Infosec Compilation is an information security repository for offensive, defensive, and purple-teaming resources, along with guides designed for advanced penetration testing tactics, techniques, and procedures (TTPs) based on the MITRE framework
- Homelab
- Hacking References & Cheatsheets
- Offensive Security Tools
- Reconnaissance Tools
- Anonymity Tools
- OSINT Frameworks
- Search Engines
- Source Code Search
- Crypto OSINT
- Government Record Search
- Social Media
- Credentials
- Personal Investigations
- Phone Numbers
- Company Research
- Location
- Image Search
- Dorking
- Web History
- Web Monitoring
- Social Network Analysis
- Network Recon Tools
- Domain
- Breached Credentials
- Vulnerability Scanners
- Misc OSINT Tools
- Threat Hunting / Intelligence
- Resource Development Tools
- Initial Access Tools
- Execution Tools
- Persistence Tools
- Privilege Escalation Tools
- Defense Evasion Tools
- Credential Access Tools
- Discovery Tools
- Lateral Movement Tools
- Collection Tools
- Impact
- Remediation / Reporting
- Cloud Pentesting
- Active Directory
- Compilation of Tools
- Wireless Pentesting
- Car Hacking
- Adversary Emulation
- Reconnaissance Tools
- Defensive Security Tools
- Purple Teaming / Security Training
- Static Analyzers
- Dynamic Analyzers
- Hex Editors
- File Format Analysis Tools
- Forensic Tools
- Incident Response
- Disk Image Creation Tools
- Evidence Collection Tools
- Incident Management Tools
- Linux Forensics Distributions
- OSX Evidence Collection
- Log Analysis Tools
- Process Dump Tools
- Honeypot Tools
- IDS / IPS
- Timeline Tools
- Windows Evidence Collection
- Governance Risk & Compliance (GRC)
- Networking
- Books
- Education / Bootcamps / Programs / Certification Material
- Documentaries
- Social Engineering Articles
- Resource Compilation
- Cybersecurity Road Maps, Domains, etc.
- Security News
- Freelancing Sites
- Support Organizations
- Cybersecurity Apparel
- Alpha Cyber Security
- Blogging
- Blue Team Homelab — Blue Team Environment
- SecGen — Creates vulnerable VMs, Lab Environments, & Hacking challenges
- DetectionLab - Quickly build a Windows domain with pre-loaded with security tooling and system logging configurations
- SpookySec
- Vulnerable-AD - Set up a Vulnerable AD lab
- https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/ - Reverse Engineering Guide
- Balbuzard - Malware analysis tool with reverse obfuscation.
- binwalk - Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
- Capstone - Lightweight multi-platform, multi-architecture disassembly framework.
- Cuckoo Modified API - Python API for Cuckoo Modified.
- Cuckoo Modified - Fork of Cuckoo Sandbox with multiple improvements.
- Cuckoo Sandbox - Online malware scanner.
- de4dot - .NET deobfuscator and unpacker.
- dnSpy - Tool to reverse engineer .NET assemblies.
- [Dovehawk] (https://github.com/tylabs/dovehawk) - Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
- DRAKVUF - Virtualization based agentless black-box binary analysis system.
- Evan's Debugger - OllyDbg-like debugger for GNU/Linux.
- FireEye Labs Obfuscated String Solver (FLOSS) - Malware deobfuscator.
- firmware.re - Firmware analyzier.
- HaboMalHunter - Automated malware analysis tool for Linux ELF files.
- Hybrid Analysis - Online malware scanner.
- Immunity Debugger - Powerful way to write exploits and analyze malware.
- Interactive Disassembler (IDA Pro) - Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version, IDA Free.
- Malaice.io - Open source malware analyzer.
- Malheur - Automated sandbox analysis of malware behavior.
- Medusa - Open source, cross-platform interactive disassembler.
- Metadefender - Online file and hash analyzer.
- NoMoreXOR - Frequency analysis tool for trying to crack 256-bit XOR keys.
- OllyDbg - x86 debugger for Windows binaries that emphasizes binary code analysis.
- PackerAttacker - Generic hidden code extractor for Windows malware.
- PacketTotal - Online pcap file analyzer.
- peda - Python Exploit Development Assistance for GDB.
- plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
- PyREBox - Python scriptable Reverse Engineering sandbox by Cisco-Talos.
- Radare2 - Open source, crossplatform reverse engineering framework.
- Ragpicker - Malware analysis tool.
- rVMI - Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.
- Sandboxed Execution Environment - Framework for building sandboxed malware execution environments.
- unXOR - Tool that guesses XOR keys using known plaintext attacks.
- VirtualDeobfuscator - Reverse engineering tool for virtualization wrappers.
- VirusTotal - Online malware scanner.
- Voltron - Extensible debugger UI toolkit written in Python.
- WDK/WinDbg - Windows Driver Kit and WinDbg.
- x64dbg - Open source x64/x32 debugger for windows.
- xortool - Tool for guessing XOR keys.
- AbuseIPDB - Search engine for blacklisted IPs or domains.
- AutoShun - Public repository of malicious IPs and other resources.
- BadIPs - Online blacklist lookup.
- Binary Defense IP Ban List - Public IP blacklist.
- Blocklist Ipsets - Public IP blacklist.
- Exonera Tor - A database of IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date.
- Malware Domain List - Search and share malicious URLs.
- Spamcop - IP based blacklist.
- Spamhaus - Online blacklist lookup.
- malc0de DNSSinkhole - List of domains that have been identified as distributing malware during the past 30 days.
- malc0de DNSSinkhole - List of domains that have been identified as distributing malware during the past 30 days.
- Cuckoo - open source automated malware analysis system
- DRAKVUF Sandbox - Automated black-box malware analysis system with DRAKVUF engine under the hood (Doesn't require an agent on guest OS)
- PacketTotal — Online PCAP Analysis Engine
- Joe Sandbox Cloud - Automated malware sandbox (Live interaction capabilities)
- CAPE - Malware sandbox, derived from Cuckoo with the goal of adding automated malware unpacking and config extraction
-
- Cuckoo - Open Source Highly configurable sandboxing tool.
- Cuckoo-modified - Heavily modified Cuckoo fork developed by community.
- Cuckoo-modified-api - A Python library to control a cuckoo-modified sandbox.
- Hybrid-Analysis - Hybrid-Analysis is a free powerful online sandbox by Payload Security.
- Malwr - Malwr is a free online malware analysis service and community, which is powered by the Cuckoo Sandbox.
- Mastiff - MASTIFF is a static analysis framework that automates the process of extracting key characteristics from a number of different file formats.
- Metadefender Cloud - Metadefender is a free threat intelligence platform providing multiscanning, data sanitization and vulnerability assesment of files.
- Viper - Viper is a python based binary analysis and management framework, that works well with Cuckoo and YARA
- Virustotal - Virustotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by antivirus engines and website scanners.
- Visualize_Logs - Open source. Visualization library and command line tools for logs.
- Packet Fence — Open source NAC
- Exploit Education - Variety of resources to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues
- Docker Images - Hundreds of offensive and useful Docker images for penetration testing
- VX-Underground — Malware source code
- Zeltser Resources
- ANY.RUN
- https://crackmes.one/ — Binaries for Reverse Engineering
- Contagio Malware Dump
- CAPE Sandbox
- Das Malwerk
- Hatching Triage
- Hybrid Analysis
- InQuest Labs
- InQuest Malware Samples
- KernelMode.info
- MalShare
- MalwareBazaar
- MalwareSamples Malware-Feed
- Malware DB
- Objective-See Collection
- PacketTotal
- PhishingKitTracker
- PolySwarm
- SNDBOX
- SoReL-20M
- URLhaus
- VirusBay
- VirusShare
- VirusSign
- Virus and Malware Samples
- Yomi
- theZoo
- Malware Analysis Tools
- MalAPI — Catalog of Windows APIs commonly used in malware
- [Qu1cksc0pe] - All-in-One Static Malware Analysis Tool
- Intezer Protect — EDR built for your cloud
- bugfender.com — Free up to 100k log lines/day with 24 hours retention
- humio.com — Free up to 16 GB/day with 7 days retention
- logdna.com - Free for a single user, no retention, unlimited hosts and sources
- logentries.com — Free up to 5 GB/month with 7 days retention
- loggly.com — Free for a single user, 200MB/day with 7 days retention
- logz.io — Free up to 1 GB/day, 1 days retention
- ManageEngine Log360 Cloud — Log Management service powered by Manage Engine. Free Plan offers 50 GB storage with 1 Month retention.
- papertrailapp.com — 48 hours search, 7 days archive, 50 MB/month
- sematext.com — Free up to 500 MB/day, 7 days retention
- sumologic.com — Free up to 500 MB/day, 7 days retention
- logflare.app — Free for upto 12,960,000 enteries per app per month, 3 days retention
- logtail.com — ClickHouse-based SQL-compatible log management. Free up to 1 GB per month, 3 days retention.
- logzab.com — Audit trail management system. Free 1.000 user activity log per month, 1 month retention, for up-to 5 projects.
- Pingmeter.com - 5 uptime monitors with 10 minutes interval. monitor SSH, HTTP, HTTPS, and any custom TCP ports.
- appdynamics.com — Free for 24 hours metrics, application performance management agents limited to one Java, one .NET, one PHP and one Node.js
- appneta.com — Free with 1-hour data retention
- appspector.com - Mission control, for remote iOS/Android/Flutter debugging. Free for small traffic usage (64MB of logs).
- assertible.com — Automated API testing and monitoring. Free plans for teams and individuals.
- blackfire.io — Blackfire is the SaaS-delivered Application Performance Solution. Free Hacker plan (PHP only)
- checklyhq.com - Open source E2E / Synthetic monitoring and deep API monitoring for developers. Free plan with 5 users and 50k+ check runs.
- circonus.com — Free for 20 metrics
- cloudsploit.com — AWS security and configuration monitoring. Free: unlimited on-demand scans, unlimited users, unlimited stored accounts. Subscription: automated scanning, API access, etc.
- cronitor.io - Performance insights and uptime monitoring for cron jobs, websites, APIs and more. Free tier with 5 monitors.
- datadoghq.com — Free for up to 5 nodes
- deadmanssnitch.com — Monitoring for cron jobs. 1 free snitch (monitor), more if you refer others to sign up
- economize.cloud — Economize helps demystify cloud infrastructure costs by organizing cloud resources, optimize and report the same. Free for up to $5000 spends on Google Cloud Platform every month.
- elastic.co — Instant performance insights for JS developers. Free with 24 hours data retention
- freeboard.io — Free for public projects. Dashboards for your Internet of Things (IoT) projects
- freshworks.com — Monitor 50 URLs at 1-minute interval with 10 Global locations and 5 Public status pages for Free
- gitential.com — Software Development Analytics platform. Free: unlimited public repositories, unlimited users, free trial for private repos. On-prem version available for enterprise.
- Grafana Cloud - Grafana Cloud is a composable observability platform, integrating metrics and logs with Grafana. Free: 3 users, 10 dashboards, 100 alerts, metrics storage in Prometheus and Graphite (10,000 series, 14 days retention), logs storage in Loki (50 GB of logs, 14 days retention)
- healthchecks.io — Monitor your cron jobs and background tasks. Free for up to 20 checks.
- inspector.dev - A complete Real-Time monitoring dashboard in less than one minute with free forever tier.
- instrumentalapp.com - Beautiful and easy-to-use application and server monitoring with up to 500 metrics and 3 hours of data visibility for free
- keychest.net/speedtest - Independent speed test and TLS handshake latency test against Digital Ocean
- letsmonitor.org - SSL monitoring, free for up to 5 monitors
- loader.io — Free load testing tools with limitations
- meercode.io — Meercode is the ultimate monitoring dashboard for your CI/CD builds. Free for open-source and 1 private repository.
- netdata.cloud — Netdata is an open source tool designed to collect real-time metrics.Great fast growing product. It can also be found in github!
- newrelic.com — New Relic observability platform built to help engineers create more perfect software. From monoliths to serverless, you can instrument everything, then analyze, troubleshoot, and optimize your entire software stack. Free tier offers 100GB/month of free data ingest, 1 free full access user, and unlimited free basic users.
- nixstats.com - Free for one server. E-Mail Notifications, public status page, 60 second interval and more.
- OnlineOrNot.com - OnlineOrNot is a reliable uptime monitor for both JS-based web apps and websites. 5 uptime checks (for static websites and APIs) with a 5 minute interval, 1 browser check with a 15 minute interval. Also provides automated public status pages (with support coming for 3rd party uptime monitoring). Free for up to 3 users, alerts via Slack, Discord, and Email.
- opsgenie.com — Powerful alerting and on-call management for operating always-on services. Free up to 5 users.
- paessler.com — Powerful infrastructure and network monitoring solution including alerting, strong visualization capabilities and basic reporting. Free up to 100 sensors.
- syagent.com — Non commercial free server monitoring service, alerts and metrics.
- pagertree.com - Simple interface for alerting and on-call management. Free up to 5 users.
- pingbreak.com — Modern uptime monitoring service. Check unlimited URLs and get downtime notifications via Discord, Slack or email.
- pingpong.one — Advanced status page platform with monitoring. Free tier includes one public customizable status page with SSL subdomain. Pro plan is offered to open-source projects and non-profits free of charge.
- sematext.com — Free for 24 hours metrics, unlimited number of servers, 10 custom metrics, 500,000 custom metrics data points, unlimited dashboards, users, etc.
- sitemonki.com — Website, domain, Cron & SSL monitoring, 5 monitors in each category for free
- skylight.io — Free for first 100,000 requests (Rails only)
- speedchecker.xyz — Performance Monitoring API, checks Ping, DNS, etc.
