├── .gitignore ├── .gitmodules ├── .travis.yml ├── Forensics ├── Misc │ └── HxD.url └── Mobile │ └── AFT.url ├── Library └── Python │ └── Pynids.url ├── Live CD - Distributions ├── AndroidTamer.url ├── ArchStrike.url ├── BOSSLive.url ├── BackBox.url ├── BlackArch.url ├── DEFTLinux.url ├── FedoraSecurityLab.url ├── Kali.url ├── NST.url ├── Ophcrack.url ├── Parrot.url ├── Pentoo.url └── REMnux.url ├── Makefile ├── Malware ├── Dynamic Analysis │ └── Malzilla.url ├── Honeypot │ └── Honeyd.url └── Static Analysis │ ├── PEview.url │ └── Sysinternals.url ├── Network ├── Analysis │ └── Pytbull.url └── Sniffer │ ├── Dsniff.url │ ├── NetworkMiner.url │ └── Wireshark.url ├── Penetration Testing ├── DoS │ └── T50.url ├── Exploiting │ ├── Nessus.url │ ├── Netsparker.url │ └── OpenVAS.url ├── Fuzzing │ ├── Fusil.url │ ├── TAOF.url │ └── WindowsIPCFuzzingTools.url ├── MITM │ └── Mallory.url ├── Post Exploitation │ ├── Tgcd.url │ └── WCE.url ├── Web │ ├── BlindElephant.url │ ├── Burp.url │ ├── CMSExplorer.url │ ├── Nexpose.url │ ├── Paros.url │ ├── Ratproxy.url │ ├── SQLNinja.url │ ├── Skipfish.url │ └── Wapiti.url └── Wireless │ └── Reaver.url ├── Readme ├── Reverse Engineering ├── DotPeek.url ├── Hopper.url ├── IDAFree.url ├── IDAPro.url ├── ImmunityDebugger.url ├── JAD.url ├── OllyDbg.url ├── Procyon.url ├── WinDbg.url └── WinHex.url ├── Security └── Privacy │ ├── I2P.url │ └── Tor.url ├── Social Engineering └── Harvester │ └── Maltego.url ├── _pages ├── conf.py ├── contribute.rst └── index.rst └── requirements.txt /.gitignore: -------------------------------------------------------------------------------- 1 | # OS generated files # 2 | ###################### 3 | .DS_Store 4 | .DS_Store? 5 | ._* 6 | .Spotlight-V100 7 | .Trashes 8 | ehthumbs.db 9 | Thumbs.db 10 | -------------------------------------------------------------------------------- /.travis.yml: -------------------------------------------------------------------------------- 1 | language: python 2 | python: 3 | - "3.6" 4 | cache: pip 5 | git: 6 | submodules: false 7 | branches: 8 | only: 9 | - master 10 | install: 11 | - pip install -r requirements.txt 12 | script: 13 | - make html 14 | - make github 15 | before_script: 16 | - git config --global user.email ${EMAIL} 17 | - git config --global user.name ${NICK} 18 | after_script: 19 | - make purge 20 | deploy: 21 | provider: pages 22 | local-dir: _build/html 23 | skip-cleanup: true 24 | github-token: $GH_TOKEN # Set in travis-ci.org dashboard, marked secure 25 | keep-history: true 26 | on: 27 | branch: master 28 | -------------------------------------------------------------------------------- /Forensics/Misc/HxD.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://mh-nexus.de/en/hxd/ 3 | X-Download=http://mh-nexus.de/downloads/HxDSetupEN.zip 4 | -------------------------------------------------------------------------------- /Forensics/Mobile/AFT.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://code.google.com/archive/p/aft/ 3 | -------------------------------------------------------------------------------- /Library/Python/Pynids.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://jon.oberheide.org/pynids/ 3 | X-Download=https://jon.oberheide.org/files/pynids-0.6.1.tar.gz 4 | -------------------------------------------------------------------------------- /Live CD - Distributions/AndroidTamer.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://androidtamer.com/ 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/ArchStrike.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://archstrike.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/BOSSLive.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://bosslinux.in/ 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/BackBox.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://backbox.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/BlackArch.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.blackarch.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/DEFTLinux.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.deftlinux.net/ 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/FedoraSecurityLab.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://labs.fedoraproject.org/en/security/ 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/Kali.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.kali.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/NST.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://networksecuritytoolkit.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/Ophcrack.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://ophcrack.sourceforge.net 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/Parrot.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.parrotsec.org 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/Pentoo.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.pentoo.ch 3 | -------------------------------------------------------------------------------- /Live CD - Distributions/REMnux.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://remnux.org 3 | -------------------------------------------------------------------------------- /Makefile: -------------------------------------------------------------------------------- 1 | # Makefile for Sphinx documentation 2 | # 3 | 4 | # You can set these variables from the command line. 5 | SPHINXOPTS = 6 | SPHINXBUILD = sphinx-build 7 | PAPER = 8 | BUILDDIR = _build 9 | 10 | # User-friendly check for sphinx-build 11 | ifeq ($(shell which $(SPHINXBUILD) >/dev/null 2>&1; echo $$?), 1) 12 | $(error The '$(SPHINXBUILD)' command was not found. Make sure you have Sphinx installed, then set the SPHINXBUILD environment variable to point to the full path of the '$(SPHINXBUILD)' executable. Alternatively you can add the directory with the executable to your PATH. If you don't have Sphinx installed, grab it from http://sphinx-doc.org/) 13 | endif 14 | 15 | # Internal variables. 16 | PAPEROPT_a4 = -D latex_paper_size=a4 17 | PAPEROPT_letter = -D latex_paper_size=letter 18 | ALLSPHINXOPTS = -d $(BUILDDIR)/doctrees $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) . 19 | # the i18n builder cannot share the environment and doctrees with the others 20 | I18NSPHINXOPTS = $(PAPEROPT_$(PAPER)) $(SPHINXOPTS) . 21 | 22 | .PHONY: help clean html dirhtml singlehtml pickle json htmlhelp qthelp devhelp epub latex latexpdf text man changes linkcheck doctest gettext 23 | 24 | help: 25 | @echo "Please use \`make ' where is one of" 26 | @echo " html to make standalone HTML files" 27 | @echo " dirhtml to make HTML files named index.html in directories" 28 | @echo " singlehtml to make a single large HTML file" 29 | @echo " pickle to make pickle files" 30 | @echo " json to make JSON files" 31 | @echo " htmlhelp to make HTML files and a HTML help project" 32 | @echo " qthelp to make HTML files and a qthelp project" 33 | @echo " devhelp to make HTML files and a Devhelp project" 34 | @echo " epub to make an epub" 35 | @echo " latex to make LaTeX files, you can set PAPER=a4 or PAPER=letter" 36 | @echo " latexpdf to make LaTeX files and run them through pdflatex" 37 | @echo " latexpdfja to make LaTeX files and run them through platex/dvipdfmx" 38 | @echo " text to make text files" 39 | @echo " man to make manual pages" 40 | @echo " texinfo to make Texinfo files" 41 | @echo " info to make Texinfo files and run them through makeinfo" 42 | @echo " gettext to make PO message catalogs" 43 | @echo " changes to make an overview of all changed/added/deprecated items" 44 | @echo " xml to make Docutils-native XML files" 45 | @echo " pseudoxml to make pseudoxml-XML files for display purposes" 46 | @echo " linkcheck to check all external links for integrity" 47 | @echo " doctest to run all doctests embedded in the documentation (if enabled)" 48 | 49 | clean: 50 | rm -rf $(BUILDDIR)/* 51 | 52 | html: 53 | $(SPHINXBUILD) -n -b html -d _build/doctrees _pages $(BUILDDIR)/html 54 | @echo 55 | @echo "Build finished. The HTML pages are in $(BUILDDIR)/html." 56 | 57 | dirhtml: 58 | $(SPHINXBUILD) -b dirhtml $(ALLSPHINXOPTS) $(BUILDDIR)/dirhtml 59 | @echo 60 | @echo "Build finished. The HTML pages are in $(BUILDDIR)/dirhtml." 61 | 62 | singlehtml: 63 | $(SPHINXBUILD) -b singlehtml $(ALLSPHINXOPTS) $(BUILDDIR)/singlehtml 64 | @echo 65 | @echo "Build finished. The HTML page is in $(BUILDDIR)/singlehtml." 66 | 67 | pickle: 68 | $(SPHINXBUILD) -b pickle $(ALLSPHINXOPTS) $(BUILDDIR)/pickle 69 | @echo 70 | @echo "Build finished; now you can process the pickle files." 71 | 72 | json: 73 | $(SPHINXBUILD) -b json $(ALLSPHINXOPTS) $(BUILDDIR)/json 74 | @echo 75 | @echo "Build finished; now you can process the JSON files." 76 | 77 | htmlhelp: 78 | $(SPHINXBUILD) -b htmlhelp $(ALLSPHINXOPTS) $(BUILDDIR)/htmlhelp 79 | @echo 80 | @echo "Build finished; now you can run HTML Help Workshop with the" \ 81 | ".hhp project file in $(BUILDDIR)/htmlhelp." 82 | 83 | qthelp: 84 | $(SPHINXBUILD) -b qthelp $(ALLSPHINXOPTS) $(BUILDDIR)/qthelp 85 | @echo 86 | @echo "Build finished; now you can run "qcollectiongenerator" with the" \ 87 | ".qhcp project file in $(BUILDDIR)/qthelp, like this:" 88 | @echo "# qcollectiongenerator $(BUILDDIR)/qthelp/Ghiro.qhcp" 89 | @echo "To view the help file:" 90 | @echo "# assistant -collectionFile $(BUILDDIR)/qthelp/Ghiro.qhc" 91 | 92 | devhelp: 93 | $(SPHINXBUILD) -b devhelp $(ALLSPHINXOPTS) $(BUILDDIR)/devhelp 94 | @echo 95 | @echo "Build finished." 96 | @echo "To view the help file:" 97 | @echo "# mkdir -p $$HOME/.local/share/devhelp/Ghiro" 98 | @echo "# ln -s $(BUILDDIR)/devhelp $$HOME/.local/share/devhelp/Ghiro" 99 | @echo "# devhelp" 100 | 101 | epub: 102 | $(SPHINXBUILD) -b epub $(ALLSPHINXOPTS) $(BUILDDIR)/epub 103 | @echo 104 | @echo "Build finished. The epub file is in $(BUILDDIR)/epub." 105 | 106 | latex: 107 | $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex 108 | @echo 109 | @echo "Build finished; the LaTeX files are in $(BUILDDIR)/latex." 110 | @echo "Run \`make' in that directory to run these through (pdf)latex" \ 111 | "(use \`make latexpdf' here to do that automatically)." 112 | 113 | latexpdf: 114 | $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex 115 | @echo "Running LaTeX files through pdflatex..." 116 | $(MAKE) -C $(BUILDDIR)/latex all-pdf 117 | @echo "pdflatex finished; the PDF files are in $(BUILDDIR)/latex." 118 | 119 | latexpdfja: 120 | $(SPHINXBUILD) -b latex $(ALLSPHINXOPTS) $(BUILDDIR)/latex 121 | @echo "Running LaTeX files through platex and dvipdfmx..." 122 | $(MAKE) -C $(BUILDDIR)/latex all-pdf-ja 123 | @echo "pdflatex finished; the PDF files are in $(BUILDDIR)/latex." 124 | 125 | text: 126 | $(SPHINXBUILD) -b text $(ALLSPHINXOPTS) $(BUILDDIR)/text 127 | @echo 128 | @echo "Build finished. The text files are in $(BUILDDIR)/text." 129 | 130 | man: 131 | $(SPHINXBUILD) -b man $(ALLSPHINXOPTS) $(BUILDDIR)/man 132 | @echo 133 | @echo "Build finished. The manual pages are in $(BUILDDIR)/man." 134 | 135 | texinfo: 136 | $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo 137 | @echo 138 | @echo "Build finished. The Texinfo files are in $(BUILDDIR)/texinfo." 139 | @echo "Run \`make' in that directory to run these through makeinfo" \ 140 | "(use \`make info' here to do that automatically)." 141 | 142 | info: 143 | $(SPHINXBUILD) -b texinfo $(ALLSPHINXOPTS) $(BUILDDIR)/texinfo 144 | @echo "Running Texinfo files through makeinfo..." 145 | make -C $(BUILDDIR)/texinfo info 146 | @echo "makeinfo finished; the Info files are in $(BUILDDIR)/texinfo." 147 | 148 | gettext: 149 | $(SPHINXBUILD) -b gettext $(I18NSPHINXOPTS) $(BUILDDIR)/locale 150 | @echo 151 | @echo "Build finished. The message catalogs are in $(BUILDDIR)/locale." 152 | 153 | changes: 154 | $(SPHINXBUILD) -b changes $(ALLSPHINXOPTS) $(BUILDDIR)/changes 155 | @echo 156 | @echo "The overview file is in $(BUILDDIR)/changes." 157 | 158 | linkcheck: 159 | $(SPHINXBUILD) -b linkcheck $(ALLSPHINXOPTS) $(BUILDDIR)/linkcheck 160 | @echo 161 | @echo "Link check complete; look for any errors in the above output " \ 162 | "or in $(BUILDDIR)/linkcheck/output.txt." 163 | 164 | doctest: 165 | $(SPHINXBUILD) -b doctest $(ALLSPHINXOPTS) $(BUILDDIR)/doctest 166 | @echo "Testing of doctests in the sources finished, look at the " \ 167 | "results in $(BUILDDIR)/doctest/output.txt." 168 | 169 | xml: 170 | $(SPHINXBUILD) -b xml $(ALLSPHINXOPTS) $(BUILDDIR)/xml 171 | @echo 172 | @echo "Build finished. The XML files are in $(BUILDDIR)/xml." 173 | 174 | pseudoxml: 175 | $(SPHINXBUILD) -b pseudoxml $(ALLSPHINXOPTS) $(BUILDDIR)/pseudoxml 176 | @echo 177 | @echo "Build finished. The pseudo-XML files are in $(BUILDDIR)/pseudoxml." 178 | 179 | github: 180 | touch $(BUILDDIR)/html/.nojekyll 181 | echo "awesomehacking.org" > $(BUILDDIR)/html/CNAME 182 | ghp-import -b gh-pages -c awesomehacking.org -m "Travis.ci automated site building" -n _build/html 183 | 184 | purge: 185 | curl -X DELETE "https://api.cloudflare.com/client/v4/zones/${CF_ZONEID}/purge_cache" -H "X-Auth-Email: ${CF_EMAIL}" -H "X-Auth-Key: ${CF_AUTH}" -H "Content-Type: application/json" --data '{"purge_everything":true}' 186 | 187 | -------------------------------------------------------------------------------- /Malware/Dynamic Analysis/Malzilla.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://malzilla.sourceforge.net/ 3 | -------------------------------------------------------------------------------- /Malware/Honeypot/Honeyd.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.honeyd.org/ 3 | -------------------------------------------------------------------------------- /Malware/Static Analysis/PEview.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://wjradburn.com/software/ 3 | X-Download=http://wjradburn.com/software/PEview.zip 4 | -------------------------------------------------------------------------------- /Malware/Static Analysis/Sysinternals.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://technet.microsoft.com/en-us/sysinternals/bb842062 3 | X-Download=https://download.sysinternals.com/files/SysinternalsSuite.zip 4 | -------------------------------------------------------------------------------- /Network/Analysis/Pytbull.