├── README.md └── firefox ├── bookmarks.json └── bookmarks.html /README.md: -------------------------------------------------------------------------------- 1 | # pentest-links: hacking tools, in context 2 | 3 | This repository contains pointers to hacking resources in a bunch of useful formats that you can import to your environment (browser, distro, etc.) and then personalize as you please. Kind of an [Awesome List](https://github.com/sindresorhus/awesome), but "importable" in an appropriate context so that the listed resources are actually available to you when you need them. Hopefully, this makes the list more useful and less overwhelming. 4 | 5 | For example, [anqxe/awesome-pentest](https://github.com/enaqx/awesome-pentest) lists some great Web-based information gathering tools (like Shodan and Censys). In this repository, the homepages for these tools are "listed" as entries in the [`firefox/bookmarks.json`](firefox/bookmarks.json) file, which is intended to be imported to a Mozilla Firefox (or derivative) browser, resulting in a Bookmarks Toolbar containing bookmarks to these resources. 6 | 7 | See also [meirwah/awesome-incident-response](https://github.com/meirwah/awesome-incident-response) for great forensic analysis tools and resources. 8 | 9 | ![Screenshot of Bookmarks Toolbar with "People search" folder expanded.](http://i.imgur.com/meNSPU6.png) 10 | 11 | Where a "compiled" version of a tool is not offered in this repository, it is instead listed in the context of its use in this README. (See below.) 12 | 13 | This is a personal collection, though suggestions and contributions are heartily welcomed. :) 14 | 15 | * [Browser Add-Ons](#browser-add-ons) 16 | 17 | # Browser Add-Ons 18 | 19 | # Proxy managers 20 | 21 | * [FoxyProxy](https://getfoxyproxy.org/) - Flexible proxy management based on URL patterns. 22 | * [Firefox](https://addons.mozilla.org/firefox/addon/foxyproxy-standard/) 23 | * [Chrome](https://chrome.google.com/webstore/detail/foxyproxy-standard/gcknhkkoolaabfmlnjonogaaifnjlfnp) 24 | 25 | ## For information gathering 26 | 27 | * [Wappalyzer](https://wappalyzer.com/) - Uncovers the technologies used on websites. It detects content management systems, eCommerce platforms, web servers, JavaScript frameworks, analytics tools and many more. 28 | * [Firefox](https://addons.mozilla.org/firefox/addon/wappalyzer/) 29 | * [Chrome](https://chrome.google.com/webstore/detail/wappalyzer/gppongmhjkpfnbhagpmjfkannfbllamg) 30 | 31 | ## For vulnerability analysis and discovery 32 | 33 | * XSS Me - In-browser XSS discovery helper. 34 | * [Firefox](https://addons.mozilla.org/firefox/addon/xss-me/) 35 | * SQL Inject Me - In-browser SQLi discovery helper. 36 | * [Firefox](https://addons.mozilla.org/firefox/addon/sql-inject-me/) 37 | * HackBar - In-browser shortcuts for common Web app pentesting techniques. 38 | * [Firefox](https://addons.mozilla.org/firefox/addon/hackbar/) 39 | * Cookies Manager+ - Full-featured cookie editing and exporting tool. 40 | * [Firefox](https://addons.mozilla.org/firefox/addon/cookies-manager-plus/) 41 | -------------------------------------------------------------------------------- /firefox/bookmarks.json: -------------------------------------------------------------------------------- 1 | {"guid":"root________","title":"","index":0,"dateAdded":1463647765543000,"lastModified":1479424899170000,"id":1,"type":"text/x-moz-place-container","root":"placesRoot","children":[{"guid":"menu________","title":"Bookmarks Menu","index":0,"dateAdded":1463647765543000,"lastModified":1479424899170000,"id":2,"type":"text/x-moz-place-container","root":"bookmarksMenuFolder","children":[{"guid":"6QMbdiXwvCqr","title":"Recently Bookmarked","index":0,"dateAdded":1463528116235000,"lastModified":1479424898997000,"id":24,"type":"text/x-moz-place","uri":"place:folder=BOOKMARKS_MENU&folder=UNFILED_BOOKMARKS&folder=TOOLBAR&queryType=1&sort=12&maxResults=10&excludeQueries=1"},{"guid":"ata30MrO6yfB","title":"Recent Tags","index":1,"dateAdded":1479424899170000,"lastModified":1479424899186000,"id":105,"annos":[{"name":"Places/SmartBookmark","flags":0,"expires":4,"value":"RecentTags"}],"type":"text/x-moz-place","uri":"place:type=6&sort=14&maxResults=10"},{"guid":"gh0vhAlmto1t","index":2,"dateAdded":1463528116274000,"lastModified":1463528116274000,"id":26,"type":"text/x-moz-place-separator"},{"guid":"N22YMunNMcMP","title":"Mozilla Firefox","index":3,"dateAdded":1463528116203000,"lastModified":1463528116206000,"id":27,"type":"text/x-moz-place-container","children":[{"guid":"0H-QcsZm3Q04","title":"Help and Tutorials","index":0,"dateAdded":1463528116204000,"lastModified":1463528116204000,"id":28,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/1-1463528116204","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/firefox/help/"},{"guid":"k0FuWAHzYqYO","title":"Customize