- stathat.com — Get started with 10 stats for free, no expiration
- statuscake.com — Website monitoring, unlimited tests free with limitations
- statusgator.com — Status page monitoring, 3 monitors free
- thousandeyes.com — Network and user experience monitoring. 3 locations and 20 data feeds of major web services free
- thundra.io/apm — Application monitoring and debugging. Has a free tier up to 250k monthly invocations.
- uptimerobot.com — Website monitoring, 50 monitors free
- uptimetoolbox.com — Free monitoring for 5 websites, 60 second intervals, public statuspage.
- zenduty.com — End-to-end incident management, alerting, on-call management and response orchestration platform for network operations, site reliability engineering and DevOps teams. Free for upto 5 users.
- instatus.com - Get a beautiful status page in 10 seconds. Free forever with unlimited subs and unlimited teams.
- Squadcast.com - Squadcast is an end-to-end incident management software that's designed to help you promote SRE best practices. Free forever plan available for upto 10 users.
- RoboMiri.com - RoboMiri is a stable uptime monitor that offer a wide range of monitors: cronjob, keyword, website, port, ping. 25 uptime checks with a 3 minutes interval checks for free. Alerts via Phone Call, SMS, Email and Web Hook.
- Better Stack - Uptime monitoring, incident management, on-call scheduling/alerting and status pages in a single product. 10 monitors with 3 min check frequency and status pages are included on the free plan.
- LFI Cheat Sheet
- Local Linux Enumeration & Privilege Escalation Cheatsheet
- Metasploit Payload Cheatsheet
- Multiple Cheatsheets By Andrewjkerr
- Nmap Cheat Sheet
- Pentest Recon And Enu Cheatsheet
- Reverse Shell Cheat Sheet
- SQL Injection Cheat Sheet
- XSS Cheat Sheet
- XSS Payload Cheatsheet
- "Fileless" UAC Bypass Using sdclt.exe
- A Citrix Story
- A Guide to Attacking Domain Trusts
- A Guide to Attacking Domain Trusts
- A Pentester's Guide to Group Scoping
- A Read Teamer's Guide to GPOs and OUs
- Abusing Active Directory Permissions with PowerView
- Abusing DCOM For Yet Another Lateral Movement Technique
- Abusing DNSAdmins Privilege for Escalation in Active Directory
- Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
- Abusing GPO Permissions
- Abusing Microsoft Word Features for Phishing: "subDoc"
- Abusing the COM Registry Structure: CLSID, LocalServer32, & ImprocServer32
- Accessing Clipboard From the Lock Screen in Windows 10 Part 1
- Accessing Clipboard From the Lock Screen in Windows 10 Part 2
- Agentless Post-Exploitation
- Aggressor PowerView
- AppLocker - Case Study - How Insecure Is It Really? Part 1
- AppLocker - Case Study - How Insecure Is It Really? Part 2
- Are We Really Safe? Hacking Access Control Systems
- Automated Derivative Administrator Search
- Awesome Bug Bounty
- Awesome CTF
- Awesome ICS Security
- Awesome Lockpicking
- Awesome Yara
- Bringing the Hashes Home With reGeorg & Empire
- Bypassing AMSI via COM Server Hijacking
- Bypassing Application Whitelisting With BGinfo
- Bypassing Device Guard UMCI Using CHM - CVE-2017-8625
- Bypassing UAC Using App Paths
- Cell Injection
- ClickOnce, Twice or Thrice: A Technique for Social Engineering and Untrusted Command Execution
- Cloning and Hosting Evil Captive Portals Using a Wi-Fi Pineapple
- CloudFront Hijacking
- Cobalt Strike - What's the go-to phishing technique or exploit?
- Code Signing Certificate Cloning Attacks and Defenses
- Colbalt Strike - Spear Phishing documentation
- Comma Separated Vulnerabilities
- DNS Data Exfiltration - What is This and How to Use?
- DNS Tunnelling
- Data Exfiltration Over DNS Request Covert Channel: DNSExfiltrator
- Data Exfiltration via Formula Injection
- Defense In Depth
- DiskShadow: The Return of VSS Evasion, Persistence, and Active Directory Database Extraction
- Domain Fronting Via Cloudfront Alternate Domains
- Dump Clear-Text Passwords for All Admins in the Domain Using Mimikatz DCSync
- Dumping Domain Password Hashes
- Empire Domain Fronting
- Empire Without PowerShell
- Escape and Evasion Egressing Restricted Networks
- Excel Macros With PowerShell
- Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts
- Exploiting Environment Variables in Scheduled Tasks for UAC Bypass
- Extending BloodHound for Red Teamers
- Finding Domain Frontable Azure Domains
- First Entry: Welcome and Fileless UAC Bypass
- From Pass-the-Hash to Pass-the-Ticket with No Pain
- Getting the Goods with CrackMapExec: Part 1
- Getting the Goods with CrackMapExec: Part 2
- Harden Windows With AppLocker - Based on Case Study Part 1
- Harden Windows With AppLocker - Based on Case Study Part 2
- Hiding Registry Keys with PSReflect
- How I Identified 93k Domain-Frontable CloudFront Domains
- How to Obfuscate JacaScript in Metasploit
- In-Memory Evasion
- Intercepting Passwords With Empire and Winning
- Intro to Using GScript for Red Teams
- Introducing BloodHound
- Introduction to Metasploit: Exploiting Web Applications
- Jumping Network Segregation with RDP
- Kerberoasting Without Mimikatz
- Kerberos Party Tricks: Weaponizing Kerberos Protocol Flaws
- Lateral Movement Using Excel Application and docm
- Lay of the Land with Bloodhound
- LethalHTA - A New Lateral Movement Technique Using DCOM and HTA
- Leveraging INF-SCT Fetch & Execute Technique For Bypass, Evasion, & Persistence
- Leveraging INF-SCT Fetch & Execute Technique For Bypass, Evasion, & Persistence
- Loading Alternate Data Stream ADS DLL/CPL Binaries to Bypass AppLocker
- Local Administrator Password Solution (LAPS) - Part 1
- Local Administrator Password Solution (LAPS) - Part 2
- Local Group Enumeration
- Macro-less Code Exec in MSWord
- Microsoft LAPS Security & Active Directory LAPS Configuration Recon
- Microsoft Office - NTLM Hashes via Frameset
- Multi-Platform Macro Phishing Payloads
- My First Go with BloodHound
- OPSEC Considerations for Beacon Commands
- OWASP Social Engineering: The Art of Human Hacking
- Offensive Encrypted Data Storage
- Office 365 Safe Links Bypass
- Outlook Forms and Shells
- Outlook Home Page - Another Ruler Vector
- Pass-the-Hash is Dead: Long Live LocalAccountTokenFilterPolicy
- Persistence Using Globalflags In Image File Execution Options - Hidden from Autoruns.exe
- Persistence Using RunOnceEx - Hidden from Autoruns.exe
- Phishing Against Protected View
- PowerPoint and Custom Actions
- PowerShell Empire Stagers 1: Phishing With an Office Macro and Evading AVs
- PowerShell Without PowerShell - How To Bypass Application Whitelisting, Environment Restrictions & AV
- Practical Guide to NTLM Relaying in 2017
- Process Doppleganging - A New Way to Impersonate A Process
- Putting Data In Alternate Data Streams and How to Execute It
- Putting Data in Alternate Data Streams and How to Execute It
- Red Team Insights on HTTPS Domain Fronting Google Hosts Using Cobalt Strike
- Red Team Operating in a Modern Environment
- Roasting AS-REPs
- SPN Discovery
- Scanning for Active Directory Privileges & Privileged Accounts
- Simple Domain Fronting PoC with GAE C2 Server
- Spear Phishing 101
- Targeted Kerberoasting
- The Absurdly Underestimated Dangers of CSV Injection
- The Most Dangerous User Right You Probably Have Never Heard Of
- The PowerView PowerUsage Series #1 - Mass User Profile Enumeration
- The PowerView PowerUsage Series #2 - Mapping Computer Shortnames With the Global Catalog
- The PowerView PowerUsage Series #3 - Enumerating GPO Edit Rights In a Foreign Domain
- The PowerView PowerUsage Series #4 - Finding Cross-Trust ACEs
- Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation
- Ultimate AppLocker ByPass List
- Userland API Monitoring and Code Injection Detection
- Using SQL Server for Attacking a Forest Trust
- Using a SCF File to Gather Hashes
- Using robots.txt to Locate Your Targets
- Validated CloudFront SSL Domains
- Vshadow: Abusing the Volume Shadow Service for Evasion, Persistence, and Active Directory Database Extraction
- WMI Persistence with Cobalt Strike
- WSH Injection: A Case Study
- Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
- Week of Evading Microsoft ATA
- Windows Access Tokens and Alternate Credentials
- Windows Defender Attack Surface Reduction Rules Bypass
- Windows Oneliners to Download Remote Payload and Execute Arbitrary Code
- Windows Privilege Escalation checklist
- android-security-awesome
- harmj0y Presentations and Blogs - Windows and Active Directory Exploitation
- mavinject.exe Functionality Deconstructed
- sg1: swiss army knife for data encryption, exfiltration & covert communication
- Ethical Hacking Playground (Repo)
- Saeid
- ustayready
- infosecn1nja
- https://github.com/13o-bbr-bbq/machine_learning_security/wiki
Gathering information that can be used to support targeting
- Freenet - Freenet is a peer-to-peer platform for censorship-resistant communication and publishing.
- I2P - The Invisible Internet Project.
- OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.
- Tor - Free software and onion routed overlay network that helps you defend against traffic analysis.
- What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.
- ReconSpider
- HostRecon — Provide situational awareness during reconnaissance of an engagement
- reconFTW — Automates the entire reconnaisance process
- OSINT Repository
- DarkSide — OSINT & Social Engineering Tool
- AutoRecon - Performs automated enumeration of services
- Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
- Intrigue Core - Framework for attack surface discovery.
- NetBootcamp OSINT Tools
- OSINT Framework
- Recon-ng - Full-featured Web Reconnaissance framework written in Python.
- sn0int - Semi-automatic OSINT framework and package manager.
- Shodan - Database containing information on all accessible domains on the internet obtained from passive scanning
- Wigle - Database of wireless networks, with statistics
- Binary Edge - Scans the internet for threat intelligence
- ONYPHE - Collects cyber-threat intelligence data
- GreyNoise - Search for devices connected to the internet
- Censys - Assessing attack surface for internet connected devices
- Hunter - Search for email addresses belonging to a website
- ZoomEye - Gather information about targets
- LeakIX - Search publicly indexed information
- IntelligenceX - Search Tor, I2P, data leaks, domains, and emails
- Netlas - Search and monitor internet connected assets
- URL Scan - Free service to scan and analyse websites
- PublicWWW - Marketing and affiliate marketing research
- FullHunt - Search and discovery attack surfaces
- crt.sh - Search for certs that have been logged by CT
- Vulners - Search vulnerabilities in a large database
- Pulsedive - Search for threat intelligence
- Packet Storm Security - Browse latest vulnerabilities and exploits
- GrayHatWarefare - Search public S3 buckets and URL shorteners
- Dehashed - Search for anything like username, email, passwords, address, or phone number.
- Have I Been Pwned? - Check whether personal data has been compromised by data breaches
- Snusbase - Indexes information from hacked websites and leaked databases
- LeakBase - Forum of leaked databases
- LeakCheck - Data breach search engine
- GhostProject.fr - Smart search engine
- SecurityTrails - Extensive DNS data
- DorkSearch - Really fast Google dorking
- ExploitDB - Archive of various exploits
- PolySwarm - Scan files and URLs for threats
- DNSDumpster - Search for DNS records quickly
- FullHunt - Search and discovery attack surfaces
- AlienVault - Extensive threat intelligence feed
- Vulners - Search vulnerabilities in a large database
- WayBackMachine - View content from deleted websites
- SearchCode - Search 75 billion lines of code from 40 million projects
- Sarenka — Gathers data from Shodan, censys, etc.
- All-in-One - All search engines in one
- AllTheInternet - All in one search engine
- Etools - Search information retrieved from several data sources simultaneously
- FaganFinder - Collection of tools to help you find anything online
- Goofram - Enhanced saerch engine
- Myallsearch - Enhanced saerch engine
- Qwant - Enhanced saerch engine
- Zapmeta - All web results
- iZito - Combine all search engines
Localized search engines by country
- Alleba (Philippines)
- Baidu (China)
- Eniro (Sweden)
- Goo (Japan)
- Najdsi (Slovenia)
- Naver (South Korea)
- Onet.pl (Poland)
- Orange (France)
- Parseek (Iran)
- SAPO (Portugal)
- Search.ch (Switzerland)
- Walla (Israel)
- Yandex (Russia)
- OpenRefine - Free & open source power tool for working with messy data and improving it.
- Outwit - Find, grab and organize all kinds of data and media from online sources.
- Pown Recon - Target reconnaissance framework powered by graph theory.
- QuickCode - Python and R data analysis environment.
- ThreatCrowd - Threat search engine
- ThreatTracker - Python based IOC tracker.
Search by website source code
- NerdyData - Search engine for source code.
- SearchCode - Help find real world examples of functions, API's and libraries across 10+ sources
- Grep App - Search for source code across a half million git repos
- Bitcoin Abuse - Database of wallets associated with ransomware, blackmailers and fraud.
- Bitcoin Who's Who - Database of known ID information from bitcoin addresses.
- Blockchair - Multiple blockchain explorer.
- Wallet Explorer - Finds all known associated bitcoin addresses from a single known address.
- Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
- Blackbook - Public Records Starting Point.
- FOIA Search - Government information request portal.
- PACER - Public Access to Federal Court Records.
- RECAP - Free version of PACER. Includes browser extensions for Chrome & Firefox.
- SSN Validator - Confirms valid Social Security Numbers.
