Hacker's toolbook
0d1n Web security tool to make fuzzing at HTTP inputs, made in C with libCurl webapp
0trace A hop enumeration tool scanner
3proxy Tiny free proxy server proxy
3proxy-win Tiny free proxy server windows
42zip Recursive Zip archive bomb dos
a2sv Auto Scanning to SSL Vulnerability scanner
abcd ActionScript ByteCode Disassembler disassembler
abuse-ssl-bypass-waf Bypassing WAF by abusing SSL/TLS Ciphers webapp
acccheck A password dictionary attack tool that targets windows authentication via the SMB protocol cracker
ace Automated Corporate Enumerator A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface voip
aclpwn Active Directory ACL exploitation with BloodHound exploitation
activedirectoryenum Enumerate AD through LDAP recon
ad-ldap-enum An LDAP based Active Directory user and group enumeration tool recon
adape-script Active Directory Assessment and Privilege Escalation Script windows
adenum A pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with kerberos exploitation
adfind Simple admin panel finder for php,js,cgi,asp and aspx admin panels webapp
adfspray Python tool to perform password spraying against Microsoft Online service using various methods cracker
adidnsdump Active Directory Integrated DNS dumping by any authenticated user recon
admid-pack ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets Very powerful spoof
adminpagefinder This python script looks for a large amount of possible administrative interfaces on a given site webapp
admsnmp ADM SNMP audit scanner scanner
aesfix A tool to find AES key in RAM cracker
aeskeyfind A tool to find AES key in RAM cracker
aespipe Reads data from stdin and outputs encrypted or decrypted results to stdout crypto
aesshell A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA for secure transport backdoor
afflib An extensible open format for the storage of disk images and related forensic information forensic
aflplusplus American Fuzzing Lop fuzzer with community patches and additional features fuzzer
afpfs-ng A client for the Apple Filing Protocol (AFP) networking
agafi A gadget finder and a ROP-Chainer tool for x platforms windows
against A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list cracker
aggroargs Bruteforce commandline buffer overflows, linux, aggressive arguments exploitation
aiengine A packet inspection engine with capabilities of learning without any human intervention networking
aimage A program to create aff-images forensic
aiodnsbrute Python DNS asynchronous brute force utility recon
air A GUI front-end to dd/dcdd designed for easily creating forensic images forensic
aircrack-ng Key cracker for the WEP and WPA-PSK protocols wireless
airflood A modification of aireplay that allows for a DoS of the AP This program fills the table of clients of the AP with random MACs doing impossible new connections [Tool in Spanish] wireless
airgeddon Multi-use bash script for Linux systems to audit wireless networks wireless
airopy bfd Get (wireless) clients and access points wireless
airoscript A script to simplify the use of aircrack-ng tools wireless
airpwn A tool for generic packet injection on an network wireless
ajpfuzzer A command-line fuzzer for the Apache JServ Protocol (ajp) fuzzer
albatar A SQLi exploitation framework in Python webapp
allthevhosts A vhost discovery tool that scrapes various web applications scanner
altdns Generates permutations, alterations and mutations of subdomains and then resolves them recon
amass In-depth subdomain enumeration written in Go scanner
amber Reflective PE packer binary
amoco Yet another tool for analysing binaries binary
analyzemft Parse the MFT file from an NTFS filesystem forensic
analyzepesig Analyze digital signature of PE file windows
androbugs An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications mobile
androguard Reverse engineering, Malware and goodware analysis of Android applications and more binary
androick A python tool to help in forensics analysis on android mobile
android-apktool A tool for reverse engineering Android apk files reversing
android-ndk Android C/C++ developer kit mobile
android-sdk Google Android SDK mobile
android-udev-rules Android udev rules mobile
androidpincrack Bruteforce the Android Passcode given the hash and salt mobile
androidsniffer A perl script that lets you search for rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more mobile
androwarn Yet another static code analyzer for malicious Android applications mobile
angr The next-generation binary analysis platform from UC Santa Barbaras Seclab binary
angr-management This is the GUI for angr binary
angr-py2 The next-generation binary analysis platform from UC Santa Barbaras Seclab binary
angrop A rop gadget finder and chain builder exploitation
anontwi A free software python client designed to navigate anonymously on social networks It supports Identica and Twittercom social
anti-xss A XSS vulnerability scanner webapp
antiransom A tool capable of detect and stop attacks of Ransomware using honeypots windows
apache-users This perl script will enumerate the usernames on a unix system that use the apache module UserDir scanner
apacket Sniffer syn and backscatter packets networking
aphopper A program that automatically hops between access points of different wireless networks wireless
apkid Android Application Identifier for Packers, Protectors, Obfuscators and Oddities mobile
apkleaks Scanning APK file for URIs, endpoints & secrets mobile
apkstat Automated Information Retrieval From APKs For Initial Analysis mobile
apkstudio An IDE for decompiling/editing & then recompiling of android application binaries reversing
apnbf A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device wireless
appmon A runtime security testing & profiling framework for native apps on macOS, iOS & android and it is built using Frida mobile
apt2 Automated penetration toolkit automation
aquatone A Tool for Domain Flyovers recon
arachni A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications webapp
aranea A fast and clean dns spoofing tool spoof
arcane Backdoor iOS packages and create the necessary resources for APT repositories mobile
archivebox The open source self-hosted web archive Takes browser history/bookmarks/Pocket/Pinboard/etc, saves HTML, JS, PDFs, media, and more misc
arduino Arduino prototyping platform SDK hardware
argon2 A password-hashing function (reference C implementation) crypto
argus Network monitoring tool with flow control networking
argus-clients Network monitoring client for Argus networking
arjun HTTP parameter discovery suite webapp
armitage A graphical cyber attack management tool for Metasploit exploitation
armor A simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners exploitation
armscgen ARM Shellcode Generator (Mostly Thumb Mode) exploitation
arp-scan A tool that uses ARP to discover and fingerprint IP hosts on the local network networking
arpalert Monitor ARP changes in ethernet networks networking
arpoison The UNIX arp cache update utility exploitation
arpon A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks defensive
arpstraw Arp spoof detection tool defensive
arptools A simple tool about ARP broadcast, ARP attack, and data transmission networking
arpwner GUI-based python tool for arp poisoning and dns poisoning attacks networking
artillery A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system defensive
artlas Apache Real Time Logs Analyzer System defensive
arybo Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions misc
asleap Actively recover LEAP/PPTP passwords cracker
asp-audit An ASP fingerprinting tool and vulnerability scanner fingerprint
assetfinder Find domains and subdomains potentially related to a given domain scanner
astra Automated Security Testing For REST API's webapp
atear Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration wireless
atftp Client/server implementation of the TFTP protocol that implements RFCs , , , , and networking
athena-ssl-scanner A SSL cipher scanner that checks all cipher codes It can identify about different ciphers scanner
atlas Open source tool that can suggest sqlmap tampers to bypass WAF/IDS/IPS webapp
atscan Server, Site and Dork Scanner scanner
atstaketools This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics windows
attacksurfacemapper Tool that aims to automate the reconnaissance process recon
attk Trend Micro Anti-Threat Toolkit scanner
aurebeshjs Translate JavaScript to Other Alphabets misc
auto-eap Automated Brute-Force Login Attacks Against EAP Networks wireless
auto-xor-decryptor Automatic XOR decryptor tool crypto
automato Should help with automating some of the user-focused enumeration tasks during an internal penetration test automation
autonessus This script communicates with the Nessus API in an attempt to help with automating scans automation
autonse Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner automation
autopsy The forensic browser A GUI for the Sleuth Kit forensic
autopwn Specify targets and run sets of tools against them automation
autorecon A multi-threaded network reconnaissance tool which performs automated enumeration of services automation
autosint Tool to automate common osint tasks recon
autosploit Automate the exploitation of remote hosts exploitation
autovpn Easily connect to a VPN in a country of your choice networking
avaloniailspy NET Decompiler (port of ILSpy) decompiler
avet AntiVirus Evasion Tool binary
avml A portable volatile memory acquisition tool for Linux misc
aws-extender-cli Script to test S buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues scanner
aws-inventory Discover resources created in an AWS account recon
awsbucketdump A tool to quickly enumerate AWS S buckets to look for loot automation
azazel A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit backdoor
aztarna A footprinting tool for ROS and SROS systems recon
backcookie Small backdoor using cookie backdoor
backdoor-apk Shell script that simplifies the process of adding a backdoor to any Android APK file mobile
backdoor-factory Patch win/ binaries with shellcode backdoor
backdoorme A powerful utility capable of backdooring Unix machines with a slew of backdoors backdoor
backdoorppt Transform your payloadexe into one fake word doc (ppt) backdoor
backfuzz A network protocol fuzzing toolkit fuzzer
backhack Tool to perform Android app analysis by backing up and extracting apps, allowing you to analyze and modify file system contents for apps mobile
backoori Tool aided persistence via Windows URI schemes abuse exploitation
backorifice A remote administration system which allows a user to control a computer across a tcpip connection using a simple console or GUI application windows
bad-pdf Steal NTLM Hashes with Bad-PDF exploitation
badkarma Advanced network reconnaissance toolkit recon
badministration A tool which interfaces with management or administration applications from an offensive standpoint webapp
bagbak Yet another frida based App decryptor mobile
balbuzard A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc) malware
bamf-framework A modular framework designed to be a platform to launch attacks against botnets malware
bandicoot A toolbox to analyze mobile phone metadata mobile
barf A multiplatform open source Binary Analysis and Reverse engineering Framework binary
barmie Java RMI enumeration and attack tool scanner
barq An AWS Cloud Post Exploitation framework exploitation
basedump Extract and decode base strings from files misc
basedomainname Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names recon
bashfuscator Fully configurable and extendable Bash obfuscation framework automation
bashscan A port scanner built to utilize /dev/tcp for network and service discovery scanner
batctl BATMAN advanced control and management tool wireless
batman-adv Batman kernel module, (included upstream since ) wireless
batman-alfred Almighty Lightweight Fact Remote Exchange Daemon wireless
bbqsql SQL injection exploit tool webapp
bbscan A tiny Batch web vulnerability Scanner webapp
bdfproxy Patch Binaries via MITM: BackdoorFactory + mitmProxy proxy
bdlogparser This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintenance of your malware collection malware
bed Collection of scripts to test for buffer overflows, format string vulnerabilities exploitation
beebug A tool for checking exploitability decompiler
beef The Browser Exploitation Framework that focuses on the web browser exploitation
beeswarm Honeypot deployment made easy http://wwwbeeswarm-idsorg/ honeypot
beholder A wireless intrusion detection tool that looks for anomalies in a wifi environment wireless
belati The Traditional Swiss Army Knife for OSINT scanner
beleth A Multi-threaded Dictionary based SSH cracker cracker
bettercap Swiss army knife for network attacks and monitoring sniffer
bettercap-ui Official Bettercap's Web UI misc
bfac An automated tool that checks for backup artifacts that may disclose the web-application's source code recon
bfbtester Performs checks of single and multiple argument command line overflows and environment variable overflows exploitation
bfuzz Input based fuzzer tool for browsers fuzzer
bgp-md5crack RFC password cracker cracker
bgrep Binary grep binary
billcipher Information Gathering tool for a Website or IP address recon
binaryninja-demo A new kind of reversing platform (demo version) reversing
binaryninja-python Binary Ninja prototype written in Python binary
bind A complete, highly portable implementation of the DNS protocol networking
bindead A static analysis tool for binaries binary
bindiff A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code binary
binex Format String exploit building tool exploitation
binflow POSIX function tracing Much better and faster than ftrace binary
bing-ip2hosts Enumerates all hostnames which Bing has indexed for a specific IP address recon
bing-lfi-rfi Python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities webapp
bingoo A Linux bash based Bing and Google Dorking Tool scanner
binnavi A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code disassembler
binproxy A proxy for arbitrary TCP connections proxy
binwalk Tool for searching a given binary image for embedded files disassembler
binwally Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep) binary
bios_memimage A tool to dump RAM contents to disk (aka cold boot attack) cracker
birp A tool that will assist in the security assessment of mainframe applications served over TN scanner
bitdump A tool to extract database data from a blind SQL injection vulnerability exploitation
bittwist A simple yet powerful libpcap-based Ethernet packet generator It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic sniffer
bkcrack Crack legacy zip encryption with Biham and Kocher known plaintext attack cracker
bkhive Program for dumping the syskey bootkey from a Windows NT/K/XP system hive cracker
blackbox-scanner Dork scanner & bruteforcing & hash cracker with blackbox framework scanner
blackeye Ultimate phishing tool with ngrok and serveo social
blackhash Creates a filter from system hashes cracker
blacknurse A low bandwidth ICMP attack that is capable of doing denial of service to well known firewalls dos
bleah A BLE scanner for "smart" devices hacking scanner
bless High-quality, full-featured hex editor misc
bletchley A collection of practical application cryptanalysis tools crypto
blind-sql-bitshifting A blind SQL injection module that uses bitshfting to calculate characters exploitation
blindelephant A web application fingerprinter Attempts to discover the version of a (known) web application by comparing static files at known locations fingerprint
blindsql Set of bash scripts for blind SQL injection attacks database
blindy Simple script to automate brutforcing blind sql injection vulnerabilities scanner
blisqy Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB) webapp
bloodhound Six Degrees of Domain Admin recon
bloodhound-python Bloodhound python data collector recon
bloodyad An Active Directory Privilege Escalation Framework exploitation
blue-hydra A Bluetooth device discovery service built on top of the bluez library bluetooth
bluebox-ng A GPL VoIP/UC vulnerability scanner voip
bluebugger An implementation of the bluebug technique which was discovered by Martin Herfurt bluetooth
bluediving A Bluetooth penetration testing suite bluetooth
bluefog A tool that can generate an essentially unlimited number of phantom Bluetooth devices bluetooth
bluelog A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode bluetooth
bluepot A Bluetooth Honeypot written in Java, it runs on Linux bluetooth
blueprint A perl tool to identify Bluetooth devices bluetooth
blueranger A simple Bash script which uses Link Quality to locate Bluetooth device radios automation
bluescan A Bluetooth Device Scanner bluetooth
bluesnarfer A bluetooth attacking tool bluetooth
bluffy Convert shellcode into different formats exploitation
bluphish Bluetooth device and service discovery tool that can be used for security assessment and penetration testing bluetooth
bluto Recon, Subdomain Bruting, Zone Transfers scanner
bmap-tools Tool for copying largely sparse files using information from a block map file forensic
bmc-tools RDP Bitmap Cache parser forensic
bob-the-butcher A distributed password cracker package cracker
bof-detector A simple detector of BOF vulnerabilities by source-code-level check code-audit
bonesi The DDoS Botnet Simulator dos
boofuzz fuzzer
boopsuite A Suite of Tools written in Python for wireless auditing and security testing wireless
bopscrk Tool to generate smart wordlists, eg based on lyrics automation
botb A container analysis and exploitation tool for pentesters and engineers exploitation
bowcaster A framework intended to aid those developing exploits exploitation
box-js A tool for studying JavaScript malware malware
bqm Download BloudHound query lists, deduplicate entries and merge them in one file misc
braa A mass snmp scanner scanner
braces A Bluetooth Tracking Utility bluetooth
brakeman A static analysis security vulnerability scanner for Ruby on Rails applications code-audit
bridgekeeper Scrape employee names from search engine LinkedIn profiles Convert employee names to a specified username format recon
brosec An interactive reference tool to help security professionals utilize useful payloads and commands exploitation
browselist Retrieves the browse list ; the output list contains computer names, and the roles they play in the network windows
browser-fuzzer Browser Fuzzer fuzzer
brute-force Brute-Force attack tool for Gmail Hotmail Twitter Facebook Netflix cracker
brute12 A tool designed for auditing the cryptography container security in PKCS format windows
bruteforce-luks Try to find the password of a LUKS encrypted volume cracker
bruteforce-salted-openssl Try to find the password of a file that was encrypted with the 'openssl' command cracker
bruteforce-wallet Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc) wallet file cracker
brutemap Penetration testing tool that automates testing accounts to the site's login page webapp
brutespray Brute-Forcing from Nmap output - Automatically attempts default creds on found services automation
brutessh A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks It's multithreads cracker
brutex Automatically brute force all services running on a target automation
brutexss Cross-Site Scripting Bruteforcer webapp
brutus One of the fastest, most flexible remote password crackers you can get your hands on windows
bsdiff bsdiff and bspatch are tools for building and applying patches to binary files reversing
bsqlbf Blind SQL Injection Brute Forcer webapp
bsqlinjector Blind SQL injection exploitation tool written in ruby webapp
bss Bluetooth stack smasher / fuzzer bluetooth
bt_audit Bluetooth audit bluetooth
btcrack The world's first Bluetooth Pass phrase (PIN) bruteforce tool Bruteforces the Passkey and the Link key from captured Pairing exchanges bluetooth
btlejack Bluetooth Low Energy Swiss-army knife bluetooth
btproxy-mitm Man in the Middle analysis tool for Bluetooth bluetooth
btscanner Bluetooth device scanner bluetooth
bulk-extractor Bulk Email and URL extraction tool forensic
bully Retrieve WPA/WPA passphrase from a WPS enabled access point wireless
bunny A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs fuzzer
burpsuite An integrated platform for attacking web applications (community edition) + SHELLING plugin webapp
buster Find emails of a person and return info associated with them social
buttinsky Provide an open source framework for automated botnet monitoring networking
bvi A display-oriented editor for binary files operate like "vi" editor binary
byepass Automates password cracking tasks using optimized dictionaries and mangling rules automation
bypass-firewall-dns-history Firewall bypass script based on DNS history records networking
bytecode-viewer A Java /Android APK Reverse Engineering Suite binary
cscan Vulnerability scanner and information gatherer for the Concrete CMS webapp
cachedump A tool that demonstrates how to recover cache entry information: username and hashed password (called MSCASH) windows
cadaver Command-line WebDAV client for Unix networking
cafebabe Java bytecode editor & decompiler decompiler
cameradar Hacks its way into RTSP videosurveillance cameras scanner
camover A camera exploitation tool that allows to disclosure network camera admin password exploitation
camscan A tool which will analyze the CAM table of Cisco switches to look for anamolies scanner
can-utils Linux-CAN / SocketCAN user space applications automobile
canalyzatr Security analysis toolkit for proprietary car protocols automobile
canari Maltego rapid transform development and execution framework forensic
cangibrina Dashboard Finder scanner
cansina A python-based Web Content Discovery Tool webapp
cantoolz Framework for black-box CAN network analysis automobile
capfuzz Capture, fuzz and intercept web traffic sniffer
capstone Lightweight multi-platform, multi-architecture disassembly framework reversing
captipper Malicious HTTP traffic explorer tool forensic
cardpwn OSINT Tool to find Breached Credit Cards Information social
carwhisperer Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys bluetooth
casefile The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information forensic
catana Filter your wordlist according to the specified password policy misc
catnthecanary An application to query the canarypw data set for leaked data recon
catphish For phishing and corporate espionage social
ccrawldns Retrieves from the CommonCrawl data set unique subdomains for a given domain name recon
cdpsnarf Cisco discovery protocol sniffer sniffer
cecster A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols scanner
centry Cold boot & DMA protection misc
cero Scrape domain names from SSL certificates of arbitrary hosts scanner
certgraph Crawl the graph of certificate Alternate Names recon
certipy Active Directory Certificate Services enumeration and abuse windows
cewl A custom word list generator automation
cflow A C program flow analyzer code-audit
cfr Another Java decompiler decompiler
chainsaw A powerful ‘first-response’ capability to quickly identify threats within Windows event logs defensive
chameleon A tool for evading Proxy categorisation networking
chameleonmini Official repository of ChameleonMini, a freely programmable, portable tool for NFC security analysis that can emulate and clone contactless cards, read RFID tags and sniff/log RF data social
changeme A default credential scanner scanner
chankro Tool that generates a PHP capable of run a custom binary (like a meterpreter) or a bash script (pe reverse shell) bypassing disable_functions & open_basedir) webapp
chaos-client Go client to communicate with Chaos dataset API recon
chaosmap An information gathering tool and dns / whois / web server scanner forensic
chaosreader A freeware tool to trace tcp, udp etc sessions and fetch application data from snoop or tcpdump logs networking
chapcrack A tool for parsing and decrypting MS-CHAPv network handshakes cracker
cheat-sh The only cheat sheet you need automation
check-weak-dh-ssh Debian OpenSSL weak client Diffie-Hellman Exchange checker scanner
checkiban Checks the validity of an International Bank Account Number (IBAN) misc
checksec Tool designed to test which standard Linux OS and PaX security features are being used automation
chiasm-shell Python-based interactive assembler/disassembler CLI, powered byKeystone/Capstone disassembler
chipsec Platform Security Assessment Framework hardware
chiron An all-in-one IPv Penetration Testing Framework scanner
chisel A fast TCP tunnel over HTTP tunnel
chkrootkit Checks for rootkits on a system defensive
chntpw Offline NT Password Editor - reset passwords in a Windows NT SAM user database file forensic
chopshop Protocol Analysis/Decoder Framework networking
choronzon An evolutionary knowledge-based fuzzer fuzzer
chownat Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other tunnel
chrome-decode Chrome web browser decoder tool that demonstrates recovering passwords windows
chromefreak A Cross-Platform Forensic Framework for Google Chrome forensic
chromensics A Google chrome forensics tool windows
chwt Unices chroot breaking tool exploitation
cidrrange Script for listing the IP addresses contained in a CIDR netblock networking
cintruder An automatic pentesting tool to bypass captchas cracker
cipherscan A very simple way to find out which SSL ciphersuites are supported by a target scanner
ciphertest A better SSL cipher checker using gnutls crypto
ciphr A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data crypto
cirt-fuzzer A simple TCP/UDP protocol fuzzer fuzzer
cisco-auditing-tool Perl script which scans cisco routers for common vulnerabilities Checks for default passwords, easily guessable community names, and the IOS history bug Includes support for plugins and scanning multiple hosts cracker
cisco-global-exploiter A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products exploitation
cisco-ocs Cisco Router Default Password Scanner cracker
cisco-router-config Tools to copy and merge Cisco Routers Configuration misc
cisco-scanner Multithreaded Cisco HTTP vulnerability scanner Tested on Linux, OpenBSD and Solaris cracker
cisco-snmp-enumeration Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking automation
cisco-snmp-slap IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices spoof
cisco-torch Cisco Torch mass scanning, fingerprinting, and exploitation tool exploitation
ciscocrack Crypt and decrypt the cisco enable passwords cracker
ciscocrack Crypt and decrypt the cisco enable passwords cracker
ciscos Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco scanner
citadel A library of OSINT tools recon
cjexploiter Drag and Drop ClickJacking exploit development assistance tool webapp
clair Vulnerability Static Analysis for Containers scanner
clairvoyance Obtain GraphQL API Schema even if the introspection is not enabled webapp
clamscanlogparser This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection malware
clash A rule based proxy in Go tunnel
climber Check UNIX/Linux systems for privilege escalation scanner
cloakify Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection misc
cloud-buster A tool that checks Cloudflare enabled sites for origin IP leaks recon
cloudfail Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network recon
