script      networking     
netdiscover          An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving It can be also used on hub/switched networks      recon     
netkit-bsd-finger     BSD-finger ported to Linux      recon     
netkit-rusers          Logged in users; Displays who is logged in to machines on local network      recon     
netkit-rwho          Remote who client and server (with Debian patches)      recon     
netmap              Can be used to make a graphical representation of the surrounding network      networking     
netmask          Helps determine network masks      recon     
netreconn          A collection of network scan/recon tools that are relatively small compared to their larger cousins      networking     
netripper          Smart traffic sniffing for penetration testers      windows     
netscan          Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks (tor connection)      scanner     
netscan2          Active / passive network scanner      scanner     
netsed              Small and handful utility design to alter the contents of packets forwarded thru network in real time      networking     
netsniff-ng          High performance Linux network sniffer for packet inspection      sniffer     
netstumbler          Well-known wireless AP scanner and sniffer      windows     
nettacker          Automated Penetration Testing Framework      automation     
network-app-stress-tester     Network Application Stress Testing Yammer      dos     
networkmap          Post-exploitation network mapper      networking     
networkminer          A Network Forensic Analysis Tool for advanced Network Traffic Analysis, sniffer and packet analyzer      forensic     
netz              Discover internet-wide misconfigurations while drinking coffee      scanner     
netzob              An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols      reversing     
nexfil             OSINT tool for finding profiles by username      social     
nextnet          Pivot point discovery tool      networking     
nfcutils          Provides a simple 'lsnfc' command that list tags which are in your NFC device field      nfc     
nfdump              A set of tools to collect and process netflow data      networking     
nfex              A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile      forensic     
nfspy              A Python library for automating the falsification of NFS credentials when mounting an NFS share      automation     
nfsshell          Userland NFS command tool      automation     
ngrep              A grep-like utility that allows you to search for network packets on an interface      networking     
ngrok              A tunneling, reverse proxy for developing and understanding networked, HTTP services      tunnel     
nield              A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv,IPv), routing, FIB rules, traffic control      networking     
nikto              A web server scanner which performs comprehensive tests against web servers for multiple items      scanner     
nili              Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing      scanner     
nimbostratus          Tools for fingerprintinging and exploiting Amazon cloud infrastructures      fingerprint     
nipe              A script to make Tor Network your default gateway      defensive     
nipper              Network Infrastructure Parser      networking     
nirsoft          Unique collection of small and useful freeware utilities      windows     
nishang          Using PowerShell for Penetration Testing      windows     
njsscan          A static application testing (SAST) tool that can find insecure code patterns in your nodejs applications      code-audit     
nkiller2          A TCP exhaustion/stressing tool      dos     
nmap              Utility for network discovery and security auditing      scanner     
nmap-parse-output      Converts/manipulates/extracts data from a nmap scan output      misc     
nmbscan          Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols      scanner     
nohidy              The system admins best friend, multi platform auditing tool      recon     
nomorexor          Tool to help guess a files  byte XOR key by using frequency analysis      crypto     
noriben          Portable, Simple, Malware Analysis Sandbox      malware     
nosqlattack          Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks      automation     
nosqli              NoSQL scanner and injector      webapp     
nosqli-user-pass-enum      Script to enumerate usernames and passwords from vulnerable web applications running MongoDB      exploitation     
nosqlmap          Automated Mongo database and NoSQL web application exploitation tool      webapp     
notspikefile          A Linux based file format fuzzing tool      fuzzer     
novahot          A webshell framework for penetration testers      webapp     
nray              Distributed port scanner      scanner     
nsdtool          A netgear switch discovery tool It contains some extra features like bruteoforce and setting a new password      networking     
nsearch          Minimal script to help find script into the nse database      misc     
nsec3map          A tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC chain      scanner     
nsec3walker          Enumerates domain names using DNSSEC      recon     
nsntrace          Perform network trace of a single process by using network namespaces      sniffer     
nsoq              A Network Security Tool for packet manipulation that allows a large number of options      networking     
ntds-decode          This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database      windows     
ntdsxtract          Active Directory forensic framework      forensic     
ntfs-file-extractor      Extract files off NTFS      forensic     
ntfs-log-tracker     This tool can parse $LogFile, $UsnJrnl of NTFS      forensic     
ntlm-challenger      Parse NTLM over HTTP challenge messages      scanner     
ntlm-scanner          A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities      scanner     
ntlm-theft          A tool for generating multiple types of NTLMv hash theft files      exploitation     
ntlmrecon          A tool to enumerate information from NTLM authentication enabled web endpoints      scanner     
ntp-fingerprint      An active fingerprinting utility specifically designed to identify the OS the NTP server is running on      fingerprint     
ntp-ip-enum          Script to pull addresses from a NTP server using the monlist command Can also output Maltego resultset      recon     
ntpdos              PoC for distributed NTP reflection DoS (CVE-)      dos     
nuclei              A fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use      webapp     
nuclei-templates     Community curated list of template files for the nuclei engine      scanner     
nullinux          Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions      recon     
nullscan          A modular framework designed to chain and automate security tests      automation     
nxcrypt          NXcrypt - python backdoor framework      backdoor     
nzyme              WiFi defense system      wireless     
o-saft              A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations      scanner     
o365enum          Username enumeration and password enuming tool aimed at Microsoft O      cracker     
o365spray          Username enumeration and password spraying tool aimed at Microsoft O      cracker     
oat              A toolkit that could be used to audit security within Oracle database servers      fuzzer     
obevilion         Another archive cracker created in python, cracking [zip/z/rar]      cracker     
obexstress          Script for testing remote OBEX service for some potential vulnerabilities      bluetooth     
obfs4proxy          A pluggable transport proxy written in Go      proxy     
objdumpshellcode      A tool I have found incredibly useful whenever creating custom shellcode      binary     
objection          Instrumented Mobile Pentest Framework      mobile     
oclhashcat          Worlds fastest WPA cracker with dictionary mutation engine      cracker     
ocs              Compact mass scanner for Cisco routers with default telnet/enable passwords      scanner     
office-dde-payloads      Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique      exploitation     
ofp-sniffer          An OpenFlow sniffer to help network troubleshooting in production networks      sniffer     
ohrwurm          A small and simple RTP fuzzer      fuzzer     
okadminfinder          Tool to find admin panels / admin login pages      webapp     
oledump          Analyze OLE files (Compound File Binary Format) These files contain streams of data This tool allows you to analyze these streams      binary     
ollydbg          A -bit assembler-level analysing debugger      debugger     
omen              Ordered Markov ENumerator - Password Guesser      cracker     
omnibus          OSINT tool for intelligence collection, research and artifact management      recon     
omnihash          Hash files, strings, input streams and network resources in various common algorithms simultaneously      crypto     
one-lin3r          Gives you one-liners that aids in penetration testing and more      misc     
onesixtyone          An SNMP scanner that sends multiple SNMP requests to multiple IP addresses      cracker     
onetwopunch          Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans      scanner     
onioff              An onion url inspector for inspecting deep web links      recon     
oniongrok          Onion addresses for anything      tunnel     
onionscan          Scan Onion Services for Security Issues      scanner     
onionsearch          Script that scrapes urls on different "onion" search engines      webapp     
onionshare          Share a file over Tor Hidden Services anonymously and securely      defensive     
open-iscsi          iSCSI userland tools      misc     
opendoor          OWASP WEB Directory Scanner      webapp     
openpuff          Yet not another steganography SW      stego     
openscap          Open Source Security Compliance Solution      automation     
openstego          A tool implemented in Java for generic steganography, with support for password-based encryption of the data      crypto     
opensvp          A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack      exploitation     
openvas-scanner     The OpenVAS scanning Daemon      scanner     
operative          Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics )      fingerprint     
ophcrack          Windows password cracker based on rainbow tables      cracker     
orakelcrackert          This tool can crack passwords which are encrypted using Oracle's latest SHA based password protection algorithm      windows     
origami          Aims at providing a scripting tool to generate and analyze malicious PDF files      malware     
orjail              A more secure way to force programs to exclusively use tor network      defensive     
oscanner          An Oracle assessment framework developed in Java      fuzzer     
osert              Markdown Templates for Offensive Security exam reports      misc     
osfooler-ng          Prevents remote active/passive OS fingerprinting by tools like nmap or pf      defensive     
osiig              Instagram OSINT Tool gets a range of information from an Instagram account      social     
osint-spy          Performs OSINT scan on email/domain/ip_address/organization      recon     
osinterator          Open Source Toolkit for Open Source Intelligence Gathering      recon     
osrframework          A project focused on providing API and tools to perform more accurate online researches      recon     
osslsigncode          A small tool that implements part of the functionality of the Microsoft tool signtoolexe      windows     
ostinato          An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark      sniffer     
osueta              A simple Python script to exploit the OpenSSH User Enumeration Timing Attack      exploitation     
otori              A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities      exploitation     
outguess          A universal steganographic tool      crypto     
outlook-webapp-brute      Microsoft Outlook WebAPP Brute      cracker     
owabf              Outlook Web Access bruteforcer tool      cracker     
owasp-bywaf          A web application penetration testing framework (WAPTF)      webapp     
owasp-zsc          Shellcode/Obfuscate Code Generator      exploitation     
owtf             The Offensive (Web) Testing Framework      webapp     
p0f              Purely passive TCP/IP traffic fingerprinting tool      fingerprint     
pack              Password Analysis and Cracking Kit      cracker     
packer              tool for creating identical machine images for multiple platforms from a single source configuration      binary     
packerid          Script which uses a PEiD database to identify which packer (if any) is being used by a binary      binary     
packet-o-matic          A real time packet processor Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module      networking     
packeth          Linux GUI packet generator tool for ethernet      networking     
packetq          A tool that provides a basic SQL-frontend to PCAP-files      networking     
packetsender          An open source utility to allow sending and receiving TCP and UDP packets      networking     
packit              A network auditing tool Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic      networking     
pacu              The AWS exploitation framework, designed for testing the security of Amazon Web Services environments      exploitation     
pacumen          Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks)      crypto     
padbuster          Automated script for performing Padding Oracle attacks      exploitation     
pafish              A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do      windows     
pagodo              Google dork script to collect potentially vulnerable web pages and applications on the Internet      scanner     
paketto          Advanced TCP/IP Toolkit      scanner     
panhunt          Searches for credit card numbers (PANs) in directories      scanner     
panoptic          A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability      automation     
pappy-proxy          An intercepting proxy for web application testing      webapp     
parameth          This tool can be used to brute discover GET and POST parameters      webapp     
parampampam          This tool for brute discover GET and POST parameters      webapp     
paranoic          A simple vulnerability scanner written in Perl      scanner     
paros              Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc      webapp     
parse-evtx          A tool to parse the Windows XML Event Log (EVTX) format      forensic     
parsero          A robotstxt audit tool      recon     
pasco              Examines the contents of Internet Explorer's cache files for forensic purposes      forensic     
pass-station          CLI & library to search for default credentials among thousands of Products / Vendors      misc     
passcracking          A little python script for sending hashes to passcrackingcom and milwrm      cracker     
passe-partout          Tool to extract RSA and DSA private keys from any process linked with OpenSSL The target memory is scanned to lookup specific OpenSSL patterns      cracker     
passhunt          Search drives for documents containing passwords      scanner     
passivedns          A network sniffer that logs all DNS server replies for use in a passive DNS setup      sniffer     