- Audiense
- Blazent
- Brandwatch
- Buffer
- Buzz sumo
- Geocreepy
- Geofeedia
- Hootsuite
- Hashtatit
- Klear
- Kred
- SproutSocial
- Netvibes
- OpinionCrawl
- Rival IQ
- RSS Social Analyzer
- SocialBakers
- SociaBlade
- Social DownORNot
- Social Searcher
- Tagboard
- Reputation Refinery
- UVRX
- Pushpin — Provides a web interface to keep track of geotagged social media activity
- Backtweets
- Fake Follower Check
- First Tweet
- FirstTweet
- Foller.me
- FollowCheck
- Followerwonk
- GeoSocial Footprint
- Geochirp
- Gigatweeter
- Ground Signal
- HappyGrumpy
- Harvard TweetMap
- Hashtagify
- Hashtags.org
- ManageFlitter
- Mentionmapp
- OneMillionTweetMap
- Rank Speed
- Riffle
- RiteTag
- Schedule Warble
- Sentiment140
- Sleeping Time
- Social Bearing
- TruFan
- Spoonbill
- TWUBS Twitter Chat
- Tagdef
- Tinfoleak
- Trends24
- TrendsMap
- TwChat
- Twazzup
- Tweet Tag
- TweetArchivist
- TweetDeck
- TweetMap
- TweetMap
- TweetPsych
- TweetStats
- TweetTunnel
- Tweetreach
- Twellow
- Tweriod
- Twiangulate
- Twicsy
- Twilert
- Twipho
- TwitRSS
- Twitonomy
- Twitter Advanced Search
- Twitter Audit
- Twitter Chat Schedule
- Twitter Search
- Twitterfall
- burrrd.
- doesfollow
- Agora Pulse
- Commun.it
- ExtractFace
- Fanpage Karma
- Facebook Search
- Facebook Search Tool
- FaceLIVE
- Fb-sleep-stats
- Find my Facebook ID
- Lookup-ID.com
- SearchIsBack
- Wallfux
- Wolfram Alpha Facebook Report
- Zesty Facebook Search
- OsintStalker - Python script for Facebook and geolocation OSINT.
Tools to help discover more about a reddit user or subreddit
- Imgur - The most popular image hosting website used by redditors.
- Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
- Reddit Archive - Historical archives of reddit posts.
- Reddit Comment Search - Analyze a reddit users by comment history.
- Reddit Investigator - Investigate a reddit users history.
- Reddit Suite - Enhances your reddit experience.
- Reddit User Analyser - reddit user account analyzer.
- Subreddits - Discover new subreddits.
- Octosuite — Gather OSINT on GitHub users
- Github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak.
- Zen - Find email addresses of Github users.
- Raven - LinkedIn information gathering tool.
Perform various OSINT on Russian social media site VKontakte
- Barkov.net
- Report Tree
- Snradar - Search pictures by time and location they were taken
- Social Stats
- Target Hunter
- Target Log
- VK Community Search
- VK Parser - A tool to search for a target audience and potential customers.
- VK People Search
- VK to RSS Appspot
- VK5
- Дезертир
- Check User Names
- Knowem - Search for a username on over 500 popular social networks.
- Linkedin2Username - Web scraper that uses valid LinkedIn credentials to put together a list of employees for a specified company.
- Name Checkr
- Name Checkup
- Name Chk
- User Search
- breach-parse: Tool for parsing breached passwords
- emagnet - Automated hacking tool that will find leaked databases.
- BriteVerify Email Verification
- Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
- Email Address Validator
- Email Format
- Email Permutator+
- EmailHippo
- EmailSearch.net
- FindEmails.com
- Have I Been Pwned - Search across multiple data breaches to see if your email address has been compromised.
- Hunter - Hunter lets you find email addresses in seconds and connect with the people that matter for your business.
- [MOSINT] - OSINT Tool For Emails
- MailSniper — Searches through email in a Microsoft Exchange environment for specific terms
- MailTester
- MyCleanList
- Peepmail
- Pipl
- ReversePhoneCheck
- ThatsThem
- Verify Email
- VoilaNorbert - Find anyone's contact information for lead research or talent acquisition.
- Zen - Find email addresses of Github users.
- h8mail - Password Breach Hunting and Email OSINT, locally or using premium services. Supports chasing down related email
- theHarvester - E-mail, subdomain and people names harvester.
- 192 (UK)
- 411 (US)
- Alumni.net
- Ancestry
- Been Verified - Good accuracy, paid person search.
- CVGadget
- Canada411
- Cedar
- Charlie App
- Classmates
- CrunchBase
- Data 24-7
- Family Search
- Family Tree Now
- Federal Bureau of Prisons Inmate Locator (US) - Find an inmate that's in Federal prisons
- Fold3 (US Military Records) - Browse records of US Military members.
- Genealogy Bank
- Genealogy Links
- Go Find Who - Multiple handy search tools.
- Homemetry
- Infobel
- Infospace White Pages
- Interment
- International White and Yellow Pages
- Itools
- Kompass
- Locate Family - Basicly a worldwide phonebook that can be manually searched. This site shows up as results on google.com so searches based on name, address, or phone number.
- LookUpUK
- Lullar
- MelissaDATA
- My Life People Search
- My Life - Paid people search with lots of results.
- PeekYou
- People Search (Australia)
- PeopleSearch.net
- Pipl
- Rapportive
- RecordsPedia
- Recruitem
- Reunion
- Rootsweb
- SearchBug
- Skip Ease
- SnoopStation
- Sowdust Facebook Search - Facebook search tool.
- Spokeo
- That's Them - Good accuracy, paid person search.
- The National Archives (UK)
- USSearch
- WebMiii
- White Pages (US)
- Wink
- Yasni
- Zabasearch
- Zoominfo
- facesearch - Search for images of a person by name.
- snitch.name
- theHarvester - E-mail, subdomain and people names harvester.
- National Cellular Directory - Cell phone lookups. The lookup products including billions of records
- Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
- Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
- Twilio - Look up a phone numbers carrier type, location, etc.
- Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.
- AllStocksLinks
- Battle of the Internet Giants
- Better Business Bureau
- Bizeurope
- Bloomberg
- Business Source
- Bureau Van Dijk
- Canadian Business Research
- Canadian Business Resource
- Central and Eastern European Business Directory
- Company Registration Round the World
- Company Research Resources by Country Comparably
- CompeteShark
- Corporate Information
- CrunchBase
- EDGAR Online
- Europages
- European Business Register
- Ezilon
- Factiva
- Glassdoor
- globalEdge
- GuideStar
- Hoovers
- Inc. 5000
- InstantLogoSearch
- iSpionage
- Knowledge guide to international company registration
- National Company Registers
- Mergent Intellect
- Mergent Online
- Morningstar Research
- Notablist
- Orbis directory
- opencorporates
- Owler
- Overseas Company Registers
- Plunkett Research
- Scoot
- SEMrush
- Serpstat
- SpyFu
- Forbes Global 2000
- Vault
- Creepy - Geolocation OSINT tool.
- OsintStalker - Python script for Facebook and geolocation OSINT.
- Infosniper
- IP Location
- IP 2 Geolocation
- IP 2 Location
- IP Fingerprints
- ExifLooter - Find geolocation on image URL and directories
- Mozilla Stumbler
- Open Wifi Map
- WiGLE - Find wireless networks
- Bhuvan Indian Geo-Platform of ISRO
- DigitalGlobe Open Data Program
- Geo-Airbus Defense
- JAXA’s Global ALOS 3D World
- NASA Earthdata Search
- NASA Worldview
- NOAA CLASS
- NOAA Data Access Viewer
- NOAA Digital Coast
- National Institute for Space Research (INPE)
- Sentinel Open Access Hub
- USGS Earth Explorer
- VITO Vision
- GeoTag — Discover location of pictures
- Sherloq — Open source forensic image analysis
- exitLooter - Find geolocation on image URL and directories
- Baidu Images
- Bing Images
- Flickr
- Google Image
- Gramfeed
- Image Identification Project
- Image Raider
- KarmaDecay
- Lycos Image Search
- PhotoBucket
- PicTriev
- Picsearch
- TinEye - Reverse image search engine.
- Websta
- Worldcam
- Yahoo Image Search
- Yandex Images
- BlogSearchEngine
- Catana-DS — Automates Google Dorking
- GooDork - Command line Google dorking tool.
- Google Adwords - Get monthly keyword volume data and stats.
- Google Hacking Database - Database of Google dorks; can be used for recon.
- Google Hacking Master List
- Google Trends - See how many users are searching for specific keywords.
- Keyword Discovery
- KeywordTool
- Keyword Spy
- Notey - Blog post search engine.
- Outbrain
- One Look Reverse Dictionary
- Soovle
- Twingly
- Ubersuggest
- Dorksearch — Faster Google Dorking
- GitHub Dork Helper
- Dork-cli - Command line Google dork tool.
- PaGoDo - Passive, automated Google dorking tool.
- Word Tracker
Search for data located on PDFs, Word documents, presentation slides, and more
- Authorstream
- Find-pdf-doc
- Free Full PDF
- Offshore Leak Database
- PDF Search Engine
- RECAP
- Scribd
- SlideShare
- Slideworld
- soPDF.com
- Archive.is
- BlackWidow
- CachedView
- CashedPages
- DNS History - DNS) Historical Record Archive
- DomainTools
- Wayback Machine Archiver
- Wayback Machine - Explore the history of a website.
- Alltop
- Awasu
- Bridge.Leslibres
- Bridge.Suumitsu
- ChangeDetect
- Deltafeed
- Feed43
- FeedBooster
- Feed Exileed
- Feed Filter Maker
- Feedly
- FeedReader
- FetchRSS
- FollowThatPage
- Google Alerts - A content change detection and notification service.
- InfoMinder
- Mention
- Netvibes
- Newsblur
- OmeaReader
- OnWebChange
- Reeder
- RSS Bridge
- RSS Feed Reader
- RSS Micro
- RSS Search Engine
- RSS Search Hub
- RSSOwl
- Selfoss
- Silobreaker
- Talkwalker
- The Old Reader
- versionista
- visualping
- WebSite Watcher
- Winds
- ACLight - Script for advanced discovery of sensitive Privileged Accounts - includes Shadow Admins.
- BuiltWith - Technology lookup tool for websites.
- CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
- LdapMiner - Multiplatform LDAP enumeration utility.
- Mass Scan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
- Netdiscover - Simple and quick network scanning tool.
- Pentest-Tools - Online suite of various different pentest related tools.
- Ruler - Tool for remotely interacting with Exchange servers.
- Shodan - Database containing information on all accessible domains on the internet obtained from passive scanning.
- Spyse - Web research services that scan the entire internet using OSINT, to simplify the investigation of infrastructure and attack surfaces.
- Spyse.py - Python API wrapper and command-line client for the tools hosted on spyse.com.
- Sublist3r - Subdomain enumeration tool for penetration testers.
- ldapsearch - Linux command line utility for querying LDAP servers.
- nmap - Free security scanner for network exploration & security audits.
- pyShodan - Python 3 script for interacting with Shodan API (requires valid API key).
- smbmap - Handy SMB enumeration tool.
- xprobe2 - Open source operating system fingerprinting tool.
- zmap - Open source network scanner that enables researchers to easily perform Internet-wide network studies.
- Ahrefs - A tool for backlink research, organic traffic research, keyword research, content marketing & more.
- Amass - Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
- Backlink Discovery — Find backlinks, Referring domains, Link history, etc.
- Central Ops
- Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
- Domain Dossier
- Domain Investigation Toolbox — Gather information about the target domain name
- Domain Tools - Whois lookup and domain/ip historical data.
- Easy whois
- Exonera Tor - A database of IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date.
- FindFrontableDomains - Multithreaded tool for finding frontable domains.
- GooFuzz — Perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches
- HaxUnit — Combines multiple active/passive subdomain enumeration tools and port scanning
- IP Address.com
- IP Neighboring — Discover Neighboring IP Hosts
- IP Void
- InfoByIp - Domain and IP bulk lookup tool.
- Investigator — Quickly check & gather information about the target domain name
- Link-JS — Fetch links from JS w/ Subfinder
- Meg - Quickly find hidden paths/directories without flooding traffic
- Squatm3gator - Enumerate available domains generated modifying the original domain name through different cybersquatting techniques
- Verisign
- Website Informer
- w3snoop
- AbuseIPDB - Search engine for blacklisted IPs or domains.
- AutoShun - Public repository of malicious IPs and other resources.
- BadIPs - Online blacklist lookup.
- Binary Defense IP Ban List - Public IP blacklist.
- Blocklist Ipsets - Public IP blacklist.
- Malc0de DNSSinkhole - List of domains that have been identified as distributing malware during the past 30 days.
- Spamcop - IP based blacklist.
- Spamhaus - Online blacklist lookup.
- Assetfinder: Find domains and subdomains potentially related to a given domain
- Astra — Finds API keys, URLs, AWS Buckets, etc.
- Awesome Hacker Search Engines — CVEs, Domains, Addresses, Certifications, Credentials, etc.
- Censys - Collects data on hosts and websites through daily ZMap and ZGrab scans.
- ExitLooter - Find geolocation on image URL and directories
- Grey Noise — Trace IPs, URLs, etc.
- Js-parse — Looks through javascript files in a given directory and finds subdomains, URLs, parameters, custom headers, and API keys
- Majestic - Find out who links to your website
- Phonebook — Lists all domains, email addresses, URL for the target domain
- PowerMeta — Searches for publicly available files hosted on webpages for a particular domain
- URLVoid - Analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites.
- WhereGoes — URL Redirect Checker
Backlinks
Finding Broken Links
- SocialHunter — Crawls the given URL and finds broken social media links that can be hijacked
- Redirect Detective
- DNS Dumpster - Search for DNS records quickly
- DNS History - DNS) Historical Record Archive
- DNSrr — Enumerate all information from DNS records
- DNSenum - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
- DNSmap - Passive DNS network mapper.
