SecTools.Org: Top 125 Network Security Tools
Kali Tools
Multi-paradigm Frameworks
- Metasploit - Software for offensive security
teams to help verify vulnerabilities and manage security assessments.
- Armitage - Java-based GUI front-end for the
Metasploit Framework.
- Faraday - Multiuser integrated
pentesting environment for red teams performing cooperative penetration tests, security audits, and risk
assessments.
- ExploitPack - Graphical tool for
automating penetration tests that ships with many pre-packaged exploits.
- Pupy - Cross-platform (Windows, Linux,
macOS, Android) remote administration and post-exploitation tool.
- AutoSploit - Automated mass
exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit
exploit modules based on the Shodan query.
- Decker - Penetration testing
orchestration and automation framework, which allows writing declarative, reusable configurations
capable of ingesting variables and using outputs of tools it has run as inputs to others.
Network Vulnerability Scanners
- Netsparker Application Security Scanner -
Application security scanner to automatically find security flaws.
- Nexpose - Commercial
vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.
- Nessus -
Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.
- OpenVAS - Free software implementation of the
popular Nessus vulnerability assessment system.
- Vuls - Agentless vulnerability
scanner for GNU/Linux and FreeBSD, written in Go.
Static Analyzers
- Brakeman - Static analysis
security vulnerability scanner for Ruby on Rails applications.
- cppcheck - Extensible C/C++ static
analyzer focused on finding bugs.
- FindBugs - Free software static analyzer
to look for bugs in Java code.
- sobelow - Security-focused static
analysis for the Phoenix Framework.
- bandit - Security oriented static
analyser for python code.
- Progpilot - Static security
analysis tool for PHP code.
- RegEx-DoS - Analyzes source code for
Regular Expressions susceptible to Denial of Service attacks.
Web Vulnerability Scanners
- Netsparker Application Security Scanner -
Application security scanner to automatically find security flaws.
- Nikto - Noisy but fast black box web server and
web application vulnerability scanner.
- Arachni - Scriptable framework for
evaluating the security of web applications.
- w3af - Web application attack and
audit framework.
- Wapiti - Black box web application
vulnerability scanner with built-in fuzzer.
- SecApps - In-browser web application security testing
suite.
- WebReaver - Commercial, graphical web
application vulnerability scanner designed for macOS.
- WPScan - Black box WordPress vulnerability scanner.
- cms-explorer - Reveal the
specific modules, plugins, components and themes that various websites powered by content management
systems are running.
- joomscan - Joomla vulnerability scanner.
- ACSTIS - Automated
client-side template injection (sandbox escape/bypass) detection for AngularJS.
- SQLmate - A friend of sqlmap
that identifies sqli vulnerabilities based on a given dork and website (optional).
- JCS - Joomla Vulnerability Component
Scanner with automatic database updater from exploitdb and packetstorm.
Network Tools
- pig - GNU/Linux packet crafting tool.
- Network-Tools.com - Website offering an interface to numerous
basic network utilities like
ping
, traceroute
, whois
, and more.
- Intercepter-NG - Multifunctional network toolkit.
- SPARTA - Graphical interface offering scriptable,
configurable access to existing network infrastructure scanning and enumeration tools.
- Zarp - Network attack tool centered around the
exploitation of local networks.
- dsniff - Collection of tools for network auditing
and pentesting.
- scapy - Python-based interactive packet manipulation
program & library.
- Printer Exploitation Toolkit (PRET) - Tool for printer
security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and
PCL printer language features.
- Praeda - Automated multi-function printer data harvester
for gathering usable data during security assessments.
- routersploit - Open source exploitation
framework similar to Metasploit but dedicated to embedded devices.
- CrackMapExec - Swiss army knife for pentesting
networks.
- impacket - Collection of Python classes for
working with network protocols.
- dnstwist - Domain name permutation engine for detecting
typo squatting, phishing and corporate espionage.
- THC Hydra - Online password cracking tool with
built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP,
VNC, and more.
- IKEForce - Command line IPSEC VPN brute forcing
tool for Linux that allows group name/ID enumeration and XAUTH brute forcing capabilities.
- hping3 - Network tool able to send custom TCP/IP packets.
- rshijack - TCP connection hijacker, Rust rewrite of
shijack
.
- NetworkMiner - A Network Forensic Analysis Tool
(NFAT).
