The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019
Original / 1st version here: https://pastebin.com/rMw4WbhX
Wayback Machine: https://web.archive.org/web/20200606111007/https://pastebin.com/rMw4WbhX
These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies # on Earth.
Networking: Good understanding of OSI layer model / Communication flow through each layer / Functions of each layer / Major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols / IP, ICMP Protocols (layer 3) / TCP, UDP Protocols (layer 4)
Overview of TCP/IP Layer model: ARP / Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports
Understanding of major (everyday Layer 7) services/protocols: DNS DHCP HTTP HTTP Header Fields HTTP Status Codes - How HTTP maintains state - HTTPS vs HTTP / FTP
Active vs Passive data transfer / SSH / SSH handshake / Telnet /Telnet Handshake / SMTP / SMTP handshake (Mail from/ RCPT ) / How attachments are handled Network
Troubleshooting Methodology: Understanding of Network Address Translation (NAT) / Port Address Translation (PAT) / Understanding of Proxies / Overview of Virtual Private Networks (VPNs)
How to read packet headers - Know common packet header information for IP, TCP, UDP
Understand which device operates at which OSI layer: Hub Switch / Managed vs Unmanaged - Firewall - IDS/IPS
Ability to read device logs: IDS/IPS Firewall Windows
Advanced Concepts: Content Delivery Networks (CDNs) / HTTP Pipelining / IPv4 vs IPv6 addressing scheme / IPv4 & IPv6 differences / Security Security Device Operations : Understanding of IDS/IPS technologies / Signature vs Anomaly based / HIDS vs NIDS / How Snort works / How IPS systems prevent attacks / Drop packets / TCP reset
Security Attacks: Detailed understanding of common web attacks: SQL Injection / Blind SQL Injection / Cross Site Scripting: Stored Reflected DOM / Cross Site Request Forgery / Local File Inclusion / Remote File Inclusion / Basic understanding of buffer overflow / Denial of Service / Remote Code Execution / PHP attacks / Heartbleed / Shellshock / Brute Force attacks
Understanding of the Malware Kill Chain: Worm vs Trojan / Phishing email / Landing redirect page / Exploit Kit / Malware Download / Malware Install / Phone Home / Data Exfiltration / Command and Control
Linux: Knowledge of filesystems used / NTFS, FAT vs ext2 3 4 / Overview of a journaling filesystem / Executing commands and command options / Interactive features: job control, history / File Utilities cp mv rm ls (etc.) / Editors: vi vim vimtutor nano / Process Utilities ps kill wait sleep / Filters: cat head tail sort uniq / How to read man pages: man vs info /apropos + man -k / Detailed knowledge of tcpdump / Detailed knowledge of grep / Overview of: sed awk cut screen nohup / How to background a process: At start of process Mid-way through the process / How to bring process to foreground
The Mind Maps listed below were made by amanhardikar; they are gigantic, well designed, extremely detailed graphics breaking down subjects/knowledge
pertinent to Hacking, OffSec, Cybersecurity & General Computer Science (which makes them pertinent to InfoSec/OffSec in general).
Even better, amanhardikar has directions on how to create such graphics listed at the site below as well.
All Mind Maps below found at https://www.amanhardikar.com/mindmaps.html
All/Most Mind Maps below are listed in HTML (Full Size) & PNG (Image Only)form.
https://www.amanhardikar.com/mindmaps.html# https://www.amanhardikar.com/mindmaps/AWSCompute.html https://www.amanhardikar.com/mindmaps/AWSCompute.png https://www.amanhardikar.com/mindmaps/AWSDatabase.html https://www.amanhardikar.com/mindmaps/AWSDatabase.png https://www.amanhardikar.com/mindmaps/AWSNetworking.html https://www.amanhardikar.com/mindmaps/AWSNetworking.png https://www.amanhardikar.com/mindmaps/AWSStorage.html https://www.amanhardikar.com/mindmaps/AWSStorage.png https://www.amanhardikar.com/mindmaps/BPMN2.0.html https://www.amanhardikar.com/mindmaps/BPMN2.0.png https://www.amanhardikar.com/mindmaps/BigDataSecurity.html https://www.amanhardikar.com/mindmaps/BigDataSecurity.png https://www.amanhardikar.com/mindmaps/BrowserPlugins.html https://www.amanhardikar.com/mindmaps/BrowserPlugins.png https://www.amanhardikar.com/mindmaps/CodeReview.html https://www.amanhardikar.com/mindmaps/CodeReview.png https://www.amanhardikar.com/mindmaps/Cryptography.html https://www.amanhardikar.com/mindmaps/Cryptography.png https://www.amanhardikar.com/mindmaps/ForensicChallenges.html https://www.amanhardikar.com/mindmaps/ForensicChallenges.png https://www.amanhardikar.com/mindmaps/Forensics.html https://www.amanhardikar.com/mindmaps/ISO27001.html https://www.amanhardikar.com/mindmaps/ISO27001.png https://www.amanhardikar.com/mindmaps/Infrastructure.html https://www.amanhardikar.com/mindmaps/Infrastructure.png https://www.amanhardikar.com/mindmaps/PCIDSS.html https://www.amanhardikar.com/mindmaps/PCIDSS.png https://www.amanhardikar.com/mindmaps/PKI.html https://www.amanhardikar.com/mindmaps/PKI.png https://www.amanhardikar.com/mindmaps/Practice.html https://www.amanhardikar.com/mindmaps/Practice.png https://www.amanhardikar.com/mindmaps/PracticeUrls.html https://www.amanhardikar.com/mindmaps/SABSAConcepts.html https://www.amanhardikar.com/mindmaps/SABSAConcepts.png https://www.amanhardikar.com/mindmaps/SABSADesign.html https://www.amanhardikar.com/mindmaps/SABSADesign.png https://www.amanhardikar.com/mindmaps/SABSAOperations.html https://www.amanhardikar.com/mindmaps/SABSAOperations.png https://www.amanhardikar.com/mindmaps/SHC.html https://www.amanhardikar.com/mindmaps/SHC.png https://www.amanhardikar.com/mindmaps/SecurityTests.html https://www.amanhardikar.com/mindmaps/SecurityTests.png https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.html https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.png https://www.amanhardikar.com/mindmaps/VPN.html https://www.amanhardikar.com/mindmaps/VPN.png https://www.amanhardikar.com/mindmaps/VoIP.html https://www.amanhardikar.com/mindmaps/VoIP.png https://www.amanhardikar.com/mindmaps/Wireless.html https://www.amanhardikar.com/mindmaps/Wireless.png https://www.amanhardikar.com/mindmaps/virus-classification.html https://www.amanhardikar.com/mindmaps/webapptest.html https://www.amanhardikar.com/mindmaps/webapptest.png https://www.amanhardikar.com/mindmaps/worm-classification.html
+++++++ Basic Training ++++++
#General/Basic Exploitation ############################ http://www.pentest-standard.org/index.php/Main_Page https://www.offensive-security.com/metasploit-unleashed/ http://null-byte.wonderhowto.com/how-to/metasploit-basics/ https://www.owasp.org/index.php/Main_Page https://github.com/nixawk/pentest-wiki https://github.com/beefproject/beef https://portswigger.net/burp/ https://www.metasploit.com/ http://exploitpack.com/ https://github.com/commixproject/commix https://github.com/reverse-shell/routersploit
#OffSec Distros ############################ https://www.kali.org/ https://www.blackarch.org/ https://www.parrotsec.org/ https://www.backbox.org/ https://www.pentoo.ch/ https://s-t-d.org/
#Vulnscanner/Sniffer/Tools/Web Exploitation ############################################ http://www.askapache.com/security/computer-security-toolbox-2/#common_security_programs https://pastebin.com/kP04r4PM http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/netdiscover http://www.tenable.com/products/nessus-vulnerability-scanner https://www.rapid7.com/products/nexpose/ https://cirt.net/nikto2 https://nmap.org/ https://github.com/netsniff-ng/netsniff-ng https://www.wireshark.org/ https://github.com/fwaeytens/dnsenum/ https://github.com/makefu/dnsmap/ http://www.tcpdump.org/ http://sqlmap.org/ https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project https://wpscan.org/ http://networksecuritytoolkit.org/nst/index.html https://github.com/droope/droopescan https://github.com/andresriancho/w3af https://www.netsparker.com/
#Password Cracker ############################ http://www.openwall.com/john/ http://hashcat.net/hashcat/
#Online Tools ############################ http://crackstation.net http://www.tcpiputils.com/ https://shodan.io https://urlscan.io/ https://dnsdumpster.com/ https://censys.io/ https://www.zoomeye.org/ http://crimeflare.org:82/
#Exploits (Exploit/Vulnerability Databases) ############################ https://exploit-db.com/ http://kernel-exploits.com https://github.com/PenturaLabs/Linux_Exploit_Suggester https://nvd.nist.gov/ https://www.us-cert.gov/ https://blog.osvdb.org/ http://www.securityfocus.com/ http://seclists.org/fulldisclosure/ https://technet.microsoft.com/en-us/security/bulletins https://technet.microsoft.com/en-us/security/advisories https://packetstormsecurity.com/ http://www.securiteam.com/ http://cxsecurity.com/ https://www.vulnerability-lab.com/
#Payloads/Reverse Shells ############################ https://www.veil-framework.com/framework/veil-evasion/ http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet https://highon.coffee/blog/reverse-shell-cheat-sheet/
#CTFs/Practice Boxes(VMs)/War Games, etc. ##########################################
NeverendingSecurity has a year long training plan for working through a massive list of practice boxes/wargames/CTFs at his site (link below); though it # is from 2015 & a few of the CTF/Practice Boxes/War Games listed there are gone, his post/plan is rock solid & includes a Mind Map PNG as a visual guide # (that mind map was attached to my first Twitter post of this updated archive on 6/9/2019.
