Rawsec's CyberSecurity Inventory

An inventory of tools and resources about CyberSecurity.

Tools

Note: Paid softwares may exist in a free limited version or a demo version

Adversary Simulation

Name Website Source Description Programming language Price Online
Adversary Emulation Library [Source] A library of adversary emulation plans to allow organizations to evaluate their defensive capabilities against the real-world threats they face C Free False
Atomic Red Team [Source] A library of tests mapped to the MITRE ATT&CK® framework used to quickly, portably, and reproducibly test their environments Powershell Free False
Caldera [Source] Cyber security platform designed to easily automate adversary emulation, assist manual red-teams, and automate incident response Python Free False
Infection Monkey [Website] [Source] Adversary emulation platform; test a data center's resiliency to perimeter breaches and internal server infection Python Free False
Invoke-Apex [Source] PowerShell-based toolkit consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, adversary simulation, or other offensive security tasks PowerShell Free False
Manticore [Source] Adversary emulation command line tool is parsing complex scenarios from Manticore public-threats repository and run these scenarios Go Free False
MITRE ATT&CK Defender [Source] ATT&CK training and certification program produced by MITRE’s own ATT&CK subject matter experts Python Free False
Sliver [Source] Cross-platform adversary emulation/red team framework used by organizations of all sizes to perform security testing Go Free False
Stratus Red Team [Source] Stratus Red Team is 'Atomic Red Team' for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner Go Free False

Binary Exploitation

Name Website Source Description Programming language Price Online
ASLRay [Source] Tool for ASLR bypass with stack-spraying Shell Free False
heaphopper [Website] [Source] Bounded model checking framework for Heap-implementations Python Free False
libformatstr [Source] Library to simplify format string exploitation Python Free False
pwntools [Source] Framework and exploit development library Python Free False
pwntools-ruby [Source] Framework and exploit development library, ported onto ruby Ruby Free False
ROPgadget [Website] [Source] Framework for ROP exploitation Python Free False

Bug Bounty

Name Website Source Description Programming language Price Online
bbr [Source] Generation of bug bounty reports based on user provided templates Go Free False
bbrecon [Website] [Source] Service enumerating all targets on Internet covered by a bug bounty program Python Free True
BBstats [Source] Aggregate reports/bounties from different platforms in order to create combined stats and graphs PHP Free False
Bounty Dashboard [Source] Aggregate reports/bounties from different platforms in order to create combined stats and graphs, report and template management system, invoice creation system PHP Free False
bounty-targets [Source] Crawls bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) hourly and dumps them into another git repo Ruby Free False
BountyDash [Source] Dashboard to combine rewards from all platforms, giving insights about progress and bug hunting patterns PHP Free False
bountyplz [Source] Automated bug bounty reporting/submission, supports HackerOne and Bugcrowd Shell Free False
BugBounty Web App [Source] App that helps bug bounty hunters to manage their bounties and target list Python Free False
Bugbountydash [Source] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd JavaScript Free False
Hackerone::Client [Source] A limited client library for interacting with HackerOne Ruby Free False
Needle [Source] Chrome extension for instant access to bug bounty submission dashboard of various platforms and publicly disclosed reports HTML Free False

Cloud

Name Website Source Description Programming language Price Online
AWS Extender CLI [Source] Test S3 buckets as well as Google Storage buckets and Azure Storage containers for common misconfiguration issues Python Free False
aws_pwn [Source] Collection of AWS penetration testing scripts Python Free False
AzureADRecon [Source] Gathers information about the Azure Active Directory and generates a report which can provide a holistic picture of the current state of the target environment PowerShell Free False
CloudGPT [Source] Vulnerability scanner for AWS customer managed policies using ChatGPT Python Free False
CloudMapper [Source] Analyze AWS environments auditing for security issues Python Free False
CloudTracker [Source] Find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies Python Free False
IMDSpoof [Source] Cyber deception; spoofs the AWS IMDS service to return HoneyTokens that can be alerted on Go Free False
Pacu [Website] [Source] AWS exploitation framework Python Free False
Quiet Riot [Source] Unauthenticated enumeration of cloud principals Python Free False
Smogcloud [Source] Identify AWS cloud assets Go Free False

Code Analysis

Name Website Source Description Programming language Price Online
Adhrit [Website] [Source] Android APK reversing and analysis suite Python Free False
AndroBugs Framework [Source] Android APK vulnerability analyzer Python Free False
APKHunt [Source] Static code analysis for Android apps that is based on the OWASP MASVS framework Go Free False
APKLeaks [Source] Scanning APK file for URIs, endpoints and secrets Python Free False
Bearer [Website] [Source] Static application security testing tool that helps discover, filter, and prioritize security risks and vulnerabilities Go Free False
Brakeman [Website] [Source] Static analysis security vulnerability scanner for Ruby on Rails applications Ruby Free False
cIFrex [Website] [Source] Regexp static code analysis PHP Free False
CodeCat [Source] Automatic code static analysis tool to detect bugs and vulnerabilities Python Free False
CodeQL [Website] [Source] Semantic code analysis engine; discover vulnerabilities across a codebase, lets you query code as though it were data, write a query to find all variants of a vulnerability Free False
Dawnscanner [Source] Sstatic analysis security scanner for ruby written web applications; supports Sinatra, Padrino and Ruby on Rails frameworks Ruby Free False
Joern [Website] [Source] Code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs Scala Free False
Kube-hunter [Website] [Source] Scanner for security weaknesses in Kubernetes clusters Python Free False
LICMA [Website] [Source] Language Independent Crypto-Misuse Analysis; multi-language analysis tool to identify incorrect initialization of crypto functions Java Free False
MobSF [Website] [Source] Android APK vulnerability analyzer Python Free False
NodeJsScan [Source] Static security code scanner for Node.js applications Python Free False
QARK [Source] Android APK vulnerability analyzer Python Free False
Semgrep [Website] [Source] Static analysis engine for detecting vulnerabilities for many languages Ocaml Paid False
SonarQube [Website] [Source] Automatic code review tool to detect bugs, vulnerabilities; continuous code inspection automated with static code analysis rules Java Free False
StaCoAn [Source] Mobile applications static code analysis tool Python Free False
SUPER [Website] [Source] Android APK vulnerability analyzer Rust Free False
Tfsec [Website] [Source] Misconfiguration scanner for terraform code Go Free False
Trivy [Website] [Source] Vulnerability and misconfiguration scanner for containers (OS and language-specific packages) Go Free False
weggli [Source] Semantic search tool for C and C++ designed to help security researchers identify interesting functionality in large codebases Rust Free False
wpBullet [Source] Static code analysis for WordPress Plugins and Themes (and PHP) Python Free False

Collaboration and Report

Name Website Source Description Programming language Price Online
APTRS [Source] Collaborative penetration test, vulnerability database and reporting platform Python Free False
Archery [Website] [Source] Vulnerability Assessment and Management tool, run scan and manage vulnerabilities Python Free False
AttackForge.com [Website] Penetration test collaboration platform: vulnerability database and reporting Paid True
Bulwark [Source] Collaborative penetration test, vulnerability database and reporting platform JavaScript Free False
Canopy [Website] Penetration test platform: vulnerability database and reporting Paid False
Cervantes [Website] [Source] Collaborative penetration test, vulnerability database and reporting platform CSharp Free False
CTFNote [Source] Collaborative platform for CTF teams, event planning, credentials sharing, tasks management, notes taking JavaScript Free False
DART [Source] Documentation And Reporting Tool; Collaborative penetration test and vulnerability database platform Python Free False
DefectDojo [Website] [Source] Vulnerability management application built for DevOps and continuous security integration Python Free False
Dradis CE [Website] [Source] Collaborative penetration test, vulnerability database and reporting platform; Community edition Ruby Free False
Dradis Pro [Website] Collaborative penetration test, vulnerability database and reporting platform; Pro edition Ruby Paid False
Echidna [Source] Collaborative penetration test platform; terminal sharing, target information extraction, command suggestion, exploit searching, chatting, graph visualization JavaScript Free False
envizon [Website] [Source] Vulnerability management and reporting platform Ruby Free False
Faraday [Website] [Source] Collaborative penetration test and reporting platform Python Paid False
Ghostwriter [Website] [Source] Project management and reporting engine Python Free False
hackOx [Source] Modular web based pentesting interface designed to run on Raspberry Pi PHP Free False
Hackuity [Website] Risk Based Vulnerablity Management platform Paid False
Hive [Website] Collaborative penetration test and reporting platform Paid False
Kvasir [Source] Pentest data management tool Python Free False
Lair [Website] [Source] Collaborative penetration test and vulnerability management framework JavaScript Free False
MISP [Website] [Source] Malware Information Sharing Platform, an Open Source threat intelligence platform and open standards for threat information sharing PHP Free False
NightWriter [Source] Modern real-time collaborative editing tool secured by end-to-end encryption Go Free False
OSCP Exam Report Template in Markdown [Website] [Source] Markdown templates for OSCP exam report Markdown Free False
OWASP PenText [Website] [Source] Collection of XML templates, XML schemas and XSLT code, to generate IT security documents including test reports, offers and invoices Free False
PatrOwl [Website] [Source] Security operations orchestration and continuous threat management platform Python Free False
PeTeReport [Source] Collaborative penetration test, vulnerability database and reporting platform Python Free False
Pentest Collaboration Framework [Source] Collaborative penetration test, vulnerability database and reporting platform Python Free False
PentestPad [Website] Collaborative penetration test between team members and end-clients, vulnerability database and reporting platform Paid True
PenTest.WS [Website] Collaborative penetration test, vulnerability database and reporting platform Paid False
PlexTrac [Website] Collaborative penetration test reporting and vulnerability database platform Paid False
Pollenisator [Source] Collaborative penetration test and reporting platform (DB + clients, no WebUI) Python Free False
Prithvi [Website] [Source] Report generation tool for pentester with provided OWASP data JavaScript Free False
PTART [Source] PenTests, Audits, and Reporting Tool; Collaborative penetration test, vulnerability database and reporting platform; fork of Sh00t Python Free False
PurpleOps [Website] [Source] Self-hosted purple team management web application Python Free False
PwnDoc [Website] [Source] Collaborative penetration test reporting platform JavaScript Free False
PwnDoc-ng [Website] [Source] Collaborative penetration test reporting platform; fork and improvement of PwnDoc JavaScript Free False
Reconmap [Website] Penetration test planning, automation and reporting PHP Paid False
Reporter [Website] Collaborative penetration test reporting platform Paid True
Serpico [Source] SimplE RePort wrIting and CollaboratiOn tool, penetration testing report generation and collaboration tool Ruby Free False
Serpico-NG [Source] SimplE RePort wrIting and CollaboratiOn tool NEXT-GENERATION, penetration testing report generation and collaboration tool, fork of Serpico Ruby Free False
Sh00t [Source] Pentesting platform with dynamic task manager, checklists, bug template & bug report Python Free False
Smersh [Website] [Source] Pentest oriented collaborative tool used to track the progress of your company's engagements and generate reports PHP Free False
SwiftnessX [Source] Cross-platform note-taking and target-tracking app for penetration testers JavaScript Free False
SysReptor [Website] [Source] Collaborative penetration test, vulnerability database and reporting platform; supports findings in markdown, customized reports in HTML and VueJS, rendering to PDF, MFA, note-taking, data encryption, SSO Python Free False
vcr [Source] Vulnerability Compliance Report; parse Nessus CIS benchmark scan files and generate HTML reports PowerShell Free False
vuldash [Website] [Source] Vulnerability Dashboard; vulnerability database, project management and report generation PHP Free False
VULNREPO [Website] [Source] Vulnerability report generator JavaScript Free False
Vulnreport [Website] [Source] Pentesting management and automation platform Ruby Free False
WriteHat [Website] [Source] Collaborative penetration test reporting platform Python Free False
ZinnoX Reporting Tool [Website] ZRT; project management, vulnerability management and pentest report creation application Paid False

Configuration Audit

Name Website Source Description Programming language Price Online
CIS CAT Lite [Website] Asses systems against CIS Benchmarks Free False
CIS CAT Pro [Website] Asses systems against CIS Benchmarks Paid False
Iniscan [Source] php.ini scanner for security best practices PHP Free False
Local PHP Security Checker [Source] CLI tool that checks if your PHP application depends on PHP packages with known security vulnerabilities PHP Free False
Lynis [Website] [Source] Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. Shell Free False
Master librarian [Source] Audit Unix/*BSD/Linux system libraries to find public security vulnerabilities Python Free False
Nipper Studio [Website] Tool that parse router, switch, firewall configuration to discover vulnerabilities Paid False
Nipper-ng [Source] Tool that parse router, switch, firewall configuration to discover vulnerabilities CPlusPlus Free False
pcc [Source] PHP Secure Configuration Checker; parse php.ini to find security misconfiguration PHP Free False
PingCastle [Website] [Source] Assess the Active Directory security level with a methodology based on risk assessment CSharp Paid False
YASAT [Source] TYet Another Stupid Audit Tool; check general Linux system and common softwares configuration Shell Free False

