├── README.md └── firefox ├── bookmarks.json └── bookmarks.html /README.md: -------------------------------------------------------------------------------- 1 | # pentest-links: hacking tools, in context 2 | 3 | This repository contains pointers to hacking resources in a bunch of useful formats that you can import to your environment (browser, distro, etc.) and then personalize as you please. Kind of an [Awesome List](https://github.com/sindresorhus/awesome), but "importable" in an appropriate context so that the listed resources are actually available to you when you need them. Hopefully, this makes the list more useful and less overwhelming. 4 | 5 | For example, [anqxe/awesome-pentest](https://github.com/enaqx/awesome-pentest) lists some great Web-based information gathering tools (like Shodan and Censys). In this repository, the homepages for these tools are "listed" as entries in the [`firefox/bookmarks.json`](firefox/bookmarks.json) file, which is intended to be imported to a Mozilla Firefox (or derivative) browser, resulting in a Bookmarks Toolbar containing bookmarks to these resources. 6 | 7 | See also [meirwah/awesome-incident-response](https://github.com/meirwah/awesome-incident-response) for great forensic analysis tools and resources. 8 | 9 |  10 | 11 | Where a "compiled" version of a tool is not offered in this repository, it is instead listed in the context of its use in this README. (See below.) 12 | 13 | This is a personal collection, though suggestions and contributions are heartily welcomed. :) 14 | 15 | * [Browser Add-Ons](#browser-add-ons) 16 | 17 | # Browser Add-Ons 18 | 19 | # Proxy managers 20 | 21 | * [FoxyProxy](https://getfoxyproxy.org/) - Flexible proxy management based on URL patterns. 22 | * [Firefox](https://addons.mozilla.org/firefox/addon/foxyproxy-standard/) 23 | * [Chrome](https://chrome.google.com/webstore/detail/foxyproxy-standard/gcknhkkoolaabfmlnjonogaaifnjlfnp) 24 | 25 | ## For information gathering 26 | 27 | * [Wappalyzer](https://wappalyzer.com/) - Uncovers the technologies used on websites. It detects content management systems, eCommerce platforms, web servers, JavaScript frameworks, analytics tools and many more. 28 | * [Firefox](https://addons.mozilla.org/firefox/addon/wappalyzer/) 29 | * [Chrome](https://chrome.google.com/webstore/detail/wappalyzer/gppongmhjkpfnbhagpmjfkannfbllamg) 30 | 31 | ## For vulnerability analysis and discovery 32 | 33 | * XSS Me - In-browser XSS discovery helper. 34 | * [Firefox](https://addons.mozilla.org/firefox/addon/xss-me/) 35 | * SQL Inject Me - In-browser SQLi discovery helper. 36 | * [Firefox](https://addons.mozilla.org/firefox/addon/sql-inject-me/) 37 | * HackBar - In-browser shortcuts for common Web app pentesting techniques. 38 | * [Firefox](https://addons.mozilla.org/firefox/addon/hackbar/) 39 | * Cookies Manager+ - Full-featured cookie editing and exporting tool. 40 | * [Firefox](https://addons.mozilla.org/firefox/addon/cookies-manager-plus/) 41 | -------------------------------------------------------------------------------- /firefox/bookmarks.json: -------------------------------------------------------------------------------- 1 | {"guid":"root________","title":"","index":0,"dateAdded":1463647765543000,"lastModified":1479424899170000,"id":1,"type":"text/x-moz-place-container","root":"placesRoot","children":[{"guid":"menu________","title":"Bookmarks Menu","index":0,"dateAdded":1463647765543000,"lastModified":1479424899170000,"id":2,"type":"text/x-moz-place-container","root":"bookmarksMenuFolder","children":[{"guid":"6QMbdiXwvCqr","title":"Recently Bookmarked","index":0,"dateAdded":1463528116235000,"lastModified":1479424898997000,"id":24,"type":"text/x-moz-place","uri":"place:folder=BOOKMARKS_MENU&folder=UNFILED_BOOKMARKS&folder=TOOLBAR&queryType=1&sort=12&maxResults=10&excludeQueries=1"},{"guid":"ata30MrO6yfB","title":"Recent Tags","index":1,"dateAdded":1479424899170000,"lastModified":1479424899186000,"id":105,"annos":[{"name":"Places/SmartBookmark","flags":0,"expires":4,"value":"RecentTags"}],"type":"text/x-moz-place","uri":"place:type=6&sort=14&maxResults=10"},{"guid":"gh0vhAlmto1t","index":2,"dateAdded":1463528116274000,"lastModified":1463528116274000,"id":26,"type":"text/x-moz-place-separator"},{"guid":"N22YMunNMcMP","title":"Mozilla