- Paros - A Java-based HTTP/HTTPS proxy for assessing
web application vulnerability.
- mitmsocks4j - Man-in-the-middle SOCKS Proxy for
Java.
- Charles Proxy - A cross-platform GUI web debugging proxy to view
intercepted HTTP and HTTPS/SSL live traffic.
- Habu - Python Network Hacking Toolkit.
- Wifi Jammer - Free program to jam all wifi clients in
range.
- Firesheep - Free program for HTTP session
hijacking attacks.
Forensic
- Autopsy - A digital forensics platform and graphical
interface to The Sleuth Kit and other digital
forensics tools.
- sleuthkit - A library and collection of
command-line digital forensics tools.
- EnCase - The
shared technology within a suite of digital investigations products by Guidance Software.
- malzilla - Malware hunting tool.
- PEview - A quick and easy way to view the structure and
content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files.
- HxD - A hex editor which, additionally to raw disk editing and
modifying of main memory (RAM), handles files of any size.
- WinHex - A hexadecimal editor, helpful in the realm of
computer forensics, data recovery, low-level data processing, and IT security.
- BinText - A small, very fast
and powerful text extractor that will be of particular interest to programmers.
Cryptography
- xortool - A tool to analyze multi-byte XOR cipher.
Exfiltration Tools
- DET - Proof of concept to perform data exfiltration using
either single or multiple channel(s) at the same time.
- pwnat - Punches holes in firewalls and NATs.
- tgcd - Simple Unix network utility to extend the
accessibility of TCP/IP based network services beyond firewalls.
- Iodine - Tunnel IPv4 data through a DNS server; useful for
exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
Network Reconnaissance Tools
- zmap - Open source network scanner that enables researchers to easily
perform Internet-wide network studies.
- nmap - Free security scanner for network exploration & security audits.
- scanless - Utility for using websites to perform port
scans on your behalf so as not to reveal your own IP.
- DNSDumpster - Online DNS recon and search service.
- CloudFail - Unmask server IP addresses hidden behind
Cloudflare by searching old database records and detecting misconfigured DNS.
- dnsenum - Perl script that enumerates DNS
information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and
then performs reverse look-ups on the results.
- dnsmap - Passive DNS network mapper.
- dnsrecon - DNS enumeration script.
- dnstracer - Determines where a given DNS server
gets its information from, and follows the chain of DNS servers.
- passivedns-client - Library and query tool
for querying several passive DNS providers.
- passivedns - Network sniffer that logs all DNS
server replies for use in a passive DNS setup.
- Mass Scan - TCP port scanner, spews SYN
packets asynchronously, scanning entire Internet in under 5 minutes.
- smbmap - Handy SMB enumeration tool.
- XRay - Network (sub)domain discovery and reconnaissance
automation tool.
- ACLight - Script for advanced discovery of sensitive
Privileged Accounts - includes Shadow Admins.
- ScanCannon - Python script to quickly enumerate
large networks by calling
masscan
to quickly identify open ports and then nmap
to gain details on the systems/services on those ports.
- fierce - Python3 port of the original
fierce.pl
DNS reconnaissance tool for locating non-contiguous IP space.
Protocol Analyzers and Sniffers
- tcpdump/libpcap - Common packet analyzer that runs under the
command line.
- Wireshark - Widely-used graphical, cross-platform network
protocol analyzer.
- netsniff-ng - Swiss army knife for for network
sniffing.
- Dshell - Network forensic analysis framework.
- Debookee - Simple and powerful network traffic analyzer for
macOS.
- Dripcap - Caffeinated packet analyzer.
- Netzob - Reverse engineering, traffic generation and
fuzzing of communication protocols.
- sniffglue - Secure multithreaded packet sniffer.
Proxies and MITM Tools
- dnschef - Highly configurable DNS proxy for pentesters.
- mitmproxy - Interactive TLS-capable intercepting
HTTP proxy for penetration testers and software developers.
- Morpheus - Automated ettercap TCP/IP Hijacking
tool.
- mallory - HTTP/HTTPS proxy over SSH.
- SSH MITM - Intercept SSH connections with a proxy; all
plaintext passwords and sessions are logged to disk.
- evilgrade - Modular framework to take advantage of
poor upgrade implementations by injecting fake updates.
- Ettercap - Comprehensive, mature suite for
machine-in-the-middle attacks.
- BetterCAP - Modular, portable and easily extensible MITM
framework.