PLEASE NOTE: The resources from the NeverendingSecurity's post (linked directly below) have already been added to this section's list ("CTFs/Practice # Boxes (VMs)/War Games, etc.") with as many defunct entries removed as possible.
NeverendingSecurity's Penetration Testing Practice Lab - Vulnerable Apps / Systems https://neverendingsecurity.wordpress.com/category/mobile-phones-tabs/ NeverendingSecurity's Mind Map PNG for the material linked above - https://www.amanhardikar.com/mindmaps/Practice.png
https://www.vulnhub.com/ Vulnerable Web Applications: OWASP BWA: http://code.google.com/p/owaspbwa OWASP Hackademic: http://hackademic1.teilar.gr OWASP SiteGenerator: https://www.owasp.org/index.php/Owasp_SiteGenerator OWASP Bricks: http://sourceforge.net/projects/owaspbricks & http://sechow.com/bricks OWASP Security Shepherd: https://www.owasp.org/index.php/OWASP_Security_Shepherd Damn Vulnerable Web App (DVWA): http://www.dvwa.co.uk Damn Vulnerable Web Services (DVWS): http://dvws.professionallyevil.com WebGoat.NET: https://github.com/jerryhoff/WebGoat.NET PentesterLab: https://pentesterlab.com Butterfly Security Project: http://thebutterflytmp.sourceforge.net LAMPSecurity: http://sourceforge.net/projects/lampsecurity Moth: http://www.bonsai-sec.com/en/research/moth.php WackoPicko: https://github.com/adamdoupe/WackoPicko & http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf BadStore: http://www.badstore.net WebSecurity Dojo: http://www.mavensecurity.com/web_security_dojo BodgeIt Store: http://code.google.com/p/bodgeit hackxor: http://hackxor.sourceforge.net/cgi-bin/index.pl SecuriBench: http://suif.stanford.edu/~livshits/securibench SQLol: https://github.com/SpiderLabs/SQLol CryptOMG: https://github.com/SpiderLabs/CryptOMG XMLmao: https://github.com/SpiderLabs/XMLmao Exploit KB Vulnerable Web App: http://exploit.co.il/projects/vuln-web-app & http://sourceforge.net/projects/exploitcoilvuln PHDays iBank CTF: http://blog.phdays.com/2012/05/once-again-about-remote-banking.html GameOver: http://sourceforge.net/projects/null-gameover Zap WAVE: http://code.google.com/p/zaproxy/downloads/detail?name=zap-wave-0.1.zip PuzzleMall: http://code.google.com/p/puzzlemall VulnApp: http://www.nth-dimension.org.uk/blog.php?id=88 sqli-labs: https://github.com/Audi-1/sqli-labs bWAPP: http://www.mmeit.be/bwapp & http://sourceforge.net/projects/bwapp/files/bee-box & http://www.itsecgames.com NOWASP / Mutillidae 2: http://sourceforge.net/projects/mutillidae SocketToMe: http://digi.ninja/projects/sockettome.php Project GameOver: http://null.co.in/2012/06/14/gameover-web-pentest-learning-platform OWASP Vicnum Project: https://sourceforge.net/projects/vicnum & http://vicnum.ciphertechs.com Hackademic Challenges: http://www.hackademic.eu
Damn Vulnerable Linux: http://sourceforge.net/projects/virtualhacking/files/os/dvl & http://www.damnvulnerablelinux.org Metasploitable: http://sourceforge.net/projects/virtualhacking/files/os/metasploitable & https://sourceforge.net/projects/metasploitable LAMPSecurity: http://sourceforge.net/projects/lampsecurity UltimateLAMP: http://www.amanhardikar.com/mindmaps/practice-links.html & http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip heorot: DE-ICE, hackerdemia http://hackingdojo.com/downloads/iso/De-ICE_S1.100.iso DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.110.iso DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.120.iso DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S2.100.iso DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.123.iso De-ICE HackerPedia PenTest LiveCDs http://de-ice.net/hackerpedia/index.php/De-ICE.net_PenTest_Disks pWnOS: http://www.pwnos.com & http://www.krash.in/bond00/pWnOS%20v1.0.zip & http://www.backtrack-linux.org/forums/backtrack-videos/2748-%5Bvideo%5D-attacking-pwnos.html Holynix: http://sourceforge.net/projects/holynix/files & http://pynstrom.net/index.php?page=holynix.php Kioptrix: http://www.kioptrix.com/blog/?page_id=135 exploit-exercises – nebula, protostar, fusion: http://exploit-exercises.com/download PenTest Laboratory: http://pentestlab.org/lab-in-a-box RebootUser Vulnix: http://www.rebootuser.com/?page_id=1041 neutronstar: http://neutronstar.org/goatselinux.html scriptjunkie.us: http://www.scriptjunkie.us/2012/04/the-hacker-games 21LTR: http://21ltr.com/scenes SecGame # 1 Sauron: http://sg6-labs.blogspot.co.uk/2007/12/secgame-1-sauron.html Pentester Lab: https://www.pentesterlab.com/exercises Vulnserver: http://www.thegreycorner.com/2010/12/introducing-vulnserver.html TurnKey Linux: http://www.turnkeylinux.org Bitnami: https://bitnami.com/stacks Elastic Server: http://elasticserver.com CentOS: http://www.centos.org Katana: http://www.hackfromacave.com/katana.html Virtual Hacking Lab: http://sourceforge.net/projects/virtualhacking/files Hacking-Lab: http://www.hacking-lab.com/hl_livecd
Acunetix acuforum: http://testasp.vulnweb.com Acunetix acublog: http://testaspnet.vulnweb.com Acunetix acuart: http://testphp.vulnweb.com Cenzic crackmebank: http://crackme.cenzic.com HP freebank: http://zero.webappsecurity.com IBM altoromutual: http://demo.testfire.net Mavituna testsparker: http://aspnet.testsparker.com Mavituna testsparker: http://php.testsparker.com NTOSpider Test Site: http://www.webscantest.com
Old Version: http://www.oldversion.com Old Apps: http://www.oldapps.com VirtualHacking Repo: http://sourceforge.net/projects/virtualhacking/files/apps%40realworld Huge collection of old/obscure web browsers https://browsers.evolt.org/ The X2 MS-DOS Programming Archive http://ftp.lanet.lv/ftp/mirror/x2ftp/msdos/programming/00index.html bbLean old Blackbox Windows 7