cloudflare-enum Cloudflare DNS Enumeration Tool for Pentesters scanner
cloudget Python script to bypass cloudflare from command line Built upon cfscrape module webapp
cloudlist A tool for listing Assets from multiple Cloud Providers recon
cloudmare A simple tool to find origin servers of websites protected by CloudFlare with a misconfiguration DNS recon
cloudsploit AWS security scanning checks scanner
cloudunflare Reconnaissance Real IP address for Cloudflare Bypass recon
clusterd Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack automation
cminer A tool for enumerating the code caves in PE files binary
cmospwd Decrypts password stored in CMOS used to access BIOS setup cracker
cms-explorer Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running fingerprint
cms-few Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python webapp
cmseek CMS (Content Management Systems) Detection and Exploitation suite webapp
cmsfuzz Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke webapp
cmsmap A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs scanner
cmsscan CMS scanner to identify and find vulnerabilities for Wordpress, Drupal, Joomla, vBulletin webapp
cmsscanner CMS Scanner Framework webapp
cnamulator A phone CNAM lookup utility using the OpenCNAM API mobile
cntlm An NTLM, NTLMSR, and NTLMv authenticating HTTP proxy proxy
codeql The CLI tool for GitHub CodeQL automation
codetective A tool to determine the crypto/encoding algorithm used according to traces of its representation crypto
coercer Coerce a Windows server to authenticate on an arbitrary machine through methods exploitation
comission WhiteBox CMS analysis webapp
commentor Extract all comments from the specified URL resource webapp
commix Automated All-in-One OS Command Injection and Exploitation Tool webapp
commonspeak Leverages publicly available datasets from Google BigQuery to generate wordlists automation
complemento A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever fingerprint
compp Company Passwords Profiler helps making a bruteforce wordlist for a targeted company cracker
configpush This is a tool to span /-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices scanner
conpot ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems honeypot
conscan A blackbox vulnerability scanner for the Concre CMS fuzzer
cook Easily create word's permutation and combination to generate complex wordlists and passwords automation
cookie-cadger An auditing tool for Wi-Fi or wired Ethernet connections fuzzer
corkscrew A tool for tunneling SSH through HTTP proxies tunnel
corscanner Fast CORS misconfiguration vulnerabilities scanner webapp
corstest A simple CORS misconfigurations checker scanner
corsy CORS Misconfiguration Scanner webapp
cottontail Capture all RabbitMQ messages being sent through a broker sniffer
cowpatty Wireless WPA/WPA PSK handshake cracking utility wireless
cpfinder Simple script that looks for administrative web interfaces scanner
cppcheck A tool for static C/C++ code analysis code-audit
cpptest A portable and powerful, yet simple, unit testing framework for handling automated tests in C++ code-audit
crdovr Search for public leaks for email addresses + check creds against websites recon
crabstick Automatic remote/local file inclusion vulnerability analysis and exploit tool webapp
cracken A ast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust misc
crackhor A Password cracking utility cracker
crackle Crack and decrypt BLE encryption cracker
crackmapexec A swiss army knife for pentesting Windows/Active Directory environments scanner
crackq Hashcrackorg GPU-accelerated password cracker cracker
crackql GraphQL password brute-force and fuzzing utility webapp
crackserver An XMLRPC server for password cracking cracker
crawlic Web recon tool (find temporary files, parse robotstxt, search folders, google dorks and search domains hosted on same server) webapp
creak Poison, reset, spoof, redirect MITM script networking
create_ap A shell script to create a NATed/Bridged Software Access Point wireless
creddump A python tool to extract various credentials and secrets from Windows registry hives cracker
credmap The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse misc
creds Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols sniffer
credsniper Phishing framework written with the Python micro-framework Flask and Jinja templating which supports capturing FA tokens social
creepy A geolocation information gatherer Offers geolocation information gathering through social networking platforms scanner
cribdrag An interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys crypto
crlf-injector A python script for testing CRLF injecting issues fuzzer
crlfuzz A fast tool to scan CRLF vulnerability written in Go webapp
crosslinked LinkedIn enumeration tool to extract valid employee names from an organization through search engine scraping social
crosstool-ng A versatile (cross-)toolchain generator misc
crowbar A brute forcing tool that can be used during penetration tests It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools cracker
crozono A modular framework designed to automate the penetration testing of wireless networks from drones and such unconventional devices drone
crunch A wordlist generator for all combinations/permutations of a given character set automation
crypthook TCP/UDP symmetric encryption tunnel wrapper crypto
cryptohazemultiforcer High performance multihash brute forcer with CUDA support cracker
cryptonark SSL security checker crypto
csrftester The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws webapp
ct-exposer An OSINT tool that discovers sub-domains by searching Certificate Transparency logs scanner
ctf-party A CLI tool & library to enhance and speed up script/exploit writing for CTF players misc
ctunnel Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel tunnel
ctypes-sh Allows you to call routines in shared libraries from within bash reversing
cuckoo Automated malware analysis system malware
cudahashcat Worlds fastest WPA cracker with dictionary mutation engine cracker
cupp Common User Password Profiler cracker
cutycapt A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page recon
cve-api Unofficial api for cvemitreorg misc
cve-search A tool to perform local searches for known vulnerabilities exploitation
cvechecker The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database scanner
cybercrowl A Python Web path scanner tool webapp
cyberscan A Network Pentesting Tool networking
cymothoa A stealth backdooring tool, that inject backdoor's shellcode into an existing process backdoor
d-tect Pentesting the Modern Web scanner
dagon Advanced Hash Manipulation crypto
dalfox Parameter Analysis and XSS Scanning tool webapp
damm Differential Analysis of Malware in Memory malware
daredevil A tool to perform (higher-order) correlation power analysis attacks (CPA) crypto
dark-dork-searcher Dark-Dork Searcher windows
darkarmour Store and execute an encrypted windows binary from inside memory, without a single bit touching disk windows
darkbing A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection scanner
darkd0rk3r Python script that performs dork searching and searches for local file inclusion and SQL injection errors exploitation
darkdump Search The Deep Web Straight From Your Terminal webapp
darkjumper This tool will try to find every website that host at the same server at your target webapp
darkmysqli Multi-Purpose MySQL Injection Tool exploitation
darkscrape OSINT Tool For Scraping Dark Websites webapp
darkspiritz A penetration testing framework for Linux, MacOS, and Windows systems exploitation
darkstat Network statistics gatherer (packet sniffer) sniffer
datajackproxy A proxy which allows you to intercept TLS traffic in native x applications across platform proxy
datasploit Performs automated OSINT and more recon
davoset A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites dos
davscan Fingerprints servers, finds exploits, scans WebDAV webapp
davtest Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target scanner
dawnscanner A static analysis security scanner for ruby written web applications webapp
dbd A Netcat-clone, designed to be portable and offer strong encryption It runs on Unix-like operating systems and on Microsoft Win misc
dbpwaudit A Java tool that allows you to perform online audits of password quality for several database engines cracker
dbusmap Simple utility for enumerating D-Bus endpoints, an nmap for D-Bus scanner
dc3dd A patched version of dd that includes a number of features useful for computer forensics forensic
dcfldd DCFL (DoD Computer Forensics Lab) dd replacement with hashing forensic
dcrawl Simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names scanner
ddosify High-performance load testing tool, written in Golang dos
ddrescue GNU data recovery tool forensic
de4dot NET deobfuscator and unpacker windows
deathstar Automate getting Domain Admin using Empire automation
debinject Inject malicious code into *debs backdoor
deblaze Performs method enumeration and interrogation against flash remoting end points scanner
decodify Tool that can detect and decode encoded strings, recursively crypto
deen Generic data encoding/decoding application built with PyQt crypto
deepce Docker Enumeration, Escalation of Privileges and Container Escapes exploitation
delldrac DellDRAC and Dell Chassis Discovery and Brute Forcer scanner
delorean NTP Main-in-the-Middle tool exploitation
demiguise HTA encryption tool for RedTeams crypto
densityscout Calculates density for files of any file-system-path to finally output an accordingly descending ordered list misc
depant Check network for services with default passwords cracker
depdep A merciless sentinel which will seek sensitive files containing critical info leaking through your network networking
dependency-check A tool that attempts to detect publicly disclosed vulnerabilities contained within a project's dependencies defensive
depix A tool for recovering passwords from pixelized screenshots misc
det (extensible) Data Exfiltration Toolkit networking
detect-it-easy A program for determining types of files binary
detect-secrets An enterprise friendly way of detecting and preventing secrets in code code-audit
detect-sniffer Tool that detects sniffers in the network defensive
detectem Detect software and its version on websites fingerprint
devaudit An open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams code-audit
device-pharmer Opens K+ IPs or Shodan search results and attempts to login cracker
dex2jar A tool for converting Android's dex format to Java's class format hardware
dexpatcher Modify Android DEX/APK files at source-level using Java mobile
dff-scanner Tool for finding path of predictable resource locations webapp
dfir-ntfs An NTFS parser for digital forensics & incident response forensic
dftimewolf Framework for orchestrating forensic collection, processing and data export forensic
dga-detection DGA Domain Detection using Bigram Frequency Analysis recon
dharma Generation-based, context-free grammar fuzzer fuzzer
dhcdrop Remove illegal dhcp servers with IP-pool underflow misc
dhcpf Passive DHCP fingerprinting implementation fingerprint
dhcpig Enhanced DHCPv and DHCPv exhaustion and fuzzing script written in python using scapy network library scanner
dhcpoptinj DHCP option injector networking
didier-stevens-suite Didier Stevens Suite
dinouml A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC networking
dirb A web content scanner, brute forceing for hidden files scanner
dirble Fast directory scanning and scraping tool webapp
dirbuster An application designed to brute force directories and files names on web/application servers scanner
dirbuster-ng C CLI implementation of the Java dirbuster tool webapp
directorytraversalscan Detect directory traversal vulnerabilities in HTTP servers and web applications windows
dirhunt Find web directories without bruteforce webapp
dirscanner This is a python script that scans webservers looking for administrative directories, php shells, and more scanner
dirscraper OSINT Scanning tool which discovers and maps directories found in javascript files hosted on a website webapp
dirsearch HTTP(S) directory/file brute forcer webapp
dirstalk Modern alternative to dirbuster/dirb scanner
disitool Tool to work with Windows executables digital signatures forensic
dislocker Read BitLocker encrypted volumes under Linux crypto
dissector This code dissects the internal data structures in ELF files It supports x and x_ archs and runs under Linux binary
distorm Powerful disassembler library for x/AMD disassembler
dive A tool for exploring each layer in a docker image scanner
dizzy A Python based fuzzing framework with many features fuzzer
dkmc Dont kill my cat - Malicious payload evasion tool exploitation
dmde Disk Editor and Data Recovery Software forensic
dmg2img A CLI tool to uncompress Apple's compressed DMG files to the HFS+ IMG format forensic
dmitry Deepmagic Information Gathering Tool scanner
dnmap The distributed nmap framework scanner
dns-parallel-prober PoC for an adaptive parallelised DNS prober recon
dns-reverse-proxy A reverse DNS proxy written in Go proxy
dns-spoof Yet another DNS spoof utility spoof
dns2geoip A simple python script that brute forces DNS and subsequently geolocates the found subdomains scanner
dns2tcp A tool for relaying TCP connections over DNS tunnel
dnsa A dns security swiss army knife scanner
dnsbf Search for available domain names in an IP range scanner
dnsbrute Multi-theaded DNS bruteforcing, average speed lookups/second with threads recon
dnscan A python wordlist-based DNS subdomain scanner scanner
dnschef A highly configurable DNS proxy for pentesters proxy
dnscobra DNS subdomain bruteforcing tool with Tor support through torsocks recon
dnsdiag DNS Diagnostics and Performance Measurement Tools networking
dnsdrdos Proof of concept code for distributed DNS reflection DoS dos
dnsenum Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results recon
dnsfilexfer File transfer via DNS networking
dnsgoblin Nasty creature constantly searching for DNS servers It uses standard dns querys and waits for the replies scanner
dnsgrep A utility for quickly searching presorted DNS names recon
dnsmap Passive DNS network mapper fingerprint
dnsobserver A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities networking
dnspredict DNS prediction scanner
dnsprobe Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers recon
dnspy NET debugger and assembly editor windows
dnsrecon Python script for enumeration of hosts, subdomains and emails from a given domain using google recon
dnssearch A subdomain enumeration tool recon
dnsspider A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation recon
dnsteal DNS Exfiltration tool for stealthily sending files over DNS requests networking
dnstracer Determines where a given DNS server gets its information from, and follows the chain of DNS servers recon
dnstwist Domain name permutation engine for detecting typo squatting, phishing and corporate espionage scanner
dnsvalidator Maintains a list of IPv DNS servers by verifying them against baseline servers, and ensuring accurate responses networking
dnswalk A DNS debugger and zone-transfer utility recon
dnsx Fast and multi-purpose DNS toolkit allow to run multiple DNS queries of your choice with a list of user-supplied resolvers recon
docem Uility to embed XXE and XSS payloads in docx,odt,pptx,etc (OXML_XEE on steroids) webapp
dockerscan Docker security analysis & hacking tools scanner
domain-analyzer Finds all the security information for a given domain name recon
domain-stats A web API to deliver domain information from whois and alexa recon
domained Multi Tool Subdomain Enumeration recon
domainhunter Checks expired domains for categorization/reputation and Archiveorg history to determine good candidates for phishing and C domain names recon
domato DOM fuzzer fuzzer
domi-owned A tool used for compromising IBM/Lotus Domino servers webapp
domlink A tool to link a domain with registered organisation names and emails, to other domains misc
dontgo403 Tool to bypass X response codes webapp
donut Generates x, x or AMD+x PI shellcode loading NET Assemblies from memory backdoor
doona A fork of the Bruteforce Exploit Detector Tool (BED) fuzzer
doork Passive Vulnerability Auditor webapp
doozer A Password cracking utility cracker
dorkbot Command-line tool to scan Google search results for vulnerabilities scanner
dorkme Tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities scanner
dorknet Selenium powered Python script to automate searching for vulnerable web apps webapp
dorkscout Golang tool to automate google dork scan against the entire internet or specific targets automation
dotdotpwn The Transversal Directory Fuzzer exploitation
dotpeek Free NET Decompiler and Assembly Browser windows
dpeparser Default password enumeration project cracker
dpscan Drupal Vulnerability Scanner scanner
dr-checker A Soundy Vulnerability Detection Tool for Linux Kernel Drivers exploitation
dr0p1t-framework A framework that creates a dropper that bypass most AVs, some sandboxes and have some tricks backdoor
dracnmap Tool to exploit the network and gathering information with nmap help automation
dradis-ce An open source framework to enable effective information sharing recon
dragon-backdoor A sniffing, non binding, reverse down/exec, portknocking service Based on cdrc backdoor
driftnet Listens to network traffic and picks out images from TCP streams it observes scanner
drinkme A shellcode testing harness exploitation
dripcap Caffeinated Packet Analyzer networking
dripper A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS scanner
droopescan A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe webapp
drozer A security testing framework for Android - Precompiled binary from official repository mobile
drupal-module-enum Enumerate on drupal modules webapp
drupalscan Simple non-intrusive Drupal scanner webapp
drupwn Drupal enumeration & exploitation tool webapp
dscanner Swiss-army knife for D source code code-audit
dsd Digital Speech Decoder misc
dsfs A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under lines of code webapp
dshell A network forensic analysis framework forensic
dsjs A fully functional JavaScript library vulnerability scanner written in under lines of code webapp
dsniff Collection of tools for network auditing and penetration testing sniffer
dsss A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under lines of code webapp
dsstore-crawler A parser + crawler for DS_Store files exposed publically webapp
dsxs A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under lines of code webapp
dtp-spoof Python script/security tool to test Dynamic Trunking Protocol configuration on a switch networking
dublin-traceroute NAT-aware multipath tracerouting tool networking
ducktoolkit Encoding Tools for Rubber Ducky exploitation
dumb0 A simple tool to dump users in popular forums and CMS automation
dump1090 A simple Mode S decoder for RTLSDR devices networking
dumpacl Dumps NTs ACLs and audit settings windows
dumpsmbshare A script to dump files and folders remotely from a Windows SMB share misc
dumpusers Dumps account names and information even though RestrictAnonymous has been set to windows
dumpzilla A forensic tool for firefox forensic
duplicut Remove duplicates from massive wordlist, without sorting it (for dictionnary-based password cracking) misc
dutas Analysis PE file or Shellcode binary
dvcs-ripper Rip web accessible (distributed) version control systems: SVN/GIT/BZR/CVS/HG scanner
dwarf Full featured multi arch/os debugger built on top of PyQt and frida binary
dynamorio A dynamic binary instrumentation framework binary
eapeak Analysis Suite For EAP Enabled Wireless Networks wireless
eaphammer Targeted evil twin attacks against WPA-Enterprise networks Indirect wireless pivots using hostile portal attacks wireless
eapmd5pass An implementation of an offline dictionary attack against the EAP-MD protocol cracker
easy-creds A bash script that leverages ettercap and other tools to obtain credentials automation
easyda Easy Windows Domain Access Script automation
easyfuzzer A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independent) fuzzer
eazy This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more scanner
ecfs Extended core file snapshot format binary
edb A cross platform AArch/x/x debugger debugger
eggshell iOS/macOS/Linux Remote Administration Tool backdoor
eigrp-tools This is a custom EIGRP packet generator and sniffer developed to test the security and overall operation quality of this brilliant Cisco routing protocol sniffer
eindeutig Examine the contents of Outlook Express DBX email repository files (forensic purposes) forensic
electric-fence A malloc() debugger that uses virtual memory hardware to detect illegal memory accesses debugger
elettra Encryption utility by Julia Identity misc
elettra-gui Gui for the elettra crypto application misc
elevate Horizontal domain discovery tool you can use to discover other domains owned by a given company recon
elfkickers Collection of ELF utilities (includes sstrip) binary
elfparser Cross Platform ELF analysis binary
elfutils Handle ELF object files and DWARF debugging information (utilities) binary
elidecode A tool to decode obfuscated shellcodes using the unicorn-engine for the emulation and the capstone-engine to print the asm code reversing
elite-proxy-finder Finds public elite anonymity proxies and concurrently tests them proxy
emailphonenumber A OSINT tool to obtain a target's phone number just by having his email address social
emldump Analyze MIME files forensic
emp3r0r Linux post-exploitation framework made by linux user automation
empire A PowerShell and Python post-exploitation agent automation
enabler Attempts to find the enable password on a cisco system via brute force cracker
encodeshellcode This is an encoding tool for -bit x shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code exploitation
ent Pseudorandom number sequence test misc
enteletaor Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ exploitation
entropy A set of tools to exploit Netwave and GoAhead IP Webcams exploitation
enum-shares Tool that enumerates shared folders across the network and under a custom user account scanner
enum4linux A tool for enumerating information from Windows and Samba systems recon
enum4linux-ng A next generation version of enumlinux recon
enumerate-iam Enumerate the permissions associated with an AWS credential set recon
enumerid Enumerate RIDs using pure Python recon
enumiax An IAX enumerator scanner
enyelkm Rootkit for Linux x kernels v backdoor
eos Enemies Of Symfony - Debug mode Symfony looter webapp
epicwebhoneypot Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host webapp
erase-registrations An IAX flooder voip
eraser Windows tool which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns windows
eresi The ERESI Reverse Engineering Software Interface binary
erl-matter Tool to exploit epmd related services such as rabbitmq, ejabberd and couchdb by bruteforcing the cookie and gaining RCE afterwards exploitation
espionage A Network Packet and Traffic Interceptor For Linux Sniff All Data Sent Through a Network sniffer
eternal-scanner An internet scanner for exploit CVE- (Eternal Blue) scanner
etherape Graphical network monitor for various OSI layers and protocols networking
etherchange Can change the Ethernet address of the network adapters in Windows windows
etherflood Floods a switched network with Ethernet frames with random hardware addresses windows
ettercap Network sniffer/interceptor/logger for ethernet LANs - console sniffer
evil-ssdp Spoof SSDP replies to phish for NetNTLM challenge/response on a network spoof
evil-winrm The ultimate WinRM shell for hacking/pentesting exploitation
evilclippy A cross-platform assistant for creating malicious MS Office documents exploitation
evilginx Man-in-the-middle attack framework used for phishing login credentials social
evilgrade Modular framework that takes advantage of poor upgrade implementations by injecting fake updates misc
evilize Tool to create MD colliding binaries cracker
evillimiter Tool that limits bandwidth of devices on the same network without access networking
evilmaid TrueCrypt loader backdoor to sniff volume password cracker
evilpdf Embedding executable files in PDF Documents backdoor
evine Interactive CLI Web Crawler webapp
evtkit Fix acquired evt - Windows Event Log files (Forensics) forensic
exabgp The BGP swiss army knife of networking networking
exe2image A simple utility to convert EXE files to JPEG images and vice versa backdoor
exescan A tool to detect anomalies in PE (Portable Executable) files binary
exitmap A fast and modular scanner for Tor exit relays recon
expimp-lookup Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree binary
exploit-db The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks exploitation
exploitdb Offensive Security’s Exploit Database Archive exploitation
exploitpack Exploit Pack - The next generation exploit framework exploitation
expose A Dynamic Symbolic Execution (DSE) engine for JavaScript binary
exrex Irregular methods on regular expressions misc
extended-ssrf-search Smart ssrf scanner using different methods like parameter brute forcing in post and get webapp
extracthosts Extracts hosts (IP/Hostnames) from files misc
extractusnjrnl Tool to extract the $UsnJrnl from an NTFS volume forensic
eyeballer Convolutional neural network for analyzing pentest screenshots misc
eyepwn Exploit for Eye-Fi Helper directory traversal vulnerability exploitation
eyewitness Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible webapp
f-scrack A single file bruteforcer supports multi-protocol cracker
facebash Facebook Brute Forcer in shellscript using TOR social
facebookosint OSINT tool to replace facebook graph search social
facebot A facebook profile and reconnaissance system recon
facebrok Social Engineering Tool Oriented to facebook social
facebrute This script tries to guess passwords for a given facebook account using a list of passwords (dictionary) cracker
factordb-pycli CLI for factordb and Python API Client crypto
fakeap Black Alchemy's Fake AP generates thousands of counterfeit b access points Hide in plain sight amongst Fake AP's cacophony of beacon frames honeypot
fakedns A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses proxy
fakemail Fake mail server that captures e-mails as files for acceptance testing misc
fakenet-ng Next Generation Dynamic Network Analysis Tool malware
fakenetbios A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN spoof
fang A multi service threaded MD cracker cracker
faradaysec Collaborative Penetration Test and Vulnerability Management Platform scanner
fastnetmon High performance DoS/DDoS load analyzer built on top of multiple packet capture engines defensive
fav-up IP lookup by favicon using Shodan recon
favfreak Weaponizing faviconico for BugBounties , OSINT and what not recon
fbht A Facebook Hacking Tool webapp
fbi An accurate facebook account information gathering social
fbid Show info about the author by facebook photo url recon
fcrackzip Zip file password cracker cracker
fdsploit A File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool webapp
featherduster An automated, modular cryptanalysis tool crypto
fern-wifi-cracker WEP, WPA wifi cracker for wireless penetration testing wireless