- DNSrecon - DNS enumeration script.
- DNStracer - Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
- DNSviz
- IP Spy - IP Lookup, WHOIS, and DNS resolver
- IQ WHOIS — Advanced WHOIS Search
- Passivedns-client - Library and query tool for querying several passive DNS providers.
- Passivedns - Network sniffer that logs all DNS server replies for use in a passive DNS setup.
- WhoisFreaks — WHOIS Discovery
- dnsenum — Script that enumerates DNS information
- Into DNS
- IP Checking
- Kloth
- Network Tools
- MXToolbox - MX record lookup tool.
- Remote DNS Lookup
- Robtex
- SecurityTrails - API to search current and historical DNS records, current and historical WHOIS, technologies used by sites and whois search for phone, email, address, IPs etc.
- Who.is - Domain whois information.
- Whois Arin Online
- WhoIsHostingThis
- Whoisology
- WhoIsRequest
- Domfind - domfind is a Python DNS crawler for finding identical domain names under different TLDs.
- FavFreak - Fetches the favicon.ico and hash value and generates shodan dorks
- CloudFrunt - Tool for identifying misconfigured CloudFront domains.
- Nmap
- AngryIP
- PRTG
- Spidex — Find Internet-connected devices
- BurpSuite
- Trend Micro Hybrid Cloud Security
- Orca Security
- InsightVM
- Qualys
- [Nginxpwner] - Tool to look for common Nginx misconfigurations and vulnerabilities
- Nikto
- Nrich - Quickly analyze IPs and determines open ports / vulnerabilities
- Uncover - Quickly discover exposed hosts on the internet using shodan, censys and fofa
- scanless — Websites that performs port scans on your behalf
- Naabu - Enumerate valid ports conducting a SYN/CONNECT scans on the host(s) ports that return a reply
- BurpSuite
- ACSTIS - Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.
- BuiltWith
- Burp Suite - Commercial web vulnerability scanner, with limited community edition.
- cms-explorer - Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
- Netsparker Web Application Security Scanner - Commercial web application security scanner to automatically find many different types of security flaws.
- Nikto - Noisy but fast black box web server and web application vulnerability scanner.
- Observatory - Free online web scanning utility.
- OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
- Security Headers - Free online utility for checking a website's HTTP headers for security vulnerabilities.
- SQLmate - A friend of sqlmap that identifies sqli vulnerabilities based on a given dork and website (optional).
- WPScan - Black box WordPress vulnerability scanner.
- Follow.net
- HypeStat
- StatsCrop
- Netcraft Site Report
- Wappalyzer
- Fenrir - Fenrir is a simple IOC scanner. It allows scanning any UNIX system for IOCs in plain bash.
- fuzzbox - Multi-codec media fuzzing tool.
- honggfuzz - Security orientated fuzzing tool.
- melkor-android - Android fuzzing tool for ELF file formats.
- radamsa - General purpose fuzzing tool.
API Keys
- Clickjacker — Discover secret API Keys
- js-parse — Looks through javascript files in a given directory and finds subdomains, URLs, parameters, custom headers, and API keys
- Astra — Finds API keys, URLs, AWS Buckets, etc.
Web Cookies
- CookieServe — Cookie Checker Tool for Websites
Missing Headers
- securityheader.com — Reports headers that are missing; Exploitable
- Browser Exploitation Framework (BeEF) - Command and control server for delivering exploits to commandeered Web browsers.
- Commix - Automated all-in-one operating system command injection and exploitation tool.
- Drupwn - Drupal web application exploitation tool.
- EyeWitness - Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- fimap - Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
- FuzzDB - Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- IIS-Shortname-Scanner - Command line tool to exploit the Windows IIS tilde information disclosure vulnerability.
- Kadabra - Automatic LFI exploiter and scanner.
- Kadimus - LFI scan and exploit tool.
- LFISuite - A tool designed to exploit Local File Include vulnerabilities.
- libformatstr - Python script designed to simplify format string exploits.
- liffy - LFI exploitation tool.
- lyncsmash - A collection of tools to enumerate and attack self-hosted Skype for Business and Microsoft Lync installations
- NoSQLmap - Automatic NoSQL injection and database takeover tool.
- SQLmap - Automated SQL injection and database takeover tool.
- sqlninja - Automated SQL injection and database takeover tool.
- sslstrip2 - SSLStrip version to defeat HSTS.
- sslstrip - Demonstration of the HTTPS stripping attacks.
- tplmap - Automatic server-side template injection and Web server takeover tool.
- VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
- wafw00f - Identifies and fingerprints Web Application Firewall (WAF) products.
- webscreenshot - A simple script to take screenshots from a list of websites.
- weevely3 - Weaponized web shell.
- Wordpress Exploit Framework - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
- WPSploit - Exploit WordPress-powered websites with Metasploit.
- Fuxploiter — Detecting and exploiting file upload forms flaws
- AutoScanWithBurp — Extension to perform automated & authenticated scans against URLS
- OAuthScan - Burp Suite Extension written in Java with the aim to provide some automatic security checks
- Mitaka — Browser extension for OSINT
- Photon - Crawler designed for OSINT.
- GOSINT - OSINT tool with multiple modules and a telegram scraper.
- Maltego - Proprietary software for open source intelligence and forensics, from Paterva.
- SecApps Recon - Information gathering and target reconnaissance tool and UI.
- Spiderfoot - Open source OSINT automation tool with a Web UI and report visualizations
- Vcsmap - Plugin-based tool to scan public version control systems for sensitive information.
- XRay - XRay is a tool for recon, mapping and OSINT gathering from public networks.
- Crits - a web-based tool which combines an analytic engine with a cyber threat database .
- Fileintel - Pull intelligence per file hash.
- HELK - Threat Hunting platform.
- Hostintel - Pull intelligence per host.
Creating, purchasing, or compromising resources that can be used to support targeting
-
ArchStrike - Arch GNU/Linux repository for security professionals and enthusiasts.
-
AttifyOS - GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
-
BackBox - Ubuntu-based distribution for penetration tests and security assessments.
-
BlackArch - Arch GNU/Linux-based distribution for penetration testers and security researchers.
-
Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
-
Fedora Security Lab - Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.
-
Kali - GNU/Linux distribution designed for digital forensics and penetration testing.
-
Network Security Toolkit (NST) - Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.
-
Parrot Security OS - Distribution similar to Kali using the same repositories, but with additional features such as Tor and I2P integration.
-
The Pentesters Framework - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.
-
LOTS Project — Websites that allows attackers to use their domain when conducting phishing, C2, exfiltration, and downloading tools to evade detection
- Flipper Zero
- LAN Turtle - Covert "USB Ethernet Adapter" that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.
- PCILeech - Uses PCIe hardware devices to read and write from the target system memory via Direct Memory Access (DMA) over PCIe.
- Poisontap - Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.
- Proxmark3 - RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.
- USB Rubber Ducky - Customizable keystroke injection attack platform masquerading as a USB thumbdrive.
- WiFi Pineapple - Wireless auditing and penetration testing platform.
- /r/lockpicking Subreddit - Subreddit dedicated to the sport of lockpicking.
- Keypicking.com - Bustling online forum for the discussion of lockpicking and locksport.
- LockWiki - Community-driven reference for both beginners and professionals in the security industry.
- Lockpicking Forensics - Website "dedicated to the science and study of forensic locksmithing."
- Lockpicking101.com - One of the longest-running online communities "dedicated to the fun and ethical hobby of lock picking."
- The Amazing King's Lockpicking pages - Hobbyist's website with detailed pages about locks, tools, and picking techniques.
- Bat — Advanced syntax highlighting
- fzf — General purpose command-line fuzzy finder
- exa — Advanced replacement for
ls
- macOS Terminal (zsh) — The Beginner’s Guide
Various entry vectors to gain your initial foothold within a network
- [AdvPhishing] - This Is Advance Phishing Tool! OTP PHISHING
- CredSniper — Launch phishing site
- DarkSide — OSINT & Social Engineering Tool
- EvilNoVNC - Ready to go Phishing Platform
- Fake-SMS — Create SMS messages
- Mip22 - Advanced phishing tool
- PhishStats - gathering, enhancing and sharing phishing information with the infosec community.
- PyPhisher — Phishing website templates
- Zphishper - Automated phishing tool
- C2
- [CiLocks] - Android LockScreen Bypass
- [Android-PIN-Bruteforce] - Unlock An Android Phone (Or Device) By Bruteforcing The Lockscreen PIN
- Beelogger - Tool for generating keylooger.
- Canary Tokens - Generate tokens to automatically alert users when triggered.
- Catphish - Tool for phishing and corporate espionage written in Ruby.
- Evilginx - MITM attack framework used for phishing credentials and session cookies from any Web service
- Gophish - Open-Source Phishing Framework
- King Phisher - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
- Lucy Phishing Server - (commercial) tool to perform security awareness trainings for employees including custom phishing campaigns, malware attacks etc. Includes many useful attack templates as well as training materials to raise security awareness.
- PhishingFrenzy - Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns.
- SET - The Social-Engineer Toolkit from TrustedSec
- Wifiphisher - Automated phishing attacks against Wi-Fi networks
Attacker-controlled code running on a local or remote system
Communicating with systems under your control within a victim network
- Browser Exploitation Framework (BeEF) — Recovering web session information and exploiting client-side scripting
- Brute Ratel - A customized C2 center for Red Team and Adversary Simulation
- Cobalt Strike — Adversary simulations & red team operations
- Covenant — .NET C2 framework
- Emp3R0R - Linux post-exploitation framework
- GithubC2 - Using Github as a C2
- HazProne — Cloud Pentesting Framework
- Lockdoor Framework — Framework that automates pentesting tools
- Metasploit
- Notion Term — Embed reverse shell in Notion pages
- Octopus — Pre-operation C2 server
- Pacu — Scanning and exploit tools for reconnaissance and exploitation of Amazon Web Service (AWS) accounts
- Recon-ng — Full reconnaissance framework to conduct open source web-based recon
- SilentTrinity — Asynchronous, multiplayer, & multiserver C2 framework
- Silver — Open source cross-platform red team framework
- Sn1per — All in one pentesting framework
- Zed Attack Proxy (ZAP) — Scanning tools and scripts for web application and mobile app security testing
- Armitage - Java-based GUI front-end for the Metasploit Framework.
- AutoSploit - Automated mass exploiter, which collects target by employing the Shodan.io API and programmatically chooses Metasploit exploit modules based on the Shodan query.
- Faraday - Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.
- Habu Hacking Toolkit - Unified set of tools spanning passive reconnaissance, network attacks, social media monitoring, and website fingerprinting.
- Mad-Metasploit - Additional scripts for Metasploit.
- Metasploit - Software for offensive security teams to help verify vulnerabilities and manage security assessments.
- Mobile Security Framework (MobSF) - Automated mobile application pentesting framework capable of static analysis, dynamic analysis, malware analysis, and web API testing.
- Pupy - Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool.
- Rupture - Multipurpose tool capable of man-in-the-middle attacks, BREACH attacks and other compression-based crypto attacks.
- CrackMapExec - Multipurpose post-exploitation suite containing many plugins.
- DBC2 - Multipurpose post-exploitation tool.
- Empire - PowerShell based (Windows) and Python based (Linux/OS X) post-exploitation framework.
- EvilOSX - macOS backdoor with docker support.
- Fathomless - A collection of post-exploitation tools for both Linux and Windows systems.
- FruityC2 - Open source, agent-based post-exploitation framework with a web UI for management.
- Koadic - Windows post-exploitation rootkit, primarily utilizing Windows Script Host.
- PlugBot - Can be installed onto an ARM device for Command & Control use and more.
- Portia - Automated post-exploitation tool for lateral movement and privilege escalation.
- ProcessHider - Post-exploitation tool for hiding processes.
- Pupy - Open source cross-platform post-exploitation tool, mostly written in Python.
- RemoteRecon - Post-exploitation utility making use of multiple agents to perform different tasks.
- TheFatRat - Tool designed to generate remote access trojans (backdoors) with msfvenom.arch-project/) - Can be installed onto an ARM device for Command & Control use and more.
- p0wnedShell - PowerShell based post-exploitation utility utilizing .NET.
- poet - Simple but multipurpose post-exploitation tool.
- ChipWhisperer - Complete open-source toolchain for side-channel power analysis and glitching attacks
- [SillyRAT] - A Cross Platform Multifunctional (Windows/Linux/Mac) RAT
- [Byp4Xx] - Simple Bash Script To Bypass "403 Forbidden" Messages With Well-Known Methods
- [Arbitrium-RAT] - A Cross-Platform, Fully Undetectable Remote Access Trojan, To Control Android, Windows And Linux
Gaining higher-level permissions on a system or network
- Bloodhound - Graphical Active Directory trust relationship explorer.
- Commentator - PowerShell script for adding comments to MS Office documents, and these comments can contain code to be executed.
- DeathStar - Python script that uses Empire's RESTful API to automate gaining Domain Admin rights in Active Directory environments.
- Empire - Pure PowerShell post-exploitation agent.
- Fibratus - Tool for exploration and tracing of the Windows kernel.
- GetVulnerableGPO - PowerShell based utility for finding vulnerable GPOs.
- Headstart - Lazy man's Windows privilege escalation tool utilizing PowerSploit.
- Hyena - NetBIOS exploitation.
- Luckystrike - PowerShell based utility for the creation of malicious Office macro documents.
- Magic Unicorn - Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or
certutil
(using fake certificates). - Mimikatz - Credentials extraction tool for Windows operating system.
- PowerSploit - PowerShell Post-Exploitation Framework.
