ImiDucCuMandrieSteagul Posted June 1, 2018 Report Posted June 1, 2018 Online Resources Penetration Testing Resources Metasploit Unleashed - Free Offensive Security Metasploit course PTES - Penetration Testing Execution Standard OWASP - Open Web Application Security Project PENTEST-WIKI - A free online security knowledge library for pentesters / researchers. Vulnerability Assessment Framework - Penetration Testing Framework. The Pentesters Framework - PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine. Everything is organized in a fashion that is cohesive to the Penetration Testing Execution Standard (PTES) and eliminates a lot of things that are hardly used. Exploit development Shellcode Tutorial - Tutorial on how to write shellcode Shellcode Examples - Shellcodes database Exploit Writing Tutorials - Tutorials on how to develop exploits shellsploit - New Generation Exploit Development Kit Voltron - A hacky debugger UI for hackers Social Engineering Resources Social Engineering Framework - An information resource for social engineers Lock Picking Resources Schuyler Towne channel - Lockpicking videos and security talks /r/lockpicking - Resources for learning lockpicking, equipment recommendations. Tools Penetration Testing Distributions Kali - A Linux distribution designed for digital forensics and penetration testing ArchStrike - An Arch Linux repository for security professionals and enthusiasts BlackArch - Arch Linux-based distribution for penetration testers and security researchers NST - Network Security Toolkit distribution Pentoo - Security-focused livecd based on Gentoo BackBox - Ubuntu-based distribution for penetration tests and security assessments Parrot - A distribution similar to Kali, with multiple architecture Fedora Security Lab - Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies. Basic Penetration Testing Tools Metasploit Framework - World's most used penetration testing software Burp Suite - An integrated platform for performing security testing of web applications ExploitPack - Graphical tool for penetration testing with a bunch of exploits BeeF - The Browser Exploitation Framework Project faraday - Collaborative Penetration Test and Vulnerability Management Platform evilgrade - The update explotation framework commix - Automated All-in-One OS Command Injection and Exploitation Tool routersploit - Automated penetration testing software for router [redsnarf] (https://github.com/nccgroup/redsnarf) - Post-exploitation tool for grabbing credentials Docker for Penetration Testing docker pull kalilinux/kali-linux-docker official Kali Linux docker pull owasp/zap2docker-stable - official OWASP ZAP docker pull wpscanteam/wpscan - official WPScan docker pull pandrew/metasploit - docker-metasploit docker pull citizenstig/dvwa - Damn Vulnerable Web Application (DVWA) docker pull wpscanteam/vulnerablewordpress - Vulnerable WordPress Installation docker pull hmlio/vaas-cve-2014-6271 - Vulnerability as a service: Shellshock docker pull hmlio/vaas-cve-2014-0160 - Vulnerability as a service: Heartbleed docker pull opendns/security-ninjas - Security Ninjas docker pull diogomonica/docker-bench-security - Docker Bench for Security docker pull ismisepaul/securityshepherd - OWASP Security Shepherd docker pull danmx/docker-owasp-webgoat - OWASP WebGoat Project docker image docker-compose build && docker-compose up - OWASP NodeGoat docker pull citizenstig/nowasp - OWASP Mutillidae II Web Pen-Test Practice Application docker pull bkimminich/juice-shop - OWASP Juice Shop Vulnerability Scanners Nexpose - Vulnerability Management & Risk Management Software Nessus - Vulnerability, configuration, and compliance assessment Nikto - Web application vulnerability scanner OpenVAS - Open Source vulnerability scanner and manager OWASP Zed Attack Proxy - Penetration testing tool for web applications Secapps - Integrated web application security testing environment w3af - Web application attack and audit framework Wapiti - Web application vulnerability scanner WebReaver - Web application vulnerability scanner for Mac OS X DVCS Ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR arachni - Web Application Security Scanner Framework Network Tools nmap - Free Security Scanner For Network Exploration & Security Audits pig - A Linux packet crafting tool tcpdump/libpcap - A common packet analyzer that runs under the command line Wireshark - A network protocol analyzer for Unix and Windows Network Tools - Different network tools: ping, lookup, whois, etc netsniff-ng - A Swiss army knife for for network sniffing Intercepter-NG - a multifunctional network toolkit SPARTA - Network Infrastructure Penetration Testing Tool dnschef - A highly configurable DNS proxy for pentesters DNSDumpster - Online DNS recon and search service dnsenum - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results dnsmap - Passive DNS network mapper dnsrecon - DNS Enumeration Script dnstracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers passivedns-client - Provides a library and a query tool for querying several passive DNS providers passivedns - A network sniffer that logs all DNS server replies for use in a passive DNS setup Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. Zarp - Zarp is a network attack tool centered around the exploitation of local networks mitmproxy - An interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers mallory - HTTP/HTTPS proxy over SSH Netzob - Reverse engineering, traffic generation and fuzzing of communication protocols DET - DET