Hacking
Contents_Index
- TUTORIALS6
- TOOLS3
- DOCKER IMAGES FOR PENETRATION TESTING & SECURITY2
- GENERAL1
- TUTORIALS4
- DISASSEMBLERS AND DEBUGGERS8
- DECOMPILERS5
- DEOBFUSCATORS3
- OTHER5
- EXECUTION LOGGING AND TRACING8
- HEX EDITORS4
- OTHER9
- GENERAL1
- TOOLS15
- GENERAL1
- TOOLS21
- TOOLS7
- TOOLS4
- SYSTEM7
- REVERSE ENGINEERING4
- WEB8
- CRYPTOGRAPHY1
- BUG BOUNTY1
- BUG BOUNTY - EARN SOME MONEY3
- COMPETITION15
- GENERAL8
- ONLINE RESOURCES3
- TOOLS9
Tutorials
6_ENTRIES- Roppers Computing Fundamentals
Free, self-paced curriculum that builds a base of knowledge in computers and networking. Intended to build up a student with no prior technical knowledge to be confident in their ability to learn anything and continue their security education. Full text available as a gitbook.
Tools
3_ENTRIES- Metasploit
A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
- mimikatz
A little tool to play with Windows security
- Hackers tools
Tutorial on tools.
Docker Images for Penetration Testing & Security
2_ENTRIES-
docker pull kalilinux/kali-linux-dockerofficial Kali Linux -
docker pull owasp/zap2docker-stable- official OWASP ZAP -
docker pull wpscanteam/wpscan- official WPScan -
docker pull metasploitframework/metasploit-framework- Official Metasploit -
docker pull citizenstig/dvwa- Damn Vulnerable Web Application (DVWA) -
docker pull wpscanteam/vulnerablewordpress- Vulnerable WordPress Installation -
docker pull opendns/security-ninjas- Security Ninjas -
docker pull noncetonic/archlinux-pentest-lxde- Arch Linux Penetration Tester -
`dβ¦
- `docker pull hmlio/vaas-cve-2014-6271...
docker pull hmlio/vaas-cve-2014-6271- Vulnerability as a service: Shellshock - `docker pull hmlio/vaas-cve-2014-0160...
docker pull hmlio/vaas-cve-2014-0160- Vulnerability as a service: Heartbleed
General
1_ENTRIES- Exploit database
An ultimate archive of exploits and vulnerable software
Tutorials
4_ENTRIESDisassemblers and debuggers
8_ENTRIES- IDA
IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
- OllyDbg
A 32-bit assembler level analysing debugger for Windows
- x64dbg
An open-source x64/x32 debugger for Windows
- radare2
A portable reversing framework
- plasma
Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
- ScratchABit
Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
- Ghidra
A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
Decompilers
5_ENTRIES-
JVM-based languages
-
.net-based languagesdotPeek - a free-of-charge .NET decompiler from JetBrainsILSpy - an open-source .NET assembly browser and decompilerdnSpy - .NET assembly editor, decompiler, and debugger
-
native codeHopper - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.cutter - a decompiler based on radare2.retdecsnowmanHex-Rays
-
Pythonuncompyle6 - decompiler for the over 20 releases and 20 years of CPython.
Deobfuscators
3_ENTRIESOther
5_ENTRIES- nudge4j
Java tool to let the browser talk to the JVM
- dex2jar
Tools to work with Android .dex and Java .class files
- androguard
Reverse engineering, malware and goodware analysis of Android applications
- antinet
.NET anti-managed debugger and anti-profiler code
- UPX
the Ultimate Packer (and unpacker) for eXecutables
Execution logging and tracing
8_ENTRIES- Wireshark
A free and open-source packet analyzer
- tcpdump
A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
- mitmproxy
An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
- Charles Proxy
A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
- usbmon
USB capture for Linux.
- USBPcap
USB capture for Windows.
- dynStruct
structures recovery via dynamic instrumentation.
- drltrace
shared library calls tracing.
Hex editors
4_ENTRIESOther
9_ENTRIES- Binwalk
Detects signatures, unpacks archives, visualizes entropy.
- Veles
a visualizer for statistical properties of blobs.
- Kaitai Struct
a DSL for creating parsers in a variety of programming languages. The Web IDE is particularly useful for reverse-engineering.
- DarunGrim
executable differ.
- DBeaver
a DB editor.
- Dependencies
a FOSS replacement to Dependency Walker.
- PEview
A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
- BinText
A small, very fast and powerful text extractor that will be of particular interest to programmers.
General
1_ENTRIESTools
15_ENTRIES- Spyse
Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
- sqlmap
Automatic SQL injection and database takeover tool
- NoSQLMap
Automated NoSQL database enumeration and web application exploitation tool.
- tools.web-max.ca
base64 base85 md4,5 hash, sha1 hash encoding/decoding
- VHostScan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
- SubFinder
SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
- Findsubdomains
A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
- badtouch
Scriptable network authentication cracker
- PhpSploit
Full-featured C2 framework which silently persists on webserver via evil PHP oneliner
- Git-Scanner
A tool for bug hunting or pentesting for targeting websites that have open
.gitrepositories available in public - CSP Scanner
Analyze a site's Content-Security-Policy (CSP) to find bypasses and missing directives.