- PSKernel-Primitives - Exploiting primitives for PowerShell.
- Redsnarf - Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.
- Rubeus - Rubeus is a C# toolset for raw Kerberos interaction and abuses.
- Sysinternals Suite - The Sysinternals Troubleshooting Utilities.
- Windows Credentials Editor - Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.
- Windows Exploit Suggester - Suggests Windows exploits based on patch levels.
- Bella - Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS.
- Linus - Security auditing tool for Linux and macOS.
- LinPeas — Linux Privilege Escalation
- Linus - Security auditing tool for Linux and macOS.
- Linux Exploit Suggester - Heuristic reporting on potentially viable exploits for a given GNU/Linux system.
- Mempodipper - Linux Kernel 2.6.39 < 3.2.2 local privilege escalation script.
- vuls - Linux/FreeBSD agentless vulnerability scanner.
- Linux Priv Checker — Enumerate basic system info and search for common privilege escalation vectors
Avoiding detection throughout your compromise
- LOTS Project — Websites that allows attackers to use their domain when conducting phishing, C2, exfiltration, and downloading tools to evade detection
- AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.
- GPU Poisoning — Hide payload inside GPU memory
- Hyperion - Runtime encryptor for 32-bit portable executables ("PE
.exe
s"). - Inceptor — Automate common AV/EDR bypasses
- PeCloak.py - Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.
- PeCloakCapstone - Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.
- Shellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.
- SigThief - Stealing signatures to evade AV.
- UniByAv - Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.
- Windows-SignedBinary - AV evasion tool for binary files.
- dll4shell - A collection of DLL wrappers around various shellcode injection and obfuscation techniques
Stealing credentials like account names and passwords
- CredKing — Launch Password Spraying using AWS Lamba across multiple regions, rotating IPs w/ each request
- DomainPasswordSpray — Perform password spraying against users in a domain
- LDAP Nom Nom - Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
- Masky - Python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS
- [SharpML] - Machine Learning Network Share Password Hunting Toolkit
- CeWL - Generates custom wordlists by spidering a target's website and collecting unique words.
- CrackStation - Online password cracker.
- Hashcat - Fast hash cracking utility with support for most known hashes as well as OpenCL and CUDA acceleration.
- JPassword Recovery Tool - RAR bruteforce cracker. Formery named RAR Crack.
- JWT Cracker - Simple HS256 JWT token brute force cracker.
- John the Ripper Jumbo edition - Community enhanced version of John the Ripper.
- John the Ripper - Fast password cracker.
- Mentalist - Unique GUI based password wordlist generator compatible with CeWL and John the Ripper.
- Hash Database — Upload Hashes
Observing potential control and what’s around your entry point in order to discover how it could benefit your current objective
- Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
- LinEnum — Linux Enumeration
- Linux Exploit Suggester — Assist in detecting security deficiencies for given Linux kernel/Linux-based machine
- dnstwist - Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.
- dsniff - Collection of tools for network auditing and pentesting.
- enumdb - MySQL and MSSQL bruteforce utility
- FireAway - Firewall audit and security bypass tool.
- impacket - Collection of Python classes for working with network protocols.
- Intercepter-NG - Multifunctional network toolkit.
- kerbrute - A tool to perform Kerberos pre-auth bruteforcing.
- Low Orbit Ion Cannon (LOIC) - Open source network stress testing tool.
- Ncat - TCP/IP command line utility supporting multiple protocols.
- netcut - ARP based utility for discovering and spoofing MAC addresses and enabling/disabling network connectivity on network devices.
- Network-Tools.com - Website offering an interface to numerous basic network utilities like
ping
,traceroute
,whois
, and more. - patator - Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.
- pig - GNU/Linux packet crafting tool.
- Praeda - Automated multi-function printer data harvester for gathering usable data during security assessments.
- Printer Exploitation Toolkit (PRET) - Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.
- routersploit - Open source exploitation framework similar to Metasploit but dedicated to embedded devices.
- scapy - Python-based interactive packet manipulation program & library.
- Sockstress - TCP based DoS utility.
- SPARTA - Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.
- Spyse - Web research services that scan the entire internet using OSINT, to simplify the investigation of infrastructure and attack surfaces.
- Spyse.py - Python API wrapper and command-line client for the tools hosted on spyse.com.
- THC Hydra - Online password cracking tool with built-in support for many network protocols, including HTTP, SMB, FTP, telnet, ICQ, MySQL, LDAP, IMAP, VNC, and more.
- UFONet - Layer 7 DDoS/DoS tool.
- Zarp - Multipurpose network attack tool, both wired and wireless.
- Chaosreader - Universal TCP/UDP snarfing tool that dumps session data from various protocols.
- Dshell - Network forensic analysis framework.
- Fiddler - Cross platform packet capturing tool for capturing HTTP/HTTPS traffic.
- Netsniff-ng - Swiss army knife for Linux network sniffing.
- Tcpdump/libpcap - Common packet analyzer that runs under the command line.
- Wireshark - Widely-used graphical, cross-platform network protocol analyzer.
- Yersinia - Packet and protocol analyzer with MITM capability.
- BetterCAP - Modular, portable and easily extensible MITM framework.
- dnschef - Highly configurable DNS proxy for pentesters.
- Ettercap - Comprehensive, mature suite for machine-in-the-middle attacks.
- evilgrade - Modular framework to take advantage of poor upgrade implementations by injecting fake updates.
- mallory - HTTP/HTTPS proxy over SSH
- MITMf - Multipurpose man-in-the-middle framework.
- mitmproxy - Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
- Morpheus - Automated ettercap TCP/IP Hijacking tool.
- Responder-Windows - Windows version of the above NBT-NS/LLMNR/MDNS poisoner.
- Responder - Open source NBT-NS, LLMNR, and MDNS poisoner.
- SSH MITM - Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
- Aircrack-ng - Set of tools for auditing wireless networks.
- BetterCAP - Wifi, Bluetooth LE, and HID reconnaissance and MITM attack framework, written in Go.
- Fluxion - Suite of automated social engineering based WPA attacks.
- Kismet - Wireless network discovery tool.
- MANA Toolkit - Rogue AP and man-in-the-middle utility.
- NetStumbler - WLAN scanning tool.
- WiFi Pumpkin - All in one Wi-Fi exploitation and spoofing utility.
- wifi-pickle - Fake access point attacks.
- Wifite - Automated wireless attack tool.
- SMTP TLS Checker - Online TLS/SSL testing suite for SMTP servers.
- SSL Labs - Online TLS/SSL testing suite for revealing supported TLS/SSL versions and ciphers.
- SSLscan - Quick command line SSL/TLS analyzer.
- SSLyze - Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.
- crackpkcs12 - Multithreaded program to crack PKCS#12 files (
.p12
and.pfx
extensions), such as TLS/SSL certificates. - spoodle - Mass subdomain + POODLE vulnerability scanner.
- tlssled - Comprehensive TLS/SSL testing suite.
- FeatherDuster - Analysis tool for discovering flaws in cryptography.
- rsatool - Tool for calculating RSA and RSA-CRT parameters.
- xortool - XOR cipher analysis tool.
Pivoting through multiple systems and accounts to gain additional access
- [Forbidden] - Bypass 4Xx HTTP Response Status Codes
- Neo-reGeorg -- Used for HTTP(S) Tunneling
Gathering information relevant to following through on the adversary's objectives
- ICMPDoor - Open-source reverse-shell written in Python3 and scapy
- iodined - DNS Tunneling
- Data Exfiltration Toolkit (DET) - Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
- dnsteal - Fake DNS server for stealthily extracting files.
- HTTPTunnel - Tunnel data over pure HTTP GET/POST requests.
- Iodine - Tunnel IPv4 data through a DNS server; useful for exfiltration from networks where Internet access is firewalled, but DNS queries are allowed.
- MailSniper - Search through email in a Microsoft Exchange environment for specific terms (passwords, insider intel, network architecture information, etc.).
- mallory - HTTP/HTTPS proxy over SSH.
- mimikatz - Credentials extraction tool for Windows operating system.
- mimikittenz - Post-exploitation PowerShell tool for extracting data from process memory.
- PANHunt - Search file systems for credit cards.
- PassHunt - Search file systems for passwords.
- ptunnel-ng - Tunnel IPv4 traffic through ICMP pings; slow but stealthy when normal IP exfiltration traffic is blocked.
- pwnat - Punches holes in firewalls and NATs.
- spYDyishai - Local Google credentials exfiltration tool, written in Python.
- tgcd - Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
Disrupting availability, compromising integrity by manipulating business and operational processes
- [PeTeReport] - An Open-Source Application Vulnerability Reporting Tool
- Pacu
- https://rhinosecuritylabs.com/aws/cloud-container-attack-tool/
- CloudFrunt - Tool for identifying misconfigured CloudFront domains.
- Multi Cloud
- Multi Cloud
- Recon Cloud - Cloud asset scanner
- AzureAD-Attack-Defense - Various common attack scenarios on Azure AD
- AD-Attack-Defense
- AD Exploitation Cheat Sheet
- Offensive AD 101 - Offense AD Guide
- AD Exploitation Cheatsheet - Common TTPs for pentesting AD
- IR Team — AD & Kerberos Abusing
- AD Kill Chain Attack & Defense - Specific TTPs to compromise AD and guidance to mitigation, detection, and prevention
- EthHack — Repository security tool
- FSociety Hacking Tools — Contains all the tools used in Mr. Robot series
- Hacktricks - Hacking TTPs
- Kitploit’s Popular Hacking Tools
- PayloadAllTheThings - A list of useful payloads for bypassing systems
- Pentest-Tools — Cybersecurity repository
- Red Team Resources - Compilation of Red Teaming resources
- Red Teaming Toolkit
- Python Tool List - Compilation of security Python tools
- Kayak Car Hacking Tool - Tool for Kayak car hacking.
- APTSimulator - A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised.
- Atomic Red Team](https://github.com/redcanaryco/atomic-red-team) - Small and highly portable detection tests mapped to the Mitre ATT&CK Framework.
- AutoTTP - Automated Tactics Techniques & Procedures. Re-running complex sequences manually for regression tests, product evaluations, generate data for researchers.
- Blue Team Training Toolkit](https://www.bt3.no/) - Software for defensive security training, which will bring your network analysis training sessions, incident response drills and red team engagements to a new level.
- Caldera - an automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks. It generates plans during operation using a planning system and a pre-configured adversary model based on the Adversarial Tactics, Techniques & Common Knowledge](ATT&CK™) project.
- DumpsterFire - The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations.
- Metta - An information security preparedness tool to do adversarial simulation.
- Network Flight Simulator - flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.
- Red Team Automation ](https://github.com/endgameinc/RTA) - RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.
- RedHunt-OS - A virtual machine for adversary emulation and threat hunting.
- Active Countermeasures - Open source tools for countermeasure
- Cortex - Cortex allows you to analyze observables such as IP and email addresses, URLs, domain names, files or hashes one by one or in bulk mode using a Web interface. Analysts can also automate these operations using its REST API.
- DNS Blacklist - Detect Blacklisted IPs from your traffic
- DarkTrace - Cyber AI detection
- Diffy - a DFIR tool developed by Netflix's SIRT that allows an investigator to quickly scope a compromise across cloud instances (Linux instances on AWS, currently) during an incident and efficiently triaging those instances for followup actions by showing differences against a baseline.
- Fileintel - Pull intelligence per file hash.
- Hindsight - Internet history forensics for Google Chrome/Chromium.
- Imagemounter - Command line utility and Python package to ease the (un)mounting of forensic disk images.
- Kansa - Kansa is a modular incident response framework in Powershell.
- Live Forensicator - Powershell script to aid Incidence Response and Live Forensics
- Netzob - Multipurpose tool for reverse engineering, modeling, and fuzzing communciation protocols.
- Spidertrap - Trap web crawlers and spiders in dynamically generated webpages
- Stalk - Collect forensic data about MySQL when problems occur.
- Stenographer - Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets. It stores as much history as it possible, managing disk usage, and deleting when disk limits are hit. It's ideal for capturing the traffic just before and during an incident, without the need explicit need to store all of the network traffic.
- The CredDefense Toolkit - Detect & Prevent Brute Force attacks
- Threat Hunter Playbook - Open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient
- traceroute-circl - traceroute-circl is an extended traceroute to support the activities of CSIRT (or CERT) operators. Usually CSIRT team have to handle incidents based on IP addresses received. Created by Computer Emergency Responce Center Luxembourg.
- RaQet - RaQet is an unconventional remote acquisition and triaging tool that allows triage a disk of a remote computer (client) that is restarted with a purposely built forensic operating system.
- rastrea2r - allows one to scan disks and memory for IOCs using YARA on Windows, Linux and OS X.
- Androbugs-Framework - Android program vulnerability analysis tool.
- Androwarn - Android static code analysis tool.
- APKinspector - Android APK analysis tool with GUI.
- bandit - Security oriented static analyser for python code.
- Brakeman - Static analysis security vulnerability scanner for Ruby on Rails applications.
- Codebeat (open source) - Open source implementation of commercial static code analysis tool with GitHub integration.
- Codelyzer - A set of tslint rules for static code analysis of Angular TypeScript projects. You can run the static code analyzer over web apps, NativeScript, Ionic, etc.
- cppcheck - Extensible C/C++ static analyzer focused on finding bugs.
- FindBugs - Free software static analyzer to look for bugs in Java code.
- Icewater - 16,432 free Yara rules.
- Joint Advanced Defense Assessment for Android Applications (JAADAS) - Multipurpose Android static analysis tool.
- OWASP Dependency Check - Open source static analysis tool that enumerates dependencies used by Java and .NET software code (with experimental support for Python, Ruby, Node.js, C, and C++) and lists security vulnerabilities associated with the depedencies.
- pefile - Static portable executable file inspector.