fernflower An analytical decompiler for Java decompiler
fernmelder Asynchronous mass DNS scanner scanner
feroxbuster A fast, simple, recursive content discovery tool written in Rust webapp
ffm A hacking harness that you can use during the post-exploitation phase of a red-teaming engagement exploitation
ffuf Fast web fuzzer written in Go webapp
ffuf-scripts Scripts and snippets for ffuf payloads misc
fgscanner An advanced, opensource URL scanner scanner
fhttp This is a framework for HTTP related attacks It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more webapp
fi6s IPv network scanner designed to be fast scanner
fierce A DNS reconnaissance tool for locating non-contiguous IP space recon
fiked Fake IDE daemon honeypot
filebuster An extremely fast and flexible web fuzzer webapp
filefuzz A binary file fuzzer for Windows with several options windows
filegps A tool that help you to guess how your shell was renamed after the server-side script of the file uploader saved it webapp
fileintel A modular Python application to pull intelligence about malicious files malware
filibuster A Egress filter mapping application with additional functionality networking
fimap A little tool for local and remote file inclusion auditing and exploitation exploitation
finalrecon OSINT Tool for All-In-One Web Reconnaissance recon
find-dns A tool that scans networks looking for DNS servers scanner
find3 High-precision indoor positioning framework misc
findmyhash Crack different types of hashes using free online services crypto
findmyiphone Locates all devices associated with an iCloud account mobile
findomain The fastest and cross-platform subdomain enumerator, do not waste your time recon
findsploit Find exploits in local and online databases instantly automation
fingerprinter CMS/LMS/Library etc Versions Fingerprinter webapp
firecat A penetration testing tool that allows you to punch reverse TCP tunnels out of a compromised network networking
firefox-decrypt Extract passwords from Mozilla Firefox, Waterfox, Thunderbird, SeaMonkey profiles forensic
firefox-security-toolkit A tool that transforms Firefox browsers into a penetration testing suite misc
firewalk An active reconnaissance network security tool fuzzer
firmwalker Script for searching the extracted firmware file system for goodies firmware
firmware-mod-kit Modify firmware images without recompiling firmware
firstexecution A Collection of different ways to execute code outside of the expected entry points exploitation
firstorder A traffic analyzer to evade Empire communication from Anomaly-Based IDS sniffer
fl0p A passive L flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks fingerprint
flare Flare processes an SWF and extracts all scripts from it misc
flare-floss Obfuscated String Solver - Automatically extract obfuscated strings from malware malware
flashlight Automated Information Gathering Tool for Penetration Testers recon
flashscanner Flash XSS Scanner scanner
flashsploit Exploitation Framework for ATtiny Based HID Attacks exploitation
flask-session-cookie-manager2 Decode and encode Flask session cookie webapp
flask-session-cookie-manager3 Decode and encode Flask session cookie webapp
flasm Disassembler tool for SWF bytecode reversing
flawfinder Searches through source code for potential security flaws code-audit
flowinspect A network traffic inspection tool networking
flunym0us A Vulnerability Scanner for Wordpress and Moodle scanner
fluxion A security auditing and social-engineering research tool social
flyr Block-based software vulnerability fuzzing framework fuzzer
fockcache Tool to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on web pages webapp
forager Multithreaded threat Intelligence gathering utilizing recon
foremost A console program to recover files based on their headers, footers, and internal data structures forensic
foresight A tool for predicting the output of random number generators crypto
forkingportscanner Simple and fast forking port scanner written in perl Can only scan on host at a time, the forking is done on the specified port range Or on the default range of Has the ability to scan UDP or TCP, defaults to tcp scanner
formatstringexploiter Helper script for working with format string bugs exploitation
fortiscan A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool scanner
fpdns Program that remotely determines DNS server versions fingerprint
fping Utility to ping multiple hosts at once networking
fport Identify unknown open ports and their associated applications windows
fprotlogparser This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection malware
fraud-bridge ICMP and DNS tunneling via IPv and IPv tunnel
fred Cross-platform M$ registry hive editor windows
freeipmi IPMI remote console and system management software networking
freeradius The premier open source RADIUS server wireless
freewifi How to get free wifi wireless
frida Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers reversing
frida-extract Fridare based RunPE (and MapViewOfSection) extraction tool reversing
frida-ios-dump Pull decrypted ipa from jailbreak device mobile
fridump A universal memory dumper using Frida forensic
frisbeelite A GUI-based USB device fuzzer fuzzer
fs-exploit Format string exploit generation exploitation
fs-nyarl A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit scanner
fscan A Security Auditing Tool scanner
fsnoop A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism Its primary purpose is to help detecting file race condition vulnerabilities and since version , to exploit them with loadable DSO modules (also called "payload modules" or "paymods") scanner
fssb A low-level filesystem sandbox for Linux using syscall intercepts defensive
fstealer Automates file system mirroring through remote file disclosure vulnerabilities on Linux machines automation
ftester A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities fuzzer
ftp-fuzz The master of all master fuzzing scripts specifically targeted towards FTP server software fuzzer
ftp-scanner Multithreaded ftp scanner/brute forcer Tested on Linux, OpenBSD and Solaris cracker
ftp-spider FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository scanner
ftpmap Scans remote FTP servers to identify what software and what versions they are running fingerprint
ftpscout Scans ftps for anonymous access scanner
fuddly Fuzzing and Data Manipulation Framework (for GNU/Linux) fuzzer
fusil A Python library used to write fuzzing programs fuzzer
fuxploider Tool that automates the process of detecting and exploiting file upload forms flaws webapp
fuzzap A python script for obfuscating wireless networks wireless
fuzzball2 A little fuzzer for TCP and IP options It sends a bunch of more or less bogus packets to the host of your choice fuzzer
fuzzbunch NSA Exploit framework exploitation
fuzzdb Attack and Discovery Pattern Dictionary for Application Fault Injection Testing fuzzer
fuzzdiff A simple tool designed to help out with crash analysis during fuzz testing It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes fuzzer
fuzzowski A Network Protocol Fuzzer made by NCCGroup based on Sulley and BooFuzz fuzzer
fuzztalk An XML driven fuzz testing framework that emphasizes easy extensibility and reusability windows
g72x++ Decoder for the gx++ codec wireless
gadgetinspector A byte code analyzer for finding deserialization gadget chains in Java applications decompiler
gadgettojscript NET serialized gadgets that can trigger NET assembly from JS/VBS/VBA based scripts exploitation
galleta Examine the contents of the IE's cookie files for forensic purposes forensic
gasmask All in one Information gathering tool - OSINT recon
gatecrasher Network auditing and analysis tool developed in Python recon
gau Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl webapp
gcat A fully featured backdoor that uses Gmail as a C&C server malware
gcpbucketbrute A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated scanner
gcrypt Simple, secure and performance file encryption tool written in C crypto
gdb The GNU Debugger debugger
gdb-common The GNU Debugger debugger
gdbgui Browser-based gdb frontend using Flask and JavaScript to visually debug C, C++, Go, or Rust debugger
gene Signature Engine for Windows Event Logs windows
genisys Powerful Telegram Members Scraping and Adding Toolkit social
genlist Generates lists of IP addresses misc
geoedge This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool) recon
geoip Non-DNS IP-to-country resolver C library & utils networking
geoipgen GeoIPgen is a country to IP addresses generator misc
gerix-wifi-cracker A graphical user interface for aircrack-ng and pyrit wireless
gethsploit Finding Ethereum nodes which are vulnerable to RPC-attacks scanner
getsids Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener Like doing ‘lsnrctl service’ database
getsploit Command line utility for searching and downloading exploits exploitation
gf A wrapper around grep, to help you grep for things misc
gg-images The application was created to allow anyone to easily download profile pictures from GG social
gggooglescan A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames scanner
gh-dork Github dorking tool recon
ghauri An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws webapp
ghettotooth Ghettodriving for bluetooth bluetooth
ghidra Software reverse engineering framework reversing
ghost-phisher GUI suite for phishing and penetration attacks scanner
ghost-py Webkit based webclient (relies on PyQT) webapp
ghostdelivery Python script to generate obfuscated vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions exploitation
gibberish-detector Train a model and detect gibberish strings with it misc
girsh Automatically spawn a reverse shell fully interactive for Linux or Windows victim networking
giskismet A program to visually represent the Kismet data in a flexible manner wireless
git-dump Dump the contents of a remote git repository without directory listing enabled scanner
git-dumper A tool to dump a git repository from a website scanner
git-hound Pinpoints exposed API keys on GitHub A batch-catching, pattern-matching, patch-attacking secret snatcher recon
git-wild-hunt A tool to hunt for credentials in github wild AKA git*hunt recon
gitdorker Python program to scrape secrets from GitHub through usage of a large repository of dorks recon
gitdump A pentesting tool that dumps the source code from git even when the directory traversal is disabled webapp
gitem A Github organization reconnaissance tool recon
gitgraber Monitor GitHub to search and find sensitive data in real time for different online services recon
githack A `git` folder disclosure exploit recon
github-dorks Collection of github dorks and helper tool to automate the process of checking dorks recon
githubcloner A script that clones Github repositories of users and organizations automatically misc
gitleaks Audit Git repos for secrets and keys recon
gitmails An information gathering tool to collect git commit emails in version control host services recon
gitminer Tool for advanced mining for content on Github recon
gitrecon OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits recon
gitrob Reconnaissance tool for GitHub organizations scanner
gittools A repository with tools for pwn'ing websites with git repositories available' webapp
gloom Linux Penetration Testing Framework scanner
glue A framework for running a series of tools automation
gmsadumper A tool that Reads any gMSA password blobs the user can access and parses the values misc
gnuradio General purpose DSP and SDR toolkit With drivers for usrp and fcd wireless
gnutls2 A library which provides a secure layer over a reliable transport layer (Version ) crypto
gobd A Golang covert backdoor backdoor
gobuster Directory/file & DNS busting tool written in Go webapp
gocabrito Super organized and flexible script for sending phishing campaigns social
goddi Dumps Active Directory domain information recon
goldeneye A HTTP DoS test tool Attack Vector exploited: HTTP Keep Alive + NoCache dos
golismero Opensource web security testing framework webapp
gomapenum User enumeration and password bruteforce on Azure, ADFS, OWA, O, Teams and gather emails on Linkedin cracker
goodork A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line recon
goofile Command line filetype search recon
goog-mail Enumerate domain emails from google recon
google-explorer Google mass exploit robot - Make a google search, and parse the results for a especific exploit you define automation
googlesub A python script to find domains by using google dorks recon
goohak Automatically Launch Google Hacking Queries Against A Target Domain recon
goop Perform google searches without being blocked by the CAPTCHA or hitting any rate limits recon
gooscan A tool that automates queries against Google search appliances, but with a twist automation
gopherus Tool generates gopher link for exploiting SSRF and gaining RCE in various servers webapp
gophish Open-Source Phishing Framework social
gosint OSINT framework in Go recon
gospider Fast web spider written in Go webapp
gostringsr2 Extract strings from a Go binary using radare reversing
gowitness A golang, web screenshot utility using Chrome Headless webapp
gplist Lists information about the applied Group Policies windows
gpocrack Active Directory Group Policy Preferences cpassword cracker/decrypter cracker
gpredict A real-time satellite tracking and orbit prediction application radio
gps-sdr-sim Software-Defined GPS Signal Simulator radio
gqrx Interactive SDR receiver waterfall for many devices wireless
gr-air-modes Gnuradio tools for receiving Mode S transponder signals, including ADS-B radio
gr-gsm Gnuradio blocks and tools for receiving GSM transmissions radio
gr-paint An OFDM Spectrum Painter for GNU Radio radio
grabbb Clean, functional, and fast banner scanner scanner
grabber A web application scanner Basically it detects some kind of vulnerabilities in your website webapp
grabing Counts all the hostnames for an IP adress recon
grabitall Performs traffic redirection by sending spoofed ARP replies windows
graffiti A tool to generate obfuscated one liners to aid in penetration testing misc
grammarinator A random test generator / fuzzer that creates test cases according to an input ANTLR v grammar fuzzer
graphinder GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce recon
graphql-cop GraphQL vulnerability scanner scanner
graphql-path-enum Tool that lists the different ways of reaching a given type in a GraphQL schema webapp
graphqlmap Scripting engine to interact with a graphql endpoint for pentesting purposes webapp
graphw00f GraphQL endpoint detection and engine fingerprinting webapp
graudit Grep rough source code auditing tool code-audit
grepforrfi Simple script for parsing web logs for RFIs and Webshells v scanner
grokevt A collection of scripts built for reading Windows® NT/K/XP/K eventlog files forensic
grr High-throughput fuzzer and emulator of DECREE binaries fuzzer
grype A vulnerability scanner for container images and filesystems scanner
gsd Gives you the Discretionary Access Control List of any Windows NT service you specify as a command line option windows
gsocket Global Socket moving data from here to there securely, fast and trough NAT/Firewalls networking
gspoof A simple GTK/command line TCP/IP packet generator networking
gtalk-decode Google Talk decoder tool that demonstrates recovering passwords from accounts windows
gtfo Search gtfobins and lolbas files from your terminal misc
gtfoblookup Offline command line lookup utility for GTFOBins and LOLBAS misc
gtp-scan A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts scanner
guymager A forensic imager for media acquisition forensic
gwcheck A simple program that checks if a host in an ethernet network is a gateway to Internet networking
gwtenum Enumeration of GWT-RCP method calls recon
h2buster A threaded, recursive, web directory brute-force scanner over HTTP/ scanner
h2csmuggler HTTP Request Smuggling over HTTP/ Cleartext (hc) webapp
h2spec A conformance testing tool for HTTP/ implementation misc
h2t Scans a website and suggests security headers to apply webapp
h8mail Email OSINT and password breach hunting recon
habu Python Network Hacking Toolkit scanner
hackersh A shell for with Pythonect-like syntax, including wrappers for commonly used security tools automation
hackredis A simple tool to scan and exploit redis servers exploitation
hackrf Driver for HackRF, allowing general purpose software defined radio (SDR) radio
haiti Hash type identifier (CLI & lib) crypto
haka A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files networking
hakku Simple framework that has been made for penetration testing tools scanner
hakrawler Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application webapp
hakrevdns Small, fast tool for performing reverse DNS lookups en masse recon
halberd Halberd discovers HTTP load balancers It is useful for web application security auditing and for load balancer configuration testing scanner
halcyon A repository crawler that runs checksums for static files found within a given git repository recon
halcyon-ide First IDE for Nmap Script (NSE) Development misc
hamster Tool for HTTP session sidejacking exploitation
handle An small application designed to analyze your system searching for global objects related to running process and display information for every found object, like tokens, semaphores, ports, files, windows
harness Interactive remote PowerShell Payload backdoor
harpoon CLI tool for open source and threat intelligence automation
hasere Discover the vhosts using google and bing recon
hash-buster A python script which scraps online hash crackers to find cleartext of a hash crypto
hash-extender A hash length extension attack tool crypto
hash-identifier Software to identify the different types of hashes used to encrypt data and especially passwords crypto
hashcat Multithreaded advanced password recovery utility cracker
hashcat-utils Set of small utilities that are useful in advanced password cracking misc
hashcatch Capture handshakes of nearby WiFi networks automatically wireless
hashcheck Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method crypto
hashdb A block hash toolkit crypto
hashdeep cross-platform tools to message digests for any number of files crypto
hasher A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally cracker
hashfind A tool to search files for matching password hash types and other interesting data crypto
hashid Software to identify the different types of hashes used to encrypt data crypto
hashpump A tool to exploit the hash length extension attack in various hashing algorithms crypto
hashtag A python script written to parse and identify password hashes cracker
hatcloud Bypass CloudFlare with Ruby recon
hate-crack A tool for automating cracking methodologies through Hashcat automation
haystack A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics binary
hbad This tool allows you to test clients on the heartbleed bug scanner
hcraft HTTP Vuln Request Crafter exploitation
hcxdumptool Small tool to capture packets from wlan devices wireless
hcxkeys Set of tools to generate plainmasterkeys (rainbowtables) and hashes for hashcat and John the Ripper crypto
hcxtools Portable solution for capturing wlan traffic and conversion to hashcat and John the Ripper formats wireless
hdcp-genkey Generate HDCP source and sink keys from the leaked master key crypto
hdmi-sniff HDMI DDC (IC) inspection tool It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices hardware
heaptrace Helps visualize heap operations for pwn and debugging debugger
heartbleed-honeypot Script that listens on TCP port and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's honeypot
heartleech Scans for systems vulnerable to the heartbleed bug, and then download them exploitation
hellraiser Vulnerability Scanner scanner
hemingway A simple and easy to use spear phishing helper social
hercules-payload A special payload generator that can bypass all antivirus software binary
hetty HTTP toolkit for security research Aims to become an open source alternative to commercial software like Burp Suite Pro webapp
hexbin Converts Motorola and Intel hex files to binary binary
hexinject A very versatile packet injector and sniffer that provides a command-line framework for raw network access sniffer
hexorbase A database application designed for administering and auditing multiple database servers simultaneously from a centralized location It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL) fuzzer
hexyl Colored command-line hex viewer misc
hharp This tool can perform man-in-the-middle and switch flooding attacks It has major functions, of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method networking
hidattack HID Attack (attacking HID host implementations) bluetooth
hiddeneye Modern phishing tool with advanced functionality social
hiddeneye-legacy Modern Phishing Tool With Advanced Functionality social
hikpwn A simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python scanner
hlextend Pure Python hash length extension module crypto
hodor A general-use fuzzer that can be configured to use known-good input and delimiters in order to fuzz specific locations fuzzer
holehe A tool for Efficiently finding registered accounts from emails social
hollows-hunter Scans all running processes Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches) windows
homepwn Swiss Army Knife for Pentesting of IoT Devices scanner
honeycreds Network credential injection to detect responder and other network poisoners defensive
honeyd A small daemon that creates virtual hosts on a network honeypot
honeypy A low interaction Honeypot honeypot
honggfuzz A general-purpose fuzzer with simple, command-line interface fuzzer
honssh A high-interaction Honey Pot solution designed to log all SSH communications between a client and server honeypot
hookanalyser A hook tool which can be potentially helpful in reversing applications and analyzing malware It can hook to an API in a process and search for a pattern in memory or dump the buffer windows
hookshot Integrated web scraper and email account data breach comparison tool webapp
hoover Wireless Probe Requests Sniffer wireless
hoper Trace URL's jumps across the rel links to obtain the last URL recon
hopper Reverse engineering tool that lets you disassemble, decompile and debug your applications reversing
hoppy A python script which tests http methods for configuration issues leaking information or just to see if they are enabled scanner
host-extract Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL scanner
hostapd-wpe Modified hostapd to facilitate AP impersonation attacks wireless
hostbox-ssh A ssh password/account scanner cracker
hosthunter A recon tool for discovering hostnames using OSINT techniques recon
hotpatch Hot patches executables on Linux using so file injection backdoor
hotspotter Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names wireless
howmanypeoplearearound Count the number of people around you by monitoring wifi signals recon
hpfeeds Honeynet Project generic authenticated datafeed protocol honeypot
hping A command-line oriented TCP/IP packet assembler/analyzer networking
hqlmap A tool to exploit HQL Injections exploitation
hsecscan A security scanner for HTTP response headers scanner
htcap A web application analysis tool for detecting communications between javascript and the server webapp
htexploit A Python script that exploits a weakness in the way that htaccess files can be configured to protect a web directory with an authentication process exploitation
htpwdscan A python HTTP weak pass scanner cracker
htrosbif Active HTTP server fingerprinting and recon tool fingerprint
htshells Self contained web shells and other attacks via htaccess files exploitation
http-enum A tool to enumerate the enabled HTTP methods supported on a webserver scanner
http-fuzz A simple http fuzzer fuzzer
http-put Simple http put perl script misc
http-traceroute This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality networking
http2smugl HttpSmugl - Tool to detect and exploit HTTP request smuggling in cases it can be achieved via HTTP/ -> HTTP/ conversion webapp
httpbog A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses windows
httpforge A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages These tools can be used to test, discover, and assert the security of Web servers, apps, and sites An accompanying Python library is available for extensions webapp
httpgrep A python tool which scans for HTTP servers and finds given strings in HTTP body and HTTP response headers webapp
httping A ping-like tool for http-requests networking
httppwnly "Repeater" style XSS post-exploitation tool for mass browser control webapp
httprecon Tool for web server fingerprinting, also known as http fingerprinting windows
httprint A web server fingerprinting tool fingerprint
httprint-win32 A web server fingerprinting tool (Windows binaries) windows
httprobe Take a list of domains and probe for working HTTP and HTTPS servers scanner
httpry A specialized packet sniffer designed for displaying and logging HTTP traffic sniffer
httpscreenshot A tool for grabbing screenshots and HTML of large numbers of websites misc
httpsniff Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review sniffer
httpsscanner A tool to test the strength of a SSL web server scanner
httptunnel Creates a bidirectional virtual data connection tunnelled in HTTP requests tunnel
httpx A fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library webapp
httrack An easy-to-use offline browser utility misc
hubbit-sniffer Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api sniffer
hulk A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features dos
hungry-interceptor Intercepts data, does something with it, stores it sniffer
hurl Hexadecimal & URL (en/de)coder misc
hwk Collection of packet crafting and wireless network flooding tools dos
hxd Freeware Hex Editor and Disk Editor misc
hyde Just another tool in C to do DDoS (with spoofing) networking
hydra Very fast network logon cracker which support many different services cracker
hyenae Flexible platform independent packet generator networking
hyperfox A security tool for proxying and recording HTTP and HTTPs traffic networking
hyperion-crypter A runtime encrypter for -bit and -bit portable executables windows
i2pd A full-featured C++ implementation of the IP router networking
iaito Qt and C++ GUI for radare reverse engineering framework reversing
iaxflood IAX flooder dos
iaxscan A Python based scanner for detecting live IAX/ hosts and then enumerating (by bruteforce) users on those hosts scanner
ibrute An AppleID password bruteforce tool It uses Find My Iphone service API, where bruteforce protection was not implemented cracker
icloudbrutter Tool for AppleID Bruteforce cracker
icmpquery Send and receive ICMP queries for address mask and current time scanner
icmpsh Simple reverse ICMP shell backdoor
icmptx IP over ICMP tunnel tunnel
id-entify Search for information related to a domain: Emails - IP addresses - Domains - Information on WEB technology - Type of Firewall - NS and MX records recon
idb A tool to simplify some common tasks for iOS pentesting and research mobile
identywaf Blind WAF identification tool webapp
idswakeup A collection of tools that allows to test network intrusion detection systems recon
