Penetration Testing & Hacking Tools List

chevron-rightSupport VeryLazyTech ๐ŸŽ‰hashtag

Online Resources โ€“ Hacking Tools

Penetration Testing Resources

Exploit Development

OSINT Resources

Social Engineering Resources

Lock Picking Resources

Operating Systems

Hacking Tools

Penetration Testing Distributions

  • Kaliarrow-up-right โ€“ GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools

  • ArchStrikearrow-up-right โ€“ Arch GNU/Linux repository for security professionals and enthusiasts.

  • BlackArcharrow-up-right โ€“ Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.

  • Network Security Toolkit (NST)arrow-up-right โ€“ Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.

  • Pentooarrow-up-right โ€“ Security-focused live CD based on Gentoo.

  • BackBoxarrow-up-right โ€“ Ubuntu-based distribution for penetration tests and security assessments.

  • Parrotarrow-up-right โ€“ Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.

  • Buscadorarrow-up-right โ€“ GNU/Linux virtual machine that is pre-configured for online investigators.

  • Fedora Security Labarrow-up-right โ€“ provides a safe test environment to work on security auditing, forensics, system rescue, and teaching security testing methodologies.

  • The Pentesters Frameworkarrow-up-right โ€“ Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.

  • AttifyOSarrow-up-right โ€“ GNU/Linux distribution focused on tools useful during the Internet of Things (IoT) security assessments.

Docker for Penetration Testing

Multi-paradigm Frameworks

  • Metasploitarrow-up-right โ€“ post-exploitation Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.

  • Armitagearrow-up-right โ€“ Java-based GUI front-end for the Metasploit Framework.

  • Faradayarrow-up-right โ€“ Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.

  • ExploitPackarrow-up-right โ€“ Graphical tool for automating penetration tests that ships with many pre-packaged exploits.

  • Pupyarrow-up-right โ€“ Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,

Vulnerability Scanners

  • Nexposearrow-up-right โ€“ Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.

  • Nessusarrow-up-right โ€“ Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.

  • OpenVASarrow-up-right โ€“ Free software implementation of the popular Nessus vulnerability assessment system.

  • Vulsarrow-up-right โ€“ Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.

Static Analyzers

Web Scanners

  • Niktoarrow-up-right โ€“ Noisy but fast black box web server and web application vulnerability scanner.

  • Arachniarrow-up-right โ€“ Scriptable framework for evaluating the security of web applications.

  • w3afarrow-up-right โ€“ Hacking Tools for Web application attack and audit framework.

  • Wapitiarrow-up-right โ€“ Black box web application vulnerability scanner with built-in fuzzer.

  • SecAppsarrow-up-right โ€“ In-browser web application security testing suite.

  • WebReaverarrow-up-right โ€“ Commercial, graphical web application vulnerability scanner designed for macOS.

  • WPScanarrow-up-right โ€“ Hacking Tools of the Black box WordPress vulnerability scanner.

  • cms-explorerarrow-up-right โ€“ Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.

  • joomscanarrow-up-right โ€“ one of the best Hacking Tools for Joomla vulnerability scanner.

  • ACSTISarrow-up-right โ€“ Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.

Network Tools

Wireless Network Hacking Tools

Transport Layer Security Tools

  • SSLyzearrow-up-right โ€“ Fast and comprehensive TLS/SSL configuration analyzer to help identify security misconfigurations.

  • tls_proberarrow-up-right โ€“ Fingerprint a serverโ€™s SSL/TLS implementation.

  • testssl.sharrow-up-right โ€“ Command-line tool which checks a serverโ€™s service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

Web Exploitation

Hex Editors

File Format Analysis Tools

  • Kaitai Structarrow-up-right โ€“ File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.

  • Velesarrow-up-right โ€“ Binary data visualization and analysis tool.

  • Hachoirarrow-up-right โ€“ Python library to view and edit a binary stream as the tree of fields and tools for metadata extraction.

Defense Evasion Tools

  • Veilarrow-up-right โ€“ Generate Metasploit payloads that bypass common anti-virus solutions.

  • shellsploitarrow-up-right โ€“ Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.

  • Hyperionarrow-up-right โ€“ Runtime encryptor for 32-bit portable executables (โ€œPE .exesโ€).

  • AntiVirus Evasion Tool (AVET)arrow-up-right โ€“ Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.

  • peCloak.pyarrow-up-right โ€“ Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.

  • peCloakCapstonearrow-up-right โ€“ Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.

  • UniByAvarrow-up-right โ€“ Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.

Hash Cracking Hacking Tools

Windows Utilities

GNU/Linux Utilities

macOS Utilities

  • Bellaarrow-up-right โ€“ Pure Python post-exploitation data mining and remote administration tool for macOS.

DDoS Tools

  • LOICarrow-up-right โ€“ Open source network stress tool for Windows.

  • JS LOICarrow-up-right โ€“ JavaScript in-browser version of LOIC.

  • SlowLorisarrow-up-right โ€“ DoS tool that uses low bandwidth on the attacking side.

  • HOICarrow-up-right โ€“ Updated version of Low Orbit Ion Cannon, has โ€˜boostersโ€™ to get around common countermeasures.

  • T50arrow-up-right โ€“ Faster network stress tool.

  • UFONetarrow-up-right โ€“ Abuses OSI layer 7 HTTP to create/manage โ€˜zombiesโ€™ and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Social Engineering Tools

OSINT Tools

Anonymity Tools

Reverse Engineering Tools

Physical Access Tools

  • LAN Turtlearrow-up-right โ€“ Covert โ€œUSB Ethernet Adapterโ€ that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.

  • USB Rubber Duckyarrow-up-right โ€“ Customizable keystroke injection attack platform masquerading as a USB thumb drive.

  • Poisontaparrow-up-right โ€“ Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.

  • WiFi Pineapplearrow-up-right โ€“ Wireless auditing and penetration testing platform.

  • Proxmark3arrow-up-right โ€“ RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.

Side-channel Tools

CTF Tools

  • ctf-toolsarrow-up-right โ€“ Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.

  • Pwntoolsarrow-up-right โ€“ Rapid exploit development framework built for use in CTFs.

  • RsaCtfToolarrow-up-right โ€“ Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.

Penetration Testing Report Templates

Vulnerability Databases โ€“ Hacking Tools

Information Security Conferences โ€“ Hacking Tools

Information Security Magazines โ€“ Hacking Tools

Awesome Lists โ€“ Hacking Tools โ€“

circle-check

Last updated