Penetration Testing & Hacking Tools List
Last updated
Was this helpful?
Last updated
Was this helpful?
Metasploit Unleashed β Free Offensive Security Metasploit course.
β Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.
β Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
β Free online security knowledge library for pentesters and researchers.
β Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
β Ultimate resource for all things cross-site including payloads, tools, games, and documentation.
β Framework for providing test cases that result in verified facts on which to base decisions that impact an organizationβs security.
β Curated knowledge base and model for cyber adversary behavior.
β Tutorial on how to write shellcode.
β Shellcodes database.
β Tutorials on how to develop exploits.
β Collection of various OSINT Hacking Tools broken out by category.
β Collection of OSINT tools. The menu on the left can be used to navigate through the categories.
β Collection of OSINT links and custom Web interfaces to other services such as and .
β Information about wireless networks worldwide, with user-friendly desktop and web applications.
β the Information resource for social engineers.
β Lockpicking videos and security talks.
β More lockpicking videos.
β Resources for learning lockpicking, equipment recommendations.
β Penetration testing tools & Hacking Tools list Related Complete list of security operating systems.
β Description of main penetration testing distributions.
β Website dedicated to talking about, reviewing, and keeping up to date with open-source operating systems.
β Open source automated malware analysis system.
β Italian GNU/Linux live distribution created as a digital forensics project.
β Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
β Live OS aimed at preserving privacy and anonymity.
β GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools
β Arch GNU/Linux repository for security professionals and enthusiasts.
β Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.
β Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.
β Security-focused live CD based on Gentoo.
β Ubuntu-based distribution for penetration tests and security assessments.
β Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.
β GNU/Linux virtual machine that is pre-configured for online investigators.
β provides a safe test environment to work on security auditing, forensics, system rescue, and teaching security testing methodologies.
β Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.
β GNU/Linux distribution focused on tools useful during the Internet of Things (IoT) security assessments.
docker pull kalilinux/kali-linux-docker
docker pull owasp/zap2docker-stable
β
docker pull wpscanteam/wpscan
β
docker pull citizenstig/dvwa
β
docker pull wpscanteam/vulnerablewordpress
β
docker pull hmlio/vaas-cve-2014-6271
β
docker pull hmlio/vaas-cve-2014-0160
β
docker pull opendns/security-ninjas
β
docker pull diogomonica/docker-bench-security
β
docker pull ismisepaul/securityshepherd
β
docker pull danmx/docker-owasp-webgoat
β
docker-compose build && docker-compose up
β
docker pull citizenstig/nowasp
β
docker pull bkimminich/juice-shop
β
docker pull kalilinux/kali-linux-docker
β
docker pull phocean/msf
β
β post-exploitation Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.
β Java-based GUI front-end for the Metasploit Framework.
β Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
β Graphical tool for automating penetration tests that ships with many pre-packaged exploits.
β Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,
β Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
β Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
β Free software implementation of the popular Nessus vulnerability assessment system.
β Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.
β Static analysis security vulnerability scanner for Ruby on Rails applications.
β Extensible C/C++ static analyzer focused on finding bugs.
β Free software static analyzer to look for bugs in Java code.
β Security-focused static analysis for the Phoenix Framework.
β Security oriented static analyzer for Python code.
β Noisy but fast black box web server and web application vulnerability scanner.
β Scriptable framework for evaluating the security of web applications.
β Hacking Tools for Web application attack and audit framework.
β Black box web application vulnerability scanner with built-in fuzzer.
β In-browser web application security testing suite.
β Commercial, graphical web application vulnerability scanner designed for macOS.
β Hacking Tools of the Black box WordPress vulnerability scanner.
β Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
β one of the best Hacking Tools for Joomla vulnerability scanner.
β Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
β Open source network scanner that enables researchers to easily perform Internet-wide network studies.
β Free security scanner for network exploration & security audits.
β one of the Hacking Tools forGNU/Linux packet crafting.
β Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
β Common packet analyzer that runs under the command line.
β Widely-used graphical, cross-platform network protocol analyzer.