ifchk A network interface promiscuous mode detection tool defensive
ifuzz A binary file fuzzer with several options fuzzer
iheartxor A tool for bruteforcing encoded strings within a boundary defined by a regular expression It will bruteforce the key value range of x through x cracker
iis-shortname-scanner An IIS shortname Scanner scanner
iisbruteforcer HTTP authentication cracker It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server cracker
ike-scan A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers scanner
ikecrack An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication cracker
ikeforce A command line IPSEC VPN brute forcing tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities cracker
ikeprobe Determine vulnerabilities in the PSK implementation of the VPN server windows
ikeprober Tool crafting IKE initiator packets and allowing many options to be manually set Useful to find overflows, error conditions and identifiyng vendors fuzzer
ilo4-toolbox Toolbox for HPE iLO analysis scanner
ilty An interception phone system for VoIP network voip
imagegrep Grep word in pdf or image based on OCR misc
imagejs Small tool to package javascript into a valid image file binary
imagemounter Command line utility and Python package to ease the (un)mounting of forensic disk images forensic
imhex A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at AM misc
impacket Collection of classes for working with network protocols networking
impulse Modern Denial-of-service ToolKit dos
inception A FireWire physical memory manipulation and hacking tool exploiting IEEE SBP DMA exploitation
indx2csv An advanced parser for INDX records forensic
indxcarver Carve INDX records from a chunk of data forensic
indxparse A Tool suite for inspecting NTFS artifacts forensic
inetsim A software suite for simulating common internet services in a lab environment, eg for analyzing the network behaviour of unknown malware samples defensive
infection-monkey Automated security testing tool for networks networking
infip A python script that checks output from netstat against RBLs from Spamhaus scanner
infoga Tool for gathering e-mail accounts information from different public sources (search engines, pgp key servers) recon
inguma A free penetration testing and vulnerability discovery toolkit entirely written in python Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler cracker
injectus CRLF and open redirect fuzzer webapp
innounp Inno Setup Unpacker reversing
inquisitor OSINT Gathering Tool for Companies and Organizations recon
insanity Generate Payloads and Control Remote Machines exploitation
instagramosint An Instagram Open Source Intelligence Tool social
instashell Multi-threaded Instagram Brute Forcer without password limit cracker
intelmq A tool for collecting and processing security feeds using a message queuing protocol misc
intelplot OSINT Tool to Mark Points on Offline Map recon
intensio-obfuscator Obfuscate a python code and misc
interactsh-client Open-Source Solution for Out of band Data Extraction webapp
intercepter-ng A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc windows
interlace Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support networking
interrogate A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage forensic
intersect Post-exploitation framework automation
intrace Traceroute-like application piggybacking on existing TCP connections recon
inundator An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack misc
inurlbr Advanced search in the search engines - Inurl scanner, dorker, exploiter scanner
inviteflood Flood a device with INVITE requests dos
invoke-cradlecrafter PowerShell Remote Download Cradle Generator & Obfuscator automation
invoke-dosfuscation Cmdexe Command Obfuscation Generator & Detection Test Harness automation
invoke-obfuscation PowerShell Obfuscator automation
inzider This is a tool that lists processes in your Windows system and the ports each one listen on windows
iodine Tunnel IPv data through a DNS server tunnel
iosforensic iOS forensic tool https://wwwowasporg/indexphp/Projects/OWASP_iOSForensic forensic
ip-https-tools Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol tunnel
ip-tracer Track and retrieve any ip address information recon
ip2clue A small memory/CPU footprint daemon to lookup country (and other info) based on IP (v and v) recon
ipaudit Monitors network activity on a network networking
ipba2 IOS Backup Analyzer forensic
ipcountry Fetches IPv ranges of given country in host and cidr format misc
ipdecap Can decapsulate traffic encapsulated within GRE, IPIP, in, ESP (ipsec) protocols, and can also remove IEEE Q (virtual lan) header networking
iphoneanalyzer Allows you to forensically examine or recover date from in iOS device forensic
ipmipwn IPMI cipher attack tool cracker
ipmitool Command-line interface to IPMI-enabled devices networking
ipobfuscator A simple tool to convert the IP to a DWORD IP misc
ipscan A very fast IP address and port scanner scanner
ipsourcebypass This Python script can be used to bypass IP source restrictions using HTTP headers webapp
iptodomain This tool extract domains from IP address based in the information saved in virustotal recon
iptv Search and brute force illegal iptv server scanner
iputils Network monitoring tools, including ping networking
ipv4bypass Using IPv to Bypass Security networking
ipv666 Golang IPv address enumeration recon
ipv6toolkit SI Networks' IPv Toolkit scanner
ircsnapshot Tool to gather information from IRC servers recon
irpas Internetwork Routing Protocol Attack Suite exploitation
isf An exploitation framework based on Python exploitation
isip Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks voip
isme Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN voip
isr-form Simple html parsing tool that extracts all form related information and generates reports of the data Allows for quick analyzing of data recon
issniff Internet Session Sniffer sniffer
ivre Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, recon
ivre-docs Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (documentation) recon
ivre-web Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (web application) recon
ja3 Standard for creating SSL client fingerprints in an easy to produce and shareable way crypto
jaadas Joint Advanced Defect assEsment for android applications scanner
jackdaw Collect all information in your domain, show you graphs on how domain objects interact with each-other and how to exploit these interactions recon
jad Java decompiler reversing
jadx Command line and GUI tools to produce Java source code from Android Dex and APK files decompiler
jaeles The Swiss Army knife for automated Web Application Testing webapp
jaidam Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan webapp
jast Just Another Screenshot Tool webapp
javasnoop A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer reversing
jboss-autopwn A JBoss script for obtaining remote shell access exploitation
jbrofuzz Web application protocol fuzzer that emerged from the needs of penetration testing fuzzer
jbrute Open Source Security tool to audit hashed passwords cracker
jcrack A utility to create dictionary files that will crack the default passwords of select wireless gateways wireless
jd-cli Command line Java Decompiler decompiler
jd-gui A standalone graphical utility that displays Java source codes of class files decompiler
jdeserialize A library that interprets Java serialized objects It also comes with a command-line tool that can generate compilable class declarations, extract block data, and print textual representations of instance values webapp
jeangrey A tool to perform differential fault analysis attacks (DFA) cracker
jeb-android Android decompiler reversing
jeb-arm Arm decompiler reversing
jeb-intel Intel decompiler reversing
jeb-mips Mips decompiler reversing
jeb-webasm WebAssembly decompiler reversing
jeopardize A low(zero) cost threat intelligence & response tool against phishing domains defensive
jexboss Jboss verify and Exploitation Tool webapp
jhead EXIF JPEG info parser and thumbnail remover defensive
jira-scan A simple remote scanner for Atlassian Jira webapp
jndi-injection-exploit A tool which generates JNDI links can start several servers to exploit JNDI Injection vulnerability, like Jackson, Fastjson, etc exploitation
jnetmap A network monitor of sorts networking
john John the Ripper password cracker cracker
johnny GUI for John the Ripper cracker
jok3r Network and Web Pentest Framework webapp
jomplug This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components webapp
jondo Redirects internet traffic trough a mix of proxy servers to hide the origin of the requests proxy
jooforce A Joomla password brute force tester webapp
joomlascan Joomla scanner scans for known vulnerable remote file inclusion paths and files webapp
joomlavs A black box, Ruby powered, Joomla vulnerability scanner webapp
joomscan Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site webapp
jpegdump Tool to analyzse JPEG images Reads binary files and parses the JPEG markers inside them binary
jpexs-decompiler JPEXS Free Flash Decompiler decompiler
jsearch Simple script that grep infos from javascript files recon
jsfuck Write any JavaScript with Characters: []()!+ misc
jshell Get a JavaScript shell with XSS webapp
jsonbee A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) webapp
jsparser Parse javascript using Tornado and JSBeautifier to discover interesting enpoints webapp
jsql-injection A Java application for automatic SQL database injection webapp
jstillery Advanced JavaScript Deobfuscation via Partial Evaluation webapp
juicy-potato A sugared version of RottenPotatoNG, with a bit of juice windows
junkie A modular packet sniffer and analyzer sniffer
justdecompile The decompilation engine of JustDecompile windows
juumla Python tool created to identify Joomla version, scan for vulnerabilities and search for config files webapp
jwscan Scanner for Jar to EXE wrapper like Launchj, Exej, JSmooth, JarExe reversing
jwt-cracker JWT brute force cracker written in C cracker
jwt-hack A tool for hacking / security testing to JWT webapp
jwt-key-recovery Recovers the public key used to sign JWT tokens crypto
jwt-tool Toolkit for validating, forging and cracking JWTs (JSON Web Tokens) cracker
jwtcat Script performs offline brute-force attacks against JSON Web Token (JWT) cracker
jynx2 An expansion of the original Jynx LD_PRELOAD rootkit backdoor
k55 Linux x_ Process Injection Utility backdoor
kacak Tools for penetration testers that can enumerate which users logged on windows system recon
kadimus LFI Scan & Exploit Tool webapp
kalibrate-rtl Fork of http://threat/kalibrate/ for use with rtl-sdr devices mobile
kamerka Build interactive map of cameras from Shodan recon
katana A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others) exploitation
katsnoop Utility that sniffs HTTP Basic Authentication information and prints the base decoded form sniffer
kautilya Pwnage with Human Interface Devices using Teensy++ and Teensy devices hardware
kcptun A Secure Tunnel Based On KCP with N:M Multiplexing tunnel
keimpx Tool to verify the usefulness of credentials across a network over SMB cracker
kekeo A little toolbox to play with Microsoft Kerberos in C windows
kerbcrack Kerberos sniffer and cracker for Windows windows
kerberoast Kerberoast attack -pure python- exploitation
kerbrute A tool to perform Kerberos pre-auth bruteforcing cracker
kernelpop Kernel privilege escalation enumeration and exploitation framework exploitation
keye Recon tool detecting changes of websites based on content-length differences recon
khc A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents cracker
kickthemout Kick devices off your network by performing an ARP Spoof attack networking
killcast Manipulate Chromecast Devices in your Network exploitation
killerbee Framework and tools for exploiting ZigBee and IEEE networks exploitation
kimi Script to generate malicious debian packages (debain trojans) backdoor
kippo A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker honeypot
kismet layer wireless network detector, sniffer, and intrusion detection system wireless
kismet-earth Various scripts to convert kismet logs to kml file to be used in Google Earth wireless
kismet2earth A set of utilities that convert from Kismet logs to Google Earth kml format wireless
kismon GUI client for kismet (wireless scanner/sniffer/monitor) wireless
kiterunner Contextual Content Discovery Tool webapp
kitty-framework Fuzzing framework written in python fuzzer
klar Integration of Clair and Docker Registry exploitation
klee A symbolic virtual machine built on top of the LLVM compiler infrastructure binary
klogger A keystroke logger for the NT-series of Windows windows
knock Subdomain scanner scanner
knxmap KNXnet/IP scanning and auditing tool for KNX home automation installations scanner
koadic A Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire automation
kolkata A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion webapp
konan Advanced Web Application Dir Scanner webapp
kraken A project to encrypt A/ GSM signaling using a Time/Memory Tradeoff Attack crypto
krbrelayx Kerberos unconstrained delegation abuse toolkit scanner
kube-hunter Hunt for security weaknesses in Kubernetes clusters scanner
kubesploit Cross-platform post-exploitation HTTP/ Command & Control server scanner
kubestriker A Blazing fast Security Auditing tool for Kubernetes scanner
kubolt Utility for scanning public kubernetes clusters webapp
kwetza Python script to inject existing Android applications with a Meterpreter payload backdoor
l0l The Exploit Development Kit exploitation
laf Login Area Finder: scans host/s for login panels scanner
lanmap2 Passive network mapping tool recon
lans A Multithreaded asynchronous packet parsing/injecting arp spoofer spoof
latd A LAT terminal daemon for Linux and BSD networking
laudanum A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments misc
lazagne An open source application used to retrieve lots of passwords stored on a local computer forensic
lazydroid Tool written as a bash script to facilitate some aspects of an Android Assessment mobile
lbd Load Balancing detector, recon
lbmap Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia fingerprint
ld-shatner ld-linux code injector backdoor
ldap-brute A semi fast tool to bruteforce values of LDAP injections over HTTP cracker
ldapdomaindump Active Directory information dumper via LDAP scanner
ldapenum Enumerate domain controllers using LDAP recon
ldapscripts Simple shell scripts to handle POSIX entries in an LDAP directory automation
ldeep In-depth ldap enumeration utility recon
ldsview Offline search tool for LDAP directory dumps in LDIF format forensic
leaklooker Find open databases with Shodan scanner
leena Symbolic execution engine for JavaScript binary
legion Automatic Enumeration Tool based in Open Source tools recon
leo Literate programmer's editor, outliner, and project manager misc
leroy-jenkins A python tool that will allow remote execution of commands on a Jenkins server and its nodes exploitation
lethalhta Lateral Movement technique using DCOM and HTA windows
letmefuckit-scanner Scanner and Exploit Magento scanner
leviathan A mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities scanner
levye A brute force tool which is support sshkey, vnckey, rdp, openvpn cracker
lfi-autopwn A Perl script to try to gain code execution on a remote server via LFI exploitation
lfi-exploiter This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability webapp
lfi-fuzzploit A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications webapp
lfi-image-helper A simple script to infect images with PHP Backdoors for local file inclusion attacks webapp
lfi-scanner This is a simple perl script that enumerates local file inclusion attempts when given a specific target scanner
lfi-sploiter This tool helps you exploit LFI (Local File Inclusion) vulnerabilities Post discovery, simply pass the affected URL and vulnerable parameter to this tool You can also use this tool to scan a URL for LFI vulnerabilities webapp
lfifreak A unique automated LFi Exploiter with Bind/Reverse Shells webapp
lfimap Local file inclusion discovery and exploitation tool webapp
lfisuite Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner scanner
lfle Recover event log entries from an image by heurisitically looking for record structures forensic
lft A layer four traceroute implementing numerous other features recon
lhf A modular recon tool for pentesting recon
libbde A library to access the BitLocker Drive Encryption (BDE) format crypto
libc-database Database of libc offsets to simplify exploitation reversing
libdisasm A disassembler library disassembler
libfvde Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes forensic
libosmocore Collection of common code used in various sub-projects inside the Osmocom family of projects radio
libparistraceroute A library written in C dedicated to active network measurements with examples, such as paris-ping and paris-traceroute networking
libpst Outlook pst file converter misc
libtins High-level, multiplatform C++ network packet sniffing and crafting library networking
lief Library to Instrument Executable Formats disassembler
liffy A Local File Inclusion Exploitation tool webapp
lightbulb Python framework for auditing web applications firewalls webapp
ligolo-ng An advanced, yet simple, tunneling tool that uses a TUN interface tunnel
limeaide Remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local host forensic
limelighter A tool for generating fake code signing certificates or signing real ones exploitation
linenum Scripted Local Linux Enumeration & Privilege Escalation Checks scanner
linikatz Tool to attack AD on UNIX automation
linkedin2username OSINT Tool: Generate username lists for companies on LinkedIn social
linkfinder Discovers endpoint and their parameters in JavaScript files webapp
linset Evil Twin Attack Bash script - An automated WPA/WPA hacker automation
linux-exploit-suggester A Perl script that tries to suggest exploits based OS version number recon
linux-exploit-suggestersh Linux privilege escalation auditing tool recon
linux-inject Tool for injecting a shared object into a Linux process backdoor
linux-smart-enumeration Linux enumeration tool for pentesting and CTFs with verbosity levels scanner
lisapy An Exploit Dev Swiss Army Knife exploitation
list-urls Extracts links from webpage webapp
littleblackbox Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices scanner
littlebrother OSINT tool to get informations on French, Belgian and Swizerland people recon
lldb Next generation, high-performance debugger debugger
loadlibrary Porting Windows Dynamic Link Libraries to Linux binary
local-php-security-checker A command line tool that checks your PHP application packages with known security vulnerabilities code-audit
locasploit Local enumeration and exploitation framework scanner
lodowep Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system cracker
log-file-parser Parser for $LogFile on NTFS forensic
log4j-bypass Logj web app tester that includes WAF bypasses webapp
log4j-scan A fully automated, accurate, and extensive scanner for finding logj RCE CVE- webapp
logkeys A GNU/Linux keylogger that worked keylogger
logmepwn A fully automated, reliable, super-fast, mass scanning and validation toolkit for the LogJ RCE CVE- vulnerability scanner
loic An open source network stress tool for Windows networking
loki-scanner Simple IOC and Incident Response Scanner forensic
lolbas Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts) windows
loot Sensitive information extraction tool recon
lorcon Generic library for injecting frames wireless
lorg Apache Logfile Security Analyzer defensive
lorsrf Find the parameters that can be used to find SSRF or Out-of-band resource load webapp
lotophagi a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases scanner
lsrtunnel Spoofs connections using source routed packets spoof
lte-cell-scanner LTE SDR cell scanner optimized to work with very low performance RF front ends (bit A/D, dB noise figure) scanner
ltrace Tracks runtime library calls in dynamically linked programs binary
luksipc A tool to convert unencrypted block devices to encrypted LUKS devices in-place crypto
lulzbuster A very fast and smart web directory and file enumeration tool written in C webapp
lunar A UNIX security auditing tool based on several security frameworks scanner
luyten An Open Source Java Decompiler Gui for Procyon decompiler
lynis Security and system auditing tool to harden Unix/Linux systems scanner
lyricpass Tool to generate wordlists based on lyrics automation
m3-gen Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass, this tool intended for adversary simulation and red teaming purpose exploitation
mac-robber A digital investigation tool that collects data from allocated files in a mounted file system forensic
macchanger A small utility to change your NIC's MAC address networking
machinae A tool for collecting intelligence from public sites/feeds about various security-related pieces of data recon
maclookup Lookup MAC addresses in the IEEE MA-L/OUI public listing networking
magescan Scan a Magento site for information webapp
magicrescue Find and recover deleted files on block devices forensic
magictree A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation misc
maigret OSINT username checker Collect a dossier on a person by username from a huge number of sites social
mail-crawl Tool to harvest emails from website recon
mailsend-go A multi-platform command line tool to send mail via SMTP protocol spoof
make-pdf This tool will embed javascript inside a PDF document forensic
maketh A packet generator that supports forging ARP, IP, TCP, UDP, ICMP and the ethernet header as well networking
malboxes Builds malware analysis Windows VMs so that you don't have to malware
malcom Analyze a system's network communication using graphical representations of network traffic networking
malheur A tool for the automatic analyze of malware behavior forensic
malice VirusTotal Wanna Be - Now with % more Hipster defensive
maligno An open source penetration testing tool written in python, that serves Metasploit payloads It generates shellcode with msfvenom and transmits it over HTTP or HTTPS scanner
mallory HTTP/HTTPS proxy over SSH proxy
malmon Hosting exploit/backdoor detection daemon defensive
malscan A Simple PE File Heuristics Scanner malware
maltego An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc forensic
maltrail Malicious traffic detection system defensive
maltrieve Originated as a fork of mwcrawler It retrieves malware directly from the sources as listed at a number of sites malware
malware-check-tool Python script that detects malicious files via checking md hashes from an offline set or via the virustotal site It has http proxy support and an update feature malware
malwareanalyser A freeware tool to perform static and dynamic analysis on malware windows
malwaredetect Submits a file's SHA sum to VirusTotal to determine whether it is a known piece of malware forensic
malwasm Offline debugger for malware's reverse engineering reversing
malybuzz A Python tool focused in discovering programming faults in network software fuzzer
mana A toolkit for rogue access point (evilAP) attacks first presented at Defcon wireless
mandome Web Command Injection Tool webapp
manspider Spider entire networks for juicy files sitting on SMB shares Search filenames or file content - regex supported! scanner
manticore Symbolic execution tool binary
manul A coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS fuzzer
mara-framework A Mobile Application Reverse engineering and Analysis Framework mobile
marc4dasm This python-based tool is a disassembler for the Atmel MARC (a bit Harvard micro) disassembler
marshalsec Java Unmarshaller Security - Turning your data into code execution exploitation
maryam Full-featured Web Identification framework written in Python scanner
maskprocessor A High-Performance word generator with a per-position configurable charset automation
massbleed SSL Vulnerability Scanner recon
masscan TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under minutes scanner
masscan-automation Masscan integrated with Shodan API automation
massdns A high-performance DNS stub resolver in C networking
massexpconsole A collection of tools and exploits with a cli ui for mass exploitation automation
mat Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library defensive
mat2 Metadata removal tool, supporting a wide range of commonly used file formats defensive
matahari A reverse HTTP shell to execute commands on remote machines behind firewalls tunnel
matroschka Python steganography tool to hide images or text in images stego
mausezahn A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet dos
mbenum Queries the master browser for whatever information it has registered windows
mboxgrep A small, non-interactive utility that scans mail folders for messages matching regular expressions It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats forensic
mdbtools Utilities for viewing data and exporting schema from Microsoft Access Database files forensic
mdcrack MD/MD/NTLM hash cracker cracker
mdk3 WLAN penetration tool wireless
mdk4 A tool to exploit common IEEE protocol weaknesses wireless
mdns-recon An mDNS recon tool written in Python recon
meanalyzer Intel Engine Firmware Analysis Tool firmware
medusa Speedy, massively parallel and modular login brute-forcer for network cracker
meg Fetch many paths for many hosts - without killing the hosts webapp
melkor An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base) fuzzer
memdump Dumps system memory to stdout, skipping over holes in memory maps forensic
memfetch Dumps any userspace process memory without affecting its execution forensic
memimager Performs a memory dump using NtSystemDebugControl windows
mentalist Graphical tool for custom wordlist generation automation
merlin-server Merlin is a cross-platform post-exploitation HTTP/ Command & Control server and agent written in golang automation
metabigor Intelligence Tool but without API key recon
metacoretex MetaCoretex is an entirely JAVA vulnerability scanning framework for databases database
metafinder Search for documents in a domain through Search Engines (Google, Bing and Baidu) The objective is to extract metadata recon
metaforge Auto Scanning to SSL Vulnerability misc
metagoofil An information gathering tool designed for extracting metadata of public documents recon
metame A simple metamorphic code engine for arbitrary executables binary
metasploit Advanced open-source platform for developing, testing, and using exploit code exploitation
metasploit-autopwn db_autopwn plugin of metasploit automation
meterssh A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection backdoor
metoscan Tool for scanning the HTTP methods supported by a webserver It works by testing a URL and checking the responses for the different requests webapp
mfcuk MIFARE Classic Universal toolKit wireless
mfoc MiFare Classic Universal toolKit cracker
mfsniffer A python script for capturing unencrypted TSO login credentials sniffer
mft2csv Extract $MFT record info and log it to a csv file forensic
mftcarver Carve $MFT records from a chunk of data (for instance a memory dump) forensic
mftrcrd Command line $MFT record decoder forensic