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://pytbull.sourceforge.net/ 3 | -------------------------------------------------------------------------------- /Network/Sniffer/Dsniff.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.monkey.org/~dugsong/dsniff/ 3 | X-Download=https://www.monkey.org/~dugsong/dsniff/dsniff-2.3.tar.gz 4 | -------------------------------------------------------------------------------- /Network/Sniffer/NetworkMiner.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.netresec.com/?page=NetworkMiner 3 | -------------------------------------------------------------------------------- /Network/Sniffer/Wireshark.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.wireshark.org 3 | -------------------------------------------------------------------------------- /Penetration Testing/DoS/T50.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://sourceforge.net/projects/t50/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Exploiting/Nessus.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.tenable.com/products/nessus-vulnerability-scanner 3 | -------------------------------------------------------------------------------- /Penetration Testing/Exploiting/Netsparker.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.netsparker.com/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Exploiting/OpenVAS.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.openvas.org/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Fuzzing/Fusil.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://fusil.readthedocs.io/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Fuzzing/TAOF.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://sourceforge.net/projects/taof/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Fuzzing/WindowsIPCFuzzingTools.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.nccgroup.trust/us/about-us/resources/windows-ipc-fuzzing-tools/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/MITM/Mallory.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://bitbucket.org/IntrepidusGroup/mallory 3 | X-Download=https://bitbucket.org/IntrepidusGroup/mallory/get/4c3ea86c5679.zip 4 | -------------------------------------------------------------------------------- /Penetration Testing/Post Exploitation/Tgcd.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://tgcd.sourceforge.net/ 3 | X-Download=https://sourceforge.net/projects/tgcd/files/latest/download?source=files 4 | -------------------------------------------------------------------------------- /Penetration Testing/Post Exploitation/WCE.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.ampliasecurity.com/research/windows-credentials-editor/ 3 | X-Download=http://www.ampliasecurity.com/research/wce_v1_42beta_x32.zip 4 | -------------------------------------------------------------------------------- /Penetration Testing/Web/BlindElephant.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://blindelephant.sourceforge.net 3 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Burp.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://portswigger.net/burp/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Web/CMSExplorer.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://code.google.com/archive/p/cms-explorer/ 3 | X-Download=https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/cms-explorer/cms-explorer-1.0.zip 4 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Nexpose.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.rapid7.com/products/nexpose/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Paros.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://sourceforge.net/projects/paros/ 3 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Ratproxy.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://code.google.com/archive/p/ratproxy/ 3 | X-Download=https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/ratproxy/ratproxy-1.58.tar.gz 4 | -------------------------------------------------------------------------------- /Penetration Testing/Web/SQLNinja.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://sqlninja.sourceforge.net/ 3 | X-Download=http://sourceforge.net/projects/sqlninja/files/sqlninja/sqlninja-0.2.999-alpha1.tgz/download 4 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Skipfish.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://code.google.com/archive/p/skipfish/ 3 | X-Download=https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/skipfish/skipfish-2.10b.tgz 4 | -------------------------------------------------------------------------------- /Penetration Testing/Web/Wapiti.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://wapiti.sourceforge.net/ 3 | X-Download=http://downloads.sourceforge.net/project/wapiti/wapiti/wapiti-2.3.0/wapiti-2.3.0.tar.gz?r=&ts=1480189890&use_mirror=vorboss 4 | -------------------------------------------------------------------------------- /Penetration Testing/Wireless/Reaver.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://code.google.com/archive/p/reaver-wps/ 3 | X-Download=https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/reaver-wps/reaver-1.4.tar.gz 4 | -------------------------------------------------------------------------------- /Readme: -------------------------------------------------------------------------------- 1 | 2 | Ensemble-HackTools 3 | Ensemble-HackTools is a curated list of hacking tools for hackers, pentesters and security researchers. Its goal is to collect, classify and make awesome tools easy to find by humans, creating a toolset you can checkout and update with one command. 4 | 5 | This is not only a curated list, it is also a complete and updated toolset you can download with one-command! 6 | 7 | You can download all the tools with the following command: 8 | ``` 9 | git clone --recursive https://github.com/Rexinazor/Ensemble-HackTools 10 | ``` 11 | 12 | To update it run the following command: 13 | ``` 14 | git pull 15 | ``` 16 | 17 | #Table of Contents 18 | 19 | CTF Tools 20 | Code Auditing 21 | Static Analysis 22 | Cryptography 23 | Docker 24 | Forensics 25 | File Forensics 26 | Image Forensics 27 | Incident Response 28 | Live Analysis 29 | Memory Forensics 30 | Misc 31 | Mobile 32 | Network Forensics 33 | Hardware Hacking 34 | Computer 35 | Intelligence 36 | Library 37 | C 38 | Go 39 | Java 40 | Python 41 | Ruby 42 | Live CD - Distributions 43 | Malware 44 | Dynamic Analysis 45 | Honeypot 46 | Intelligence 47 | Ops 48 | Source Code 49 | Static Analysis 50 | Network 51 | Analysis 52 | Fake Services 53 | Packet Manipulation 54 | Sniffer 55 | Penetration Testing 56 | DoS 57 | Exploiting 58 | Exploits 59 | Fuzzing 60 | Info Gathering 61 | MITM 62 | Mobile 63 | Password Cracking 64 | Port Scanning 65 | Post Exploitation 66 | Reporting 67 | Services 68 | Training 69 | Web 70 | Wireless 71 | Reverse Engineering 72 | Security 73 | Asset Management 74 | Cloud Security 75 | DevOps 76 | Endpoint Security 77 | Network Security 78 | Orchestration 79 | Phishing 80 | Privacy 81 | Social Engineering 82 | Framework 83 | Harvester 84 | Phishing 85 | Wardialing 86 | CTF Tools 87 | CTFd - CTF in a can. Easily modifiable and has everything you need to run a jeopardy style CTF. 88 | CTForge - The framework developed by the hacking team from University of Venice to easily host jeopardy and attack-defense CTF security competitions. It provides the software components for running the game, namely the website and the checkbot (optional). 89 | FBCTF - Platform to host Capture the Flag competitions. 90 | LibreCTF - CTF in a box. Minimal setup required. 91 | Mellivora - A CTF engine written in PHP. 92 | NightShade - A simple security CTF framework. 93 | OneGadget - A tool for you easy to find the one gadget RCE in libc.so.6. 94 | Pwntools - CTF framework and exploit development library. 95 | Scorebot - Platform for CTFs by Legitbs (Defcon). 96 | V0lt - Security CTF Toolkit. 97 | Code Auditing 98 | Static Analysis 99 | Brakeman - A static analysis security vulnerability scanner for Ruby on Rails applications. 100 | Dr. Taint - A very WIP DynamoRIO module built on the Dr. Memory Framework to implement taint analysis on ARM. 101 | GoKart - A static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go source code. 102 | Gosec - Inspects source code for security problems by scanning the Go AST. 103 | STACK - A static checker for identifying unstable code. 104 | ShellCheck - A static analysis tool for shell scripts. 105 | Cryptography 106 | FeatherDuster - An automated, modular cryptanalysis tool. 107 | RSATool - Generate private key with knowledge of p and q. 108 | Xortool - A tool to analyze multi-byte xor cipher. 109 | Docker 110 | DVWA - Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. 111 | Docker Bench for Security - The Docker Bench for Security checks for all the automatable tests in the CIS Docker 1.6 Benchmark. 112 | Kali Linux - This Kali Linux Docker image provides a minimal base install of the latest version of the Kali Linux Rolling Distribution. 113 | Metasploit - Metasploit Framework penetration testing software (unofficial docker). 114 | OWASP Juice Shop - An intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. 115 | OWASP Mutillidae II - OWASP Mutillidae II Web Pen-Test Practice Application. 116 | OWASP NodeGoat - An environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them. 117 | OWASP Railsgoat - A vulnerable version of Rails that follows the OWASP Top 10. 118 | OWASP Security Shepherd - A web and mobile application security training platform. 119 | OWASP WebGoat - A deliberately insecure Web Application. 120 | OWASP ZAP - Current stable owasp zed attack proxy release in embedded docker container. 121 | Security Ninjas - An Open Source Application Security Training Program. 122 | SpamScope - SpamScope (Fast Advanced Spam Analysis Tool) Elasticsearch. 123 | Vulnerability as a service: Heartbleed - Vulnerability as a Service: CVE 2014-0160. 124 | Vulnerability as a service: Shellshock - Vulnerability as a Service: CVE 2014-6271. 125 | Vulnerable WordPress Installation - Vulnerable WordPress Installation. 126 | WPScan - WPScan is a black box WordPress vulnerability scanner. 127 | Forensics 128 | File Forensics 129 | Autopsy - A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools. 130 | DFF - A Forensics Framework coming with command line and graphical interfaces. DFF can be used to investigate hard drives and volatile memory and create reports about user and system activities. 131 | Docker Explorer - A tool to help forensicate offline docker acquisitions. 132 | Hadoop_framework - A prototype system that uses Hadoop to process hard drive images. 133 | OSXCollector - A forensic evidence collection & analysis toolkit for OS X. 134 | RegRipper3.0 - Alternative to RegRipper 135 | RegRippy - A framework for reading and extracting useful forensics data from Windows registry hives. It is an alternative to RegRipper developed in modern Python 3. 136 | Scalpel - An open source data carving tool. 137 | Shellbags - Investigate NT_USER.dat files. 138 | SlackPirate - Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace. 139 | Sleuthkit - A library and collection of command line digital forensics tools. 140 | TVS_extractor - Extracts TeamViewer screen captures. 141 | Telegram-extractor - Python3 scripts to analyse the data stored in Telegram. 142 | Truehunter - The goal of Truehunter is to detect encrypted containers using a fast and memory efficient approach without any external dependencies for ease of portability. 143 | Image Forensics 144 | Depix - Recovers passwords from pixelized screenshots. 145 | Incident Response 146 | Hunter - A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook. 147 | Loki - Simple IOC and Incident Response Scanner. 148 | Panorama - It was made to generate a wide report about Windows systems, support and tested on Windows XP SP2 and up. 149 | Snoopdigg - Simple utility to ease the process of collecting evidence to find infections. 150 | Live Analysis 151 | OS X Auditor - OS X Auditor is a free Mac OS X computer forensics tool. 152 | Windows-event-forwarding - A repository for using windows event forwarding for incident detection and response. 153 | Memory Forensics 154 | Rekall - Memory analysis framework developed by Google. 155 | Volatility - Volatility is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer visibility into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. 156 | Misc 157 | Diffy - A digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT). Allows a forensic investigator to quickly scope a compromise across cloud instances during an incident, and triage those instances for followup actions. 158 | HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size. 159 | Libfvde - Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes. 160 | Mass_archive - A basic tool for pushing a web page to multiple archiving services at once. 161 | Mobile 162 | Android Forensic Toolkit - Allows you to extract SMS records, call history, photos, browsing history, and password from an Android phone. 163 | Android backup extractor - Utility to extract and repack Android backups created with adb backup (ICS+). Largely based on BackupManagerService.java from AOSP. 164 | MVT - MVT is a forensic tool to look for signs of infection in smartphone devices. 165 | Mem - Tool used for dumping memory from Android devices. 166 | Snoopdroid - Extract packages from an Android device. 167 | WhatsApp Media Decrypt - Decrypt WhatsApp encrypted media files. 168 | iLEAPP - iOS Logs, Events, And Plist Parser. 169 | iOSbackup - A Pyhotn 3 class that reads and extracts files from a password-encrypted iOS backup created by iTunes on Mac and Windows. Compatible with iOS 13. 170 | Network Forensics 171 | Dnslog - Minimalistic DNS logging tool. 172 | Dshell - A network forensic analysis framework. 173 | Passivedns - A network sniffer that logs all DNS server replies for use in a passive DNS setup. 174 | Website Evidence Collector - The tool Website Evidence Collector (WEC) automates the website evidence collection of storage and transfer of personal data. 175 | Hardware Hacking 176 | Computer 177 | Kbd-audio - Tools for capturing and analysing keyboard input paired with microphone capture. 