- MITMf - Framework for Man-In-The-Middle attacks.
- Lambda-Proxy - Utility for testing SQL Injection
vulnerabilities on AWS Lambda serverless functions.
Wireless Network Tools
- Aircrack-ng - Set of tools for auditing wireless networks.
- Kismet - Wireless network detector, sniffer, and IDS.
- Reaver - Brute force attack against WiFi
Protected Setup.
- Wifite - Automated wireless attack tool.
- Fluxion - Suite of automated social engineering
based WPA attacks.
- Airgeddon - Multi-use bash script for Linux
systems to audit wireless networks.
- Cowpatty - Brute-force dictionary attack against
WPA-PSK.
- BoopSuite - Suite of tools written in Python for
wireless auditing.
- Bully - Implementation of the
WPS brute force attack, written in C.
- infernal-twin - Automated wireless hacking
tool.
- krackattacks-scripts - WPA2 Krack attack
scripts.
- KRACK Detector - Detect and prevent KRACK
attacks in your network.
- wifi-arsenal - Resources for Wi-Fi Pentesting.
- WiFi-Pumpkin - Framework for rogue Wi-Fi access
point attack.
Transport Layer Security Tools
- SSLyze - Fast and comprehensive TLS/SSL configuration
analyzer to help identify security mis-configurations.
- tls_prober - Fingerprint a server's SSL/TLS
implementation.
- testssl.sh - Command line tool which checks a
server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic
flaws.
- crackpkcs12 - Multithreaded program to crack
PKCS#12 files (`.p12` and `.pfx` extensions), such as TLS/SSL certificates.
Web Exploitation
- OWASP Zed Attack Proxy
(ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web
applications.
- Fiddler - Free cross-platform web debugging proxy with
user-friendly companion tools.
- Burp Suite - Integrated platform for performing security
testing of web applications.
- autochrome
- Easy to install a test browser with all the appropriate setting needed for web application testing
with native Burp support, from NCCGroup.
- Browser Exploitation Framework (BeEF) - Command and
control server for delivering exploits to commandeered Web browsers.
- Offensive Web Testing Framework (OWTF) -
Python-based framework for pentesting Web applications based on the OWASP Testing Guide.
- Wordpress Exploit Framework -
Ruby framework for developing and using modules which aid in the penetration testing of WordPress
powered websites and systems.
- WPSploit - Exploit WordPress-powered websites with
Metasploit.
- SQLmap - Automatic SQL injection and database takeover tool.
- tplmap - Automatic server-side template injection and Web
server takeover tool.
- weevely3 - Weaponized web shell.
- Wappalyzer - Wappalyzer uncovers the technologies used on
websites.
- WhatWeb - Website fingerprinter.
- BlindElephant - Web application fingerprinter.
- wafw00f - Identifies and fingerprints Web
Application Firewall (WAF) products.
- fimap - Find, prepare, audit, exploit and even Google
automatically for LFI/RFI bugs.
- Kadabra - Automatic LFI exploiter and scanner.
- Kadimus - LFI scan and exploit tool.
- liffy - LFI exploitation tool.
- Commix - Automated all-in-one operating system
command injection and exploitation tool.
- DVCS Ripper - Rip web accessible (distributed) version
control systems: SVN/GIT/HG/BZR.
- GitTools - Automatically find and download
Web-accessible
.git
repositories.
- sslstrip - Demonstration of the HTTPS
stripping attacks.
- sslstrip2 - SSLStrip version to defeat HSTS.
- NoSQLmap - Automatic NoSQL injection and database
takeover tool.
- VHostScan - A virtual host scanner that performs
reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default
pages.
- FuzzDB - Dictionary of attack patterns and
primitives for black-box application fault injection and resource discovery.
- EyeWitness - Tool to take screenshots of
websites, provide some server header info, and identify default credentials if possible.
- webscreenshot - A simple script to take
screenshots of list of websites.
- recursebuster - Content discovery tool to perform
directory and file bruteforcing.
- Raccoon - High performance offensive security tool
for reconnaissance and vulnerability scanning.
- WhatWaf - Detect and bypass web application firewalls
and protection systems.
- badtouch - Scriptable network authentication cracker.
Hex Editors
- HexEdit.js - Browser-based hex editing.
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- Frhed - Binary file editor for Windows.
- 0xED - Native macOS hex editor that supports
plug-ins to display custom data types.