mftrefname Resolve file index number to name or vice versa on NTFS forensic
mibble An open-source SNMP MIB parser (or SMI parser) written in Java It can be used to read SNMP MIB files as well as simple ASN files misc
microsploit Fast and easy create backdoor office exploitation using module metasploit packet, Microsoft Office, Open Office, Macro attack, Buffer Overflow backdoor
middler A Man in the Middle tool to demonstrate protocol middling attacks networking
mikrotik-npk Python tools for manipulating Mikrotik NPK format reversing
mildew Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs recon
mimikatz A little tool to play with Windows security windows
mimipenguin A tool to dump the login password from the current linux user forensic
mingsweeper A network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification windows
minimodem A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols misc
minimysqlator A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities exploitation
miranda-upnp A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices exploitation
missidentify A program to find Win applications recon
missionplanner A GroundControl Station for Ardupilot drone
mitm6 A simple yet effective python script to perform DNS spoofing via ARP poisoning networking
mitm-relay Hackish way to intercept and modify non-HTTP protocols through Burp & others proxy
mitm Pwning IPv via IPv scanner
mitmap A python program to create a fake AP and sniff data wireless
mitmap-old Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation automation
mitmer A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook sniffer
mitmf A Framework for Man-In-The-Middle attacks written in Python exploitation
mitmproxy SSL-capable man-in-the-middle HTTP proxy proxy
mkbrutus Password bruteforcer for MikroTik devices or boxes running RouterOS cracker
mkyara Tool to generate YARA rules based on binary code misc
mobiusft An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions forensic
mobsf An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing mobile
modlishka A powerful and flexible HTTP reverse proxy proxy
modscan A new tool designed to map a SCADA MODBUS TCP based network scanner
moloch An open source large scale IPv full PCAP capturing, indexing and database system networking
mongoaudit A powerful MongoDB auditing and pentesting tool scanner
monocle A local network host discovery tool In passive mode, it will listen for ARP request and reply packets In active mode, it will send ARP requests to the specific IP range The results are a list of IP and MAC addresses present on the local network recon
monsoon A fast HTTP enumerator that allows you to execute a large number of HTTP requests webapp
mooscan A scanner for Moodle LMS webapp
morpheus Automated Ettercap TCP/IP Hijacking Tool automation
morxbook A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS cracker
morxbrute A customizable HTTP dictionary-based password cracking tool written in Perl cracker
morxbtcrack Single Bitcoin private key cracking tool released cracker
morxcoinpwn Mass Bitcoin private keys brute forcing/Take over tool released cracker
morxcrack A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords cracker
morxkeyfmt Read a private key from stdin and output formatted data values crypto
morxtraversal Path Traversal checking tool webapp
morxtunel Network Tunneling using TUN/TAP interfaces over TCP tool tunnel
mosca Static analysis tool to find bugs like a grep unix command code-audit
mosquito XSS exploitation tool - access victims through HTTP proxy exploitation
mots Man on the Side Attack - experimental packet injection and detection sniffer
motsa-dns-spoofing ManOnTheSideAttack-DNS Spoofing spoof
mousejack Wireless mouse/keyboard attack with replay/transmit poc wireless
mp3nema A tool aimed at analyzing and capturing data that is hidden between frames in an MP file or stream, otherwise noted as "out of band" data forensic
mptcp A tool for manipulation of raw packets that allows a large number of options networking
mptcp-abuse A collection of tools and resources to explore MPTCP on your network Initially released at Black Hat USA networking
mqtt-pwn A one-stop-shop for IoT Broker penetration-testing and security assessment operations scanner
mrsip SIP-Based Audit and Attack Tool voip
mrtparse A module to read and analyze the MRT format data misc
ms-sys A tool to write Winx- master boot records (mbr) under linux - RTM! backdoor
msf-mpc Msfvenom payload creator automation
msfdb Manage the metasploit framework database misc
msfenum A Metasploit auto auxiliary script automation
msmailprobe Office and Exchange Enumeration tool scanner
mssqlscan A small multi-threaded tool that scans for Microsoft SQL Servers scanner
msvpwn Bypass Windows' authentication via binary patching windows
mtr Combines the functionality of traceroute and ping into one tool (CLI version) networking
mtscan Mikrotik RouterOS wireless scanner wireless
mubeng An incredibly fast proxy checker & IP rotator with ease proxy
multiinjector Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation webapp
multimac Multiple MACs on an adapter spoof
multimon-ng An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei radio
multiscanner Modular file scanning/analysis framework scanner
multitun Tunnel arbitrary traffic through an innocuous WebSocket tunnel
munin-hashchecker Online hash checker for Virustotal and other services defensive
muraena Almost-transparent reverse proxy to automate phishing and post-phishing activities social
mutator This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> Crprtn_ automation
mwebfp Mass Web Fingerprinter fingerprint
mxtract Memory Extractor & Analyzer forensic
mybff A Brute Force Framework cracker
myjwt This cli is for pentesters, CTF players, or dev You can modify your jwt, sign, inject, etc exploitation
mylg Network Diagnostic Tool networking
mysql2sqlite Converts a mysqldump file into a Sqlite compatible file database
nqlmap An NQL exploitation tool exploitation
naabu A fast port scanner written in go with focus on reliability and simplicity scanner
nacker A tool to circumvent x Network Access Control on a wired LAN networking
naft Network Appliance Forensic Toolkit forensic
narthex Modular personalized dictionary generator misc
nasnum Script to enumerate network attached storages recon
nbname Decodes and displays all NetBIOS name packets it receives on UDP port and more! windows
nbnspoof NetBIOS Name Service Spoofer spoof
nbtenum A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts windows
nbtool Some tools for NetBIOS and DNS investigation, attacks, and communication networking
nbtscan Scan networks searching for NetBIOS information scanner
ncpfs Allows you to mount volumes of NetWare servers under Linux networking
ncrack High-speed network authentication cracking tool cracker
necromant Python Script that search unused Virtual Hosts in Web Servers recon
needle The iOS Security Testing Framework mobile
neglected Facebook CDN Photo Resolver recon
neighbor-cache-fingerprinter An ARP based Operating System version scanner fingerprint
nemesis A command-line network packet crafting and injection utility networking
neo-regeorg Improved version of reGeorg, HTTP tunneling pivot tool tunnel
net-creds Sniffs sensitive data from interface or pcap sniffer
netactview A graphical network connections viewer similar in functionality to netstat networking
netattack Python script to scan and attack wireless networks wireless
netbios-share-scanner This tool could be used to check windows workstations and servers if they have accessible shared resources scanner
netbus NetBus remote administration tool windows
netcommander An easy-to-use arp spoofing tool spoof
netcon A network connection establishment and management script networking
netdiscover An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving It can be also used on hub/switched networks recon
netkit-bsd-finger BSD-finger ported to Linux recon
netkit-rusers Logged in users; Displays who is logged in to machines on local network recon
netkit-rwho Remote who client and server (with Debian patches) recon
netmap Can be used to make a graphical representation of the surrounding network networking
netmask Helps determine network masks recon
netreconn A collection of network scan/recon tools that are relatively small compared to their larger cousins networking
netripper Smart traffic sniffing for penetration testers windows
netscan Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks (tor connection) scanner
netscan2 Active / passive network scanner scanner
netsed Small and handful utility design to alter the contents of packets forwarded thru network in real time networking
netsniff-ng High performance Linux network sniffer for packet inspection sniffer
netstumbler Well-known wireless AP scanner and sniffer windows
nettacker Automated Penetration Testing Framework automation
network-app-stress-tester Network Application Stress Testing Yammer dos
networkmap Post-exploitation network mapper networking
networkminer A Network Forensic Analysis Tool for advanced Network Traffic Analysis, sniffer and packet analyzer forensic
netz Discover internet-wide misconfigurations while drinking coffee scanner
netzob An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols reversing
nexfil OSINT tool for finding profiles by username social
nextnet Pivot point discovery tool networking
nfcutils Provides a simple 'lsnfc' command that list tags which are in your NFC device field nfc
nfdump A set of tools to collect and process netflow data networking
nfex A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile forensic
nfspy A Python library for automating the falsification of NFS credentials when mounting an NFS share automation
nfsshell Userland NFS command tool automation
ngrep A grep-like utility that allows you to search for network packets on an interface networking
ngrok A tunneling, reverse proxy for developing and understanding networked, HTTP services tunnel
nield A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv,IPv), routing, FIB rules, traffic control networking
nikto A web server scanner which performs comprehensive tests against web servers for multiple items scanner
nili Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing scanner
nimbostratus Tools for fingerprintinging and exploiting Amazon cloud infrastructures fingerprint
nipe A script to make Tor Network your default gateway defensive
nipper Network Infrastructure Parser networking
nirsoft Unique collection of small and useful freeware utilities windows
nishang Using PowerShell for Penetration Testing windows
njsscan A static application testing (SAST) tool that can find insecure code patterns in your nodejs applications code-audit
nkiller2 A TCP exhaustion/stressing tool dos
nmap Utility for network discovery and security auditing scanner
nmap-parse-output Converts/manipulates/extracts data from a nmap scan output misc
nmbscan Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols scanner
nohidy The system admins best friend, multi platform auditing tool recon
nomorexor Tool to help guess a files byte XOR key by using frequency analysis crypto
noriben Portable, Simple, Malware Analysis Sandbox malware
nosqlattack Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks automation
nosqli NoSQL scanner and injector webapp
nosqli-user-pass-enum Script to enumerate usernames and passwords from vulnerable web applications running MongoDB exploitation
nosqlmap Automated Mongo database and NoSQL web application exploitation tool webapp
notspikefile A Linux based file format fuzzing tool fuzzer
novahot A webshell framework for penetration testers webapp
nray Distributed port scanner scanner
nsdtool A netgear switch discovery tool It contains some extra features like bruteoforce and setting a new password networking
nsearch Minimal script to help find script into the nse database misc
nsec3map A tool to enumerate the resource records of a DNS zone using its DNSSEC NSEC or NSEC chain scanner
nsec3walker Enumerates domain names using DNSSEC recon
nsntrace Perform network trace of a single process by using network namespaces sniffer
nsoq A Network Security Tool for packet manipulation that allows a large number of options networking
ntds-decode This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database windows
ntdsxtract Active Directory forensic framework forensic
ntfs-file-extractor Extract files off NTFS forensic
ntfs-log-tracker This tool can parse $LogFile, $UsnJrnl of NTFS forensic
ntlm-challenger Parse NTLM over HTTP challenge messages scanner
ntlm-scanner A simple python tool based on Impacket that tests servers for various known NTLM vulnerabilities scanner
ntlm-theft A tool for generating multiple types of NTLMv hash theft files exploitation
ntlmrecon A tool to enumerate information from NTLM authentication enabled web endpoints scanner
ntp-fingerprint An active fingerprinting utility specifically designed to identify the OS the NTP server is running on fingerprint
ntp-ip-enum Script to pull addresses from a NTP server using the monlist command Can also output Maltego resultset recon
ntpdos PoC for distributed NTP reflection DoS (CVE-) dos
nuclei A fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use webapp
nuclei-templates Community curated list of template files for the nuclei engine scanner
nullinux Tool that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions recon
nullscan A modular framework designed to chain and automate security tests automation
nxcrypt NXcrypt - python backdoor framework backdoor
nzyme WiFi defense system wireless
o-saft A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations scanner
o365enum Username enumeration and password enuming tool aimed at Microsoft O cracker
o365spray Username enumeration and password spraying tool aimed at Microsoft O cracker
oat A toolkit that could be used to audit security within Oracle database servers fuzzer
obevilion Another archive cracker created in python, cracking [zip/z/rar] cracker
obexstress Script for testing remote OBEX service for some potential vulnerabilities bluetooth
obfs4proxy A pluggable transport proxy written in Go proxy
objdumpshellcode A tool I have found incredibly useful whenever creating custom shellcode binary
objection Instrumented Mobile Pentest Framework mobile
oclhashcat Worlds fastest WPA cracker with dictionary mutation engine cracker
ocs Compact mass scanner for Cisco routers with default telnet/enable passwords scanner
office-dde-payloads Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique exploitation
ofp-sniffer An OpenFlow sniffer to help network troubleshooting in production networks sniffer
ohrwurm A small and simple RTP fuzzer fuzzer
okadminfinder Tool to find admin panels / admin login pages webapp
oledump Analyze OLE files (Compound File Binary Format) These files contain streams of data This tool allows you to analyze these streams binary
ollydbg A -bit assembler-level analysing debugger debugger
omen Ordered Markov ENumerator - Password Guesser cracker
omnibus OSINT tool for intelligence collection, research and artifact management recon
omnihash Hash files, strings, input streams and network resources in various common algorithms simultaneously crypto
one-lin3r Gives you one-liners that aids in penetration testing and more misc
onesixtyone An SNMP scanner that sends multiple SNMP requests to multiple IP addresses cracker
onetwopunch Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans scanner
onioff An onion url inspector for inspecting deep web links recon
oniongrok Onion addresses for anything tunnel
onionscan Scan Onion Services for Security Issues scanner
onionsearch Script that scrapes urls on different "onion" search engines webapp
onionshare Share a file over Tor Hidden Services anonymously and securely defensive
open-iscsi iSCSI userland tools misc
opendoor OWASP WEB Directory Scanner webapp
openpuff Yet not another steganography SW stego
openscap Open Source Security Compliance Solution automation
openstego A tool implemented in Java for generic steganography, with support for password-based encryption of the data crypto
opensvp A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack exploitation
openvas-scanner The OpenVAS scanning Daemon scanner
operative Framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics ) fingerprint
ophcrack Windows password cracker based on rainbow tables cracker
orakelcrackert This tool can crack passwords which are encrypted using Oracle's latest SHA based password protection algorithm windows
origami Aims at providing a scripting tool to generate and analyze malicious PDF files malware
orjail A more secure way to force programs to exclusively use tor network defensive
oscanner An Oracle assessment framework developed in Java fuzzer
osert Markdown Templates for Offensive Security exam reports misc
osfooler-ng Prevents remote active/passive OS fingerprinting by tools like nmap or pf defensive
osiig Instagram OSINT Tool gets a range of information from an Instagram account social
osint-spy Performs OSINT scan on email/domain/ip_address/organization recon
osinterator Open Source Toolkit for Open Source Intelligence Gathering recon
osrframework A project focused on providing API and tools to perform more accurate online researches recon
osslsigncode A small tool that implements part of the functionality of the Microsoft tool signtoolexe windows
ostinato An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark sniffer
osueta A simple Python script to exploit the OpenSSH User Enumeration Timing Attack exploitation
otori A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities exploitation
outguess A universal steganographic tool crypto
outlook-webapp-brute Microsoft Outlook WebAPP Brute cracker
owabf Outlook Web Access bruteforcer tool cracker
owasp-bywaf A web application penetration testing framework (WAPTF) webapp
owasp-zsc Shellcode/Obfuscate Code Generator exploitation
owtf The Offensive (Web) Testing Framework webapp
p0f Purely passive TCP/IP traffic fingerprinting tool fingerprint
pack Password Analysis and Cracking Kit cracker
packer tool for creating identical machine images for multiple platforms from a single source configuration binary
packerid Script which uses a PEiD database to identify which packer (if any) is being used by a binary binary
packet-o-matic A real time packet processor Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module networking
packeth Linux GUI packet generator tool for ethernet networking
packetq A tool that provides a basic SQL-frontend to PCAP-files networking
packetsender An open source utility to allow sending and receiving TCP and UDP packets networking
packit A network auditing tool Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic networking
pacu The AWS exploitation framework, designed for testing the security of Amazon Web Services environments exploitation
pacumen Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks) crypto
padbuster Automated script for performing Padding Oracle attacks exploitation
pafish A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do windows
pagodo Google dork script to collect potentially vulnerable web pages and applications on the Internet scanner
paketto Advanced TCP/IP Toolkit scanner
panhunt Searches for credit card numbers (PANs) in directories scanner
panoptic A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability automation
pappy-proxy An intercepting proxy for web application testing webapp
parameth This tool can be used to brute discover GET and POST parameters webapp
parampampam This tool for brute discover GET and POST parameters webapp
paranoic A simple vulnerability scanner written in Perl scanner
paros Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc webapp
parse-evtx A tool to parse the Windows XML Event Log (EVTX) format forensic
parsero A robotstxt audit tool recon
pasco Examines the contents of Internet Explorer's cache files for forensic purposes forensic
pass-station CLI & library to search for default credentials among thousands of Products / Vendors misc
passcracking A little python script for sending hashes to passcrackingcom and milwrm cracker
passe-partout Tool to extract RSA and DSA private keys from any process linked with OpenSSL The target memory is scanned to lookup specific OpenSSL patterns cracker
passhunt Search drives for documents containing passwords scanner
passivedns A network sniffer that logs all DNS server replies for use in a passive DNS setup sniffer
pastejacker Hacking systems with the automation of PasteJacking attacks automation
pastemonitor Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match recon
pasv-agrsv Passive recon / OSINT automation script automation
patator A multi-purpose bruteforcer cracker
patchkit Powerful binary patching from Python binary
pathzuzu Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables exploitation
payloadmask Web Payload list editor to use techniques to try bypass web application firewall webapp
payloadsallthethings A list of useful payloads and bypass for Web Application Security and Pentest/CTF misc
pblind Little utility to help exploiting blind sql injection vulnerabilities exploitation
pbscan Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage scanner
pcapfex Packet CAPture Forensic Evidence eXtractor networking
pcapfix Tries to repair your broken pcap and pcapng files networking
pcapsipdump A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrent SIP sessions) voip
pcapteller A tool designed for traffic manipulation and replay sniffer
pcapxray A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction forensic
pcileech Tool, which uses PCIe hardware devices to read and write from the target system memory hardware
pcode2code VBA p-code decompiler decompiler
pcredz A tool that extracts credit card numbers and more from a pcap file or from a live interface scanner
pdblaster Extract PDB file paths from large sample sets of executable files forensic
pdf-parser Parses a PDF document to identify the fundamental elements used in the analyzed file forensic
pdfbook-analyzer Utility for facebook memory forensics forensic
pdfcrack Password recovery tool for PDF-files cracker
pdfgrab Tool for searching pdfs withthin google and extracting pdf metadata recon
pdfid Scan a file to look for certain PDF keywords forensic
pdfresurrect A tool aimed at analyzing PDF documents forensic
pdfwalker Frontend to explore the internals of a PDF document with Origami misc
pdgmail A password dictionary attack tool that targets windows authentication via the SMB protocol cracker
pe-bear A freeware reversing tool for PE files windows
pe-sieve Scans a given process Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches) windows
peach A SmartFuzzer that is capable of performing both generation and mutation based fuzzing fuzzer
peach-fuzz Simple vulnerability scanning framework fuzzer
peass Privilege Escalation Awesome Scripts SUITE (with colors) scanner
peda Python Exploit Development Assistance for GDB debugger
peepdf A Python tool to explore PDF files in order to find out if the file can be harmful or not forensic
peepingtom A tool to take screenshots of websites Much like eyewitness webapp
peframe Tool to perform static analysis on (portable executable) malware malware
pemcrack Cracks SSL PEM files that hold encrypted private keys Brute forces or dictionary cracks cracker
pemcracker Tool to crack encrypted PEM files cracker
penbox A Penetration Testing Framework - The Tool With All The Tools automation
pencode Complex payload encoder misc
pentbox A security suite that packs security and stability testing oriented tools for networks and systems fuzzer
pentestly Python and Powershell internal penetration testing framework scanner
pentmenu A bash script for recon and DOS attacks automation
pepe Collect information about email addresses from Pastebin social
pepper An open source script to perform malware static analysis on Portable Executable malware
periscope A PE file inspection tool windows
perl-image-exiftool Reader and rewriter of EXIF informations that supports raw files forensic
petools Portable executable (PE) manipulation toolkit windows
pev Command line based tool for PE/PE+ file analysis forensic
pextractor A forensics tool that can extract all files from an executable file created by a joiner or similar windows
pfff Tools and APIs for code analysis, visualization and transformation code-audit
pftriage Python tool and library to help analyze files during malware triage and analysis malware
pgdbf Convert XBase / FoxPro databases to PostgreSQL database
phantap An 'invisible' network tap aimed at red teams networking
phantom-evasion Antivirus evasion tool written in python exploitation
phemail A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test social
phishery An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector backdoor
phishingkithunter Find phishing kits which use your brand/organization's files and image' social
phoneinfoga Information gathering & OSINT framework for phone numbers social
phonesploit Adb exploiting tools mobile
phonia Advanced toolkits to scan phone numbers using only free resources social
phoss Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP, VNC and POP logins cracker
photon Incredibly fast crawler which extracts urls, emails, files, website accounts and much more webapp
php-findsock-shell A Findsock Shell implementation in PHP + C webapp
php-malware-finder Detect potentially malicious PHP files webapp
php-mt-seed PHP mt_rand() seed cracker cracker
php-rfi-payload-decoder Decode and analyze RFI payloads developed in PHP cracker
php-vulnerability-hunter An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications windows
phpggc A library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically webapp
phpsploit Stealth post-exploitation framework webapp
phpstan PHP Static Analysis Tool - discover bugs in your code without running it code-audit
phpstress A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI dos
phrasendrescher A modular and multi processing pass phrase cracking tool cracker
pidense Monitor illegal wireless network activities (Fake Access Points) wireless
pin A dynamic binary instrumentation tool automation
pingcastle Active Directory scanning tool windows
pintool This tool can be useful for solving some reversing challenges in CTFs events reversing
pintool2 Improved version of pintool reversing
pip3line The Swiss army knife of byte manipulation crypto
pipal A password analyser cracker
pipeline Designed to aid in targeted brute force password cracking attacks cracker
pirana Exploitation framework that tests the security of a email content filter exploitation
pivotsuite A portable, platform independent and powerful network pivoting toolkit networking
pixd Colourful visualization tool for binary files binary
pixiewps Offline bruteforce of the WPS pin exploiting the low or non-existing entropy of some APs wireless
pixload Image Payload Creating/Injecting tools webapp
pkcrack A PkZip encryption cracker cracker
pkinittools Tools for Kerberos PKINIT and relaying to AD CS exploitation
pkt2flow A simple utility to classify packets into flows networking
plasma-disasm An interactive disassembler for x/ARM/MIPS It can generates indented pseudo-code with colored syntax disassembler
plcscan This is a tool written in Python that will scan for PLC devices over scomm or modbus protocols scanner