Firefox","index":3,"dateAdded":1463528116203000,"lastModified":1463528116206000,"id":27,"type":"text/x-moz-place-container","children":[{"guid":"0H-QcsZm3Q04","title":"Help and Tutorials","index":0,"dateAdded":1463528116204000,"lastModified":1463528116204000,"id":28,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/1-1463528116204","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/firefox/help/"},{"guid":"k0FuWAHzYqYO","title":"Customize Firefox","index":1,"dateAdded":1463528116204000,"lastModified":1463528116205000,"id":29,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/2-1463528116204","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/firefox/customize/"},{"guid":"8Eb1ILFlEpVu","title":"Get Involved","index":2,"dateAdded":1463528116205000,"lastModified":1463528116205000,"id":30,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/3-1463528116205","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/contribute/"},{"guid":"pTC2r7WdI0yo","title":"About Us","index":3,"dateAdded":1463528116206000,"lastModified":1463528116206000,"id":31,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/4-1463528116206","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/about/"}]}]},{"guid":"toolbar_____","title":"Bookmarks Toolbar","index":1,"dateAdded":1463647765543000,"lastModified":1479424899111000,"id":3,"annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Add bookmarks to this folder to see them displayed on the Bookmarks Toolbar"}],"type":"text/x-moz-place-container","root":"toolbarFolder","children":[{"guid":"cdB6FPIpySUu","title":"Most Visited","index":0,"dateAdded":1479424899111000,"lastModified":1479424899155000,"id":104,"annos":[{"name":"Places/SmartBookmark","flags":0,"expires":4,"value":"MostVisited"}],"type":"text/x-moz-place","uri":"place:sort=8&maxResults=10"},{"guid":"KrqEZpUzjrud","title":"OSInt","index":1,"dateAdded":1463643192232000,"lastModified":1484954172141000,"id":33,"annos":[{"name":"bookmarkPropertiesDialog/folderLastUsed","flags":0,"expires":4,"value":1484954172140}],"type":"text/x-moz-place-container","children":[{"guid":"7zHtPLJfzGTq","title":"HTTP","index":0,"dateAdded":1463899542257000,"lastModified":1463899558671000,"id":96,"type":"text/x-moz-place-container","children":[{"guid":"nXCzopcdBOp3","title":"w3dt.net - HTTPRecon (Server Fingerprint)","index":0,"dateAdded":1463899504376000,"lastModified":1463899504381000,"id":94,"charset":"UTF-8","iconuri":"https://w3dt.net/images/ico/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"The complete free set of network troubleshooting & domain testing tools that just work!"}],"type":"text/x-moz-place","uri":"https://w3dt.net/tools/httprecon"}]},{"guid":"i_ziKYpPltxd","title":"IP Networks","index":1,"dateAdded":1463643199268000,"lastModified":1463643242856000,"id":34,"type":"text/x-moz-place-container","children":[{"guid":"bhjJMhpktpcR","title":"Shodan","index":0,"dateAdded":1463643130255000,"lastModified":1463656642669000,"id":35,"charset":"UTF-8","iconuri":"https://static.shodan.io/shodan/img/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.shodan.io/"},{"guid":"ohJZ6nHIlPPk","title":"Censys","index":1,"dateAdded":1463643101789000,"lastModified":1463656642670000,"id":36,"charset":"UTF-8","iconuri":"https://censys.io/static/img/icon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://censys.io/"}]},{"guid":"x-7UwNYFdsnV","title":"Persons","index":2,"dateAdded":1463643260284000,"lastModified":1463643377326000,"id":37,"type":"text/x-moz-place-container","children":[{"guid":"2LUO72tllH18","title":"Spokeo People Search | White Pages | Find People","index":0,"dateAdded":1463643335287000,"lastModified":1463656642672000,"id":38,"charset":"UTF-8","iconuri":"http://d8t79bbpmmdp0.cloudfront.net/assets/v8/favicon-d1857527ead64342e6747a1372014958.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free."}],"type":"text/x-moz-place","uri":"http://www.spokeo.com/"},{"guid":"sxmUqlOkt4iv","title":"White Pages | People Finder - AnyWho","index":1,"dateAdded":1463643347226000,"lastModified":1463656642673000,"id":39,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"AnyWho is a free service that allows you to search the White Pages by name, or, enter a phone number and find out who owns it using reverse phone lookup."