- Hex Fiend - Fast, open source, hex editor for macOS
with support for viewing binary diffs.
- Bless - High quality, full featured, cross-platform
graphical hex editor written in Gtk#.
- wxHexEditor - Free GUI hex editor for GNU/Linux, macOS, and
Windows.
- hexedit - Simple, fast, console-based hex editor.
File Format Analysis Tools
- Kaitai Struct - File formats and network protocols dissection language
and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- Veles - Binary data visualization and analysis tool.
- Hachoir - Python library to view and edit a binary stream
as tree of fields and tools for metadata extraction.
Anti-virus Evasion Tools
- Veil - Generate metasploit payloads that bypass common
anti-virus solutions.
- shellsploit - Generates custom
shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.
- Hyperion - Runtime encryptor for 32-bit portable
executables ("PE `.exe`s").
- AntiVirus Evasion Tool (AVET) - Post-process exploits
containing executable files targeted for Windows machines to avoid being recognized by antivirus
software.
- peCloak.py -
Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
- peCloakCapstone - Multi-platform fork of the
peCloak.py automated malware antivirus evasion tool.
- UniByAv - Simple obfuscator that takes raw
shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Shellter - Dynamic shellcode injection tool, and the
first truly dynamic PE infector ever created.
Hash Cracking Tools
- John the Ripper - Fast password cracker.
- Hashcat - The more fast hash cracker.
- CeWL - Generates custom wordlists by spidering a
target's website and collecting unique words.
- JWT Cracker - Simple HS256 JWT token brute force
cracker.
- Rar Crack - RAR bruteforce cracker.
- BruteForce Wallet - Find the password of an
encrypted wallet file (i.e.
wallet.dat
).
- StegCracker - Steganography brute-force utility
to uncover hidden data inside files.
Windows Utilities
- Sysinternals Suite - The
Sysinternals Troubleshooting Utilities.
- Windows Credentials
Editor - Inspect logon sessions and manage credentials.
- mimikatz - Credentials extraction tool for Windows.
- PowerSploit - PowerShell Post-Exploitation
Framework.
- Windows Exploit Suggester -
Detect potential missing patches.
- Responder - Link-Local Multicast Name Resolution
(LLMNR), NBT-NS, and mDNS poisoner.
- Bloodhound - Graphical Active Directory
trust relationship explorer.
- Empire - Pure PowerShell post-exploitation agent.
- Fibratus - Tool for exploration and tracing of the
Windows kernel.
- wePWNise - Generates architecture
independent VBA code for Office documents and automates exploit mitigation bypass.
- redsnarf - Post-exploitation tool for retrieving
password hashes and credentials from Windows machines.
- Magic Unicorn - Shellcode generator for various
attack vectors.
- DeathStar - Python script using Empire's API for
gaining Domain Admin rights in Active Directory.
- RID_ENUM - Python script to enumerate users from a
Windows Domain Controller and crack passwords.
- MailSniper - Modular tool for searching through
email in Microsoft Exchange environments.
- Ruler - Abuses client-side Outlook features to gain a
remote shell on Microsoft Exchange servers.
- SCOMDecrypt - Retrieve and decrypt RunAs
credentials from Microsoft System Center Operations Manager (SCOM) databases.
- LaZagne - Credentials recovery project.
- Active Directory and Privilege Escalation (ADAPE) -
Automates PowerShell modules for discovering security misconfigurations and attempting privilege
escalation.
GNU/Linux Utilities
- Linux Exploit Suggester - Heuristic
reporting on potentially viable exploits for GNU/Linux systems.
- Lynis - Auditing tool for UNIX-based systems.
- unix-privesc-check - Shell script to
check for simple privilege escalation vectors on UNIX systems.
- Hwacha - Post-exploitation tool for executing payloads via
SSH on Linux systems.
- checksec.sh - Shell script to test Linux OS and
PaX security features.
macOS Utilities
- Bella - Python post-exploitation data mining and remote
administration tool for macOS.
- EvilOSX - Modular RAT with evasion and exfiltration
techniques for macOS.
DDoS Tools
- LOIC - Open source network stress tool for Windows.
- JS LOIC - JavaScript in-browser
version of LOIC.
- SlowLoris - DoS tool that uses low bandwidth on the
attacking side.
- HOIC - Updated version of Low
Orbit Ion Cannon with 'boosters'.