plecost Wordpress finger printer Tool webapp
plown A security scanner for Plone CMS webapp
plumberpy A python implementation of a grep friendly ftrace wrapper misc
plutil Converts plist files between binary and UTF (editable) text formats misc
pmacct Small set of multi-purpose passive network monitoring tools [NetFlow IPFIX sFlow libpcap BGP BMP IGP Streaming Telemetry] networking
pmap Passively discover, scan, and fingerprint link-local peers by the background noise they generate (ie their broadcast and multicast traffic) windows
pmapper A tool for quickly evaluating IAM permissions in AWS recon
pmcma Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption) exploitation
pmdump A tool that lets you dump the memory contents of a process to a file without stopping the process windows
pngcheck Verifies the integrity of PNG, JNG and MNG files by checking the CRCs and decompressing the image data stego
pnscan A parallel network scanner that can be used to survey TCP network services scanner
pocsuite An open-sourced remote vulnerability testing framework developed by the Knownsec Security Team exploitation
poison A fast, asynchronous syn and udp scanner scanner
poly Polymorphic webshells webapp
polyswarm An interface to the public and private PolySwarm APIs malware
pompem A python exploit tool finder exploitation
poracle A tool for demonstrating padding oracle attacks crypto
portia Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised automation
portmanteau An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface fuzzer
portspoof This program's primary goal is to enhance OS security through a set of new techniques defensive
postenum Clean, nice and easy tool for basic/advanced privilege escalation techniques recon
posttester A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin crypto
powercloud Deliver powershell payloads via DNS TXT via CloudFlare using PowerShell windows
powerfuzzer Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl cfuzzer, fuzzled, fuzzerpl, jbrofuzz, webscarab, wapiti, Socket Fuzzer) It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others fuzzer
powerlessshell Run PowerShell command without invoking powershellexe windows
powermft Powerful commandline $MFT record editor forensic
powerops PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier" windows
powershdll Run PowerShell with rundll Bypass software restrictions windows
powersploit A PowerShell Post-Exploitation Framework exploitation
powerstager A payload stager using PowerShell binary
pown Security testing and exploitation toolkit built on top of Nodejs and NPM webapp
ppee A Professional PE file Explorer for reversers, malware researchers and those who want to statically inspect PE files in more details windows
ppfuzz A fast tool to scan client-side prototype pollution vulnerability written in Rust webapp
ppmap A scanner/exploitation tool written in GO, which leverages client-side Prototype Pollution to XSS by exploiting known gadgets webapp
ppscan Yet another port scanner with HTTP and FTP tunneling support scanner
pr0cks python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS or HTTP(CONNECT) proxy using iptables -j REDIRECT target proxy
prads A "Passive Real-time Asset Detection System" scanner
praeda An automated data/information harvesting tool designed to gather critical information from various embedded devices scanner
preeny Some helpful preload libraries for pwning stuff exploitation
pret Printer Exploitation Toolkit - The tool that made dumpster diving obsolete exploitation
princeprocessor Standalone password candidate generator using the PRINCE algorithm misc
procdump Generate coredumps based off performance triggers binary
proctal Provides a command line interface and a C library to manipulate the address space of a running program on Linux binary
procyon A suite of Java metaprogramming tools focused on code generation and analysis decompiler
profuzz Simple PROFINET fuzzer based on Scapy fuzzer
prometheus-firewall A Firewall analyzer written in ruby networking
promiscdetect Checks if your network adapter(s) is running in promiscuous mode, which may be a sign that you have a sniffer running on your computer windows
propecia A fast class scanner that scans for a specified open port with banner grabbing fingerprint
protos-sip SIP test suite voip
protosint Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses recon
prowler Tool for AWS security assessment, auditing and hardening defensive
proxenet THE REAL hacker friendly proxy for web application pentests webapp
proxify Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go proxy
proxmark A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (kHz) to High Frequency (MHz) tags radio
proxmark3 Software for the the Proxmark, an RFID swiss-army tool radio
proxybroker Proxy [Finder Checker
proxychains-ng A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies proxy
proxycheck This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver scanner
proxyp Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses proxy
proxyscan A security penetration testing tool to scan for hosts and ports through a Web proxy server scanner
proxytunnel Creates tunnels through HTTP(S) proxies for any TCP based protocol tunnel
psencode A tool to generate and encode a PowerShell based Metasploit payloads exploitation
pscan A limited problem scanner for C source files code-audit
pshitt A lightweight fake SSH server designed to collect authentication data sent by intruders honeypot
pspy Monitor linux processes without root permissions misc
pstoreview Lists the contents of the Protected Storage windows
ptf The Penetration Testers Framework: Way for modular support for up-to-date tools exploitation
pth-toolkit Modified version of the passing-the-hash tool collection made to work straight out of the box sniffer
ptunnel A tool for reliably tunneling TCP connections over ICMP echo request and reply packets tunnel
pulledpork Snort rule management misc
pulsar Protocol Learning and Stateful Fuzzing fuzzer
punk A post-exploitation tool meant to help network pivoting from a compromised unix box exploitation
punter Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare recon
pupy Opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python automation
pureblood A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter automation
pwcrack Password hash automatic cracking framework cracker
pwd-hash A password hashing tool that use the crypt function to generate the hash of a string given on standard input crypto
pwdlogy A target specific wordlist generating tool for social engineers and security researchers misc
pwdlyser Python-based CLI Password Analyser (Reporting Tool) crypto
pwdump Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes windows
pwnat A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other networking
pwncat Bind and reverse shell handler with FW/IDS/IPS evasion, self-inject and port-scanning backdoor
pwncat-caleb A post-exploitation platform exploitation
pwndbg Makes debugging with GDB suck less debugger
pwndora Massive IPv scanner, find and analyze internet-connected devices in minutes, create your own IoT search engine at home scanner
pwndrop Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV webapp
pwned A command-line tool for querying the 'Have I been pwned?' service recon
pwned-search Pwned Password API lookup recon
pwnedornot Tool to find passwords for compromised email addresses recon
pwnedpasswords Generate and verify pwnedpasswords check digits misc
pwnloris An improved slowloris DOS tool which keeps attacking until the server starts getting exhausted dos
pwntools CTF framework and exploit development library disassembler
pyaxmlparser A simple parser to parse Android XML file mobile
pybozocrack A silly & effective MD cracker in Python cracker
pydictor A useful hacker dictionary builder for a brute-force attack misc
pyersinia Network attack tool like yersinia but written in Python networking
pyew A python tool to analyse malware malware
pyexfil A couple of beta stage tools for data exfiltration networking
pyfiscan Free web-application vulnerability and version scanner webapp
pyfuscation Obfuscate powershell scripts by replacing Function names, Variables and Parameters automation
pyinstaller A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX misc
pyjfuzz Python JSON Fuzzer fuzzer
pykek Kerberos Exploitation Kit exploitation
pymeta Auto Scanning to SSL Vulnerability recon
pyminifakedns Minimal DNS server written in Python; it always replies with a A-record networking
pyrasite Code injection and introspection of running Python processes backdoor
pyrdp Python RDP MITM and library sniffer
pyrit The famous WPA precomputed cracker cracker
pyssltest A python multithreaded script to make use of Qualys ssllabs api to test SSL flaws scanner
pytacle Automates the task of sniffing GSM frames sniffer
pytbull Next generation of pytbull, IDS/IPS testing framework scanner
pythem Python penetration testing framework scanner
python-api-dnsdumpster Unofficial Python API for http://dnsdumpstercom/ recon
python-arsenic Async WebDriver implementation for asyncio and asyncio-compatible frameworks automation
python-capstone Lightweight multi-platform, multi-architecture disassembly framework reversing
python-cymruwhois Python client for the whoiscymrucom service networking
python-frida Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers reversing
python-frida-tools Frida CLI tools mobile
python-google-streetview A command line tool and module for Google Street View Image API misc
python-ivre Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (library) recon
python-jsbeautifier JavaScript unobfuscator and beautifier reversing
python-keylogger Simple keystroke logger keylogger
python-mmbot Powerful malicious file triage tool for cyber responders malware
python-oletools Tools to analyze Microsoft OLE files binary
python-pcodedmp A VBA p-code disassembler disassembler
python-search-engine-parser Scrapes search engine pages for query titles, descriptions and links
python-shodan The official Python library and CLI for Shodan recon
python-ssh-mitm SSH mitm server for security audits supporting public key authentication, session hijacking and file manipulation exploitation
python-trackerjacker Finds and tracks wifi devices through raw monitoring wireless
python-uncompyle6 A Python cross-version decompiler decompiler
python-utidylib Python bindings for Tidy HTML parser/cleaner misc
python-witnessme Web Inventory tool, takes screenshots of webpages using Pyppeteer webapp
python-yara-rednaga The Python interface for YARA
python2-api-dnsdumpster Unofficial Python API for http://dnsdumpstercom/ recon
python2-capstone A disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community disassembler
python2-cymruwhois Python client for the whoiscymrucom service networking
python2-dartsutillru Simple dictionary with LRU behaviour misc
python2-exrex Irregular methods on regular expressions misc
python2-frida Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers reversing
python2-frida-tools Frida CLI tools mobile
python2-google-streetview A command line tool and module for Google Street View Image API misc
python2-hpfeeds Honeynet Project generic authenticated datafeed protocol honeypot
python2-ivre Network recon framework based on Nmap, Masscan, Zeek (Bro), Argus, Netflow, (library) recon
python2-jsbeautifier JavaScript unobfuscator and beautifier webapp
python2-ldapdomaindump Active Directory information dumper via LDAP scanner
python2-minidump Python library to parse and read Microsoft minidump file format windows
python2-minikerberos Kerberos manipulation library in pure Python windows
python2-oletools Tools to analyze Microsoft OLE files binary
python2-pcodedmp A VBA p-code disassembler disassembler
python2-peepdf A Python tool to explore PDF files in order to find out if the file can be harmful or not forensic
python2-ropgadget Pythonic argument parser, that will make you smile exploitation
python2-shodan Python library and command-line utility for Shodan (https://developershodanio) recon
python2-yara Python interface for YARA malware
qark Tool to look for several security related Android application vulnerabilities mobile
qrgen Simple script for generating Malformed QRCodes misc
qrljacker QRLJacker is a highly customizable exploitation framework to demonstrate "QRLJacking Attack Vector" social
qsreplace Accept URLs on stdin, replace all query string values with a user-supplied value, only output each combination of query string parameters once per host and path misc
quark-engine An Obfuscation-Neglect Android Malware Scoring System mobile
quickrecon A python script for simple information gathering It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing recon
quicksand-lite Command line tool for scanning streams within office documents plus xor db attack defensive
quickscope Statically analyze windows, linux, osx, executables and also APK files binary
r2ghidra Deep ghidra decompiler integration for radare and iaito reversing
rabid A CLI tool and library allowing to simply decode all kind of BigIP cookies webapp
raccoon A high performance offensive security tool for reconnaissance and vulnerability scanning recon
radamsa General purpose mutation based fuzzer fuzzer
radare2 Open-source tools to disasm, debug, analyze and manipulate binary files reversing
radare2-keystone Keystone assembler plugins for radare reversing
radare2-unicorn Unicorn Emulator Plugin for radare disassembler
radiography A forensic tool which grabs as much information as possible from a Windows system windows
rainbowcrack Password cracker based on the faster time-memory trade-off With MySQL and Cisco PIX Algorithm patches cracker
ranger-scanner A tool to support security professionals to access and interact with remote Microsoft Windows based systems scanner
rapidscan The Multi-Tool Web Vulnerability Scanner webapp
rarcrack This program uses bruteforce algorithm to find correct password (rar, z, zip) cracker
rasenum A small program which lists the information for all of the entries in any phonebook file (pbk) windows
rathole A reverse proxy for NAT traversal proxy
ratproxy A passive web application security assessment tool fuzzer
rats A rough auditing tool for security in source code files code-audit
raven A Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin social
rawr Rapid Assessment of Web Resources A web enumerator scanner
rawsec-cli Rawsec Inventory search CLI to find security tools and resources misc
rbasefind A firmware base address search tool binary
rbkb A miscellaneous collection of command-line tools related to pen-testing and reversing misc
rbndr Simple DNS Rebinding Service spoof
rcracki-mt A tool to perform rainbow table attacks on password hashes It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project wwwfreerainbowtablescom cracker
rcrdcarver Carve RCRD records ($LogFile) from a chunk of data forensic
rdesktop-brute It connects to windows terminal servers - Bruteforce patch included cracker
rdp-cipher-checker Enumerate the encryption protocols supported by the server and the cipher strengths supported using native RDP encryption scanner
rdp-sec-check Script to enumerate security settings of an RDP Service scanner
rdpassspray Python tool to perform password spraying using RDP cracker
rdwarecon A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application recon
reaver Brute force attack against Wifi Protected Setup wireless
rebind DNS Rebinding Tool exploitation
recaf Modern Java bytecode editor decompiler
recentfilecache-parser Python parser for the RecentFileCachebcf on Windows forensic
recomposer Randomly changes Win/ PE Files for 'safer' uploading to malware and sandbox sites automation
recon-ng A full-featured Web Reconnaissance framework written in Python recon
reconnoitre A security tool for multithreaded information gathering and service enumeration recon
reconscan Network reconnaissance and vulnerability assessment tools recon
recoverjpeg Recover jpegs from damaged devices forensic
recsech Tool for doing Footprinting and Reconnaissance on the target web recon
recstudio Cross platform interactive decompiler decompiler
recuperabit A tool for forensic file system reconstruction forensic
red-hawk All in one tool for Information Gathering, Vulnerability Scanning and Crawling recon
redasm Interactive, multiarchitecture disassembler written in C++ using Qt as UI Framework disassembler
redfang Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name() bluetooth
redirectpoison A tool to poison a targeted issuer of SIP INVITE requests with (ie Moved Permanently) redirection responses voip
redpoint Digital Bond's ICS Enumeration Tools misc
redress A tool for analyzing stripped Go binaries binary
redsocks Transparent redirector of any TCP connection to proxy proxy
reelphish A Real-Time Two-Factor Phishing Tool social
regeorg The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ Pivot and pwn tunnel
regipy Library for parsing offline registry hives forensic
reglookup Command line utility for reading and querying Windows NT registries forensic
regreport Windows registry forensic analysis tool windows
regrippy Framework for reading and extracting useful forensics data from Windows registry hives forensic
regview Open raw Windows NT Registry files (Windows or higher) windows
rekall Memory Forensic Framework forensic
relay-scanner An SMTP relay scanner scanner
remot3d An Simple Exploit for PHP Language webapp
replayproxy Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file forensic
resourcehacker Resource compiler and decompiler for Windows® applications windows
responder A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv/NTLMv/LMv (multirelay version) scanner
restler-fuzzer First stateful REST API fuzzing tool for automatically testing cloud services through their REST APIs and finding security and reliability bugs in these services webapp
retdec Retargetable machine-code decompiler based on LLVM decompiler
retire Scanner detecting the use of JavaScript libraries with known vulnerabilities scanner
reverseip Ruby based reverse IP-lookup tool recon
revipd A simple reverse IP domain scanner recon
revsh A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities backdoor
rex Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge exploitation
rext Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices exploitation
rfcat RF ChipCon-based Attack Toolset exploitation
rfdump Tool to detect RFID-Tags and show their meta information wireless
rfidiot An open source python library for exploring RFID devices wireless
rfidtool A opensource tool to read / write rfid tags wireless
rhodiola Personalized wordlist generator with NLP, by analyzing tweets (AKA crunch) automation
richsploit Exploitation toolkit for RichFaces exploitation
ridenum A null session RID cycle attack for brute forcing domain controllers cracker
ridrelay Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv recon
rifiuti2 A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO file forensic
rinetd internet redirection server networking
ripdc A script which maps domains related to an given ip address or domainname recon
rita Real Intelligence Threat Analytics recon
riwifshell Web backdoor - infector - explorer webapp
rkhunter Checks machines for the presence of rootkits and other unwanted tools forensic
rlogin-scanner Multithreaded rlogin scanner Tested on Linux, OpenBSD and Solaris cracker
rmiscout Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities exploitation
rogue-mysql-server A rogue MySQL server written in Python misc
roguehostapd Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes wireless
rombuster A router exploitation tool that allows to disclosure network router admin password exploitation
rootbrute Local root account bruteforcer cracker
ropeadope A linux log cleaner anti-forensic
ropeme A set of python scripts to generate ROP gadgets and payload exploitation
ropgadget Search gadgets in binaries to facilitate ROP exploitation for several file formats and architectures exploitation
ropper Show information about binary files and find gadgets to build rop chains for different architectures exploitation
roputils A Return-oriented Programming toolkit exploitation
routerhunter Tool used to find vulnerable routers and devices on the Internet and perform tests scanner
routersploit Open-source exploitation framework dedicated to embedded devices exploitation
rp A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x/x binaries exploitation
rpak A collection of tools that can be useful for doing attacks on routing protocols windows
rpcsniffer Sniffs WINDOWS RPC messages in a given RPC server process windows
rpctools Contains three separate tools for obtaining information from a system that is running RPC services windows
rpdscan Remmina Password Decoder and scanner cracker
rpivot Socks reverse proxy for penetration testing proxy
rr A Record and Replay Framework debugger
rrs A reverse (connecting) remote shell Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode) With tty support and more backdoor
rsactftool RSA tool for ctf - retrieve private key from weak public key and/or uncipher data crypto
rsakeyfind A tool to find RSA key in RAM cracker
rsatool Tool that can be used to calculate RSA and RSA-CRT parameters crypto
rshack Python tool which allows to carry out some attacks on RSA, and offer a few tools to manipulate RSA keys crypto
rsmangler rsmangler takes a wordlist and mangle it automation
rspet A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario exploitation
rtfm A database of common, interesting or useful commands, in one handy referable form misc
rtlamr An rtl-sdr receiver for smart meters operating in the MHz ISM band radio
rtlizer Simple spectrum analyzer scanner
rtlsdr-scanner A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library scanner
rtp-flood RTP flooder voip
rtpbreak Detects, reconstructs and analyzes any RTP session networking
rubilyn bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below It uses a combination of syscall hooking and DKOM to hide activity on a host backdoor
ruler A tool to abuse Exchange services webapp
rulesfinder Machine-learn password mangling rules misc
rupture A framework for BREACH and other compression-based crypto attacks crypto
rustbuster DirBuster for Rust webapp
rustcat A modern port listener and reverse shell networking
rustpad Multi-threaded Padding Oracle attacks against any service crypto
rustscan A modern port scanner scanner
rvi-capture Capture packets sent or received by iOS devices sniffer
rww-attack Performs a dictionary attack against a live Microsoft Windows Small Business Server webapp
rz-cutter Qt and C++ GUI for rizin reverse engineering framework reversing
rz-ghidra Deep ghidra decompiler integration for rizin and rz-cutter reversing
s3-fuzzer A concurrent, command-line AWS S Fuzzer fuzzer
s3scanner Scan for open S buckets and dump scanner
safecopy A disk data recovery tool to extract data from damaged media forensic
sagan A snort-like log analysis engine ids
sakis3g An all-in-one script for connecting with G automation
saleae-logic Debug happy debugger
sambascan Allows you to search an entire network or a number of hosts for SMB shares It will also list the contents of all public shares that it finds scanner
samdump2 Dump password hashes from a Windows NT/k/XP installation cracker
samesame Command line tool to generate crafty homograph strings fuzzer
samplicator Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing networking
samydeluxe Automatic samdump creation script cracker
sandcastle A Python script for AWS S bucket enumeration scanner
sandmap Simple CLI with the ability to run pure Nmap engine, modules with scan profiles scanner
sandsifter The x processor fuzzer fuzzer
sandy An open-source Samsung phone encryption assessment framework scanner
saruman ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection) binary
sasm A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages misc
sawef Send Attack Web Forms webapp
sb0x A simple and Lightweight framework for Penetration testing scanner
sbd Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA encryption, program execution (-e), choosing source port, continuous reconnection with delay + more crypto
sc-make Tool for automating shellcode creation exploitation
scalpel A frugal, high performance file carver forensic
scamper A tool that actively probes the Internet in order to analyze topology and performance scanner
scanless Utility for using websites that can perform port scans on your behalf scanner
scanmem Memory scanner designed to isolate the address of an arbitrary variable in an executing process reversing
scannerl The modular distributed fingerprinting engine fingerprint
scanqli SQLi scanner to detect SQL vulns webapp
scansploit Exploit using barcodes, QRcodes, earn, datamatrix exploitation
scanssh Fast SSH server and open proxy scanner scanner
scap-security-guide Security compliance content in SCAP, Bash, Ansible, and other formats automation
scap-workbench SCAP Scanner And Tailoring Graphical User Interface automation
scapy Powerful interactive packet manipulation program written in Python (tools) networking
scavenger Crawler (Bot) searching for credential leaks on different paste sites recon
schnappi-dhcp Can fuck network with no DHCP misc
scout2 Security auditing tool for AWS environments scanner
scoutsuite Multi-Cloud Security Auditing Tool scanner
scrape-dns Searches for interesting cached DNS entries scanner
scrapy A fast high-level scraping and web crawling framework webapp
scratchabit Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API disassembler
scrounge-ntfs Data recovery program for NTFS file systems forensic
scrying Collect RDP, web, and VNC screenshots smartly webapp
sctpscan A network scanner for discovery and security recon
scylla The Simplistic Information Gathering Engine Find Advanced Information on a Username, Website, Phone Number, etc
sdn-toolkit Discover, Identify, and Manipulate SDN-Based Networks networking
sdnpwn An SDN penetration testing toolkit scanner
sea A tool to help to create exploits of binary programs malware
search1337 Day Online Exploit Scanner automation
seat Next generation information digging application geared toward the needs of security professionals It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities scanner
seclists A collection of multiple types of lists used during security assessments exploitation
second-order Second-order subdomain takeover scanner webapp
secretfinder A python script to find sensitive data (apikeys, accesstoken, jwt,) in javascript files webapp
secscan Web Apps Scanner and Much more utilities webapp
secure-delete Secure file, disk, swap, memory erasure utilities anti-forensic
secure2csv Decode security descriptors in $Secure on NTFS forensic
see-surf A Python based scanner to find potential SSRF parameters in a web application webapp
seeker Accurately Locate People using Social Engineering social
sees Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain social
sensepost-xrdp A rudimentary remote desktop tool for the X protocol exploiting unauthenticated x sessions exploitation
sergio-proxy A multi-threaded transparent HTTP proxy for manipulating web traffic proxy
serialbrute Java serialization brute force attack tool exploitation