pastejacker          Hacking systems with the automation of PasteJacking attacks      automation     
pastemonitor          Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match      recon     
pasv-agrsv          Passive recon / OSINT automation script      automation     
patator          A multi-purpose bruteforcer      cracker     
patchkit          Powerful binary patching from Python      binary     
pathzuzu          Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables      exploitation     
payloadmask          Web Payload list editor to use techniques to try bypass web application firewall      webapp     
payloadsallthethings      A list of useful payloads and bypass for Web Application Security and Pentest/CTF      misc     
pblind              Little utility to help exploiting blind sql injection vulnerabilities      exploitation     
pbscan              Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage      scanner     
pcapfex          Packet CAPture Forensic Evidence eXtractor      networking     
pcapfix          Tries to repair your broken pcap and pcapng files      networking     
pcapsipdump          A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrent SIP sessions)      voip     
pcapteller          A tool designed for traffic manipulation and replay      sniffer     
pcapxray          A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction      forensic     
pcileech          Tool, which uses PCIe hardware devices to read and write from the target system memory      hardware     
pcode2code          VBA p-code decompiler      decompiler     
pcredz              A tool that extracts credit card numbers and more from a pcap file or from a live interface      scanner     
pdblaster         Extract PDB file paths from large sample sets of executable files      forensic     
pdf-parser          Parses a PDF document to identify the fundamental elements used in the analyzed file      forensic     
pdfbook-analyzer      Utility for facebook memory forensics      forensic     
pdfcrack          Password recovery tool for PDF-files      cracker     
pdfgrab          Tool for searching pdfs withthin google and extracting pdf metadata      recon     
pdfid              Scan a file to look for certain PDF keywords      forensic     
pdfresurrect          A tool aimed at analyzing PDF documents      forensic     
pdfwalker          Frontend to explore the internals of a PDF document with Origami      misc     
pdgmail          A password dictionary attack tool that targets windows authentication via the SMB protocol      cracker     
pe-bear          A freeware reversing tool for PE files      windows     
pe-sieve          Scans a given process Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches)      windows     
peach              A SmartFuzzer that is capable of performing both generation and mutation based fuzzing      fuzzer     
peach-fuzz          Simple vulnerability scanning framework      fuzzer     
peass              Privilege Escalation Awesome Scripts SUITE (with colors)      scanner     
peda              Python Exploit Development Assistance for GDB      debugger     
peepdf              A Python tool to explore PDF files in order to find out if the file can be harmful or not      forensic     
peepingtom          A tool to take screenshots of websites Much like eyewitness      webapp     
peframe          Tool to perform static analysis on (portable executable) malware      malware     
pemcrack          Cracks SSL PEM files that hold encrypted private keys Brute forces or dictionary cracks      cracker     
pemcracker          Tool to crack encrypted PEM files      cracker     
penbox              A Penetration Testing Framework - The Tool With All The Tools      automation     
pencode          Complex payload encoder      misc     
pentbox          A security suite that packs security and stability testing oriented tools for networks and systems      fuzzer     
pentestly          Python and Powershell internal penetration testing framework      scanner     
pentmenu          A bash script for recon and DOS attacks      automation     
pepe              Collect information about email addresses from Pastebin      social     
pepper             An open source script to perform malware static analysis on Portable Executable      malware     
periscope          A PE file inspection tool      windows     
perl-image-exiftool      Reader and rewriter of EXIF informations that supports raw files      forensic     
petools         Portable executable (PE) manipulation toolkit      windows     
pev              Command line based tool for PE/PE+ file analysis      forensic     
pextractor          A forensics tool that can extract all files from an executable file created by a joiner or similar      windows     
pfff              Tools and APIs for code analysis, visualization and transformation      code-audit     
pftriage          Python tool and library to help analyze files during malware triage and analysis      malware     
pgdbf              Convert XBase / FoxPro databases to PostgreSQL      database     
phantap          An 'invisible' network tap aimed at red teams      networking     
phantom-evasion      Antivirus evasion tool written in python      exploitation     
phemail          A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test      social     
phishery          An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector      backdoor     
phishingkithunter      Find phishing kits which use your brand/organization's files and image'      social     
phoneinfoga          Information gathering & OSINT framework for phone numbers      social     
phonesploit          Adb exploiting tools      mobile     
phonia              Advanced toolkits to scan phone numbers using only free resources      social     
phoss              Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP, VNC and POP logins      cracker     
photon              Incredibly fast crawler which extracts urls, emails, files, website accounts and much more      webapp     
php-findsock-shell      A Findsock Shell implementation in PHP + C      webapp     
php-malware-finder      Detect potentially malicious PHP files      webapp     
php-mt-seed          PHP mt_rand() seed cracker      cracker     
php-rfi-payload-decoder     Decode and analyze RFI payloads developed in PHP      cracker     
php-vulnerability-hunter      An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications      windows     
phpggc              A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically      webapp     
phpsploit          Stealth post-exploitation framework      webapp     
phpstan          PHP Static Analysis Tool - discover bugs in your code without running it      code-audit     
phpstress          A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI      dos     
phrasendrescher      A modular and multi processing pass phrase cracking tool      cracker     
pidense          Monitor illegal wireless network activities (Fake Access Points)      wireless     
pin              A dynamic binary instrumentation tool      automation     
pingcastle          Active Directory scanning tool      windows     
pintool          This tool can be useful for solving some reversing challenges in CTFs events      reversing     
pintool2          Improved version of pintool      reversing     
pip3line          The Swiss army knife of byte manipulation      crypto     
pipal              A password analyser      cracker     
pipeline         Designed to aid in targeted brute force password cracking attacks      cracker     
pirana              Exploitation framework that tests the security of a email content filter      exploitation     
pivotsuite          A portable, platform independent and powerful network pivoting toolkit      networking     
pixd              Colourful visualization tool for binary files      binary     
pixiewps          Offline bruteforce of the WPS pin exploiting the low or non-existing entropy of some APs      wireless     
pixload          Image Payload Creating/Injecting tools      webapp     
pkcrack          A PkZip encryption cracker      cracker     
pkinittools          Tools for Kerberos PKINIT and relaying to AD CS      exploitation     
pkt2flow          A simple utility to classify packets into flows      networking     
plasma-disasm          An interactive disassembler for x/ARM/MIPS It can generates indented pseudo-code with colored syntax      disassembler     
plcscan          This is a tool written in Python that will scan for PLC devices over scomm or modbus protocols      scanner     
plecost          Wordpress finger printer Tool      webapp     
plown              A security scanner for Plone CMS      webapp     
plumberpy          A python implementation of a grep friendly ftrace wrapper      misc     
plutil              Converts plist files between binary and UTF (editable) text formats      misc     
pmacct              Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry]      networking     
pmap              Passively discover, scan, and fingerprint link-local peers by the background noise they generate (ie their broadcast and multicast traffic)      windows     
pmapper          A tool for quickly evaluating IAM permissions in AWS      recon     
pmcma              Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption)      exploitation     
pmdump              A tool that lets you dump the memory contents of a process to a file without stopping the process      windows     
pngcheck          Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data      stego     
pnscan              A parallel network scanner that can be used to survey TCP network services      scanner     
pocsuite          An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team      exploitation     
poison              A fast, asynchronous syn and udp scanner      scanner     
poly              Polymorphic webshells      webapp     
polyswarm          An interface to the public and private PolySwarm APIs      malware     
pompem              A python exploit tool finder      exploitation     
poracle          A tool for demonstrating padding oracle attacks      crypto     
portia              Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised      automation     
portmanteau          An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface      fuzzer     
portspoof          This program's primary goal is to enhance OS security through a set of new techniques      defensive     
postenum          Clean, nice and easy tool for basic/advanced privilege escalation techniques      recon     
posttester          A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin      crypto     
powercloud          Deliver powershell payloads via DNS TXT via CloudFlare using PowerShell      windows     
powerfuzzer          Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl cfuzzer, fuzzled, fuzzerpl, jbrofuzz, webscarab, wapiti, Socket Fuzzer) It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others      fuzzer     
powerlessshell          Run PowerShell command without invoking powershellexe      windows     
powermft          Powerful commandline $MFT record editor      forensic     
powerops          PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier"      windows     
powershdll          Run PowerShell with rundll Bypass software restrictions      windows     
powersploit          A PowerShell Post-Exploitation Framework      exploitation     
powerstager          A payload stager using PowerShell      binary     
pown              Security testing and exploitation toolkit built on top of Nodejs and NPM      webapp     
ppee              A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details      windows     
ppfuzz              A fast tool to scan client-side prototype pollution vulnerability written in Rust      webapp     
ppmap              A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets      webapp     
ppscan              Yet another port scanner with HTTP and FTP tunneling support      scanner     
pr0cks              python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS or HTTP(CONNECT) proxy using iptables -j REDIRECT target      proxy     
prads              A "Passive Real-time Asset Detection System"      scanner     
praeda              An automated data/information harvesting tool designed to gather critical information from various embedded devices      scanner     
preeny              Some helpful preload libraries for pwning stuff      exploitation     
pret              Printer Exploitation Toolkit - The tool that made dumpster diving obsolete      exploitation     
princeprocessor      Standalone password candidate generator using the PRINCE algorithm      misc     
procdump          Generate coredumps based off performance triggers      binary     
proctal          Provides a command line interface and a C library to manipulate the address space of a running program on Linux      binary     
procyon          A suite of Java metaprogramming tools focused on code generation and analysis      decompiler     
profuzz          Simple PROFINET fuzzer based on Scapy      fuzzer     
prometheus-firewall      A Firewall analyzer written in ruby      networking     
promiscdetect          Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer      windows     
propecia          A fast class scanner that scans for a specified open port with banner grabbing      fingerprint     
protos-sip          SIP test suite      voip     
protosint          Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses      recon     
prowler          Tool for AWS security assessment, auditing and hardening      defensive     
proxenet          THE REAL hacker friendly proxy for web application pentests      webapp     
proxify          Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go      proxy     
proxmark          A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (kHz) to High Frequency (MHz) tags      radio     
proxmark3          Software for the the Proxmark, an RFID swiss-army tool      radio     
proxybroker          Proxy [Finder     Checker     
proxychains-ng          A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies      proxy     
proxycheck          This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver      scanner     
proxyp              Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses      proxy     
proxyscan          A security penetration testing tool to scan for hosts and ports through a Web proxy server      scanner     
proxytunnel          Creates tunnels through HTTP(S) proxies for any TCP based protocol      tunnel     
psencode          A tool to generate and encode a PowerShell based Metasploit payloads      exploitation     
pscan              A limited problem scanner for C source files      code-audit     
pshitt              A lightweight fake SSH server designed to collect authentication data sent by intruders      honeypot     
pspy              Monitor linux processes without root permissions      misc     
pstoreview          Lists the contents of the Protected Storage      windows     
ptf              The Penetration Testers Framework: Way for modular support for up-to-date tools      exploitation     
pth-toolkit          Modified version of the passing-the-hash tool collection made to work straight out of the box      sniffer     
ptunnel          A tool for reliably tunneling TCP connections over ICMP echo request and reply packets      tunnel     
pulledpork          Snort rule management      misc     
pulsar              Protocol Learning and Stateful Fuzzing      fuzzer     