}],"type":"text/x-moz-place","uri":"http://www.anywho.com/whitepages"},{"guid":"rKFlEfAyHm4u","title":"Free People Search | PeekYou","index":2,"dateAdded":1463643350011000,"lastModified":1463656642673000,"id":40,"charset":"UTF-8","iconuri":"http://www.peekyou.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"PeekYou's free people search engine allows you to find and contact anyone online. Find social links, photos, work history, alumni info, family and more."}],"type":"text/x-moz-place","uri":"http://www.peekyou.com/"},{"guid":"gPcjD8qXOrV0","title":"BeenVerified | Whoopsie - Technical Difficulties","index":3,"dateAdded":1463643358130000,"lastModified":1463656642674000,"id":41,"charset":"UTF-8","iconuri":"https://www.beenverified.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.beenverified.com/"},{"guid":"UYJ5s6M7LwQm","title":"People and Business search - Public records - Background check","index":4,"dateAdded":1463643369465000,"lastModified":1463656642675000,"id":42,"charset":"UTF-8","iconuri":"https://radaris.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Find people instantly by name, phone or address. Search people directory and learn about people - background check, phone, address, email, reverse phone lookup, people's reviews and public records."}],"type":"text/x-moz-place","uri":"https://radaris.com/"}]},{"guid":"9QcWJ5UzyGGy","title":"OSIntFramework.com","index":3,"dateAdded":1463730356507000,"lastModified":1463730442295000,"id":93,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Catalog of OSInt tools and additional resources."}],"type":"text/x-moz-place","uri":"http://osintframework.com/"},{"guid":"BF2ptpV14DKx","title":"Google Hacking Database, GHDB, Google Dorks","index":4,"dateAdded":1463643586123000,"lastModified":1463656642677000,"id":43,"charset":"UTF-8","iconuri":"https://www.exploit-db.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Google Hacking Database (GHDB) By Offensive Security"}],"type":"text/x-moz-place","uri":"https://www.exploit-db.com/google-hacking-database/"},{"guid":"dRjQju6QGM1K","title":"PassiveTotal | Power to the Analyst","index":5,"dateAdded":1463899506869000,"lastModified":1463899506872000,"id":95,"charset":"UTF-8","iconuri":"https://www.passivetotal.org/static/img/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.passivetotal.org/"},{"guid":"ME_6ux2mRX7s","title":"Plain Text Offenders","index":6,"dateAdded":1464384414972000,"lastModified":1464384414978000,"id":102,"charset":"UTF-8","iconuri":"http://66.media.tumblr.com/avatar_38e0d56e059e_128.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Did you just email me back my own password?!"}],"type":"text/x-moz-place","uri":"http://plaintextoffenders.com/"},{"guid":"5cKaBF6dZH4L","title":"WiGLE: Wireless Network Mapping","index":7,"dateAdded":1484954160575000,"lastModified":1484954160579000,"id":106,"charset":"windows-1252","iconuri":"https://www.wigle.net/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers."}],"type":"text/x-moz-place","uri":"https://www.wigle.net/map"}]},{"guid":"ZleQEvcdIQMy","title":"Exploitation","index":2,"dateAdded":1463900980906000,"lastModified":1463901006138000,"id":98,"type":"text/x-moz-place-container","children":[{"guid":"pd40Rc37P8wO","title":"Misconfiguration","index":0,"dateAdded":1463900998142000,"lastModified":1463901006138000,"id":99,"type":"text/x-moz-place-container","children":[{"guid":"0P0SFrCRD8_T","title":"Big bertha says: default passwords","index":0,"dateAdded":1463900944366000,"lastModified":1463900944369000,"id":97,"charset":"windows-1252","iconuri":"http://www.defaultpassword.