178 | LimeSDR-Mini - The LimeSDR-Mini board provides a hardware platform for developing and prototyping high-performance and logic-intensive digital and RF designs using Altera’s MAX10 FPGA and Lime Microsystems transceiver. 179 | NSA-B-GONE - Thinkpad X220 board that disconnects the webcam and microphone data lines. 180 | Intelligence 181 | Attackintel - A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups. 182 | DeepdarkCTI - The aim of this project is to collect the sources, present in the Deep and Dark web, which can be useful in Cyber Threat Intelligence contexts. 183 | Dnstwist - Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation. 184 | IntelOwl - Analyze files, domains, IPs in multiple ways from a single API at scale. 185 | MISP-maltego - Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset. 186 | Shodan-seeker - Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of specific ports/IPs, etc. 187 | VIA4CVE - An aggregator of the known vendor vulnerabilities database to support the expansion of information with CVEs. 188 | Yeti - Your Everyday Threat Intelligence. 189 | n6 - Automated handling of data feeds for security teams. 190 | Library 191 | C 192 | Libdnet - Provides a simplified, portable interface to several low-level networking routines, including network address manipulation, kernel arp cache and route table lookup and manipulation, network firewalling, network interface lookup and manipulation, IP tunnelling, and raw IP packet and Ethernet frame transmission. 193 | Go 194 | Garble - Obfuscate Go builds. 195 | Java 196 | Libsignal-service-java - A Java/Android library for communicating with the Signal messaging service. 197 | Python 198 | Amodem - Audio MODEM Communication Library in Python. 199 | Dpkt - Fast, simple packet creation / parsing, with definitions for the basic TCP/IP protocols. 200 | Pcapy - A Python extension module that interfaces with the libpcap packet capture library. Pcapy enables python scripts to capture packets on the network. Pcapy is highly effective when used in conjunction with a packet-handling package such as Impacket, which is a collection of Python classes for constructing and dissecting network packets. 201 | Plyara - Parse YARA rules and operate over them more easily. 202 | PyBFD - Python interface to the GNU Binary File Descriptor (BFD) library. 203 | PyPDF2 - A utility to read and write PDFs with Python. 204 | Pynids - A python wrapper for libnids, a Network Intrusion Detection System library offering sniffing, IP defragmentation, TCP stream reassembly and TCP port scan detection. Let your own python routines examine network conversations. 205 | Pypcap - This is a simplified object-oriented Python wrapper for libpcap. 206 | Pyprotect - A lightweight python code protector, makes your python project harder to reverse engineer. 207 | Python-idb - Pure Python parser and analyzer for IDA Pro database files (.idb). 208 | Python-ptrace - Python binding of ptrace library. 209 | RDPY - RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client and server side). 210 | Scapy - A python-based interactive packet manipulation program & library. 211 | Ruby 212 | Secureheaders - Security related headers all in one gem. 213 | Live CD - Distributions 214 | Android Tamer - Virtual / Live Platform for Android Security professionals. 215 | ArchStrike - An Arch Linux repository for security professionals and enthusiasts. 216 | BOSSLive - An Indian GNU/Linux distribution developed by CDAC and is customized to suit Indian's digital environment. It supports most of the Indian languages. 217 | BackBox - Ubuntu-based distribution for penetration tests and security assessments. 218 | BlackArch - Arch Linux-based distribution for penetration testers and security researchers. 219 | DEFT Linux - Suite dedicated to incident response and digital forensics. 220 | Fedora Security Lab - A safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations. 221 | Kali - A Linux distribution designed for digital forensics and penetration testing. 222 | NST - Network Security Toolkit distribution. 223 | Ophcrack - A free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. 224 | Parrot - Security GNU/Linux distribution designed with cloud pentesting and IoT security in mind. 225 | Pentoo - Security-focused livecd based on Gentoo. 226 | REMnux - Toolkit for assisting malware analysts with reverse-engineering malicious software. 227 | Malware 228 | Dynamic Analysis 229 | Androguard - Reverse engineering, Malware and goodware analysis of Android applications. 230 | CAPEv2 - Malware Configuration And Payload Extraction. 231 | Cuckoo Sandbox - An automated dynamic malware analysis system. 232 | CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox. 233 | DECAF - Short for Dynamic Executable Code Analysis Framework, is a binary analysis platform based on QEMU. 234 | DRAKVUF Sandbox - DRAKVUF Sandbox is an automated black-box malware analysis system with DRAKVUF engine under the hood, which does not require an agent on guest OS. 235 | DroidBox - Dynamic analysis of Android apps. 236 | Hooker - An opensource project for dynamic analyses of Android applications. 237 | Jsunpack-n - Emulates browser functionality when visiting a URL. 238 | LiSa - Sandbox for automated Linux malware analysis. 239 | Magento-malware-scanner - A collection of rules and samples to detect Magento malware. 240 | Malzilla - Web pages that contain exploits often use a series of redirects and obfuscated code to make it more difficult for somebody to follow. MalZilla is a useful program for use in exploring malicious pages. It allows you to choose your own user agent and referrer, and has the ability to use proxies. It shows you the full source of webpages and all the HTTP headers. It gives you various decoders to try and deobfuscate javascript aswell. 241 | Panda - Platform for Architecture-Neutral Dynamic Analysis. 242 | ProbeDroid - A dynamic binary instrumentation kit targeting on Android(Lollipop) 5.0 and above. 243 | PyEMU - Fully scriptable IA-32 emulator, useful for malware analysis. 244 | PyWinSandbox - Python Windows Sandbox library. Create a new Windows Sandbox machine, control it with a simple RPyC interface. 245 | Pyrebox - Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU. 246 | Qiling - Advanced Binary Emulation framework. 247 | Speakeasy - A portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. 248 | Uitkyk - Runtime memory analysis framework to identify Android malware. 249 | WScript Emulator - Emulator/tracer of the Windows Script Host functionality. 250 | Honeypot 251 | Amun - Amun was the first python-based low-interaction honeypot, following the concepts of Nepenthes but extending it with more sophisticated emulation and easier maintenance. 252 | Basic-auth-pot - HTTP Basic Authentication honeyPot. 253 | Bluepot - Bluetooth Honeypot. 254 | CitrixHoneypot - Detect and log CVE-2019-19781 scan and exploitation attempts. 255 | Conpot - ICS/SCADA honeypot. 256 | Cowrie - SSH honeypot, based on Kippo. 257 | Dionaea - Honeypot designed to trap malware. 258 | Django-admin-honeypot - A fake Django admin login screen to log and notify admins of attempted unauthorized access. 259 | ESPot - An Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120. 260 | Elastichoney - A Simple Elasticsearch Honeypot. 261 | Endlessh - An SSH tarpit that very slowly sends an endless, random SSH banner. It keeps SSH clients locked up for hours or even days at a time. The purpose is to put your real SSH server on another port and then let the script kiddies get stuck in this tarpit instead of bothering a real server. 262 | Glastopf - Web Application Honeypot. 263 | Glutton - All eating honeypot. 264 | HFish - A cross platform honeypot platform developed based on golang, which has been meticulously built for enterprise security. 265 | Heralding - Sometimes you just want a simple honeypot that collects credentials, nothing more. Heralding is that honeypot! Currently the following protocols are supported: ftp, telnet, ssh, rdp, http, https, pop3, pop3s, imap, imaps, smtp, vnc, postgresql and socks5. 266 | HonTel - A Honeypot for Telnet service. Basically, it is a Python v2.x application emulating the service inside the chroot environment. Originally it has been designed to be run inside the Ubuntu/Debian environment, though it could be easily adapted to run inside any Linux environment. 267 | HoneyPy - A low to medium interaction honeypot. 268 | HoneyTrap - Advanced Honeypot framework. 269 | Honeyd - Create a virtual honeynet. 270 | Honeypot - Low interaction honeypot that displays real time attacks. 271 | Honeything - A honeypot for Internet of TR-069 things. It's designed to act as completely a modem/router that has RomPager embedded web server and supports TR-069 (CWMP) protocol. 272 | HonnyPotter - A WordPress login honeypot for collection and analysis of failed login attempts. 273 | Kippo - A medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. 274 | Kippo-graph - Visualize statistics from a Kippo SSH honeypot. 275 | MHN - Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management. 276 | MTPot - Open Source Telnet Honeypot. 277 | Maildb - Python Web App to Parse and Track Email and http Pcap Files. 278 | Mailoney - A SMTP Honeypot I wrote just to have fun learning Python. 279 | Miniprint - A medium interaction printer honeypot. 280 | Mnemosyne - A normalizer for honeypot data; supports Dionaea. 281 | MongoDB-HoneyProxy - A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server. 282 | MysqlPot - A mysql honeypot, still very very early stage. 283 | NoSQLPot - The NoSQL Honeypot Framework. 284 | Nodepot - A nodejs web application honeypot. 285 | OWASP-Honeypot - An open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way. 286 | OpenCanary - A daemon that runs several canary versions of services that alerts when a service is (ab)used. 287 | Phoneyc - Pure Python honeyclient implementation. 288 | Phpmyadmin_honeypot - A simple and effective phpMyAdmin honeypot. 289 | Servletpot - Web application Honeypot. 290 | Shadow Daemon - A modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl & Python apps. 291 | Shiva - Spam Honeypot with Intelligent Virtual Analyzer, is an open but controlled relay Spam Honeypot (SpamPot), built on top of Lamson Python framework, with capability of collecting and analyzing all spam thrown at it. 292 | Smart-honeypot - PHP Script demonstrating a smart honey pot. 293 | Snare - Super Next generation Advanced Reactive honEypot 294 | SpamScope - Fast Advanced Spam Analysis Tool. 295 | StrutsHoneypot - Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers. 296 | T-Pot - The All In One Honeypot Platform. 297 | Tango - Honeypot Intelligence with Splunk. 298 | Tanner - A remote data analysis and classification service to evaluate HTTP requests and composing the response then served by SNARE. TANNER uses multiple application vulnerability type emulation techniques when providing responses for SNARE. In addition, TANNER provides Dorks for SNARE powering its luring capabilities. 299 | Thug - Low interaction honeyclient, for investigating malicious websites. 300 | Twisted-honeypots - SSH, FTP and Telnet honeypots based on Twisted. 301 | Wetland - A high interaction SSH honeypot. 302 | Wordpot - A WordPress Honeypot. 303 | Wp-smart-honeypot - WordPress plugin to reduce comment spam with a smarter honeypot. 304 | Intelligence 305 | CobaltStrikeParser - Python parser for CobaltStrike Beacon's configuration. 306 | Cobaltstrike - Code and yara rules to detect and analyze Cobalt Strike. 307 | MISP Modules - Modules for expansion services, import and export in MISP. 308 | Misp-dashboard - A dashboard for a real-time overview of threat intelligence from MISP instances. 309 | Passivedns-client - Provides a library and a query tool for querying several passive DNS providers. 310 | Pybeacon - A collection of scripts for dealing with Cobalt Strike beacons in Python. 311 | Rt2jira - Convert RT tickets to JIRA tickets. 312 | Ops 313 | Al-khaser - Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection. 314 | BASS - BASS Automated Signature Synthesizer. 315 | CSCGuard - Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation. 316 | CapTipper - A python tool to analyze, explore and revive HTTP malicious traffic. 317 | FLARE - A fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc. 318 | FakeNet-NG - A next generation dynamic network analysis tool for malware analysts and penetration testers. It is open source and designed for the latest versions of Windows. 319 | Google-play-crawler - Google-play-crawler is simply Java tool for searching android applications on GooglePlay, and also downloading them. 320 | Googleplay-api - An unofficial Python API that let you search, browse and download Android apps from Google Play (formerly Android Market). 321 | Grimd - Fast dns proxy that can run anywhere, built to black-hole internet advertisements and malware servers. 322 | Hidden - Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc. 323 | ImaginaryC2 - A python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IPs. Additionally, the tool aims to make it easy to replay captured Command-and-Control responses/served payloads. 324 | Irma - IRMA is an asynchronous & customizable analysis system for suspicious files. 325 | KLara - A project is aimed at helping Threat Intelligence researchers hunt for new malware using Yara. 326 | Kraken - Cross-platform Yara scanner written in Go. 327 | Malboxes - Builds malware analysis Windows VMs so that you don't have to. 328 | Mquery - YARA malware query accelerator (web frontend). 329 | Node-appland - NodeJS tool to download APKs from appland. 330 | Node-aptoide - NodeJS to download APKs from aptoide. 331 | Node-google-play - Call Google Play APIs from Node. 332 | Pafish - A demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do. 333 | Source Code 334 | Android-malware - Collection of android malware samples. 335 | AsyncRAT-C-Sharp - Open-Source Remote Administration Tool For Windows C# (RAT). 336 | BYOB - An open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. 