Firefox","index":1,"dateAdded":1463528116204000,"lastModified":1463528116205000,"id":29,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/2-1463528116204","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/firefox/customize/"},{"guid":"8Eb1ILFlEpVu","title":"Get Involved","index":2,"dateAdded":1463528116205000,"lastModified":1463528116205000,"id":30,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/3-1463528116205","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/contribute/"},{"guid":"pTC2r7WdI0yo","title":"About Us","index":3,"dateAdded":1463528116206000,"lastModified":1463528116206000,"id":31,"iconuri":"http://www.mozilla.org/2005/made-up-favicon/4-1463528116206","type":"text/x-moz-place","uri":"https://www.mozilla.org/en-US/about/"}]}]},{"guid":"toolbar_____","title":"Bookmarks Toolbar","index":1,"dateAdded":1463647765543000,"lastModified":1479424899111000,"id":3,"annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Add bookmarks to this folder to see them displayed on the Bookmarks Toolbar"}],"type":"text/x-moz-place-container","root":"toolbarFolder","children":[{"guid":"cdB6FPIpySUu","title":"Most Visited","index":0,"dateAdded":1479424899111000,"lastModified":1479424899155000,"id":104,"annos":[{"name":"Places/SmartBookmark","flags":0,"expires":4,"value":"MostVisited"}],"type":"text/x-moz-place","uri":"place:sort=8&maxResults=10"},{"guid":"KrqEZpUzjrud","title":"OSInt","index":1,"dateAdded":1463643192232000,"lastModified":1484954172141000,"id":33,"annos":[{"name":"bookmarkPropertiesDialog/folderLastUsed","flags":0,"expires":4,"value":1484954172140}],"type":"text/x-moz-place-container","children":[{"guid":"7zHtPLJfzGTq","title":"HTTP","index":0,"dateAdded":1463899542257000,"lastModified":1463899558671000,"id":96,"type":"text/x-moz-place-container","children":[{"guid":"nXCzopcdBOp3","title":"w3dt.net - HTTPRecon (Server Fingerprint)","index":0,"dateAdded":1463899504376000,"lastModified":1463899504381000,"id":94,"charset":"UTF-8","iconuri":"https://w3dt.net/images/ico/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"The complete free set of network troubleshooting & domain testing tools that just work!"}],"type":"text/x-moz-place","uri":"https://w3dt.net/tools/httprecon"}]},{"guid":"i_ziKYpPltxd","title":"IP Networks","index":1,"dateAdded":1463643199268000,"lastModified":1463643242856000,"id":34,"type":"text/x-moz-place-container","children":[{"guid":"bhjJMhpktpcR","title":"Shodan","index":0,"dateAdded":1463643130255000,"lastModified":1463656642669000,"id":35,"charset":"UTF-8","iconuri":"https://static.shodan.io/shodan/img/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.shodan.io/"},{"guid":"ohJZ6nHIlPPk","title":"Censys","index":1,"dateAdded":1463643101789000,"lastModified":1463656642670000,"id":36,"charset":"UTF-8","iconuri":"https://censys.io/static/img/icon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://censys.io/"}]},{"guid":"x-7UwNYFdsnV","title":"Persons","index":2,"dateAdded":1463643260284000,"lastModified":1463643377326000,"id":37,"type":"text/x-moz-place-container","children":[{"guid":"2LUO72tllH18","title":"Spokeo People Search | White Pages | Find People","index":0,"dateAdded":1463643335287000,"lastModified":1463656642672000,"id":38,"charset":"UTF-8","iconuri":"http://d8t79bbpmmdp0.cloudfront.net/assets/v8/favicon-d1857527ead64342e6747a1372014958.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free."}],"type":"text/x-moz-place","uri":"http://www.spokeo.com/"},{"guid":"sxmUqlOkt4iv","title":"White Pages | People Finder - AnyWho","index":1,"dateAdded":1463643347226000,"lastModified":1463656642673000,"id":39,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"AnyWho is a free service that allows you to search the White Pages by name, or, enter a phone number and find out who owns it using reverse phone lookup."}],"type":"text/x-moz-place","uri":"http://www.anywho.com/whitepages"},{"guid":"rKFlEfAyHm4u","title":"Free People Search | PeekYou","index":2,"dateAdded":1463643350011000,"lastModified":1463656642673000,"id":40,"charset":"UTF-8","iconuri":"http://www.peekyou.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"PeekYou's free people search engine allows you to find and contact anyone online. Find social links, photos, work history, alumni info, family and more."}],"type":"text/x-moz-place","uri":"http://www.peekyou.com/"},{"guid":"gPcjD8qXOrV0","title":"BeenVerified | Whoopsie - Technical Difficulties","index":3,"dateAdded":1463643358130000,"lastModified":1463656642674000,"id":41,"charset":"UTF-8","iconuri":"https://www.beenverified.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.beenverified.com/"},{"guid":"UYJ5s6M7LwQm","title":"People and Business search - Public records - Background check","index":4,"dateAdded":1463643369465000,"lastModified":1463656642675000,"id":42,"charset":"UTF-8","iconuri":"https://radaris.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Find people instantly by name, phone or address. Search people directory and learn about people - background check, phone, address, email, reverse phone lookup, people's reviews and public records."