#Info/Blogs/Techniques/Forums, etc. #################################### http://wiki.bash-hackers.org/scripting/style https://www.corelan.be/index.php/articles/ https://www.veracode.com/security/xss http://www.thegeekstuff.com/2012/02/xss-attack-examples/ https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://thehackernews.com/ http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/ https://hakin9.org/voip-hacking-techniques/ https://greysec.net/ https://themanyhats.club/ https://kapeli.com/cheat_sheets/Chromium_Command_Line_Switches.docset/Contents/Resources/Documents/index https://www.andreafortuna.org/2018/07/18/tcpdump-a-simple-cheatsheet/ https://www.andreafortuna.org/2018/07/16/finding-malware-on-memory-dumps-using-volatility-and-yara-rules/ http://hacker-club-cvd.tripod.com/id20.html Sites for Improving Your Hacking Skills: EnigmaGroup: http://www.enigmagroup.org Exploit Exercises: http://exploit-exercises.com Google Gruyere: http://google-gruyere.appspot.com Gh0st Lab: http://www.gh0st.net Hack This Site: http://www.hackthissite.org HackThis: http://www.hackthis.co.uk HackQuest: http://www.hackquest.com Hack.me: https://hack.me Hacking-Lab: https://www.hacking-lab.com Hacker Challenge: http://www.dareyourmind.net Hacker Test: http://www.hackertest.net hACME Game: http://www.hacmegame.org Hax.Tor: http://hax.tor.hu OverTheWire: http://www.overthewire.org/wargames PentestIT: http://www.pentestit.ru/en pwn0: https://pwn0.com/home.php RootContest: http://rootcontest.com Root Me: http://www.root-me.org/?lang=en Security Treasure Hunt: http://www.securitytreasurehunt.com Smash The Stack: http://www.smashthestack.org TheBlackSheep and Erik: http://www.bright-shadows.net ThisIsLegal: http://thisislegal.com Try2Hack: http://www.try2hack.nl WabLab: http://www.wablab.com/hackme XSS – Can You XSS This?: http://canyouxssthis.com/HTMLSanitizer XSS – ProgPHP: http://xss.progphp.com CTFtime (Details of CTF Challenges): http://ctftime.org/ctfs shell-storm Repo: http://shell-storm.org/repo/CTF CAPTF Repo: http://captf.com
ExploitMe Mobile Android Labs: http://securitycompass.github.io/AndroidLabs ExploitMe Mobile iPhone Labs: http://securitycompass.github.io/iPhoneLabs OWASP iGoat: http://code.google.com/p/owasp-igoat OWASP Goatdroid: https://github.com/jackMannino/OWASP-GoatDroid-Project Damn Vulnerable iOS App (DVIA): http://damnvulnerableiosapp.com Damn Vulnerable Android App (DVAA): https://code.google.com/p/dvaa Damn Vulnerable FirefoxOS Application (DVFA): https://github.com/pwnetrationguru/dvfa NcN Wargame: http://noconname.org/evento/wargame Hacme Bank Android: http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx InsecureBank: http://www.paladion.net/downloadapp.html
#Miscellaneous: VulnVPN: http://ww VulnVoIP: http://www.rebootuser.com/?page_id=1041 NETinVM: http://informatica.uv.es/~carlos/docencia/netinvm GNS3: http://sourceforge.net/projects/gns-3 XAMPP: https://www.apachefriends.org/index.html
#Lists ############################ https://code.google.com/archive/p/hacktooldepot/downloads http://tools.kali.org/tools-listing http://sectools.org/ https://github.com/fffaraz/awesome-cpp https://github.com/fffaraz/awesome-cpp https://github.com/alebcay/awesome-shell https://github.com/dreikanter/ruby-bookmarks https://github.com/sorrycc/awesome-javascript https://github.com/sindresorhus/awesome-nodejs https://github.com/dloss/python-pentest-tools https://github.com/ashishb/android-security-awesome https://github.com/bayandin/awesome-awesomeness https://github.com/paragonie/awesome-appsec https://github.com/apsdehal/awesome-ctf https://github.com/carpedm20/awesome-hacking https://github.com/paralax/awesome-honeypots https://github.com/clowwindy/Awesome-Networking https://github.com/onlurking/awesome-infosec https://github.com/rshipp/awesome-malware-analysis https://github.com/caesar0301/awesome-pcaptools https://github.com/sbilly/awesome-security https://github.com/sindresorhus/awesome https://github.com/danielmiessler/SecLists https://github.com/PaulSec/awesome-sec-talks
Vax/Ultrix-32M http://ftpmirror.your.org/pub/misc/unixarchive/
#General OSINT Resources
#Domains/Sources from Awesome-OSINT https://github.com/jivoi/awesome-osint
http://7photos.net/ http://92fiveapp.com/ http://a.nnotate.com/ http://academia.edu/ http://academic.research.microsoft.com/ http://advangle.com/ http://adwords.google.com/ http://agoa.info/ http://aiddata.org/ http://all-io.net/ http://allthefreestock.com/ http://alltop.com/ http://andrewmohawk.com/ http://annotatorjs.org/ http://answers.yahoo.com/ http://anydesk.com/ http://app.graphystories.com/ http://app.teachingprivacy.com/ http://arborjs.org/ http://archive.is/ http://archive.org/ http://archive.recapthelaw.org/ http://ascelibrary.org/ http://atlas.cid.harvard.edu/ http://auralink.com/ http://aws.amazon.com/ http://backtweets.com/ http://barometer.agorapulse.com/ http://batchgeo.com/ http://beakernotebook.com/ http://bitreading.com/ http://biznar.com/ http://blog.booksontheknob.org/ http://blog.inside.com/ http://bluenod.com/ http://boardreader.com/ http://bombbomb.com/ http://bonzobox.com/ http://booklikes.com/ http://bookseer.com/ http://booky.io/ http://bottlenose.com/ http://breachorclear.jesterscourt.cc/ http://brianfolts.com/ http://builtwith.com/ http://bunchapp.io/ http://buzzsumo.com/ http://cachedview.com/ http://campayn.com/ http://cardsmith.co/ http://ccsubs.com/ http://centralops.net/ http://channelkit.com/ http://chartico.com/ http://charts.hohli.com/ http://circos.ca/ http://citeseer.ist.psu.edu/ http://clarify.io/ http://classeur.io/ http://code-search.uni.lu/ http://collabtive.o-dyn.de/ http://colorbrewer2.org/ http://com.lullar.com/ http://commun.it/ http://competeshark.com/ http://comtrade.un.org/ http://coowon.com/ http://cosketch.com/ http://create.visual.ly/ http://creately.com/ http://creativecommons.org/ http://croppola.com/ http://crowdbase.com/ http://crowdriff.com/ http://csulb.libguides.com/ http://ctrlq.org/ http://dailyearth.com/ http://data.mashedworld.com/ http://data.un.org/ http://data.worldbank.org/ http://datatopics.worldbank.org/ http://datavizcatalogue.com/ http://dcpu.ru/ http://deathtothestockphoto.com/ http://dedicatedornot.com/ http://deturl.com/ http://dict.cn/ http://digg.com/ http://diytoolkit.org/ http://dmitrybaranovskiy.github.io/ http://dnshistory.org/ http://dnssec-debugger.verisignlabs.com/ http://dnsviz.net/ http://domainbigdata.com/ http://donottrack.us/ http://doodle.com/ http://dothop.com/ http://draw.to/ http://dropcanvas.com/ http://dygraphs.com/ http://e-mailvalidator.com/ http://ec.europa.eu/ http://edition.cnn.com/ http://education.iseek.com/ http://ekiga.org/ http://email-format.com/ http://emm.newsexplorer.eu/ http://en.arguman.org/ http://encfsmp.sourceforge.net/ http://endnote.com/ http://energyatlas.iea.org/ http://eraser.heidi.ie/ http://eu.wiley.com/ http://evernote.com/ http://exif.regex.info/ http://expertpages.com/ http://f1000.com/ http://facenama.com/ http://facesaerch.com/ http://faostat3.fao.org/ http://favobooks.com/ http://feed.exileed.com/ http://feed.janicek.co/ http://feed43.com/ http://fetchrss.com/ http://findface.ru/ http://flask.io/ http://flipboard.com/ http://flockdraw.com/ http://flumes.com/ http://foller.me/ http://follow.net/ http://followcheck.com/ http://followerwonk.com/ http://forebears.io/ http://forums.peerblock.com/ http://foswiki.org/ http://fotoflexer.com/ http://free-website-translation.com/ http://freekindlebooks.org/ http://freemind.sourceforge.net/ http://freeplane.sourceforge.net/ http://freestocks.org/ http://frengly.com/ http://freshmail.com/ http://gbimg.org/ http://ge.tt/ http://generator.acmi.net.au/ http://gengo.com/ http://geogig.org/ http://geosocialfootprint.com/ http://get-nod.com/ http://getpocket.com/ http://getstache.com/ http://gettwitterid.com/ http://gigablast.com/ http://gigatweeter.com/ http://globaledge.msu.edu/ http://googleplussearch.chromefans.org/ http://grass.osgeo.org/ http://greyguide.isti.cnr.it/ http://greylitstrategies.info/ http://groundera.com/ http://groupzap.com/ http://hashtagify.me/ http://hdlab.stanford.edu/ http://hdr.undp.org/ http://helpmeviz.com/ http://here.com/ http://highwire.stanford.edu/ http://hiverhq.com/ http://hlwiki.slais.ubc.ca/ http://home.rootsweb.ancestry.com/ http://hootsuite.com/ http://hosted.ap.org/ http://hubii.com/ http://hugin.sourceforge.net/ http://iab.worldbank.org/ http://iconosquare.com/ http://iloggo.com/ http://image.baidu.com/ http://imgur.com/ http://imindmap.com/ http://imtranslator.net/ http://indiatyping.com/ http://infinitekind.com/ http://infospace.com/ http://ink361.com/ http://inspire-geoportal.ec.europa.eu/ http://instantlogosearch.com/ http://intweets.com/ http://ip2geolocation.com/ http://iqalerts.com/ http://isorepublic.com/ http://itools.com/ http://itranslatevoice.com/ http://journals.cambridge.org/ http://journalseek.net/ http://jpgraph.net/ http://junar.com/ http://justdelete.me/ http://kaboompics.com/ http://kanbantool.com/ http://karmadecay.com/ http://kartograph.org/ http://keeeb.com/ http://keendly.com/ http://keepass.info/ http://kerika.com/ http://kerrick.github.io/ http://keywordtool.io/ http://kindlenationdaily.com/ http://kindleworld.blogspot.com/ http://kl1p.com/ http://klear.com/ http://klout.com/ http://kred.com/ http://ksosoft.com/ http://landmatrix.org/ http://le-tools.com/ http://leafletjs.com/ http://lendle.me/ http://lib.stat.cmu.edu/ http://library.columbia.edu/ http://library.morningstar.com/ http://lightzoneproject.org/ http://likealyzer.com/ http://link.springer.com/ http://linkurio.us/ http://linkydink.io/ http://listify.okfnlabs.org/ http://literatureandlatte.com/ http://losangeles.craigslist.org/ http://mag.io/ http://mailchimp.com/ http://mailtester.com/ http://manageflitter.com/ http://manybooks.net/ http://mapalist.com/ http://mapd.csail.mit.edu/ http://maperitive.net/ http://mapjam.com/ http://masterpasswordapp.com/ http://mediabugs.org/ http://mentionmapp.com/ http://metapicz.com/ http://metareddit.com/ http://metricsparrow.com/ http://mind42.com/ http://mobilimeet.com/ http://modestmaps.com/ http://moose-team.github.io/ http://mozy.com/ http://muckrack.com/ http://mustbepresent.com/ http://myfav.es/ http://neatline.org/ http://negativespace.co/ http://netbootcamp.org/ http://network-tools.com/ http://news.google.com/ http://news.yahoo.com/ http://newsblur.com/ http://newsinshorts.com/ http://newsmap.jp/ http://newspapermap.com/ http://nixory.sourceforge.net/ http://nodexl.codeplex.com/ http://nos.twnsnd.co/ http://nuzzel.com/ http://odysseytranslator.com/ http://office.microsoft.com/ http://offliberty.com/ http://oicweave.org/ http://ok.ru/ http://omeka.org/ http://omgili.com/ http://on.aol.com/ http://onemilliontweetmap.com/ http://online-barcode-reader.inliteresearch.com/ http://online.sagepub.com/ http://onwebchange.com/ http://open-data.europa.eu/ http://open.canada.ca/ http://opengovernmentdata.org/ http://openlayers.org/ http://opensyllabusproject.org/ http://orbisdirectory.bvdinfo.com/ http://origin.mxtoolbox.com/ http://osintframework.com/ http://otranscribe.com/ http://pageflow.io/ http://papersapp.com/ http://parrotread.com/ http://pennystocks.la/ http://philogb.github.io/ http://photobucket.com/ http://pingroupie.com/ http://pinstriped.com/ http://pith.li/ http://plusfeed.frosas.net/ http://polymaps.org/ http://pomodorotechnique.com/ http://popplet.com/ http://primarypad.com/ http://privazer.com/ http://qgis.org/ http://qrobe.it/ http://quibb.com/ http://qzone.qq.com/ http://rapportive.com/ http://raw.densitydesign.org/ http://recordspedia.com/ http://recruitin.net/ http://redditmetrics.com/ http://redirectdetective.com/ http://reederapp.com/ http://restya.com/ http://reunion.com/ http://reverbapp.com/ http://ricks-apps.com/ http://sameid.net/ http://scadaplan.com/ http://scribble.wreally.com/ http://scribblemaps.com/ http://scribbleton.com/ http://scylla.sh/ http://sdelements.github.io/ http://search.aol.com/ http://search.carrot2.org/ http://search.fb.com/ http://search.lycos.com/ http://search.twitter.com/ http://searchlr.net/ http://seashore.sourceforge.net/ http://selfoss.aditu.de/ http://seotoolsforexcel.com/ http://sharetronix.com/ http://simplenote.com/ http://sketchboard.io/ http://slangit.com/ http://sleepingtime.org/ http://slidedog.com/ http://slideidea.com/ http://smallpdf.com/ http://smallseotools.com/ http://smashfuse.com/ http://snapbird.org/ http://snoopsnoo.com/ http://snoopstation.com/ http://snradar.azurewebsites.net/ http://social.downornot.com/ http://socialblade.com/ http://socialmention.com/ http://socialrank.com/ http://socialsearching.info/ http://socialstats.ru/ http://softbytelabs.com/ http://somcloud.com/ http://spark.apache.org/ http://spoonbill.io/ http://spotlight.svezet.ru/ http://spydialer.com/ http://square.github.io/ http://squidnotes.com/ http://stackexchange.com/ http://start.io/ http://statpedia.com/ http://storyful.com/ http://storymaps.arcgis.com/ http://subreddits.org/ http://sunlightfoundation.com/ http://sync.in/ http://tabula.technology/ http://targetolog.com/ http://thebooksproject.co/ http://theoldreader.com/ http://thepund.it/ http://thinkery.me/ http://tiddlywiki.com/ http://timeglider.com/ http://timeline.knightlab.com/ http://tinderizer.com/ http://tinyletter.com/ http://toc.im/ http://todotxt.com/ http://toolbar.netcraft.com/ http://tools.seochat.com/ http://translate.reference.com/ http://translation.babylon.com/ http://translation2.paralink.com/ http://transparentbusiness.com/ http://trends24.in/ http://trendsmap.com/ http://trooclick.com/ http://trueconf.com/ http://twbirthday.com/ http://twchat.com/ http://tweepsect.com/ http://tweet4.me/ http://tweeten.xyz/ http://tweetpsych.com/ http://tweetreach.com/ http://tweetreports.com/ http://tweettunnel.com/ http://twicsy.com/ http://twiki.org/ http://twittercounter.com/ http://twitterfall.com/ http://twubs.com/ http://ubersuggest.org/ http://unctad.org/ http://unctadstat.unctad.org/ http://unstats.un.org/ http://updatey.com/ http://urbanlegends.about.com/ http://urlquery.net/ http://vanillaforums.org/ http://verificationhandbook.com/ http://verificationjunkie.com/ http://verify-email.org/ http://versionista.com/ http://video.search.yahoo.com/ http://viewdns.info/ http://visjs.org/ http://visual.ly/ http://visualizefree.com/ http://vizualize.me/ http://vk-to-rss.appspot.com/ http://vk.barkov.net/ http://vk.com/ http://vk5.city4me.com/ http://vkparser.ru/ http://voxalead.labs.exalead.com/ http://w3.unece.org/ http://wappwolf.com/ http://webboar.com.w3snoop.com/ http://webmeup.com/ http://website.informer.com/ http://websta.me/ http://webwhiteboard.com/ http://weibo.com/ http://whatismyipaddress.com/ http://whiteboard.co/ http://whiteboard.drewwilson.com/ http://whois.domaintools.com/ http://whoisrequest.com/ http://wiki.dbpedia.org/ http://wikidpad.sourceforge.net/ http://wikimapia.org/ http://winds.getstream.io/ http://wits.worldbank.org/ http://wn.com/ http://worldaerodata.com/ http://worldc.am/ http://worldmap.harvard.edu/ http://worldwidescience.org/ http://wridea.com/ http://www.timetoast.com/ http://www.todoyu.com/ http://www.tomighty.org/ http://www.topix.com/ http://www.torchbrowser.com/ http://www.trackur.com/ http://www.tradezone.com/ http://www.tradingeconomics.com/ http://www.transparency.org/ http://www.tripline.net/ http://www.trovando.it/ http://www.tumblr.com/ http://www.twazzup.com/ http://www.tweet-tag.com/ http://www.tweetarchivist.com/ http://www.tweetchat.com/ http://www.tweetpaths.com/ http://www.tweetstats.com/ http://www.twellow.com/ http://www.tweriod.com/ http://www.twiangulate.com/ http://www.twiddla.com/ http://www.twilert.com/ http://www.twingly.com/ http://www.twipho.net/ http://www.twitonomy.com/ http://www.twittersentiment.appspot.com/ http://www.ubicolor.com/ http://www.ucweb.com/ http://www.uis.unesco.org/ http://www.ultraedit.com/ http://www.unido.org/ http://www.urlvoid.com/ http://www.usersearch.org/ http://www.ussearch.com/ http://www.ustart.org/ http://www.uvrx.com/ http://www.vault.com/ http://www.vcasmo.com/ http://www.veoh.com/ http://www.verishow.com/ http://www.verticalresponse.com/ http://www.viadesk.com/ http://www.viamichelin.com/ http://www.videoscribe.co/ http://www.viseyes.org/ http://www.vision6.com.au/ http://www.visme.co/ http://www.vivicom.de/ http://www.vmukti.com/ http://www.walla.co.il/ http://www.wayp.com/ http://www.wdl.org/ http://www.webex.com/ http://www.webmii.com/ http://www.wepaste.com/ http://www.wepware.com/ http://www.whatshouldireadnext.com/ http://www.whitepages.com/ http://www.who.int/ http://www.whoishostingthis.com/ http://www.whoismind.com/ http://www.wiinkz.com/ http://www.wikia.com/ http://www.wikidot.com/ http://www.wikispaces.com/ http://www.wisemapping.com/ http://www.wolframalpha.com/ http://www.wonderpage.com/ http://www.wordle.net/ http://www.wordreference.com/ http://www.workboard.com/ http://www.world-newspapers.com/ http://www.worldc.am/ http://www.worldlingo.com/ http://www.xing.com/ http://www.xmarks.com/ http://www.xmind.net/ http://www.xrayz.co.uk/ http://www.yahoo.com/ http://www.yamli.com/ http://www.yandex.com/ http://www.yasni.com/ http://www.yougetsignal.com/ http://www.yournextread.com/ http://www.yourport.com/ http://www.yworks.com/ http://www.zabasearch.com/ http://www.zapmeta.com/ http://www.zaption.com/ http://www.zeadoo.com/ http://www.zeetings.com/ http://www.zenstart.com/ http://www.zingchart.com/ http://www.zoominfo.com/ http://www.zotero.org/ http://www.zyncro.com/ http://www124.lunapic.com/ http://xodo.com/ http://yippy.com/ http://yudu.com/ http://zanran.com/ http://zesty.ca/ http://zetoc.jisc.ac.uk/ http://zim-wiki.org/ http://zmail.sourceforge.net/ http://zooburst.com/
OSINT Resources by name from Awesome-OSINT https://github.com/jivoi/awesome-osint
General Search
The main search engines used by users.
Advangle
Aol
Ask
Bing
Better Search
Dothop
DuckDuckGo - an Internet search engine that emphasizes protecting searchers' privacy.
Factbites
Gigablast
Goodsearch
Google Search - Most popular search engine.
Instya
Impersonal.me
iSEEK Education
ixquick
Lycos
Parseek (Iran)
Peeplo
Search.com
SurfCanyon
Teoma
Wolfram Alpha
Yahoo! Search -
↑ Main National Search Engines
Localized search engines by country.
Alleba (Philippines) - Philippines search engine
Baidu (China) - The major search engine used in China
Daum (South Korea)
Eniro (Sweden)
Goo (Japan)
Najdsi (Slovenia)
Naver (South Korea)
Onet.pl (Poland)
Orange (France)
Parseek (Iran)
SAPO (Portugal)
Search.ch (Switzerland)
Walla (Israel)
Yandex (Russia)
↑ Meta Search
Lesser known and used search engines.
All-in-One
AllTheInternet
Etools
FaganFinder
Glearch
Goofram
iZito
Nextaris
Metabear
Myallsearch
Qrobe
Qwant
Sputtr
Trovando
WebOasis
WiinkZ
Zapmeta
↑ Specialty Search Engines
Search engines for specific information or topics.
2lingual Search
Biznar
CiteSeerX
FindTheCompany
Digle
Google Custom Search
Harmari (Unified Listings Search)
Internet Archive
Million Short
WorldWideScience.org
Zanran
↑ Visual Search and Clustering Search Engines
Search engines that scrape multiple sites (Google, Yahoo, Bing, Goo, etc) at the same time and return results.
Carrot2 - Organizes your search results into topics.
Cluuz - Generates easier to understand search results through graphs, images, and tag clouds.
Yippy - Search using multiple sources at once
↑ Similar Sites Search
Find websites that are similar. Good for business competition research.
Google Similar Pages
SimilarPages - Find pages similar to each other
SimilarSites - Discover websites that are similar to each other
SitesLike - Find similar websites by category
↑ Document and Slides Search
Search for data located on PDFs, Word documents, presentation slides, and more.
Authorstream
Find-pdf-doc
Free Full PDF
Hashdoc
Offshore Leak Database
PasteLert
PDF Search Engine
PPTHunter
RECAP
Scribd
SlideShare
Slideworld
soPDF.com
↑ Pastebins
Find information that has been uploaded to Pastebin.
Custom Pastebin Search - A custom search page that indexes 57 different paste sites.
PasteLert - PasteLert is a simple system to search pastebin.com and set up alerts (like google alerts) for pastebin.com entries.
↑ Code Search
Search by website source code
CoCaBu - Search engine that augments user query into code-friendly for retrieving precise examples.
FaCoY - Search engine that retrieves code examples that are syntactically and semantically similar.
NerdyData - Search engine for source code.
