A comprehensive collection of ethical hacking tools, penetration testing utilities, and cybersecurity resources organized by category.
This repository is for EDUCATIONAL PURPOSES ONLY. These tools should only be used on systems you own or have explicit permission to test. Unauthorized use of these tools on systems you don't own is illegal and unethical. The author is not responsible for any misuse of the information provided.
Information gathering and reconnaissance tools for the initial phase of penetration testing.
- OSINT Tools: Open Source Intelligence gathering
- DNS Tools: Domain name system enumeration
- Subdomain Enumeration: Finding subdomains and related assets
- Network Discovery: Finding live hosts and services
- Port Scanning: Identifying open ports and services
Network and vulnerability scanning tools.
- Nmap: Network discovery and security auditing tool
- Masscan: High-speed port scanner
- Zmap: Internet-wide network scanner tool
- OpenVAS: Comprehensive vulnerability assessment
- Nessus: Professional vulnerability scanner
- Nuclei: Fast and customizable vulnerability scanner
- Nikto: Web server scanner
- Dirb/Gobuster: Directory and file enumeration
- Wapiti: Web application vulnerability scanner
Service enumeration and information extraction tools.
- SMB: Server Message Block enumeration
- SNMP: Simple Network Management Protocol
- LDAP: Lightweight Directory Access Protocol
- NFS: Network File System
- Database: Various database enumeration tools
Tools for exploiting vulnerabilities and gaining access.
- Metasploit: Comprehensive exploitation framework
- Cobalt Strike: Advanced threat emulation
- Empire: PowerShell post-exploitation agent
- Pattern Creation: Tools for creating unique patterns
- Shellcode Generators: Custom shellcode creation
- Exploit Development: Buffer overflow exploitation tools
Web application security testing tools.
- Gobuster: Fast directory/file enumeration
- Dirbuster: GUI-based directory bruteforcer
- FFuF: Fast web fuzzer
- SQLMap: Automatic SQL injection tool
- SQLNinja: SQL Server injection tool
- NoSQLMap: NoSQL injection tool
- XSStrike: Advanced XSS detection suite
- Xenotix: XSS exploitation framework
- BeEF: Browser Exploitation Framework
- Burp Suite: Web application security testing platform
- OWASP ZAP: Web application security scanner
- Mitmproxy: Interactive HTTPS proxy
Tools for maintaining access and moving laterally through networks.
- LinEnum: Linux enumeration script
- WinPEAS: Windows privilege escalation
- GTFOBins: Unix binaries for privilege escalation
- Backdoor creation: Various persistence mechanisms
- Scheduled tasks: Maintaining access through tasks
- Registry modifications: Windows registry persistence
- PsExec: Remote command execution
- WMI: Windows Management Instrumentation
- SSH tunneling: Secure tunneling techniques
Wireless network security assessment tools.
- Aircrack-ng: WiFi security auditing suite
- Reaver: WPS attack tool
- Wifite: Automated wireless attack tool
- BlueZ: Bluetooth protocol stack
- Btscanner: Bluetooth device discovery
- Spooftooph: Bluetooth device spoofing
- Proxmark3: RFID/NFC research platform
- LibNFC: Near Field Communication library
- MFCUK: Mifare Classic Universal toolkit
Password cracking and brute force tools.
- Hashcat: Advanced password recovery
- John the Ripper: Password security auditing
- RainbowCrack: Rainbow table password cracker
- Hydra: Network logon cracker
- Medusa: Speedy, parallel password cracker
- Patator: Multi-purpose brute-forcer
- SecLists: Security tester's companion
- RockYou: Popular password wordlist
- Custom wordlists: Domain-specific wordlists
Digital forensics and incident response tools.
- Autopsy: Digital forensics platform
- Sleuth Kit: File system analysis tools
- PhotoRec: File recovery software
- Volatility: Memory forensics framework
- Rekall: Advanced memory analysis
- LiME: Linux Memory Extractor
- Wireshark: Network protocol analyzer
- NetworkMiner: Network forensic analysis tool
- Tcpdump: Command-line packet analyzer
Binary analysis and reverse engineering tools.