337 | BlackHole - C# RAT (Remote Administration Tool). 338 | Carberp - Carberp leaked source code. 339 | Coldfire - Golang malware development library. 340 | Fancybear - Fancy Bear Source Code. 341 | LOLBAS - Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts). 342 | Mirai - Leaked Mirai Source Code for Research/IoC Development Purposes. 343 | Morris Worm - The original Morris Worm source code. 344 | SvcHostDemo - Demo service that runs in svchost.exe. 345 | TinyNuke - Zeus-style banking trojan. 346 | Zerokit - Zerokit/GAPZ rootkit (non buildable and only for researching). 347 | Zeus - Zeus version 2.0.8.9, leaked in 2011. 348 | Static Analysis 349 | APKinspector - A powerful GUI tool for analysts to analyze the Android applications. 350 | Aa-tools - Artifact analysis tools by JPCERT/CC Analysis Center. 351 | Androwarn - Detect and warn the user about potential malicious behaviours developed by an Android application. 352 | ApkAnalyser - A static, virtual analysis tool for examining and validating the development work of your Android app. 353 | Argus-SAF - Argus static analysis framework. 354 | CAPA - The FLARE team's open-source tool to identify capabilities in executable files. 355 | CFGScanDroid - Control Flow Graph Scanning for Android. 356 | ConDroid - Symbolic/concolic execution of Android apps. 357 | DroidLegacy - Static analysis scripts. 358 | FSquaDRA - Fast detection of repackaged Android applications based on the comparison of resource files included into the package. 359 | Floss - FireEye Labs Obfuscated String Solver. Automatically extract obfuscated strings from malware. 360 | Inspeckage - Android Package Inspector - dynamic analysis with api hooks, start unexported activities and more. 361 | Maldrolyzer - Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers, etc). 362 | PEfile - Read and work with Portable Executable (aka PE) files. 363 | PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files. 364 | PScout - Analyzing the Android Permission Specification. 365 | Pdfminer - A tool for extracting information from PDF documents. 366 | Peepdf - A Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. 367 | Quark-engine - A trust-worthy, practical tool that's ready to boost up your malware reverse engineering. 368 | Smali-CFGs - Smali Control Flow Graph's. 369 | SmaliSCA - Smali Static Code Analysis. 370 | Sysinternals Suite - The Sysinternals Troubleshooting Utilities. 371 | Tlsh - Trend Micro Locality Sensitive Hash is a fuzzy matching library. Given a byte stream with a minimum length of 50 bytes TLSH generates a hash value which can be used for similarity comparisons. Similar objects will have similar hash values which allows for the detection of similar objects by comparing their hash values. Note that the byte stream should have a sufficient amount of complexity. For example, a byte stream of identical bytes will not generate a hash value. 372 | Yara - Identify and classify malware samples. 373 | Network 374 | Analysis 375 | Bro - A powerful network analysis framework that is much different from the typical IDS you may know. 376 | Fatt - A pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic. 377 | Nidan - An active network monitor tool. 378 | Pytbull - A python based flexible IDS/IPS testing framework. 379 | Sguil - Sguil (pronounced sgweel) is built by network security analysts for network security analysts. Sguil's main component is an intuitive GUI that provides access to realtime events, session data, and raw packet captures. 380 | Winshark - A wireshark plugin to instrument ETW. 381 | Fake Services 382 | DNSChef - DNS proxy for Penetration Testers and Malware Analysts. 383 | DnsRedir - A small DNS server that will respond to certain queries with addresses provided on the command line. 384 | Packet Manipulation 385 | Pig - A Linux packet crafting tool. 386 | Yersinia - A network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. 387 | Sniffer 388 | Cloud-pcap - Web PCAP storage and analytics. 389 | Dnscap - Network capture utility designed specifically for DNS traffic. 390 | Dsniff - A collection of tools for network auditing and pentesting. 391 | Justniffer - Just A Network TCP Packet Sniffer. Justniffer is a network protocol analyzer that captures network traffic and produces logs in a customized way, can emulate Apache web server log files, track response times and extract all "intercepted" files from the HTTP traffic. 392 | Moloch - Moloch is a open source large scale full PCAP capturing, indexing and database system. 393 | Net-creds - Sniffs sensitive data from interface or pcap. 394 | Netsniff-ng - A Swiss army knife for your daily Linux network plumbing. 395 | NetworkMiner - A Network Forensic Analysis Tool (NFAT). 396 | OpenFPC - OpenFPC is a set of scripts that combine to provide a lightweight full-packet network traffic recorder and buffering tool. Its design goal is to allow non-expert users to deploy a distributed network traffic recorder on COTS hardware while integrating into existing alert and log tools. 397 | Openli - Open Source ETSI compliant Lawful Intercept software. 398 | PF_RING - PF_RING™ is a Linux kernel module and user-space framework that allows you to process packets at high-rates while providing you a consistent API for packet processing applications. 399 | Termshark - A terminal UI for tshark, inspired by Wireshark. 400 | WebPcap - A web-based packet analyzer (client/server architecture). Useful for analyzing distributed applications or embedded devices. 401 | Wireshark - A free and open-source packet analyzer. 402 | Penetration Testing 403 | DoS 404 | DHCPig - DHCP exhaustion script written in python using scapy network library. 405 | LOIC - Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. 406 | Memcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API. 407 | Sockstress - Sockstress (TCP DoS) implementation. 408 | T50 - The more fast network stress tool. 409 | Torshammer - Tor's hammer. Slow post DDOS tool written in python. 410 | UFONet - Abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc. 411 | Exploiting 412 | AttackSurfaceAnalyzer - Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation. 413 | Bashfuscator - A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team. 414 | BeEF - The Browser Exploitation Framework Project. 415 | BugId - Detect, analyze and uniquely identify crashes in Windows applications. 416 | CALDERA - A cyber security framework designed to easily automate adversary emulation, assist manual red-teams, and automate incident response. 417 | CCAT - Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments. 418 | Commix - Automated All-in-One OS Command Injection and Exploitation Tool. 419 | DLLInjector - Inject dlls in processes. 420 | DefenderCheck - Identifies the bytes that Microsoft Defender flags on. 421 | Donut - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters. 422 | Drupwn - Drupal enumeration & exploitation tool. 423 | EfiGuard - Disable PatchGuard and DSE at boot time. 424 | EtherSploit-IP - Exploiting Allen-Bradley E/IP PLCs. 425 | Evilgrade - The update explotation framework. 426 | Exe2hex - Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell). 427 | Fathomless - A collection of different programs for network red teaming. 428 | Gorsair - Gorsair hacks its way into remote docker containers that expose their APIs. 429 | Infection Monkey - An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server. 430 | Kube-hunter - Hunt for security weaknesses in Kubernetes clusters. 431 | LAVA - Large-scale Automated Vulnerability Addition. 432 | Linux Exploit Suggester - Linux Exploit Suggester; based on operating system release number. 433 | Linux-exploit-suggester - Linux privilege escalation auditing tool. 434 | LoRaWAN Auditing Framework - IoT deployments just keep growing and one part of that significant grow is composed of millions of LPWAN (low-power wide-area network) sensors deployed at hundreds of cities (Smart Cities) around the world, also at industries and homes. One of the most used LPWAN technologies is LoRa for which LoRaWAN is the network standard (MAC layer). LoRaWAN is a secure protocol with built in encryption but implementation issues and weaknesses affect the security of most current deployments. 435 | MSDAT - Microsoft SQL Database Attacking Tool is an open source penetration testing tool that tests the security of Microsoft SQL Databases remotely. 436 | Macrome - Excel Macro Document Reader/Writer for Red Teamers & Analysts 437 | Malicious-pdf - Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator. 438 | Metasploit Framework - Exploitation framework. 439 | MeterSSH - A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network. 440 | Nessus - Vulnerability, configuration, and compliance assessment. 441 | Nexpose - Vulnerability Management & Risk Management Software. 442 | Nishang - Offensive PowerShell for red team, penetration testing and offensive security. 443 | OpenVAS - Open Source vulnerability scanner and manager. 444 | PEzor - Open-Source PE Packer. 445 | PRET - Printer Exploitation Toolkit. The tool that made dumpster diving obsolete. 446 | PSKernel-Primitives - Exploit primitives for PowerShell. 447 | Peirates - A Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It automates known techniques to steal and collect service accounts, obtain further code execution, and gain control of the cluster. 448 | PowerSploit - A PowerShell Post-Exploitation Framework. 449 | ProxyLogon - ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution. 450 | ROP Gadget - Framework for ROP exploitation. 451 | Ropper - Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework. 452 | Routersploit - Automated penetration testing software for router. 453 | Rupture - A framework for BREACH and other compression-based crypto attacks. 454 | SPARTA - Network Infrastructure Penetration Testing Tool. 455 | Shark - Turn off PatchGuard in real time for win7 (7600) ~ win10 (18950). 456 | SharpBlock - A method of bypassing EDR's active projection DLL's by preventing entry point execution. 457 | SharpShooter - Payload Generation Framework. 458 | ShellcodeCompiler - A program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows (x86 and x64) and Linux (x86 and x64). It is possible to call any Windows API function or Linux syscall in a user-friendly way. 459 | Shellen - Interactive shellcoding environment to easily craft shellcodes. 460 | Shellsploit - Let's you generate customized shellcodes, backdoors, injectors for various operating system. And let's you obfuscation every byte via encoders. 461 | Spoodle - A mass subdomain + poodle vulnerability scanner. 462 | SysWhispers - AV/EDR evasion via direct system calls. 463 | Unicorn - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. 464 | Veil Framework - A tool designed to generate metasploit payloads that bypass common anti-virus solutions. 465 | Vuls - Vulnerability scanner for Linux/FreeBSD, agentless, written in Go. 466 | Windows Exploit Suggester - Detects potential missing patches on the target. 467 | Ysoserial.net - Deserialization payload generator for a variety of .NET formatters. 468 | Zarp - Network Attack Tool. 469 | expdevBadChars - Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing. 470 | Exploits 471 | Apache-uaf - Apache use after free bug infos / ASAN stack traces. 472 | BlueGate - PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE. 473 | Bluedroid - PoCs of Vulnerabilities on Bluedroid. 474 | Broadpwn - Broadpwn bug (CVE-2017-9417). 475 | CVE-2018-8120 - CVE-2018-8120. 476 | CVE-2018-8897 - Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). 477 | CVE-2019-0604 - cve-2019-0604 SharePoint RCE exploit. 478 | CVE-2019-18935 - RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX. 479 | CVE-2019-6453 - Proof of calc for CVE-2019-6453 (Mirc exploit). 480 | CVE-2020-10560 - OSSN Arbitrary File Read 481 | CVE-2020-11651 - PoC for CVE-2020-11651. 482 | CVE-2020-1301 - POC exploit for SMBLost vulnerability (CVE-2020-1301) 483 | CVE-2020-1350 - Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019. 484 | CVE-2020-1350-DoS - A denial-of-service proof-of-concept for CVE-2020-1350. 485 | CVE-2020-1472 - Exploit Code for CVE-2020-1472 aka Zerologon. 486 | CVE-2020-1472_2 - PoC for Zerologon 487 | CVE-2021-26855_PoC - SSRF payloads (CVE-2021-26855) over Exchange Server 2019. 488 | CVE-2021-31166 - Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. 489 | Chakra-2016-11 - Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201). 490 | Chimay-Red - Working POC of Mikrotik exploit from Vault 7 CIA Leaks. 491 | Desharialize - Easy mode to Exploit CVE-2019-0604 (Sharepoint XML Deserialization Unauthenticated RCE). 492 | ES File Explorer Open Port Vulnerability - ES File Explorer Open Port Vulnerability - CVE-2019-6447. 493 | EfsPotato - Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability). 494 | HolicPOC - CVE-2015-2546, CVE-2016-0165, CVE-2016-0167, CVE-2017-0101, CVE-2017-0263, CVE-2018-8120. 495 | Jira-Scan - Jira scanner for CVE-2017-9506. 496 | Kernel Exploits - Various kernel exploits. 497 | MS17-010 - Exploits for MS17-010. 498 | PrintNightmare - PrintNightmare (CVE-2021-1675) Remote code execution in Windows Spooler Service 499 | Proxyshell-Exchange - Poc script for ProxyShell exploit chain in Exchange Server. 500 | Proxyshell-auto - Automatic ProxyShell Exploit. 501 | Qemu-vm-escape - This is an exploit for CVE-2019-6778, a heap buffer overflow in slirp:tcp_emu(). 502 | Ruby-advisory-db - A database of vulnerable Ruby Gems. 503 | The Exploit Database - The official Exploit Database repository. 504 | Tpwn - Xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time 505 | XiphosResearch Exploits - Miscellaneous proof of concept exploit code written at Xiphos Research for testing purposes. 506 | cve-2020-1054 - LPE for CVE-2020-1054 targeting Windows 7 x64 507 | Fuzzing 508 | AFL++ - AFL 2.56b with community patches, AFLfast power schedules, qemu 3.1 upgrade + laf-intel support, MOpt mutators, InsTrim instrumentation, unicorn_mode, Redqueen and a lot more. 509 | AndroFuzz - A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process. 