- Progpilot - Static security analysis tool for PHP code.
- Quick Android Review Kit (Qark) - Tool for finding security related Android application vulnerabilities.
- ShellCheck - Static code analysis tool for shell script.
- smalisca - Android static code analysis tool.
- sobelow - Security-focused static analysis for the Phoenix Framework.
- truffleHog - Git repo scanner.
- Veracode - Commercial cloud platform for static code analysis, dynamic code analysis, dependency/plugin analysis, and more.
- VisualCodeGrepper - Open source static code analysis tool with support for Java, C, C++, C#, PL/SQL, VB, and PHP. VisualCodeGrepper also conforms to OWASP best practices.
- Yara - Static pattern analysis tool for malware researchers.
- AndroidHooker - Dynamic Android application analysis tool.
- Androl4b - Android security virtual machine based on Ubuntu-MATE for reverse engineering and malware analysis.
- Cheat Engine - Memory debugger and hex editor for running applications.
- ConDroid - Android dynamic application analysis tool.
- Cuckoo - Automated dynamic malware analysis tool.
- DECAF - Dynamic code analysis tool.
- droidbox - Dynamic malware analysis tool for Android, extension to DECAF.
- drozer - Android platform dynamic vulnerability assessment tool.
- idb - iOS app security analyzer.
- Inspeckage - Dynamic Android package analysis tool.
- Cheat Engine - Memory debugger and hex editor for running applications.
- Frhed - Binary file editor for Windows.
- HexEdit.js - Browser-based hex editing.
- Hexinator - World's finest (proprietary, commercial) Hex Editor.
- Hachoir - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
- Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
- Veles - Binary data visualization and analysis tool.
- Appliance for Digital Investigation and Analysis (ADIA) - VMware virtual appliance for digital forensics.
- Autopsy - Graphical interface to The Sleuth Kit.
- binwalk - Firmware analysis tool.
- bulk_extractor - Command line tool for extracting email addresses, credit card numbers, URLs, and other types of information from many types of files, including compressed files and images.
- CAINE - Italian live Linux distro for digital forensics.
- chkrootkit - Checks local Linux systems for rootkits.
- Chrome URL Dumper - Python based agent that gathers and dumps Chrome history (URLs).
- DEFT Linux - Linux distro for digital forensics analysis.
- Digital Forensics Framework (DFF) - Open source digital forensics framework with GUI.
- docker-explorer - Docker file system forensic tool.
- Dumpzilla - Python based application for dumping information from Firefox, Iceweasel, and Seamonkey browsers.
- extundelete - ext3 and ext4 file recovery tool.
- Fast Evidence Collector Toolkit (FECT) - Lightweight digital forensics tool.
- FireEye Labs Obfuscated String Solver (FLOSS) - Extract obfuscated strings from malware.
- Foremost - File recovery tool.
- GRR Rapid Response - Incident response framework focused on remote live forensics.
- Hindsight - Chrome/Chromium browser forensics tool.
- IREC - All in one evidence collector.
- Linux Expl0rer - Easy-to-use live forensics toolbox for Linux endpoints written in Python & Flask.
- magneto-malware-scanner - Malware scanning platform.
- nightHawk - Platform for digital forensics presentation, using Elasticsearch.
- PALADIN - Linux distro for digital forensics.
- pdf-parser - PDF digital forensics software.
- pdfid - PDF digital forensics software.
- pdfminer - Tool for extracting information from the text of PDF documents.
- peepdf - Python PDF analysis tool.
- PowerForensics - PowerShell based digital forensics suite.
- PSRecon - Windows based data gathering tool using PowerShell.
- Regripper - Windows Registry data extraction tool.
- Rekall - Incident response and forensics tool.
- SANS Investigative Forensics Toolkit (SIFT) - Linux VM for digital forensics.
- SIFT Workstation - Linux distro (with optional VM) for digital forensics.
- The Sleuth Kit - Collection of command line digital forensic utilities for investigating disk images, volume and file system data, and more.
- Evolve - Web interface for Volatility advanced memory forensics framework.
- inVtero.net - Windows x64 memory analysis tool.
- Linux Memory Extractor (LiME) - A Loadable Kernel Module (LKM) allowing for volatile memory extraction of Linux-based systems.
- Memoryze - Memory forensics software.
- Microsoft User Mode Process Dumping - Dumps any running Win32 processes memory image on the fly.
- PMDump - Tool for dumping memory contents of a process without stopping the process.
- Rekall - Open source tool and library for the extraction of digital artifacts from volatile memory, RAM, samples.
- Responder PRO - Commercial memory analysis software.
- Volatility - Advanced memory forensics framework.
- VolatilityBot - Automation tool utilizing Volatility.
- VolDiff - Malware Memory Footprint Analysis based on Volatility.
- WindowsSCOPE - Commercial memory forensics software for Windows systems.
- Belkasoft Live RAM Capturer - A tiny free forensic tool to reliably extract the entire content of the computer’s volatile memory – even if protected by an active anti-debugging or anti-dumping system.
- Linux Memory Grabber - A script for dumping Linux memory and creating Volatility profiles.
- Magnet RAM Capture - Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a suspect’s computer. Supports recent versions of Windows.
- OSForensics - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual process’s memory space or physical memory dump can be done.
- APT Simulator - Windows Batch Script that makes a system appear compromised.
- Atomic Red Team - Set of premade tests to evaluate security posture.
- AutoTTP - Automated Tactics Techniques & Procedures, for re-issuing complex tasks.
- Belkasoft Evidence Center - Commercial incident response suite.
- Blue Team Training Toolkit - Toolkit for preparing blue teams for defensive security.
- Caldera - Automated adversary emulation system.
- CIRTKit - Open source incident response framework.
- Cyber Triage - Commercial incident response suite.
- Doorman - Osquery fleet manager.
- DumpsterFire Toolset - Security event simulator.
- Falcon Orchestrator - Windows based incident management framework.
- GRR Rapid Response - Python based incident mangement framework.
- Kolide Fleet - Open source osquery manager.
- LimaCharlie - Cross-platform open source endpoint detection and response solution.
- Metta - Open source adversary simulation.
- MIG - Mozilla InvestiGator - Endpoint inspection.
- MozDef - Mozilla defense platform.
- Network Flight Simulator - Utility for generating malicious network traffic.
- Osquery - Multiplatform framework for querying operating systems similar to SQL queries.
- Red Team Automation (RTA) - Adversary simulation framework.
- RedHunt OS - Purposely vulnerable Linux VM.
- Redline - Investigative tool able to scan processes, memory, file system metadata, and more.
- Zentral - Monitors system events using osquery.
- Belkasoft Evidence Center - The toolkit will quickly extract digital evidence from multiple sources by analyzing hard drives, drive images, memory dumps, iOS, Blackberry and Android backups, UFED, JTAG and chip-off dumps.
- CimSweep - CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows.
- CIRTkit - CIRTKit is not just a collection of tools, but also a framework to aid in the ongoing unification of Incident Response and Forensics investigation processes.
- Cyber Triage - Cyber Triage remotely collects and analyzes endpoint data to help determine if it is compromised. It’s agentless approach and focus on ease of use and automation allows companies to respond without major infrastructure changes and without a team of forensics experts. Its results are used to decide if the system should be erased or investigated further.
- Digital Forensics Framework - DFF is an Open Source computer forensics platform built on top of a dedicated Application Programming Interface. DFF proposes an alternative to the aging digital forensics solutions used today. Designed for simple use and automation, the DFF interface guides the user through the main steps of a digital investigation so it can be used by both professional and non-expert to quickly and easily conduct a digital investigations and perform incident response.
- Doorman - Doorman is an osquery fleet manager that allows remote management of osquery configurations retrieved by nodes. It takes advantage of osquery's TLS configuration, logger, and distributed read/write endpoints, to give administrators visibility across a fleet of devices with minimal overhead and intrusiveness.
- Envdb - Envdb turns your production, dev, cloud, etc environments into a database cluster you can search using osquery as the foundation. It wraps the osquery process with a cluster node agent that can communicate back to a central location.
- Falcon Orchestrator - Falcon Orchestrator by CrowdStrike is an extendable Windows-based application that provides workflow automation, case management and security response functionality.
- GRR Rapid Response - GRR Rapid Response is an incident response framework focused on remote live forensics. It consists of a python agent client that is installed on target systems, and a python server infrastructure that can manage and talk to the agent.
- Kolide Fleet - Kolide Fleet is a state of the art host monitoring platform tailored for security experts. Leveraging Facebook's battle-tested osquery project, Kolide delivers fast answers to big questions.
- Limacharlie - an endpoint security platform. It is itself a collection of small projects all working together, and gives you a cross-platform, Windows, OSX, Linux, Android and iOS, low-level environment allowing you to manage and push additional modules into memory to extend its functionality.
- MIG - Mozilla Investigator, MIG, is a platform to perform investigative surgery on remote endpoints. It enables investigators to obtain information from large numbers of systems in parallel, thus accelerating investigation of incidents and day-to-day operations security.
- MozDef - The Mozilla Defense Platform, MozDef, seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.
- nightHawk - the nightHawk Response Platform is an application built for asynchronus forensic data presentation using ElasticSearch as the backend. It's designed to ingest Redline collections.
- Open Computer Forensics Architecture - Open Computer Forensics Architecture, OCFA, is another popular distributed open-source computer forensics framework. This framework was built on Linux platform and uses postgreSQL database for storing data.
- Osquery - with osquery you can easily ask questions about your Linux and OSX infrastructure. Whether your goal is intrusion detection, infrastructure reliability, or compliance, osquery gives you the ability to empower and inform a broad set of organizations within your company. Queries in the -incident-response pack - help you detect and respond to breaches.
- Redline - provides host investigative capabilities to users to find signs of malicious activity through memory and file analysis, and the development of a threat assessment profile.
- The Sleuth Kit & Autopsy - The Sleuth Kit is a Unix and Windows based tool which helps in forensic analysis of computers. It comes with various tools which helps in digital forensics. These tools help in analyzing disk images, performing in-depth analysis of file systems, and various other things.
- TheHive - TheHive is a scalable 3-in-1 open source and free solution designed to make life easier for SOCs, CSIRTs, CERTs and any information security practitioner dealing with security incidents that need to be investigated and acted upon swiftly.
- X-Ways Forensics - X-Ways is a forensics tool for Disk cloning and imaging. It can be used to find deleted files and disk analysis.
- Zentral - combines osquery's powerful endpoint inventory features with a flexible notification and action framework. This enables one to identify and react to changes on OS X and Linux clients.
- AccessData FTK Imager - AccessData FTK Imager is a forensics tool whose main purpose is to preview recoverable data from a disk of any kind. FTK Imager can also acquire live memory and paging file on 32bit and 64bit systems.
- Bitscout - Bitscout by Vitaly Kamluk helps you build your fully-trusted customizable LiveCD/LiveUSB image to be used for remote digital forensics, or perhaps any other task of your choice. It is meant to be transparent and monitorable by the owner of the system, forensically sound, customizable and compact.
- GetData Forensic Imager - GetData Forensic Imager is a Windows based program that will acquire, convert, or verify a forensic image in one of the following common forensic file formats.
- Guymager - Guymager is a free forensic imager for media acquisition on Linux.
- Magnet ACQUIRE - ACQUIRE by Magnet Forensics allows various types of disk acquisitions to be performed on Windows, Linux, and OS X as well as mobile operating systems.
- Bulk_extractor - bulk_extractor is a computer forensics tool that scans a disk image, a file, or a directory of files and extracts useful information without parsing the file system or file system structures. Because of ignoring the file system structure, the program distinguishes itself in terms of speed and thoroughness.
- Cold Disk Quick Response - uses a streamlined list of parsers to quickly analyze a forenisic image file, dd, E01, .vmdk, etc, and output nine reports.
- Ir-rescue - -ir-rescue - is a Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
- Live Response Collection - The Live Response collection by BriMor Labs is an automated tool that collects volatile data from Windows, OSX, and -nix based operating systems.
- Cortex XSOAR - Security orchestration tool. Formerly Demisto community edition. Offers full Incident lifecycle management, Incident Closure Reports, team assignments and collaboration, and many integrations to enhance automations, like Active Directory, PagerDuty, Jira and much more.
- CyberCPR - A community and commercial incident management tool with Need-to-Know built in to support GDPR compliance while handling sensitive incidents.
- Cyphon - Cyphon eliminates the headaches of incident management by streamlining a multitude of related tasks through a single platform. It receives, processes and triages events to provide an all-encompassing solution for your analytic workflow — aggregating data, bundling and prioritizing alerts, and empowering analysts to investigate and document incidents.
- FIR - Fast Incident Response, FIR, is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy creation, tracking, and reporting of cybersecurity incidents and is useful for CSIRTs, CERTs and SOCs alike.
- RTIR - Request Tracker for Incident Response, RTIR, is the premier open source incident handling system targeted for computer security teams. We worked with over a dozen CERT and CSIRT teams around the world to help you handle the ever-increasing volume of incident reports. RTIR builds on all the features of Request Tracker.
- SCOT - Sandia Cyber Omni Tracker, SCOT, is an Incident Response collaboration and knowledge capture tool focused on flexibility and ease of use. Our goal is to add value to the incident response process without burdening the user.
- Threat_note - A lightweight investigation notebook that allows security researchers the ability to register and retrieve indicators related to their research.
- IR Workflow Gallery - Different generic incident response workflows, e.g. for malware outbreak, data theft, unauthorized access,... Every workflow constists of seven steps: prepare, detect, analyze, contain, eradicate, recover, post-incident handling.
- IRM - Incident Response Methodologies by CERT Societe Generale.
- PagerDuty Incident Response Documentation - Documents that describe parts of the PagerDuty Incident Response process. It provides information not only on preparing for an incident, but also what to do during and after.