}],"type":"text/x-moz-place","uri":"https://radaris.com/"}]},{"guid":"9QcWJ5UzyGGy","title":"OSIntFramework.com","index":3,"dateAdded":1463730356507000,"lastModified":1463730442295000,"id":93,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Catalog of OSInt tools and additional resources."}],"type":"text/x-moz-place","uri":"http://osintframework.com/"},{"guid":"BF2ptpV14DKx","title":"Google Hacking Database, GHDB, Google Dorks","index":4,"dateAdded":1463643586123000,"lastModified":1463656642677000,"id":43,"charset":"UTF-8","iconuri":"https://www.exploit-db.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Google Hacking Database (GHDB) By Offensive Security"}],"type":"text/x-moz-place","uri":"https://www.exploit-db.com/google-hacking-database/"},{"guid":"dRjQju6QGM1K","title":"PassiveTotal | Power to the Analyst","index":5,"dateAdded":1463899506869000,"lastModified":1463899506872000,"id":95,"charset":"UTF-8","iconuri":"https://www.passivetotal.org/static/img/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.passivetotal.org/"},{"guid":"ME_6ux2mRX7s","title":"Plain Text Offenders","index":6,"dateAdded":1464384414972000,"lastModified":1464384414978000,"id":102,"charset":"UTF-8","iconuri":"http://66.media.tumblr.com/avatar_38e0d56e059e_128.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Did you just email me back my own password?!"}],"type":"text/x-moz-place","uri":"http://plaintextoffenders.com/"},{"guid":"5cKaBF6dZH4L","title":"WiGLE: Wireless Network Mapping","index":7,"dateAdded":1484954160575000,"lastModified":1484954160579000,"id":106,"charset":"windows-1252","iconuri":"https://www.wigle.net/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers."}],"type":"text/x-moz-place","uri":"https://www.wigle.net/map"}]},{"guid":"ZleQEvcdIQMy","title":"Exploitation","index":2,"dateAdded":1463900980906000,"lastModified":1463901006138000,"id":98,"type":"text/x-moz-place-container","children":[{"guid":"pd40Rc37P8wO","title":"Misconfiguration","index":0,"dateAdded":1463900998142000,"lastModified":1463901006138000,"id":99,"type":"text/x-moz-place-container","children":[{"guid":"0P0SFrCRD8_T","title":"Big bertha says: default passwords","index":0,"dateAdded":1463900944366000,"lastModified":1463900944369000,"id":97,"charset":"windows-1252","iconuri":"http://www.defaultpassword.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.defaultpassword.com/"}]},{"guid":"CPUFWzXo1jC-","title":"Vuln DBs","index":1,"dateAdded":1463643481777000,"lastModified":1463921397520000,"id":44,"type":"text/x-moz-place-container","children":[{"guid":"HdnR7O95tOKz","title":"NVD - Home","index":0,"dateAdded":1463643676665000,"lastModified":1463656642679000,"id":45,"charset":"UTF-8","iconuri":"https://nvd.nist.gov/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://nvd.nist.gov/"},{"guid":"Ck8lwkp7Mgfp","title":"Access Denied","index":1,"dateAdded":1463643720194000,"lastModified":1463656642680000,"id":46,"charset":"windows-1252","iconuri":"https://www.us-cert.gov/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.us-cert.gov/"},{"guid":"zg0jpY13C9F5","title":"OSVDB | Everything is Vulnerable","index":2,"dateAdded":1463643769505000,"lastModified":1463656642681000,"id":47,"charset":"UTF-8","iconuri":"https://s2.wp.com/i/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Everything is Vulnerable"}],"type":"text/x-moz-place","uri":"https://blog.osvdb.org/"},{"guid":"y0cWZj05wYLu","title":"SecurityFocus","index":3,"dateAdded":1463643776620000,"lastModified":1463656642682000,"id":48,"charset":"UTF-8","iconuri":"http://www.securityfocus.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list."}],"type":"text/x-moz-place","uri":"http://www.securityfocus.com/"},{"guid":"rNi1S_FDT8hi","title":"Exploits Database by Offensive Security","index":4,"dateAdded":1463643780533000,"lastModified":1463656642683000,"id":49,"charset":"UTF-8","iconuri":"https://www.exploit-db.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more."}],"type":"text/x-moz-place","uri":"https://www.exploit-db.com/"},{"guid":"gXU-gNG6l3EK","title":"Full Disclosure Mailing List","index":5,"dateAdded":1463643783290000,"lastModified":1463656642683000,"id":50,"charset":"UTF-8","iconuri":"http://seclists.org/shared/images/tiny-eyeicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Seclists archive for the Full Disclosure mailing list: A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue."}],"type":"text/x-moz-place","uri":"http://seclists.org/fulldisclosure/"},{"guid":"AgpdnJa9-4XI","title":"Microsoft Security Bulletins","index":6,"dateAdded":1463643788035000,"lastModified":1463656642685000,"id":51,"charset":"UTF-8","iconuri":"https://technet.microsoft.