Cracking

Name Website Source Description Programming language Price Online
bkcrack [Source] Crack legacy zip encryption with Biham and Kocher's known plaintext attack CPlusPlus Free False
BEWGor [Source] Bull's Eye Wordlist Generator, password wordlist generator based on target information Python Free False
Bopscrk [Source] Before Outset PaSsword CRacKing, password wordlist generator with exclusive features like lyrics based mode Python Free False
CeWL [Source] Custom wordlist generator based on website crawling Ruby Free False
ComPP [Source] Company Passwords Profiler helps making a bruteforce wordlist for a targeted company Python Free False
cook [Source] Wordlist generator: create permutations and combinations of words with predefined sets of extensions, words and patterns/function to create complex endpoints, wordlists and passwords Go Free False
Cracken [Source] Password wordlist generator, Smartlist creation and password hybrid-mask Rust Free False
CrackerJack [Website] [Source] Hashcat WebUI; session management, mask generation, API, notifications, local and LDAP authentication Python Free False
Cracklord [Website] [Source] Scalable, pluggable, and distributed system for hash cracking, supports Hashcat Go Free False
CrackQ [Source] Hashcat cracking queue system, API and WebUI Python Free False
crackpkcs12 [Source] Multithreaded program to crack PKCS#12 files (p12 and pfx extensions) C Free False
CrackStation [Website] [Source] Pre-computed lookup tables to crack password hashes PHP Free True
crunch [Source] Wordlist generator C Free False
CUPP [Source] Common User Passwords Profiler, wordlist generator based on user profiling Python Free False
Duplicut [Source] Remove duplicates from massive wordlist, without sorting it (for dictionary-based password cracking) C Free False
elpscrk [Source] Wordlist generator based on user profiling Python Free False
Fitcrack [Website] [Source] Hashcat-based distributed password cracking system with WebUI C Free False
GAU [Source] Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, Common Crawl, and URLScan for any given domain Go Free False
GeoWordlists [Source] Generate wordlists of passwords containing cities at a defined distance around the client city Python Free False
GoCrack [Source] Management frontend for hash cracking tools, supporting hashcat Go Free False
graphcat [Source] Generate graphs and charts based on password cracking results; supports hashcat and john the ripper potfile as well as ntds file Python Free False
Hashcat [Website] [Source] Hash cracking tool C Free False
hashcobra [Source] Hash cracking tool using rainbow tables CPlusPlus Free False
HashKitty [Source] Web interface for Hashcat TypeScript Free False
Hashpass [Source] Hashcat WebUI; queuing, local authentication, SMS and email notifications, map integration Ruby Free False
Hashtopolis [Source] Hashcat wrapper for distributed hashcracking PHP Free False
Hashview [Website] [Source] Web-UI for managing, organizing, automating Hashcat commands/tasks Python Free False
John The Ripper [Website] Hash cracking tool C Free False
John the Ripper, Jumbo version [Website] [Source] Hash cracking tool, community-enhanced version of John The Ripper C Free False
johnny [Website] [Source] GUI frontend to John the Ripper CPlusPlus Free False
kh2hc [Website] [Source] Convert OpenSSH known_hosts file hashed with HashKnownHosts to hashes crackable by Hashcat Ruby Free False
Kraken [Source] Hashcat-based distributed password cracking system with WebUI; has a desktop client in addition Java Free False
Kraker [Source] Distributed password brute-force system, supports Hashcat PHP Free False
longtongue [Source] Password wordlist generator based on target information Python Free False
lyricpass [Source] Tool to generate wordlists based on lyrics Python Free False
Mentalist [Source] Graphical tool for custom wordlist generation, can output rules compatible with Hashcat and John the Ripper Python Free False
Narthex [Website] [Source] Modular personalized dictionary generator C Free False
npk [Source] Distributed hash cracking platform meant to be deployed on AWS (Cognito, DynamoDB, S3) so you pay only when you have a task running JavaScript Free False
NTLM to password [Website] NTLM hash lookup table, billions of passwords indexed Free True
Ophcrack [Website] [Source] Windows hash cracker based on rainbow tables Free False
PACK [Source] A collection of utilities developed to aid in analysis of password lists in order to enhance password cracking through pattern detection of masks, rules, character-sets and other password characteristics Python Free False
pnwgen [Source] Phone number wordlist generator Python Free False
PowerSniper [Source] Password spraying script and helper for creating password lists PowerShell Free False
pydictor [Source] Multi-method password wordlist generator Python Free False
RubyHashcat [Website] [Source] Command line wrapper, library, and REST API for oclHashcat Ruby Free False
rulesfinder [Source] Machine-learn password mangling rules; finds efficient password mangling rules (for John the Ripper or Hashcat) for a given dictionary and a list of passwords Rust Free False
Spraygen [Source] Permutation-based password list generator Python Free False
TTPassGen [Source] Flexible and scriptable password dictionary/wordlist generator Python Free False
Wavecrack [Source] Hashcat WebUI; asynchronous task, chain tasks, statistics, export, segregation, local and LDAP authentication Python Free False
WebHashcat [Source] Hashcat WebUI with distributed cracking sessions and analytics Python Free False
WOG [Website] [Source] Weakpass rule-based online generator; generates a wordlist based on a set of words entered by the user JavaScript Free True
wordlist.rb [Source] Library for reading, combining, manipulating, and building wordlists, efficiently Ruby Free False
wordlistctl [Source] Fetch, install and search wordlist archives from websites and torrent peers Python Free False
wordlistgen [Source] Generate context-specific wordlists for content discovery from lists of URLs or paths Go Free False

Crisis Management

Name Website Source Description Programming language Price Online
Codechella Crisis Response [Source] An application curated to crisis zones to facilitate the dissemination of accurate mission-critical information from sources on the ground to key partners with minimal lag time Python Free False
Enki [Source] Crisis management platform Python Free False
NTU Crysis [Source] Crisis management web application / project for software systems analysis and design JavaScript Free False
OpenEx [Source] Platform allowing organizations to plan, schedule and conduct crisis exercises JavaScript Free False
OASIS EMF [Website] [Source] A reference implementation and toolkit for enabling standardized emergency information exchange using the OASIS Emergency Data Exchange Language (EDXL) Free False

Cryptography

Name Website Source Description Programming language Price Online
c7decrypt [Source] Cisco password type-7 encryptor and decryptor Ruby Free False
Cipher Suite Info [Website] [Source] A searchable directory of TLS ciphersuites and related security details Python Free True
crypto-condor [Website] [Source] Compliance testing of implementations of cryptographic primitives Python Free False
CryptoGuard [Source] Program analysis tool to find cryptographic misuse in Java and Android Java Free False
crypto-identifier [Source] Tool that try to identify what cipher is used and uncipher the data Python Free False
Crypton [Source] Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Hashing Algorithms along with example challenges from CTFs Python Free False
CRYPTOREX [Source] Large-scale firmware analysis of cryptographic misuse in IoT devices; supports ARM, MIPS, MIPSel architetures Python Free False
Cryscanner [Source] Identify misuse of cryptographic libraries by collecting and analysing logs Python Free False
Dcode [Website] Code and decode all kind of checksums, algorithms, codes or ciphers Free True
FeatherDuster [Source] Cryptanalysis tool and library Python Free False
Haiti [Website] [Source] Hash type identifier (CLI & lib) Ruby Free False
hashID [Source] Identify the different types of hashes Python Free False
houndsniff [Website] [Source] Identify the different types of hashes C Free False
JWT-Key-Recovery [Source] Recover the public key used to sign JWT tokens Python Free False
PkCrack [Website] Tool for breaking PkZip encryption Free False
RsaCtfTool [Source] Tool to conduct manual or automated attack on RSA Python Free False
RSATool [Source] Tool to calculate RSA parameters Python Free False
RSHack [Source] RSA attack and key manipulation tool Free False
XORTool [Source] Tool to analyze multi-byte xor cipher Python Free False

Defensive

Name Website Source Description Programming language Price Online
AnoMark [Source] Statistical learning algorithm to create a model on the command lines of the Process Creation events on Windows, in order to detect anomalies in future events Python Free False
BlueHound [Source] Helps blue teams pinpoint the security issues that actually matter by combining information about user permissions, network access and unpatched vulnerabilities, to reveal the paths attackers would take if they were inside the network TypeScript Free False
DARKSURGEON [Source] Windows project to empower incident response, digital forensics, malware analysis, and network defense with HashiCorp Packer and Vagrant PowerShell Free False
Deming [Source] Management tool for the information security management system (ISMS); manage, plan, track and report the effectiveness of security controls PHP Free False
DenyLocker [Source] Make the creation and maintenance of Applocker rules in blacklist mode easy and practical PowerShell Free False
driftctl [Source] Measures infrastructure as code coverage, and tracks infrastructure drift Go Free False
FalconHound [Source] Plug BloodHound with a SIEM or other log aggregation Go Free False
GraphQL Armor [Source] GraphQL security layer for Apollo and Yoga / Envelop servers TypeScript Free False
Have I Been Squatted? - Twistr [Website] [Source] Generate all permutations of a domain which are enriched for typosquatting detection Rust Free True
Imagemagick Security Policy Evaluator [Website] [Source] Allows developers and security experts to check if an Imagemagick XML Security Policy is hardened against a wide set of malicious attacks JavaScript Free True
libiris [Source] Cross-platform sandboxing library Rust Free False
Mercator [Source] Web application to manage the mapping of an information system as described in the Mapping The Information System Guide of the ANSSI PHP Free False
Pandora [Website] [Source] Analysis framework that discovers if a file is suspicious and conveniently show the results Python Free True
Pandora-box [Source] Detect and remove malware from USB disks (based on Pandora) Shell Free False
Santa [Source] Binary authorization system for macOS ObjC Free False
usbsas [Source] Tool and framework for securely reading untrusted USB mass storage devices Rust Free False
Wazuh [Website] [Source] Security monitoring solution for threat detection, integrity monitoring, incident response and compliance; unified XDR and SIEM protection for endpoints and cloud workloads C Free False
WHIDS [Source] EDR for Windows Go Free False

Digital Forensics

Name Website Source Description Programming language Price Online
Andriller [Source] Software utility with a collection of forensic tools for smartphones; performs read-only, non-destructive acquisition Python Free False
Cerbero Profiler [Website] File analyzer and inspector Paid False
ds_store_exp [Source] Extract files from .DS_Store recursively Python Free False
EML analyzer [Website] [Source] Analyze EML files: headers, bodies, attachments; extract IOCs; identify suspicious attachments Python Free False
ExifTool [Website] [Source] Library and CLI tool for reading, writing and editing metadata for a lot of file types Perl Free False
extundelete [Website] [Source] Tool to recover deleted files from an ext3 or ext4 partition Free False
Fibratus [Source] Tool for exploration and tracing of the Windows kernel Python Free False
Foremost [Website] [Source] CLI tool to recover files based on their headers, footers, and internal data structures Free False
ForensicMiner [Source] DFIR automation for collecting and analyzing evidence PowerShell Free False
FTK Imager [Website] Investigate electronic devices; full disk imaging capabilities: preview and image hard drives from Windows and Linux computers, CDs, DVDs, thumb drives, and other USB; forensic image mounting: mount an image for a read-only view that leverages file explorer; preview data; RAM capture Paid False
Live Forensicator [Source] Assist forensic investigators and incidence responders in carrying out a quick live forensic investigation PowerShell Free False
MVT [Website] [Source] Mobile Verification Toolkit; collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices Python Free False
rekall [Website] [Source] Volatile memory extraction utility Python Free False
rekall (Fireeye fork) [Source] Fork of rekall with support for Windows 10 memory compression Python Free False
ResourcesExtract [Website] Scans dll/ocx/exe files and extract all resources found, Windows only Free False
shellbags [Source] Shellbag parser (Windows Registry Keys) Python Free False
Tracee [Website] [Source] Linux runtime observability and forensics using eBPF to tap into the system and expose information as events that can be consumed Go Free False
Velociraptor [Website] [Source] Endpoint visibility and collection tool Go Free False
volatility [Website] [Source] Volatile memory extraction utility Python Free False
volatility (Fireeye fork) [Source] Fork of volatility with support for Windows 10 memory compression Python Free False

Hardware

Name Website Source Description Programming language Price Online
ChipWhisperer [Website] [Source] Toolchain for side-channel power analysis and glitching attacks C Free False
SmmBackdoorNg [Source] System Management Mode (SMM) backdoor for UEFI based platforms Python Free False

Honeypot and Decoy

Name Website Source Description Programming language Price Online
broneypote [Source] Honeypot Python Free False
Canarytokens [Website] [Source] Quickly deployable honeypot with docker image, the online service allows to get alerted by email for URL token, DNS token, unique email address, custom image, MS word doc., Acrobat Reader PDF doc., and more Python Free True
DejaVU [Source] Deception framework which can be used to deploy decoys across the infrastructure PHP Free False
Galah [Source] LLM-powered web honeypot using the OpenAI API Go Free False
pypotomux [Source] Protocol demuxed honeypot and wordlists collected from it Python Free False

Incident Response

Name Website Source Description Programming language Price Online
DFIR ORC [Website] [Source] Forensics artefact collection tool for systems running Microsoft Windows CPlusPlus Free False
DFIRTrack [Source] Incident response tracking web application, focused on handling one major incident with a lot of affected systems Python Free False
Fenrir [Source] IOC scanner Shell Free False
IntelMQ [Source] Solution for collecting and processing security feeds using a message queuing protocol Python Free False
IRIS [Website] [Source] Collaborative platform aiming to help incident responders sharing technical details during investigations Python Free False
Loki [Source] IOC scanner Python Free False
Munin [Source] Online hash checker for Virustotal and other services Python Free False
Osquery [Website] [Source] Uses SQL queries to monitor and analyze operating systems, providing endpoint visibility for security CPlusPlus Free False
SCOT [Website] [Source] Sandia Cyber Omni Tracker; cyber security incident response management system and knowledge base Perl Free False
Sigma [Source] Generic signature format for SIEM systems Python Free False
ThreatHound [Source] Windows event log file viewer and analyser Python Free False
uncoder.io [Source] Translate sigma rules into various SIEM, EDR, and XDR formats Free True
YARA [Website] [Source] Pattern matching helping malware researchers to identify and classify malware samples C Free False
yarAnalyzer [Source] Creates statistics on a yara rule set and files in a sample directory Python Free False
Yara Toolkit [Website] Yara rules editor, generator, scanner Python Free True
yarGen [Source] YARA rules generator Python Free False
YAYA [Source] Yet Another Yara Automaton; automatically curate open source yara rules and run scans Go Free False

Intentionally Vulnerable Applications

Name Website Source Description Programming language Price Online
Bodhi [Source] Client-side vulnerability playground, CTF style application, a bot program which simulates the real-world victim Python Free False
Bust-A-Kube [Website] Intentionally-vulnerable Kubernetes cluster, intended to help people self-train on attacking and defending Kubernetes clusters PHP Free False
bWAPP [Website] [Source] Buggy Web Application, insecure webapp for security trainings PHP Free False
DVIA [Website] [Source] Damn Vulnerable iOS App, insecure webapp for mobile security trainings Swift Free False
DVGA [Source] Damn Vulnerable GraphQL Application, insecure webapp for GraphQL security trainings Python Free False
DVWA [Website] [Source] Damn Vulnerable Web Application, insecure webapp for security trainings PHP Free False
Google Gruyere [Website] [Source] Codelab for white-box and black-box hacking Python Free True
Hackazon [Source] Intentionally vulnerable web shopping application using modern technologies and containing configurable areas PHP Free False
Metasploitable [Source] VM that is built from the ground up with a large amount of security vulnerabilities Free False
OWASP Juice Shop [Website] [Source] Insecure web application with >85 challenges; supports CTFs, custom themes, tutorial mode etc. JavaScript Free False
OWASP Mutillidae II [Website] [Source] Intentionally vulnerable web-application containing some OWASP Top Ten vulnerabilities, with hints and switch for secure version of the code PHP Free False
OWASP WebGoat [Website] [Source] Deliberately insecure web application to teach web application security lessons Java Free False
simulator [Source] Distributed systems and infrastructure simulator for attacking and debugging Kubernetes, creates a Kubernetes cluster in AWS and runs scenarios which misconfigure it or leave it vulnerable to compromise to train in mitigating against these vulnerabilities Python Free False
VAmPI [Source] Vulnerable REST API with OWASP top 10 vulnerabilities for security testing Python Free False
XVNA [Source] Extreme Vulnerable Node Application, insecure webapp for security trainings JavaScript Free False