SearchCode - Help find real world examples of functions, API's and libraries across 10+ sources.
↑ Major Social Networks
Draugiem (Latvia)
Facebook
Facenama (Iran)
Google+
Instagram
Linkedin
Mixi (Japan)
Odnoklassniki (Russia)
Pinterest
Qzone (China)
Reddit
Taringa (Latin America)
Tinder
Tumblr
Twitter
Weibo (China)
VKontakte
Xing
↑ Real-Time Search, Social Media Search, and General Social Media Tools
Audiense
Bottlenose
Brandwatch
Buffer
Buzz sumo
Flumes
Gaddr
Geocreepy
Geofeedia
Hootsuite
HowSociable
Hashtatit
Icerocket
Klear
Klout
Kred
MustBePresent
Netvibes
OpinionCrawl
Rival IQ
RSS Social Analyzer
SmashFuse
SocialBakers
SociaBlade
Social DownORNot
Social Mention
Social Searcher
Tagboard
Trackur
UVRX
Social Media Tools ↑ Twitter
Backtweets
Blue Nod
burrrd.
Crate
Custom Twitter Tools
doesfollow
Fake Follower Check
FirstTweet
First Tweet
Foller.me
FollowCheck
Followerwonk
Geochirp
GeoSocial Footprint
GetTwitterID
Gigatweeter
Ground Signal
HappyGrumpy
Harvard TweetMap
Hashtagify
Hashtags.org
InTweets
ManageFlitter
Mentionmapp
OneMillionTweetMap
Queryfeed
Rank Speed
Riffle
RiteTag
Sentiment140
Silver Bird
SnapBird
Sleeping Time
Social Bearing
Social Rank First Follower
Spoonbill
Tagdef
TeachingPrivacy
Tinfoleak
Trends24
TrendsMap
Twazzup
twbirthday
TwChat
tweepsect
Tweet4me
TweetArchivist
Tweet Chat
TweetDeck
Tweeten
TweetMap
TweetMap
Tweetpaths
TweetPsych
Tweetreach
TweetStats
Tweet Tag
TweetTunnel
Twellow
Tweriod
Twiangulate
Twicsy
Twilert
Twipho
Twitonomy
TwitRSS
Twitter Advanced Search
Twitter Audit
Twitter Chat Schedule
Twitter Counter
Twitterfall
Twitter Search
Twitter Search Tools
TWUBS Twitter Chat
Schedule Warble
Agora Pulse
Commun.it
Custom Facebook Tools
ExtractFace
Fanpage Karma
Facebook Search
Facebook Search Tool
Facebook Search Tools
FaceLIVE
Fb-sleep-stats
Find my Facebook ID
LikeAlyzer
Lookup-ID.com
SearchIsBack
Socialsearching
Wallfux
Wolfram Alpha Facebook Report
Zesty Facebook Search
↑ Google+
CircleCount
Google Plus Search
PlusFeed
Custom Instagram Search Tools
Hashtagify
Iconosquare
Ink361
Picodash
SnapMap
Social Rank
Tofo.me
Websta (Instagram)
Worldcam
Pingroupie
Pin Search
Tools to help discover more about a reddit user or subreddit.
Imgur - The most popular image hosting website used by redditors.
Metareddit - Explore various subreddits.
Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
Reddit Archive - Historical archives of reddit posts.
Reddit Suite - Enhances your reddit experience.
Reddit Investigator - Investigate a reddit users history.
Reddit Metrics - Keeps track of the growth of a subreddit.
Reddit User Analyser - reddit user account analyzer.
SnoopSnoo - Provides reddit user and subreddits analytics.
Subreddits - Discover new subreddits.
Reddit Comment Search - Analyze a reddit users by comment history.
↑ VKontakte
Perform various OSINT on Russian social media site VKontakte.
Дезертир
Barkov.net
Find Face - Search for people on VK by photo.
Report Tree
Social Stats
Spotlight
Snradar - Search pictures by time and location they were taken
Target Hunter
Target Log
VK5
VK Community Search
VK Parser - A tool to search for a target audience and potential customers.
VK People Search
VK to RSS Appspot
↑ Tumblr
Searchlr - Search engine for tumblr posts.
Tumblr Search
FTL - Browser plugin that finds emails of people's profiles in LinkedIn.
↑ Blog Search
BlogSearchEngine
Icerocket
NetworkedBlogs
Notey - Blog post search engine.
Sphere
Twingly
↑ Forums and Discussion Boards Search
Boardreader
Facebook Groups
Google Groups
Linkedin Groups
Ning
Omgili
Xing Groups
Yahoo Groups
↑ Username Check
Check User Names
Custom Username Tools
Gaddr - Scan 50+ different websites for usernames.
Knowem - Search for a username on over 500 popular social networks.
Name Chk
Name Checkr
User Search
↑ People Investigations
411 (US)
192 (UK)
Alumni.net
Ancestry
Canada411
Cedar
Charlie App
Classmates
CrunchBase
Custom Person Search Tools
CVGadget
Data 24-7
Gaddr
facesearch - Search for images of a person by name.
Family Search
Family Tree Now
Federal Bureau of Prisons - Inmate Locator (US) - Find an inmate that is in the Federal Bureau of Prisons system.
Fold3 (US Military Records) - Browse records of US Military members.
Forebears
Genealogy Bank
Genealogy Links
Hey Press (Search for Journalists)
Homemetry
Infobel
Infospace White Pages
Interment
International White and Yellow Pages
Itools
Kompass
LookUpUK
Lullar
MarketVisual
MelissaDATA
My Life People Search
The National Archives (UK)
PeekYou
People Search (Australia)
PeopleSearch.net
Pipl
Rapportive
RecordsPedia
Recruitem
Reunion
Rootsweb
SearchBug
Skip Ease
snitch.name
SnoopStation
Spokeo
Switchboard
That’sThem
USSearch
WebMiii
White Pages (US)
Wink
Yasni
Zabasearch
Zoominfo
↑ E-mail Search / E-mail Check
Breach OR Clear
Custom Email Search Tools
BriteVerify Email Verification
Email Address Validator
Email Format
EmailHippo
Email Hunter
Email Permutator+
Emails4corporations
EmailSearch.net
Email Validator
Email Validator Tool
Have I Been Pwned - Search across multiple data breaches to see if your email address has been compromised.
MailTester
Peepmail
Pipl
ReverseGenie
TCIPUTILS.com Email Test
ThatsThem
Toofr
Verify Email
VoilaNorbert - Find anyone's contact information for lead research or talent acquisition.
↑ Phone Number Research
National Cellular Directory - was created to help people research and reconnect with one another by performing cell phone lookups. The lookup products includes have billions of records that can be accessed at any time, as well as free searches one hour a day, every day.
NumSpy-API - find details of any mobile number in india for free and get a JSON formated output, inspired by NumSpy.
Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
Twilio - Look up a phone numbers carrier type, location, etc.
Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.
↑ Expert Search
Academia
AllExperts
CanLaw
ExpertiseFinder
ExpertGuide
ExpertPages
Experts.com
HARO
HerSay
GlobalExperts
Idealist
Innocentive
Internet Experts
Library of Congress: Ask a Librarian
Maven
MuckRack
National Speakers Association
Newswise
Patent Attorneys/Agent Search
PRNewswire
ProfNet
ReseacherID
ScholarUniverse
SheSource
Speakezee
Sources
TRExpertWitness
Zintro
↑ Company Research
AllStocksLinks
Battle of the Internet Giants
Better Business Bureau
Bizeurope
Biznar
Bloomberg
Business Source
Bureau Van Dijk
Canadian Business Research
Canadian Business Resource
Central and Eastern European Business Directory
Company Registration Round the World
Company Research Resources by Country Comparably
CompeteShark
Corporate Information
CrunchBase
Data.com Connect
EDGAR Online
Europages
European Business Register
Ezilon
Factiva
FindtheCompany
Glassdoor
Global Business Register
globalEdge
GuideStar
Hoovers
Inc. 5000
InstantLogoSearch
iSpionage
Knowledge guide to international company registration
Linkedin
National Company Registers
MarketVisual
Mergent Intellect
Mergent Online
Morningstar Research
Notablist
Orbis directory
opencorporates
Owler
Overseas Company Registers
Plunkett Research
Scoot
SEMrush
Serpstat
SpyFu
Forbes Global 2000
Tradezone Europages
Vault
Xing
↑ Job Search Resources
Beyond
CampusCareerCenter
CareerBuilder
College Recruiter
Craiglist
CVFox
Dice
Eluta (Canada)
Eurojobs
Fish4Jobs
Glassdoor
Headhunter
Indeed
Jobs (Poland)
Jobsite (UK)
Linkedin
Monster
Naukri (India)
Reed (UK)
Seek (Australia)
SimplyHired
Xing
ZipRecruiter
↑ Q&A Sites
Answers.com
Ask
ChaCha
eHow
Quora
StackExchange
Wiselike
Yahoo Answers
↑ Domain and IP Research
Accuranker
ahrefs - A tool for backlink research, organic traffic research, keyword research, content marketing & more.