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://technet.microsoft.com/en-us/security/bulletins"},{"guid":"d-6-3RDZ155F","title":"Microsoft Security Advisories","index":7,"dateAdded":1463643791851000,"lastModified":1463656642686000,"id":52,"charset":"UTF-8","iconuri":"https://technet.microsoft.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://technet.microsoft.com/en-us/security/advisories"},{"guid":"ptCkCQH5gKQN","title":"Packet Storm","index":8,"dateAdded":1463643803746000,"lastModified":1463656642687000,"id":53,"charset":"UTF-8","iconuri":"https://packetstormsecurity.com/img/pss.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers"}],"type":"text/x-moz-place","uri":"https://packetstormsecurity.com/"},{"guid":"ZgFy-o8iIWFp","title":"SecuriTeam.com - A Free Accurate and Independent Source of Vulnerability Information","index":9,"dateAdded":1463643811308000,"lastModified":1463656642687000,"id":54,"charset":"UTF-8","iconuri":"http://www.securiteam.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"SecuriTeam is dedicated to bringing you the latest news and utilities in computer security. We hope this will help you cope with the newest security threats."}],"type":"text/x-moz-place","uri":"http://www.securiteam.com/"},{"guid":"jMMqxEaBMrSa","title":"CXSECURITY.COM Free Security List","index":10,"dateAdded":1463643820526000,"lastModified":1463656642688000,"id":55,"charset":"UTF-8","iconuri":"https://cxsecurity.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"CXSECurity is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications. "}],"type":"text/x-moz-place","uri":"https://cxsecurity.com/"},{"guid":"f0ECWJX5cH2O","title":"Vulnerability Lab - VULNERABILITY RESEARCH LABORATORY","index":11,"dateAdded":1463643823395000,"lastModified":1463656642689000,"id":56,"charset":"UTF-8","iconuri":"http://www.vulnerability-lab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"VULNERABILITY LAB - SECURITY RESEARCH LABORATORY"}],"type":"text/x-moz-place","uri":"http://www.vulnerability-lab.com/"},{"guid":"SykIHEOwHBIq","title":"Zero Day Initiative","index":12,"dateAdded":1463643829149000,"lastModified":1463656642690000,"id":57,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.zerodayinitiative.com/"},{"guid":"q2QQ96UsjcF5","title":"Open Bug Bounty | XSS vulnerabilities and attacks","index":13,"dateAdded":1463921327403000,"lastModified":1463921421491000,"id":100,"charset":"UTF-8","iconuri":"https://www.openbugbounty.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"XSSposed (which stands for 'XSS exposed') is open non-profit internet XSS archive where any security researcher can report a Cross-Site Scripting (XSS) vulnerability on any website"}],"type":"text/x-moz-place","uri":"https://www.openbugbounty.org/"}]}]},{"guid":"Fx_3a1RcOCMm","title":"Tool Lists","index":3,"dateAdded":1463643949288000,"lastModified":1464416314840000,"id":58,"type":"text/x-moz-place-container","children":[{"guid":"wgNtkFtYqhpX","title":"Penetration Testing Tools - Kali Linux","index":0,"dateAdded":1463644018650000,"lastModified":1463656642693000,"id":59,"charset":"UTF-8","iconuri":"http://tools.kali.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"A listing of the Penetration Testing Tools available in Kali Linux"}],"type":"text/x-moz-place","uri":"http://tools.kali.org/"},{"guid":"LDzN6K5f6vdl","title":"PentestBox Tools","index":1,"dateAdded":1463644196742000,"lastModified":1463656642694000,"id":60,"charset":"UTF-8","iconuri":"https://i.imgur.com/gXw9kJ9.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://tools.pentestbox.com/"},{"guid":"i8eu3Hx2S8mH","title":"KitPloit - PenTest Tools for your Security Arsenal ☣","index":2,"dateAdded":1463644224462000,"lastModified":1463656642695000,"id":61,"charset":"UTF-8","iconuri":"http://www.kitploit.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣"}],"type":"text/x-moz-place","uri":"http://www.kitploit.com/"},{"guid":"30qtrDvjC5p9","title":"Category:Penetration Testing Tools - OWASP","index":3,"dateAdded":1463644231483000,"lastModified":1463656642695000,"id":62,"charset":"UTF-8","iconuri":"https://www.owasp.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://www.owasp.org/index.php/Category:Penetration_Testing_Tools"},{"guid":"v72wrmoaf1CS","title":"GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things","index":4,"dateAdded":1463644311573000,"lastModified":1463656642696000,"id":63,"charset":"UTF-8","iconuri":"https://assets-cdn.github.