β Website offering an interface to numerous basic network utilities like ping
, traceroute
, whois
, and more.
β Swiss army knife for network sniffing.
β Multifunctional network toolkit.
β Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
β Highly configurable DNS proxy for pentesters.
β one of the Hacking Tools for Online DNS recon and search service.
β Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
β Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack and then performs reverse look-ups on the results.
β One of the Hacking Tools for Passive DNS network mapper.
β One of the Hacking Tools for DNS enumeration script.
β Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
β Library and query tool for querying several passive DNS providers.
β Network sniffer that logs all DNS server replies for use in a passive DNS setup.
β best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning the entire Internet in under 5 minutes.
β Network attack tool centered around the exploitation of local networks.
β Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
β Automated ettercap TCP/IP Hacking Tools .
β HTTP/HTTPS proxy over SSH.
β Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
β Reverse engineering, traffic generation and fuzzing of communication protocols.
β Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
β Punches holes in firewalls and NATs.
β Collection of tools for network auditing and pentesting.
β Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
β Handy SMB enumeration tool.
β Python-based interactive packet manipulation program & library.
β Network forensic analysis framework.
β Simple and powerful network traffic analyzer for macOS.
β Caffeinated packet analyzer.
β Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
β Automated multi-function printer data harvester for gathering usable data during security assessments.
β Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
β Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
β Network (sub)domain discovery and reconnaissance automation tool.
β Comprehensive, mature suite for machine-in-the-middle attacks.
β Modular, portable and easily extensible MITM framework.
β A swiss army knife for pentesting networks.
β A collection of Python classes for working with network protocols.
β Set of Penetration testing & Hacking Tools list for auditing wireless networks.
β Wireless network detector, sniffer, and IDS.
β Brute force attack against Wifi Protected Setup.
β Automated wireless attack tool.
β Suite of automated social engineering-based WPA attacks.
β Fast and comprehensive TLS/SSL configuration analyzer to help identify security misconfigurations.
β Fingerprint a serverβs SSL/TLS implementation.
β Command-line tool which checks a serverβs service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.
β Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
β Free cross-platform web debugging proxy with user-friendly companion tools.
β One of the Hacking Tools ntegrated platform for performing security testing of web applications.
β Easy to install a test browser with all the appropriate settings needed for web application testing with native Burp support, from NCCGroup.
β Command and control server for delivering exploits to commandeered Web browsers.
β Python-based framework for pentesting Web applications based on the OWASP Testing Guide.
β Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
β Exploit WordPress-powered websites with Metasploit.
β Automatic SQL injection and database takeover tool.
β Automatic server-side template injection and Web server takeover Hacking Tools.
β Weaponized web shell.
β Wappalyzer uncovers the technologies used on websites.
β Website fingerprinter.
β Web application fingerprinter.
β Identifies and fingerprints Web Application Firewall (WAF) products.
β Find, prepare, audit, exploit and even google automatically for LFI/RFI bugs.
β Automatic LFI exploiter and scanner.
β LFI scan and exploit tool.
β LFI exploitation tool.
β Automated all-in-one operating system command injection and exploitation tool.
β Rip web-accessible (distributed) version control systems: SVN/GIT/HG/BZR.
β One of the Hacking Tools that Automatically find and download Web-accessible .git
repositories.
β One of the Hacking Tools Demonstration of the HTTPS stripping attacks.
β SSLStrip version to defeat HSTS.
β Automatic NoSQL injection and database takeover tool.
β A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases, and dynamic default pages.
β Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
β Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
β A simple script to take screenshots of the list of websites.
β Browser-based hex editing.
β Worldβs finest (proprietary, commercial) Hex Editor.
β Binary file editor for Windows.
β Native macOS hex editor that supports plug-ins to display custom data types.
β File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
β Binary data visualization and analysis tool.
β Python library to view and edit a binary stream as the tree of fields and tools for metadata extraction.
β Generate Metasploit payloads that bypass common anti-virus solutions.
β Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
β Runtime encryptor for 32-bit portable executables (βPE .exe
sβ).
β Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
β Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
β Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
β Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
β One of the best Hacking Tools for Fast password cracker.