punk              A post-exploitation tool meant to help network pivoting from a compromised unix box      exploitation     
punter              Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare      recon     
pupy              Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python      automation     
pureblood          A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter      automation     
pwcrack          Password hash automatic cracking framework      cracker     
pwd-hash          A password hashing tool that use the crypt function to generate the hash of a string given on standard input      crypto     
pwdlogy          A target specific wordlist generating tool for social engineers and security researchers      misc     
pwdlyser          Python-based CLI Password Analyser (Reporting Tool)      crypto     
pwdump              Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes      windows     
pwnat              A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other      networking     
pwncat              Bind and reverse shell handler with FW/IDS/IPS evasion, self-inject and port-scanning      backdoor     
pwncat-caleb          A post-exploitation platform      exploitation     
pwndbg              Makes debugging with GDB suck less      debugger     
pwndora          Massive IPv scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home      scanner     
pwndrop          Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV      webapp     
pwned              A command-line tool for querying the 'Have I been pwned?' service      recon     
pwned-search          Pwned Password API lookup      recon     
pwnedornot          Tool to find passwords for compromised email addresses      recon     
pwnedpasswords          Generate and verify pwnedpasswords check digits      misc     
pwnloris          An improved slowloris DOS tool which keeps attacking until the server starts getting exhausted      dos     
pwntools          CTF framework and exploit development library      disassembler     
pyaxmlparser          A simple parser to parse Android XML file      mobile     
pybozocrack          A silly & effective MD cracker in Python      cracker     
pydictor          A useful hacker dictionary builder for a brute-force attack      misc     
pyersinia          Network attack tool like yersinia but written in Python      networking     
pyew              A python tool to analyse malware      malware     
pyexfil          A couple of beta stage tools for data exfiltration      networking     
pyfiscan          Free web-application vulnerability and version scanner      webapp     
pyfuscation          Obfuscate powershell scripts by replacing Function names, Variables and Parameters      automation     
pyinstaller          A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX      misc     
pyjfuzz          Python JSON Fuzzer      fuzzer     
pykek              Kerberos Exploitation Kit      exploitation     
pymeta              Auto Scanning to SSL Vulnerability      recon     
pyminifakedns          Minimal DNS server written in Python; it always replies with a  A-record      networking     
pyrasite          Code injection and introspection of running Python processes      backdoor     
pyrdp              Python  RDP MITM and library      sniffer     
pyrit              The famous WPA precomputed cracker      cracker     
pyssltest          A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws      scanner     
pytacle          Automates the task of sniffing GSM frames      sniffer     
pytbull          Next generation of pytbull, IDS/IPS testing framework      scanner     
pythem              Python penetration testing framework      scanner     
python-api-dnsdumpster     Unofficial Python API for http://dnsdumpstercom/      recon     
python-arsenic          Async WebDriver implementation for asyncio and asyncio-compatible frameworks      automation     
python-capstone      Lightweight multi-platform, multi-architecture disassembly framework      reversing     
python-cymruwhois     Python client for the whoiscymrucom service      networking     
python-frida          Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers      reversing     
python-frida-tools      Frida CLI tools      mobile     
python-google-streetview A command line tool and module for Google Street View Image API      misc     
python-ivre          Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (library)      recon     
python-jsbeautifier     JavaScript unobfuscator and beautifier      reversing     
python-keylogger      Simple keystroke logger      keylogger     
python-mmbot          Powerful malicious file triage tool for cyber responders      malware     
python-oletools     Tools to analyze Microsoft OLE files      binary     
python-pcodedmp      A VBA p-code disassembler      disassembler     
python-search-engine-parser Scrapes search engine pages for query titles, descriptions and links         
python-shodan          The official Python library and CLI for Shodan      recon     
python-ssh-mitm      SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation      exploitation     
python-trackerjacker     Finds and tracks wifi devices through raw  monitoring      wireless     
python-uncompyle6      A Python cross-version decompiler      decompiler     
python-utidylib      Python bindings for Tidy HTML parser/cleaner      misc     
python-witnessme      Web Inventory tool, takes screenshots of webpages using Pyppeteer      webapp     
python-yara-rednaga      The Python interface for YARA         
python2-api-dnsdumpster    Unofficial Python API for http://dnsdumpstercom/      recon     
python2-capstone      A disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community      disassembler     
python2-cymruwhois     Python client for the whoiscymrucom service      networking     
python2-dartsutillru      Simple dictionary with LRU behaviour      misc     
python2-exrex          Irregular methods on regular expressions      misc     
python2-frida          Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers      reversing     
python2-frida-tools      Frida CLI tools      mobile     
python2-google-streetview A command line tool and module for Google Street View Image API      misc     
python2-hpfeeds      Honeynet Project generic authenticated datafeed protocol      honeypot     
python2-ivre          Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (library)      recon     
python2-jsbeautifier     JavaScript unobfuscator and beautifier      webapp     
python2-ldapdomaindump     Active Directory information dumper via LDAP      scanner     
python2-minidump      Python library to parse and read Microsoft minidump file format      windows     
python2-minikerberos      Kerberos manipulation library in pure Python      windows     
python2-oletools      Tools to analyze Microsoft OLE files      binary     
python2-pcodedmp     A VBA p-code disassembler      disassembler     
python2-peepdf          A Python tool to explore PDF files in order to find out if the file can be harmful or not      forensic     
python2-ropgadget      Pythonic argument parser, that will make you smile      exploitation     
python2-shodan          Python library and command-line utility for Shodan (https://developershodanio)      recon     
python2-yara          Python interface for YARA      malware     
qark              Tool to look for several security related Android application vulnerabilities      mobile     
qrgen              Simple script for generating Malformed QRCodes      misc     
qrljacker          QRLJacker is a highly customizable exploitation framework to demonstrate "QRLJacking Attack Vector"      social     
qsreplace          Accept URLs on stdin, replace all query string values with a user-supplied value, only output each combination of query string parameters once per host and path      misc     
quark-engine          An Obfuscation-Neglect Android Malware Scoring System      mobile     
quickrecon          A python script for simple information gathering It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing      recon     
quicksand-lite          Command line tool for scanning streams within office documents plus xor db attack      defensive     
quickscope          Statically analyze windows, linux, osx, executables and also APK files      binary     
r2ghidra          Deep ghidra decompiler integration for radare and iaito      reversing     
rabid              A CLI tool and library allowing to simply decode all kind of BigIP cookies      webapp     
raccoon          A high performance offensive security tool for reconnaissance and vulnerability scanning      recon     
radamsa          General purpose mutation based fuzzer      fuzzer     
radare2          Open-source tools to disasm, debug, analyze and manipulate binary files      reversing     
radare2-keystone     Keystone assembler plugins for radare      reversing     
radare2-unicorn      Unicorn Emulator Plugin for radare      disassembler     
radiography          A forensic tool which grabs as much information as possible from a Windows system      windows     
rainbowcrack          Password cracker based on the faster time-memory trade-off With MySQL and Cisco PIX Algorithm patches      cracker     
ranger-scanner         A tool to support security professionals to access and interact with remote Microsoft Windows based systems      scanner     
rapidscan          The Multi-Tool Web Vulnerability Scanner      webapp     
rarcrack          This program uses bruteforce algorithm to find correct password (rar, z, zip)      cracker     
rasenum          A small program which lists the information for all of the entries in any phonebook file (pbk)      windows     
rathole          A reverse proxy for NAT traversal      proxy     
ratproxy          A passive web application security assessment tool      fuzzer     
rats              A rough auditing tool for security in source code files      code-audit     
raven              A Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin      social     
rawr              Rapid Assessment of Web Resources A web enumerator      scanner     
rawsec-cli          Rawsec Inventory search CLI to find security tools and resources      misc     
rbasefind          A firmware base address search tool      binary     
rbkb              A miscellaneous collection of command-line tools related to pen-testing and reversing      misc     
rbndr              Simple DNS Rebinding Service      spoof     
rcracki-mt          A tool to perform rainbow table attacks on password hashes It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project wwwfreerainbowtablescom      cracker     
rcrdcarver          Carve RCRD records ($LogFile) from a chunk of data      forensic     
rdesktop-brute          It connects to windows terminal servers - Bruteforce patch included      cracker     
rdp-cipher-checker     Enumerate the encryption protocols supported by the server and the cipher strengths supported using native RDP encryption      scanner     
rdp-sec-check          Script to enumerate security settings of an RDP Service      scanner     
rdpassspray          Python tool to perform password spraying using RDP      cracker     
rdwarecon          A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application      recon     
reaver              Brute force attack against Wifi Protected Setup      wireless     
rebind              DNS Rebinding Tool      exploitation     
recaf              Modern Java bytecode editor      decompiler     
recentfilecache-parser     Python parser for the RecentFileCachebcf on Windows      forensic     
recomposer          Randomly changes Win/ PE Files for 'safer' uploading to malware and sandbox sites      automation     
recon-ng          A full-featured Web Reconnaissance framework written in Python      recon     
reconnoitre          A security tool for multithreaded information gathering and service enumeration      recon     
reconscan          Network reconnaissance and vulnerability assessment tools      recon     
recoverjpeg          Recover jpegs from damaged devices      forensic     
recsech          Tool for doing Footprinting and Reconnaissance on the target web      recon     
recstudio          Cross platform interactive decompiler      decompiler     
recuperabit          A tool for forensic file system reconstruction      forensic     
red-hawk          All in one tool for Information Gathering, Vulnerability Scanning and Crawling      recon     
redasm              Interactive, multiarchitecture disassembler written in C++ using Qt as UI Framework      disassembler     
redfang          Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name()      bluetooth     
redirectpoison          A tool to poison a targeted issuer of SIP INVITE requests with  (ie Moved Permanently) redirection responses      voip     
redpoint          Digital Bond's ICS Enumeration Tools      misc     
redress          A tool for analyzing stripped Go binaries      binary     
redsocks          Transparent redirector of any TCP connection to proxy      proxy     
reelphish          A Real-Time Two-Factor Phishing Tool      social     
regeorg          The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ Pivot and pwn      tunnel     
regipy              Library for parsing offline registry hives      forensic     
reglookup          Command line utility for reading and querying Windows NT registries      forensic     
regreport          Windows registry forensic analysis tool      windows     
regrippy          Framework for reading and extracting useful forensics data from Windows registry hives      forensic     
regview          Open raw Windows NT  Registry files (Windows  or higher)      windows     
rekall              Memory Forensic Framework      forensic     
relay-scanner          An SMTP relay scanner      scanner     
remot3d          An Simple Exploit for PHP Language      webapp     
replayproxy          Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file      forensic     
resourcehacker          Resource compiler and decompiler for Windows® applications      windows     
responder          A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv/NTLMv/LMv (multirelay version)      scanner     
restler-fuzzer          First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services      webapp     
retdec              Retargetable machine-code decompiler based on LLVM      decompiler     
retire              Scanner detecting the use of JavaScript libraries with known vulnerabilities      scanner     
reverseip          Ruby based reverse IP-lookup tool      recon     
revipd              A simple reverse IP domain scanner      recon     
revsh              A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities      backdoor     
rex              Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge      exploitation     
rext              Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices      exploitation     
rfcat              RF ChipCon-based Attack Toolset      exploitation     
rfdump              Tool to detect RFID-Tags and show their meta information      wireless     
rfidiot          An open source python library for exploring RFID devices      wireless     
rfidtool          A opensource tool to read / write rfid tags      wireless     
rhodiola          Personalized wordlist generator with NLP, by analyzing tweets (AKA crunch)      automation     
richsploit          Exploitation toolkit for RichFaces      exploitation     
ridenum          A null session RID cycle attack for brute forcing domain controllers      cracker     
ridrelay          Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv      recon     