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things"}],"type":"text/x-moz-place","uri":"https://github.com/enaqx/awesome-pentest#tools"},{"guid":"lOXjMTFr1Cmj","title":"SecTools.Org Top Network Security Tools","index":5,"dateAdded":1463976456413000,"lastModified":1463976456419000,"id":101,"charset":"UTF-8","iconuri":"http://sectools.org/shared/images/tiny-eyeicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://sectools.org/"},{"guid":"AL4GMsC9tA8d","title":"Tools & Methods | Tools & Methods Developed at the SEI","index":6,"dateAdded":1464416307777000,"lastModified":1464416307783000,"id":103,"charset":"UTF-8","iconuri":"https://www.sei.cmu.edu/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Tools & Methods Developed at the SEI"}],"type":"text/x-moz-place","uri":"https://www.sei.cmu.edu/tools/"}]},{"guid":"Zr9CqkiecTyt","title":"Education","index":4,"dateAdded":1463647238960000,"lastModified":1463656687858000,"id":64,"type":"text/x-moz-place-container","children":[{"guid":"3iH8MuKDBRcW","title":"CTFs","index":0,"dateAdded":1463647509126000,"lastModified":1463649228927000,"id":65,"type":"text/x-moz-place-container","children":[{"guid":"Zw1LsAtkXgkd","title":"CTF365: Capture the Flag - Security Training Platform","index":0,"dateAdded":1463647586039000,"lastModified":1463656642699000,"id":66,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"CTF365 is a top notch “Security Training Platform for the IT industry with a focus on Security Professionals, System Administrators and Web Developers”. The Platform implements CTF (Capture The Flag) concepts and leverages gamification mechanics to improve retention rates and speed up the learning/training curve. Security can be learned Hands On only. Enjoy!"}],"type":"text/x-moz-place","uri":"https://ctf365.com/"},{"guid":"OPKdMhGXJDr_","title":"GitHub - apsdehal/awesome-ctf: A curated list of CTF frameworks, libraries, resources and softwares","index":1,"dateAdded":1463649106335000,"lastModified":1463656642701000,"id":67,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares"}],"type":"text/x-moz-place","uri":"https://github.com/apsdehal/awesome-ctf"},{"guid":"DjVsZpnOfI2q","title":"CTFtime.org / All about CTF (Capture The Flag)","index":2,"dateAdded":1463649159115000,"lastModified":1463656642702000,"id":68,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups"}],"type":"text/x-moz-place","uri":"https://ctftime.org/"},{"guid":"0D1mS7NBfJ4e","title":"EasyCTF","index":3,"dateAdded":1463649163006000,"lastModified":1463656642703000,"id":69,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://easyctf.com/"},{"guid":"hAmZUmYwvr8q","title":"OpenToAll CTF Team – open to all at all times","index":4,"dateAdded":1463649225198000,"lastModified":1463656642704000,"id":70,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://opentoallctf.com/"}]},{"guid":"Db-NoVY1lBIt","title":"Labs & Exercises","index":1,"dateAdded":1463647501328000,"lastModified":1463656706113000,"id":71,"type":"text/x-moz-place-container","children":[{"guid":"Gk5dqeMf5B1b","title":"Exploit Exercises","index":0,"dateAdded":1463647375996000,"lastModified":1463656642706000,"id":72,"charset":"UTF-8","iconuri":"https://exploit-exercises.com/favicon.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://exploit-exercises.com/"},{"guid":"GCO6G4mWXQhZ","title":"[PentesterLab] Learn Web Penetration Testing: The Right Way","index":1,"dateAdded":1463647437718000,"lastModified":1463656642707000,"id":73,"charset":"UTF-8","iconuri":"https://pentesterlab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://pentesterlab.com/"},{"guid":"wbD8_tXDRc7b","title":"Home : Hacking-Lab.com","index":2,"dateAdded":1463647462592000,"lastModified":1463656642708000,"id":74,"charset":"UTF-8","iconuri":"https://www.hacking-lab.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Welcome to hacking-lab.com"}],"type":"text/x-moz-place","uri":"https://www.hacking-lab.com/index.html"},{"guid":"1TABWLvl3Zza","title":"Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]","index":3,"dateAdded":1463647386230000,"lastModified":1463656642709000,"id":75,"charset":"UTF-8","iconuri":"https://www.root-me.org/squelettes/img/rblack.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles."}],"type":"text/x-moz-place","uri":"https://www.root-me.org/"},{"guid":"IwHcJrUTAzsX","title":"Hack This Site!","index":4,"dateAdded":1463647490808000,"lastModified":1463656642709000,"id":76,"charset":"windows-1252","iconuri":"https://data.htscdn.org/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials. Learn how to hack!"}],"type":"text/x-moz-place","uri":"https://www.hackthissite.org/pages/index/index.php"},{"guid":"dWK_qwFb080J","title":"Vulnerable By Design ~ VulnHub","index":5,"dateAdded":1463656657899000,"lastModified":1463656657901000,"id":82,"charset":"UTF-8","iconuri":"https://www.vulnhub.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks."}],"type":"text/x-moz-place","uri":"https://www.vulnhub.com/"},{"guid":"MZlDL3GlLyEW","title":"Gh0st Networks","index":6,"dateAdded":1463656659222000,"lastModified":1463656659226000,"id":83,"charset":"UTF-8","iconuri":"http://www.gh0st.net/wp-content/themes/streamline/streamline_10/images/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://www.gh0st.net/"},{"guid":"UoVtp87tAkp1","title":"Penetration test lab \"Test lab\" | Pentestit","index":7,"dateAdded":1463656660853000,"lastModified":1463656660858000,"id":85,"charset":"UTF-8","iconuri":"https://lab.pentestit.ru/favicon-16x16.png","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://lab.pentestit.ru/"},{"guid":"NVFm3gKLofdh","title":"Hack.me · The house of rising sandbox","index":8,"dateAdded":1463656661617000,"lastModified":1463656661619000,"id":86,"charset":"UTF-8","iconuri":"https://hack.me/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Hack.me is a free community based project powered by eLearnSecurity. The community can build, host and share vulnerable web application code for educational and research purposes.The platform is available without any restriction to any party interested in Web Application Security: students, universities, researchers, penetration testers and web developers."}],"type":"text/x-moz-place","uri":"https://hack.me/"},{"guid":"LNaYFspb0qij","title":"Levels - HackThis!!","index":9,"dateAdded":1463656662338000,"lastModified":1463656662340000,"id":87,"charset":"UTF-8","iconuri":"https://www.hackthis.co.uk/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools."}],"type":"text/x-moz-place","uri":"https://www.hackthis.co.uk/levels/"},{"guid":"9s5N5kxZv8a2","title":"SmashTheStack Wargaming Network","index":10,"dateAdded":1463656663016000,"lastModified":1463656663020000,"id":88,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://smashthestack.org/"}]},{"guid":"xUtenAChuRSo","title":"Livefire Cyber","index":2,"dateAdded":1463656673008000,"lastModified":1463656697492000,"id":90,"type":"text/x-moz-place-container","children":[{"guid":"tnF5VIjTkFd8","title":"pwn0.com • the hacker playground","index":0,"dateAdded":1463656660017000,"lastModified":1463656660022000,"id":84,"charset":"UTF-8","iconuri":"https://pwn0.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"https://pwn0.com/"},{"guid":"JkgdSFMJBWfY","title":"Arizona Cyber Warfare Range – Revolutionary advancement in cyber security happens here.","index":1,"dateAdded":1463656663915000,"lastModified":1463656663919000,"id":89,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":""}],"type":"text/x-moz-place","uri":"http://azcwr.org/"}]},{"guid":"6faNHOoIqQmw","title":"Cybrary - Free Online Cyber Security Training, Forever | Learn and Find Jobs","index":3,"dateAdded":1463647301543000,"lastModified":1463656642711000,"id":77,"charset":"UTF-8","iconuri":"https://www.cybrary.it/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Cybrary is a completely FREE, forever, online Cyber Security training platform. Learn Information Security, for free and find jobs in the field!"}],"type":"text/x-moz-place","uri":"https://www.cybrary.it/"},{"guid":"7Yl_zJpULn0V","title":"IT Training Courses Online - Video Computer Classes","index":4,"dateAdded":1463647338235000,"lastModified":1463656642712000,"id":78,"charset":"UTF-8","iconuri":"https://itpro.tv/favicon.ico?ver=%3C?php%20echo(%20$environment_data[%27date%27]%20);%20?%3E","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Easy to understand IT Training & IT Certification courses online. Grow your tech skills. Engaging videos with expert trainers. Start FREE now!"}],"type":"text/x-moz-place","uri":"https://itpro.tv/"}]},{"guid":"4M5V5T8T4Poq","title":"More resources","index":5,"dateAdded":1463643869155000,"lastModified":1463730404340000,"id":79,"type":"text/x-moz-place-container","children":[{"guid":"CPWoJ6xqdutk","title":"OSIntFramework.com","index":0,"dateAdded":1463730356507000,"lastModified":1463730442295000,"id":92,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"Catalog of OSInt tools and additional resources."}],"type":"text/x-moz-place","uri":"http://osintframework.com/"},{"guid":"TmYncMzbWh8P","title":"Online Penetration Testing Tools | Ethical Hacking Tools","index":1,"dateAdded":1463644164467000,"lastModified":1463656642714000,"id":80,"charset":"UTF-8","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"We provide penetration testing tools that can be used online. Use our tools to test the security of your systems by doing remote reconnaissance, information gathering, online scans, enumeration and target discovery."}],"type":"text/x-moz-place","uri":"https://pentest-tools.com/home"},{"guid":"J0OvWtWcVr5D","title":"GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things","index":2,"dateAdded":1463643894512000,"lastModified":1463656642715000,"id":81,"charset":"UTF-8","iconuri":"https://assets-cdn.github.com/favicon.ico","annos":[{"name":"bookmarkProperties/description","flags":0,"expires":4,"value":"awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things"}],"type":"text/x-moz-place","uri":"https://github.com/enaqx/awesome-pentest"}]}]},{"guid":"unfiled_____","title":"Other Bookmarks","index":3,"dateAdded":1463647765543000,"lastModified":1484954172133000,"id":5,"type":"text/x-moz-place-container","root":"unfiledBookmarksFolder"}]} -------------------------------------------------------------------------------- /firefox/bookmarks.html: -------------------------------------------------------------------------------- 1 | 2 | 5 | 6 | Bookmarks 7 |