serializationdumper A tool to dump Java serialization streams in a more human readable form webapp
server-status-pwn A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-status instances recon
sessionlist Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth networking
set Social-engineer toolkit Aimed at penetration testing around Social-Engineering social
seth Perform a MitM attack and extract clear text credentials from RDP connections networking
setowner Allows you to set file ownership to any account, as long as you have the "Restore files and directories" user right windows
sfuzz A simple fuzzer fuzzer
sgn Shikata ga nai encoder ported into go with several improvements binary
sh00t A Testing Environment for Manual Security Testers misc
sha1collisiondetection Library and command line tool to detect SHA collision in a file crypto
shad0w A modular C framework designed to successfully operate on mature environments windows
shadowexplorer Browse the Shadow Copies created by the Windows Vista / / / Volume Shadow Copy Service forensic
shard A command line tool to detect shared passwords recon
shareenum Tool to enumerate shares from Windows hosts scanner
sharesniffer Network share sniffer and auto-mounter for crawling remote file systems scanner
shed NET runtime inspector windows
shellcheck Shell script analysis tool code-audit
shellcode-compiler Compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows & Linux exploitation
shellcode-factory Tool to create and test shellcodes from custom assembly sources exploitation
shellcodecs A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process exploitation
shellen Interactive shellcoding environment to easily craft shellcodes exploitation
shellerator Simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages automation
shellinabox Implements a web server that can export arbitrary command line tools to a web based terminal emulator backdoor
shelling An offensive approach to the anatomy of improperly written OS command injection sanitisers misc
shellme Because sometimes you just need shellcode and opcodes quickly This essentially just wraps some nasm/objdump calls into a neat script exploitation
shellnoob A toolkit that eases the writing and debugging of shellcode debugger
shellpop Generate easy and sophisticated reverse or bind shell commands automation
shellsploit-framework New Generation Exploit Development Kit exploitation
shellter A dynamic shellcode injection tool, and the first truly dynamic PE infector ever created exploitation
sherlock Find usernames across social networks social
sherlocked Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging packer
shhgit Find committed secrets and sensitive files across GitHub, Gists, GitLab and BitBucket or your local repositories in real time recon
shitflood A Socks clone flooder for the Internet Relay Chat (IRC) protocol dos
shocker A tool to find and exploit servers vulnerable to Shellshock exploitation
shodanhat Search for hosts info with shodan recon
shootback A reverse TCP tunnel let you access target behind NAT or firewall backdoor
shortfuzzy A web fuzzing script written in perl webapp
shreder A powerful multi-threaded SSH protocol password bruteforce tool cracker
shuffledns A wrapper around massdns written in GO webapp
sickle A shellcode development tool, created to speed up the various steps needed to create functioning shellcode exploitation
sidguesser Guesses sids/instances against an Oracle database according to a predefined dictionary file cracker
siege An http regression testing and benchmarking utility dos
sigma Generic Signature Format for SIEM Systems defensive
sign Automatically signs an apk with the Android test certificate mobile
sigploit Telecom Signaling Exploitation Framework - SS, GTP, Diameter & SIP exploitation
sigspotter A tool that search in your HD to find which publishers has been signed binaries in your PC windows
sigthief Stealing Signatures and Making One Invalid Signature at a Time exploitation
silenteye A cross-platform application design for an easy use of steganography stego
silenttrinity An asynchronous, collaborative post-exploitation agent powered by Python and NET's DLR backdoor
silk A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks networking
simple-ducky A payload generator automation
simple-lan-scan A simple python script that leverages scapy for discovering live hosts on a network scanner
simpleemailspoofer A simple Python CLI to spoof emails social
simplify Generic Android Deobfuscator mobile
simplyemail Email recon made fast and easy, with a framework to build on CyberSyndicates recon
simtrace2 Host utilities to communicate with SIMtrace USB Devices radio
sinfp A full operating system stack fingerprinting suite fingerprint
siparmyknife A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications voip
sipbrute A utility to perform dictionary attacks against the VoIP SIP Register hash voip
sipcrack A SIP protocol login cracker cracker
sipffer SIP protocol command line sniffer sniffer
sipi Simple IP Information Tools for Reputation Data Analysis recon
sipp A free Open Source test tool / traffic generator for the SIP protocol voip
sippts Set of tools to audit SIP based VoIP Systems voip
sipsak A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications voip
sipscan A sip scanner windows
sipshock A scanner for SIP proxies vulnerable to Shellshock scanner
sipvicious Tools for auditing SIP devices automation
sireprat Remote Command Execution as SYSTEM on Windows IoT Core exploitation
sitadel Web Application Security Scanner webapp
sitediff Fingerprint a web app using local files as the fingerprint sources webapp
sjet Siberas JMX exploitation toolkit exploitation
skipfish A fully automated, active web application security reconnaissance tool webapp
skiptracer OSINT python webscraping framework Skipping the needs of API keys social
skul A PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS) cracker
skydive An open source real-time network topology and protocols analyzer networking
skyjack Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control drone
skype-dump This is a tool that demonstrates dumping MD password hashes from the configuration file in Skype windows
skypefreak A Cross Platform Forensic Framework for Skype forensic
slackpirate Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace social
sleuthkit File system and media management forensic analysis tools forensic
sleuthql Python Burp History parsing tool to discover potential SQL injection points To be used in tandem with SQLmap misc
slither Solidity static analysis framework written in Python code-audit
sloth-fuzzer A smart file fuzzer fuzzer
slowhttptest Highly configurable tool that simulates some Application Layer Denial of Service (DoS) attacks dos
slowloris A tool which is written in perl to test http-server vulnerabilities for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver dos
slowloris-py Low bandwidth DoS tool dos
slurp-scanner Evaluate the security of S buckets scanner
smali Assembler/disassembler for Android's dex format disassembler
smali-cfgs Smali Control Flow Graph's mobile
smalisca Static Code Analysis for Smali files mobile
smap Shellcode mapper - Handy tool for shellcode analysis exploitation
smartphone-pentest-framework Repository for the Smartphone Pentest Framework (SPF) mobile
smbbf SMB password bruteforcer cracker
smbcrunch tools that work together to simplify reconnaissance of Windows File Shares recon
smbexec A rapid psexec style attack with samba tools scanner
smbmap A handy SMB enumeration tool scanner
smbrelay SMB / HTTP to SMB replay attack toolkit windows
smbspider A lightweight python utility for searching SMB/CIFS/Samba file shares scanner
smbsr Lookup for interesting stuff in SMB shares scanner
smikims-arpspoof Performs an ARP spoofing attack using the Linux kernel's raw sockets spoof
smod A modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol scanner
smplshllctrlr PHP Command Injection exploitation tool webapp
smtp-fuzz Simple smtp fuzzer fuzzer
smtp-test Automated testing of SMTP servers for penetration testing scanner
smtp-user-enum Username guessing tool primarily for use against the default Solaris SMTP service Can use either EXPN, VRFY or RCPT TO recon
smtp-vrfy An SMTP Protocol Hacker scanner
smtpmap Tool to identify the running smtp software on a given host fingerprint
smtpscan An SMTP scanner fingerprint
smtptester Small python tool to check common vulnerabilities in SMTP servers exploitation
smtptx A very simple tool used for sending simple email and do some basic email testing from a pentester perspective scanner
smuggler An HTTP Request Smuggling / Desync testing tool written in Python webapp
smuggler-py Python tool used to test for HTTP Desync/Request Smuggling attacks webapp
sn00p A modular tool written in bourne shell and designed to chain and automate security tools and tests automation
sn1per Automated Pentest Recon Scanner automation
snallygaster Tool to scan for secret files on HTTP servers webapp
snapception Intercept and decrypt all snapchats received over your network sniffer
snare Super Next generation Advanced Reactive honeypot honeypot
snarf-mitm SMB Man in the Middle Attack Engine / relay suite exploitation
sniff-probe-req Wi-Fi Probe Requests Sniffer wireless
sniffer Packet Trace Parser for TCP, SMTP Emails, and HTTP Cookies networking
sniffglue Secure multithreaded packet sniffer sniffer
sniffjoke Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft defensive
sniffles A Packet Capture Generator for IDS and Regular Expression Evaluation networking
snitch Turn back the asterisks in password fields to plaintext passwords windows
snmp-brute SNMP brute force, enumeration, CISCO config downloader and password cracking script cracker
snmp-fuzzer SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl fuzzer
snmpattack SNMP scanner and attacking tool networking
snmpcheck A free open source utility to get information via SNMP protocols networking
snmpenum An snmp enumerator scanner
snmpscan A free, multi-processes SNMP scanner scanner
snoopbrute Multithreaded DNS recursive host brute-force tool scanner
snoopy-ng A distributed, sensor, data collection, interception, analysis, and visualization framework drone
snort A lightweight network intrusion detection system defensive
snow Steganography program for concealing messages in text files crypto
snowman A native code to C/C++ decompiler, see the examples of generated code windows
snscan A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network windows
snuck Automatic XSS filter bypass webapp
snyk CLI and build-time tool to find and fix known vulnerabilities in open-source dependencies code-audit
soapui The Swiss-Army Knife for SOAP Testing proxy
socat Multipurpose relay networking
social-analyzer Analyzing & finding a person's profile across social media websites social
social-mapper A social media enumeration and correlation tool social
social-vuln-scanner Gathers public information on companies to highlight social engineering risk social
socialfish Ultimate phishing tool with Ngrok integrated social
socialpwned OSINT tool that allows to get the emails, from a target, published in social networks social
socialscan Check email address and username availability on online platforms recon
socketfuzz Simple socket fuzzer fuzzer
sockstat A tool to let you view information about open connections It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible networking
soot A Java Bytecode Analysis and Transformation Framework binary
sooty The SOC Analysts all-in-one CLI tool to automate and speed up workflow defensive
spade A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment windows
spaf Static Php Analysis and Fuzzer webapp
sparta Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase scanner
spartan Frontpage and Sharepoint fingerprinting and attack tool fingerprint
sparty An open source tool written in python to audit web applications using sharepoint and frontpage architecture webapp
spectools Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware Stable version wireless
speedpwn An active WPA/ Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected cracker
spf A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises social
spfmap A program to map out SPF and DKIM records for a large number of domains recon
spiderfoot The Open Source Footprinting Tool recon
spiderpig-pdffuzzer A javascript pdf fuzzer fuzzer
spiga Configurable web resource scanner webapp
spike-fuzzer IMMUNITYsec's fuzzer creation kit in C fuzzer
spike-proxy A Proxy for detecting vulnerabilities in web applications webapp
spiped Secure pipe daemon networking
spipscan SPIP (CMS) scanner for penetration testing purpose written in Python webapp
splint A tool for statically checking C programs for security vulnerabilities and coding mistakes code-audit
sploitctl Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm automation
sploitego Maltego Penetration Testing Transforms fuzzer
spoofcheck Simple script that checks a domain for email protections recon
spooftooph Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address Cloning this information effectively allows Bluetooth device to hide in plain sight bluetooth
spookflare Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures automation
spotbugs A tool for static analysis to look for bugs in Java code code-audit
spray Makes spraying Microsoft accounts (Office / Azure AD) easy through its customizable two-step password spraying approach cracker
spraycharles Low and slow password spraying tool, designed to spray on an interval over a long period of time cracker
sprayingtoolkit Scripts to make password spraying attacks against Lync/SB & OWA a lot quicker, less painful and more efficient webapp
spraykatz Credentials gathering tool automating remote procdump and parse of lsass process exploitation
sps A Linux packet crafting tool Supports IPv, IPv including extension headers, and tunneling IPv over IPv networking
spyse Python API wrapper and command-line client for the tools hosted on spysecom recon
sqid A SQL injection digger webapp
sqlbrute Brute forces data out of databases using blind SQL injection fuzzer
sqldict A dictionary attack tool for SQL Server windows
sqlivulscan This will give you the SQLi Vulnerable Website Just by Adding the Dork scanner
sqlmap Automatic SQL injection and database takeover tool webapp
sqlninja A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end exploitation
sqlpat This tool should be used to audit the strength of Microsoft SQL Server passwords offline cracker
sqlping SQL Server scanning tool that also checks for weak passwords using wordlists windows
sqlpowerinjector Application created in Net that helps the penetration tester to find and exploit SQL injections on a web page windows
sqlsus An open source MySQL injection and takeover tool exploitation
ssdeep A program for computing context triggered piecewise hashes crypto
ssdp-scanner SSDP amplification scanner written in Python Makes use of Scapy scanner
ssh-audit SSH server and client configuration auditing scanner
ssh-honeypot Fake sshd that logs ip addresses, usernames, and passwords honeypot
ssh-mitm SSH man-in-the-middle tool exploitation
ssh-privkey-crack A SSH private key cracker cracker
ssh-user-enum SSH User Enumeration Script in Python Using The Timing Attack scanner
sshatter Password bruteforcer for SSH cracker
sshfuzz A SSH Fuzzing utility written in Perl that uses Net::SSH fuzzer
sshprank A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module cracker
sshscan A horizontal SSH scanner that scans large swaths of IPv space for a single SSH user and pass cracker
sshtrix A very fast multithreaded SSH login cracker cracker
sshtunnel Pure python SSH tunnels (CLI) tunnel
sshuttle Transparent proxy server that forwards all TCP packets over ssh proxy
ssl-hostname-resolver CN (Common Name) grabber on X Certificates over HTTPS recon
ssl-phuck3r All in one script for Man-In-The-Middle attacks sniffer
sslcat SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection misc
sslcaudit Utility to perform security audits of SSL/TLS clients scanner
ssldump An SSLv/TLS network protocol analyzer sniffer
sslh SSL/SSH/OpenVPN/XMPP/tinc port multiplexer networking
ssllabs-scan Command-line client for the SSL Labs APIs scanner
sslmap A lightweight TLS/SSL cipher suite scanner scanner
sslnuke Transparent proxy that decrypts SSL traffic and prints out IRC messages cracker
sslscan A fast tool to scan SSL services such as HTTPS to determine supported ciphers scanner
sslscan2 Tests SSL/TLS enabled services to discover supported cipher suites scanner
sslsniff A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly sniffer
sslstrip Python tool to hijack HTTPS connections during a MITM attack proxy
sslyze Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations crypto
ssma Simple Static Malware Analyzer malware
ssrf-proxy Facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery proxy
ssrf-sheriff A simple SSRF-testing sheriff written in Go webapp
ssrfmap Automatic SSRF fuzzer and exploitation tool webapp
stackflow Universal stack-based buffer overfow exploitation tool exploitation
stacoan Crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications mobile
stacs Static Token And Credential Scanner scanner
staekka This plugin extends Metasploit for some missing features and modules allowing interaction with other/custom exploits/ways of getting shell access exploitation
stardox Github stargazers information gathering tool recon
starttls-mitm A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic proxy
statsprocessor A high-performance word-generator based on per-position Markov-attack automation
stegcracker Steganography brute-force utility to uncover hidden data inside files stego
stegdetect An automated tool for detecting steganographic content in images stego
steghide Embeds a message in a file by replacing some of the least significant bits stego
stegolego Simple program for using stegonography to hide data within BMP images stego
stegosip TCP tunnel over RTP/SIP tunnel
stegoveritas Automatic image steganography analysis tool stego
stegseek Lightning fast steghide cracker stego
stegsolve Steganography Solver stego
stenographer A packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets sniffer
stepic A python image steganography tool stego
stews A Security Tool for Enumerating WebSockets webapp
sticky-keys-hunter Script to test an RDP host for sticky keys and utilman backdoor scanner
stig-viewer XCCDF formatted SRGs and STIGs files viewer for SCAP validation tools scanner
stompy An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable misc
stoq An open source framework for enterprise level automated analysis code-audit
storm-ring This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call) voip
stowaway A Multi-hop proxy tool for security researchers and pentesters proxy
strace A diagnostic, debugging and instructional userspace tracer binary
streamfinder Searches for Alternate Data Streams (ADS) windows
striker An offensive information and vulnerability scanner webapp
stringsifter Machine learning tool that automatically ranks strings based on their relevance for malware analysis binary
striptls Proxy PoC implementation of STARTTLS stripping attacks proxy
strutscan Apache Struts vulnerability scanner written in Perl scanner
stunnel A program that allows you to encrypt arbitrary TCP connections inside SSL networking
sub7 A remote administration tool No further comments ;-) windows
subbrute A DNS meta-query spider that enumerates DNS records and subdomains scanner
subdomainer A tool designed for obtaining subdomain names from public sources recon
subfinder Modular subdomain discovery tool that can discover massive amounts of valid subdomains for any target recon
subjack Subdomain Takeover tool written in Go scanner
subjs Fetches javascript file from a list of URLS or subdomains webapp
sublert A security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate recon
sublist3r A Fast subdomains enumeration tool for penetration testers recon
subover A Powerful Subdomain Takeover Tool scanner
subscraper Tool that performs subdomain enumeration through various techniques recon
subterfuge Automated Man-in-the-Middle Attack Framework exploitation
sucrack A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su cracker
suid3num Python script which utilizes python's built-in modules to enumerate SUID binaries exploitation
sulley A pure-python fully automated and unattended fuzzing framework fuzzer
superscan Powerful TCP port scanner, pinger, resolver windows
suricata An Open Source Next Generation Intrusion Detection and Prevention Engine defensive
suricata-verify Suricata Verification Tests - Testing Suricata Output misc
svn-extractor A simple script to extract all web resources by means of SVN folder exposed over network recon
swaks Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH networking
swamp An OSINT tool for discovering associated sites through Google Analytics Tracking IDs recon
swap-digger A tool used to automate Linux swap analysis during post-exploitation or forensics forensic
swarm A distributed penetration testing tool scanner
swfintruder First tool for testing security in Flash movies A runtime analyzer for SWF external movies It helps to find flaws in Flash reversing
swftools A collection of SWF manipulation and creation utilities binary
syborg Recursive DNS Subdomain Enumerator with dead-end avoidance system recon
sylkie IPv address spoofing with the Neighbor Discovery Protocol spoof
syms2elf A plugin for Hex-Ray's IDA Pro and radare to export the symbols recognized to the ELF symbol table reversing
synflood A very simply script to illustrate DoS SYN Flooding attack dos
synner A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks spoof
synscan fast asynchronous half-open TCP portscanner scanner
syringe A General Purpose DLL & Code Injection Utility backdoor
sysdig Open source system-level exploration and troubleshooting tool scanner
sysinternals-suite Sysinternals tools suite windows
t50 Experimental Multi-protocol Packet Injector Tool dos
tabi BGP Hijack Detection defensive
tachyon-scanner Fast Multi-Threaded Web Discovery Tool scanner
tactical-exploitation Modern tactical exploitation toolkit scanner
taipan Web application security scanner scanner
takeover Sub-Domain TakeOver Vulnerability Scanner scanner
talon A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment cracker
taof A GUI cross-platform Python generic network protocol fuzzer fuzzer
tbear Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator bluetooth
tcgetkey A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys dos
tchunt-ng Reveal encrypted files stored on a filesystem forensic
tcpcontrol-fuzzer ^ TCP control bit fuzzer (no ECN or CWR) fuzzer
tcpcopy A TCP stream replay tool to support real testing of Internet server applications networking
tcpdstat Get protocol statistics from tcpdump pcap files networking
tcpdump Powerful command-line packet analyzer networking
tcpextract Extracts files from captured TCP sessions Support live streams and pcap files networking
tcpflow Captures data transmitted as part of TCP connections then stores the data conveniently networking
tcpick TCP stream sniffer and connection tracker sniffer
tcpjunk A general tcp protocols testing and hacking utility exploitation
tcpreplay Gives the ability to replay previously captured traffic in a libpcap format networking
tcptrace A TCP dump file analysis tool networking
tcptraceroute A traceroute implementation using TCP packets networking
tcpwatch A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections networking
tcpxtract A tool for extracting files from network traffic misc
teamsuserenum User enumeration with Microsoft Teams API recon
teardown Command line tool to send a BYE request to tear down a call voip
tekdefense-automater IP URL and MD OSINT Analysis forensic
tell-me-your-secrets Find secrets on any machine from over Different Signatures code-audit
tempomail Tool to create a temporary email address in Second and receive emails misc
termineter Smart meter testing framework fuzzer
testdisk Checks and undeletes partitions + PhotoRec, signature based recovery tool forensic
testsslsh Testing TLS/SSL encryption crypto
tfsec Security scanner for your Terraform code defensive
tftp-bruteforce A fast TFTP filename bruteforcer written in perl cracker
tftp-fuzz Master TFTP fuzzing script as part of the ftools series of fuzzers fuzzer
tftp-proxy This tool accepts connection on tftp and reloads requested content from an upstream tftp server Meanwhile modifications to the content can be done by pluggable modules So this one's nice if your mitm with some embedded devices proxy
tgcd TCP/IP Gender Changer Daemon utility networking
thc-ipv6 Complete tool set to attack the inherent protocol weaknesses of IPv and ICMP networking
thc-keyfinder Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file cracker
thc-pptp-bruter A brute force program that works against pptp vpn endpoints (tcp port ) cracker
thc-smartbrute This tool finds undocumented and secret commands implemented in a smartcard cracker
thc-ssl-dos A tool to verify the performance of SSL To be used in your authorized and legitimate area ONLY You need to accept this to make use of it, no use for bad intentions, you have been warned! dos
thcrut Network discovery and OS Fingerprinting tool fingerprint
thedorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data recon
thefatrat TheFatRat a massive exploiting tool: easy tool to generate backdoor and easy tool to post exploitation attack automation
thefuzz CLI fuzzing tool fuzzer
theharvester Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers) recon
themole Automatic SQL injection exploitation tool webapp
thezoo A project created to make the possibility of malware analysis open and available to the public malware
threatspec Project to integrate threat modelling into development process defensive
thumbcacheviewer Extract Windows thumbcache database files forensic
tidos-framework Offensive Web Application Penetration Testing Framework webapp
tiger A security scanner, that checks computer for known problems Can also use tripwire, aide and chkrootkit automation
tilt An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup recon
timegen This program generates a *wav file to "send" an own time signal to DCF compatible devices wireless
timeverter Bruteforce time-based tokens and to convert several time domains cracker
tinc VPN (Virtual Private Network) daemon networking
tinfoleak Get detailed information about a Twitter user activity recon
tinfoleak2 The most complete open-source tool for Twitter intelligence analysis recon
tinyproxy A light-weight HTTP proxy daemon for POSIX operating systems proxy
tls-attacker A Java-based framework for analyzing TLS libraries crypto
tls-fingerprinting Tool and scripts to perform TLS Fingerprinting fingerprint
tls-map CLI & library for TLS cipher suites manipulation crypto
tls-prober A tool to fingerprint SSL/TLS servers fingerprint
tlsenum A command line tool to enumerate TLS cipher-suites supported by a server crypto
tlsfuzzer SSL and TLS protocol test suite and fuzzer crypto
tlspretense SSL/TLS client testing framework crypto
tlssled A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation automation
tnscmd A lame tool to prod the oracle tnslsnr process (/tcp) misc