Alexa
Bing Webmaster Tools
BuiltWith
Central Ops
Custom Domain Search Tools
Custom IP Address Search Tools
Dedicated or Not
DNSDumpster
DNS History
DNSStuff
DNSViz
Domain Big Data
Domain Crawler
Domain Dossier
Domain History
Domain Tools - Whois lookup and domain/ip historical data.
Easy whois
Exonera Tor - A database of IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date.
Follow.net
GraphyStories
HypeStat
Infosniper
intoDNS
IP Checking
IP Location
IP 2 Geolocation
IP 2 Location
IPFingerprints
IPVoid - IP address toolset.
IntelliTamper
Kloth
NetworkTools
Majestic
MaxMind
MXToolbox - MX record lookup tool.
Netcraft Site Report
OpenLinkProfiler
Open Site Explorer
PageGlimpse
Pentest-Tools.com
PhishStats
Pulsedive
Quantcast
Quick Sprout
RedirectDetective
Remote DNS Lookup
Robtex
SameID
SecurityTrails - API to search current and historical DNS records, current and historical WHOIS, technologies used by sites and whois search for phone, email, address, IPs etc.
SEMrush
SEO Chat Tools
SEOTools for Excel
Similar Web - Compare any website traffic statistics & analytics.
SmallSEOTools
StatsCrop
Squatm3gator - Enumerate available domains generated modifying the original domain name through different cybersquatting techniques
TCPIPUTILS.com
urlQuery
URLVoid - Analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites.
Wappalyzer
WebMeUp
Website Informer
WhatIsMyIPAddress
Who.is - Domain whois information.
Whois Arin Online
WhoIsHostingThis
WhoisMind
Whoisology
WhoIsRequest
w3snoop
Verisign
ViewDNS.info
You Get Signal
↑ Keywords Discovery and Research
Google Adwords - Get monthly keyword volume data and stats.
Google Keyword Suggest Tool
Google Trends - See how many users are searching for specific keywords.
Keyword Discovery
Keyword Spy
KeywordTool
One Look Reverse Dictionary
Word Tracker
Soovle
Ubersuggest
↑ Web History and Website Capture
Archive.is
BlackWidow
CashedPages
CachedView
Screenshots.com
Wayback Machine - Explore the history of a website.
Wayback Machine Archiver
↑ Language Tools
2lingual
Apertium
Babelfish
Bablic
Babylon
Bing Translator
Dict.cn
Dictionary.com: Translation
FreeTranslation
Free Translator
Free Website Translation
Frengly
Gengo
Google Input Tools - Makes it easy to type in the language you choose, anywhere on the web.
Google Translate
Google Tranlslate Extension
IdiomaX Translation
India Typing
imTranslator
iTranslate
iTranslate Voice
Lexicool Translation
Linguee
LingvoSoftOnline
Microsoft Translator
Noslang
OdysseyTranslator
Pleco
PROMT-Online
Reddit/r/translator
Reverso
Slangit
Systran
Translate.com
Unbabel
WorldLingo
WorldReference.com
Yamli (Arabic Search Engine)
Yandex Translate
↑ Image Search
7Photos
Baidu Images
Bing Images
Clarify
Flickr
GoodSearch Image Search
Google Image
Gramfeed
Image Identification Project
Image Raider
KarmaDecay
Lycos Image Search
MyPicsMap
PhotoBucket
Picsearch
PicTriev
Reverse Image Search
StolenCameraFinder
TinEye - Reverse image search engine.
Websta
Worldcam
Yahoo Image Search
Yandex Images
↑ Image Analysis
ExifTool
Exif Search
FotoForensics
Gbimg.org
Ghiro
ImpulseAdventure
Izitru
Jeffreys Image Metadata Viewer
JPEGsnoop
Metapicz
↑ Stock Images
AlltheFreeStock
Death to Stock
Freeimages
Freestocks.org
Gratisography
IM Free
ISO Republic
iStockphoto
Kaboompics
LibreStock
Life of Pix
NegativeSpace
New Old Stock
Pixabay
Pexels
Stocksnap
Shutterstock
tookapic
Unsplash - Free high-resolution photos.
↑ Video Search and Other Video Tools
Aol Videos
Bing Videos
Blinkx
Clarify
Clip Blast
Custom YouTube Search Tools
DailyMotion
Deturl
DownloadHealper
Earthcam
Frame by Frame - Browser plugin that allows you to watch YouTube videos frame by frame.
Geosearch
Internet Archive: Open Source Videos
LiveLeak
Metacafe
Metatube
Montage
Reverse Image Search Tools
Veoh
Vimeo
Voxalead
Yahoo Video Search
YouTube
YouTube Data Viewer
ccSUBS - Download Closed Captions & Subtitles from YouTube
↑ Radio and Podcasts Tools
Clammr
iTunes Podcasts
Listelive
Pocket Casts
Podcast Chart
Podcast Directory
Podkicker
↑ Academic Resources and Grey Literature
Academia
Academic Journals
African Journal Online
American Society of Civil Engineers
Base
Bibsonomy
Cambridge Journals
The Collection of Computer Science Bibliographies - The CCSB is a collection of bibliographies of scientific literature in computer science from various sources, covering most aspects of computer science.
Core
Elsevier
Google Scholar
Grey Guide
Grey Literature (HLWIKI International)
Grey Literature – List of Gateways
Grey Literature Report
Grey Literature Strategies
GreyNet International
HighWire: Free Online Full-text Articles
Journal Guide
Journal Seek
JSTOR - Search over 10 million academic journal articles, books, and primary sources.
Lazy Scholar
Leibniz Information Centre For Science and Technology University Library - indexes all reports of German publicly funded projects and many scientific papers.
Microsoft Academic
NRC Research Press
Open Access Scientific Journals
Open Grey
The Open Syllabus Project
Oxford Journals
PubMed - Search more than 27 millions citations for biomedical literature from MEDLINE, life science journals, and online books.