Bookmarks Menu

8 | 9 |

10 |

Recently Bookmarked 11 |
Recent Tags 12 |

Mozilla Firefox

13 |

14 |

Help and Tutorials 15 |
Customize Firefox 16 |
Get Involved 17 |
About Us 18 |

19 |

Bookmarks Toolbar

20 |
Add bookmarks to this folder to see them displayed on the Bookmarks Toolbar 21 |

22 |

Most Visited 23 |

OSInt

24 |

25 |

HTTP

26 |

27 |

w3dt.net - HTTPRecon (Server Fingerprint) 28 |
The complete free set of network troubleshooting & domain testing tools that just work! 29 |

30 |

IP Networks

31 |

32 |

Shodan 33 |
34 |
Censys 35 |
36 |

37 |

Persons

38 |

39 |

Spokeo People Search | White Pages | Find People 40 |
People search engine and free white pages finds phone, address, email, and photos. Find people by name, email, address, and phone for free. 41 |
White Pages | People Finder - AnyWho 42 |
AnyWho is a free service that allows you to search the White Pages by name, or, enter a phone number and find out who owns it using reverse phone lookup. 43 |
Free People Search | PeekYou 44 |
PeekYou's free people search engine allows you to find and contact anyone online. Find social links, photos, work history, alumni info, family and more. 45 |
BeenVerified | Whoopsie - Technical Difficulties 46 |
47 |
People and Business search - Public records - Background check 48 |
Find people instantly by name, phone or address. Search people directory and learn about people - background check, phone, address, email, reverse phone lookup, people's reviews and public records. 49 |

50 |

OSIntFramework.com 51 |
Catalog of OSInt tools and additional resources. 52 |
Google Hacking Database, GHDB, Google Dorks 53 |
Google Hacking Database (GHDB) By Offensive Security 54 |
PassiveTotal | Power to the Analyst 55 |
56 |
Plain Text Offenders 57 |
Did you just email me back my own password?! 58 |
WiGLE: Wireless Network Mapping 59 |
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers. 60 |