- IDA Pro: Interactive disassembler
- Ghidra: Software reverse engineering suite
- Radare2: Unix-like reverse engineering framework
- GDB: GNU debugger
- x64dbg: Windows debugger
- OllyDbg: 32-bit assembler level debugger
- HxD: Freeware hex editor
- Bless: Full-featured hexadecimal editor
- Hexedit: Simple hex editor for Linux
Cryptographic tools and utilities.
- OpenSSL: Cryptography toolkit
- GPG: GNU Privacy Guard
- VeraCrypt: Disk encryption software
- Steghide: Steganography program
- StegSolve: Steganography solver
- Binwalk: Firmware analysis tool
- SSLyze: SSL configuration analyzer
- testssl.sh: SSL/TLS tester
- SSLScan: SSL cipher suite scanner
Social engineering attack tools and frameworks.
- SET: Social Engineer Toolkit
- Gophish: Open-source phishing toolkit
- King Phisher: Phishing campaign toolkit
- Hostapd: Access point daemon
- Dnsmasq: Lightweight DHCP/DNS server
- Captive portals: Fake login page generators
Mobile application and device security testing.
- APKTool: Reverse engineering Android APK files
- MobSF: Mobile security framework
- Drozer: Android security assessment framework
- Class-dump: Objective-C class dumper
- Clutch: iOS application decrypter
- iProxy: iOS SSH tunnel
Anti-detection and evasion tools.
- Veil: Payload generation framework
- Shellter: Dynamic shellcode injection tool
- Phantom-Evasion: AV evasion tool
- Nmap evasion: Stealth scanning techniques
- Packet fragmentation: Bypassing packet filters
- Protocol tunneling: Hiding traffic in legitimate protocols
Malware research and analysis tools.
- PEiD: PE identifier
- Strings: Extract text strings from binaries
- File: Determine file types
- Cuckoo Sandbox: Automated malware analysis
- REMnux: Malware analysis toolkit
- YARA: Pattern matching engine
Network manipulation and analysis utilities.
- Wireshark: Network protocol analyzer
- Tcpdump: Command-line packet analyzer
- Ettercap: Comprehensive network tool
- Arpspoof: ARP spoofing tool
- DNSSpoof: DNS spoofing tool
- Macchanger: MAC address changer
- Bettercap: Network attack and monitoring framework
- MITMf: Man-in-the-middle framework
- SSLstrip: SSL stripping proxy
Cloud platform security assessment tools.
- ScoutSuite: Cloud security auditing tool
- Prowler: AWS security best practices assessment
- CloudMapper: AWS visualization
- PowerZure: Azure exploitation framework
- MicroBurst: Azure security assessment
- Azure Security Center: Built-in security management
- Docker Bench: Docker security benchmark
- Clair: Container vulnerability scanner
- Anchore: Container image inspection
General-purpose utilities and helper tools.
- CyberChef: Data manipulation and analysis
- Base64 tools: Encoding/decoding utilities
- Hash generators: Various hashing algorithms
- Custom scripts: Bash, Python, PowerShell scripts
- Automation frameworks: Task automation tools
- CI/CD integration: Continuous security testing
Additional resources and reference materials.
- Common passwords: Frequently used passwords
- Usernames: Common username lists
- Directories: Web directory wordlists
- Web shells: PHP, ASP, JSP shells
- Reverse shells: Various reverse shell payloads
- XSS payloads: Cross-site scripting vectors
- Cheat sheets: Quick reference guides
- Methodologies: Penetration testing methodologies
- Best practices: Security testing guidelines
Contributions are welcome! Please read the contribution guidelines before submitting pull requests.
- Fork the repository
- Create a feature branch
- Add your tool/resource with proper documentation
- Submit a pull request
This project is licensed under the MIT License - see the LICENSE file for details.
For questions, suggestions, or collaborations, please open an issue on GitHub.
Remember: Always use tools responsibly and only on systems you own or have explicit permission to test. Happy hacking!