- T50 - Faster network stress tool.
- UFONet - Abuses HTTP layer 7 to create/manage 'zombies'
and conduct attacks.
- Memcrashed - DDoS tool using UDP packets
against vulnerable Memcached servers.
Social Engineering Tools
- Social Engineer Toolkit (SET) - Open
source pentesting framework designed for social engineering.
- King Phisher - Phishing campaign toolkit for
creating and managing multiple simultaneous attacks.
- Evilginx - MITM attack framework for phishing
credentials and session cookies.
- Evilginx2 - Standalone man-in-the-middle attack
framework.
- wifiphisher - Automated phishing attacks against
WiFi networks.
- Catphish - Ruby tool for phishing and corporate
espionage.
- Beelogger - Tool for generating keyloggers.
- FiercePhish - Full-fledged phishing framework for
managing engagements.
- SocialFish - Social media phishing framework for
Android or Docker.
- ShellPhish - Social media site cloner and
phishing tool built atop SocialFish.
- Gophish - Open-source phishing framework.
- phishery - TLS/SSL enabled Basic Auth credential
harvester.
- ReelPhish - Real-time two-factor phishing tool.
- Modlishka - Reverse proxy with real-time two-factor
authentication.
OSINT Tools
- Maltego - Proprietary OSINT and forensics software.
- theHarvester - E-mail, subdomain, and people
names harvester.
- SimplyEmail - Fast and easy email recon.
- creepy - Geolocation OSINT tool.
- metagoofil - Metadata harvester.
- Google Hacking Database - Database of
Google dorks for recon.
- GooDork - Command line Google dorking tool.
- dork-cli - Command line Google dork tool.
- Censys - Data collection on hosts and websites.
- Shodan - Search engine for Internet-connected devices.
- recon-ng - Web reconnaissance framework.
- sn0int - Semi-automatic OSINT framework and package
manager.
- github-dorks - CLI tool to scan GitHub for
sensitive information leaks.
- vcsmap - Plugin-based tool to scan version control
systems for sensitive information.
- Spiderfoot - Multi-source OSINT automation tool.
- BinGoo - Bing and Google Dorking Tool.
- fast-recon - Google dorks against a domain.
- snitch - Information gathering via dorks.
- Sn1per - Automated Pentest Recon Scanner.
- Threat Crowd - Search engine for threats.
- Virus Total - Service to analyze suspicious files and URLs.
- PacketTotal - Packet capture file analysis for network-borne
malware.
- DataSploit - OSINT visualizer utilizing various
tools.
- AQUATONE - Subdomain discovery tool.
- Intrigue - Automated OSINT and Attack Surface discovery.
- ZoomEye - Search engine for cyberspace.
- gOSINT - OSINT tool with multiple modules.
- OWASP Amass - Subdomain enumeration tool.
- Hunter.io - Email address and organizational details search tool.
- FOCA - Automated document harvester.
- dorks - Google hack database automation tool.
- image-match - Search over billions of images.
- OSINT-SPY - OSINT scan tool.
- pagodo - Google Hacking Database scraping.
- surfraw - UNIX command line interface to search engines.
- GyoiThon - Intelligence Gathering tool using
Machine Learning.
Anonymity Tools
- Tor - Free software and onion routed overlay network.
- OnionScan - Tool for investigating the Dark Web by finding
operational security issues.
- I2P - The Invisible Internet Project.
- Nipe - Script to redirect all traffic to the Tor
network.
- What Every Browser Knows About You - Detection page to test
your browser's privacy and identity leaks.
- dos-over-tor - DoS over Tor stress test tool.
- oregano - Python module acting as a MITM accepting
Tor client requests.
- kalitorify - Transparent proxy through Tor for
Kali Linux OS.
Reverse Engineering Tools
- Interactive Disassembler (IDA Pro) - Proprietary
multi-processor disassembler and debugger.
- WDK/WinDbg - Windows
Driver Kit and WinDbg.
- OllyDbg - x86 debugger for Windows binaries.
- Radare2 - Open source, cross-platform reverse engineering
framework.
- x64dbg - Open source x64/x32 debugger for Windows.
- Immunity Debugger - Debugger for writing exploits and
analyzing malware.
- Evan's Debugger - OllyDbg-like debugger for
GNU/Linux.
- Medusa - Open source, cross-platform interactive
disassembler.
- plasma - Interactive disassembler for x86/ARM/MIPS.