510 | Boofuzz - A fork and successor of the Sulley Fuzzing Framework. 511 | Construct - Declarative data structures for python that allow symmetric parsing and building. 512 | Deepstate - A unit test-like interface for fuzzing and symbolic execution. 513 | Driller - Augmenting AFL with symbolic execution. 514 | Eclipser - Grey-box Concolic Testing on Binary Code. 515 | Frankenstein - Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging. 516 | Fusil - A Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files. 517 | Fuzzbox - A multi-codec media fuzzing tool. 518 | Fuzzlyn - Fuzzer for the .NET toolchains, utilizes Roslyn to generate random C# programs. 519 | Fuzzotron - A TCP/UDP based network daemon fuzzer. 520 | Honggfuzz - Security oriented fuzzer with powerful analysis options. Supports evolutionary, feedback-driven fuzzing based on code coverage (sw and hw). 521 | InsTrim - Lightweight Instrumentation for Coverage-guided Fuzzing. 522 | KleeFL - Seeding Fuzzers With Symbolic Execution. 523 | MFFA - Media Fuzzing Framework for Android. 524 | Melkor-android - An Android port of the melkor ELF fuzzer. 525 | Netzob - Netzob is an opensource tool for reverse engineering, traffic generation and fuzzing of communication protocols. 526 | Neuzz - A neural-network-assisted fuzzer. 527 | OneFuzz - Project OneFuzz enables continuous developer-driven fuzzing to proactively harden software prior to release. With a single command, which can be baked into CICD, developers can launch fuzz jobs from a few virtual machines to thousands of cores. 528 | Python-AFL - American fuzzy lop fork server and instrumentation for pure-Python code. 529 | RPCForge - Windows RPC Python fuzzer. 530 | Radamsa-android - An Android port of radamsa fuzzer. 531 | Razzer - A Kernel fuzzer focusing on race bugs. 532 | Retrowrite - Retrofitting compiler passes though binary rewriting. 533 | SecLists - A collection of multiple types of lists used during security assessments. 534 | Sienna-locomotive - A user-friendly fuzzing and crash triage tool for Windows. 535 | Sulley - Fuzzer development and fuzz testing framework consisting of multiple extensible components. 536 | T-Fuzz - A fuzzing tool based on program transformation. 537 | TAOF - The Art of Fuzzing, including ProxyFuzz, a man-in-the-middle non-deterministic network fuzzer. 538 | Unicorefuzz - Fuzzing the Kernel Using Unicornafl and AFL++. 539 | Unicornafl - Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86) adapted to afl++. 540 | VUzzer - This Project depends heavily on a modeified version of DataTracker, which in turn depends on LibDFT pintool. It has some extra tags added in libdft. 541 | Vfuzz - I don't claim superiority over other engines in performance or efficiency out of the box, but this does implement some features that I felt where lacking elsewhere. 542 | Winafl - A fork of AFL for fuzzing Windows binaries. 543 | Winafl_inmemory - WINAFL for blackbox in-memory fuzzing (PIN). 544 | Windows IPC Fuzzing Tools - A collection of tools used to attack applications that use Windows Interprocess Communication mechanisms. 545 | Zulu - A fuzzer designed for rapid prototyping that normally happens on a client engagement where something needs to be fuzzed within tight timescales. 546 | Info Gathering 547 | ATSCAN - Advanced dork Search & Mass Exploit Scanner. 548 | Bluto - DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration | Compromised Account Checking 549 | Bundler-audit - Patch-level verification for Bundler. 550 | Cloudflare_enum - Cloudflare DNS Enumeration Tool for Pentesters. 551 | Commando-vm - Complete Mandiant Offensive VM (Commando VM), the first full Windows-based penetration testing virtual machine distribution. The security community recognizes Kali Linux as the go-to penetration testing platform for those that prefer Linux. Commando VM is for penetration testers that prefer Windows. 552 | Dnsenum - A perl script that enumerates DNS information. 553 | Dnsmap - Passive DNS network mapper. 554 | Dnsrecon - DNS Enumeration Script. 555 | Dnsspy - Performs various DNS enumeration attacks. 556 | EgressCheck Framework - Used to check for TCP and UDP egress filtering on both windows and unix client systems. 557 | Egressbuster - A method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell. 558 | EyeWitness - EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. 559 | IVRE - An open-source framework for network recon. It relies on open-source well-known tools to gather data (network intelligence), stores it in a database, and provides tools to analyze it. 560 | Knock - A python tool designed to enumerate subdomains on a target domain through a wordlist. 561 | Operative-framework - This is a framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics ...). 562 | Recon-ng - A full-featured Web Reconnaissance framework written in Python. 563 | SMBMap - A handy SMB enumeration tool. 564 | SPartan - Frontpage and Sharepoint fingerprinting and attack tool. 565 | SSLMap - TLS/SSL cipher suite scanner. 566 | Secretz - A tool that minimizes the large attack surface of Travis CI. It automatically fetches repos, builds, and logs for any given organization. 567 | Sparty - MS Sharepoint and Frontpage Auditing Tool. 568 | Spyse.py - Python API wrapper and command-line client for the tools hosted on spyse.com. 569 | SubFinder - A subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing. 570 | SubQuest - Fast, Elegant subdomain scanner using nodejs. 571 | Subbrute - A DNS meta-query spider that enumerates DNS records, and subdomains. 572 | TravisLeaks - A tool to find sensitive keys and passwords in Travis logs. 573 | TruffleHog - Searches through git repositories for high entropy strings, digging deep into commit history. 574 | URLextractor - Information gathering & website reconnaissance. 575 | VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. 576 | Wmap - Information gathering for web hacking. 577 | XRay - A tool for recon, mapping and OSINT gathering from public networks. 578 | MITM 579 | Bettercap - A powerful, flexible and portable tool created to perform various types of MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more. 580 | Caplets - Bettercap scripts (caplets) and proxy modules. 581 | Dnsspoof - DNS spoofer. Drops DNS responses from the router and replaces it with the spoofed DNS response. 582 | Ettercap - A comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis. 583 | MITMf - Framework for Man-In-The-Middle attacks. 584 | Mallory - An extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway. Unlike other tools of its kind, Mallory supports modifying non-standard protocols on the fly. 585 | Mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface. 586 | Mitmsocks4j - Man in the Middle SOCKS Proxy for JAVA. 587 | Nogotofail - An on-path blackbox network traffic security testing tool. 588 | Responder - A LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. 589 | Ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords. 590 | Mobile 591 | AFE - Android Framework for Exploitation, is a framework for exploiting android based devices. 592 | AndroBugs - An efficient Android vulnerability scanner that helps developers or hackers find potential security vulnerabilities in Android applications. 593 | Android-vts - Android Vulnerability Test Suite - In the spirit of open data collection, and with the help of the community, let's take a pulse on the state of Android security. 594 | Androl4b - A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis. 595 | CobraDroid - A custom build of the Android operating system geared specifically for application security analysts and for individuals dealing with mobile malware. 596 | Drozer - The Leading Security Assessment Framework for Android. 597 | Idb - A tool to simplify some common tasks for iOS pentesting and research. 598 | Introspy-iOS - Security profiling for blackbox iOS. 599 | JAADAS - Joint Advanced Defect assEsment for android applications. 600 | Keychain-Dumper - A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken. 601 | Mobile Security Framework - An intelligent, all-in-one open source mobile application (Android/iOS/Windows) automated pen-testing framework capable of performing static, dynamic analysis and web API testing. 602 | Objection - A runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak. 603 | QARK - QARK by LinkedIn is for app developers to scan app for security issues. 604 | Password Cracking 605 | BozoCrack - A silly & effective MD5 cracker in Ruby. 606 | Common-substr - Simple awk script to extract the most common substrings from an input text. Built for password cracking. 607 | HashCat - World's fastest and most advanced password recovery utility. 608 | Hashcrack - Guesses hash types, picks some sensible dictionaries and rules for hashcat. 609 | Hob0Rules - Password cracking rules for Hashcat based on statistics and industry patterns. 610 | John the Ripper - A fast password cracker. 611 | Kwprocessor - Advanced keyboard-walk generator with configureable basechars, keymap and routes. 612 | Mentalist - A graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat and John the Ripper. 613 | NPK - A mostly-serverless distributed hash cracking platform. 614 | Patator - Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. 615 | RSMangler - It will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras. 616 | THC-Hydra - A very fast network logon cracker which support many different services. 617 | Port Scanning 618 | Angry IP Scanner - Fast and friendly network scanner. 619 | Evilscan - NodeJS Simple Network Scanner. 620 | Flan - A pretty sweet vulnerability scanner. 621 | Masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. 622 | Nmap - Free Security Scanner For Network Exploration & Security Audits. 623 | Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool. 624 | ZGrab - Go Application Layer Scanner. 625 | Zmap - An open-source network scanner that enables researchers to easily perform Internet-wide network studies. 626 | Post Exploitation 627 | 3snake - Tool for extracting information from newly spawned processes. 628 | Apfell - A collaborative, multi-platform, red teaming framework. 629 | Backdoorme - Powerful auto-backdooring utility. 630 | CatTails - Raw socket library/framework for red team events. 631 | Cloudy-kraken - AWS Red Team Orchestration Framework. 632 | Covenant - Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers. 633 | CrackMapExec - A post-exploitation tool that helps automate assessing the security of large Active Directory networks. 634 | CredCrack - A fast and stealthy credential harvester. 635 | Creddump - Dump windows credentials. 636 | DBC2 - DropboxC2 is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means of communication. 637 | DET - (extensible) Data Exfiltration Toolkit (DET). 638 | DNSlivery - Easy files and payloads delivery over DNS. 639 | Dnsteal - DNS Exfiltration tool for stealthily sending files over DNS requests. 640 | Empire - Empire is a pure PowerShell post-exploitation agent. 641 | Enumdb - MySQL and MSSQL brute force and post exploitation tool to search through databases and extract sensitive information. 642 | EvilOSX - A pure python, post-exploitation, RAT (Remote Administration Tool) for macOS / OSX. 643 | Fireaway - Next Generation Firewall Audit and Bypass Tool. 644 | FruityC2 - A post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed from a web interface under the control of an operator. 645 | GetVulnerableGPO - PowerShell script to find 'vulnerable' security-related GPOs that should be hardended. 646 | Ghost In The Logs - Evade sysmon and windows event logging. 647 | HoneyBadger - A collection of Metasploit modules with a plugin to help automate Post-Exploitation actions on target systems using the Metasploit Framework. 648 | HoneypotBuster - Microsoft PowerShell module designed for red teams that can be used to find honeypots and honeytokens in the network or at the host. 649 | Iodine - Lets you tunnel IPv4 data through a DNS server. 650 | Koadic - Koadic C3 COM Command & Control - JScript RAT. 651 | Mallory - HTTP/HTTPS proxy over SSH. 652 | MicroBackdoor - C2 tool for Windows targets with easy customizable code base and small footprint. Micro Backdoor consists from server, client and dropper. It wasn't designed as replacement for your favorite post-exploitation tools but rather as really minimalistic thing with all of the basic features in less than 5000 lines of code. 653 | Mimikatz - A little tool to play with Windows security. 654 | Mimikittenz - A post-exploitation powershell tool for extracting juicy info from memory. 655 | NoPowerShell - PowerShell rebuilt in C# for Red Teaming purposes. 656 | Orc - A post-exploitation framework for Linux written in Bash. 657 | P0wnedShell - PowerShell Runspace Post Exploitation Toolkit. 658 | PacketWhisper - Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name Servers or domains; Evade DLP/MLS Devices; Defeat Data- & DNS Name Server Whitelisting Controls. Convert any file type (e.g. executables, Office, Zip, images) into a list of Fully Qualified Domain Names (FQDNs), use DNS queries to transfer data. Simple yet extremely effective. 659 | Paragon - Red Team engagement platform with the goal of unifying offensive tools behind a simple UI. 660 | Pivoter - A proxy tool for pentesters to have easier lateral movement. 661 | Poet - Post-exploitation tool. 662 | PoshC2 - A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement. 663 | PowerOPS - PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell "easier". 664 | ProcessHider - Post-exploitation tool for hiding processes from monitoring applications. 665 | Pupy - An opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python. 666 | Pwnat - Punches holes in firewalls and NATs allowing any numbers of clients behind NATs to directly connect to a server behind a different NAT. 667 | Pypykatz - Mimikatz implementation in pure Python. 668 | RedGhost - Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. 669 | RemoteRecon - Remote Recon and Collection. 