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.defaultpassword.com/"}]},{"guid":"CPUFWzXo1jC-","title":"Vuln DBs","index":1,"dateAdded":1463643481777000,"lastModified":1463921397520000,"id":44,"type":"text/x-moz-place-container","children":[{"guid":"HdnR7O95tOKz","title":"NVD - Home","index":0,"dateAdded":1463643676665000,"lastModified":1463656642679000,"id":45,"charset":"UTF-8","iconuri":"https://nvd.nist.gov/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://nvd.nist.gov/"},{"guid":"Ck8lwkp7Mgfp","title":"Access Denied","index":1,"dateAdded":1463643720194000,"lastModified":1463656642680000,"id":46,"charset":"windows-1252","iconuri":"https://www.us-cert.gov/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.us-cert.gov/"},{"guid":"zg0jpY13C9F5","title":"OSVDB | Everything is Vulnerable","index":2,"dateAdded":1463643769505000,"lastModified":1463656642681000,"id":47,"charset":"UTF-8","iconuri":"https://s2.wp.com/i/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Everything is Vulnerable"}],"type":"text/x-moz-place","uri":"https://blog.osvdb.org/"},{"guid":"y0cWZj05wYLu","title":"SecurityFocus","index":3,"dateAdded":1463643776620000,"lastModified":1463656642682000,"id":48,"charset":"UTF-8","iconuri":"http://www.securityfocus.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list."}],"type":"text/x-moz-place","uri":"http://www.securityfocus.com/"},{"guid":"rNi1S_FDT8hi","title":"Exploits Database by Offensive Security","index":4,"dateAdded":1463643780533000,"lastModified":1463656642683000,"id":49,"charset":"UTF-8","iconuri":"https://www.exploit-db.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more."}],"type":"text/x-moz-place","uri":"https://www.exploit-db.com/"},{"guid":"gXU-gNG6l3EK","title":"Full Disclosure Mailing List","index":5,"dateAdded":1463643783290000,"lastModified":1463656642683000,"id":50,"charset":"UTF-8","iconuri":"http://seclists.org/shared/images/tiny-eyeicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Seclists archive for the Full Disclosure mailing list: A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue."}],"type":"text/x-moz-place","uri":"http://seclists.org/fulldisclosure/"},{"guid":"AgpdnJa9-4XI","title":"Microsoft Security Bulletins","index":6,"dateAdded":1463643788035000,"lastModified":1463656642685000,"id":51,"charset":"UTF-8","iconuri":"https://technet.microsoft.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://technet.microsoft.com/en-us/security/bulletins"},{"guid":"d-6-3RDZ155F","title":"Microsoft Security Advisories","index":7,"dateAdded":1463643791851000,"lastModified":1463656642686000,"id":52,"charset":"UTF-8","iconuri":"https://technet.microsoft.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://technet.microsoft.com/en-us/security/advisories"},{"guid":"ptCkCQH5gKQN","title":"Packet Storm","index":8,"dateAdded":1463643803746000,"lastModified":1463656642687000,"id":53,"charset":"UTF-8","iconuri":"https://packetstormsecurity.com/img/pss.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers"}],"type":"text/x-moz-place","uri":"https://packetstormsecurity.com/"},{"guid":"ZgFy-o8iIWFp","title":"SecuriTeam.com - A Free Accurate and Independent Source of Vulnerability Information","index":9,"dateAdded":1463643811308000,"lastModified":1463656642687000,"id":54,"charset":"UTF-8","iconuri":"http://www.securiteam.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"SecuriTeam is dedicated to bringing you the latest news and utilities in computer security. We hope this will help you cope with the newest security threats."}],"type":"text/x-moz-place","uri":"http://www.securiteam.com/"},{"guid":"jMMqxEaBMrSa","title":"CXSECURITY.COM Free Security List","index":10,"dateAdded":1463643820526000,"lastModified":1463656642688000,"id":55,"charset":"UTF-8","iconuri":"https://cxsecurity.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"CXSECurity is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications. "}],"type":"text/x-moz-place","uri":"https://cxsecurity.com/"},{"guid":"f0ECWJX5cH2O","title":"Vulnerability Lab - VULNERABILITY RESEARCH LABORATORY","index":11,"dateAdded":1463643823395000,"lastModified":1463656642689000,"id":56,"charset":"UTF-8","iconuri":"http://www.vulnerability-lab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"VULNERABILITY LAB - SECURITY RESEARCH LABORATORY"}],"type":"text/x-moz-place","uri":"http://www.vulnerability-lab.com/"},{"guid":"SykIHEOwHBIq","title":"Zero Day Initiative","index":12,"dateAdded":1463643829149000,"lastModified":1463656642690000,"id":57,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.zerodayinitiative.com/"},{"guid":"q2QQ96UsjcF5","title":"Open Bug Bounty | XSS vulnerabilities and attacks","index":13,"dateAdded":1463921327403000,"lastModified":1463921421491000,"id":100,"charset":"UTF-8","iconuri":"https://www.openbugbounty.