Networking

Name Website Source Description Programming language Price Online
ActiveDirectoryEnumeration [Source] Enumerate AD through LDAP with a collection of helpfull scripts being bundled: ASREPRoasting, Kerberoasting, dump AD as BloodHound JSON files, searching GPOs in SYSVOL for cpassword and decrypting, run without creds Python Free False
Adalanche [Source] Active Directory ACL visualizer and explorer; similar to BloodHound Go Free False
ad-ldap-enum [Source] LDAP based Active Directory user and group enumeration tool Python Free False
ADCSKiller [Source] ADCS exploitation automation by weaponizing Certipy and Coercer Python Free False
ADenum [Source] Find misconfiguration through the LDAP protocol and exploit some weaknesses with kerberos Python Free False
adfsbrute [Source] Test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks Python Free False
adidnsdump [Source] Enumeration and exporting of all DNS records in ADIDNS domain or forest DNS zones Python Free False
ADMiner [Source] Active Directory audit tool that extract data from Bloodhound to uncover security weaknesses and generate an HTML report Python Free False
ADRecon [Source] Gathers information about the Active Directory and generates a report which can provide a holistic picture of the current state of the target AD environment PowerShell Free False
archtorify [Source] Script for Arch Linux which use iptables settings to create a transparent proxy through Tor Network Shell Free False
Arecibo [Source] Endpoint for Out-of-Band Exfiltration (DNS & HTTP) Python Free False
arp-scan [Source] Discover hosts on your network using ARP requests C Free False
ASNmap [Source] CLI and Library for quickly mapping organization network ranges using ASN information Go Free False
beanshooter [Source] JMX enumeration and attacking; helps to identify common vulnerabilities on JMX endpoints Java Free False
bettercap [Website] [Source] MITM framework Ruby Free False
bettercap web UI [Website] [Source] Web UI for bettercap TypeScript Free False
bloodyAD [Source] Active Directory privilege escalation framework Python Free False
boofuzz [Source] Network protocol fuzzing framework Python Free False
Boomerang [Source] Client/Server HTTP pivoting tool Go Free False
bore [Source] Creates a TCP tunnel; exposing local ports to a remote server, bypassing standard NAT connection firewalls Rust Free False
BruteSpray [Source] Takes nmap GNMAP/XML output or newline seperated JSONS and automatically brute-forces services with default credentials using Medusa Python Free False
BruteX [Source] Tool using nmap and hydra to automatically bruteforce network service accounts Shell Free False
Carnivore [Website] [Source] Assessment of on-premises Microsoft servers such as ADFS, Skype, Exchange, and RDWeb CSharp Free False
CapAnalysis [Website] [Source] PCAP analyzer C Free True
Cerbrutus [Source] Network services credentials brute-forcer: SSH, FTP Python Free False
Certipy [Source] Active Directory Certificate Services enumeration and exploitation Python Free False
certsync [Source] Dump NTDS with golden certificates and UnPAC the hash Python Free False
chisel [Source] Fast TCP tunneling over HTTP secured by SSH Go Free False
CloudShark [Website] PCAP analyzer Paid True
Coercer [Source] Coerce a Windows server to authenticate on an arbitrary machine through 12 methods Python Free False
ConPass [Source] Password spraying in Active Directory checking the default domain password policy as well as PSO and the badpwdcount LDAP attribute to avoid account locking Python Free False
CrackMapExec [Source] Post-exploitation tool to assess Active Directory networks Python Free False
DC Detector [Source] Spot all domain controllers in a Microsoft Active Directory environment, find computer name, FQDN, and IP address(es) of all DCs Ruby Free False
DnsFookup [Source] Create DNS request collector and inspector Python Free False
DNS Rebinding Tool [Website] [Source] Toolkit to test further DNS rebinding attacks JavaScript Free True
Evil-WinRM [Source] Enhanced WinRM shell Ruby Free False
evilginx2 [Source] Man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication Go Free False
Garfield [Source] Attack framework for distributed systems Python Free False
Girsh [Source] Detect the OS and execute the correct commands to upgrade it to a full interactive reverse shell Go Free False
Go-RouterSocks [Source] Socks proxy router to handle multi-clients on the same port Go Free False
go-secdump [Source] Remotely dump secrets from the Windows registry (SAM hive, LSA secrets, SECURITY hive) Go Free False
GoldenCopy [Source] Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket Python Free False
GoMapEnum [Source] User enumeration and password bruteforce on Azure, ADFS, OWA, O365 and gather emails on Linkedin Go Free False
goddi [Source] Active Directory domain information dumper Go Free False
Group3r [Source] Enumerate relevant settings in AD Group Policy, identify exploitable misconfigurations CSharp Free False
HASSH [Source] Network fingerprinting standard which can be used to identify specific client and server SSH implementations Python Free False
HEKATOMB [Source] Retrieve all computers and users informations from AD LDAP; download all DPAPI blob of all users from all computers and uses Domain backup keys to decrypt them Python Free False
HellRaiser [Source] Scan with nmap to correlate CPE's found with cve-search to enumerate vulnerabilities Ruby Free False
HivExcavator [Source] Extracting the contents of Microsoft Windows Registry (hive) and display it as a colorful tree but mainly focused on parsing BCD files to extract WIM files path for PXE attacks Ruby Free False
hoaxshell [Source] Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell Python Free False
HTTPRebind [Source] Automatic DNS rebinding-based SSRF attacks Python Free False
Hydra [Website] [Source] Network login cracker C Free False
Ica2Tcp [Source] SOCKS proxy for Citrix C Free False
ImproHound [Source] Identify the attack paths in BloodHound breaking AD tiering CSharp Free False
Jaqen [Source] Abstracts away the complex steps required to perform a DNS rebind and exposes a HTML5 Fetch interface which transparently triggers a DNS rebind Go Free False
kalitorify [Source] Script for Kali Linux which use iptables settings to create a transparent proxy through Tor Network Shell Free False
Kerbrute [Source] Bruteforce and enumerate valid Active Directory accounts through Kerberos Pre-Authentication Go Free False
KRBJack [Source] DNS dynamic update abuse in ADIDNS via DSPROPERTY_ZONE_ALLOW_UPDATE set to ZONE_UPDATE_UNSECURE combined with MitM attack using Kerberos AP-REQ hijacking Python Free False
Krbrelayx [Website] [Source] Toolkit for abusing unconstrained delegation Python Free False
KubeHound [Source] Kubernetes attack graph tool allowing automated calculation of attack paths between assets in a cluster Go Free False
LDAPmonitor [Source] Monitor creation, deletion and changes to LDAP objects live during pentest or system administration Python Free False
ldeep [Source] Active Directory LDAP enumeration utility Python Free False
Legba [Source] Multiprotocol credentials bruteforcer, password sprayer and enumerator Rust Free False
Ligolo [Source] Pivot / reverse tunneling tool with SOCKS5 and TCP tunnel support Go Free False
Ligolo-ng [Source] Pivoting via TCP/TLS reverse tunneling with TUN interface Go Free False
linWinPwn [Source] Script that automates a number of Active Directory enumeration and vulnerability checks Python Free False
Locksmith [Source] Find and fix common misconfigurations in AD CS PowerShell Free False
lsassy [Source] CLI tool and library to extract credentials from lsass remotely Python Free False
Mail.Rip V2 [Source] SMTP credentials bruteforcer / checker Python Free False
Malifar [Source] GPU-accelerated NSEC3 zone dumper Python Free False
MAN-SPIDER [Source] Crawl SMB shares for juicy information; supports file content searching and regex Python Free False
Masscan [Source] Port scanner for massive networks C Free False
Medusa [Website] [Source] Network login cracker C Free False
Medusa-gui [Source] GUI for Medusa Java Free False
modifyCertTemplate [Website] [Source] Aid operators in modifying ADCS certificate templates so that a created vulnerable state can be leveraged for privilege escalation Python Free False
MSSQLRelay [Website] [Source] MSSQL relay audit and abuse Python Free False
naabu [Website] [Source] Port scanner with a focus on reliability and simplicity Go Free False
ncat [Website] [Source] Improved reimplementation of Netcat by nmap team; Supports TCP and UDP, IPv4 and IPv6, SSL, proxy (HTTP and SOCKS4) C Free False
Ncrack [Website] [Source] Reliable and adaptative network login cracker supporting a large number of protocols CPlusPlus Free False
nemesis [Website] [Source] Packet manipulation CLI tool; craft and inject packets of several protocols Python Free False
NetExec [Website] [Source] Windows / Active Directory environments pentest; fork of CrackMapExec Python Free False
Netfort Free Cloud Based PCAP Analysis [Website] PCAP analyzer; needs registration Free True
NetworkMiner [Website] Network sniffer/packet capturing tool Free False
NetworkTotal [Website] PCAP analyzer; using Suricata Free True
ngocok [Source] ngrok collaborator link Go Free False
Nipe [Source] Script to make TOR as default gateway Perl Free False
Nmap [Website] [Source] Tool for network discovery and security auditing C Free False
nmap-parse-output [Source] Converts / manipulates / extracts data from a nmap scan output Shell Free False
NMapGUI [Source] Advanced GUI for Nmap Java Free False
Nozzlr [Source] Multithreaded and modular bruteforce framework with network templates Python Free False
nsec3map [Source] NSEC/NSEC3 zone dumper Python Free False
ntlm_theft [Source] Generate multiple types of NTLMv2 hash theft files Python Free False
onesixtyone [Source] SNMP scanner C Free False
OOB-Server [Source] Bind9 DNS server for pentesters to use for Out-of-Band vulnerabilities Shell Free False
owabrute [Source] Hydra wrapper for bruteforcing Microsoft Outlook Web Application Shell Free False
PacketFu [Source] Packet manipulation library; forge, send, decode, capture packets of a wide number of protocols Ruby Free False
PacketTotal [Website] PCAP analyzer; using Bro (Zeek), Suricata and Elasticsearch Free True
PacketWhisper [Source] Stealthy Data exfiltration via DNS, without the need for attacker-controlled Name Servers or domain Python Free False
Patator [Source] Multi-protocol bruteforce tool Python Free False
PKINIT tools [Source] Kerberos PKINIT and relaying to AD CS Python Free False
polarbearscan [Website] [Source] Port scanner and banner grabber C Free False
PolarDNS [Source] Specialized authoritative DNS server suitable for penetration testing and vulnerability research Python Free False
Polymorph [Source] Real-time network packet manipulation framework Python Free False
PowerHuntShares [Source] Audit script to inventory, analyze, and report excessive privileges assigned to SMB shares on Active Directory domain joined computers PowerShell Free False
PSPKIAudit [Source] AD CS auditing based on the PSPKI toolkit PowerShell Free False
pty4all [Source] Persistent multi reverse shell handler Shell Free False
pwncat [Website] [Source] Sophisticated bind and reverse shell handler with many features as well as a drop-in replacement or compatible complement to netcat, ncat or socat Python Free False
pwncat-caleb [Website] [Source] Fancy reverse and bind shell handler, can perform automated actions on the remote host including enumeration, implant installation and privilege escalation; attempt to spawn a pseudoterminal (pty) for a full interactive session Python Free False
pyGPOAbuse [Source] Partial python implementation of SharpGPOAbuse; modify an existing GPO by creating an immediate scheduled task as SYSTEM on the remote computer for computer GPO or logged in user for user GPO Python Free False
pywerview [Source] A partial Python rewriting of PowerSploit's PowerView Python Free False
PyWhisker [Source] Persistent and stealthy backdooring of user and computer Active Directory objects Python Free False
PyWSUS [Website] [Source] WSUS server designed to send malicious responses to clients Python Free False
rbndr [Source] Server for testing software against DNS rebinding vulnerabilities C Free False
rdp-sec-check [Source] Script to enumerate security settings of an RDP Service Perl Free False
reGeorg [Source] SOCKS proxies through the DMZ for pivoting Python Free False
Responder [Source] LLMNR, NBT-NS and MDNS poisoner to intercept authentication requests/answers Python Free False
Rebind [Source] Implements multiple A record DNS rebinding attack Free False
RMIScout [Website] [Source] Enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities through wordlist and bruteforce strategies Java Free False
RouterSploit [Source] Exploitation framework for embedded devices: exploits, default credentials, scanners, payloads Python Free False
Rubeus [Source] Kerberos interaction and abuses CSharp Free False
ruby-nmap [Source] Library for nmap, allows automating nmap and parsing nmap XML files Ruby Free False
Rustcat [Website] [Source] Port and reverse shell listener; less features than ncat, pwncat, pwncat-caleb but has command history Rust Free False
RustHound [Website] [Source] Active Directory data collector for BloodHound Rust Free False
sandmap [Website] [Source] Metasploit-like CLI interface for Nmap Script Engine (NSE) Shell Free False
Scapy [Website] [Source] Packet manipulation library; forge, send, decode, capture packets of a wide number of protocols Python Free False
SCCMHunter [Source] Streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain Python Free False
SELKS [Website] [Source] IDS / IPS / NSM Debian distribution based on Suricata Free False
Seth [Source] RDP MitM tool Python Free False
Shovel [Source] Traffic analyser; web interface to explore Suricata EVE outputs Python Free False
SilentHound [Source] Quietly enumerates an Active Directory Domain via LDAP parsing users, admins, groups Python Free False
SiLK [Website] System for Internet-Level Knowledge; collection of traffic analysis tools developed to facilitate security analysis of large networks Free False
Singularity [Website] [Source] DNS rebinding attack framework Go Free False
sJET [Source] JMX Exploitation Toolkit Python Free False
smbclient-ng [Source] SMB shares interaction Python Free False
Snaffler [Source] Find credentials and valuable information from windows active directory environments (shares, files) CSharp Free False
SNMP Brute [Source] SNMP brute force, enumeration, CISCO config downloader and password cracking script Python Free False
snmpbw.pl [Source] Multithreaded script for bulk walking targeted host systems for SNMP data Perl Free False
Snort [Website] [Source] Intrusion detection system that monitors network traffic for suspicious activities and threats C Free False
SprayHound [Source] Password spraying in Active Directory checking the default domain password policy and the badpwdcount LDAP attribute to avoid account locking, set pwned users as owned in Bloodhound and detect path to Domain Admins Python Free False
ssh-audit [Website] [Source] SSH scanner that detects protocol, version, grab banner, recognize software and operating system, output algorithm information and recommendations Python Free False
sshame [Source] Brute force SSH public-key authentication interactively Python Free False
Sshimpanzee [Website] [Source] Builds a static reverse SSH server for pivoting; supports HTTP and SOCKS5 proxies, DNS and ICMP tunnelling, HTTP encapsulation Python Free False
Suricata [Website] [Source] Intrusion detection system and intrusion prevention system for network analysis and threat detection C Free False
Suricata Language Server [Website] [Source] Implementation of the Language Server Protocol for Suricata signatures; real-time rule syntax checking and auto-completion Python Free False
Tsunami [Source] Network security scanner with an extensible plugin system Java Free False
Turner [Source] Tunnels HTTP over a permissive/open TURN server; supports HTTP and SOCKS5 proxy Go Free False
WebMap v1 [Source] A web dashboard for nmap XML report Python Free False
WebMap v2 [Source] A web dashboard for nmap XML report Python Free False
Whonow [Source] DNS Server for executing DNS Rebinding attacks JavaScript Free False
windapsearch [Source] Script to enumerate users, groups and computers from a Windows domain through LDAP queries Python Free False
Wireshark [Website] [Source] Network protocol analyzer CPlusPlus Free False
WireSocks [Source] WireGuard socks proxy for pentest pivoting Shell Free False
Whisker [Source] Take over Active Directory user and computer accounts by manipulating their msDS-KeyCredentialLink attribute, effectively adding Shadow Credentials to the target account CSharp Free False
wmiexec-Pro [Source] Perform different ways of command execution via WMI protocol (port 135) for AV evasion Python Free False
XFLTReaT [Source] Tunnelling framework; supports TCP, UDP, ICMP, SOCKS, HTTP, SCTP, WebSocket, RDP Python Free False
Xprobe2 [Source] Remote active operating system fingerprinting CPlusPlus Free False
yersinia [Source] Framework for layer 2 attacks C Free False
Zeek [Website] [Source] Intrusion detection system for network traffic analysis and security monitoring; formerly Bro CPlusPlus Free False
Zenmap [Website] [Source] GUI for Nmap Python Free False
Zmap [Website] [Source] Collection of tools to scan and study massive networks C Free False
zone-walker [Source] NSEC zone dumper JavaScript Free False