- Shodan
A web-crawling search engine that lets users search for various types of servers connected to the internet.
- masscan
Internet scale portscanner.
- Keyscope
an extensible key and secret validation tool for auditing active secrets against multiple SaaS vendors
- Decompiler.com
Java, Android, Python, C# online decompiler.
General
1_ENTRIES- Strong node.js
An exhaustive checklist to assist in the source code security analysis of a node.js web service.
Tools
21_ENTRIES- NetworkMiner
A Network Forensic Analysis Tool (NFAT)
- Paros
A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
- pig
A Linux packet crafting tool
- findsubdomains
really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
- cirt-fuzzer
A simple TCP/UDP protocol fuzzer.
- ASlookup
a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
- ZAP
The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
- mitmsocks4j
Man-in-the-middle SOCKS Proxy for Java
- ssh-mitm
An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
- nmap
Nmap (Network Mapper) is a security scanner
- Aircrack-ng
An 802.11 WEP and WPA-PSK keys cracking program
- Nipe
A script to make Tor Network your default gateway.
- Habu
Python Network Hacking Toolkit
- Wifi Jammer
Free program to jam all wifi clients in range
- Firesheep
Free program for HTTP session hijacking attacks.
- Scapy
A Python tool and library for low level packet creation and manipulation
- Amass
In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
- sniffglue
Secure multithreaded packet sniffer
- Netz
Discover internet-wide misconfigurations, using zgrab2 and others.
- RustScan
Extremely fast port scanner built with Rust, designed to scan all ports in a couple of seconds and utilizes nmap to perform port enumeration in a fraction of the time.
- PETEP
Extensible TCP/UDP proxy with GUI for traffic analysis & modification with SSL/TLS support.
Tools
7_ENTRIES- Autopsy
A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools
- sleuthkit
A library and collection of command-line digital forensics tools
- EnCase
The shared technology within a suite of digital investigations products by Guidance Software
- malzilla
Malware hunting tool
- IPED - Indexador e Processador de EvidΓͺncias Digitais
Brazilian Federal Police Tool for Forensic Investigation
- CyLR
NTFS forensic image collector
- CAINE
CAINE is a Ubuntu-based app that offers a complete forensic environment that provides a graphical interface. This tool can be integrated into existing software tools as a module. It automatically extracts a timeline from RAM.
Tools
4_ENTRIES- xortool
A tool to analyze multi-byte XOR cipher
- John the Ripper
A fast password cracker
- Aircrack
Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
- Ciphey
Automated decryption tool using artificial intelligence & natural language processing.
System
7_ENTRIES- pwnable.kr
Provide various pwn challenges regarding system security
Reverse Engineering
4_ENTRIES- Reversing.kr
This site tests your ability to Cracking & Reverse Code Engineering
- CodeEngn
(Korean)
- simples.kr
(Korean)
- Crackmes.de
The world first and largest community website for crackmes and reversemes.
Web
8_ENTRIES- Hack This Site!
a free, safe and legal training ground for hackers to test and expand their hacking skills
- Hack The Box
a free site to perform pentesting in a variety of different systems.
- 0xf.at
a website without logins or ads where you can solve password-riddles (so called hackits).
- fuzzy.land
Website by an Austrian group. Lots of challenges taken from CTFs they participated in.
- TryHackMe
Hands-on cyber security training through real-world scenarios.
Cryptography
1_ENTRIESBug bounty
1_ENTRIESBug bounty - Earn Some Money
3_ENTRIES- Intigriti
Europe's #1 ethical hacking and bug bounty program.
Competition
15_ENTRIES- prompt(1) to win
XSS Challenges
General
8_ENTRIES- Hack+
An Intelligent network of bots that fetch the latest InfoSec content.
- CTFtime.org
All about CTF (Capture The Flag)
- Rookit Arsenal
OS RE and rootkit development
- Pentest Cheat Sheets
Collection of cheat sheets useful for pentesting
- Movies For Hackers
A curated list of movies every hacker & cyberpunk must watch.
- Roppers CTF Fundamentals Course
Free course designed to get a student crushing CTFs as quickly as possible. Teaches the mentality and skills required for crypto, forensics, and more. Full text available as a gitbook.
Online resources
3_ENTRIES- Security related Operating Systems @ Rawsec
Complete list of security related operating systems
- Best Linux Penetration Testing Distributions @ CyberPunk
Description of main penetration testing distributions
- Security @ Distrowatch
Website dedicated to talking about, reviewing and keeping up to date with open source operating systems
tools
9_ENTRIES- empire
A post exploitation framework for powershell and python.
- silenttrinity
A post exploitation tool that uses iron python to get past powershell restrictions.
- PowerSploit
A PowerShell post exploitation framework
- ebowla
Framework for Making Environmental Keyed Payloads
- SecTools
Top 125 Network Security Tools
- Roppers Security Fundamentals
Free course that teaches a beginner how security works in the real world. Learn security theory and execute defensive measures so that you are better prepared against threats online and in the physical world. Full text available as a gitbook.
- Roppers Practical Networking
A hands-on, wildly practical introduction to networking and making packets dance. No wasted time, no memorizing, just learning the fundamentals.
- Rawsec's CyberSecurity Inventory
An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. (Source)
- The Cyberclopaedia
The open-source encyclopedia of cybersecurity. GitHub Repository