rifiuti2          A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO file      forensic     
rinetd              internet redirection server      networking     
ripdc              A script which maps domains related to an given ip address or domainname      recon     
rita              Real Intelligence Threat Analytics      recon     
riwifshell          Web backdoor - infector - explorer      webapp     
rkhunter          Checks machines for the presence of rootkits and other unwanted tools      forensic     
rlogin-scanner          Multithreaded rlogin scanner Tested on Linux, OpenBSD and Solaris      cracker     
rmiscout          Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities      exploitation     
rogue-mysql-server      A rogue MySQL server written in Python      misc     
roguehostapd         Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes      wireless     
rombuster          A router exploitation tool that allows to disclosure network router admin password      exploitation     
rootbrute          Local root account bruteforcer      cracker     
ropeadope          A linux log cleaner      anti-forensic     
ropeme              A set of python scripts to generate ROP gadgets and payload      exploitation     
ropgadget          Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures      exploitation     
ropper              Show information about binary files and find gadgets to build rop chains for different architectures      exploitation     
roputils          A Return-oriented Programming toolkit      exploitation     
routerhunter          Tool used to find vulnerable routers and devices on the Internet and perform tests      scanner     
routersploit          Open-source exploitation framework dedicated to embedded devices      exploitation     
rp              A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x/x binaries      exploitation     
rpak              A collection of tools that can be useful for doing attacks on routing protocols      windows     
rpcsniffer          Sniffs WINDOWS RPC messages in a given RPC server process      windows     
rpctools          Contains three separate tools for obtaining information from a system that is running RPC services      windows     
rpdscan          Remmina Password Decoder and scanner      cracker     
rpivot              Socks reverse proxy for penetration testing      proxy     
rr              A Record and Replay Framework      debugger     
rrs              A reverse (connecting) remote shell Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode) With tty support and more      backdoor     
rsactftool          RSA tool for ctf - retrieve private key from weak public key and/or uncipher data      crypto     
rsakeyfind          A tool to find RSA key in RAM      cracker     
rsatool          Tool that can be used to calculate RSA and RSA-CRT parameters      crypto     
rshack              Python tool which allows to carry out some attacks on RSA, and offer a few tools to manipulate RSA keys      crypto     
rsmangler          rsmangler takes a wordlist and mangle it      automation     
rspet              A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario      exploitation     
rtfm             A database of common, interesting or useful commands, in one handy referable form      misc     
rtlamr              An rtl-sdr receiver for smart meters operating in the MHz ISM band      radio     
rtlizer          Simple spectrum analyzer      scanner     
rtlsdr-scanner          A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library      scanner     
rtp-flood          RTP flooder      voip     
rtpbreak          Detects, reconstructs and analyzes any RTP session      networking     
rubilyn          bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below It uses a combination of syscall hooking and DKOM to hide activity on a host      backdoor     
ruler              A tool to abuse Exchange services      webapp     
rulesfinder         Machine-learn password mangling rules      misc     
rupture          A framework for BREACH and other compression-based crypto attacks      crypto     
rustbuster          DirBuster for Rust      webapp     
rustcat          A modern port listener and reverse shell      networking     
rustpad          Multi-threaded Padding Oracle attacks against any service      crypto     
rustscan          A modern port scanner      scanner     
rvi-capture          Capture packets sent or received by iOS devices      sniffer     
rww-attack          Performs a dictionary attack against a live Microsoft Windows Small Business Server      webapp     
rz-cutter          Qt and C++ GUI for rizin reverse engineering framework      reversing     
rz-ghidra          Deep ghidra decompiler integration for rizin and rz-cutter      reversing     
s3-fuzzer          A concurrent, command-line AWS S Fuzzer      fuzzer     
s3scanner          Scan for open S buckets and dump      scanner     
safecopy          A disk data recovery tool to extract data from damaged media      forensic     
sagan              A snort-like log analysis engine      ids     
sakis3g          An all-in-one script for connecting with G      automation     
saleae-logic          Debug happy      debugger     
sambascan          Allows you to search an entire network or a number of hosts for SMB shares It will also list the contents of all public shares that it finds      scanner     
samdump2          Dump password hashes from a Windows NT/k/XP installation      cracker     
samesame          Command line tool to generate crafty homograph strings      fuzzer     
samplicator          Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing      networking     
samydeluxe          Automatic samdump creation script      cracker     
sandcastle          A Python script for AWS S bucket enumeration      scanner     
sandmap          Simple CLI with the ability to run pure Nmap engine,  modules with  scan profiles      scanner     
sandsifter          The x processor fuzzer      fuzzer     
sandy              An open-source Samsung phone encryption assessment framework      scanner     
saruman          ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection)      binary     
sasm              A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages      misc     
sawef              Send Attack Web Forms      webapp     
sb0x              A simple and Lightweight framework for Penetration testing      scanner     
sbd              Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA encryption, program execution (-e), choosing source port, continuous reconnection with delay + more      crypto     
sc-make          Tool for automating shellcode creation      exploitation     
scalpel          A frugal, high performance file carver      forensic     
scamper          A tool that actively probes the Internet in order to analyze topology and performance      scanner     
scanless          Utility for using websites that can perform port scans on your behalf      scanner     
scanmem          Memory scanner designed to isolate the address of an arbitrary variable in an executing process      reversing     
scannerl          The modular distributed fingerprinting engine      fingerprint     
scanqli          SQLi scanner to detect SQL vulns      webapp     
scansploit          Exploit using barcodes, QRcodes, earn, datamatrix      exploitation     
scanssh          Fast SSH server and open proxy scanner      scanner     
scap-security-guide      Security compliance content in SCAP, Bash, Ansible, and other formats      automation     
scap-workbench          SCAP Scanner And Tailoring Graphical User Interface      automation     
scapy              Powerful interactive packet manipulation program written in Python (tools)      networking     
scavenger          Crawler (Bot) searching for credential leaks on different paste sites      recon     
schnappi-dhcp          Can fuck network with no DHCP      misc     
scout2              Security auditing tool for AWS environments      scanner     
scoutsuite          Multi-Cloud Security Auditing Tool      scanner     
scrape-dns          Searches for interesting cached DNS entries      scanner     
scrapy              A fast high-level scraping and web crawling framework      webapp     
scratchabit          Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API      disassembler     
scrounge-ntfs          Data recovery program for NTFS file systems      forensic     
scrying          Collect RDP, web, and VNC screenshots smartly      webapp     
sctpscan          A network scanner for discovery and security      recon     
scylla              The Simplistic Information Gathering Engine     Find Advanced Information on a Username, Website, Phone Number, etc     
sdn-toolkit          Discover, Identify, and Manipulate SDN-Based Networks      networking     
sdnpwn              An SDN penetration testing toolkit      scanner     
sea              A tool to help to create exploits of binary programs      malware     
search1337          Day Online Exploit Scanner      automation     
seat              Next generation information digging application geared toward the needs of security professionals It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities      scanner     
seclists          A collection of multiple types of lists used during security assessments      exploitation     
second-order          Second-order subdomain takeover scanner      webapp     
secretfinder          A python script to find sensitive data (apikeys, accesstoken, jwt,) in javascript files      webapp     
secscan          Web Apps Scanner and Much more utilities      webapp     
secure-delete          Secure file, disk, swap, memory erasure utilities      anti-forensic     
secure2csv          Decode security descriptors in $Secure on NTFS      forensic     
see-surf          A Python based scanner to find potential SSRF parameters in a web application      webapp     
seeker              Accurately Locate People using Social Engineering      social     
sees              Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain      social     
sensepost-xrdp          A rudimentary remote desktop tool for the X protocol exploiting unauthenticated x sessions      exploitation     
sergio-proxy          A multi-threaded transparent HTTP proxy for manipulating web traffic      proxy     
serialbrute          Java serialization brute force attack tool      exploitation     
serializationdumper      A tool to dump Java serialization streams in a more human readable form      webapp     
server-status-pwn      A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances      recon     
sessionlist          Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth      networking     
set              Social-engineer toolkit Aimed at penetration testing around Social-Engineering      social     
seth              Perform a MitM attack and extract clear text credentials from RDP connections      networking     
setowner          Allows you to set file ownership to any account, as long as you have the "Restore files and directories" user right      windows     
sfuzz              A simple fuzzer      fuzzer     
sgn              Shikata ga nai encoder ported into go with several improvements      binary     
sh00t              A Testing Environment for Manual Security Testers      misc     
sha1collisiondetection     Library and command line tool to detect SHA collision in a file      crypto     
shad0w              A modular C framework designed to successfully operate on mature environments      windows     
shadowexplorer          Browse the Shadow Copies created by the Windows Vista /  /  /  Volume Shadow Copy Service      forensic     
shard              A command line tool to detect shared passwords      recon     
shareenum          Tool to enumerate shares from Windows hosts      scanner     
sharesniffer          Network share sniffer and auto-mounter for crawling remote file systems      scanner     
shed              NET runtime inspector      windows     
shellcheck          Shell script analysis tool      code-audit     
shellcode-compiler      Compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows & Linux      exploitation     
shellcode-factory      Tool to create and test shellcodes from custom assembly sources      exploitation     
shellcodecs          A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process      exploitation     
shellen          Interactive shellcoding environment to easily craft shellcodes      exploitation     
shellerator          Simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages      automation     
shellinabox          Implements a web server that can export arbitrary command line tools to a web based terminal emulator      backdoor     
shelling          An offensive approach to the anatomy of improperly written OS command injection sanitisers      misc     
shellme          Because sometimes you just need shellcode and opcodes quickly This essentially just wraps some nasm/objdump calls into a neat script      exploitation     
shellnoob          A toolkit that eases the writing and debugging of shellcode      debugger     
shellpop          Generate easy and sophisticated reverse or bind shell commands      automation     
shellsploit-framework      New Generation Exploit Development Kit      exploitation     
shellter          A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created      exploitation     
sherlock         Find usernames across social networks      social     
sherlocked          Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging      packer     
shhgit              Find committed secrets and sensitive files across GitHub, Gists, GitLab and BitBucket or your local repositories in real time      recon     
shitflood          A Socks clone flooder for the Internet Relay Chat (IRC) protocol      dos     
shocker          A tool to find and exploit servers vulnerable to Shellshock      exploitation     
shodanhat          Search for hosts info with shodan      recon     
shootback          A reverse TCP tunnel let you access target behind NAT or firewall      backdoor     
shortfuzzy          A web fuzzing script written in perl      webapp     
shreder          A powerful multi-threaded SSH protocol password bruteforce tool      cracker     
shuffledns          A wrapper around massdns written in GO      webapp     
sickle              A shellcode development tool, created to speed up the various steps needed to create functioning shellcode      exploitation     
sidguesser          Guesses sids/instances against an Oracle database according to a predefined dictionary file      cracker     
siege              An http regression testing and benchmarking utility      dos     
sigma              Generic Signature Format for SIEM Systems      defensive     
sign              Automatically signs an apk with the Android test certificate      mobile     
sigploit          Telecom Signaling Exploitation Framework - SS, GTP, Diameter & SIP      exploitation     
sigspotter          A tool that search in your HD to find which publishers has been signed binaries in your PC      windows     
sigthief          Stealing Signatures and Making One Invalid Signature at a Time      exploitation     
silenteye          A cross-platform application design for an easy use of steganography      stego     
silenttrinity          An asynchronous, collaborative post-exploitation agent powered by Python and NET's DLR      backdoor     
silk              A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks      networking     
simple-ducky          A payload generator      automation     
simple-lan-scan     A simple python script that leverages scapy for discovering live hosts on a network      scanner     