OSINT and Reconnaissance

Name Website Source Description Programming language Price Online
alterx [Source] Customizable subdomain wordlist generator using DSL Go Free False
Amass [Website] [Source] DNS enumeration and network mapping tool suite: scraping, recursive brute forcing, crawling web archives, reverse DNS sweeping Go Free False
Argus [Source] All-in-one toolkit for information gathering and reconnaissance Python Free False
Asnlookup [Source] Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it Python Free False
AttackSurfaceMapper [Source] Subdomain enumerator Python Free False
AutoRecon [Source] Multi-threaded network reconnaissance tool which performs automated enumeration of services Python Free False
badKarma [Source] Advanced network reconnaissance tool Python Free False
BBOT [Source] OSINT framework; subdomain enumeration, port scanning, web screenshots, vulnerability scanning Python Free False
Belati [Source] OSINT tool, collect data and document actively or passively Python Free False
Bitcrook [Source] Reconnaissance Apparatus; Information gathering, conglomerate of tools including custom algorithms, API wrappers Go Free False
cariddi [Source] Takes a list of domains, crawls urls and scans for endpoints, secrets, api keys, file extensions, tokens Go Free False
Certstream [Website] [Source] Intelligence feed that gives real-time updates from the Certificate Transparency Log network Elixir Free False
Darkshot [Source] Lightshot scraper with multi-threaded OCR and auto categorizing screenshots Python Free False
dataleaks [Source] Self-hosted data breach search engine PHP Free False
datasploit [Website] [Source] OSINT framework, find, aggregate and export data Python Free False
DeadTrap [Website] [Source] Track down footprints of a phone number Python Free False
DNSDumpster [Website] Domain research tool that can discover hosts related to a domain Free True
dnsenum [Source] DNS reconnaissance tool: AXFR, DNS records enumeration, subdomain bruteforce, range reverse lookup Perl Free False
dnsenum2 [Source] Continuation of dnsenum project Perl Free False
DNSRecon [Source] DNS reconnaissance tool: AXFR, DNS records enumeration, TLD expansion, wildcard resolution, subdomain bruteforce, PTR record lookup, check for cached records Python Free False
dnsx [Source] Multi-purpose DNS toolkit allow to run multiple DNS queries Go Free False
domainfinder [Source] Find a domain from an IP address Python Free False
Domainim [Source] Domain reconnaissance for organizational network scanning Nim Free False
EagleEye [Source] Image recognition on instagram, facebook and twitter Python Free False
Espionage [Source] Domain information gathering: whois, history, dns records, web technologies, records Python Free False
eTools.ch [Website] Metasearch engine, query 16 search engines in parallel Free True
Facebook_OSINT_Dump [Source] OSINT tool, facebook profile dumper, windows and chrome only Shell Free False
FinalRecon [Source] Web reconnaissance script Python Free False
Findomain [Source] Fast subdomain enumerator Rust Free False
FOCA [Website] [Source] OSINT framework and metadata analyser Csharp Free False
Geolocation Estimation [Website] Automatic GEOINT using deep learning Free True
GHunt [Source] Investigate Google accounts with emails and find name, usernames, Youtube Channel, probable location, Maps reviews, etc. Python Free False
GitFive [Source] Investigate GitHub profiles; features: username history, email address to GitHub account, finds potential secondary GitHub accounts, dumps SSH public keys, etc. Python Free False
gitGraber [Source] Monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, Github, Mailgun, Facebook, Twitter, Heroku, Stripe, etc. Python Free False
GitHound [Source] Find sensitive information in git repositories Go Free False
gittyleaks [Source] Find sensitive information (username, password, email) in git repositories Python Free False
GooFuzz [Source] Passive reconaissance enumerating directories, files, subdomains or parameters using google dorks Shell Free False
Gorecon [Source] Reconnaissance toolkit Go Free False
GoSeek [Source] Username lookup comparable to Maigret/Sherlock, IP Lookup, License Plate & VIN Lookup, Info Cull, and Fake Identity Generator Go Free False
gOSINT [Source] OSINT framework; find mails, dumps, retrieve Telegram history and info about hosts Go Free False
h8mail [Source] Email OSINT & Password breach hunting tool; supports chasing down related email Python Free False
Harpoon [Source] CLI tool; collect data and document actively or passively Python Free False
holehe [Source] Check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function Python Free False
Hunt3r [Website] [Source] Automatic domain recognition (via amass) and vulnerability scan (via nuclei) platform with a WebUI Ruby Free False
Ignorant [Source] Check if a phone number is used on different sites like snapchat, instagram Python Free False
IVRE [Website] [Source] IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks); network recon framework including tools ofr passive and active recon Python Free False
kitphishr [Source] Hunts for phishing kit source code by traversing URL folders and searching in open directories for zip files; supports list of URLs or PhishTank Go Free False
Kostebek [Source] Tool to find firms domains by searching their trademark information Python Free False
LeakDB [Source] Normalize, deduplicate, index, sort, and search leaked data sets on the multi-terabyte-scale Go Free False
LeakIX [Website] Search engine for devices and services exposed on the Internet Free True
LeakLooker [Source] Discover, browse and monitor database/source code leaks Python Free False
leakScraper [Source] Set of tools to process and visualize huge text files containing credentials Python Free False
LinEnum [Source] System script for local Linux enumeration and privilege escalation checks Shell Free False
LinkedInDumper [Source] Dump company employees from LinkedIn API Python Free False
LittleBrother [Source] Information gathering (OSINT) on a person (EU), checks social networks and Pages Jaunes Python Free False
Maigret [Source] Collect a dossier on a person by username from a huge number of sites, and extract details from them Python Free False
Malfrat's OSINT Map [Source] A web-based collection of tools and resources for OSINT; successor of OSINT Framework JavaScript Free True
mantis [Website] [Source] Command-line framework designed to automate the workflow of asset discovery, reconnaissance, and scanning Python Free False
MassDNS [Source] High-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) C Free False
Metabigor [Source] Searching information about IP address, ASN and organization; doesn't require any API key Go Free False
mihari [Source] Aggregates results from Shodan, Censys, VirusTotal, SecurityTrail, etc. and extracts artifacts (IP addresses, domains, URLs or hashes) Ruby Free False
Netflip [Source] Scrape sensitive information from paste sites CSharp Free False
NExfil [Source] Finding profiles by username over 350 websites Python Free False
Nmmapper [Website] Cybersecurity tools offered as SaaS: nmap, subdomain finder (Sublist3r, DNScan, Anubis, Amass, Lepus, Findomain, Censys), theHarvester, etc. Paid True
nqntnqnqmb [Source] Retrieve information on linkedin profiles, companies on linkedin and search on linkedin companies/persons Python Free False
Oblivion [Source] Data leak checker and monitoring Python Free False
ODIN [Source] Observe, Detect, and Investigate Networks, Automated reconnaissance tool Python Free False
Omnibus [Source] OSINT framework; collection of tools Python Free False
OneForAll [Source] Subdomain enumeration tool Python Free False
OnionSearch [Source] Script that scrapes urls on different .onion search engines Python Free False
OSINT Framework [Website] [Source] A web-based collection of tools and resources for OSINT JavaScript Free True
Osintgram [Source] Interactive shell to perform analysis on Instagram account of any users by their nickname Python Free False
Osmedeus [Website] [Source] Automated framework for reconnaissance and vulnerability scanning Python Free False
Photon [Source] Fast crawler designed for OSINT Python Free False
PITT [Source] Web browser loaded with links and extensions for doing OSINT Free False
ProjectDiscovery [Website] [Source] Monitor, collect and continuously query the assets data via a simple webUI Go Free True
ReconDog [Source] Multi-purpose reconnaissance tool, CMS detection, reverse IP lookup, port scan, etc. Python Free False
reconFTW [Source] Perform automated recon on a target domain by running set of tools to perform scanning and finding out vulnerabilities Shell Free False
Recon-ng [Source] Web-based reconnaissance tool Python Free False
Reconnoitre [Source] Tool made to automate information gathering and service enumeration while storing results Python Free False
ReconScan [Source] Network reconnaissance and vulnerability assessment tools Python Free False
Recsech [Source] Web reconnaissance and vulnerability scanner tool PHP Free False
Redscan [Source] Mix of a security operations orchestration, vulnerability management and reconnaissance platform Python Free False
Red Team Arsenal [Source] Automated reconnaissance scanner and security checks Python Free False
reNgine [Website] [Source] Automated recon framework for web applications; customizable scan engines & pipeline of reconnaissance Python Free False
reNgine-ng [Website] [Source] Automated recon framework for web applications; customizable scan engines & pipeline of reconnaissance (reNgine Fork) Python Free False
SearchDNS [Website] Netcraft tool; Search and find information for domains and subdomains Free True
Sherlock [Website] [Source] Hunt down social media accounts by username across social networks Python Free False
Shodan [Website] Search devices connected to the internet; helps find information about desktops, servers, IoT devices; including metadata such as the software running Free True
shosubgo [Source] Grab subdomains using Shodan api Go Free False
shuffledns [Source] Wrapper around massdns that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support Go Free False
SiteBroker [Source] Tool for information gathering and penetration test automation Python Free False
Sn1per [Source] Automated reconnaissance scanner Shell Paid False
spiderfoot [Website] [Source] OSINT framework, collect and manage data, scan target Python Free False
Stalker [Source] Automated scanning of social networks and other websites, using a single nickname Python Free False
SubDomainizer [Source] Find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github Python Free False
subfinder [Website] [Source] Discovers valid subdomains for websites, designed as a passive framework to be useful for bug bounties and safe for penetration testing Go Free False
Sublist3r [Source] Subdomains enumeration tool Python Free False
subzuf [Source] DNS response-guided subdomain fuzzer Python Free False
Sudomy [Source] Subdomain enumeration tool Python Free False
Tempest [Source] Leverage paste sites as a medium for discovery of objectionable/infringing materials Go Free False
Th3inspector [Source] Multi-purpose information gathering tool Perl Free False
theHarvester [Source] Multi-purpose information gathering tool: emails, names, subdomains, IPs, URLs Python Free False
tinfoleak [Source] Twitter intelligence analysis tool Python Free False
Totem [Source] Retrieve information about ads of a facebook page, retrieve the number of people targeted, how much the ad cost and a lot of other information Python Free False
trape [Source] Analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time Python Free False
TruffleHog [Source] Find secret information in git repositories Go Free False
TWINT [Source] Twitter Intelligence Tool; Twitter scraping & OSINT tool that doesn't use Twitter's API, allowing one to scrape a user's followers, following, Tweets and more while evading most API limitations Python Free False
uncover [Source] Discover exposed hosts on the internet using multiple search engines Go Free False
waymore [Source] Find links from Wayback Machine, Common Crawl, Alien Vault OTX and URLScan; download the archived responses for URLs on Wayback Machine Python Free False
yar [Source] Find secret information (secrets, tokens, passwords) in git repositories Go Free False

Other

Name Website Source Description Programming language Price Online
ADB-Toolkit [Source] Wrapper around adb to ease certain tasks Shell Free False
ADeleg [Source] Active Directory delegation management tool allowing to make a detailed inventory of delegations set up so far in a forest Rust Free False
AppsecStudy [Website] [Source] eLearning management system for information security PHP Free True
Atheris [Source] Coverage-guided Python fuzzing engine Shell Free False
Avast Hack Check [Website] Service to check if an account has been compromised in a data breach, send an email with the breaches not the password Free True
Axiom [Source] Dynamic infrastructure framework to distribute the workload of many different scanning tools with ease Shell Free False
BHQW [Source] Extract information from BloodHound and Neo4J Python Free False
BQM [Website] Bloodhound Query Merger; deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file Ruby Free False
BreachDirectory [Website] Service to check if an account has been compromised in a data breach, display the breaches, partial password and hash Free True
Cameradar [Website] RTSP stream access; detect open hosts, device model, automated dictionary attacks on stream route and credentials Ruby Free False
ccs [Source] Code Credential Scanner; scan a large, diverse codebase for hard-coded credentials, or credentials present in configuration files Python Free False
changedetection.io [Source] Self-hosted website change detection tracking, monitoring and notification service Python Free False
ConvertHound [Source] Convert BloodHound output files into nmap XML that can be imported into reporting software like Dradis and Plextrac Python Free False
ctf-party [Website] [Source] Library to enhance and speed up script/exploit writing for CTF players Ruby Free False
CyberChef [Website] [Source] Data manipulation toolkit in web browser JavaScript Free False
cybernews personal data leak check [Website] Service to check if an account has been compromised in a data breach, only tells if the account is compromised Free True
DeHashed [Website] Service to check if an account has been compromised in a data breach Paid True
discover [Source] Scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit Shell Free False
DoubleTap [Source] Headless browser in order to load pages and execute JavaScript that often generates things like dynamic nonces that validate the page was actually rendered by a human for password spraying Ruby Free False
doxycannon [Source] Proxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies that may be used for password spraying Python Free False
Exegol [Website] [Source] Disposable hacking environments using docker Python Free False
Firefox Monitor [Website] Service to check if an account has been compromised in a data breach, display the breaches not the password Free True
F-Secure Identity Theft Checker [Website] Service to check if an account has been compromised in a data breach, send an email with the breaches not the password Free True
getsploit [Source] CLI utility for searching and downloading exploits from Exploit-DB, Metasploit, Packetstorm and others Python Free False
GOAD [Source] Game Of Active Directory is a test environment lab that includes all the common vulnerabilities of an active directory Powershell Free False
Godehashed [Source] Uses the dehashed.com API to search for compromised assets Go Free False
gtfo [Source] CLI for searching gtfobins and lolbas from the terminal Python Free False
GTFOBLookup [Source] CLI for earching gtfobins and lolbas from the terminal; allows more advanced search than gtfo Python Free False
HackTools [Source] Web browser extension (Chromium, Firefox, Safari) including common functions for web pentest JavaScript Free False
Have I been pwned? [Website] Service to check if an account has been compromised in a data breach, display the breaches not the password Free True
HiddenWall [Source] Linux kernel module generator for custom rules with netfilter C Free False
hideNsneak [Source] CLI tool for ephemeral penetration testing, rapidly deploy and manage various cloud services Go Free False
HoundSploit [Source] Graphical search engine for Exploit-DB Python Free False
Identity Leak Checker [Website] Service to check if an account has been compromised in a data breach, send the breaches by email Free True
inlite [Website] Scan QR-code, 1D, DataMatrix, Postal, PDF417, and more Free True
Interlace [Source] Turn single threaded command line applications into a multi-threaded application with CIDR and glob support Python Free False
itdis [Website] [Source] Is This Domain In Scope; a small tool that allows you to check if a list of domains you have been provided is in the scope of your pentest or not Ruby Free False
Leak Lookup [Website] Service to check if an account has been compromised in a data breach, requires an account Free True
LOAD [Source] Lord Of Active Directory is a test environment lab that includes all the common vulnerabilities of an active directory and deploys automatically on AWS; based on AWS-Redteam-Lab and GOAD PowerShell Free False
Lookyloo [Website] [Source] A web interface that allows you to capture a website page and display a tree of domains Python Free True
mec [Source] MassExploitConsole; mass reconnaissance and exploitation framework Python Free False
Metasploit [Website] [Source] Tool and framework for pentesting system, web and many more, contains a lot a ready to use exploit, 4 versions: Pro (paid), Express (paid), Community (free with GUI but on request), Framework (free, open source, CLI) Ruby Paid False
NameScan Email Compromised Check [Website] Service to check if an account has been compromised in a data breach, display the breaches not the password Free True
Nord Stream [Website] Extract secrets stored inside CI/CD environments by deploying malicious pipelines Python Free False
objection [Source] Runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak Python Free False
OpenVAS [Website] [Source] Open Vulnerability Assessment Scanner C Free False
Pass Station [Website] [Source] CLI & library to search for default credentials among thousands of Products / Vendors Ruby Free False
PentestBox [Website] [Source] Pre-configured portable penetration testing environment for Windows, all-in-one box Free False
PhoneSploit Pro [Website] [Source] Remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session Python Free False
Pipal [Website] [Source] Analyze password dump and return statistics about passwords' strength Ruby Free False
PWDQUERY [Website] Service to check if an account has been compromised in a data breach, doesn't display breaches, partially display password Free True
rawsec_cli [Website] [Source] Rawsec Inventory search CLI to find security tools and resources Python Free False
Reverse Shell Generator [Website] [Source] Web-based reverse shell generator, includes features such as listener generation, raw mode, bind shell generation, msfvenom generation, payload encoding, many different languages, tools and shells supported JavaScript Free True
Ronin [Website] [Source] Toolkit for security research and development allowing for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositories Ruby Free False
ronin-exploits [Source] A micro-framework for writing and running exploits Ruby Free False
ronin-payloads [Source] A micro-framework for writing and running exploit payloads Ruby Free False
ScatteredSecrets [Website] Service to check if an account has been compromised in a data breach Paid True
search.0t.rocks self-hosted [Source] Service to check if an account has been compromised in a data breach; including the data in clear TypeScript Free False
Scrounger [Source] Mobile application testing toolkit, the mobile metasploit-like framework Python Free False
SearchSploit [Website] [Source] CLI tool to search among Exploit-DB exploits Shell Free False
Seccubus [Website] [Source] Vulnerability scanning, reporting and analysis JavaScript Free False
sploitctl [Source] Fetch, install and search exploit archives from exploit sites like Packet Storm or Exploit-DB Python Free False
SprayingToolkit [Source] Password spraying scripts for Lync/S4B and OWA Python Free False
Tool-X [Source] Kali linux hacking tool installer Python Free False
unisec [Website] [Source] Toolkit for security research manipulating Unicode: confusables, homoglyphs, hexdump, code point, UTF-8, UTF-16, UTF-32, properties, regexp search, size, grapheme, surrogates, version, ICU, CLDR, UCD Ruby Free False
Unredacter [Website] Bruteforce to reverse the text of image redacted with pixelation blur TypeScript Free False
v0lt [Source] CTF toolkit / framework Python Free False
VBSmin [Website] [Source] VBScript minifier Ruby Free False
webqr [Website] Scan & create QR-code Free True
ysoserial [Source] Tool for generating payloads that exploit unsafe Java object deserialization Java Free False