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"XSSposed (which stands for 'XSS exposed') is open non-profit internet XSS archive where any security researcher can report a Cross-Site Scripting (XSS) vulnerability on any website"}],"type":"text/x-moz-place","uri":"https://www.openbugbounty.org/"}]}]},{"guid":"Fx_3a1RcOCMm","title":"Tool Lists","index":3,"dateAdded":1463643949288000,"lastModified":1464416314840000,"id":58,"type":"text/x-moz-place-container","children":[{"guid":"wgNtkFtYqhpX","title":"Penetration Testing Tools - Kali Linux","index":0,"dateAdded":1463644018650000,"lastModified":1463656642693000,"id":59,"charset":"UTF-8","iconuri":"http://tools.kali.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"A listing of the Penetration Testing Tools available in Kali Linux"}],"type":"text/x-moz-place","uri":"http://tools.kali.org/"},{"guid":"LDzN6K5f6vdl","title":"PentestBox Tools","index":1,"dateAdded":1463644196742000,"lastModified":1463656642694000,"id":60,"charset":"UTF-8","iconuri":"https://i.imgur.com/gXw9kJ9.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://tools.pentestbox.com/"},{"guid":"i8eu3Hx2S8mH","title":"KitPloit - PenTest Tools for your Security Arsenal ☣","index":2,"dateAdded":1463644224462000,"lastModified":1463656642695000,"id":61,"charset":"UTF-8","iconuri":"http://www.kitploit.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣"}],"type":"text/x-moz-place","uri":"http://www.kitploit.com/"},{"guid":"30qtrDvjC5p9","title":"Category:Penetration Testing Tools - OWASP","index":3,"dateAdded":1463644231483000,"lastModified":1463656642695000,"id":62,"charset":"UTF-8","iconuri":"https://www.owasp.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.owasp.org/index.php/Category:Penetration_Testing_Tools"},{"guid":"v72wrmoaf1CS","title":"GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things","index":4,"dateAdded":1463644311573000,"lastModified":1463656642696000,"id":63,"charset":"UTF-8","iconuri":"https://assets-cdn.github.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things"}],"type":"text/x-moz-place","uri":"https://github.com/enaqx/awesome-pentest#tools"},{"guid":"lOXjMTFr1Cmj","title":"SecTools.Org Top Network Security Tools","index":5,"dateAdded":1463976456413000,"lastModified":1463976456419000,"id":101,"charset":"UTF-8","iconuri":"http://sectools.org/shared/images/tiny-eyeicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://sectools.org/"},{"guid":"AL4GMsC9tA8d","title":"Tools & Methods | Tools & Methods Developed at the SEI","index":6,"dateAdded":1464416307777000,"lastModified":1464416307783000,"id":103,"charset":"UTF-8","iconuri":"https://www.sei.cmu.edu/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Tools & Methods Developed at the SEI"}],"type":"text/x-moz-place","uri":"https://www.sei.cmu.edu/tools/"}]},{"guid":"Zr9CqkiecTyt","title":"Education","index":4,"dateAdded":1463647238960000,"lastModified":1463656687858000,"id":64,"type":"text/x-moz-place-container","children":[{"guid":"3iH8MuKDBRcW","title":"CTFs","index":0,"dateAdded":1463647509126000,"lastModified":1463649228927000,"id":65,"type":"text/x-moz-place-container","children":[{"guid":"Zw1LsAtkXgkd","title":"CTF365: Capture the Flag - Security Training Platform","index":0,"dateAdded":1463647586039000,"lastModified":1463656642699000,"id":66,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"CTF365 is a top notch “Security Training Platform for the IT industry with a focus on Security Professionals, System Administrators and Web Developers”. The Platform implements CTF (Capture The Flag) concepts and leverages gamification mechanics to improve retention rates and speed up the learning/training curve. Security can be learned Hands On only. Enjoy!"