is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time pwnat - punches holes in firewalls and NATs dsniff - a collection of tools for network auditing and pentesting tgcd - a simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls smbmap - a handy SMB enumeration tool scapy - a python-based interactive packet manipulation program & library Dshell - Network forensic analysis framework Debookee (MAC OS X) - Intercept traffic from any device on your network Dripcap - Caffeinated packet analyzer Wireless Network Tools Aircrack-ng - a set of tools for auditing wireless network Kismet - Wireless network detector, sniffer, and IDS Reaver - Brute force attack against Wifi Protected Setup Wifite - Automated wireless attack tool wifiphisher - Automated phishing attacks against Wi-Fi networks SSL Analysis Tools SSLyze - SSL configuration scanner sslstrip - a demonstration of the HTTPS stripping attacks sslstrip2 - SSLStrip version to defeat HSTS tls_prober - fingerprint a server's SSL/TLS implementation Web exploitation WPScan - Black box WordPress vulnerability scanner SQLmap - Automatic SQL injection and database takeover tool weevely3 - Weaponized web shell Wappalyzer - Wappalyzer uncovers the technologies used on websites cms-explorer - CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running. joomscan - Joomla CMS scanner WhatWeb - Website Fingerprinter BlindElephant - Web Application Fingerprinter fimap - Find, prepare, audit, exploit and even google automatically for LFI/RFI bugs Kadabra - Automatic LFI exploiter and scanner Kadimus - LFI scan and exploit tool liffy - LFI exploitation tool Hex Editors HexEdit.js - Browser-based hex editing Hexinator (commercial) - World's finest Hex Editor HxD - Freeware Hex Editor and Disk Editor Crackers John the Ripper - Fast password cracker Online MD5 cracker - Online MD5 hash Cracker Hashcat - The more fast hash cracker THC Hydra - Another Great Password Cracker Windows Utils Sysinternals Suite - The Sysinternals Troubleshooting Utilities Windows Credentials Editor - security tool to list logon sessions and add, change, list and delete associated credentials mimikatz - Credentials extraction tool for Windows OS PowerSploit - A PowerShell Post-Exploitation Framework Windows Exploit Suggester - Detects potential missing patches on the target Responder - A LLMNR, NBT-NS and MDNS poisoner Bloodhound - A graphical Active Directory trust relationship explorer Empire - Empire is a pure PowerShell post-exploitation agent Fibratus - Tool for exploration and tracing of the Windows kernel Linux Utils Linux Exploit Suggester - Linux Exploit Suggester; based on operating system release number. DDoS Tools LOIC - An open source network stress tool for Windows JS LOIC - JavaScript in-browser version of LOIC T50 - The more fast network stress tool Social Engineering Tools SET - The Social-Engineer Toolkit from TrustedSec OSInt Tools Maltego - Proprietary software for open source intelligence and forensics, from Paterva. theHarvester - E-mail, subdomain and people names harvester creepy - A geolocation OSINT tool metagoofil - Metadata harvester Google Hacking Database - a database of Google dorks; can be used for recon Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans Shodan - Shodan is the world's first search engine for Internet-connected devices recon-ng - A full-featured Web Reconnaissance framework written in Python github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak vcsmap - A plugin-based tool to scan public version control systems for sensitive information Spiderfoot - multi-source OSINT automation tool with a Web UI and report visualizations Anonymity Tools Tor - The free software for enabling onion routing online anonymity I2P - The Invisible Internet Project Nipe - Script to redirect all traffic from the machine to the Tor network. Reverse Engineering Tools IDA Pro - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger IDA Free - The freeware version of IDA v5.0 WDK/WinDbg - Windows Driver Kit and WinDbg OllyDbg - An x86 debugger that emphasizes binary code analysis Radare2 - Opensource, crossplatform reverse engineering framework x64_dbg - An open-source x64/x32 debugger for windows Immunity Debugger - A powerful new way to write exploits and analyze malware Evan's Debugger - OllyDbg-like debugger for Linux Medusa disassembler - An open source interactive disassembler plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code peda - Python Exploit Development Assistance for GDB dnSpy - dnSpy is a tool to reverse engineer .NET assemblies CTF Tools Pwntools - CTF framework for use in CTFs Books Penetration Testing Books The Art of Exploitation by Jon Erickson, 2008 Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011 Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014 Rtfm: Red Team Field Manual by Ben Clark, 2014 The Hacker Playbook 2: Practical Guide To Penetration Testing The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013 Professional Penetration Testing by Thomas Wilhelm, 2013 Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012 Violent Python by TJ O'Connor, 2012 Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007 Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014 Penetration Testing: Procedures & Methodologies by EC-Council, 2010 Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010 Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014 Bug Hunter's Diary by Tobias Klein, 2011 Hackers Handbook Series The Database Hacker's Handbook, David Litchfield et al., 2005 The Shellcoders Handbook by Chris Anley et al., 2007 The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009 The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011 iOS Hackers Handbook by Charlie Miller et al., 2012 Android Hackers Handbook by Joshua J. Drake et al., 2014 The Browser Hackers Handbook by Wade Alcorn et al., 2014 The Mobile Application Hackers Handbook by Dominic Chell et al., 2015 Car Hacker's Handbook by Craig Smith, 2016 Defensive Development Holistic Info-Sec for Web Developers (Fascicle 0) Holistic Info-Sec for Web Developers (Fascicle 1) Network Analysis Books Nmap Network Scanning by Gordon Fyodor Lyon, 2009 Practical Packet Analysis by Chris Sanders, 2011 Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012 Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012 Reverse Engineering Books Reverse Engineering for Beginners by Dennis Yurichev Hacking the Xbox by Andrew Huang, 2003 The IDA Pro Book by Chris Eagle, 2011 Practical Reverse Engineering by Bruce Dang et al., 2014 Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015 Malware Analysis Books Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012 The Art of Memory Forensics by Michael Hale Ligh et al., 2014 Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010 Windows Books Windows Internals by Mark Russinovich et al., 2012 Social Engineering Books The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002 The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005 Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011 No Tech Hacking by Johnny Long & Jack Wiles, 2008 Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010 Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014 Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014 Lock Picking Books Practical Lock Picking by Deviant Ollam, 2012 Keys to the Kingdom by Deviant Ollam, 2012 CIA Lock Picking Field Operative Training Manual Lock Picking: Detail Overkill by Solomon Eddie the Wire books Vulnerability Databases NVD - US National Vulnerability Database CERT - US Computer Emergency Readiness Team OSVDB - Open Sourced Vulnerability Database Bugtraq - Symantec SecurityFocus Exploit-DB - Offensive Security Exploit Database Fulldisclosure - Full Disclosure Mailing List MS Bulletin - Microsoft Security Bulletin MS Advisory - Microsoft Security Advisories Inj3ct0r - Inj3ct0r Exploit Database Packet Storm - Packet Storm Global Security Resource SecuriTeam - Securiteam Vulnerability Information CXSecurity - CSSecurity Bugtraq List Vulnerability Laboratory - Vulnerability Research Laboratory ZDI - Zero Day Initiative Vulners - Security database of software vulnerabilities Security Courses Offensive Security Training - Training from BackTrack/Kali developers SANS Security Training - Computer Security Training & Certification Open Security Training - Training material for computer security classes CTF Field Guide - everything you need to win your next CTF competition ARIZONA CYBER WARFARE RANGE - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare. Cybrary - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Enviroments'. Computer Security Student - Many free tutorials, great for beginners, $10/mo membership unlocks all content European Union Agency for Network and Information Security - ENISA Cyber Security Training material Information Security Conferences DEF CON - An annual hacker convention in Las Vegas Black Hat - An annual security conference in Las Vegas BSides - A framework for organising and holding security conferences CCC - An annual meeting of the international hacker scene in Germany DerbyCon - An annual hacker conference based in Louisville PhreakNIC - A technology conference held annually in middle Tennessee ShmooCon - An annual US east coast hacker convention CarolinaCon - An infosec conference, held annually in North Carolina CHCon - Christchurch Hacker Con, Only South Island of New Zealand hacker con SummerCon - One of the oldest hacker conventions, held during Summer Hack.lu - An annual conference held in Luxembourg HITB - Deep-knowledge security conference held in Malaysia and The Netherlands Troopers - Annual international IT Security event with workshops held in Heidelberg, Germany Hack3rCon - An annual US hacker conference ThotCon - An annual US hacker conference held in Chicago LayerOne - An annual US security conference held every spring in Los Angeles DeepSec - Security Conference in Vienna, Austria SkyDogCon - A technology conference in Nashville SECUINSIDE - Security Conference in Seoul DefCamp - Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania AppSecUSA - An annual conference organised by OWASP BruCON - An annual security conference in Belgium Infosecurity Europe - Europe's number one information security event, held in London, UK Nullcon - An annual conference in Delhi and Goa, India RSA Conference USA - An annual security conference in San Francisco, California, USA Swiss Cyber Storm - An annual security conference in Lucerne, Switzerland Virus Bulletin Conference - An annual conference going to be held in Denver, USA for 2016 Ekoparty - Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina 44Con - Annual Security Conference held in London BalCCon - Balkan Computer Congress, annualy held in Novi Sad, Serbia FSec - FSec - Croatian Information Security Gathering in Varaždin, Croatia Information Security Magazines 2600: The Hacker Quarterly - An American publication about technology and computer "underground" Phrack Magazine - By far the longest running hacker zine https://github.com/wtsxDev/Penetration-Testing 2 Quote