Plugins

Name For Website Source Description Programming language Price Online
AWS Extender Burp Suite [Source] Identify and test S3 buckets, Google Storage buckets and Azure Storage containers for common misconfiguration Python Free False
BinExport IDA / Binary Ninja / Ghidra [Source] Binary exporter, generates an export from the disassembly of a program that can be used without the disassembler CPlusPlus Free False
BurpBounty Burp Suite [Source] Scan Check Builder in BApp Store, improve the active and passive scanner by means of personalized rules through a graphical interface Java Free False
CogniCrypt Eclipse [Source] Supports Java developers in using Java Cryptographic APIs Java Free False
Copy As FFUF Burp Suite [Source] Copies the selected request(s) as FFUF skeleton Java Free False
Copy As Go Request Burp Suite [Website] [Source] Copies the selected request(s) as Go Request invocations Java Free False
Copy as Node Request Burp Suite [Website] [Source] Copies the selected request(s) as Node.JS Request invocations Java Free False
Copy as PowerShell Requests Burp Suite [Website] [Source] Copies the selected request(s) as PowerShell invocation(s) Java Free False
Copy As Python-Requests Burp Suite [Website] [Source] Copies selected request(s) as Python-Requests invocations Java Free False
Copy As XMLHttpRequest Burp Suite [Source] Copies selected request(s) as JavaScript XMLHttpRequest invocations Java Free False
CSTC Burp Suite [Source] Cyber Security Transformation Chef; chaining simple operations and formatting on each incoming or outgoing HTTP message Java Free False
Exporter Burp Suite [Source] Copies selected request(s) as cURL, wget, Python Request, Perl LWP, PHP HTTP_Request2, Go, NodeJS Request, jQuery AJAX, PowerShell, HTML Forms, Ruby Net::HTTP, JavaScript XHR invocations Python Free False
HopLa Burp Suite [Source] Adds autocompletion support and useful payloads in Burp Suite Java Free False
http-screenshot-html Nmap [Source] Nmap NSE script that scans for http server, takes a screenshot of them, and organizes the results into an HTML report Lua Free False
Hyperpwn Hyper [Source] Improve the display when debugging with GDB, needs GEF, pwndbg or peda to be loaded in GDB as a backend JavaScript Free False
GEF GDB [Source] GDB Enhanced Features, multi-architecture Python Free False
IIS Tilde Enumeration Scanner Burp Suite [Source] Check for the IIS tilde enumeration / IIS 8.3 short filename disclosure vulnerability and to exploit it by enumerating all the short names in an IIS web server Java Free False
KeePwn CrackMapExec [Source] Automate KeePass discovery and secret extraction Python Free False
Matro7sh loaders Havoc [Source] Encode Havoc shellcode (.bin) in XOR, chacha20, AES; supports 2 loaders: Myph, 221b Python Free False
Mona Immunity Debugger [Source] Set of commands for Immunity Debugger Python Free False
PEDA GDB [Source] Python Exploit Development Assistance, (only python2.7) Python Free False
Pwndbg GDB [Website] [Source] Enhance GDB, for exploit development and reverse engineering Python Free False
PwnFox Burp Suite / Firefox [Source] Allow to have multiple identities in the same browser using firefox containers and hightlight the profile used with different colors JavaScript Free False
Quokka IDA [Source] Binary exporter, generates an export from the disassembly of a program that can be used without the disassembler Python Free False
Scavenger Burp Suite [Source] Create target specific and tailored wordlist from burp history Kotlin Free False
Sploitego Maltego [Source] Maltego penetration testing Transforms Python Free False
Stepper Burp Suite [Source] Evolution of Burp Suite's Repeater tool, providing the ability to create sequences of steps and define regular expressions to extract values from responses Java Free False
Tenet IDA [Website] [Source] Execution trace explorer Python Free False
ttddbg IDA [Source] Time Travel Debugging IDA plugin CPlusPlus Free False
volatility-gpg Volatility3 [Source] Volatility3 plugins that can retrieve partial and full gpg passphrases from gpg-agent's cache Python Free False
vulners Burp Suite [Website] [Source] Vulnerability scanner based on vulners.com search API Java Free False
XSSor Burp Suite [Source] semi-automatic reflected and persistent XSS scanner Python Free False
YesWeBurp Burp Suite [Source] Access to all bug bounty programs directly inside Burp Kotlin Free False

Red Teaming

Name Website Source Description Programming language Price Online
221b [Source] Bake a windows payload from the C2 of your choice to bypass AV Go Free False
AntiScan.Me [Website] Multi-AV checker that doesn't distribute the check results, based on Dyncheck.com Paid True
AVET [Source] AntiVirus Evasion Tool; targeting windows machines with executable files Free False
BadExclusions [Source] Identify folder custom or undocumented exclusions on AV/EDR CPlusPlus Free False
BadExclusionsNWBO [Source] Identify folder custom or undocumented exclusions on AV/EDR; evolution of BadExclusions but with better opsec CPlusPlus Free False
BOF.NET [Source] A .NET Runtime for Cobalt Strike's Beacon Object Files CSharp Free False
Brute Ratel [Website] Command & Control server; DNS over HTTPS, external channels, indirect syscalls Paid False
CarbonCopy [Source] Create a spoofed certificate of any online website and signs an executable for AV Evasion; works for Windows and Linux Python Free False
ConfuserEx [Source] Protector for .NET applications CSharp Free False
Cortex XDR Config Extractor [Source] Parse the Database Lock Files of the Cortex XDR Agent by Palo Alto Networks and extract Agent Settings, the Hash and Salt of the Uninstall Password, as well as possible Exclusions Python Free False
Covenant [Source] Command & Control framework with multi-user collaboration CSharp Free False
CredMaster [Source] Password spraying, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling Python Free False
CSSG [Source] Cobalt Strike Shellcode Generator; script used to more easily generate and format beacon shellcode in Cobalt Strike Python Free False
dnscat2 [Source] DNS tunnel meant for encrypted Command & Control channel, data exfiltration Ruby Free False
Donut [Source] Generates x86_32, x86_64, or AMD64 position-independent shellcode that loads .NET Assemblies, PE files (EXE), VBScript, JScript, and DLL files from memory and runs them with parameters C Free False
EDRSilencer [Source] Uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server C Free False
fireELF [Source] Fileless linux malware framework Python Free False
Freeze [Source] Payload creation tool used for circumventing EDR security controls to execute shellcode in a stealthy manner Go Free False
gmailc2 [Source] Undetectable C2 server that communicates via Google SMTP to evade antivirus protections and network traffic restrictions Python Free False
Gophish [Website] [Source] Phishing toolkit providing the ability to setup and execute phishing engagements and security awareness training Go Free True
Go365 [Source] User enumeration and password guessing for Office 365 / Microsoft365 Go Free False
gscript [Source] Genesis Scripting Engine; framework to rapidly implement custom droppers for all three major operating systems Go Free False
Hades [Source] Shellcode loader that combines multiple evasion techniques with the aim of bypassing the defensive mechanisms commonly used by modern AV/EDRs Go Free False
Hades C2 [Source] Basic Command and Control server Python Free False
HardHat C2 [Source] Cross-platform, collaborative, Command & Control framework CSharp Free False
Havoc [Source] Malleable post-exploitation command and control framework Go Free False
JavaScript Obfuscator [Website] [Source] JavaScript obfuscator; features: variables renaming, strings extraction and encryption, dead code injection, control flow flattening, various code transformations, etc. TypeScript Free True
Kage [Source] Graphical user interface for Metasploit Meterpreter and session handler JavaScript Free False
King Phisher [Source] A tool for testing and promoting user awareness by simulating real world phishing attacks Python Free False
Kubesploit [Source] Post-exploitation HTTP/2 Command & Control server and agent focused on containerized environments Go Free False
lateralus [Source] Terminal based phishing campaign tool Go Free False
LightsOut [Source] Generate an obfuscated DLL that will disable AMSI & ETW Python Free False
LP-DB [Website] [Source] Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...) JavaScript Free False
macro_pack [Source] Obfuscation and generation of retro formats such as MS Office documents or VBS like format Python Free False
Mangle [Source] Manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs Go Free False
Merlin [Source] Post-exploitation HTTP/2 Command & Control server and agent Go Free False
MFASweep [Source] Check if MFA is enabled on multiple Microsoft services PowerShell Free False
Mística [Source] Allows to embed data into application layer protocol fields, with the goal of establishing a bi-directional channel for arbitrary communications; supports encapsulation into HTTP, HTTPS, DNS and ICMP protocols Python Free False
Modlishka [Source] HTTP reverse proxy designed for phishing Go Free False
monomorph [Source] MD5-monomorphic shellcode packer, all payloads have the same MD5 hash C Free False
Mythic [Source] Collaborative red teaming framework Python Free False
Nighthawk [Website] Command & Control framework; multi-operator, API driven, malleable native implant CSharp Paid False
Nimbo-C2 [Source] Simple and lightweight Command & Control framework Nim Free False
NimPlant [Source] Light-weight first-stage Command & Control implant Nim Free False
Octopus [Source] Pre-operation C2 server Python Free False
Overlord [Website] [Source] CLI used to build Red Teaming infrastructure in an automated way, supports AWS and Digital Ocean Python Free False
pe_to_shellcode [Source] Converts PE into a shellcode CPlusPlus Free False
PEzor [Website] [Source] Shellcode & PE Packer CPlusPlus Free False
phpsploit [Source] Command & Controll framework which silently persists on webserver via polymorphic PHP oneliner Python Free False
PipeViewer [Source] Shows detailed information about named pipes in Windows and searching for insecure permissions CSharp Free False
PoshC2 [Source] Proxy aware Command & Control framework Python Free False
PowerShdll [Source] Run PowerShell with dlls only to bypass software restrictions; it can be run with rundll32.exe, installutil.exe, regsvcs.exe, regasm.exe, regsvr32.exe or as a standalone executable CSharp Free False
ProtectMyTooling [Website] [Source] Multi-Packer wrapper allowing daisy-chaining various packers and obfuscators; featured with artifacts watermarking, IOCs collection & PE backdooring Python Free False
Pupy [Source] Cross-platform, multi function Command & Control and post-exploitation framework; fileless/all-in-memory execution, low footprint, multi-transport Python Free False
Quasar [Source] Remote Administration Tool (RAT) for Windows CSharp Free False
Redcloud [Source] Automated Red Team Infrastructure deployment using Docker Python Free False
RedELK [Source] Red Team's SIEM; used by Red Teams for tracking and alarming about Blue Team activities as well as better usability in long term operations Free False
RedEye [Source] Red team C2 log visualization TypeScript Free False
ReelPhish [Source] Real time phishing tool Python Free False
Ruler [Source] Interact with Exchange servers remotely, through either the MAPI/HTTP or RPC/HTTP to abuse the client-side Outlook features and gain a shell Go Free False
ScareCrow [Source] Payload creation framework designed around EDR bypass Go Free False
SHAD0W [Website] [Source] Modular C2 framework designed to successfully operate covertly on heavily monitored environments Python Free False
SharpC2 [Website] [Source] Command & Control framework CSharp Free False
SharpEDRChecker [Source] Detect and identify the presence of known defensive products such as AV's, EDR's and logging tools CSharp Free False
Shellcrypt [Source] Obfuscate shellcode using encoding, encryption, compression Python Free False
Shelltropy [Source] A technique to hide malicious shellcode based on low-entropy via Shannon encoding CPlusPlus Free False
SILENTTRINITY [Source] Asynchronous, multiplayer and multiserver Command & Control framework Python Free False
Sliver [Source] Cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS; remote access tool (RAT) Go Free False
SocialFish [Source] Phishing targeting social media logins; supports Ngrok tunneling and a mobile controller Python Free False
Starkiller [Source] WebUI for Empire JavaScript Free False
Synergy Httpx [Source] HTTP(S) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically Python Free False
SysWhisper3 [Source] SysWhispers on Steroid, AV/EDR evasion via direct system calls Assembly Free False
TeamsBreaker [Source] Automating the sending of phishing messages to MS Teams users; based on TeamsPhisher and TeamsEnum Python Free False
TeamsEnum [Source] User enumeration of MS Teams users Python Free False
TeamsImplant [Source] MS Teams implant persistent backdoor C Free False
TeamsPhisher [Source] Facilitates the delivery of phishing messages and attachments to MS Teams users whose organizations allow external communications Python Free False
TrevorC2 [Source] Command and control framework masking the activity by emulating legitimate website Python Free False
UBoat [Source] HTTP botnet PoC CPlusPlus Free False
Villain [Source] Distributed command and control framework Python Free False
Warhorse [Website] [Source] Ansible playbook to deploy infrastructure in the cloud for conducting Red Team assessments Free False
Zphisher [Source] Automated phishing tool with multiple tunneling options; fork of Shellphish Shell Free False