- ADIA - The Appliance for Digital Investigation and Analysis, ADIA, is a VMware-based appliance used for digital investigation and acquisition and is built entirely from public domain software. Among the tools contained in ADIA are Autopsy, the Sleuth Kit, the Digital Forensics Framework, log2timeline, Xplico, and Wireshark. Most of the system maintenance uses Webmin. It is designed for small-to-medium sized digital investigations and acquisitions. The appliance runs under Linux, Windows, and Mac OS. Both i386 32-bit and x86_64 versions are available.
- CAINE - The Computer Aided Investigative Environment, CAINE, contains numerous tools that help investigators during their analysis, including forensic evidence collection.
- CCF-VM - CyLR CDQR Forensics Virtual Machine, CCF-VM: An all-in-one solution to parsing collected data, making it easily searchable with built-in common searches, enable searching of single and multiple hosts simultaneously.
- DEFT - The Digital Evidence & Forensics Toolkit, DEFT, is a Linux distribution made for computer forensic evidence collection. It comes bundled with the Digital Advanced Response Toolkit, DART, for Windows. A light version of DEFT, called DEFT Zero, is also available, which is focused primarily on forensically sound evidence collection.
- NST - Network Security Toolkit - Linux distribution that includes a vast collection of best-of-breed open source network security applications useful to the network security professional.
- PALADIN - PALADIN is a modified Linux distribution to perform various forenics task in a forensically sound manner. It comes with many open source forensics tools included.
- Security Onion - Security Onion is a special Linux distro aimed at network security monitoring featuring advanced analysis tools.
- SIFT Workstation - The SANS Investigative Forensic Toolkit, SIFT, Workstation demonstrates that advanced incident response capabilities and deep dive digital forensic techniques to intrusions can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.
- FastIR Collector Linux - FastIR for Linux collects different artefacts on live Linux and records the results in csv files.
- Logdissect - A CLI utility and Python API for analyzing log files and other data.
- Lorg - a tool for advanced HTTPD logfile security analysis and forensics.
- Knockknock - Displays persistent items, scripts, commands, binaries, etc., that are set to execute automatically on OSX.
- Mac_apt - macOS Artifact Parsing Tool - Plugin based forensics framework for quick mac triage that works on live machines, disk images or individual artifact files.
- OSX Auditor - OSX Auditor is a free Mac OS X computer forensics tool.
- OSX Collector - An OSX Auditor offshoot for live response.
- Microsoft User Mode Process Dumping - User mode process dumping guide.
- PMDump - PMDump is a tool that lets you dump the memory contents of a process to a file without stopping the process.
- bap - Basic Authentication honeyPot - HTTP basic authentication web service honeypot.
- conpot - ICS/SCADA honeypot.
- Cowrie Docker - Docker version of Cowrie, SSH/Telnet honeypot.
- Cowrie - SSH/Telnet honeypot.
- dionaea - Multipurpose honeypot.
- elastichoney - Elasticsearch honeypot.
- glastopf - Python based web application honeypot.
- glutton - Multipurpose honeypot.
- Modern Honey Network (mhn) - Multipurpose honeypot with centralized management and many integrations.
- MongoDB-HoneyProxy - MongoDB honeypot.
- MysqlPot - MySQL honeypot.
- Nodepot - NodeJS web application honeypot.
- Nosqlpot - NoSQL honeypot.
- phpmyadmin_honeypot - PHPMyAdmin honeypot.
- Servletpot - Web application honeypot written in Java, making use of Apache HttpClient libraries, MySQL connector, Cassandra connector.
- Shadow Daemon - Collection of tools to detect, record, and prevent attacks on web applications.
- smart-honeypot - PHP based honeypot.
- SpamScope - Spam analysis tool.
- Thug - Python based honeyclient tool.
- Wordpot - WordPress honeypot.
- wp-smart-honeypot - WordPress plugin and honeypot designed to reduce comment spam.
- AIEngine - Very advanced NIDS.
- Elastic Stack - Also known as the ELK stack, the combination of Elasticsearch, Logstash, and Kibana, for monitoring and logging.
- OSSEC - Open source HIDS.
- Security Onion - Linux distro for monitoring.
- Snort - Open source NIPS/NIDS.
- SSHWATCH - SSH IPS.
- Suricata - Open source NIPS/NIDS.
- Highlighter - Free Tool available from Fire/Mandiant that will depict log/text file that can highlight areas on the graphic, that corresponded to a key word or phrase. Good for time lining an infection and what was done post compromise.
- Morgue - A PHP Web app by Etsy for managing postmortems.
- Plaso - a Python-based backend engine for the tool log2timeline.
- Timesketch - open source tool for collaborative forensic timeline analysis.
- AChoir - Achoir is a framework/scripting tool to standardize and simplify the process of scripting live acquisition utilities for Windows.
- Binaryforay - list of free tools for win forensics.
- Crowd Response - Crowd Response by CrowdStrike is a lightweight Windows console application designed to aid in the gathering of system information for incident response and security engagements. It features numerous modules and output formats.
- FastIR Collector - FastIR Collector is a tool that collects different artefacts on live Windows systems and records the results in csv files. With the analyses of these artefacts, an early compromise can be detected.
- FECT - Fast Evidence Collector Toolkit, FECT, is a light incident response toolkit to collect evidences on a suspicious Windows computer. Basically it is intended to be used by non-tech savvy people working with a journeyman Incident Handler.
- Fibratus - tool for exploration and tracing of the Windows kernel.
- IREC - All-in-one IR Evidence Collector which captures RAM Image, $MFT, EventLogs, WMI Scripts, Registry Hives, System Restore Points and much more. It is FREE, lightning fast and easy to use.
- IOC Finder - IOC Finder is a free tool from Mandiant for collecting host system data and reporting the presence of Indicators of Compromise. Support for Windows only.
- LOKI - Loki is a free IR scanner for scanning endpoint with yara rules and other indicators.
- Panorama - Fast incident overview on live Windows systems.
- PowerForensics - Live disk forensics platform, using PowerShell.
- PSRecon - PSRecon gathers data from a remote Windows host using PowerShell](v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.
- RegRipper - Regripper is an open source tool, written in Perl, for extracting/parsing information, keys, values, and data from the Registry and presenting it for analysis.
- TRIAGE-IR - Triage-IR is a IR collector for Windows.
- Dockerized Android - A Container-Based framework to enable the integration of mobile components in security training platforms
- [AzureHunter] - A Cloud Forensics Powershell Module To Run Threat Hunting Playbooks On Data From Azure And O365
- Management Program
- GRC Resource List
- Ultimate GRC
- ISO 27001 Implementation
- Windows Security Encyclopaedia
- Department of Defense Cyber Exchange: Provides STIGs w/ hardening guidelines for a variety of software and hardware solutions
- National Checklist Program (NCP): Provided by the NIST, checklists and benchmarks for OSs and applications
- SimplyCyber — GRC
- lansweeper — Scan hosts and compiles an asset information database (Asset inventory management)
- Domain Password Audit Tool (DPAT) — Generate password statistics from hashes from a DC and a password crack file
- Ping Castle — Assess the security level of the AD based on risk assessment and a maturity framework
- Domain Audit — Wrapper around PowerView, Impacket, PowerUpSQL and BloodHound to execute a lot of checks
Cloud
- Recon Cloud - Cloud asset scanner
- A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
- A Short Course on Computer Viruses
- AVIEN Malware Defense Guide for the Enterprise
- Advanced Penetration Testing: Hacking the World's Most Secure Networks
- Applied Cryptography: Protocols, Algorithms and Source Code in C
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- Black Hat Python: Python Programming for Hackers and Pentesters
- Bug Bounty Bootcamp By Vickie Li
- Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder
- Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
- CEH Certified Ethical Hacker All-in-One Exam Guide
- CISSP All-in-One Exam Guide
- CISSP: Certified Information Systems Security Professional Study Guide
- CISSP](ISC)2 Certified Information Systems Security Professional Official Study Guide
- Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
- Cryptography Engineering: Design Principles and Practical Applications
- Cyber War: The Next Threat to National Security and What to Do About It
- Cybersecurity - Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare
- Cybersecurity and Cyberwar: What Everyone Needs to Know
- Cybersecurity and Human Rights in the Age of Cyberveillance
- Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage
- Essentials of Cybersecurity
- Future Crimes: Inside the Digital Underground and the Battle for Our Connected World
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
- Hacked Again
- Hacking Exposed 7
- Hacking: The Art of Exploitation
- How Linux Works: What every superuser should know
- Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
- Linux Shell Scripting Cookbook
- Network Forensics: Tracking Hackers through Cyberspace
- Network Security Through Data Analysis: Building Situational Awareness
- Penetration Testing: A Hands-On Introduction to Hacking
- Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
- Practice of Network Security Monitoring
- Protecting Your Internet Identity: Are You Naked Online?
- Protection and Security on the Information Superhighway
- Reversing: Secrets of Reverse Engineering
- Rtfm: Red Team Field Manual
- Security Metrics, A Beginner's Guide
- Spam Nation: The Inside Story of Organized Cybercrime-from Global Epidemic to Your Front Door
- Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
- TCP/IP Illustrated
- The Art of Computer Virus Research and Defense
- The Art of Deception: Controlling the Human Element of Security
- The Art of Memory Forensics
- The Beginner's Guide to Information Security
- The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
- The Cyber Skill Gap
- The Hacker Playbook: Practical Guide To Penetration Testing
- The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
- The Ncsa Guide to PC and Lan Security
- The Shellcoder's Handbook: Discovering and Exploiting Security Holes
- The Tao of Network Security Monitoring: Beyond Intrusion Detection
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
- Thinking Security: Stopping Next Year's Hackers
- Understanding Cryptography: A Textbook for Students and Practitioners
- We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
- Web Application Vulnerabilities: Detect, Exploit, Prevent
- Windows Internals
- Worm: The First Digital World War
- A Search Engine Backed by Internet-Wide Scanning - Ariana Mirian
- Advanced Penetration Testing by Wil Allsopp, 2017
- Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012
- Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014
- Android Hackers Handbook by Joshua J. Drake et al., 2014
- Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014
- Btfm: Blue Team Field Manual by Alan White and Ben Clark
- Bug Hunter's Diary by Tobias Klein, 2011
- CIA Lock Picking Field Operative Training Manual
- Car Hacker's Handbook by Craig Smith, 2016
- CompTIA Security+ SY0-501 Certification Study Guide
- Complete Guide to Shodan
- Dfir intro
- Eddie the Wire books
- Essentials of Enterprise Network Security
- Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007
- Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011
- Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015
- Hacking the Xbox by Andrew Huang, 2003
- Holistic Info-Sec for Web Developers](https://leanpub.com/b/holisticinfosecforwebdevelopers)
- Kali Linux Revealed
- Keys to the Kingdom by Deviant Ollam, 2012
- Lock Picking: Detail Overkill by Solomon
- Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010
- Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011
- Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012
- Network Security Assessment by Chris McNab
- Nmap Network Scanning by Gordon Fyodor Lyon, 2009
- No Tech Hacking by Johnny Long & Jack Wiles, 2008
- Open Source Intelligence Techniques - 8th Edition by Michael Bazell, 2021
- Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014
- Penetration Testing: Procedures & Methodologies by EC-Council, 2010
- Practical Lock Picking by Deviant Ollam, 2012
- Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012
- Practical Packet Analysis by Chris Sanders, 2017
- Practical Reverse Engineering by Bruce Dang et al., 2014
- Professional Penetration Testing by Thomas Wilhelm, 2013
- Reverse Engineering for Beginners by Dennis Yurichev
- Rtfm: Red Team Field Manual by Ben Clark, 2014
- Secure Programming HOWTO
- Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014
- Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010
- The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002
- The Art of Exploitation by Jon Erickson, 2008
- The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005
- The Art of Memory Forensics by Michael Hale Ligh et al., 2014
- The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013
- The Browser Hackers Handbook by Wade Alcorn et al., 2014
- The Database Hacker's Handbook, David Litchfield et al., 2005