}],"type":"text/x-moz-place","uri":"https://ctf365.com/"},{"guid":"OPKdMhGXJDr_","title":"GitHub - apsdehal/awesome-ctf: A curated list of CTF frameworks, libraries, resources and softwares","index":1,"dateAdded":1463649106335000,"lastModified":1463656642701000,"id":67,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares"}],"type":"text/x-moz-place","uri":"https://github.com/apsdehal/awesome-ctf"},{"guid":"DjVsZpnOfI2q","title":"CTFtime.org / All about CTF (Capture The Flag)","index":2,"dateAdded":1463649159115000,"lastModified":1463656642702000,"id":68,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups"}],"type":"text/x-moz-place","uri":"https://ctftime.org/"},{"guid":"0D1mS7NBfJ4e","title":"EasyCTF","index":3,"dateAdded":1463649163006000,"lastModified":1463656642703000,"id":69,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://easyctf.com/"},{"guid":"hAmZUmYwvr8q","title":"OpenToAll CTF Team – open to all at all times","index":4,"dateAdded":1463649225198000,"lastModified":1463656642704000,"id":70,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://opentoallctf.com/"}]},{"guid":"Db-NoVY1lBIt","title":"Labs & Exercises","index":1,"dateAdded":1463647501328000,"lastModified":1463656706113000,"id":71,"type":"text/x-moz-place-container","children":[{"guid":"Gk5dqeMf5B1b","title":"Exploit Exercises","index":0,"dateAdded":1463647375996000,"lastModified":1463656642706000,"id":72,"charset":"UTF-8","iconuri":"https://exploit-exercises.com/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://exploit-exercises.com/"},{"guid":"GCO6G4mWXQhZ","title":"[PentesterLab] Learn Web Penetration Testing: The Right Way","index":1,"dateAdded":1463647437718000,"lastModified":1463656642707000,"id":73,"charset":"UTF-8","iconuri":"https://pentesterlab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://pentesterlab.com/"},{"guid":"wbD8_tXDRc7b","title":"Home : Hacking-Lab.com","index":2,"dateAdded":1463647462592000,"lastModified":1463656642708000,"id":74,"charset":"UTF-8","iconuri":"https://www.hacking-lab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Welcome to hacking-lab.com"}],"type":"text/x-moz-place","uri":"https://www.hacking-lab.com/index.html"},{"guid":"1TABWLvl3Zza","title":"Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]","index":3,"dateAdded":1463647386230000,"lastModified":1463656642709000,"id":75,"charset":"UTF-8","iconuri":"https://www.root-me.org/squelettes/img/rblack.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles."}],"type":"text/x-moz-place","uri":"https://www.root-me.org/"},{"guid":"IwHcJrUTAzsX","title":"Hack This Site!","index":4,"dateAdded":1463647490808000,"lastModified":1463656642709000,"id":76,"charset":"windows-1252","iconuri":"https://data.htscdn.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials. Learn how to hack!"}],"type":"text/x-moz-place","uri":"https://www.hackthissite.org/pages/index/index.php"},{"guid":"dWK_qwFb080J","title":"Vulnerable By Design ~ VulnHub","index":5,"dateAdded":1463656657899000,"lastModified":1463656657901000,"id":82,"charset":"UTF-8","iconuri":"https://www.vulnhub.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks."}],"type":"text/x-moz-place","uri":"https://www.vulnhub.com/"},{"guid":"MZlDL3GlLyEW","title":"Gh0st Networks","index":6,"dateAdded":1463656659222000,"lastModified":1463656659226000,"id":83,"charset":"UTF-8","iconuri":"http://www.gh0st.net/wp-content/themes/streamline/streamline_10/images/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.gh0st.net/"},{"guid":"UoVtp87tAkp1","title":"Penetration test lab \"Test lab\" | Pentestit","index":7,"dateAdded":1463656660853000,"lastModified":1463656660858000,"id":85,"charset":"UTF-8","iconuri":"https://lab.pentestit.ru/favicon-16x16.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://lab.pentestit.ru/"},{"guid":"NVFm3gKLofdh","title":"Hack.me · The house of rising sandbox","index":8,"dateAdded":1463656661617000,"lastModified":1463656661619000,"id":86,"charset":"UTF-8","iconuri":"https://hack.me/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Hack.me is a free community based project powered by eLearnSecurity. The community can build, host and share vulnerable web application code for educational and research purposes.The platform is available without any restriction to any party interested in Web Application Security: students, universities, researchers, penetration testers and web developers."