61 |

Exploitation

62 |

63 |

Misconfiguration

64 |

65 |

Big bertha says: default passwords 66 |
67 |

68 |

Vuln DBs

69 |

70 |

NVD - Home 71 |
72 |
Access Denied 73 |
74 |
OSVDB | Everything is Vulnerable 75 |
Everything is Vulnerable 76 |
SecurityFocus 77 |
SecurityFocus is designed to facilitate discussion on computer security related topics, create computer security awareness, and to provide the Internet's largest and most comprehensive database of computer security knowledge and resources to the public. It also hosts the BUGTRAQ mailing list. 78 |
Exploits Database by Offensive Security 79 |
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more. 80 |
Full Disclosure Mailing List 81 |
Seclists archive for the Full Disclosure mailing list: A public, vendor-neutral forum for detailed discussion of vulnerabilities and exploitation techniques, as well as tools, papers, news, and events of interest to the community. The relaxed atmosphere of this quirky list provides some comic relief and certain industry gossip. More importantly, fresh vulnerabilities sometimes hit this list many hours or days before they pass through the Bugtraq moderation queue. 82 |
Microsoft Security Bulletins 83 |
84 |
Microsoft Security Advisories 85 |
86 |
Packet Storm 87 |
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers 88 |
SecuriTeam.com - A Free Accurate and Independent Source of Vulnerability Information 89 |
SecuriTeam is dedicated to bringing you the latest news and utilities in computer security. We hope this will help you cope with the newest security threats. 90 |
CXSECURITY.COM Free Security List 91 |
CXSECurity is a huge collection of information on data communications safety. Its main objective is to inform about errors in various applications. 92 |
Vulnerability Lab - VULNERABILITY RESEARCH LABORATORY 93 |
VULNERABILITY LAB - SECURITY RESEARCH LABORATORY 94 |
Zero Day Initiative 95 |
96 |
Open Bug Bounty | XSS vulnerabilities and attacks 97 |
XSSposed (which stands for 'XSS exposed') is open non-profit internet XSS archive where any security researcher can report a Cross-Site Scripting (XSS) vulnerability on any website 98 |

99 |

100 |

Tool Lists

101 |

102 |

Penetration Testing Tools - Kali Linux 103 |
A listing of the Penetration Testing Tools available in Kali Linux 104 |
PentestBox Tools 105 |
106 |
KitPloit - PenTest Tools for your Security Arsenal ☣ 107 |
Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security ☣ 108 |
Category:Penetration Testing Tools - OWASP 109 |
110 |
GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things 111 |
awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things 112 |
SecTools.Org Top Network Security Tools 113 |
114 |
Tools & Methods | Tools & Methods Developed at the SEI 115 |
Tools & Methods Developed at the SEI 116 |

117 |

Education

118 |

119 |

CTFs

120 |

121 |

CTF365: Capture the Flag - Security Training Platform 122 |
CTF365 is a top notch “Security Training Platform for the IT industry with a focus on Security Professionals, System Administrators and Web Developers”. The Platform implements CTF (Capture The Flag) concepts and leverages gamification mechanics to improve retention rates and speed up the learning/training curve. Security can be learned Hands On only. Enjoy! 123 |
GitHub - apsdehal/awesome-ctf: A curated list of CTF frameworks, libraries, resources and softwares 124 |
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares 125 |
CTFtime.org / All about CTF (Capture The Flag) 126 |
Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups 127 |
EasyCTF 128 |
129 |
OpenToAll CTF Team – open to all at all times 130 |
131 |

132 |

Labs & Exercises

133 |

134 |

Exploit Exercises 135 |
136 |
[PentesterLab] Learn Web Penetration Testing: The Right Way 137 |
138 |
Home : Hacking-Lab.com 139 |
Welcome to hacking-lab.com 140 |
Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information] 141 |
Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles. 142 |
Hack This Site! 143 |
HackThisSite! is a legal and safe network security resource where users test their hacking skills on various challenges and learn about hacking and network security. Also provided are articles, comprehensive and active forums, and guides and tutorials. Learn how to hack! 144 |
Vulnerable By Design ~ VulnHub 145 |
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks. 146 |
Gh0st Networks 147 |
148 |
Penetration test lab "Test lab" | Pentestit 149 |
150 |
Hack.me · The house of rising sandbox 151 |
Hack.me is a free community based project powered by eLearnSecurity. The community can build, host and share vulnerable web application code for educational and research purposes.The platform is available without any restriction to any party interested in Web Application Security: students, universities, researchers, penetration testers and web developers. 152 |
Levels - HackThis!! 153 |
Want to learn about hacking, hackers and network security. Try our hacking challenges or join our community to discuss the latest software and cracking tools. 154 |
SmashTheStack Wargaming Network 155 |
156 |

157 |

Livefire Cyber

158 |

159 |

pwn0.com • the hacker playground 160 |
161 |
Arizona Cyber Warfare Range – Revolutionary advancement in cyber security happens here. 162 |
163 |

164 |

Cybrary - Free Online Cyber Security Training, Forever | Learn and Find Jobs 165 |
Cybrary is a completely FREE, forever, online Cyber Security training platform. Learn Information Security, for free and find jobs in the field! 166 |
IT Training Courses Online - Video Computer Classes 167 |
Easy to understand IT Training & IT Certification courses online. Grow your tech skills. Engaging videos with expert trainers. Start FREE now! 168 |

169 |

More resources

170 |

171 |

OSIntFramework.com 172 |
Catalog of OSInt tools and additional resources. 173 |
Online Penetration Testing Tools | Ethical Hacking Tools 174 |
We provide penetration testing tools that can be used online. Use our tools to test the security of your systems by doing remote reconnaissance, information gathering, online scans, enumeration and target discovery. 175 |
GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things 176 |
awesome-pentest - A collection of awesome penetration testing resources, tools and other shiny things 177 |

178 |

179 |

180 | --------------------------------------------------------------------------------