simpleemailspoofer      A simple Python CLI to spoof emails      social     
simplify          Generic Android Deobfuscator      mobile     
simplyemail          Email recon made fast and easy, with a framework to build on CyberSyndicates      recon     
simtrace2          Host utilities to communicate with SIMtrace USB Devices      radio     
sinfp              A full operating system stack fingerprinting suite      fingerprint     
siparmyknife          A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications      voip     
sipbrute          A utility to perform dictionary attacks against the VoIP SIP Register hash      voip     
sipcrack          A SIP protocol login cracker      cracker     
sipffer          SIP protocol command line sniffer      sniffer     
sipi              Simple IP Information Tools for Reputation Data Analysis      recon     
sipp              A free Open Source test tool / traffic generator for the SIP protocol      voip     
sippts              Set of tools to audit SIP based VoIP Systems      voip     
sipsak              A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications      voip     
sipscan          A sip scanner      windows     
sipshock          A scanner for SIP proxies vulnerable to Shellshock      scanner     
sipvicious          Tools for auditing SIP devices      automation     
sireprat          Remote Command Execution as SYSTEM on Windows IoT Core      exploitation     
sitadel          Web Application Security Scanner      webapp     
sitediff          Fingerprint a web app using local files as the fingerprint sources      webapp     
sjet              Siberas JMX exploitation toolkit      exploitation     
skipfish          A fully automated, active web application security reconnaissance tool      webapp     
skiptracer          OSINT python webscraping framework Skipping the needs of API keys      social     
skul              A PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS)      cracker     
skydive          An open source real-time network topology and protocols analyzer      networking     
skyjack          Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control      drone     
skype-dump          This is a tool that demonstrates dumping MD password hashes from the configuration file in Skype      windows     
skypefreak          A Cross Platform Forensic Framework for Skype      forensic     
slackpirate          Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace      social     
sleuthkit          File system and media management forensic analysis tools      forensic     
sleuthql          Python Burp History parsing tool to discover potential SQL injection points To be used in tandem with SQLmap      misc     
slither          Solidity static analysis framework written in Python       code-audit     
sloth-fuzzer          A smart file fuzzer      fuzzer     
slowhttptest          Highly configurable tool that simulates some Application Layer Denial of Service (DoS) attacks      dos     
slowloris          A tool which is written in perl to test http-server vulnerabilities for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver      dos     
slowloris-py          Low bandwidth DoS tool      dos     
slurp-scanner          Evaluate the security of S buckets      scanner     
smali              Assembler/disassembler for Android's dex format      disassembler     
smali-cfgs          Smali Control Flow Graph's      mobile     
smalisca          Static Code Analysis for Smali files      mobile     
smap              Shellcode mapper - Handy tool for shellcode analysis      exploitation     
smartphone-pentest-framework     Repository for the Smartphone Pentest Framework (SPF)      mobile     
smbbf              SMB password bruteforcer      cracker     
smbcrunch          tools that work together to simplify reconnaissance of Windows File Shares      recon     
smbexec          A rapid psexec style attack with samba tools      scanner     
smbmap              A handy SMB enumeration tool      scanner     
smbrelay          SMB / HTTP to SMB replay attack toolkit      windows     
smbspider          A lightweight python utility for searching SMB/CIFS/Samba file shares      scanner     
smbsr              Lookup for interesting stuff in SMB shares      scanner     
smikims-arpspoof      Performs an ARP spoofing attack using the Linux kernel's raw sockets      spoof     
smod              A modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol      scanner     
smplshllctrlr          PHP Command Injection exploitation tool      webapp     
smtp-fuzz          Simple smtp fuzzer      fuzzer     
smtp-test          Automated testing of SMTP servers for penetration testing      scanner     
smtp-user-enum          Username guessing tool primarily for use against the default Solaris SMTP service Can use either EXPN, VRFY or RCPT TO      recon     
smtp-vrfy          An SMTP Protocol Hacker      scanner     
smtpmap          Tool to identify the running smtp software on a given host      fingerprint     
smtpscan          An SMTP scanner      fingerprint     
smtptester          Small python tool to check common vulnerabilities in SMTP servers      exploitation     
smtptx              A very simple tool used for sending simple email and do some basic email testing from a pentester perspective      scanner     
smuggler          An HTTP Request Smuggling / Desync testing tool written in Python       webapp     
smuggler-py          Python tool used to test for HTTP Desync/Request Smuggling attacks      webapp     
sn00p              A modular tool written in bourne shell and designed to chain and automate security tools and tests      automation     
sn1per              Automated Pentest Recon Scanner      automation     
snallygaster          Tool to scan for secret files on HTTP servers      webapp     
snapception          Intercept and decrypt all snapchats received over your network      sniffer     
snare              Super Next generation Advanced Reactive honeypot      honeypot     
snarf-mitm          SMB Man in the Middle Attack Engine / relay suite      exploitation     
sniff-probe-req      Wi-Fi Probe Requests Sniffer      wireless     
sniffer          Packet Trace Parser for TCP, SMTP Emails, and HTTP Cookies      networking     
sniffglue          Secure multithreaded packet sniffer      sniffer     
sniffjoke          Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft      defensive     
sniffles          A Packet Capture Generator for IDS and Regular Expression Evaluation      networking     
snitch              Turn back the asterisks in password fields to plaintext passwords      windows     
snmp-brute          SNMP brute force, enumeration, CISCO config downloader and password cracking script      cracker     
snmp-fuzzer          SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl      fuzzer     
snmpattack          SNMP scanner and attacking tool      networking     
snmpcheck          A free open source utility to get information via SNMP protocols      networking     
snmpenum          An snmp enumerator      scanner     
snmpscan          A free, multi-processes SNMP scanner      scanner     
snoopbrute          Multithreaded DNS recursive host brute-force tool      scanner     
snoopy-ng          A distributed, sensor, data collection, interception, analysis, and visualization framework      drone     
snort              A lightweight network intrusion detection system      defensive     
snow              Steganography program for concealing messages in text files      crypto     
snowman          A native code to C/C++ decompiler, see the examples of generated code      windows     
snscan              A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network      windows     
snuck              Automatic XSS filter bypass      webapp     
snyk              CLI and build-time tool to find and fix known vulnerabilities in open-source dependencies      code-audit     
soapui              The Swiss-Army Knife for SOAP Testing      proxy     
socat              Multipurpose relay      networking     
social-analyzer      Analyzing & finding a person's profile across social media websites      social     
social-mapper          A social media enumeration and correlation tool      social     
social-vuln-scanner      Gathers public information on companies to highlight social engineering risk      social     
socialfish         Ultimate phishing tool with Ngrok integrated      social     
socialpwned          OSINT tool that allows to get the emails, from a target, published in social networks      social     
socialscan          Check email address and username availability on online platforms      recon     
socketfuzz          Simple socket fuzzer      fuzzer     
sockstat          A tool to let you view information about open connections It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible      networking     
soot              A Java Bytecode Analysis and Transformation Framework      binary     
sooty              The SOC Analysts all-in-one CLI tool to automate and speed up workflow      defensive     
spade              A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment      windows     
spaf              Static Php Analysis and Fuzzer      webapp     
sparta              Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase      scanner     
spartan          Frontpage and Sharepoint fingerprinting and attack tool      fingerprint     
sparty              An open source tool written in python to audit web applications using sharepoint and frontpage architecture      webapp     
spectools          Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware Stable version      wireless     
speedpwn          An active WPA/ Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected      cracker     
spf              A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises      social     
spfmap              A program to map out SPF and DKIM records for a large number of domains      recon     
spiderfoot          The Open Source Footprinting Tool      recon     
spiderpig-pdffuzzer     A javascript pdf fuzzer      fuzzer     
spiga              Configurable web resource scanner      webapp     
spike-fuzzer          IMMUNITYsec's fuzzer creation kit in C      fuzzer     
spike-proxy          A Proxy for detecting vulnerabilities in web applications      webapp     
spiped              Secure pipe daemon      networking     
spipscan          SPIP (CMS) scanner for penetration testing purpose written in Python      webapp     
splint              A tool for statically checking C programs for security vulnerabilities and coding mistakes      code-audit     
sploitctl          Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm      automation     
sploitego          Maltego Penetration Testing Transforms      fuzzer     
spoofcheck          Simple script that checks a domain for email protections      recon     
spooftooph          Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address Cloning this information effectively allows Bluetooth device to hide in plain sight      bluetooth     
spookflare          Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures      automation     
spotbugs          A tool for static analysis to look for bugs in Java code      code-audit     
spray              Makes spraying Microsoft accounts (Office  / Azure AD) easy through its customizable two-step password spraying approach      cracker     
spraycharles          Low and slow password spraying tool, designed to spray on an interval over a long period of time      cracker     
sprayingtoolkit      Scripts to make password spraying attacks against Lync/SB & OWA a lot quicker, less painful and more efficient      webapp     
spraykatz          Credentials gathering tool automating remote procdump and parse of lsass process      exploitation     
sps              A Linux packet crafting tool Supports IPv, IPv including extension headers, and tunneling IPv over IPv      networking     
spyse             Python API wrapper and command-line client for the tools hosted on spysecom      recon     
sqid              A SQL injection digger      webapp     
sqlbrute          Brute forces data out of databases using blind SQL injection      fuzzer     
sqldict          A dictionary attack tool for SQL Server      windows     
sqlivulscan          This will give you the SQLi Vulnerable Website Just by Adding the Dork      scanner     
sqlmap              Automatic SQL injection and database takeover tool      webapp     
sqlninja          A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end      exploitation     
sqlpat              This tool should be used to audit the strength of Microsoft SQL Server passwords offline      cracker     
sqlping          SQL Server scanning tool that also checks for weak passwords using wordlists      windows     
sqlpowerinjector      Application created in Net  that helps the penetration tester to find and exploit SQL injections on a web page      windows     
sqlsus              An open source MySQL injection and takeover tool      exploitation     
ssdeep              A program for computing context triggered piecewise hashes      crypto     
ssdp-scanner          SSDP amplification scanner written in Python Makes use of Scapy      scanner     
ssh-audit          SSH server and client configuration auditing      scanner     
ssh-honeypot          Fake sshd that logs ip addresses, usernames, and passwords      honeypot     
ssh-mitm          SSH man-in-the-middle tool      exploitation     
ssh-privkey-crack      A SSH private key cracker      cracker     
ssh-user-enum          SSH User Enumeration Script in Python Using The Timing Attack      scanner     
sshatter          Password bruteforcer for SSH      cracker     
sshfuzz          A SSH Fuzzing utility written in Perl that uses Net::SSH      fuzzer     
sshprank          A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module      cracker     
sshscan          A horizontal SSH scanner that scans large swaths of IPv space for a single SSH user and pass      cracker     
sshtrix          A very fast multithreaded SSH login cracker      cracker     
sshtunnel          Pure python SSH tunnels (CLI)      tunnel     
sshuttle          Transparent proxy server that forwards all TCP packets over ssh      proxy     
ssl-hostname-resolver     CN (Common Name) grabber on X Certificates over HTTPS      recon     
ssl-phuck3r          All in one script for Man-In-The-Middle attacks      sniffer     
sslcat              SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection      misc     
sslcaudit          Utility to perform security audits of SSL/TLS clients      scanner     
ssldump          An SSLv/TLS network protocol analyzer      sniffer     
sslh              SSL/SSH/OpenVPN/XMPP/tinc port multiplexer      networking     
ssllabs-scan          Command-line client for the SSL Labs APIs      scanner     
sslmap              A lightweight TLS/SSL cipher suite scanner      scanner     
sslnuke         Transparent proxy that decrypts SSL traffic and prints out IRC messages      cracker     
sslscan          A fast tool to scan SSL services such as HTTPS to determine supported ciphers      scanner     
sslscan2          Tests SSL/TLS enabled services to discover supported cipher suites      scanner     
sslsniff          A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly      sniffer     
sslstrip          Python tool to hijack HTTPS connections during a MITM attack      proxy     
sslyze              Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations      crypto     
ssma             Simple Static Malware Analyzer      malware     
