Skip to content

Brutnow-Security-Lab/brutnow-Penetration-testing-toolkit

Repository files navigation

Brutnow Security Lab Brutnow Security Lab - Penetration Testing Toolkit

Welcome to the Brutnow Security Lab's Penetration Testing Toolkit repository! This toolkit provides a curated list of essential open-source tools for penetration testers, cybersecurity researchers, and security professionals. Each tool is actively maintained and widely used in the cybersecurity community.


🚀 Features

  • Comprehensive Toolset: A collection of powerful tools for network scanning, web app testing, password cracking, exploitation, wireless network analysis, and social engineering.
  • Open Source: All tools in the toolkit are free and open-source.
  • Easy Installation: Automated installation script to get up and running quickly.

🎯 Table of Contents


🔍 Network Scanning Tools

Network scanning is an essential part of penetration testing. These tools help you identify vulnerabilities, open ports, and map out networks.

  1. Nmap
    A versatile network scanner for network discovery and security auditing.
    Nmap Screenshot

  2. Wireshark
    A protocol analyzer for capturing and analyzing network traffic.
    Wireshark Screenshot

  3. Masscan
    An internet-scale port scanner that can scan the entire internet in under 6 minutes.

  4. Zmap
    A high-speed network scanner designed for large-scale surveys.

  5. Angry IP Scanner
    A fast, cross-platform network scanner with a simple interface.


🌐 Web Application Testing Tools

Test and secure web applications by identifying vulnerabilities such as SQL injection, XSS, and more.

  1. OWASP ZAP (Zed Attack Proxy)
    An open-source security scanner designed for finding vulnerabilities in web applications.

  2. Burp Suite Community Edition
    A popular tool for testing web application security with various features for penetration testing.

  3. Nikto
    A web server scanner that performs tests for various vulnerabilities.

  4. W3af
    A powerful open-source web application security scanner.

  5. SQLMap
    A tool for automating the detection and exploitation of SQL injection flaws.


💥 Exploitation Frameworks

These frameworks assist penetration testers in exploiting vulnerabilities to gain access to target systems.

  1. Metasploit Framework
    A powerful framework for developing and executing exploits.

  2. BeEF (Browser Exploitation Framework)
    A tool for exploiting web browsers, testing client-side vulnerabilities.

  3. RouterSploit
    A framework for exploiting vulnerabilities in routers and embedded devices.

  4. ExploitDB
    A resource for finding public exploits and corresponding vulnerable software.

  5. Commix (Command Injection Exploiter)
    An automated tool for detecting and exploiting command injection vulnerabilities.


🔑 Password Cracking Tools

Assess the strength of passwords and crack weak ones with these tools.

  1. Hashcat
    A robust and fast password recovery tool supporting multiple hashing algorithms.

  2. John the Ripper
    A password cracker for detecting weak passwords, supporting many cipher and hash types.

  3. Hydra
    A login cracker that supports numerous protocols for brute-force login attempts.

  4. CeWL
    A custom wordlist generator that spiders a URL and creates lists for password cracking.

  5. Crunch
    A tool for generating custom wordlists based on defined parameters.


📡 Wireless Network Tools

Evaluate and secure wireless networks with these tools.

  1. Aircrack-ng
    A suite of tools for assessing Wi-Fi network security, including cracking and testing.

  2. Kismet
    A wireless network detector and intrusion detection system for Wi-Fi networks.

  3. Reaver
    A tool for performing brute-force attacks against Wi-Fi Protected Setup (WPS).

  4. Wifite
    An automated wireless attack tool for cracking Wi-Fi networks.

  5. Fern WiFi Cracker
    A Python-based tool for cracking Wi-Fi networks and auditing their security.


👥 Social Engineering Tools

Simulate social engineering attacks to test user awareness and system vulnerabilities.

  1. Social-Engineer Toolkit (SET)
    A framework for conducting social engineering attacks, such as phishing and spear-phishing.

  2. Gophish
    A phishing framework designed for creating and tracking phishing campaigns.

  3. King Phisher
    A tool for simulating real-world phishing attacks to assess user awareness.


🛠 Installation Guide

To install the toolkit, use the provided script that automates the setup process. Follow these steps:

Step 1: Save the Script

  1. Open a text editor and create a file named install_toolkit.sh.
  2. Copy the script from this repository and paste it into the editor.
  3. Save and close the editor.

Step 2: Make the script executable:

chmod +x install_toolkit.sh

Step 3: Run the Script

Run the script to install the tools automatically: ./install_toolkit.sh

Step 4: Apply Environment Changes

source ~/.bashrc

Step 5: Verify the Installation

Check the installed tools by running:

After installation, restart your terminal or apply changes: nmap --version sqlmap --version

⚠ Final Notes

Educational Use Only: Ensure you have proper authorization before performing any penetration testing or scanning activities.
The script is optimized for Linux environments (e.g., Ubuntu, Kali Linux). Adjustments may be needed for other distributions.

Enjoy using your Brutnow Penetration Testing Toolkit!

Step 2: Make the Script Executable

  1. Open a terminal and navigate to the directory where the script is saved:
    cd /path/to/script/directory
    

📱 Connect with Us

Twitter: @BrutnowLab
Discord: Brutnow Community
Email: supports@brutnow.com

About

This project focused for cybersecurity pentration tester and resarcher tools kit

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages