githubEdit

Tools

Penetration Testing Tools

Information Gathering

  1. Nmaparrow-up-right - Network scanning and service discovery.

  2. Netcatarrow-up-right - A networking utility for debugging and exploration.

  3. Whoisarrow-up-right - Domain registration information.

  4. Sublist3rarrow-up-right - Subdomain enumeration.

  5. TheHarvesterarrow-up-right - Information gathering on emails, subdomains, and hosts.

  6. Amassarrow-up-right - Advanced subdomain enumeration tool.

  7. WhatWebarrow-up-right - Identifies technologies used by websites.

  8. dnsreconarrow-up-right - DNS enumeration tool.

  9. Digarrow-up-right - DNS lookup and analysis.

  10. FOCAarrow-up-right - Metadata analysis and information extraction.

Vulnerability Scanning

  1. Nessusarrow-up-right - Comprehensive vulnerability scanner.

  2. OpenVASarrow-up-right - Open-source vulnerability scanner.

  3. Niktoarrow-up-right - Web server scanner to find security issues.

  4. Wfuzzarrow-up-right - Brute-force web applications for directories and parameters.

  5. OWASP ZAParrow-up-right - Web application security scanner and proxy tool.

  6. Burp Suitearrow-up-right - Web application vulnerability scanner and proxy tool.

  7. Arachniarrow-up-right - Web application security scanner.

  8. Vegaarrow-up-right - A vulnerability scanner for web applications.

  9. Wapitiarrow-up-right - A web application scanner that supports multiple attack vectors.

  10. Skipfisharrow-up-right - A fast web application security scanner.

Exploitation

  1. Metasploitarrow-up-right - Exploitation framework for developing and executing exploits.

  2. BeEFarrow-up-right - Browser exploitation framework.

  3. SQLmaparrow-up-right - Automated SQL injection and database takeover tool.

  4. MSFvenomarrow-up-right - Payload generator and encoder.

  5. Ettercaparrow-up-right - Man-in-the-middle attack tool.

  6. Responderarrow-up-right - Tool for LLMNR, NBT-NS, and MDNS poisoning.

  7. Mimikatzarrow-up-right - Post-exploitation tool to extract plaintext passwords, hashes, PIN codes, and kerberos tickets.

  8. Empirearrow-up-right - Post-exploitation framework.

  9. Hydraarrow-up-right - Password brute-forcing tool.

  10. CrackMapExecarrow-up-right - Post-exploitation tool for automating common tasks on Windows networks.

Wireless Networking

  1. Aircrack-ngarrow-up-right - Wireless network security tools suite.

  2. Reaverarrow-up-right - WPS pin brute-force tool for breaking WPA2 networks.

  3. Wifitearrow-up-right - Wireless auditing tool for WPA and WEP.

  4. Kismetarrow-up-right - Wireless network detector, sniffer, and IDS.

  5. Fluxionarrow-up-right - Social engineering attack tool for WPA handshakes.

  6. Wiresharkarrow-up-right - Network protocol analyzer for sniffing traffic.

Password Cracking

  1. John the Ripperarrow-up-right - Password cracking tool.

  2. Hashcatarrow-up-right - Advanced password cracking tool supporting various algorithms.

  3. Aircrack-ngarrow-up-right - Cracks WEP and WPA-PSK keys.

  4. Cain & Abelarrow-up-right - Password recovery tool for various protocols.

  5. RainbowCrackarrow-up-right - Cracks hashes using pre-computed rainbow tables.

Post-Exploitation and Privilege Escalation

  1. LinPEASarrow-up-right - Linux privilege escalation audit script.

  2. Windows-Exploit-Suggesterarrow-up-right - Windows privilege escalation suggestion tool.

  3. PowerUparrow-up-right - PowerShell script for Windows privilege escalation.

  4. KernelExploitsarrow-up-right - Collection of known kernel exploits.

  5. Netcatarrow-up-right - Remote shell and backdoor tool.

  6. PsExecarrow-up-right - Windows tool to execute processes on remote systems.

  7. Lateral Movement Toolsarrow-up-right - Tools for lateral movement within networks.

Web Application Testing

  1. Burp Suitearrow-up-right - Web application proxy and vulnerability scanner.

  2. OWASP ZAParrow-up-right - Open-source web application security testing framework.

  3. Niktoarrow-up-right - Web server scanner.

  4. Gobusterarrow-up-right - Directory and subdomain brute-forcing tool.

  5. Ffufarrow-up-right - Fast web fuzzing tool for directories, files, and DNS.

  6. Commixarrow-up-right - Automated tool for testing and exploiting command injection vulnerabilities.

  7. XSSerarrow-up-right - Tool to automate the testing of Cross-Site Scripting (XSS) vulnerabilities.

Miscellaneous

  1. Social Engineering Toolkit (SET)arrow-up-right - A tool for automating social engineering attacks.

  2. Responderarrow-up-right - Poisoning attack tool for network credentials.

  3. Ncatarrow-up-right - A feature-packed networking tool for almost any task.

  4. Scapyarrow-up-right - A powerful Python-based network packet manipulation tool.

  5. Tsharkarrow-up-right - Command-line network protocol analyzer.

  6. Recon-ngarrow-up-right - Full-featured web reconnaissance framework.

  7. LinEnumarrow-up-right - Linux enumeration script for post-exploitation.

Last updated