ssrf-proxy          Facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery      proxy     
ssrf-sheriff          A simple SSRF-testing sheriff written in Go      webapp     
ssrfmap          Automatic SSRF fuzzer and exploitation tool      webapp     
stackflow          Universal stack-based buffer overfow exploitation tool      exploitation     
stacoan          Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications      mobile     
stacs              Static Token And Credential Scanner      scanner     
staekka          This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access      exploitation     
stardox          Github stargazers information gathering tool      recon     
starttls-mitm          A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic      proxy     
statsprocessor          A high-performance word-generator based on per-position Markov-attack      automation     
stegcracker          Steganography brute-force utility to uncover hidden data inside files      stego     
stegdetect          An automated tool for detecting steganographic content in images      stego     
steghide          Embeds a message in a file by replacing some of the least significant bits      stego     
stegolego          Simple program for using stegonography to hide data within BMP images      stego     
stegosip          TCP tunnel over RTP/SIP      tunnel     
stegoveritas          Automatic image steganography analysis tool      stego     
stegseek          Lightning fast steghide cracker      stego     
stegsolve          Steganography Solver      stego     
stenographer          A packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets      sniffer     
stepic              A python image steganography tool      stego     
stews              A Security Tool for Enumerating WebSockets      webapp     
sticky-keys-hunter      Script to test an RDP host for sticky keys and utilman backdoor      scanner     
stig-viewer          XCCDF formatted SRGs and STIGs files viewer for SCAP validation tools      scanner     
stompy              An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable      misc     
stoq              An open source framework for enterprise level automated analysis      code-audit     
storm-ring          This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call)      voip     
stowaway          A Multi-hop proxy tool for security researchers and pentesters      proxy     
strace              A diagnostic, debugging and instructional userspace tracer      binary     
streamfinder          Searches for Alternate Data Streams (ADS)      windows     
striker          An offensive information and vulnerability scanner      webapp     
stringsifter          Machine learning tool that automatically ranks strings based on their relevance for malware analysis      binary     
striptls          Proxy PoC implementation of STARTTLS stripping attacks      proxy     
strutscan          Apache Struts vulnerability scanner written in Perl      scanner     
stunnel          A program that allows you to encrypt arbitrary TCP connections inside SSL      networking     
sub7              A remote administration tool No further comments ;-)      windows     
subbrute          A DNS meta-query spider that enumerates DNS records and subdomains      scanner     
subdomainer          A tool designed for obtaining subdomain names from public sources      recon     
subfinder          Modular subdomain discovery tool that can discover massive amounts of valid subdomains for any target      recon     
subjack          Subdomain Takeover tool written in Go      scanner     
subjs              Fetches javascript file from a list of URLS or subdomains      webapp     
sublert          A security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate      recon     
sublist3r          A Fast subdomains enumeration tool for penetration testers      recon     
subover          A Powerful Subdomain Takeover Tool      scanner     
subscraper          Tool that performs subdomain enumeration through various techniques      recon     
subterfuge          Automated Man-in-the-Middle Attack Framework      exploitation     
sucrack          A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su      cracker     
suid3num          Python script which utilizes python's built-in modules to enumerate SUID binaries      exploitation     
sulley              A pure-python fully automated and unattended fuzzing framework      fuzzer     
superscan          Powerful TCP port scanner, pinger, resolver      windows     
suricata          An Open Source Next Generation Intrusion Detection and Prevention Engine      defensive     
suricata-verify      Suricata Verification Tests - Testing Suricata Output      misc     
svn-extractor          A simple script to extract all web resources by means of SVN folder exposed over network      recon     
swaks              Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH      networking     
swamp              An OSINT tool for discovering associated sites through Google Analytics Tracking IDs      recon     
swap-digger          A tool used to automate Linux swap analysis during post-exploitation or forensics      forensic     
swarm              A distributed penetration testing tool      scanner     
swfintruder          First tool for testing security in Flash movies A runtime analyzer for SWF external movies It helps to find flaws in Flash      reversing     
swftools          A collection of SWF manipulation and creation utilities      binary     
syborg              Recursive DNS Subdomain Enumerator with dead-end avoidance system      recon     
sylkie              IPv address spoofing with the Neighbor Discovery Protocol      spoof     
syms2elf          A plugin for Hex-Ray's IDA Pro and radare to export the symbols recognized to the ELF symbol table      reversing     
synflood          A very simply script to illustrate DoS SYN Flooding attack      dos     
synner              A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks      spoof     
synscan          fast asynchronous half-open TCP portscanner      scanner     
syringe          A General Purpose DLL & Code Injection Utility      backdoor     
sysdig              Open source system-level exploration and troubleshooting tool      scanner     
sysinternals-suite      Sysinternals tools suite      windows     
t50              Experimental Multi-protocol Packet Injector Tool      dos     
tabi              BGP Hijack Detection      defensive     
tachyon-scanner      Fast Multi-Threaded Web Discovery Tool      scanner     
tactical-exploitation      Modern tactical exploitation toolkit      scanner     
taipan              Web application security scanner      scanner     
takeover          Sub-Domain TakeOver Vulnerability Scanner      scanner     
talon              A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment      cracker     
taof              A GUI cross-platform Python generic network protocol fuzzer      fuzzer     
tbear              Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator      bluetooth     
tcgetkey          A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys      dos     
tchunt-ng          Reveal encrypted files stored on a filesystem      forensic     
tcpcontrol-fuzzer      ^ TCP control bit fuzzer (no ECN or CWR)      fuzzer     
tcpcopy          A TCP stream replay tool to support real testing of Internet server applications      networking     
tcpdstat          Get protocol statistics from tcpdump pcap files      networking     
tcpdump          Powerful command-line packet analyzer      networking     
tcpextract          Extracts files from captured TCP sessions Support live streams and pcap files      networking     
tcpflow          Captures data transmitted as part of TCP connections then stores the data conveniently      networking     
tcpick              TCP stream sniffer and connection tracker      sniffer     
tcpjunk          A general tcp protocols testing and hacking utility      exploitation     
tcpreplay          Gives the ability to replay previously captured traffic in a libpcap format      networking     
tcptrace          A TCP dump file analysis tool      networking     
tcptraceroute          A traceroute implementation using TCP packets      networking     
tcpwatch          A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections      networking     
tcpxtract          A tool for extracting files from network traffic      misc     
teamsuserenum          User enumeration with Microsoft Teams API      recon     
teardown          Command line tool to send a BYE request to tear down a call      voip     
tekdefense-automater      IP URL and MD OSINT Analysis      forensic     
tell-me-your-secrets      Find secrets on any machine from over  Different Signatures      code-audit     
tempomail          Tool to create a temporary email address in  Second and receive emails      misc     
termineter          Smart meter testing framework      fuzzer     
testdisk          Checks and undeletes partitions + PhotoRec, signature based recovery tool      forensic     
testsslsh          Testing TLS/SSL encryption      crypto     
tfsec              Security scanner for your Terraform code      defensive     
tftp-bruteforce     A fast TFTP filename bruteforcer written in perl      cracker     
tftp-fuzz          Master TFTP fuzzing script as part of the ftools series of fuzzers      fuzzer     
tftp-proxy          This tool accepts connection on tftp and reloads requested content from an upstream tftp server Meanwhile modifications to the content can be done by pluggable modules So this one's nice if your mitm with some embedded devices      proxy     
tgcd              TCP/IP Gender Changer Daemon utility      networking     
thc-ipv6          Complete tool set to attack the inherent protocol weaknesses of IPv and ICMP      networking     
thc-keyfinder          Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file      cracker     
thc-pptp-bruter      A brute force program that works against pptp vpn endpoints (tcp port )      cracker     
thc-smartbrute          This tool finds undocumented and secret commands implemented in a smartcard      cracker     
thc-ssl-dos          A tool to verify the performance of SSL To be used in your authorized and legitimate area ONLY You need to accept this to make use of it, no use for bad intentions, you have been warned!      dos     
thcrut              Network discovery and OS Fingerprinting tool      fingerprint     
thedorkbox          Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data      recon     
thefatrat          TheFatRat a massive exploiting tool: easy tool to generate backdoor and easy tool to post exploitation attack      automation     
thefuzz          CLI fuzzing tool      fuzzer     
theharvester          Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers)      recon     
themole          Automatic SQL injection exploitation tool      webapp     
thezoo              A project created to make the possibility of malware analysis open and available to the public      malware     
threatspec          Project to integrate threat modelling into development process      defensive     
thumbcacheviewer      Extract Windows thumbcache database files      forensic     
tidos-framework     Offensive Web Application Penetration Testing Framework      webapp     
tiger              A security scanner, that checks computer for known problems Can also use tripwire, aide and chkrootkit      automation     
tilt              An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup      recon     
timegen          This program generates a *wav file to "send" an own time signal to DCF compatible devices      wireless     
timeverter          Bruteforce time-based tokens and to convert several time domains      cracker     
tinc              VPN (Virtual Private Network) daemon      networking     
tinfoleak          Get detailed information about a Twitter user activity      recon     
tinfoleak2          The most complete open-source tool for Twitter intelligence analysis      recon     
tinyproxy          A light-weight HTTP proxy daemon for POSIX operating systems      proxy     
tls-attacker          A Java-based framework for analyzing TLS libraries      crypto     
tls-fingerprinting      Tool and scripts to perform TLS Fingerprinting      fingerprint     
tls-map          CLI & library for TLS cipher suites manipulation      crypto     
tls-prober          A tool to fingerprint SSL/TLS servers      fingerprint     
tlsenum          A command line tool to enumerate TLS cipher-suites supported by a server      crypto     
tlsfuzzer          SSL and TLS protocol test suite and fuzzer      crypto     
tlspretense          SSL/TLS client testing framework      crypto     
tlssled          A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation      automation     
tnscmd              A lame tool to prod the oracle tnslsnr process (/tcp)      misc     
token-hunter          OSINT Tool - Search the group and group members' snippets, issues, and issue discussions for sensitive data that may be included in these assets      social     
token-reverser          Word list generator to crack security tokens      misc     
tomcatwardeployer      Apache Tomcat auto WAR deployment & pwning penetration testing tool      exploitation     
topera              An IPv security analysis toolkit, with the particularity that their attacks can't be detected by Snort      scanner     
tor              Anonymizing overlay network      proxy     
tor-autocircuit      Tor Autocircuit was developed to give users a finer control over Tor circuit creation The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters      defensive     
tor-browser-en      Tor Browser Bundle: anonymous browsing using Firefox and Tor      defensive     
tor-router          A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code      defensive     
torcrawl          Crawl and extract (regular or onion) webpages through TOR network      webapp     
torctl              Script to redirect all traffic through tor network including dns queries for anonymizing entire system      automation     
torpy              Pure python Tor client implementation      networking     
torshammer          A slow POST Denial of Service testing tool written in Python      dos     
torsocks          Wrapper to safely torify applications      proxy     
tpcat             latest     Tool based upon pcapdiff by the EFF It will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest      misc     
tplmap              Automatic Server-Side Template Injection Detection and Exploitation Tool      webapp     
traceroute          Tracks the route taken by packets over an IP network      recon     
trape              People tracker on the Internet: OSINT analysis and research tool by Jose Pino      social     
traxss              Automated XSS Vulnerability Scanner      scanner     
treasure          Hunt for sensitive information through githubs code search      recon     
trevorspray          A modular password sprayer with threading, clever proxying, loot modules, and more!      cracker     
trid              An utility designed to identify file types from their binary signatures      forensic     
trinity          A Linux System call fuzzer      fuzzer     
triton              A Dynamic Binary Analysis (DBA) framework      binary     
trivy              A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI      scanner     
trixd00r          An advanced and invisible userland backdoor based on TCP/IP for UNIX systems      backdoor     
truecrack          Password cracking for truecrypt(c) volumes      cracker     