670 | RottenPotatoNG - New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools. 671 | Rpc2socks - Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe. 672 | SafetyKatz - SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's .NET PE Load. 673 | Shad0w - A post exploitation framework designed to operate covertly on heavily monitored environments. 674 | SharpC2 - .NET Command & Control Framework 675 | SocksOverRDP - Socks5/4/4a Proxy support for Remote Desktop Protocol / Terminal Services. 676 | SpYDyishai - A Gmail credential harvester. 677 | SprayWMI - An easy way to get mass shells on systems that support WMI. Much more effective than PSEXEC as it does not leave remnants on a system. 678 | Tgcd - A simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls. 679 | TheFatRat - An easy tool to generate backdoor with msfvenom (a part from metasploit framework). This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection. 680 | WCE - Windows Credentials Editor (WCE) is a security tool to list logon sessions and add, change, list and delete associated credentials. 681 | Weasel - DNS covert channel implant for Red Teams. 682 | Reporting 683 | Cartography - A Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database. 684 | DefectDojo - An open-source application vulnerability correlation and security orchestration tool. 685 | Dradis - Colllaboration and reporting for IT Security teams. 686 | Faraday - Collaborative Penetration Test and Vulnerability Management Platform. 687 | VECTR - A tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios. 688 | Services 689 | SSLyze - SSL configuration scanner. 690 | Sslstrip - A demonstration of the HTTPS stripping attacks. 691 | Sslstrip2 - SSLStrip version to defeat HSTS. 692 | Tls_prober - Fingerprint a server's SSL/TLS implementation. 693 | Training 694 | Android-InsecureBankv2 - Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities. 695 | BadBlood - Fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. 696 | DIVA Android - Damn Insecure and vulnerable App for Android. 697 | DVCP-TE - Damn Vulnerable Chemical Process - Tennessee Eastman. 698 | DVWA - Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. 699 | DVWS - Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication. 700 | Don't Panic - Training linux bind shell with anti-reverse engineering techniques. 701 | GRFICS - A graphical realism framework for industrial control simulations that uses Unity 3D game engine graphics to lower the barrier to entry for industrial control system security. GRFICS provides users with a full virtual industrial control system (ICS) network to practice common attacks including command injection, man-in-the-middle, and buffer overflows, and visually see the impact of their attacks in the 3D visualization. Users can also practice their defensive skills by properly segmenting the network with strong firewall rules, or writing intrusion detection rules. 702 | Hackazon - A modern vulnerable web app. 703 | Insecure-deserialization-net-poc - A small webserver vulnerable to insecure deserialization. 704 | JuliaRT - Automated AD Pentest Lab Deployment in the Cloud: IaC Terraform and Ansible Playbook templates for deploying an Active Directory Domain in Azure. 705 | Kubernetes Goat - Designed to be intentionally vulnerable cluster environment to learn and practice Kubernetes security. 706 | OWASP Juice Shop - An intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. 707 | OWASP NodeGoat - An environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them. 708 | OWASP Railsgoat - A vulnerable version of Rails that follows the OWASP Top 10. 709 | OWASP Security Shepherd - A web and mobile application security training platform. 710 | OWASP WebGoat - A deliberately insecure Web Application. 711 | RopeyTasks - Deliberately vulnerable web application. 712 | Sadcloud - A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure. 713 | Sqli-labs - SQLI labs to test error based, Blind boolean based, Time based. 714 | WackoPicko - A vulnerable web application used to test web application vulnerability scanners. 715 | Xvwa - XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. 716 | Web 717 | Arachni - Web Application Security Scanner Framework. 718 | Argumentinjectionhammer - A Burp Extension designed to identify argument injection vulnerabilities. 719 | Autowasp - A Burp Suite extension that integrates Burp issues logging, with OWASP Web Security Testing Guide (WSTG), to provide a streamlined web security testing flow for the modern-day penetration tester! This tool will guide new penetration testers to understand the best practices of web application security and automate OWASP WSTG checks. 720 | BlackBox Protobuf Burp Extension - A Burp Suite extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition. 721 | BlindElephant - Web Application Fingerprinter. 722 | Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands. 723 | Burp Suite - An integrated platform for performing security testing of web applications. 724 | CloudScraper - Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space. 725 | Cms-explorer - CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running. 726 | Crlfuzz - A fast tool to scan CRLF vulnerability written in Go. 727 | Dirble - Fast directory scanning and scraping tool. 728 | Dvcs-ripper - Rip web accessible (distributed) version control systems. 729 | Fimap - Find, prepare, audit, exploit and even google automatically for LFI/RFI bugs. 730 | Gobuster - Directory/file & DNS busting tool written in Go. 731 | Jok3r - Network and Web Pentest Framework. 732 | Joomscan - Joomla CMS scanner. 733 | Jwt_tool - A toolkit for testing, tweaking and cracking JSON Web Tokens. 734 | Kadabra - Automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python. 735 | Kadimus - LFI scan and exploit tool. 736 | Konan - An advanced open source tool designed to brute force directories and files names on web/application servers. 737 | Liffy - LFI exploitation tool. 738 | LinkFinder - A python script that finds endpoints in JavaScript files. 739 | Netsparker - Web Application Security Scanner. 740 | Nikto2 - Web application vulnerability scanner. 741 | NoSQLMap - Automated Mongo database and NoSQL web application exploitation tool. 742 | OWASP Xenotix - XSS Exploit Framework is an advanced Cross Site Scripting (XSS) vulnerability detection and exploitation framework. 743 | Paros - A Java based HTTP/HTTPS proxy for assessing web application vulnerability. 744 | PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF. 745 | Php-jpeg-injector - Injects php payloads into jpeg images. 746 | Pyfiscan - Free web-application vulnerability and version scanner. 747 | Ratproxy - A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems. 748 | RecurseBuster - Rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments. 749 | Relative-url-extractor - A small tool that extracts relative URLs from a file. 750 | SQLMap - Automatic SQL injection and database takeover tool. 751 | SQLNinja - SQL Server injection & takeover tool. 752 | Scout2 - Security auditing tool for AWS environments. 753 | Skipfish - An active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. 754 | TPLMap - Automatic Server-Side Template Injection Detection and Exploitation Tool. 755 | Tracy - A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner. 756 | Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence. 757 | W3af - Web application attack and audit framework. 758 | WPScan - WPScan is a black box WordPress vulnerability scanner. 759 | WPSploit - Exploiting Wordpress With Metasploit. 760 | WS-Attacker - A modular framework for web services penetration testing. 761 | WStalker - An easy proxy. 762 | Wapiti - Web application vulnerability scanner. 763 | Wappalyzer - Cross-platform utility that uncovers the technologies used on websites. 764 | Weevely3 - Weaponized web shell. 765 | Wfuzz - Web application fuzzer. 766 | WhatWeb - Website Fingerprinter. 767 | Wordpress Exploit Framework - A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems. 768 | Wuzz - Interactive cli tool for HTTP inspection 769 | XSS-keylogger - A keystroke logger to exploit XSS vulnerabilities in a site. 770 | XSS-payload-list - XSS Payload list. 771 | XSpear - Powerfull XSS Scanning and Parameter analysis tool&gem. 772 | Yasuo - A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network. 773 | Zed Attack Proxy (ZAP) - The OWASP ZAP core project. 774 | x8-Burp - Hidden parameters discovery suite wrapper. 775 | Wireless 776 | Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program. 777 | Airgeddon - This is a multi-use bash script for Linux systems to audit wireless networks. 778 | Kismet - Wireless network detector, sniffer, and IDS. 779 | Krackattacks-scripts - Scripts to test if clients or access points (APs) are affected by the KRACK attack against WPA2. 780 | LANs.py - Inject code, jam wifi, and spy on wifi users. 781 | Mass-deauth - A script for 802.11 mass-deauthentication. 782 | Reaver - Brute force attack against Wifi Protected Setup. 783 | Sniffle - A sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware. 784 | WiFiDuck - Wireless keystroke injection attack platform. 785 | Wifijammer - Continuously jam all wifi clients/routers. 786 | Wifikill - A python program to kick people off of wifi. 787 | Wifiphisher - Automated phishing attacks against Wi-Fi networks. 788 | Wifite - Automated wireless attack tool. 789 | Reverse Engineering 790 | APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android. 791 | AndBug - A debugger targeting the Android platform's Dalvik virtual machine intended for reverse engineers and developers. 792 | Angr - A platform-agnostic binary analysis framework developed by the Computer Security Lab at UC Santa Barbara and their associated CTF team, Shellphish. 793 | AngryGhidra - Angr plugin for Ghidra. 794 | Apk2Gold - Yet another Android decompiler. 795 | ApkTool - A tool for reverse engineering Android apk files. 796 | Avscript - Avast JavaScript Interactive Shell. 797 | B2R2 - A collection of useful algorithms, functions, and tools for binary analysis. 798 | Barf - Binary Analysis and Reverse engineering Framework. 799 | BinText - A small, very fast and powerful text extractor. 800 | BinWalk - Analyze, reverse engineer, and extract firmware images. 801 | Binaryanalysis-ng - Binary Analysis Next Generation is a framework for unpacking files (like firmware) recursively and running checks on the unpacked files. Its intended use is to be able to find out the provenance of the unpacked files and classify/label files, making them available for further analysis. 802 | Binee - A complete binary emulation environment that focuses on introspection of all IO operations. 803 | Boomerang - Decompile x86/SPARC/PowerPC/ST-20 binaries to C. 804 | Bytecode-viewer - A Java 8 Jar & Android APK Reverse Engineering Suite (Decompiler, Editor, Debugger & More). 805 | Bytecode_graph - Module designed to modify Python bytecode. Allows instructions to be added or removed from a Python bytecode string. 806 | CHIPSEC - Platform Security Assessment Framework. 807 | Capstone - Lightweight multi-platform, multi-architecture disassembly framework with Python bindings. 808 | ClassNameDeobfuscator - Simple script to parse through the .smali files produced by apktool and extract the .source annotation lines. 809 | Coda - Coredump analyzer. 810 | Ctf_import - Run basic functions from stripped binaries cross platform. 811 | DBI - Dynamic Binary Instrumentation plugins. 812 | Dex2jar - Tools to work with android .dex and java .class files. 813 | Distorm - Powerful Disassembler Library For x86/AMD64. 814 | DotPeek - A free-of-charge .NET decompiler from JetBrains. 815 | Dotnet-netrace - Collects network traces of .NET applications. 816 | Dragondance - Binary code coverage visualizer plugin for Ghidra. 817 | Dwarf - A gui for mobile reverse engineers, crackers and security analyst. Or damn, what a reversed fluffy or yet, duck warrios are rich as fuck. Whatever you like! Built on top of pyqt5, frida and some terrible code. 818 | DynStruct - Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone. 819 | EFI DXE Emulator - An EFI DXE phase binaries emulator based on Unicorn. 820 | Edb - A cross platform x86/x86-64 debugger. 821 | Enjarify - A tool for translating Dalvik bytecode to equivalent Java bytecode. This allows Java analysis tools to analyze Android applications. 822 | Fibratus - Tool for exploration and tracing of the Windows kernel. 823 | Fino - An Android Dynamic Analysis Tool. 824 | Flare-emu - It marries a supported binary analysis framework, such as IDA Pro or Radare2, with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks. It is designed to handle all the housekeeping of setting up a flexible and robust emulator for its supported architectures so that you can focus on solving your code analysis problems.re 825 | Flare-ida - IDA Pro utilities from FLARE team. 826 | Frida - Inject JavaScript to explore native apps on Windows, macOS, Linux, iOS, Android, and QNX. 827 | Frida-scripts - These scripts will help in security research and automation. 828 | GEF - Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers. 829 | Gdb-dashboard - Modular visual interface for GDB in Python. 830 | Gdbstub - A simple, dependency-free GDB stub that can be easily dropped in to your project. 831 | Ghidra - A software reverse engineering (SRE) framework. 832 | Ghidra_kernelcache - A Ghidra framework for iOS kernelcache reverse engineering. 833 | Ghidra_scripts - Scripts for the Ghidra software reverse engineering suite. 834 | Golang_loader_assist - Making GO reversing easier in IDA Pro. 835 | Granary - A kernel space dynamic binary translation framework. The main goal of Granary is to enable flexible and efficient instrumentation of Linux kernel modules, while imposing no overhead to non-module kernel code. 836 | Grap - Define and match graph patterns within binaries. 837 | HVMI - Hypervisor Memory Introspection Core Library. 838 | Haybale - Symbolic execution of LLVM IR with an engine written in Rust. 839 | Heap-viewer - An IDA Pro plugin to examine the glibc heap, focused on exploit development. 840 | HexRaysCodeXplorer - Hex-Rays Decompiler plugin for better code navigation 841 | Hopper - A OS X and Linux Disassembler/Decompiler for 32/64 bit Windows/Mac/Linux/iOS executables. 