token-hunter OSINT Tool - Search the group and group members' snippets, issues, and issue discussions for sensitive data that may be included in these assets social
token-reverser Word list generator to crack security tokens misc
tomcatwardeployer Apache Tomcat auto WAR deployment & pwning penetration testing tool exploitation
topera An IPv security analysis toolkit, with the particularity that their attacks can't be detected by Snort scanner
tor Anonymizing overlay network proxy
tor-autocircuit Tor Autocircuit was developed to give users a finer control over Tor circuit creation The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters defensive
tor-browser-en Tor Browser Bundle: anonymous browsing using Firefox and Tor defensive
tor-router A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code defensive
torcrawl Crawl and extract (regular or onion) webpages through TOR network webapp
torctl Script to redirect all traffic through tor network including dns queries for anonymizing entire system automation
torpy Pure python Tor client implementation networking
torshammer A slow POST Denial of Service testing tool written in Python dos
torsocks Wrapper to safely torify applications proxy
tpcat latest Tool based upon pcapdiff by the EFF It will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest misc
tplmap Automatic Server-Side Template Injection Detection and Exploitation Tool webapp
traceroute Tracks the route taken by packets over an IP network recon
trape People tracker on the Internet: OSINT analysis and research tool by Jose Pino social
traxss Automated XSS Vulnerability Scanner scanner
treasure Hunt for sensitive information through githubs code search recon
trevorspray A modular password sprayer with threading, clever proxying, loot modules, and more! cracker
trid An utility designed to identify file types from their binary signatures forensic
trinity A Linux System call fuzzer fuzzer
triton A Dynamic Binary Analysis (DBA) framework binary
trivy A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI scanner
trixd00r An advanced and invisible userland backdoor based on TCP/IP for UNIX systems backdoor
truecrack Password cracking for truecrypt(c) volumes cracker
truegaze Static analysis tool for Android/iOS apps focusing on security issues outside the source code mobile
truehunter Detect TrueCrypt containers using a fast and memory efficient approach forensic
trufflehog Searches through git repositories for high entropy strings, digging deep into commit history code-audit
trusttrees A Tool for DNS Delegation Trust Graphing recon
tsh An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication backdoor
tsh-sctp An open-source UNIX backdoor backdoor
ttpassgen Highly flexible and scriptable password dictionary generator based on Python automation
tunna a set of tools which will wrap and tunnel any TCP communication over HTTP It can be used to bypass network restrictions in fully firewalled environments networking
tweets-analyzer Tweets metadata scraper & activity analyzer social
tweetshell Multi-thread Twitter BruteForcer in Shell Script cracker
twint An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations social
twofi Twitter Words of Interest recon
typo3scan Enumerate Typo version and extensions webapp
tyton Kernel-Mode Rootkit Hunter defensive
u3-pwn A tool designed to automate injecting executables to Sandisk smart usb devices with default U software install backdoor
uacme Defeating Windows User Account Control windows
uatester User Agent String Tester misc
uberfile CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems misc
ubertooth A GHz wireless development board suitable for Bluetooth experimentation Open source hardware and software Tools only bluetooth
ubiquiti-probing A Ubiquiti device discovery tool recon
ubitack Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go wireless
udis86 A minimalistic disassembler library reversing
udork Bash script that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications recon
udp-hunter Network assessment tool for various UDP Services covering both IPv and IPv protocols scanner
udp2raw-tunnel An Encrypted, Anti-Replay, Multiplexed UdP Tunnel, tunnels udp traffic through fake-tcp or icmp by using raw socket tunnel
udpastcp This program hides UDP traffic as TCP traffic in order to bypass certain firewalls networking
udptunnel Tunnels TCP over UDP packets networking
udsim A graphical simulator that can emulate different modules in a vehicle and respond to UDS request scanner
uefi-firmware-parser Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc firmware
ufo-wardriving Allows you to test the security of wireless networks by detecting their passwords based on the router model cracker
ufonet A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet dos
uhoh365 Script to enumerate Office users without performing login attempts recon
ultimate-facebook-scraper A bot which scrapes almost everything about a Facebook user's profile social
umap The USB host security assessment tool scanner
umit A powerful nmap frontend networking
uncaptcha2 Defeating the latest version of ReCaptcha with % accuracy webapp
unfurl Pull out bits of URLs provided on stdin misc
unhide A forensic tool to find processes hidden by rootkits, LKMs or by other techniques forensic
unibrute Multithreaded SQL union bruteforcer exploitation
unicorn-powershell A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory backdoor
unicornscan A new information gathering and correlation engine scanner
unifuzzer A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer fuzzer
uniofuzz The universal fuzzing tool for browsers, web services, files, programs and network services/ports fuzzer
uniscan A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner fuzzer
unix-privesc-check Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (eg databases) automation
unsecure Bruteforces network login masks windows
unstrip ELF Unstrip Tool disassembler
untwister Seed recovery tool for PRNGs crypto
upnp-pentest-toolkit UPnP Pentest Toolkit for Windows windows
upnpscan Scans the LAN or a given address range for UPnP capable devices scanner
uppwn A script that automates detection of security flaws on websites' file upload systems' webapp
uptux Linux privilege escalation checks (systemd, dbus, socket fun, etc) scanner
upx Extendable, high-performance executable packer for several executable formats binary
urh Universal Radio Hacker: investigate wireless protocols like a boss radio
urlcrazy Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage webapp
urldigger A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code webapp
urlextractor Information gathering & website reconnaissance webapp
urlview A curses URL parser for text files misc
usb-canary A Linux or OSX tool that uses psutil to monitor devices while your computer is locked In the case it detects someone plugging in or unplugging devices it can be configured to send you an SMS or alert you via Slack or Pushover defensive
usbrip USB device artifacts tracker forensic
username-anarchy Tools for generating usernames when penetration testing automation
usernamer Pentest Tool to generate usernames/logins based on supplied names misc
userrecon Find usernames across over social networks recon
userrecon-py Recognition usernames in social networks social
usnjrnl2csv Parser for $UsnJrnl on NTFS forensic
usnparser A Python script to parse the NTFS USN journal forensic
uw-loveimap Multi threaded imap bounce scanner scanner
uw-offish Clear-text protocol simulator networking
uw-udpscan Multi threaded udp scanner scanner
uw-zone Multi threaded, randomized IP zoner scanner
v3n0m Offensive Security Tool for Vulnerability Scanning & Pentesting scanner
vais SWF Vulnerability & Information Scanner scanner
valabind Tool to parse vala or vapi files to transform them into swig interface files, C++, NodeJS-ffi or GIR misc
valgrind Tool to help find memory-management problems in programs binary
valhalla Valhalla API Client automation
vane A vulnerability scanner which checks the security of WordPress installations using a black box approach webapp
vanguard A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications webapp
vault-scanner Swiss army knife for hackers scanner
vba2graph Generate call graphs from VBA code, for easier analysis of malicious documents malware
vbrute Virtual hosts brute forcer recon
vbscan A black box vBulletin vulnerability scanner written in perl webapp
vbsmin VBScript minifier packer
vcsmap A plugin-based tool to scan public version control systems for sensitive information scanner
vega An open source platform to test the security of web applications webapp
veil A tool designed to generate metasploit payloads that bypass common anti-virus solutions automation
veles New open source tool for binary data analysis binary
venom A Multi-hop Proxy for Penetration Testers exploitation
veracrypt Disk encryption with strong security based on TrueCrypt crypto
verinice Tool for managing information security misc
vfeed Open Source Cross Linked and Aggregated Local Vulnerability Database main repository misc
vhostscan A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages scanner
videosnarf A new security assessment tool for pcap analysis scanner
vinetto A forensics tool to examine Thumbsdb files forensic
viper A Binary analysis framework disassembler
vipermonkey A VBA parser and emulation engine to analyze malicious macros forensic
viproy-voipkit VoIP Pen-Test Kit for Metasploit Framework exploitation
virustotal Command-line utility to automatically lookup on VirusTotal all files recursively contained in a directory malware
visql Scan SQL vulnerability on target site and sites of on server scanner
visualize-logs A Python library and command line tools to provide interactive log visualization misc
vivisect A Python based static analysis and reverse engineering framework debugger
vlan-hopping Easy Q VLAN Hopping automation
vlany Linux LD_PRELOAD rootkit (x and x_ architectures) backdoor
vmap A Vulnerability-Exploit desktop finder exploitation
vmcloak Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox malware
vnak Aim is to be the one tool a user needs to attack multiple VoIP protocols voip
vnc-bypauth Multi-threaded bypass authentication scanner for VNC smaller than v servers cracker
vncrack What it looks like: crack VNC cracker
voiper A VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor voip
voiphopper A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone It rapidly automates a VLAN Hop into the Voice VLAN automation
voipong A utility which detects all Voice Over IP calls on a pipeline, and for those which are G encoded, dumps actual conversation to separate wave files voip
volafox Mac OS X Memory Analysis Toolkit forensic
volatility-extra Volatility plugins developed and maintained by the community forensic
volatility3 Advanced memory forensics framework forensic
voltron UI for GDB, LLDB and Vivisect's VDB debugger
vpnpivot Explore the network using this tool recon
vsaudit VOIP Security Audit Framework voip
vscan HTTPS / Vulnerability scanner scanner
vstt VSTT is a multi-protocol tunneling tool It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP, and ICMP tunneling tunnel
vsvbp Black box tool for Vulnerability detection in web applications webapp
vulmap Vulmap Online Local Vulnerability Scanners Project scanner
vulnerabilities-spider A tool to scan for web vulnerabilities webapp
vulnx Cms and vulnerabilites detector & An intelligent bot auto shell injector webapp
vuls Vulnerability scanner for Linux/FreeBSD, agentless, written in Go scanner
vulscan A module which enhances nmap to a vulnerability scanner scanner
w13scan Passive Security Scanner webapp
w3af Web Application Attack and Audit Framework fuzzer
wafninja A tool which contains two functions to attack Web Application Firewalls webapp
wafp An easy to use Web Application Finger Printing tool written in ruby using sqlite databases for storing the fingerprints webapp
wafpass Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF webapp
wafw00f Identify and fingerprint Web Application Firewall (WAF) products protecting a website scanner
waidps Wireless Auditing, Intrusion Detection & Prevention System wireless
waldo A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python recon
wapiti A vulnerability scanner for web applications webapp
wascan Web Application Scanner webapp
wavemon Ncurses-based monitoring application for wireless network devices wireless
waybackpack Download the entire Wayback Machine archive for a given URL webapp
waybackurls Fetch all the URLs that the Wayback Machine knows about for a domain recon
wcc The Witchcraft Compiler Collection binary
wce A security tool to list logon sessions and add, change, list and delete associated credentials (ex: LM/NT hashes, plaintext passwords and Kerberos tickets) windows
wcvs Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning webapp
web-soul A plugin based scanner for attacking and data mining web sites written in Perl webapp
web2ldap Full-featured LDAP client running as web application misc
webacoo Web Backdoor Cookie Script-Kit backdoor
webanalyze Port of Wappalyzer (uncovers technologies used on websites) in go to automate scanning webapp
webborer A directory-enumeration tool written in Go webapp
webenum Tool to enumerate http responses using dynamically generated queries and more scanner
webexploitationtool A cross platform web exploitation toolkit exploitation
webfixy On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions proxy
webhandler A handler for PHP system functions & also an alternative 'netcat' handler webapp
webhunter Tool for scanning web applications and networks and easily completing the process of collecting knowledge scanner
webkiller Tool Information Gathering Write By Python webapp
webpwn3r A python based Web Applications Security Scanner scanner
webrute Web server directory brute forcer scanner
webscarab Framework for analysing applications that communicate using the HTTP and HTTPS protocols fuzzer
websearch Search vhost names given a host range Powered by Bing recon
webshag A multi-threaded, multi-platform web server audit tool fuzzer
webshells Web Backdoors webapp
webslayer A tool designed for brute forcing Web Applications webapp
websockify WebSocket to TCP proxy/bridge networking
webspa A web knocking tool, sending a single HTTP/S to run O/S commands backdoor
websploit An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks exploitation
webtech Identify technologies used on websites webapp
webxploiter An OWASP Top Security scanner webapp
weebdns DNS Enumeration with Asynchronicity recon
weeman HTTP Server for phishing in python social
weevely Weaponized web shell webapp
weirdaal AWS Attack Library webapp
wepbuster script for automating aircrack-ng wireless
wesng Windows Exploit Suggester - Next Generation exploitation
wfuzz Utility to bruteforce web applications to find their not linked resources fuzzer
whapa WhatsApp Parser Tool misc
whatbreach OSINT tool to find breached emails and databases social
whatportis A command to search port names and numbers misc
whatsmyname Tool to perform user and username enumeration on various websites social
whatwaf Detect and bypass web application firewalls and protection systems webapp
whatweb Next generation web scanner that identifies what websites are running recon
whichcdn Tool to detect if a given website is protected by a Content Delivery Network webapp
whispers Identify hardcoded secrets in static structured text code-audit
whitewidow SQL Vulnerability Scanner scanner
wi-feye An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily wireless
wifi-autopwner Script to automate searching and auditing Wi-Fi networks with weak security automation
wifi-honey A management tool for wifi honeypots honeypot
wifi-monitor Prints the IPs on your local network that're sending the most packets sniffer
wifi-pumpkin Framework for Rogue Wi-Fi Access Point Attack wireless
wifibroot A WiFi Pentest Cracking tool for WPA/WPA (Handshake, PMKID, Cracking, EAPOL, Deauthentication) wireless
wifichannelmonitor A utility for Windows that captures wifi traffic on the channel you choose, using Microsoft Network Monitor capture driver windows
wificurse WiFi jamming tool wireless
wifijammer A python script to continuously jam all wifi clients within range wireless
wifiphisher Fast automated phishing attacks against WPA networks wireless
wifiscanmap Another wifi mapping tool wireless
wifitap WiFi injection tool through tun/tap device wireless
wifite Tool to attack multiple WEP and WPA encrypted networks at the same time wireless
wig WebApp Information Gatherer webapp
wikigen A script to generate wordlists out of wikipedia pages automation
wildpwn Unix wildcard attacks exploitation
windapsearch Script to enumerate users, groups and computers from a Windows domain through LDAP queries recon
windivert A user-mode packet capture-and-divert package for Windows windows
windows-binaries A colleciton of pentesting Windows binaries windows
windows-exploit-suggester This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target recon
windows-prefetch-parser Parse Windows Prefetch files forensic
windows-privesc-check Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems windows
windowsspyblocker Block spying and tracking on Windows windows
winexe Remotely execute commands on Windows NT//XP/ systems misc
winfo Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT//XP windows
winhex Hex Editor and Disk Editor windows
winpwn Automation for internal Windows Penetrationtest / AD-Security windows
winregfs Windows Registry FUSE filesystem misc
winrelay A TCP/UDP forwarder/redirector that works with both IPv and IPv windows
wireless-ids Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets wireless
wireshark-cli Network traffic and protocol analyzer/sniffer - CLI tools and data files sniffer
wireshark-qt Network traffic and protocol analyzer/sniffer - Qt GUI sniffer
wirouter-keyrec A platform independent software to recover the default WPA passphrases of the supported router models wireless
witchxtool A perl script that consists of a port scanner, LFI scanner, MD bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner webapp
wlan2eth Re-writes captures into standard Ethernet frames wireless
wmat Automatic tool for testing webmail accounts cracker
wmd Python framework for IT security tools automation
wmi-forensics Scripts used to find evidence in WMI repositories forensic
wnmap A shell script written with the purpose to automate and chain scans via nmap automation
wol-e A suite of tools for the Wake on LAN feature of network attached computers misc
wolpertinger A distributed portscanner scanner
wondershaper Limit the bandwidth of one or more network adapters networking
wordbrutepress Python script that performs brute forcing against WordPress installs using a wordlist cracker
wordlistctl Fetch, install and search wordlist archives from websites misc
wordlister A simple wordlist generator and mangler written in python misc
wordpot A Wordpress Honeypot honeypot
wordpress-exploit-framework A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems webapp
wordpresscan WPScan rewritten in Python + some WPSeku ideas scanner
wpa-bruteforcer Attacking WPA/WPA encrypted access point without client wireless
wpa2-halfhandshake-crack A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA network without knowing the passphrase of the actual AP wireless
wpbf Multithreaded WordPress brute forcer cracker
wpbrute-rpc Tool for amplified bruteforce attacks on wordpress based website via xmlrcp API cracker
wpbullet A static code analysis for WordPress (and PHP) code-audit
wpforce Wordpress Attack Suite webapp
wpintel Chrome extension designed for WordPress Vulnerability Scanning and information gathering webapp
wpscan Black box WordPress vulnerability scanner webapp
wpseku Simple Wordpress Security Scanner webapp
wpsik WPS scan and pwn tool wireless
wpsweep A simple ping sweeper, that is, it pings a range of IP addresses and lists the ones that reply windows
wreckuests Yet another one hard-hitting tool to run DDoS attacks with HTTP-flood dos
ws-attacker A modular framework for web services penetration testing webapp
wscript Emulator/tracer of the Windows Script Host functionality code-audit
wsfuzzer A Python tool written to automate SOAP pentesting of web services fuzzer
wssip Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa webapp
wsuspect-proxy A tool for MITM'ing insecure WSUS connections exploitation
wups An UDP port scanner for Windows windows
wuzz Interactive cli tool for HTTP inspection webapp
wxhexeditor A free hex editor / disk editor for Linux, Windows and MacOSX binary
wyd Gets keywords from personal files IT security/forensic tool cracker
x-rsa Contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem crypto
x-scan A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable windows
x64dbg An open-source x/x debugger for windows windows
x8 Hidden parameters discovery suite webapp
xcat A command line tool to automate the exploitation of blind XPath injection vulnerabilities exploitation
xcavator Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook sniffer
xcname A tool for enumerating expired domains in CNAME records scanner
xerosploit Efficient and advanced man in the middle framework networking
xfltreat Tunnelling framework tunnel
xmlrpc-bruteforcer An XMLRPC brute forcer targeting Wordpress written in Python webapp
xorbruteforcer Script that implements a XOR bruteforcing of a given file, although a specific key can be used too crypto
xorsearch Program to search for a given string in an XOR, ROL or ROT encoded binary file crypto
xortool Tool to analyze multi-byte XOR cipher crypto
xpire-crossdomain-scanner Scans crossdomainxml policies for expired domain names scanner
xpl-search Search exploits in multiple exploit databases! exploitation
xplico Internet Traffic Decoder Network Forensic Analysis Tool (NFAT) forensic
xprobe An active OS fingerprinting tool fingerprint
xray A tool for recon, mapping and OSINT gathering from public networks recon
xrop Tool to generate ROP gadgets for ARM, AARCH, x, MIPS, PPC, RISCV, SH and SPARC exploitation
xspear Powerful XSS Scanning and Parameter analysis tool&gem webapp
xspy A utility for monitoring keypresses on remote X servers keylogger
xsrfprobe The Prime Cross Site Request Forgery Audit and Exploitation Toolkit webapp
xss-freak An XSS scanner fully written in Python from scratch webapp
xsscon Simple XSS Scanner tool webapp
xsscrapy XSS spider - / wavsep XSS detected webapp
xsser A penetration testing tool for detecting and exploiting XSS vulnerabilites webapp
xssless An automated XSS payload generator written in python webapp
xsspy Web Application XSS Scanner webapp
xsss A brute force cross site scripting scanner webapp
xssscan Command line tool for detection of XSS attacks in URLs Based on ModSecurity rules from OWASP CRS webapp
xsssniper An automatic XSS discovery tool webapp
xsstracer Python script that checks remote web servers for Clickjacking, Cross-Frame Scripting, Cross-Site Tracing and Host Header Injection scanner
xsstrike An advanced XSS detection and exploitation suite webapp
xssya A Cross Site Scripting Scanner & Vulnerability Confirmation webapp
xwaf Automatic WAF bypass tool webapp
xxeinjector Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods exploitation
xxeserv A mini webserver with FTP support for XXE payloads networking
xxexploiter It generates the XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration exploitation
xxxpwn A tool Designed for blind optimized XPath injection attacks webapp
xxxpwn-smart A fork of xxxpwn adding further optimizations and tweaks webapp
yaaf Yet Another Admin Finder webapp
yaf Yet Another Flowmeter networking
yara Tool aimed at helping malware researchers to identify and classify malware samples malware
yasat Yet Another Stupid Audit Tool scanner
yasca Multi-Language Static Analysis Toolset code-audit
yasuo A ruby script that scans for vulnerable & exploitable rd-party web applications on a network webapp
yate-bts An open source GSM Base Station software radio
yawast The YAWAST Antecedent Web Application Security Toolkit webapp
yay Yet another yogurt Pacman wrapper and AUR helper written in go misc
ycrawler A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output It has proxy and log file support webapp
yersinia A network tool designed to take advantage of some weakness in different network protocols networking
yeti A platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository defensive
yinjector A MySQL injection penetration tool It has multiple features, proxy support, and multiple exploitation methods exploitation
ysoserial A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization webapp
zackattack A new tool set to do NTLM Authentication relaying unlike any other tool currently out there networking
zaproxy Integrated penetration testing tool for finding vulnerabilities in web applications webapp
zarp A network attack tool centered around the exploitation of local networks exploitation
zdns Fast CLI DNS Lookup Tool networking
zeek A powerful network analysis framework that is much different from the typical IDS you may know networking
zeek-aux Handy auxiliary programs related to the use of the Zeek Network Security Monitor networking
zelos A comprehensive binary emulation and instrumentation platform binary
zeratool Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems exploitation
zerowine Malware Analysis Tool - research project to dynamically analyze the behavior of malware malware
zeus AWS Auditing & Hardening Tool defensive
zeus-scanner Advanced dork searching utility recon
zgrab Grab banners (optionally over TLS) recon
zgrab2 Go Application Layer Scanner fingerprint
zipdump ZIP dump utility forensic
zipexec A unique technique to execute binaries from a password protected zip crypto
zirikatu Fud Payload generator script exploitation
zizzania Automated DeAuth attack wireless
zmap Fast network scanner designed for Internet-wide network surveys scanner
zssh SSH and Telnet client with ZMODEM file transfer capability networking
zulu A light weight wireless frame generation tool to enable fast and easy debugging and probing of networks cracker
zulucrypt Front end to cryptsetup and tcplay and it allows easy management of encrypted block devices crypto
zykeys Demonstrates how default wireless settings are derived on some models of ZyXEL routers wireless
zzuf Transparent application input fuzzer fuzzer
=================================================================
GITHUB TOOLS
=================================================================
https://github.com/hrackedz/Google-Link-Grabber
https://github.com/HACK3RY2J/Anon-SMS
https://github.com/H1R0GH057/Anonymous
https://github.com/techchipnet/CamPhish
https://github.com/t3l3machus/hoaxshell
https://github.com/t3l3machus/villain
https://github.com/guelfoweb/knock
https://github.com/sc0tfree/mentalist
https://github.com/openwrt/openwrt
https://github.com/s0md3v/Photon
https://github.com/4ndr34z/shells
https://github.com/ruped24/toriptables3
https://github.com/htr-tech/zphisher
=================================================================
Online tools
=================================================================
https://www.reuneker.nl/files/wordlist/
https://webresolver.nl/tools/iplogger
(not finished)
Коментари
Постави коментар