truegaze          Static analysis tool for Android/iOS apps focusing on security issues outside the source code      mobile     
truehunter          Detect TrueCrypt containers using a fast and memory efficient approach      forensic     
trufflehog          Searches through git repositories for high entropy strings, digging deep into commit history      code-audit     
trusttrees          A Tool for DNS Delegation Trust Graphing      recon     
tsh              An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication      backdoor     
tsh-sctp          An open-source UNIX backdoor      backdoor     
ttpassgen          Highly flexible and scriptable password dictionary generator based on Python      automation     
tunna              a set of tools which will wrap and tunnel any TCP communication over HTTP It can be used to bypass network restrictions in fully firewalled environments      networking     
tweets-analyzer      Tweets metadata scraper & activity analyzer      social     
tweetshell          Multi-thread Twitter BruteForcer in Shell Script      cracker     
twint              An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations      social     
twofi              Twitter Words of Interest      recon     
typo3scan          Enumerate Typo version and extensions      webapp     
tyton              Kernel-Mode Rootkit Hunter      defensive     
u3-pwn              A tool designed to automate injecting executables to Sandisk smart usb devices with default U software install      backdoor     
uacme              Defeating Windows User Account Control      windows     
uatester          User Agent String Tester      misc     
uberfile          CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems      misc     
ubertooth          A  GHz wireless development board suitable for Bluetooth experimentation Open source hardware and software Tools only      bluetooth     
ubiquiti-probing      A Ubiquiti device discovery tool      recon     
ubitack          Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go      wireless     
udis86              A minimalistic disassembler library      reversing     
udork              Bash script that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications      recon     
udp-hunter          Network assessment tool for various UDP Services covering both IPv and IPv protocols      scanner     
udp2raw-tunnel          An Encrypted, Anti-Replay, Multiplexed UdP Tunnel, tunnels udp traffic through fake-tcp or icmp by using raw socket      tunnel     
udpastcp          This program hides UDP traffic as TCP traffic in order to bypass certain firewalls      networking     
udptunnel          Tunnels TCP over UDP packets      networking     
udsim              A graphical simulator that can emulate different modules in a vehicle and respond to UDS request      scanner     
uefi-firmware-parser      Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc      firmware     
ufo-wardriving          Allows you to test the security of wireless networks by detecting their passwords based on the router model      cracker     
ufonet              A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet      dos     
uhoh365          Script to enumerate Office  users without performing login attempts      recon     
ultimate-facebook-scraper A bot which scrapes almost everything about a Facebook user's profile      social     
umap              The USB host security assessment tool      scanner     
umit              A powerful nmap frontend      networking     
uncaptcha2          Defeating the latest version of ReCaptcha with % accuracy      webapp     
unfurl              Pull out bits of URLs provided on stdin      misc     
unhide              A forensic tool to find processes hidden by rootkits, LKMs or by other techniques      forensic     
unibrute          Multithreaded SQL union bruteforcer      exploitation     
unicorn-powershell      A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory      backdoor     
unicornscan          A new information gathering and correlation engine      scanner     
unifuzzer         A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer      fuzzer     
uniofuzz          The universal fuzzing tool for browsers, web services, files, programs and network services/ports      fuzzer     
uniscan          A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner      fuzzer     
unix-privesc-check      Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (eg databases)      automation     
unsecure          Bruteforces network login masks      windows     
unstrip         ELF Unstrip Tool      disassembler     
untwister          Seed recovery tool for PRNGs      crypto     
upnp-pentest-toolkit     UPnP Pentest Toolkit for Windows      windows     
upnpscan          Scans the LAN or a given address range for UPnP capable devices      scanner     
uppwn              A script that automates detection of security flaws on websites' file upload systems'      webapp     
uptux              Linux privilege escalation checks (systemd, dbus, socket fun, etc)      scanner     
upx              Extendable, high-performance executable packer for several executable formats      binary     
urh              Universal Radio Hacker: investigate wireless protocols like a boss      radio     
urlcrazy          Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage      webapp     
urldigger          A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code      webapp     
urlextractor          Information gathering & website reconnaissance      webapp     
urlview          A curses URL parser for text files      misc     
usb-canary          A Linux or OSX tool that uses psutil to monitor devices while your computer is locked In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover      defensive     
usbrip              USB device artifacts tracker      forensic     
username-anarchy     Tools for generating usernames when penetration testing      automation     
usernamer          Pentest Tool to generate usernames/logins based on supplied names      misc     
userrecon          Find usernames across over  social networks      recon     
userrecon-py          Recognition usernames in  social networks      social     
usnjrnl2csv          Parser for $UsnJrnl on NTFS      forensic     
usnparser          A Python script to parse the NTFS USN journal      forensic     
uw-loveimap          Multi threaded imap bounce scanner      scanner     
uw-offish          Clear-text protocol simulator      networking     
uw-udpscan          Multi threaded udp scanner      scanner     
uw-zone          Multi threaded, randomized IP zoner      scanner     
v3n0m              Offensive Security Tool for Vulnerability Scanning & Pentesting      scanner     
vais              SWF Vulnerability & Information Scanner      scanner     
valabind          Tool to parse vala or vapi files to transform them into swig interface files, C++, NodeJS-ffi or GIR      misc     
valgrind          Tool to help find memory-management problems in programs      binary     
valhalla          Valhalla API Client      automation     
vane              A vulnerability scanner which checks the security of WordPress installations using a black box approach      webapp     
vanguard          A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications      webapp     
vault-scanner          Swiss army knife for hackers      scanner     
vba2graph          Generate call graphs from VBA code, for easier analysis of malicious documents      malware     
vbrute              Virtual hosts brute forcer      recon     
vbscan              A black box vBulletin vulnerability scanner written in perl      webapp     
vbsmin              VBScript minifier      packer     
vcsmap              A plugin-based tool to scan public version control systems for sensitive information      scanner     
vega              An open source platform to test the security of web applications      webapp     
veil              A tool designed to generate metasploit payloads that bypass common anti-virus solutions      automation     
veles              New open source tool for binary data analysis      binary     
venom              A Multi-hop Proxy for Penetration Testers      exploitation     
veracrypt          Disk encryption with strong security based on TrueCrypt      crypto     
verinice         Tool for managing information security      misc     
vfeed              Open Source Cross Linked and Aggregated Local Vulnerability Database main repository      misc     
vhostscan          A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages      scanner     
videosnarf          A new security assessment tool for pcap analysis      scanner     
vinetto          A forensics tool to examine Thumbsdb files      forensic     
viper              A Binary analysis framework      disassembler     
vipermonkey          A VBA parser and emulation engine to analyze malicious macros      forensic     
viproy-voipkit          VoIP Pen-Test Kit for Metasploit Framework      exploitation     
virustotal          Command-line utility to automatically lookup on VirusTotal all files recursively contained in a directory      malware     
visql              Scan SQL vulnerability on target site and sites of on server      scanner     
visualize-logs          A Python library and command line tools to provide interactive log visualization      misc     
vivisect          A Python based static analysis and reverse engineering framework      debugger     
vlan-hopping          Easy Q VLAN Hopping      automation     
vlany              Linux LD_PRELOAD rootkit (x and x_ architectures)      backdoor     
vmap              A Vulnerability-Exploit desktop finder      exploitation     
vmcloak          Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox      malware     
vnak              Aim is to be the one tool a user needs to attack multiple VoIP protocols      voip     
vnc-bypauth          Multi-threaded bypass authentication scanner for VNC smaller than v servers      cracker     
vncrack          What it looks like: crack VNC      cracker     
voiper              A VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor      voip     
voiphopper          A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone It rapidly automates a VLAN Hop into the Voice VLAN      automation     
voipong          A utility which detects all Voice Over IP calls on a pipeline, and for those which are G encoded, dumps actual conversation to separate wave files      voip     
volafox          Mac OS X Memory Analysis Toolkit      forensic     
volatility-extra     Volatility plugins developed and maintained by the community      forensic     
volatility3          Advanced memory forensics framework      forensic     
voltron          UI for GDB, LLDB and Vivisect's VDB      debugger     
vpnpivot          Explore the network using this tool      recon     
vsaudit          VOIP Security Audit Framework      voip     
vscan              HTTPS / Vulnerability scanner      scanner     
vstt              VSTT is a multi-protocol tunneling tool It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP, and ICMP tunneling      tunnel     
vsvbp              Black box tool for Vulnerability detection in web applications      webapp     
vulmap              Vulmap Online Local Vulnerability Scanners Project      scanner     
vulnerabilities-spider     A tool to scan for web vulnerabilities      webapp     
vulnx              Cms and vulnerabilites detector & An intelligent bot auto shell injector      webapp     
vuls              Vulnerability scanner for Linux/FreeBSD, agentless, written in Go      scanner     
vulscan          A module which enhances nmap to a vulnerability scanner      scanner     
w13scan          Passive Security Scanner      webapp     
w3af              Web Application Attack and Audit Framework      fuzzer     
wafninja         A tool which contains two functions to attack Web Application Firewalls      webapp     
wafp              An easy to use Web Application Finger Printing tool written in ruby using sqlite databases for storing the fingerprints      webapp     
wafpass          Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF      webapp     
wafw00f          Identify and fingerprint Web Application Firewall (WAF) products protecting a website      scanner     
waidps             Wireless Auditing, Intrusion Detection & Prevention System      wireless     
waldo              A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python      recon     
wapiti              A vulnerability scanner for web applications      webapp     
wascan              Web Application Scanner      webapp     
wavemon          Ncurses-based monitoring application for wireless network devices      wireless     
waybackpack          Download the entire Wayback Machine archive for a given URL      webapp     
waybackurls          Fetch all the URLs that the Wayback Machine knows about for a domain      recon     
wcc              The Witchcraft Compiler Collection      binary     
wce              A security tool to list logon sessions and add, change, list and delete associated credentials (ex: LM/NT hashes, plaintext passwords and Kerberos tickets)      windows     
wcvs              Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning      webapp     
web-soul          A plugin based scanner for attacking and data mining web sites written in Perl      webapp     
web2ldap          Full-featured LDAP client running as web application      misc     
webacoo          Web Backdoor Cookie Script-Kit      backdoor     
webanalyze          Port of Wappalyzer (uncovers technologies used on websites) in go to automate scanning      webapp     
webborer          A directory-enumeration tool written in Go      webapp     
webenum          Tool to enumerate http responses using dynamically generated queries and more      scanner     
webexploitationtool      A cross platform web exploitation toolkit      exploitation     
webfixy         On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions      proxy     
webhandler          A handler for PHP system functions & also an alternative 'netcat' handler      webapp     
webhunter          Tool for scanning web applications and networks and easily completing the process of collecting knowledge      scanner     
webkiller          Tool Information Gathering Write By Python      webapp     
webpwn3r          A python based Web Applications Security Scanner      scanner     
webrute          Web server directory brute forcer      scanner     
webscarab          Framework for analysing applications that communicate using the HTTP and HTTPS protocols      fuzzer     
websearch          Search vhost names given a host range Powered by Bing      recon     
webshag          A multi-threaded, multi-platform web server audit tool      fuzzer     
webshells          Web Backdoors      webapp     
webslayer          A tool designed for brute forcing Web Applications      webapp     
websockify          WebSocket to TCP proxy/bridge      networking     
webspa              A web knocking tool, sending a single HTTP/S to run O/S commands      backdoor     
websploit          An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks      exploitation     
webtech          Identify technologies used on websites      webapp     
webxploiter          An OWASP Top  Security scanner      webapp     
weebdns          DNS Enumeration with Asynchronicity      recon     
weeman              HTTP Server for phishing in python      social     
weevely          Weaponized web shell      webapp     
weirdaal          AWS Attack Library      webapp     
wepbuster          script for automating aircrack-ng      wireless     