842 | ICSREF - A tool for reverse engineering industrial control systems binaries. 843 | IDA Free - The freeware version of IDA. 844 | IDA Patcher - IDA Patcher is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's ability to patch binary files and memory. 845 | IDA Pomidor - IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing sessions. 846 | IDA Pro - A Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger. 847 | IDA Sploiter - IDA Sploiter is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's capabilities as an exploit development and vulnerability research tool. 848 | IDAPython - An IDA plugin which makes it possible to write scripts for IDA in the Python programming language. 849 | IDAwasm - IDA Pro loader and processor modules for WebAssembly. 850 | IRPMon - The goal of the tool is to monitor requests received by selected device objects or kernel drivers. The tool is quite similar to IrpTracker but has several enhancements. It supports 64-bit versions of Windows (no inline hooks are used, only modifications to driver object structures are performed) and monitors IRP, FastIo, AddDevice, DriverUnload and StartIo requests. 851 | Idaemu - Is an IDA Pro Plugin, use for emulating code in IDA Pro. 852 | Immunity Debugger - A powerful new way to write exploits and analyze malware. 853 | JAD - JAD Java Decompiler. 854 | JD-GUI - Aims to develop tools in order to decompile and analyze Java 5 “byte code” and the later versions. 855 | Jadx - Decompile Android files. 856 | Keystone Engine - A lightweight multi-platform, multi-architecture assembler framework. 857 | Krakatau - Java decompiler, assembler, and disassembler. 858 | Levitate - Reverse Engineering and Static Malware Analysis Platform. 859 | MARA Framework - A Mobile Application Reverse engineering and Analysis Framework. 860 | Manticore - Prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation. 861 | Medusa - A disassembler designed to be both modular and interactive. 862 | MegaDumper - Dump native and .NET assemblies. 863 | Minhook - The Minimalistic x86/x64 API Hooking Library for Windows. 864 | Mona.py - PyCommand for Immunity Debugger that replaces and improves on pvefindaddr. 865 | OllyDbg - An x86 debugger that emphasizes binary code analysis. 866 | PEDA - Python Exploit Development Assistance for GDB. 867 | Paimei - Reverse engineering framework, includes PyDBG, PIDA, pGRAPH. 868 | Pigaios - A tool for matching and diffing source codes directly against binaries. 869 | Plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code. 870 | Ponce - An IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in an easy and intuitive fashion. With Ponce you are one click away from getting all the power from cutting edge symbolic execution. Entirely written in C/C++. 871 | Procyon - A modern open-source Java decompiler. 872 | Protobuf-inspector - Tool to reverse-engineer Protocol Buffers with unknown definition. 873 | Pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy. 874 | Pyew - Command line hexadecimal editor and disassembler, mainly to analyze malware. 875 | QBDI - A Dynamic Binary Instrumentation framework based on LLVM. 876 | Qira - QEMU Interactive Runtime Analyser. 877 | R2MSDN - R2 plugin to add MSDN documentation URLs and parameter names to imported function calls. 878 | RABCDAsm - Robust ABC (ActionScript Bytecode) [Dis-]Assembler. 879 | Radare2 - Opensource, crossplatform reverse engineering framework. 880 | Radare2-bindings - Bindings of the r2 api for Valabind and friends. 881 | Redexer - A reengineering tool that manipulates Android app binaries. 882 | Rizin - A fork of the radare2 reverse engineering framework with a focus on usability, working features and code cleanliness. 883 | ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API. 884 | Shed - .NET runtime inspector. 885 | Simplify - Generic Android Deobfuscator. 886 | SimplifyGraph - IDA Pro plugin to assist with complex graphs. 887 | Smali - Smali/baksmali is an assembler/disassembler for the dex format used by dalvik, Android's Java VM implementation. 888 | Sojobo - An emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other external libraries. 889 | Swiffas - SWF parser and AVM2 (Actionscript 3) bytecode parser. 890 | Swift-frida - Frida library for interacting with Swift programs. 891 | Toolbag - The IDA Toolbag is a plugin providing supplemental functionality to Hex-Rays IDA Pro disassembler. 892 | Triton - Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a dynamic taint engine, AST representations of the x86, x86-64, ARM32 and AArch64 Instructions Set Architecture (ISA), SMT simplification passes, an SMT solver interface and, the last but not least, Python bindings. 893 | UPX - The Ultimate Packer for eXecutables. 894 | Ufgraph - A simple script which parses the output of the uf (un-assemble function) command in windbg and uses graphviz to generate a control flow graph as a PNG/SVG/PDF/GIF (see -of option) and displays it. 895 | Uncompyle - Decompile Python 2.7 binaries (.pyc). 896 | Unicorn Engine - A lightweight, multi-platform, multi-architecture CPU emulator framework based on QEMU. 897 | Unlinker - Unlinker is a tool that can rip functions out of Visual C++ compiled binaries and produce Visual C++ COFF object files. 898 | VMX_INTRINSICS - VMX intrinsics plugin for Hex-Rays decompiler. 899 | VT-IDA Plugin - Official VirusTotal plugin for IDA Pro. 900 | Voltron - An extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg) by enabling the attachment of utility views that can retrieve and display data from the debugger host. 901 | WinDbg - Windows Driver Kit and WinDbg. 902 | WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security. 903 | WinIPT - The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by Windows 10 Redstone 5 (1809), through a set of libraries and a command-line tool. 904 | X64_dbg - An open-source x64/x32 debugger for windows. 905 | Xxxswf - A Python script for analyzing Flash files. 906 | YaCo - An Hex-Rays IDA plugin. When enabled, multiple users can work simultaneously on the same binary. Any modification done by any user is synchronized through git version control. 907 | uEmu - Tiny cute emulator plugin for IDA based on unicorn. 908 | Security 909 | Asset Management 910 | Cloud Security 911 | Aws-nuke - Nuke a whole AWS account and delete all its resources. 912 | Azucar - Security auditing tool for Azure environments. 913 | CloudMapper - CloudMapper helps you analyze your Amazon Web Services (AWS) environments. 914 | Hammer - Dow Jones Hammer : Protect the cloud with the power of the cloud(AWS). 915 | IAMFinder - Enumerates and finds users and IAM roles in a target AWS account. With only the AWS account number of the targeted account, IAMFinder is able to identify users and roles in that environment. Upon successfully identifying an IAM role, IAMFinder can also check if this role can be assumed anonymously. 916 | Panther - A Cloud-Native SIEM for the Modern Security Team 917 | Parliament - An AWS IAM linting library. It reviews policies looking for problems. 918 | Patrolaroid - An instant camera for capturing cloud workload risks. It’s a prod-friendly scanner that makes finding security issues in AWS instances and buckets less annoying and disruptive for software engineers and cloud admins. 919 | Security Monkey - Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time. 920 | Varna - Quick & Cheap AWS CloudTrail Monitoring with Event Query Language (EQL) 921 | Resources - s3cr3t - Serve files securely from an S3 bucket with expiring links and other restrictions. 922 | 923 | DevOps 924 | Trivy - A simple and comprehensive vulnerability scanner for containers and other artifacts. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Trivy is easy to use. 925 | Endpoint Security 926 | AIDE - Advanced Intrusion Detection Environment is a file and directory integrity checker. 927 | Duckhunt - Prevent RubberDucky (or other keystroke injection) attacks. 928 | Hardentools - A utility that disables a number of risky Windows features. 929 | Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. 930 | OpenEDR - A full blown EDR capability. It is one of the most sophisticated, effective EDR code base in the world and with the community’s help it will become even better. 931 | Osx-config-check - Verify the configuration of your OS X machine. 932 | ProcMon-for-Linux - A Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system. 933 | Xnumon - Monitor macOS for malicious activity. 934 | Network Security 935 | AdGuardHome - Network-wide ads & trackers blocking DNS server. 936 | EveBox - A web based Suricata "eve" event viewer for Elastic Search. 937 | Pi-hole - A DNS sinkhole that protects your devices from unwanted content, without installing any client-side software. 938 | Scirius - A web application for Suricata ruleset management. 939 | Orchestration 940 | Stoq - An open source framework for enterprise level automated analysis. 941 | Phishing 942 | Miteru - An experimental phishing kit detection tool. 943 | StreamingPhish - Python-based utility that uses supervised machine learning to detect phishing domains from the Certificate Transparency log network. 944 | Privacy 945 | Git-crypt - Transparent file encryption in git. 946 | GoSecure - An easy to use and portable Virtual Private Network (VPN) system built with Linux and a Raspberry Pi. 947 | I2P - The Invisible Internet Project. 948 | Nipe - A script to make Tor Network your default gateway. 949 | SecureDrop - Open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. 950 | Sshuttle - Transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling. 951 | Tomb - A minimalistic commandline tool to manage encrypted volumes aka The Crypto Undertaker. 952 | Tor - The free software for enabling onion routing online anonymity. 953 | Toriptables2 - A python script alternative to Nipe. Makes Tor Network your default gateway. 954 | Social Engineering 955 | Framework 956 | SET - The Social-Engineer Toolkit from TrustedSec. 957 | Harvester 958 | Creepy - A geolocation OSINT tool. 959 | Datasploit - A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data. 960 | Email-enum - Searches mainstream websites and tells you if an email is registered. 961 | Github-dorks - CLI tool to scan github repos/organizations for potential sensitive information leak. 962 | Maltego - Proprietary software for open source intelligence and forensics, from Paterva. 963 | Metagoofil - Metadata harvester. 964 | SpiderFoot - Automates OSINT collection so that you can focus on analysis. 965 | TTSL - Tool to scrape LinkedIn. 966 | TheHarvester - E-mail, subdomain and people names harvester. 967 | Phishing 968 | BlackPhish - Super lightweight with many features and blazing fast speeds. 969 | Blackeye - The most complete Phishing Tool, with 32 templates +1 customizable. 970 | CredSniper - A phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens. 971 | FiercePhish - A full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. 972 | GoPhish - Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. 973 | Lockphish - Lockphish it's the first tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link. 974 | Modlishka - Reverse Proxy. Phishing NG. 975 | Muraena - An almost-transparent reverse proxy aimed at automating phishing and post-phishing activities. 976 | Phishing-frenzy - Ruby on Rails Phishing Framework. 977 | Pompa - Fully-featured spear-phishing toolkit - web front-end. 978 | Whatsapp-phishing - The best tool for whatsapp-phishing with otp provider. 979 | Wardialing 980 | Voipwardialer - A Voip Wardialer for the phreaking of 2020. 981 | -------------------------------------------------------------------------------- /Reverse Engineering/DotPeek.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.jetbrains.com/decompiler/ 3 | -------------------------------------------------------------------------------- /Reverse Engineering/Hopper.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.hopperapp.com/ 3 | -------------------------------------------------------------------------------- /Reverse Engineering/IDAFree.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.hex-rays.com/products/ida/support/download_freeware.shtml 3 | -------------------------------------------------------------------------------- /Reverse Engineering/IDAPro.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.hex-rays.com/products/ida/index.shtml 3 | -------------------------------------------------------------------------------- /Reverse Engineering/ImmunityDebugger.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://debugger.immunityinc.com 3 | -------------------------------------------------------------------------------- /Reverse Engineering/JAD.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://varaneckas.com/jad/ 3 | -------------------------------------------------------------------------------- /Reverse Engineering/OllyDbg.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.ollydbg.de 3 | -------------------------------------------------------------------------------- /Reverse Engineering/Procyon.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://bitbucket.org/mstrobel/procyon 3 | -------------------------------------------------------------------------------- /Reverse Engineering/WinDbg.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://developer.microsoft.com/en-us/windows/hardware/windows-driver-kit 3 | -------------------------------------------------------------------------------- /Reverse Engineering/WinHex.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=http://www.winhex.com/winhex/ 3 | X-Download=http://www.x-ways.net/winhex.zip 4 | -------------------------------------------------------------------------------- /Security/Privacy/I2P.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://geti2p.net/ 3 | -------------------------------------------------------------------------------- /Security/Privacy/Tor.