}],"type":"text/x-moz-place","uri":"https://hack.me/"},{"guid":"LNaYFspb0qij","title":"Levels - HackThis!!","index":9,"dateAdded":1463656662338000,"lastModified":1463656662340000,"id":87,"charset":"UTF-8","iconuri":"https://www.hackthis.co.uk/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools."}],"type":"text/x-moz-place","uri":"https://www.hackthis.co.uk/levels/"},{"guid":"9s5N5kxZv8a2","title":"SmashTheStack Wargaming Network","index":10,"dateAdded":1463656663016000,"lastModified":1463656663020000,"id":88,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://smashthestack.org/"}]},{"guid":"xUtenAChuRSo","title":"Livefire Cyber","index":2,"dateAdded":1463656673008000,"lastModified":1463656697492000,"id":90,"type":"text/x-moz-place-container","children":[{"guid":"tnF5VIjTkFd8","title":"pwn0.com • the hacker playground","index":0,"dateAdded":1463656660017000,"lastModified":1463656660022000,"id":84,"charset":"UTF-8","iconuri":"https://pwn0.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://pwn0.com/"},{"guid":"JkgdSFMJBWfY","title":"Arizona Cyber Warfare Range – Revolutionary advancement in cyber security happens here.","index":1,"dateAdded":1463656663915000,"lastModified":1463656663919000,"id":89,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://azcwr.org/"}]},{"guid":"6faNHOoIqQmw","title":"Cybrary - Free Online Cyber Security Training, Forever | Learn and Find Jobs","index":3,"dateAdded":1463647301543000,"lastModified":1463656642711000,"id":77,"charset":"UTF-8","iconuri":"https://www.cybrary.it/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Cybrary is a completely FREE, forever, online Cyber Security training platform. Learn Information Security, for free and find jobs in the field!"}],"type":"text/x-moz-place","uri":"https://www.cybrary.it/"},{"guid":"7Yl_zJpULn0V","title":"IT Training Courses Online - Video Computer Classes","index":4,"dateAdded":1463647338235000,"lastModified":1463656642712000,"id":78,"charset":"UTF-8","iconuri":"https://itpro.tv/favicon.ico?ver=%3C?php%20echo(%20$environment_data[%27date%27]%20);%20?%3E","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Easy to understand IT Training & IT Certification courses online. Grow your tech skills. Engaging videos with expert trainers. Start FREE now!"}],"type":"text/x-moz-place","uri":"https://itpro.tv/"}]},{"guid":"4M5V5T8T4Poq","title":"More resources","index":5,"dateAdded":1463643869155000,"lastModified":1463730404340000,"id":79,"type":"text/x-moz-place-container","children":[{"guid":"CPWoJ6xqdutk","title":"OSIntFramework.com","index":0,"dateAdded":1463730356507000,"lastModified":1463730442295000,"id":92,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Catalog of OSInt tools and additional resources."}],"type":"text/x-moz-place","uri":"http://osintframework.com/"},{"guid":"TmYncMzbWh8P","title":"Online Penetration Testing Tools | Ethical Hacking Tools","index":1,"dateAdded":1463644164467000,"lastModified":1463656642714000,"id":80,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"We provide penetration testing tools that can be used online. Use our tools to test the security of your systems by doing remote reconnaissance, information gathering, online scans, enumeration and target discovery."}],"type":"text/x-moz-place","uri":"https://pentest-tools.com/home"},{"guid":"J0OvWtWcVr5D","title":"GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things","index":2,"dateAdded":1463643894512000,"lastModified":1463656642715000,"id":81,"charset":"UTF-8","iconuri":"https://assets-cdn.github.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things"}],"type":"text/x-moz-place","uri":"https://github.com/enaqx/awesome-pentest"}]}]},{"guid":"unfiled_____","title":"Other Bookmarks","index":3,"dateAdded":1463647765543000,"lastModified":1484954172133000,"id":5,"type":"text/x-moz-place-container","root":"unfiledBookmarksFolder"}]} -------------------------------------------------------------------------------- /firefox/bookmarks.html: -------------------------------------------------------------------------------- 1 | 2 | 5 | 6 |
10 |
14 |
19 |
22 |
25 |
27 |
30 |
32 |
37 |
39 |
50 |
61 |
63 |
65 |
68 |
70 |
99 |
100 |
102 |
117 |
119 |
121 |
132 |
134 |
157 |
159 |
164 |
169 |
171 |
178 |
179 |