Reverse Engineering

Name Website Source Description Programming language Price Online
androguard [Source] Tool for reverse engineering and malware analysis of Android applications Python Free False
angr [Source] Platform-agnostic binary analysis framework Python Free False
ANY RUN [Website] Online virtual machine for malware hunting, sandbox with interactive access, real-time data-flow Free True
Apk2Gold [Source] Android decompiler (wrapper for apktool, dex2jar, and jd-gui) Shell Free False
Apktool [Website] [Source] Android disassembler and rebuilder Java Free False
arm_now [Source] Tool that allows instant setup of virtual machines on various architectures for reverse, exploit, fuzzing and programming purpose Python Free False
Barf [Source] Binary Analysis and Reverse engineering Framework Python Free False
BinDiff [Source] Binary diffing for many architectures compatible with IDA Pro, Binary Ninja and Ghidra CPlusPlus Free False
BOF launcher [Source] Beacon Object File (BOF) launcher; library for executing BOF files in C/C++/Zig applications Zig Free False
bearparser [Website] [Source] PE parsing library (from PE-bear) CPlusPlus Free False
Binary Ninja [Website] Crossplatform binary analysis framework Python Paid False
binbloom [Source] Raw binary firmware analysis software; tries to determine the firmware loading address C Free False
BinCAT [Source] Binary code static analyser, with IDA integration; performs value and taint analysis, type reconstruction, use-after-free and double-free detection OCaml Free False
binutils [Website] [Source] GNU collection of binary tools C Free False
binwalk [Source] Analyze, reverse engineer and extract firmware images (and other files, also usefull for Digital Forensics) Python Free False
Dexcalibur [Website] [Source] Android reverse engineering platform focus on instrumentation automation (decompile/disass intercepted bytecode at runtime, write hook code, search interesting pattern JavaScript Paid False
boomerang [Source] x86 binaries to C decompiler CPlusPlus Free False
CAPEv2 [Website] [Source] Malware sandbox derived from Cuckoo with the goal of adding automated malware unpacking, config and payload extraction Python Free True
Cerberus [Source] Unstrip Rust and Go binaries (ELF and PE) for static analysis; based on hashing and scoring systems, it can retrieve lots of symbol names CPlusPlus Free False
ctf_import [Website] [Source] Library to run basic functions from stripped binaries C Free False
CFF Explorer [Website] PE Editor Free False
Cuckoo 3 [Source] Python 3 port of Cuckoo, automated malware analysis system Python Free False
Cutter [Source] Qt and C++ GUI for radare2 CPlusPlus Free False
DbgShell [Source] Front-end for the Windows debugger engine PowerShell Free False
Decompiler.com [Website] C#, Python, Android and Java online decompiler Free True
Decompiler Explorer [Website] [Source] Multi-decompiler engine; supports angr, BinaryNinja, Boomerang, dewolf, Ghidra, Hex-Rays, RecStudio, Reko, Relyze, RetDec, Snowman Python Free True
Defuse online disassembler [Website] Online x86 (32/64 bits) assembler and disassembler Free True
de4dot [Source] .NET deobfuscator and unpacker CSharp Free False
dnSpy [Source] .NET assembly debugger, decompiler and editor CSharp Free False
dnSpyEx [Source] .NET assembly debugger, decompiler and editor; fork of dnSpy CSharp Free False
dotPeek [Website] .NET decompiler and assembly browser CSharp Free False
DRAKVUF Sandbox [Source] Automated black-box hypervisor-level malware analysis system Python Free False
Droidefense [Website] [Source] Android apps/malware analysis/reversing tool Java Free False
DroidGuard VM Samples [Website] [Source] Different versions of the DroidGuard VM as well as different version of the bytecode running through this VM Free False
edb [Source] Cross platform AArch32/x86/x86-64 debugger CPlusPlus Free False
EMBA [Website] [Source] Security analyzer for firmware of embedded devices Shell Free False
Flare [Website] Processes SWF and extract scripts from it Free False
Flasm [Website] [Source] Disassembler tool for SWF bytecode Free False
Flutter Spy [Source] Explore, analyze, and gain valuable data & insights from reverse engineered Flutter apps Shell Free False
Frida [Website] [Source] Dynamic code instrumentation toolkit C Free False
Frinet [Website] [Source] Multi-platform Frida trace generatior C Free False
GDB [Website] [Source] GNU debugger CPlusPlus Free False
gftrace [Source] Windows API tracing for Go binaries C Free False
Ghidra [Website] [Source] Software reverse engineering (SRE) suite of tools: disassembly, assembly, decompilation, graphing, scripting, etc. Java Free False
Hiew [Website] x86_64 disassembler for multiple formats Paid False
Honggfuzz [Website] [Source] Security oriented software fuzzer; supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based) C Free False
Hopper [Website] Disassembler, decompiler and debugger Paid False
IDA Pro [Website] Disassembler and debugger Paid False
ILSpy [Source] .NET assembly browser and decompiler to C# CSharp Free False
ImHex [Website] [Source] Hexadecimal editor tailored for reverse engineers; byte patching, data import / export, data inspector, huge file support, file hashing, disassembler for many architectures, data analyzer CPlusPlus Free False
ImmunityDbg [Website] Windows debugger with Python scripting support Free False
jadx [Source] DEX to Java decompiler Java Free False
Java Decompilers [Website] .JAR and .Class to Java decompiler Free True
JD-GUI [Website] [Source] GUI tool decompiling JAVA Java Free False
JEB [Website] Disassembler, decompiler and debugger Paid False
JPEXS Free Flash Decompiler [Source] A.k.a ffdec, flash SWF decompiler Java Free False
JSDetox [Website] [Source] Javascript deobfustcator Ruby Free False
Kemon [Source] macOS kernel pre and post callback-based framework C Free False
Krakatau [Source] Java decompiler, assembler, and disassembler Java Free False
Kaitai Struct [Website] [Source] Declarative language to generate binary data parsers in various languages Free False
ldd [Website] Tool that print shared library dependencies Free False
Metasm [Website] [Source] Assembler, disassembler, compiler and debugger Ruby Free False
Medusa [Source] Interactive multi-architecture and multi-formats disassembler running on Windows and Linux CPlusPlus Free False
netzob [Source] Protocol reverse engineering, modeling and fuzzing Python Free False
ODA [Website] Advanced multi-architecture online disassembler supporting a lot of architectures and object file formats Free True
OllyDbg [Website] Windows debugger Free False
PANDA [Website] [Source] Platform for architecture-neutral dynamic analysis C Free False
PASTIS [Website] [Source] Fuzzing framework aiming at combining various software testing techniques within the same workflow to perform collaborative fuzzing also called ensemble fuzzing; supported engines are Honggfuzz, AFL++, TritonDSE Python Free False
Pe-bear [Website] PE reverse tool: recognizes packers, fast disassembler, visualization of sections layout, selective comparing of two chosen PE files Free False
PE Explorer Disassembler [Website] Windows disassembler Paid False
PE Insider [Website] PE viewer, closed source and windows only Free False
Plasma [Source] x86/ARM/MIPS interactive disassembler Python Free False
QBinDiff [Source] Binary diffing; addressing the diffing as a Network Alignement Quadratic Problem Python Free False
Qira [Website] [Source] Timeless debugger (QIRA = QEMU Interactive Runtime Analyser) C Free False
RABCDAsm [Website] [Source] ActionScript disassembler D Free False
radare2 [Website] [Source] Crossplatform binary analysis framework, disassembler, decompiler and debugger, support collaborative analysis C Free False
rbkb [Source] Ruby BlackBag; a miscellaneous collection of command-line tools and ruby library helpers related to pen-testing and reversing Ruby Free False
Recaf [Website] [Source] Edit Java bytecode, insert single line Java statements into the bytecode, recompile decompiled code Java Free False
ReFlutter [Website] [Source] Flutter reverse engineering framework: allow traffic monitoring and interception, print classes and functions, display absolute code offset for functions, etc. Python Free False
Relyze [Website] x86 and ARM graphical interactive disassembler with Ruby plugin framework Paid False
RetDec [Website] [Source] Multi file formats and architectures machine-code decompiler CPlusPlus Free False
sandsifter [Source] x86 processor fuzzer Python Free False
Snowman [Website] [Source] Native code to C/C++ decompiler, supporting x86, AMD64, and ARM architectures, exists as standalone app or as a plug-in CPlusPlus Free False
strace [Source] Debugger for Linux Free False
Swftools [Website] [Source] Collection of utilities to work with SWF files C Free False
theZoo [Website] [Source] Repository of live malwares for malware analysis Python Free False
Triton [Website] [Source] Dynamic binary analysis framework, automate reverse engineering CPlusPlus Free False
TritonDSE [Website] [Source] Triton-based DSE library with loading and exploration capabilities Python Free False
TTD-Bindings [Source] Bindings for Microsoft WinDBG Time Travel Debugging (TTD) CPlusPlus Free False
Tweezer [Source] Identifying function names in stripped binaries and un-named functions Python Free False
UglifyJS2 [Website] [Source] JavaScript obfuscator or beautifier toolkit JavaScript Free False
uncompyle [Source] Python 2.7 binaries (.pyc) decompiler Python Free False
uncompyle6 [Source] Python 1.5, 2.1 to 2.7, 3.1 to 3.6 binaries (.pyc) decompiler Python Free False
Vais [Source] SWF vulnerability and information scanner Ruby Free False
WinDbg [Website] Windows debugger Free False
x64dbg [Website] [Source] Windows debugger CPlusPlus Free False
XenoScan [Source] Processes memory scanner CPlusPlus Free False
Xori [Website] [Source] Disassembly and static analysis library that provides triage analysis data Rust Free False
xxxswf [Source] Small script for carving, scanning, compressing, decompressing and analyzing SWF files Python Free False

Steganography

Name Website Source Description Programming language Price Online
Aperi'Solve [Website] [Source] Steganalysis web platform with layer, zsteg, steghide and exiftool analysis Python Free False
Audacity [Website] [Source] Tool to edit and analyze audio tracks Free False
Depix [Source] Recover plaintext from pixelized screenshots Python Free False
exif [Source] Shows EXIF information for JPEG files only C Free False
ExifTool [Website] [Source] Library and CLI tool to read and write meta information (EXIF, GPS, IPTC, XMP, JFIF, …) in files (JPEG, PNG, SVG, MPEG, …) Perl Free False
Exiv2 [Website] [Source] Library and CLI tool to read and write meta information (Exif, IPTC & XMP metadata and ICC Profile) in images (JPEG, TIFF, PNG, …) CPlusPlus Free False
ImageMagick [Website] [Source] Software suite and library to create, edit, compose, or convert images C Free False
Outguess Tool to hide messages in files (website down since 2004) Free False
PNGtools [Website] [Source] Suite of tools to work with PNG images C Free False
SHIT [Source] Stego Helper Identification Tool, multi-purpose image steganography tool Python Free False
SmartDeblur [Source] To to restore defocused and blurred images (update binary only for Windows, Mac OS binary out of date) CPlusPlus Free False
Sonic Visualiser [Website] [Source] Tool to edit and analyze audio tracks Free False
Steganabara [Source] Steganography analysis tool Java Free False
Steghide [Website] [Source] Tool to hide messages in images Free False
StegOnline [Website] [Source] Stego image toolsuite in the browser JavaScript Free True
StegoVeritas [Source] Automatic tool to bruteforce LSB, transform image, extract metadata or trailing data Python Free False
StegSolve GUI tool to analyse images Java Free False
zsteg [Source] Tool to detect hidden data in PNG and BMP Ruby Free False

System Exploitation

Name Website Source Description Programming language Price Online
abuseACL [Source] Automatically list vulnerable Windows ACEs/ACLs using DC's LDAP to list users/groups/computers/OU/certificate templates and their nTSecurityDescriptor to check for vulnerable rights Python Free False
aclpwn [Source] Interacts with BloodHound to identify and exploit ACL based privilege escalation paths Python Free False
ADFSDump [Source] Read information from Active Directory and ADFS Configuration Database; fed information into ADFSpoof to generate security tokens CSharp Free False
ADFSpoof [Source] Using ADFSDump information, produce a usable key/cert pair for token signing, produce a signed security token that can be used to access a federated application Python Free False
Android_Emuroot [Source] Grants root privileges on the fly to shells running on Android virtual machines that use google-provided emulator images called Google API Playstore Python Free False
bkhive [Source] Dump the syskey bootkey from a Windows NT/2K/XP system hive, often used with samdump2, part of the ophcrack project Free False
BloodHound [Website] [Source] Tool to reveal the hidden and unintended relationships within an Active Directory environment PowerShell Free False
CoercedPotato [Source] Elevation of privileges automated exploitation using SeImpersonatePrivilege or SeImpersonatePrimaryToken C Free False
CookieCrimesJS [Source] Read local Chrome cookies without root or decrypting and display then in JSON; Javascript implementation of cookie_crimes JavaScript Free False
creddump [Source] Dump windows credentials Python Free False
DCOMrade [Source] Script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. PowerShell Free False
DLLInjector [Source] Dll injection tool CPlusPlus Free False
DLLPasswordFilterImplant [Source] Password filter DLL, triggered on password change to exfiltrate credentials C Free False
DonPAPI [Source] Dumping DPAPI credentials remotely; dumps relevant information on compromised targets without AV detection Python Free False
Empire [Website] [Source] PowerShell and Python post-exploitation agent Shell Free False
Empire GUI [Website] [Source] GUI for Empire framework JavaScript Free False
enum4linux [Source] Windows Samba enumeration tool Perl Free False
enum4linux-ng [Source] Windows Samba enumeration tool, next generation version of enum4linux Python Free False
FFM [Source] Freedom Fighting Mode (FFM), hacking harness, post-exploitation tool Python Free False
GH DLL Injector [Website] [Source] DLL injection library supporting x86, WOW64 and x64 injections; 5 injection methods, 4 shellcode execution methods and various additional options; session separation can be bypassed with all methods CPlusPlus Free False
goddi [Source] Active Directory domain information dumper Go Free False
GoodHound [Source] Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation Python Free False
JAWS [Source] Just Another Windows (Enum) Script; quickly identify potential privilege escalation vectors on Windows systems PowerShell Free False
LaZagne [Source] Password retriever Python Free False
LinEnum [Source] Linux enumeration and privilege escalation script Shell Free False
Linux Exploit Suggester 2 [Source] Linux kernel exploit suggester Perl Free False
linux-exploit-suggester.sh [Source] Linux kernel exploit suggester Shell Free False
linuxprivchecker.py [Source] Linux privilege escalation check script Python Free False
Masky [Source] Library and CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory Python Free False
mimikatz [Website] [Source] Extract plaintext passwords, hash, PIN code and kerberos tickets from memory; perform pass-the-hash, pass-the-ticket or build Golden tickets C Free False
minidump [Source] Library and CLI to parse and read Microsoft minidump file format Python Free False
NanoDump [Source] Minimal LSASS dumper C Free False
Nishang [Source] Framework, collection of scripts and payloads in PowerShell for offensive security, penetration testing and red teaming PowerShell Free False
p0wnedShell [Source] PowerShell runspace post exploitation toolkit CSharp Free False
PEASS [Source] Privilege Escalation Awesome Scripts SUITE; winPEAS and linPEAS are local privilege escalation scripts for Windows and Linux Shell Free False
PlumHound [Source] Creates reports for blue and purple teams by extracting data from BloodHound Python Free False
Powerless [Source] A Windows privilege escalation enumeration BAT script designed for legacy Windows machines without Powershell Shell Free False
PowerSploit [Source] Powershell exploitation framework Powershell Free False
pspy [Source] CLI tool designed to snoop on processes without need for root permissions; it allows to see commands run by other users, cron jobs, etc. as they execute Go Free False
pypykatz [Source] Platform idependent Mimikatz implementation Python Free False
RedSnarf [Source] Retrieves hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques Python Free False
samdump2 [Source] Retrieves syskey and extract hashes from Windows 2k/NT/XP/Vista SAM, often used with bkhive, part of the ophcrack project Free False
scavenger [Source] multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as interesting files containing sensitive information Python Free False
SCShell [Source] Fileless lateral movement that relies on ChangeServiceConfigA to run commands CSharp Free False
SharpShooter [Source] Payload Generation Framework for C# source code VB Free False
ShellPop [Source] Tool to craft bind and reverse shells in several languages Python Free False
TPMEE [Source] Help to exploit weak implementation of library or program that used TPM Python Free False
unicorn [Source] Tool for using a PowerShell downgrade attack and inject shellcode into memory Python Free False
WES-NG [Source] Windows Exploit Suggester - Next Generation; analyses Windows targets patch levels to find exploits and Metasploit modules; works well with newer system (eg Windows 10) thanks to MSRC support Python Free False
Windows-Exploit-Suggester [Source] Analyses Windows targets patch levels to find exploits and Metasploit modules, works only for older systems (eg Windows XP, Vista, etc.) because it relies on MS Security KBs Python Free False