- peda - Python Exploit Development Assistance for GDB.
- dnSpy - Tool to reverse engineer .NET assemblies.
- binwalk - Tool for analyzing, reverse engineering, and
extracting firmware images.
- PyREBox - Python scriptable Reverse Engineering
sandbox.
- Voltron - Extensible debugger UI toolkit written in
Python.
- Capstone - Lightweight multi-platform, multi-architecture
disassembly framework.
- rVMI - Debugger for inspecting processes and environments.
- Frida - Dynamic instrumentation toolkit for developers and
researchers.
- boxxy - Linkable sandbox explorer.
- pwndbg - GDB plug-in for debugging.
Physical Access Tools
- LAN Turtle - Covert network intelligence gathering and MITM
capabilities.
- USB Rubber Ducky - Keystroke injection attack platform.
- Poisontap - Siphons cookies and installs web backdoors on
locked computers.
- WiFi Pineapple - Wireless auditing and penetration testing
platform.
- Proxmark3 - RFID/NFC cloning and spoofing toolkit.
- PCILeech - Reads and writes from the target system
memory via DMA over PCIe.
- AT Commands - Rewrites device firmware, bypasses security
mechanisms, and injects touch events.
- Bash Bunny - Local exploit delivery tool.
- Packet Squirrel - Ethernet multi-tool for covert
remote access and packet captures.
Industrial Control and SCADA Systems
Side-channel Tools
- ChipWhisperer - Open-source toolchain for side-channel power
analysis and glitching attacks.
CTF Tools
- ctf-tools - Collection of setup scripts for various
security research tools.
- Pwntools - Rapid exploit development framework for
CTFs.
- RsaCtfTool - Decrypt data encrypted using weak
RSA keys.
- shellpop - Generate reverse or bind shell commands.
Penetration Testing Report Templates
More Tools
- Target Scanner - Penetration testing utility for
automating common tasks.
- exploit-db-search - Exploitdb Search.
- punk.py - Unix SSH post-exploitation tool.
- tulpar - Web Vulnerability Scanner.
- dcrawl - Simple, multi-threaded web crawler.
- V3n0m Scanner - Pentesting scanner for
SQLi/XSS/LFI/RFI and other vulnerabilities.
- golismero - The Web Knife.
- sqliv - Massive SQL injection vulnerability scanner.
- gitminer - Tool for advanced mining on GitHub.
- Cr3d0v3r - Detects credential reuse attacks.
- Striker - Offensive information and
vulnerability scanner.
- emailHarvester - Email addresses harvester.
- BruteX - Automatically brute forces all services on a
target.
- BlackWidow - Python-based web app scanner for OWASP
vulnerabilities.
- Shiva - DOS exploit for WordPress websites
(CVE-2018-6389).
- ctfr - Domain enumeration using Certificate
Transparency logs.
- twa - Tiny web auditor with strong opinions.
- Photon - Fast OSINT crawler.
- CMSeek - CMS detection and exploitation suite.
- HashBuster - Hash cracking tool.
- Invoke-Apex - PowerShell-based toolkit for red
team activities.
- RapidScan - Multi-tool web vulnerability scanner.
- Freedom Fighting Mode (FFM) - Hacking harness for
post-exploitation.
- vault - Swiss army knife for hackers.
- badKarma - GUI-based network reconnaissance toolkit.
- EaST - Exploits And Security Tools penetration testing
framework.
- Vanquish - Kali Linux-based Enumeration Orchestrator.
- Reconnoitre - Multithreaded information gathering
and service enumeration tool.
- nudge4j - Java tool for browser-JVM
interaction.
- dex2jar - Tools to work with Android .dex and Java
.class files.
- JD-GUI - Java Decompiler.
- procyon - Modern open-source
Java decompiler.
- androguard - Reverse engineering and analysis of
Android applications.
- JAD - Java Decompiler.
- dotPeek - Free .NET decompiler from JetBrains.
- ILSpy - Open-source .NET assembly browser and
decompiler.
- de4dot - .NET deobfuscator and unpacker.
- antinet - .NET anti-debugging and anti-profiling code.
- UPX - Ultimate Packer for eXecutables.
- radare2 - Portable reversing framework.
- Hopper - OS X and Linux Disassembler/Decompiler.
- ScratchABit - Interactive disassembler with
IDAPython-compatible plugin API.