- The Hacker Playbook by Peter Kim, 2014
- The IDA Pro Book by Chris Eagle, 2011
- The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009
- The Mobile Application Hackers Handbook by Dominic Chell et al., 2015
- The Practice of Network Security Monitoring: Understanding Incident Detection and Response 9
- The Shellcoders Handbook by Chris Anley et al., 2007
- The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011
- Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010
- Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014
- Violent Python by TJ O'Connor, 2012
- Windows Internals by Mark Russinovich et al., 2012
- Wireshark Network Analysis by Laura Chappell & Gerald Combs, 2012
- iOS Hackers Handbook by Charlie Miller et al., 2012
- Red Team Field Manual
- Advanced Penetration Testing: Hacking the World’s Most Secure Networks
- Hands On Hacking
- Penetration Testing Essentials
- Penetration Testing: A Hands-On Introduction to Hacking
- The Basics of Hacking & Penetration Testing: Ethical Hacking & Penetration Made Easy
- The Pentester BluePrint: Starting a Career as an Ethical Hacker
- Social Engineering: The Science of Human Hacking
- A Bug Hunter's Diary (Klein)
- Exploiting Software: How to Break Code (Hoglund and McGraw)
- Hands-on Web Penetration Testing with Metasploit (Singh and Sharma)
- Hunting Security Bugs (Gallagher, Landauer, and Jeffries)
- Professional Pen Testing for Web Applications: Programmer to Programmer (Andreu)
- Read-World Bug Hunting: A Field Guide to Web Hacking (Yaworski)
- SQL Injection Attacks and Defense (Clarke et al)
- Seven Deadliest Web Application Attacks (Shema)
- The Art of Software Security Assessment (Dowd, McDonald, and Schuh)
- The Tangled Web: A Guide to Securing Modern Web Applications (Zalewski)
- Web Penetration Testing with Kali Linux (Najera-Gutierrez and Ansari)
- Aggressive Network Self-Defense (Wyler, Potter, and Hurley)
- Hacking Exposed: Network Security Secrets & Solutions (McClure et al)
- Silence on the Wire: A Field Guide to Passive Recon and Indirect Attacks (Zalewski)
- The Hacker's Handbook: Breaking Into & Defending Networks (Young and Aitel)
- Android Hacker's Handbook (Drake et al)
- Google Hacking for Penetration Testers (Long, Gardner, and Brown)
- Hacking Exposed Cisco Networks: Cisco Security (Vladimirov et al)
- iOS Hacker's Handbook (Miller et al)
- Practical IoT Hacking (Chantzis et al)
- Securing the Smart Grid: Next Generation Power Grid Security (Flick and Morehouse)
- Shellcoder's Handbook: Discovering and Exploiting Security Holes (Anley)
- Social Engineering: The Art of Human Hacking (Hadnagy et al)
- The Car Hacker's Handbook: A Guide for the Penetration Tester (Smith)
- The Database Hacker's Handbook: Defending Database Servers (Litchfield et al)
- The Hardware Hacker: Adventures in Making & Breaking Hardware (Huang)
- The Mac Hacker's Handbook (Miller and Zovi)
- The Mobile Application Hacker's Handbook (Chell)
- Unauthorized Access: Physical Penetration Testing for IT Security Teams (Allsopp)
- WarDriving and Wireless Penetration Testing (Hurley et al)
- A Guide to Kernel Exploitation: Attacking the Core (Perla and Oldani)
- Advanced Penetration Testing for Highly-Secured Environments (Allen and Cardwell)
- Advanced Penetration Testing: Hacking the World's Most Secure Networks (Allsopp)
- Advanced Persistent Threat Hacking: The Art & Science of Hacking (Wrightson)
- Applied Machine Learning/Neural Networks: Offensive Security (Atkins)
- Hacking: The Art of Exploitation , 1st or 2nd edition (Jon Erickson)
- Managed Code Rootkits: Hooking into Runtime Environments (Metula)
- Ninja Hacking: Unconventional Penetration Testing (Wilhelm and Andress)
- Rootkits and Bootkits (Matrosov, Rodionov, and Bratus)
- Countdown to Zero
- Cyber Intelligence
- Cybersecurity & Cyberwar
- Dark Territory
- Routledge Handbook of Surveillance Studies
- Sandworm
- Surveillance Studies
- The Cambridge Handbook of Surveillance Law
- The Dark Net
- The Internet of Us
- Theorizing Surveillance
- We Are Bellingcat
- Open Source Intelligence Techniques: Resources for Searching & Analyzing Online Information
- Learning Nessus for Penetration Testing (Kumar)
- Metasploit Penetration Testing Cookbook (Teixeira, Singh, and Agarwal)
- Metasploit: The Penetration Tester's Guide (Kennedy)
- Nmap 6 Cookbook: The Fat-Free Guide to Network Security Scanning (Marsh)
- Nmap Network Scanning: The Official Nmap Project Guide (Fyodor)
- Penetration Tester's Open Source Toolkit (Faircloth)
- Digital Forensics With Kali Linux
- Hacking Exposed Linux (ISECOM)
- Kali Linux Revealed: Mastering the Penetration Testing Distro (Hertzog and O'Gorman)
- Linux Basics for Hackers: Getting Started with Networking, Scripting, & Security in Kali
- Linux Command Line and Shell Scripting Bible (Blum and Bresnahan)
- Linux Shell Scripting Cookbook (Flynt, Lakshman, and Tushar)
- The Linux Command Line: A Complete Introduction (Shotts)
- Wicked Cool Shell Scripts (Taylor and Perry)
- American Kingpin
- Black Software
- The Hacked World Order
- The Shadow Factory
- You Have A Very Soft Voice, Susan: A Shocking True Story of Internet Stalking
- Black Hat Python
- Cryptography With Python
- Grey Hat Python
- Violent Python
- Burners & Black Markets
- Dark Web Investiagtions (Security Informatics & Law Enforcement)
- Inside The Dark Web
- Tor & The Dark Web
- The cuckoos egg
- CyberStorm: World War C
- Countdown to Zero Day: Stuxnet (Zetter)
- Dark Territory: The Secret History of Cyber War (Kaplan)
- Dissecting the Hack: The F0rb1dd3n Network (Street, Nabors, and Baskin)
- Fatal System Error: Hunt for the New Crime Lords Bringing Down the Internet (Menn)
- Ghost in the Wires: My Adventures as the World's Most Wanted Hacker (Mitnick)
- Hackers & Painters: Big Ideas from the Computer Age (Graham)
- How to Hack Like a Pornstar: Breaking into a Bank (Sparc Flow)
- I, Robot (Asimov)
- Inside Cyber Warfare: Mapping the Cyber Underworld (Carr)
- Kingpin (Poulsen)
- Neuromancer (Gibson)
- Nineteen Eighty-Four (1984) (Orwell)
- No Place to Hide: Snowden, the NSA, and the U.S. Surveillance State (Greenwald)
- The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (Stoll)
- The Girl with the Dragon Tattoo (Larsson)
- The Hitchhiker's Guide to the Galaxy (Adams)
- The Lure (Schroeder)
- Zero Day: The Threat in Cyberspace (The Washington Post and O'Harrow)
- A bug hunter’s diary
- Real-World Bug Hunting
- Practical IoT Hacking
- Quantum Computing Fundamentals
- Quantum Physics and The Power of the Mind: 5 BOOKS IN 1
- Cryptography Engineering: Design Principles and Practical Applications
- Real-World cryptography
- The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
- Cyberlaw: Software and Computer Networks
- Damage Control: Cyber Insurance and Compliance
- The 2020 Cyber Security & Cyber Law Guide
- Cyber Breach Response That Actually Works
- Cyber Mercenaries: The State, Hackers, and Power
- CyberSpace
- CyberStorm
- Extreme Privacy: What It Takes to Disappear
- Find Me (series)
- Little brother
- Security Testing with Raspberry Pi
- Stealing the network
- The 8 Layers of the OSI Cake: A Forensic Taste of Each Layer (Cyber Secrets)
- The Smartest Person in the Room
- The Tribe of Hacker (Series)
- The hackers playbook (series)
- We Are Anonymous
- Antivirus Bypass Techniques
- Learning Malware Analysis
- Practical Malware Analysis
- The Art of Memory Forensics: Detecting Malware & Threats in Windows, Linux & Mac Memory
- I Will Teach You To Be Rich
- Rich Dad Poor Dad
- The Psychology of Money
- The Richest Man in Babylon
- The Simple Path to Wealth
- Your Money or Your Life
- Dark Pyschology & Manipulation: 10 In 1
- Designing The Mind: The Principles of Psychitecture
- 48 Laws of Power
- Adversarial Tradecraft in Cybersecurity
- Black Hat Go
- Extreme Ownership by Jocko Willink / Leif Babin
- Hacker Disassembling Uncovered
- How to Measure Anything in Cybersecurity
- Security Warrior
- Shellcoders Handbook
- Traction by Gino Wickman
- 100Devs
- DFIR Diva — Compilation of Training Resources
- Global Knowledge
- Level Up In Tech
- NetworkChuck
- Perscholas — Misc IT Bootcamps
- Whizlabs
- Closed / Propietary: Threat research and CTI data is made available as a paid subscription to a commerical CTI platform
- Public / Private Information Sharing Centers: Information Sharing & Analysis Center (ISACs)
- OSINT
- Malware Information Sharing Project (MISP)
- Spamhaus
- VirusTotal
- Threat Hunting Training
- DVCA — Demonstrate priv esc on AWS
- FLAWS 2 Cloud — AWS Security Training
- FlAWS Cloud — AWS Security Training
- OWASP Serverless Goat — Demonstrates common serverless security flaws
- AWS Vulnerable
- Certified Ethical Hacker
- Certified Information Systems Security Professional (CISSP)
- Certified Penetration Testing Engineer (CPTE)
- CompTIA Security+
- GIAC Security Essentials (GSEC)
- HTB Certified Bug Bounty Hunter (HTB BBH)
- HTB Certified Penetration Testing Specialist (HTB CPTS)
- Kali Linux Certified Professional (KLCP)
- Offensive Security Certified Expert (OSCE)
- Offensive Security Certified Professional (OSCP)
- Offensive Security Exploitation Expert (OSEE)
- Offensive Security Web Expert (OSWE)
- Offensive Security Wireless Professional (OSWP)
- Practical Network Penetration Tester (PNPT)
- eLearnSecurity Junior Penetration Tester (eJPT)
- Attack-Defense
- Crackmes
- Ring Zero Team
- Black Hills Information Security — Cyber Range
- Alert To Win
- CTF Komodo Security
- CMD Challenge
- Explotation Education
- Google CTF
- HackTheBox
- Hackthis
- Hacksplaining
- Hacker101
- Hacker Security
- Hacking-Lab
- ImmersiveLabs
- OverTheWire
- Practical Pentest Labs
- Pentestlab
- Penetration Testing Practice Labs
- PentestIT LAB
- PicoCTF
- PWNABLE
- Root Me
- Root In Jail
- SmashTheStack
- The Cryptopals Crypto Challenges
- Try Hack Me
- Vulnhub
- W3Challs
- WeChall
- Alerted Security
- Best Cyber Security and Hacking Documentary #1
- We Are Legion – The Story Of The Hacktivists (https://lnkd.in/dEihGfAg)
- The Internet’s Own Boy: The Story Of Aaron Swartz (https://lnkd.in/d3hQVxqp)
- Hackers Wanted
- Secret History Of Hacking
- Def Con: The Full Documentary
- Web Warriors (Documentary Over Cyber Warfare)
- Risk (2016)
- Zero Days (2016)
- Guardians Of The New World (Hacking Documentary) | Real Stories
- A Origem dos Hackers
- The Great Hack
- The Networks Dilemma
- 21st Century Hackers
- Cyber War - Dot of Documentary
- CyberWar Threat - Inside Worlds Deadliest Cyberattack
- The Future of Cyberwarfare: The Journey of Humankind
- Dark Web Fighting Cybercrime Full Hacking
- Cyber Defense: Military Training for Cyber Warfare
- Hacker Hunter: WannaCry The History Marcus Hutchin
- The Life Hacker Documentary
- Hacker The Realm and Electron - Hacker Group
- How I Socially Engineer Myself Into High Security Facilities - Sophie Daniel
- Social Engineering: Compromising Users with an Office Document - Infosec Institute
- The 7 Best Social Engineering Attacks Ever - DarkReading
- The Limits of Social Engineering - MIT, Technology Review
- The Persuasion Reading List - Scott Adams' Blog
- Cybersecurity Documents, Certification Help, Books, etc.
- S0cm0nkey’s Security Reference Guide
- Red Teaming Experiments — Cheatsheets
- Darkstar — Infosec Training Resources
- PowerShell Intune Samples — Make HTTPS RESTful API requests
- Mega Collection of PowerShell Scripts
- Awesome Docker Security — Resources for Docker Security (Books, Blogs, Videos, Tools, etc.)
- Build Your Own X — Repository Compilation Projects for Hackers
- Computer Science Video Courses
- Cyber Security Repo
- Hacker Arise
- Machine Learning
- Malware Development Repo
- Microsoft Graph — Access data, relationships and insights coming from the cloud
- Privacy Tools
- S1ckB0y1337
- VX-Underground — Collection of malware source code, amples, and PoCs
- W3BS3C — Web3 searchable curable repository of tools, CTFs, 101s, videos, and bounties
- DarkReading
- EFF
- Feedspot — Top 100 Cybersecurity RSS Feeds
- GBHackers on Security
- Isaca
- KrebsOnSecurity
- Naked Security
- PenTest Magazine
- Scheiner
- TDLR Magazine
- Talos Intelligence
- ThreatPost
- Tripwire
- ZDNet
- Microsoft
- (ISC)2 Secure Event Series
- 44CON London
- 44Con
- AFCEA Defensive Cyber Operations Symposium
- AppSec United States](OWASP National Conference)
- AppSecUSA
- Atlantic Security Conference](AtlSecCon)
- BSides
- BSides Event Series
- BalCCon
- Black Hat
- Black Hat United States
- BruCON
- CCC
- CISO Executive Summit Series](Invite-only)
- CSO50 Conference
- CanSecWest
- CarolinaCon
- Cyber Threat Intelligence Summit
- DEF CON
- DeepSec
- DefCamp
- DerbyCon
- DerbyCon 8.0
- Ekoparty
- FIRST Conference
- FSec
- HACKMIAMI
- HITB
- HOPE
- Hack.lu
- Hack3rCon
- Hacker Halted - Optionally includes certification-specific training
- IANS Information Security Forums
- IAPP Global Privacy Summit
- IEEE Symposium on Security & Privacy
- ISACA Cyber Security Nexus
- ISF Annual World Congress
- ISSA CISO Executive Forum Series
- ISSA International Conference
- Ignite
- Infiltrate
- InfoSec Southwest
- InfoSec World
- Infosecurity Europe
- Infosecurity Europe
- Infosecurity North America
- LayerOne
- Nullcon
- Nullcon Conference
- Open Security Summit
- PhreakNIC
- RSA Conference United States
- SANS Annual Conference
- SANS Pen Test Annual Conferences
- SANS Security Annual Conferences
- SECUINSIDE
- SOURCE Annual Conferences
- SecTor Canada
- Secure360 Conference
- SecureWorld
- Securi-Tay
- Security Operations Summit & Training
- ShmooCon
- SkyDogCon
- SummerCon
- Swiss Cyber Storm
- ThotCon
- USENIX Security Symposium
- Virus Bulletin Conference
- conINT
- secureCISO