Penetration Testing & Hacking Tools List

chevron-rightSupport VeryLazyTech 🎉hashtag

Online Resources – Hacking Tools

Penetration Testing Resources

Exploit Development

OSINT Resources

Social Engineering Resources

Lock Picking Resources

Operating Systems

Hacking Tools

Penetration Testing Distributions

Docker for Penetration Testing

Multi-paradigm Frameworks

  • Metasploitarrow-up-right – post-exploitation Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.

  • Armitagearrow-up-right – Java-based GUI front-end for the Metasploit Framework.

  • Faradayarrow-up-right – Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.

  • ExploitPackarrow-up-right – Graphical tool for automating penetration tests that ships with many pre-packaged exploits.

  • Pupyarrow-up-right – Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,

Vulnerability Scanners

  • Nexposearrow-up-right – Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.

  • Nessusarrow-up-right – Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.

  • OpenVASarrow-up-right – Free software implementation of the popular Nessus vulnerability assessment system.

  • Vulsarrow-up-right – Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.

Static Analyzers

Web Scanners

Network Tools

Wireless Network Hacking Tools

Transport Layer Security Tools

  • SSLyzearrow-up-right – Fast and comprehensive TLS/SSL configuration analyzer to help identify security misconfigurations.

  • tls_proberarrow-up-right – Fingerprint a server’s SSL/TLS implementation.

  • testssl.sharrow-up-right – Command-line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.

Web Exploitation

Hex Editors

File Format Analysis Tools

  • Kaitai Structarrow-up-right – File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.

  • Velesarrow-up-right – Binary data visualization and analysis tool.

  • Hachoirarrow-up-right – Python library to view and edit a binary stream as the tree of fields and tools for metadata extraction.

Defense Evasion Tools

Hash Cracking Hacking Tools

Windows Utilities

GNU/Linux Utilities

macOS Utilities

  • Bellaarrow-up-right – Pure Python post-exploitation data mining and remote administration tool for macOS.

DDoS Tools

  • LOICarrow-up-right – Open source network stress tool for Windows.

  • JS LOICarrow-up-right – JavaScript in-browser version of LOIC.

  • SlowLorisarrow-up-right – DoS tool that uses low bandwidth on the attacking side.

  • HOICarrow-up-right – Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common countermeasures.

  • T50arrow-up-right – Faster network stress tool.

  • UFONetarrow-up-right – Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

Social Engineering Tools

OSINT Tools

Anonymity Tools

Reverse Engineering Tools

Physical Access Tools

  • LAN Turtlearrow-up-right – Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.

  • USB Rubber Duckyarrow-up-right – Customizable keystroke injection attack platform masquerading as a USB thumb drive.

  • Poisontaparrow-up-right – Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.

  • WiFi Pineapplearrow-up-right – Wireless auditing and penetration testing platform.

  • Proxmark3arrow-up-right – RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.

Side-channel Tools

CTF Tools

  • ctf-toolsarrow-up-right – Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.

  • Pwntoolsarrow-up-right – Rapid exploit development framework built for use in CTFs.

  • RsaCtfToolarrow-up-right – Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.

Penetration Testing Report Templates

Vulnerability Databases – Hacking Tools

Information Security Conferences – Hacking Tools

Information Security Magazines – Hacking Tools

Awesome Lists – Hacking Tools –

circle-check

Last updated