Threat Intelligence

Name Website Source Description Programming language Price Online
Intelligence X [Website] Threat intelligence search engine: email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc.; it searches among darknet, document sharing platforms, whois data, public data leaks, etc. Paid True
Hudson Rock Cybercrime Intelligence Tools [Website] Cybercrime intelligence toolset to check if a specific digital asset was compromised in global infostealer malware attacks Free True
Maltego [Website] Interactive data mining tool that renders directed graphs for link analysis. The tool is used in online investigations for finding relationships between pieces of information from various sources located on the Internet (exists in Community Edition) Paid False
MISP [Website] [Source] Threat intelligence platform & open standards for threat information sharing (formerly known as Malware Information Sharing Platform) PHP Free False
Netglub [Website] [Source] Maltego alternative Free False
OpenCTI [Website] [Source] Platform designed for managing and analyzing cyber threat intelligence knowledge, centralizing data using the STIX2 standard and offering visualization and integration capabilities TypeScript Free False
PatrowlHears [Website] [Source] Provides a unified source of vulnerability, exploit and threat Intelligence feeds; comprehensive and continuously updated vulnerability database scored and enriched with exploit and threat news information Python Paid False
Pulsedive [Website] CTI platform to search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own Free True
Redirect Tracker [Website] Track the HTTP redirect chains; 301 and 302, JavaScript and Meta fresh redirects Free True
threatfeeds.io [Website] Open-source threat intelligence feeds; sharing malware URLs, IP reputation, bad IPs, etc. Free True
ThreatIngestor [Website] [Source] Extract and aggregate threat intelligence (IOCs from threat feeds) Python Free False
ThreatKB [Source] Knowledge base workflow management for YARA rules and C2 artifacts Python Free False
Watcher [Website] [Source] Automated platform for discovering new potentially cybersecurity threats targeting your assets (detects typosquatting domain names, monitor malicious domain names, detects data leaks...) Python Free False
Yeti [Website] [Source] Organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository Python Free False

Vulnerability Assessment

Name Website Source Description Programming language Price Online
CVEMap [Source] CLI tool designed to provide a structured interface to various vulnerability databases Go Free False
cvss-suite [Source] CVSS calculator library Ruby Free False
go-cve-dictionary [Source] Self-hosted CVE feed server Go Free False
GVM [Website] [Source] The Greenbone Vulnerability Management (GVM) is a framework of several services: gvmd is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. The Greenbone Security Assistant (GSA) is the web interface of GVM. The main scanner (OpenVAS) is a full-featured scan engine that executes a continuously updated and extended feed of Network Vulnerability Tests (NVTs). Complementary to the web interface, GVM-Tools allows batch processing / scripting via the Greenbone Management Protocol (GMP). Additional scanners can be integrated via the Open Scanner Protocol (OSP) C Paid False
nvd_feed_api [Website] [Source] A ruby API for NVD CVE feeds management, the library will help you to download and manage NVD Data Feeds, search for CVEs, build your vulerability assesment platform or vulnerability database Ruby Free False
SECMON [Website] [Source] Web-based platform for the automation of infosec watching and vulnerability management Python Free False
ThreatMapper [Website] [Source] Identify vulnerabilities in running containers, images, hosts and repositories Go Free False
VRT Ruby Wrapper [Website] [Source] Wrapper for the Vulnerability Rating Taxonomy Ruby Free False
Vulnogram [Website] [Source] Create and edit CVE information in CVE JSON format JavaScript Free True
Vuls [Website] [Source] Agentless system vulnerability scanner for Linux/FreeBSD with a dashboard (VulsRepo) for analyzing the scan results Go Free False