β Another One of the Hacking Tools The more fast hash cracker.
β Generates custom wordlists by spidering a targetβs website and collecting unique words.
β Simple HS256 JWT token brute force cracker.
β RAR brute force cracker.
β Find the password of an encrypted wallet file (i.e. wallet.dat
).
β The Sysinternals Troubleshooting Utilities.
β Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
β Credentials extraction tool for Windows operating system.
β PowerShell Post-Exploitation Framework.
β Detects potential missing patches on the target.
β LLMNR, NBT-NS and MDNS poisoner.
β Graphical Active Directory trust relationship explorer.
β Pure PowerShell post-exploitation agent.
β Tool for exploration and tracing of the Windows kernel.
β Generates architecture-independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.
β Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
β Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or certutil
(using fake certificates).
β Python script that uses Empireβs RESTful API to automate gaining Domain Admin rights in Active Directory environments.
β Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
β Pure Python post-exploitation data mining and remote administration tool for macOS.
β Open source network stress tool for Windows.
β JavaScript in-browser version of LOIC.
β DoS tool that uses low bandwidth on the attacking side.
β Updated version of Low Orbit Ion Cannon, has βboostersβ to get around common countermeasures.
β Faster network stress tool.
β Abuses OSI layer 7 HTTP to create/manage βzombiesβ and to conduct different attacks using; GET
/POST
, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
β Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
β One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
β MITM attack framework used for phishing credentials and session cookies from any Web service.
β Automated phishing attacks against WiFi networks.
β Tool for phishing and corporate espionage written in Ruby.
β Tool for generating keyloggers.
β One of the Hacking Tools and Proprietary software for open-source intelligence and forensics, from Paterva.
β E-mail, subdomain, and people names harvester.
β Geolocation OSINT tool.
β Metadata harvester.
β Database of Google dorks; can be used for recon.
β Common Google dorks and others you probably donβt know.
β Command-line Google Dorking tool.
β Command-line Google dork tool.
β collects data on hosts and websites through daily ZMap and ZGrab scans.
β Worldβs first search engine for Internet-connected devices.
β One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.
β CLI tool to scan Github Repos/organizations for potential sensitive information leak.
β Plugin-based tool to scan public version control systems for sensitive information.
β Multi-source OSINT automation tool with a Web UI and report visualizations
β GNU/Linux bash based Bing and Google Dorking Tool.
β Perform Google dorks against a domain.
β Information gathering via dorks.
β one of the Hacking Tools for Automated Pentest Recon Scanner.
β Search engine for threats.
β VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.
β OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.
β Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.
β Automated OSINT & Attack Surface discovery framework with powerful API, UI, and CLI.
β Search engine for cyberspace that lets the user find specific network components.
β Free software and onion routed overlay network that helps you defend against traffic analysis.
β One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
β The Invisible Internet Project.
β Script to redirect all traffic from the machine to the Tor network.
β Comprehensive detection page to test your own Web browserβs configuration for privacy and identity leaks.
β Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, .
β Windows Driver Kit and WinDbg.
β x86 debugger for Windows binaries that emphasizes binary code analysis.
β Open source, cross-platform reverse engineering framework.
β Open source x64/x32 debugger for windows.
β Powerful way to write exploits and analyze malware.
β OllyDbg-like debugger for GNU/Linux.
β Open source, cross-platform interactive disassembler.
β Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
β Python Exploit Development Assistance for GDB.
β one of the Hacking Tools to reverse engineer .NET assemblies.
β Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
β Python scriptable Reverse Engineering sandbox by Cisco-Talos.
β Extensible debugger UI toolkit written in Python.
β lightweight multi-platform, multi-architecture disassembly framework.
β Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
β Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
β Covert βUSB Ethernet Adapterβ that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
β Customizable keystroke injection attack platform masquerading as a USB thumb drive.
β Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
β Wireless auditing and penetration testing platform.
β RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
β Complete open-source toolchain for side-channel power analysis and glitching attacks.
β Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
β Rapid exploit development framework built for use in CTFs.
β Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
β Curated list of public penetration test reports released by several consulting firms and academic security groups.
β testandverification.com template.
β hitachi-systems-security.com template.
β lucideus.com template.
β crest-approved.org template.
β pcisecuritystandards.org template.
β Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
β United States governmentβs National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
β Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
β Public, vendor-neutral forum for a detailed discussion of vulnerabilities, often publishes details before many other sources.
β Software security bug identification database compiled from submissions to the SecurityFocus mailing Penetration testing tools list and other sources, operated by Symantec, Inc.
β Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
β Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).
β Archive of security advisories impacting Microsoft software.
β Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
β Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
β Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
β Independent source of software vulnerability information.
β Open forum for security advisories organized by category of exploit target.
β Bug bounty program with the publicly accessible archive of published security advisories, operated by TippingPoint.
β Security database of software vulnerabilities.
() β Exploit marketplace and vulnerability, information aggregator.
β Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.Hacking Tools
β Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.Hacking Tools
β annual hacker convention in Las Vegas.
β Annual security conference in Las Vegas.
β Framework for organizing and holding security conferences.
β Annual meeting of the international hacker scene in Germany.
β Annual hacker conference based in Louisville.
β Technology conference held annually in middle Tennessee.
β Annual US East coast hacker convention.
β Infosec conference, held annually in North Carolina.
β Christchurch Hacker Con, Only South Island of New Zealand hacker con.
β One of the oldest hacker conventions, held during Summer.
β Annual conference held in Luxembourg.
β Largest hacking conference in Canada.
β Deep-knowledge security conference held in Malaysia and The Netherlands.
β Annual international IT Security event with workshops held in Heidelberg, Germany.
β Annual US hacker conference.
β Annual US hacker conference held in Chicago.
β Annual US security conference held every spring in Los Angeles.
β Security Conference in Vienna, Austria.
β Technology conference in Nashville.
β Security Conference in .
β Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.
β Annual conference organized by OWASP.
β Annual security conference in Belgium.
β Europeβs number one information security event, held in London, UK.
β Annual conference in Delhi and Goa, India.
β Annual security conference in San Francisco, California, USA.
β Annual security conference in Lucerne, Switzerland.
β Annual conference going to be held in Denver, the USA for 2016.
β Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.
β Annual Security Conference held in London.
β Balkan Computer Congress, annually held in Novi Sad, Serbia.
β FSec β Croatian Information Security Gathering in VaraΕΎdin, Croatia.
β American publication about technology and computer βunderground.β
β By far the longest-running hacker zine.
β List of Hacking tools present in Kali Linux.
β Top 125 Network Security Hacking Tools.
β Awesome Pentest Cheat Sheets.
β One of the main language for open source security tools.
β Software framework for Microsoft Windows platform development.
β Command-line frameworks, toolkits, guides, and gizmos.
β The de-facto language for writing exploits.
β The de-facto language for writing exploits.
β The de-facto language for writing exploits.
β In-browser development and scripting.
β Curated list of delightful Node.js packages and resources.
β Lots of pentesting tools are written in Python.
β General Python programming.
β General Python programming.
β Collection of Android security-related resources.
β The List of the Lists.
β Resources for learning about application security.
β Capture The Flag frameworks, libraries, etc.
β Comprehensive directory of CTFs, wargames, hacking challenge websites, Penetration testing tools list practice lab exercises, and more.
β Tutorials, tools, and resources.
β Honeypots, tools, components, and more.
β Information security resources for pentesting, forensics, and more.
β Free (mostly open-source) forensic analysis tools and resources.
β Tools and resources for analysts.
β Tools for processing network traffic.
β Software, libraries, documents, and other resources.
β Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys.
β Collection of multiple types of lists used during security assessments.
β Curated list of security conferences.
β Awesome OSINT list containing great resources.
β YARA rules, tools, and people.
Learn & practice
Become VeryLazyTech ! π
β Twitter .
πΎ Github .
π Medium .
πΊ YouTube .
π© Telegram .
π΅οΈββοΈ My Site .
Visit our for e-books and courses. π