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.torproject.org 3 | -------------------------------------------------------------------------------- /Social Engineering/Harvester/Maltego.url: -------------------------------------------------------------------------------- 1 | [InternetShortcut] 2 | URL=https://www.paterva.com 3 | -------------------------------------------------------------------------------- /_pages/conf.py: -------------------------------------------------------------------------------- 1 | # -*- coding: utf-8 -*- 2 | 3 | import sys 4 | import os 5 | import alabaster 6 | from datetime import datetime 7 | 8 | # If extensions (or modules to document with autodoc) are in another directory, 9 | # add these directories to sys.path here. If the directory is relative to the 10 | # documentation root, use os.path.abspath to make it absolute, like shown here. 11 | #sys.path.insert(0, os.path.abspath('.')) 12 | 13 | # -- General configuration ----------------------------------------------------- 14 | 15 | # If your documentation needs a minimal Sphinx version, state it here. 16 | #needs_sphinx = '1.0' 17 | 18 | # Add any Sphinx extension module names here, as strings. They can be extensions 19 | # coming with Sphinx (named 'sphinx.ext.*') or your custom ones. 20 | extensions = ['alabaster'] 21 | 22 | # Add any paths that contain templates here, relative to this directory. 23 | templates_path = ['_templates'] 24 | 25 | # The suffix of source filenames. 26 | source_suffix = '.rst' 27 | 28 | # The encoding of source files. 29 | #source_encoding = 'utf-8-sig' 30 | 31 | # The master toctree document. 32 | master_doc = 'index' 33 | 34 | # General information about the project. 35 | project = u'Awesome Hacking' 36 | year = datetime.now().year 37 | copyright = u'{0}, Alessandro Tanasi (@jekil)'.format(year) 38 | 39 | # The version info for the project you're documenting, acts as replacement for 40 | # |version| and |release|, also used in various other places throughout the 41 | # built documents. 42 | # 43 | # The short X.Y version. 44 | version = '0.1' 45 | # The full version, including alpha/beta/rc tags. 46 | release = '0.1' 47 | 48 | # The language for content autogenerated by Sphinx. Refer to documentation 49 | # for a list of supported languages. 50 | #language = None 51 | 52 | # There are two options for replacing |today|: either, you set today to some 53 | # non-false value, then it is used: 54 | #today = '' 55 | # Else, today_fmt is used as the format for a strftime call. 56 | #today_fmt = '%B %d, %Y' 57 | 58 | # List of patterns, relative to source directory, that match files and 59 | # directories to ignore when looking for source files. 60 | exclude_patterns = ['_build'] 61 | 62 | # The reST default role (used for this markup: `text`) to use for all documents. 63 | #default_role = None 64 | 65 | # If true, '()' will be appended to :func: etc. cross-reference text. 66 | #add_function_parentheses = True 67 | 68 | # If true, the current module name will be prepended to all description 69 | # unit titles (such as .. function::). 70 | #add_module_names = True 71 | 72 | # If true, sectionauthor and moduleauthor directives will be shown in the 73 | # output. They are ignored by default. 74 | #show_authors = False 75 | 76 | # The name of the Pygments (syntax highlighting) style to use. 77 | pygments_style = 'sphinx' 78 | 79 | # A list of ignored prefixes for module index sorting. 80 | #modindex_common_prefix = [] 81 | 82 | # If true, keep warnings as "system message" paragraphs in the built documents. 83 | #keep_warnings = False 84 | 85 | 86 | # -- Options for HTML output --------------------------------------------------- 87 | 88 | # The theme to use for HTML and HTML Help pages. See the documentation for 89 | # a list of builtin themes. 90 | html_theme = 'alabaster' 91 | 92 | # Theme options are theme-specific and customize the look and feel of a theme 93 | # further. For a list of options available for each theme, see the 94 | # documentation. 95 | html_theme_options = { 96 | #'logo': 'logo.png', 97 | #'logo_name': True, 98 | #'logo_text_align': 'center', 99 | 'description': "A curatet list and an Hacker's toolset", 100 | 'github_button': 'true', 101 | 'github_user': 'jekil', 102 | 'github_repo': 'awesome-hacking', 103 | 'github_type': 'star', 104 | 'github_count': 'true', 105 | 'github_banner': 'true', 106 | 'travis_button': 'false', 107 | 'gratipay_user': 'jekil', 108 | 'analytics_id': 'UA-2317228-22', 109 | #'link': '#3782BE', 110 | #'link_hover': '#3782BE', 111 | 'show_powered_by': 'false', 112 | } 113 | 114 | # Add any paths that contain custom themes here, relative to this directory. 115 | html_theme_path = [alabaster.get_path()] 116 | 117 | # The name for this set of Sphinx documents. If None, it defaults to 118 | # " v documentation". 119 | #html_title = None 120 | 121 | # A shorter title for the navigation bar. Default is the same as html_title. 122 | #html_short_title = None 123 | 124 | # The name of an image file (relative to this directory) to place at the top 125 | # of the sidebar. 126 | #html_logo = "_images/logo_small.png" 127 | 128 | # The name of an image file (within the static path) to use as favicon of the 129 | # docs. This file should be a Windows icon file (.ico) being 16x16 or 32x32 130 | # pixels large. 131 | #html_favicon = None 132 | 133 | # Add any paths that contain custom static files (such as style sheets) here, 134 | # relative to this directory. They are copied after the builtin static files, 135 | # so a file named "default.css" will overwrite the builtin "default.css". 136 | html_static_path = ['_static'] 137 | 138 | # If not '', a 'Last updated on:' timestamp is inserted at every page bottom, 139 | # using the given strftime format. 140 | #html_last_updated_fmt = '%b %d, %Y' 141 | 142 | # If true, SmartyPants will be used to convert quotes and dashes to 143 | # typographically correct entities. 144 | #html_use_smartypants = True 145 | 146 | # Custom sidebar templates, maps document names to template names. 147 | html_sidebars = { 148 | '**': [ 149 | 'about.html', 150 | 'navigation.html', 151 | 'searchbox.html', 152 | #'donate.html', 153 | ] 154 | } 155 | 156 | # Additional templates that should be rendered to pages, maps page names to 157 | # template names. 158 | #html_additional_pages = {} 159 | 160 | # If false, no module index is generated. 161 | #html_domain_indices = True 162 | 163 | # If false, no index is generated. 164 | #html_use_index = True 165 | 166 | # If true, the index is split into individual pages for each letter. 167 | #html_split_index = False 168 | 169 | # If true, links to the reST sources are added to the pages. 170 | #html_show_sourcelink = True 171 | 172 | # If true, "Created using Sphinx" is shown in the HTML footer. Default is True. 173 | #html_show_sphinx = True 174 | 175 | # If true, "(C) Copyright ..." is shown in the HTML footer. Default is True. 176 | #html_show_copyright = True 177 | 178 | # If true, an OpenSearch description file will be output, and all pages will 179 | # contain a tag referring to it. The value of this option must be the 180 | # base URL from which the finished HTML is served. 181 | #html_use_opensearch = '' 182 | 183 | # This is the file name suffix for HTML files (e.g. ".xhtml"). 184 | #html_file_suffix = None 185 | 186 | # Output file base name for HTML help builder. 187 | htmlhelp_basename = 'AwesomeHacking' 188 | 189 | 190 | # -- Options for LaTeX output -------------------------------------------------- 191 | 192 | latex_elements = { 193 | # The paper size ('letterpaper' or 'a4paper'). 194 | #'papersize': 'letterpaper', 195 | 196 | # The font size ('10pt', '11pt' or '12pt'). 197 | #'pointsize': '10pt', 198 | 199 | # Additional stuff for the LaTeX preamble. 200 | #'preamble': '', 201 | } 202 | 203 | # Grouping the document tree into LaTeX files. List of tuples 204 | # (source start file, target name, title, author, documentclass [howto/manual]). 205 | latex_documents = [ 206 | ('index', 'AwesomeHacking.tex', u'Awesome Hacking', u'', 'manual'), 207 | ] 208 | 209 | # The name of an image file (relative to this directory) to place at the top of 210 | # the title page. 211 | #latex_logo = "_images/logo.png" 212 | 213 | # For "manual" documents, if this is true, then toplevel headings are parts, 214 | # not chapters. 215 | #latex_use_parts = False 216 | 217 | # If true, show page references after internal links. 218 | #latex_show_pagerefs = False 219 | 220 | # If true, show URL addresses after external links. 221 | #latex_show_urls = False 222 | 223 | # Documents to append as an appendix to all manuals. 224 | #latex_appendices = [] 225 | 226 | # If false, no module index is generated. 227 | #latex_domain_indices = True 228 | 229 | 230 | # -- Options for manual page output -------------------------------------------- 231 | 232 | # One entry per manual page. List of tuples 233 | # (source start file, name, description, authors, manual section). 234 | man_pages = [ 235 | ('index', 'awesomehacking', u'Awesome Hacking', 236 | [u'Alessandro Tanasi'], 1) 237 | ] 238 | 239 | # If true, show URL addresses after external links. 240 | #man_show_urls = False 241 | 242 | 243 | # -- Options for Texinfo output ------------------------------------------------ 244 | 245 | # Grouping the document tree into Texinfo files. List of tuples 246 | # (source start file, target name, title, author, 247 | # dir menu entry, description, category) 248 | texinfo_documents = [ 249 | ('index', 'Awesome Hacking', u'Awesome Hacking', 250 | u'Alessandro Tanasi', 'Awesome Hacking', 'One line description of project.', 251 | 'Miscellaneous'), 252 | ] 253 | 254 | # Documents to append as an appendix to all manuals. 255 | #texinfo_appendices = [] 256 | 257 | # If false, no module index is generated. 258 | #texinfo_domain_indices = True 259 | 260 | # How to display URL addresses: 'footnote', 'no', or 'inline'. 261 | #texinfo_show_urls = 'footnote' 262 | 263 | # If true, do not generate a @detailmenu in the "Top" node's menu. 264 | #texinfo_no_detailmenu = False 265 | -------------------------------------------------------------------------------- /_pages/contribute.rst: -------------------------------------------------------------------------------- 1 | *********************** 2 | Contribution Guidelines 3 | *********************** 4 | 5 | I would love every kind of **contribution**, we need everyone help to run this project! 6 | 7 | Please send your contribution using Github `pull requests `_ or just get in touch with me (`@jekil `_). 8 | 9 | Thank you for your contribuition! 10 | 11 | Quality standard 12 | ---------------- 13 | 14 | This is a curated list, not a comprehensive list, so contents should be cool. 15 | To stay on the list, tools should adhere to these quality standards: 16 | 17 | * Generally useful to the community 18 | * Functional and cool 19 | * Maintained 20 | 21 | Adding to this list 22 | ------------------- 23 | 24 | Do you want to get a tool listed or add your own tool? 25 | Please prepare your pull following some suggestions: 26 | 27 | * Do not add duplicates: search the list before adding a new tool. 28 | * Make sure the tool is useful before submitting, it should be a maintained or at leats still in use tool. 29 | * Make an individual pull request for each suggestion. 30 | * Use the syntax used in the list. 31 | * List items should be sorted alphabetically. 32 | * Do not add descriptions too long, few lineas are enough. Be clear, concise and non-promotional. 33 | * New categories or improvements to the existing categorization are welcome, although it is a good idea to discuss toghever big refactoring. 34 | * Check your spelling and grammar. 35 | * Make sure your text editor is set to remove trailing whitespace. 36 | * The pull request and commit should have a descriptive title. 37 | * Please write descriptive commit messages. 38 | 39 | Edit / Fix the list 40 | ------------------- 41 | 42 | Any fix or improvment to the list is welcome, for example: 43 | 44 | * If you have found a typo. 45 | * If you want to improve a description. 46 | * If you have any issues accessing a linked tool. 47 | 48 | ------------------------------------ 49 | Contributor Covenant Code of Conduct 50 | ------------------------------------ 51 | 52 | Our Pledge 53 | ---------- 54 | 55 | In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation. 56 | 57 | Our Standards 58 | ------------- 59 | 60 | Examples of behavior that contributes to creating a positive environment include: 61 | 62 | * Using welcoming and inclusive language 63 | * Being respectful of differing viewpoints and experiences 64 | * Gracefully accepting constructive criticism 65 | * Focusing on what is best for the community 66 | * Showing empathy towards other community members 67 | 68 | Examples of unacceptable behavior by participants include: 69 | 70 | * The use of sexualized language or imagery and unwelcome sexual attention or advances 71 | * Trolling, insulting/derogatory comments, and personal or political attacks 72 | * Public or private harassment 73 | * Publishing others' private information, such as a physical or electronic address, without explicit permission 74 | * Other conduct which could reasonably be considered inappropriate in a professional setting 75 | 76 | Our Responsibilities 77 | -------------------- 78 | 79 | Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior. 80 | 81 | Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful. 82 | 83 | Scope 84 | ----- 85 | 86 | This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers. 87 | 88 | Enforcement 89 | ----------- 90 | 91 | Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at `@jekil `_. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately. 92 | 93 | Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership. 94 | 95 | Attribution 96 | ----------- 97 | 98 | This Code of Conduct is adapted from the `Contributor Covenant `_, version 1.4, available at `http://contributor-covenant.org/version/1/4 `_. -------------------------------------------------------------------------------- /requirements.txt: -------------------------------------------------------------------------------- 1 | alabaster==0.7.12 2 | Sphinx==2.0.1 3 | ghp-import==0.5.5 4 | --------------------------------------------------------------------------------