Web Application Exploitation

Name Website Source Description Programming language Price Online
0d1n [Source] Automate customized attacks against web applications C Free False
1u.ms [Website] [Source] zero-configuration DNS utilities for assisting in detection and exploitation of SSRF-related vulnerabilities Go Free True
230-OOB [Website] [Source] FTP server for OOB XXE attacks Python Free False
Acunetix [Website] Web application security scanner Paid True
afrog [Source] Web vulnerability scanner, based on templates Go Free False
Afuzz [Source] Web directory and file scanner (wordlist bruteforce) Python Free False
altair [Source] Modular web vulnerability scanner Python Free False
API-fuzzer [Source] Library to fuzz request attributes using common pentesting techniques and lists vulnerabilities Ruby Free False
Aquatone [Website] [Source] Domain flyover tool; visual inspection of websites across a large amount of hosts and is convenient for quickly gaining an overview of HTTP-based attack surface Go Free False
Arachni [Website] [Source] Web application security scanner framework Ruby Free False
Arjun [Source] HTTP parameter discovery suite Python Free False
AssassinGo [Website] [Source] Web pentest framework for information gathering and vulnerability scanning Go Free False
Astra [Website] [Source] REST API penetration testing tool Python Free False
Atlas [Source] Tool that suggests sqlmap tampers to bypass WAF/IDS/IPS based on status codes Python Free False
b374k [Source] Webshell with many features: file manager, search, command execution, DB connection, SQL explorer, process list PHP Free False
badsecrets [Source] A library for detecting known or weak cryptographic secrets across many web frameworks Python Free False
BaRMIe [Source] Java RMI enumeration and attack tool Java Free False
Beeceptor [Website] HTTP request collector and inspector Paid True
BeEF [Website] [Source] Browser exploitation framework; JS payload and supporting software to be used as XSS payload or post exploitation implant to monitor or exploit users as they use the targeted application Ruby Free False
BFAC [Source] Backup File Artifacts Checker; automated backup artifacts checker Python Free False
Blazy [Source] Login page bruteforcer: CSRF, SQLi, Clickjacking, WAF detection Python Free False
Burp Suite [Website] Intercepting proxy to replay, inject, scan and fuzz HTTP requests (a limited free version exists) Java Paid False
bXSS [Website] Identify blind cross-site scripting JavaScript Free False
Caido [Website] Intercepting proxy to replay, inject, scan and fuzz HTTP requests (a limited free version exists) Rust Paid False
Cansina [Source] Web directory and file scanner (wordlist bruteforce) Python Free False
Chankro [Source] Tool to bypass disable_functions and open_basedir in PHP by calling sendmail and setting LD_PRELOAD environment variable Python Free False
Charles [Website] Intercepting proxy to replay, inject, scan and fuzz HTTP requests Java Paid False
ChopChop [Source] Web application security scanner based on templates Go Free False
clairvoyance [Source] Obtain GraphQL API schema even if the introspection is disabled by abusing the "did you mean" feature Python Free False
CloakQuest3r [Source] Uncover the true IP address of websites safeguarded by Cloudflare and other CDNs Python Free False
CloudFlair [Website] [Source] Uncover the true IP address of websites safeguarded by Cloudflare and CloudFront Python Free False
CloudFrunt [Source] Scanner to identify misconfigured CloudFront domains Python Free False
CMSeek [Source] CMS detection and exploitation suite; capable of detecting more than 180 CMS Python Free False
CMSmap [Source] WordPress, Joomla, Drupal, Moodle CMS security scanner Python Free False
CMSScan [Source] Wordpress, Drupal, Joomla, vBulletin CMS security scanner with dashboard Python Free False
commix [Website] [Source] Web-based command injection tester Python Free False
CrackQL [Source] GraphQL password brute-force and fuzzing utility Python Free False
CSP Evaluator [Website] [Source] Check Content Security Policy (CSP) configuration and assists with the reviewing process JavaScript Free False
CSPass [Source] Test for CSP bypass payloads Python Free False
CSWSH [Website] Cross-Site WebSocket Hijacking Tester Free False
Dalfox [Website] [Source] XSS scanner and utility focused on automation Go Free False
dirb [Website] [Source] Web directory and file scanner (wordlist bruteforce) Free False
dirbuster [Website] [Source] Web directory and file scanner (wordlist bruteforce) Java Free False
dirsearch [Source] Web directory and file scanner (wordlist bruteforce) Python Free False
distributed-jwt-cracker [Website] [Source] HS256 JWT token distributed brute force cracker JavaScript Free False
docem [Source] Uility to embed XXE and XSS payloads in docx, odt, pptx, etc Python Free False
DotDotPwn [Website] [Source] Directory Traversal fuzzer Perl Free False
DotGit [Source] Web browser extension (Firefox and CHromium) checking if .git is exposed in visited websites JavaScript Free False
droopescan [Source] CMS scanner supporting SilverStripe and Wordpress, having partial support for Joomla, Moodle, Drupal Python Free False
drupwn [Source] Drupal CMS enumeration and exploitation tool Python Free False
dtd-finder [Source] Identify DTDs on filesystem snapshot and build XXE payloads using those local DTDs Kotlin Free False
DVCS-Pillage [Source] Dump web accessible (distributed) version control systems (DVCS/VCS): GIT, Mercurial/hg, Bazaar/bzr, … Shell Free False
dvcs-ripper [Source] Dump web accessible (distributed) version control systems (DVCS/VCS): SVN, GIT, Mercurial/hg, Bazaar/bzr, … Perl Free False
Enemies Of Symfony [Source] Loots information from a Symfony target using profiler Python Free False
Eyeballer [Source] Convolutional neural network for analyzing pentest screenshots and automatically label them Python Free False
EyeWitness [Source] Take screenshots of websites, provide some server header info, and identify default credentials if possible Python Free False
ezXSS [Source] Identify blind cross-site scripting PHP Free False
Fav-up [Source] Favicon fingerprinting using Shodan Python Free False
FavFreak [Source] Favicon fingerprinting Python Free False
Favinizer [Source] Favicon fingerprinting Python Free False
feroxbuster [Source] Web directory and file scanner (wordlist bruteforce) Rust Free False
ffuf [Source] Web directory and file scanner (wordlist bruteforce); but also a web fuzzer Go Free False
Fingerprinter [Source] CMS version detection tool Ruby Free False
Firefly [Source] Web directory and file scanner (wordlist bruteforce); but also a web fuzzer Go Free False
FockCache [Source] Test Cache Poisoning Go Free False
Fuxi [Source] Penetration testing platform, automate some scan & attack Python Free False
fuxploider [Source] Automates the process of detecting and exploiting file upload forms flaws Python Free False
Fuzzapi [Source] Web-UI for API-fuzzer Ruby Free False
Ghauri [Source] Automatic SQL injection and database takeover; inspired by SQLmap Python Free False
git-dump [Source] Dump the contents of a remote git repository without directory listing enabled JavaScript Free False
git-dumper [Source] Dump the contents of a remote git repository without directory listing enabled Python Free False
GitTools [Source] 3 tools: Finder (find websites with .git repository exposed), Dumper (dump exposed .git), Extractor (extract commits and their content from a broken repository) Shell Free False
Gobuster [Source] Web directory, file and DNS scanner (wordlist bruteforce) Go Free False
gofingerprint [Source] Indentify web servers by checking their HTTP responses against a user defined list of fingerprints Go Free False
goop [Source] Dump the contents of a remote git repository without directory listing enabled; focus on as-complete-as-possible dumps and handling as many edge-cases as possible Go Free False
Gopherus [Source] Generates gopher link for exploiting SSRF and gaining RCE access from unprotected services Python Free False
gowitness [Source] Take screenshots of websites Go Free False
GraphCrawler [Source] GraphQL automated security testing Python Free False
Graphicator [Source] GraphQL enumeration and extraction Python Free False
Graphinder [Source] GraphQL endpoints finder using subdomain enumeration, scripts analysis and bruteforce Python Free False
GraphQL Voyager [Website] [Source] Represent any GraphQL API as an interactive graph TypeScript Free False
GraphMan [Source] Scaffold a postman collection for a GraphQL API; compatible with Postman and Insomnia TypeScript Free False
GraphQL Cop [Source] Run common security tests against GraphQL Python Free False
graphql-path-enum [Source] Lists the different ways of reaching a given type in a GraphQL schema Rust Free False
graphql.security [Website] Runs a dozen of security checks against a given GraphQL endpoint Free True
GraphQLmap [Source] Scripting engine to interact with a graphql endpoint for pentesting purposes Python Free False
graphw00f [Source] GraphQL server engine fingerprinting Python Free False
Guppy Proxy [Source] GUI HTTP intercepting proxy based on Pappy Proxy Python Free False
headerpwn [Source] Fuzzer for analyzing how servers respond to different HTTP headers Go Free False
Hetty [Website] [Source] HTTP toolkit for security research; alternative to BurpSuite Go Free False
Hookbin [Website] [Source] HTTP request collector and inspector Java Free True
http-garden [Source] Differential testing and fuzzing of HTTP servers and proxies Python Free False
httpscreenshot [Source] Take screenshots of websites Python Free False
httpx [Source] Multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads Go Free False
HUNT [Source] HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions Python Free True
InQL [Source] GraphQL security audit Python Free False
Intrigue Core [Website] [Source] Framework for discovering attack surface Ruby Free False
Interactsh [Website] [Source] HTTP request collector and inspector; OOB interaction gathering server and client library; DNS / HTTP / SMTP interaction support Go Free True
IronWASP [Website] [Source] Web security/vulnerability scanner (native for Windows only) C Free False
Jaeles [Website] [Source] Framework for building your own Web Application Scanner Go Free False
JAST [Source] Take screenshots of websites Python Free False
JS-Tap [Source] Browser exploitation framework; JS payload and supporting software to be used as XSS payload or post exploitation implant to monitor or exploit users as they use the targeted application Python Free False
JSONBee [Source] JSONP endpoints/payloads to help bypass content security policy of different websites PHP Free False
JWT cracker [Source] Multi-threaded JWT brute-force cracker C Free False
jwt-cracker [Website] [Source] HS256 JWT token brute force cracker JavaScript Free False
jwt-hack [Source] A toolkit for JWT tokens security testing Go Free False
jwt_tool [Source] A toolkit for validating, forging and cracking JWT tokens Python Free False
jwtcat [Source] JWT brute-force cracker Python Free False
Katana [Source] Crawling and spidering framework, supporting headless mode, JavaScript, customizable automatic form filling and scope control Go Free False
Kraken [Source] Modular multi-language webshell focused on web post-exploitation and defense evasion; supports PHP, JSP and ASPX Python Free False
Liffy [Source] LFI exploitation tool Python Free False
LFI Freak [Source] LFI scan and exploit tool Python Free False
LFI Suite [Source] Automatic LFI scanner and exploiter Python Free False
LightBulb [Website] [Source] Framework for auditing web application firewalls and filters Python Free False
LinkFinder [Website] [Source] Find URL endpoints and their parameters in JavaScript files Python Free False
Lulzbuster [Source] Web directory and file scanner (wordlist bruteforce) C Free False
Kadimus [Source] LFI, RFI, RCE scanner C Free False
Malzilla [Website] [Source] Web oriented deobfuscating tool Free False
mitmproxy [Website] [Source] Interactive HTTPS proxy Python Free False
Mockbin [Website] [Source] HTTP request collector and inspector JavaScript Free True
monsoon [Website] [Source] Web directory and file scanner (wordlist bruteforce) Go Free False
MyJWT [Source] A toolkit for signing, forging and cracking JWT tokens Python Free False
Netsparker [Website] Web application security scanner Paid True
nikto [Website] [Source] Very light web security scanner Perl Free False
noir [Website] [Source] Attack surface detector that identifies endpoints by static analysis and then conduct dynamic analysis on them Crystal Free False
NoSQLMap [Source] Automated NoSQL database enumeration and web application exploitation tool Python Free False
Nosql-Exploitation-Framework [Source] NoSQL scanning and exploitation framework Python Free False
Nuclei [Website] [Source] Web application security scanner based on templates Go Free False
NtHiM [Source] Now, the Host is Mine!; sub-domain takeover detection Rust Free False
otori [Website] On The Outside, Reaching In, exploitation toolbox for XXE attacks Python Free False
OWASP JoomScan [Source] Joomla vulnerability scanner Perl Free False
OWASP ZAP [Website] [Source] OWASP Zed Attack Proxy, intercepting proxy to replay, inject, scan and fuzz HTTP requests Java Free False
oxml_xxe [Source] Tool for embedding XXE/XML exploits into different filetypes (docx/xlsx, odt/ods, svg, xml, etc.) Ruby Free False
Panoptic [Website] [Source] Automatic LFI and Path Traversal exploitation tool Python Free False
Pappy Proxy [Website] [Source] Proxy Attack Proxy ProxY, HTTP intercepting proxy Python Free False
parameth [Source] HTTP parameter discovery suite Python Free False
ParamSpider [Source] Finds parameters from web archives of the entered domain Python Free False
Paros [Source] Intercepting proxy to replay, inject, scan and fuzz HTTP requests Java Free False
PeepingTom [Source] Take screenshots of websites Python Free False
PHPGGC [Source] PHP Generic Gadget Chains, library of unserialize() payloads along with a tool to generate them, supporting various PHP frameworks PHP Free False
Pinkerton [Source] Crawl JavaScript file to find secret Python Free False
Portswigger Labs Inspector [Website] Javascript expression evaluator and inspector JavaScript Free True
PowerUpSQL [Source] Toolkit for attacking MS SQL Server, discovery, configuration auditing, privilege escalation, post exploitation Powershell Free False
ppfuzz [Source] Scan for client-side prototype pollution Rust Free False
pphack [Source] Client-side prototype pollution scanner Go Free False
Rabid [Website] [Source] CLI tool and library allowing to simply decode all kind of BigIP cookies Ruby Free True
RequestBin [Website] [Source] HTTP request collector and inspector Python Free True
RequestCatcher [Website] [Source] HTTP request collector and inspector Go Free True
Request Inspector [Website] HTTP request collector and inspector Free True
Rogue JNDI [Source] A malicious LDAP server for JNDI injection attacks Java Free False
Retire.js [Website] [Source] Scanner detecting the use of JavaScript libraries with known vulnerabilities JavaScript Free False
ronin-vulns [Source] Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), Cross Site Scripting (XSS), Server Side Template Injection (SSTI), and Open Redirects Ruby Free False
rustbuster [Source] Web directory, file and DNS scanner (wordlist bruteforce); but also a web fuzzer Rust Free False
Scout [Source] Web directory and file scanner (wordlist bruteforce) Go Free False
secureCodeBox [Website] [Source] Continuous security scans based on kubernetes; orchestrate and automate a bunch of security-testing tools Go Free False
See-SURF [Source] SSRF scanner to find entry points Python Free False
Session Hijacking Visual Exploitation [Source] Hijack user sessions by injecting malicious JavaScript code JavaScript Free False
ShapeShifter [Source] GraphQL schema extraction to JSON file with introspection Python Free False
Simple Local File Inclusion Exploiter [Website] [Source] LFI exploit tool Python Free False
Sitadel [Source] Web application security scanner, rewrite and newer version of WAScan Python Free False
sj [Source] Swagger Jacker; audit API endpoints defined in exposed (Swagger/OpenAPI) definition files Go Free False
SleuthQL [Source] Tool that parses Burp history to discover potential SQL injection points and prepare SQLmap request files Python Free False
Smuggler [Source] HTTP request smuggling, desync testing Python Free False
snallygaster [Source] Web scanner that looks for files accessible on web servers that shouldn't be public Python Free False
spidr [Source] Web spidering library that can spider a site, multiple domains, certain links or infinitely Ruby Free False
SQLiv [Source] SQL injection scanner, find vulnerable entry points Python Free False
sqlmap [Website] [Source] Automatic SQL injection and database takeover Python Free False
SqliSniper [Source] Time-based blind SQL injection fuzzer for HTTP headers Python Free False
ssllabs-scan [Website] [Source] CLI reference-implementation client for Qualys SSL Labs APIs, designed for automated and/or bulk testing Go Free False
sslscan2 [Source] Tests SSL/TLS enabled services to discover supported cipher suites C Free False
SSLyze [Source] SSL analysis library and a CLI tools Python Free False
SSRF Proxy [Source] Facilitates tunneling HTTP communications through servers vulnerable to SSRF Ruby Free False
SSRFmap [Source] Automatic SSRF fuzzer and exploitation tool Python Free False
SSRF Sheriff [Source] Genereate custom endpoint to test SSRF; support any HTTP method, content-specific responses, configurable secret token Go Free False
STEWS [Source] Security Testing and Enumeration of WebSockets; tool suite for security testing WebSockets: discover endpoints, fingerprint server, detect vulnerabilities Python Free False
Surf [Source] Escalate SSRF vulnerabilities on modern cloud environments, enumerate reachable hosts Go Free False
testssl.sh [Website] [Source] TLS/SSL scanner to find weak ciphers, protocols or flaws Shell Free False
TIDoS Framework [Source] Comprehensive web-app audit framework Python Free False
TLS map [Website] [Source] CLI & library for mapping TLS cipher algorithm names: IANA, OpenSSL, GnUTLS, NSS Ruby Free False
toxssin [Source] XSS exploitation command-line interface and payload generator Python Free False
Tracy [Source] Tool that help to manually find XSS Go Free False
TrashCompactor [Source] Remove URLs with duplicate funcionality based on script resources included Go Free False
tplmap [Source] SSTI and code injection detection and exploitation tool Python Free False
Typo3Scan [Source] Enumerate Typo3 version and extensions Python Free False
Uniscan [Source] RFI, LFi and RCE scanner Perl Free False
V3n0M [Source] Web dork and vulnerability scanner Python Free False
vaf [Source] Web directory and file scanner (wordlist bruteforce); but also a web fuzzer Nim Free False
Vega [Website] [Source] Multi-platform web scanner and intercepting proxy Java Free False
VOOKI [Website] Windows only web application and REST API vulnerability scanner Free False
w3af [Website] [Source] Web application attack and audit framework, web-oriented security scanner Python Free False
WAFNinja [Source] WAF bypassing tool Python Free False
wapiti [Website] [Source] Web-oriented vulnerability scanner, can generates reports Free False
WappaGo [Source] Web technologies detection; assemble different features from HTTPX, Naabu, GoWitness and Wappalyzer Go Free False
WAScan [Source] Web application security scanner Python Free False
webanalyze [Source] Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning Go Free False
Webhook Tester [Website] [Source] HTTP request collector and inspector PHP Free True
Weevely [Source] Web shell for post-exploitation working with a PHP agent Python Free False
Wfuzz [Website] [Source] Web directory and file scanner (wordlist bruteforce); but also a web fuzzer Python Free False
What CMS [Website] Service able to detect more than 430 CMS, find version used for some CMS, has an API for batch detection Free True
WhatWeb [Website] [Source] Web scanner, recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices, also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more; more than 1800 plugins Ruby Free False
wikto [Source] Nikto for Windows; web security scanner CSharp Free False
WitnessMe [Source] Take screenshots of websites, provide some server header info, and identify default credentials if possible Python Free False
WPScan [Website] [Source] WordPress CMS vulnerability scanner Ruby Free True
wrapwrap [Website] [Source] Generates a php://filter chain that adds a prefix and a suffix to the contents of a file Python Free False
WS-Attacker [Source] Modular framework for SOAP web services penetration testing Java Free False
WSFuzzer [Website] [Source] Fuzzing penetration testing tool for testing HTTP SOAP based web services Python Free False
wsrepl [Website] [Source] Interactive websocket REPL designed specifically for penetration testing Python Free False
WSSAT [Website] [Source] Web Service Security Assessment Tool; WS, REST API, SOAP API dynamic scanner CSharp Free False
x8 [Source] HTTP parameter discovery suite Rust Free False
XCat [Website] [Source] Automate XPath injection/XXE attacks to retrieve documents Python Free False
Xenotix [Website] [Source] XSS detection and exploit framework (Windows only) Python Free False
xnLinkFinder [Source] Discover endpoints and potential parameters for a given target Python Free False
Xray [Website] [Source] Web security scanner (XSS, SQLi, SSRF, XXE, etc.) Go Free False
XSinator [Website] [Source] XS-Leak browser test suite JavaScript Free False
XSpear [Source] XSS Scanner Ruby Free False
XSRFProbe [Source] Advanced Cross Site Request Forgery (CSRF/XSRF) audit and exploitation toolkit Python Free False
XSS hunter [Website] XSS probes host for finding blind XSS Free True
XSS Hunter Express [Source] XSS probes host for finding blind XSS Free False
XSS'OR [Website] [Source] Multi-purpose tool for XSS or JavaScript analysis JavaScript Free True
XSS'OR 2 [Website] [Source] Multi-purpose tool for XSS or JavaScript analysis JavaScript Free True
XSSCon [Source] XSS automatic scanner Python Free False
XSSer [Website] [Source] XSS automatic scanner and exploiter Python Free False
XSStrike [Source] XSS detection tool, parser, payload generator, fuzzing engine, crawler Python Free False
XXEinjector [Source] Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods Ruby Free False
xxeserv [Source] HTTP and FTP server for OOB XXE attacks Go Free False
XXExploiter [Website] [Source] Generates XML payloads, and automatically starts a server to serve the needed DTD's or to do data exfiltration for XXE attacks JavaScript Free False
xxxpwn [Source] XPath injection tool, designed for blind injection Python Free False
xxxpwn_smart [Source] XPath injection tool, fork of xxxpwn adding further optimizations and tweaks, uses predictive text based on a dictionary of words/phrases vs frequencies of occurrence Python Free False
YASUO [Source] Scans for vulnerable & exploitable 3rd-party web applications Ruby Free False
Yoga [Website] [Source] Your OSINT Graphical Analyzer; project to help people understand different courses of action to take based upon the data JavaScript Free False

Wireless

Name Website Source Description Programming language Price Online
Aircrack-Ng [Website] [Source] Suite of tools to assess WiFi network security (cracking WEP and WPA PSK) C Free False
airgeddon [Source] Wireless network audit script Shell Free False
BtleJack [Source] Bluetooth Low Energy Swiss-army knife Python Free False
Crunch-Cracker [Source] Wordlist generator and Wi-Fi cracker Shell Free False
Fluxion [Website] [Source] MITM WPA attack tool Shell Free False
FruityWiFi [Source] Wireless network auditing tool controlled by a web interface PHP Free False
Hijacker [Source] Android GUI for Aircrack, Airodump, Aireplay, MDK3 and Reaver Java Free False
Infernal-Wireless [Source] Automated wireless hacking tool Python Free False
intel-wifi-research-tools [Source] Research tools developed for Intel Wi-Fi chips : decode firmware files, communicate with the chip through Linux's debug filesystem Python Free False
Kismet [Website] [Source] Sniffer, WIDS, and wardriving tool for Wi-Fi, Bluetooth, Zigbee, RF CPlusPlus Free False
MDK3-master [Source] PoC tool to exploit common IEEE 802.11 protocol weaknesses C Free False
MDK4 [Source] PoC tool to exploit common IEEE 802.11 protocol weaknesses C Free False
Modmobjam [Source] Cellular networks jamming PoC for mobile equipments Python Free False
Modmobmap [Source] Tool to retrieve information of cellular networks Python Free False
Oasis [Source] Framework allowing to write, build and patch instrumentation modules for Bluetooth Low Energy (BLE) controllers C Free False
QCSuper [Source] Communicate with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames Python Free False
reaver-wps [Source] Bruteforce WPS tool C Free False
reaver-wps (t6x fork) [Source] Bruteforce WPS tool C Free False
RF Swift [Source] Toolbox for HAM radio enthusiasts and RF professionals Go Free False
trackerjacker [Source] Tool for mapping and tacking wifi networks and devices through raw 802.11 monitoring Python Free False
Wifi-Biter [Source] Dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords Python Free False
wifijammer [Source] Script to jam wifi clients and access points Python Free False
wifite2 [Source] Script for auditing wireless networks that runs existing wireless-auditing tools Python Free False