wesng              Windows Exploit Suggester - Next Generation      exploitation     
wfuzz              Utility to bruteforce web applications to find their not linked resources      fuzzer     
whapa              WhatsApp Parser Tool      misc     
whatbreach          OSINT tool to find breached emails and databases      social     
whatportis          A command to search port names and numbers      misc     
whatsmyname          Tool to perform user and username enumeration on various websites      social     
whatwaf          Detect and bypass web application firewalls and protection systems      webapp     
whatweb          Next generation web scanner that identifies what websites are running      recon     
whichcdn          Tool to detect if a given website is protected by a Content Delivery Network      webapp     
whispers          Identify hardcoded secrets in static structured text      code-audit     
whitewidow          SQL Vulnerability Scanner      scanner     
wi-feye          An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily      wireless     
wifi-autopwner          Script to automate searching and auditing Wi-Fi networks with weak security      automation     
wifi-honey          A management tool for wifi honeypots      honeypot     
wifi-monitor          Prints the IPs on your local network that're sending the most packets      sniffer     
wifi-pumpkin          Framework for Rogue Wi-Fi Access Point Attack      wireless     
wifibroot          A WiFi Pentest Cracking tool for WPA/WPA (Handshake, PMKID, Cracking, EAPOL, Deauthentication)      wireless     
wifichannelmonitor      A utility for Windows that captures wifi traffic on the channel you choose, using Microsoft Network Monitor capture driver      windows     
wificurse          WiFi jamming tool      wireless     
wifijammer          A python script to continuously jam all wifi clients within range      wireless     
wifiphisher          Fast automated phishing attacks against WPA networks      wireless     
wifiscanmap          Another wifi mapping tool      wireless     
wifitap          WiFi injection tool through tun/tap device      wireless     
wifite              Tool to attack multiple WEP and WPA encrypted networks at the same time      wireless     
wig              WebApp Information Gatherer      webapp     
wikigen          A script to generate wordlists out of wikipedia pages      automation     
wildpwn          Unix wildcard attacks      exploitation     
windapsearch          Script to enumerate users, groups and computers from a Windows domain through LDAP queries      recon     
windivert          A user-mode packet capture-and-divert package for Windows      windows     
windows-binaries      A colleciton of pentesting Windows binaries      windows     
windows-exploit-suggester     This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target      recon     
windows-prefetch-parser Parse Windows Prefetch files      forensic     
windows-privesc-check      Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems      windows     
windowsspyblocker      Block spying and tracking on Windows      windows     
winexe              Remotely execute commands on Windows NT//XP/ systems      misc     
winfo              Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT//XP      windows     
winhex              Hex Editor and Disk Editor      windows     
winpwn              Automation for internal Windows Penetrationtest / AD-Security      windows     
winregfs          Windows Registry FUSE filesystem      misc     
winrelay          A TCP/UDP forwarder/redirector that works with both IPv and IPv      windows     
wireless-ids          Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets      wireless     
wireshark-cli          Network traffic and protocol analyzer/sniffer - CLI tools and data files      sniffer     
wireshark-qt          Network traffic and protocol analyzer/sniffer - Qt GUI      sniffer     
wirouter-keyrec      A platform independent software to recover the default WPA passphrases of the supported router models      wireless     
witchxtool          A perl script that consists of a port scanner, LFI scanner, MD bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner      webapp     
wlan2eth          Re-writes  captures into standard Ethernet frames      wireless     
wmat              Automatic tool for testing webmail accounts      cracker     
wmd              Python framework for IT security tools      automation     
wmi-forensics          Scripts used to find evidence in WMI repositories      forensic     
wnmap              A shell script written with the purpose to automate and chain scans via nmap      automation     
wol-e              A suite of tools for the Wake on LAN feature of network attached computers      misc     
wolpertinger          A distributed portscanner      scanner     
wondershaper          Limit the bandwidth of one or more network adapters      networking     
wordbrutepress          Python script that performs brute forcing against WordPress installs using a wordlist      cracker     
wordlistctl          Fetch, install and search wordlist archives from websites      misc     
wordlister          A simple wordlist generator and mangler written in python      misc     
wordpot          A Wordpress Honeypot      honeypot     
wordpress-exploit-framework     A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems      webapp     
wordpresscan          WPScan rewritten in Python + some WPSeku ideas      scanner     
wpa-bruteforcer      Attacking WPA/WPA encrypted access point without client      wireless     
wpa2-halfhandshake-crack A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA network without knowing the passphrase of the actual AP      wireless     
wpbf              Multithreaded WordPress brute forcer      cracker     
wpbrute-rpc          Tool for amplified bruteforce attacks on wordpress based website via xmlrcp API      cracker     
wpbullet          A static code analysis for WordPress (and PHP)      code-audit     
wpforce          Wordpress Attack Suite      webapp     
wpintel          Chrome extension designed for WordPress Vulnerability Scanning and information gathering      webapp     
wpscan              Black box WordPress vulnerability scanner      webapp     
wpseku              Simple Wordpress Security Scanner      webapp     
wpsik              WPS scan and pwn tool      wireless     
wpsweep          A simple ping sweeper, that is, it pings a range of IP addresses and lists the ones that reply      windows     
wreckuests          Yet another one hard-hitting tool to run DDoS attacks with HTTP-flood      dos     
ws-attacker          A modular framework for web services penetration testing      webapp     
wscript          Emulator/tracer of the Windows Script Host functionality      code-audit     
wsfuzzer          A Python tool written to automate SOAP pentesting of web services      fuzzer     
wssip              Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa      webapp     
wsuspect-proxy          A tool for MITM'ing insecure WSUS connections      exploitation     
wups              An UDP port scanner for Windows      windows     
wuzz              Interactive cli tool for HTTP inspection      webapp     
wxhexeditor          A free hex editor / disk editor for Linux, Windows and MacOSX      binary     
wyd              Gets keywords from personal files IT security/forensic tool      cracker     
x-rsa              Contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem      crypto     
x-scan              A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable      windows     
x64dbg              An open-source x/x debugger for windows      windows     
x8              Hidden parameters discovery suite      webapp     
xcat              A command line tool to automate the exploitation of blind XPath injection vulnerabilities      exploitation     
xcavator          Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook      sniffer     
xcname              A tool for enumerating expired domains in CNAME records      scanner     
xerosploit          Efficient and advanced man in the middle framework      networking     
xfltreat          Tunnelling framework      tunnel     
xmlrpc-bruteforcer      An XMLRPC brute forcer targeting Wordpress written in Python       webapp     
xorbruteforcer          Script that implements a XOR bruteforcing of a given file, although a specific key can be used too      crypto     
xorsearch          Program to search for a given string in an XOR, ROL or ROT encoded binary file      crypto     
xortool          Tool to analyze multi-byte XOR cipher      crypto     
xpire-crossdomain-scanner Scans crossdomainxml policies for expired domain names      scanner     
xpl-search          Search exploits in multiple exploit databases!      exploitation     
xplico              Internet Traffic Decoder Network Forensic Analysis Tool (NFAT)      forensic     
xprobe              An active OS fingerprinting tool      fingerprint     
xray              A tool for recon, mapping and OSINT gathering from public networks      recon     
xrop              Tool to generate ROP gadgets for ARM, AARCH, x, MIPS, PPC, RISCV, SH and SPARC      exploitation     
xspear              Powerful XSS Scanning and Parameter analysis tool&gem      webapp     
xspy              A utility for monitoring keypresses on remote X servers      keylogger     
xsrfprobe          The Prime Cross Site Request Forgery Audit and Exploitation Toolkit      webapp     
xss-freak          An XSS scanner fully written in Python from scratch      webapp     
xsscon              Simple XSS Scanner tool      webapp     
xsscrapy          XSS spider - / wavsep XSS detected      webapp     
xsser              A penetration testing tool for detecting and exploiting XSS vulnerabilites      webapp     
xssless          An automated XSS payload generator written in python      webapp     
xsspy              Web Application XSS Scanner      webapp     
xsss              A brute force cross site scripting scanner      webapp     
xssscan          Command line tool for detection of XSS attacks in URLs Based on ModSecurity rules from OWASP CRS      webapp     
xsssniper          An automatic XSS discovery tool      webapp     
xsstracer          Python script that checks remote web servers for Clickjacking, Cross-Frame Scripting, Cross-Site Tracing and Host Header Injection      scanner     
xsstrike          An advanced XSS detection and exploitation suite      webapp     
xssya              A Cross Site Scripting Scanner & Vulnerability Confirmation      webapp     
xwaf              Automatic WAF bypass tool      webapp     
xxeinjector          Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods      exploitation     
xxeserv          A mini webserver with FTP support for XXE payloads      networking     
xxexploiter          It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration      exploitation     
xxxpwn              A tool Designed for blind optimized XPath  injection attacks      webapp     
xxxpwn-smart          A fork of xxxpwn adding further optimizations and tweaks      webapp     
yaaf              Yet Another Admin Finder      webapp     
yaf              Yet Another Flowmeter      networking     
yara              Tool aimed at helping malware researchers to identify and classify malware samples      malware     
yasat              Yet Another Stupid Audit Tool      scanner     
yasca              Multi-Language Static Analysis Toolset      code-audit     
yasuo              A ruby script that scans for vulnerable & exploitable rd-party web applications on a network      webapp     
yate-bts          An open source GSM Base Station software      radio     
yawast              The YAWAST Antecedent Web Application Security Toolkit      webapp     
yay              Yet another yogurt Pacman wrapper and AUR helper written in go      misc     
ycrawler          A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output It has proxy and log file support      webapp     
yersinia          A network tool designed to take advantage of some weakness in different network protocols      networking     
yeti             A platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository      defensive     
yinjector          A MySQL injection penetration tool It has multiple features, proxy support, and multiple exploitation methods      exploitation     
ysoserial          A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization      webapp     
zackattack          A new tool set to do NTLM Authentication relaying unlike any other tool currently out there      networking     
zaproxy          Integrated penetration testing tool for finding vulnerabilities in web applications      webapp     
zarp              A network attack tool centered around the exploitation of local networks      exploitation     
zdns              Fast CLI DNS Lookup Tool      networking     
zeek              A powerful network analysis framework that is much different from the typical IDS you may know      networking     
zeek-aux          Handy auxiliary programs related to the use of the Zeek Network Security Monitor      networking     
zelos              A comprehensive binary emulation and instrumentation platform      binary     
zeratool          Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems      exploitation     
zerowine          Malware Analysis Tool - research project to dynamically analyze the behavior of malware      malware     
zeus              AWS Auditing & Hardening Tool      defensive     
zeus-scanner          Advanced dork searching utility      recon     
zgrab              Grab banners (optionally over TLS)      recon     
zgrab2              Go Application Layer Scanner      fingerprint     
zipdump          ZIP dump utility      forensic     
zipexec          A unique technique to execute binaries from a password protected zip      crypto     
zirikatu          Fud Payload generator script      exploitation     
zizzania          Automated DeAuth attack      wireless     
zmap              Fast network scanner designed for Internet-wide network surveys      scanner     
zssh              SSH and Telnet client with ZMODEM file transfer capability      networking     
zulu              A light weight  wireless frame generation tool to enable fast and easy debugging and probing of  networks      cracker     
zulucrypt          Front end to cryptsetup and tcplay and it allows easy management of encrypted block devices      crypto     
zykeys              Demonstrates how default wireless settings are derived on some models of ZyXEL routers      wireless     
zzuf              Transparent application input fuzzer      fuzzer

=================================================================

GITHUB TOOLS 

=================================================================

https://github.com/hrackedz/Google-Link-Grabber

https://github.com/HACK3RY2J/Anon-SMS

https://github.com/H1R0GH057/Anonymous

https://github.com/techchipnet/CamPhish

https://github.com/t3l3machus/hoaxshell

https://github.com/t3l3machus/villain

https://github.com/guelfoweb/knock

https://github.com/sc0tfree/mentalist

https://github.com/openwrt/openwrt

https://github.com/s0md3v/Photon

https://github.com/4ndr34z/shells

https://github.com/ruped24/toriptables3

https://github.com/htr-tech/zphisher

=================================================================

Online tools 

=================================================================

https://www.reuneker.nl/files/wordlist/

https://webresolver.nl/tools/iplogger

(not finished)

Коментари

Популарни постови са овог блога

Hello, World! My first blog.