Quetzal Search
Research Gate
SAGE Journals
ScienceDirect
SCIRP
Springer
ScienceDomain
Science Publications
Taylor & Francis Online
Wiley
World Digital Library
World Science
Zetoc
↑ Books and Reading
Amazon Cheap Books
Blinkist
Bookbub
Bookish
Booklikes
Bookmate
Bookseer
Books on the Knob
Calibre
Daily Cheap Reads
ExplainToMe
Favobooks
Free Book Search.net
Free Kindle Books
Gnooks
Google Books
Goodreads
Groundera
How Long To Read
I love my Kindle
Internet Archive Texts
Jellybooks
Just Free Books
Keendly
KindleFeeder
KindleNationDay
KindleWorld
Leatherbound
Lendle
LibraryThing
Librivox
Loyal Books
Many Books
MobiPocket
Narro
Open Culture: Free Audiobooks
OpeningtheBook
Overdrive
ParrotRead
Pixel of Ink
Project Gutenberg
Read
Reader IQ
Readgeek
Readism
Riffle
SendtoKindle
Shelfie
TasteKid: Books
TheBooksProject
TheFrugaleReader
Tinderizer
WhatShouldIReadNext
YourNextRead
↑ Geospatial Research and Mapping Tools
Animaps
Atlasify
Batchgeo
Bing Maps
CartoDB
Colorbrewer
CrowdMap
CTLRQ Address Lookup
Custom Satellite View Tools
Dominoc925
DualMaps
GeoGig
GeoNames
Esri
Flash Earth
Follow Your World
Google Earth
Google Maps
Google Maps Streetview Player
Google My Maps
GPSVisualizer
GrassGIS
Here
Hyperlapse
Inspire Geoportal
InstantAtlas
Instant Google Street View
Kartograph
Leaflet
MapAList
MapBox
Mapbuildr
Mapchart.net
Maperitive
MapHub
MapJam
Mapline
Mapquest
Modest Maps
NGA GEOINT
OpenLayers
Polymaps
Perry Castaneda Library
Open Street Map
QGIS
QuickMaps
StoryMaps
Scribble Maps
Terrapattern
Tableau
Timescape
View in Google Earth
Wikimapia
World Aeronautical Database
WorldMap Harvard
ViaMichelin
Yahoo Maps
Zeemaps
↑ News
1st Headlines
ABYZNewsLinks
AllYouCanRead
AP
Associated France Press (AFP)
BBC News
Bing News
CNN
Cyber Alert
DailyEarth
DPA International
The Economist Explorer
Euronews
Europe Media Monitor (EMM)
NewsExplorer
Factiva
France24
Google News
Google News Print Archive
HeadlineSpot
Itar-Tass
List of Newspapers.com
MagPortal
News Map
News Now
Newseum - Today Front Pages
Newslink
NewsLookup
Newspaper Map
Newspaperindex
Newspapers.com
NewsWhip
OnlineNewspapers
Paperboy
PR Newswire
Press Reader
Reuters
Silobreaker
Topix
WorldNews
World-Newspapers
Yahoo News
↑ News Digest and Discovery Tools
Flipboard
Hubii
Inshorts
Inside
News360
NewsBot
Newsinshorts
Nod
Nuzzle
Quibb
Reeder
Spike
Storyful
Superdesk
Trooclick
↑ Fact Checking
About Urban Legends
Captin Fact
Churnalism
Check
Citizen Desk
Emergent
Fact Check
Full Fact
MediaBugs
Snopes - The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
Verification Handbook
Verification Junkie
Verily
↑ Data and Statistics
AGOA Data Center
AidData
ADB Statistics and Databases
AWS Public Datasets
Bank for International Settlements Statistics
BP Statistical Review of World Energy
Berkely Library: Data Lab
CIA World Factbook
Center for International Earth Science Information Network
CEPII
Colombia University Library: General Statistical Sources, International Statistics
Data.gov.uk
DBPedia
European Commission Eurobarometer
European Union Open Data Portal
Eurostat
FAOSTAT
Freebase
Gapminder World
GEOHIVE
globalEDGE Database of International Business Statistics
Google Finance
Google Public Data Explorer
Government of Canada Open Data
HIS Piers
Human Development Reports
IDEA Databases
International Labour Comparisons
International Trade Center
ILOSTAT
ILO World Employment and Social Outlook Trends
IMF World Economic Outlook Database
Index Mundi
International Data Base
International Energy Agency Energy Atlas
International Energy Agency Statistics
International Finance Corporation Data and Indicators
Junar
Knoema
LandMatrix
Latinobarometro
Library, University of Michigan: Statistics and Datasets
Nation Master
OECD Aid Database
OECD Data
OECD Factbook
OECD Statistics Directorate
OFFSTATS
Open Data Network
Open Government Data
Paul Hensel’s General Informational Data Page
Penn World Table
Pew Research Center
Population Reference Bureau Data Finder
PRS Risk Indicators
Scylla - Various scans and database dumps.
SESRIC Basic Social and Economic Indicators
SESRIC Databases
Statista
The Atlas of Economic Complexity
The Data and Story Library
Trading Economics
Transparency.org Corruption Perception Index
UN COMTRADE Database
UNCTAD Country Fact Sheets
UNCTAD Investment Country Profiles
UNCTAD STAT
UN Data
UNDPs Human Development Index
UNECE
UNESCO Institute for Statistics
UNIDO Statistical Databases
UNStats Social Indicators
Upsala Conflict Data Program
US Data and Statistics
WHO Data
World Bank Data
World Bank Data
World Bank Doing Business
World Bank Enterprise Surveys
World Bank Investing Across Borders
World Integrated Trade Solution
WTO Statistics
Vizala
Zanran
↑ Web Monitoring
AlertBox
Alltop
Awasu
Bridge.Leslibres
Bridge.Suumitsu
ChangeDetect
ChangeDetection
CurioStudio
Deltafeed
DiggReader
Feed43
FeedBooster
Feederator
Feed Exileed
Feed Filter Maker
Feedly
FeedReader
FetchRSS
Flipboard
FollowThatPage
Google Alerts - A content change detection and notification service.
InfoMinder
IQAlerts
Mention
Netvibes
Newsblur
NewsRSSTicker
OmeaReader
OnWebChange
Reeder
RSS Bridge
RSS Feed Reader
RSS Micro
RSS Search Engine
RSS Search Hub
RSSOwl
RSS Subscription Extension
Sage
Selfoss
Silobreaker
Talkwalker
The Old Reader
versionista
visualping
WebReader
WebSite Watcher
Winds
↑ Bookmarking
Bibsonomy
BonzoBox
Booky
Buttons
Candybank
ChannelKit
Clipix
Curabase
Diigo
Dragdis
Evernote
Dropmark
eLink
FAVable
Google Bookmarks
Instapaper
Juxtapost
Keeeb
Klart
Linkman Pro
Linkstash
LiveBinders
Memit
Memonic
Microsoft OneNote
mochimarks
Papaly
Paperwork
Pearltrees
Pocket
Raindrop
Refind
Scoop.it
Scrapbook
Scrible
Sitehoover
Spaaze
Stache
start.me
Thinkery
Trackplanet
Wepware
Wonderpage
xmarks
Zotero
↑ Startpages
allmyfaves
ighome
iloggo
Kadaza
Myfav.es
My Yahoo
Protopage
Start.io
start.me
Symbaloo
uStart.org
Yourport
Zeadoo
Zenstart
↑ Browsers
Brave
CentBrowser
Chrome
Comodo Dragon
Coowon
Edge
Firefox
Maxthon
Opera
Safari
Sleipnir
Slimjet
SRWare Iron
Tor Browser - Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet.
Torch
UCBrowser
Vivaldi
Yandex Browser
↑ Offline Browsing
A1 Website Download - Download entire websites to disk.
Cyotek WebCopy
gmapcatcher
Hooey webprint
HTTrack - Allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.
Offliberty
Resolver
SiteSucker
WebAssistant
Website Ripper Copier
↑ VPN Services
TorrentFreak List of VPNs
↑ Note-taking
Cherrytree
Evernote
Fetchnotes
Google Keep
inkdrop
Kl1p
Laverna
Listacular
Microsoft OneNote
Notebook
Scribble
Simplenote
somnote
Squid
Tomboy
Workflowy
wridea
Calculist
↑ Annotation Tools
A.nnotate
Annotator
Diigo
Easy Annotate
Hypothesis
Note Anywhere
Pith.li
Pund.it
Skitch
↑ Writing and Office Tools
Arguman
Bibme
Cite This For Me
Classeur.io
FreeOffice
Grammarly
GoogleDocs
KingSoft
LibreOffice
MS Office
Office Online
OmniOutliner
OnlyOffice
oTranscribe
Scrivener
TextExpander
UltraEdit
WriteApp
↑ Slide Show and Presentation Tools
Canva
Convert Words to Time - Converts the number of words in a presentation or speech to how many minutes it will take to read.
Deckset
emaze
GoogleDocs
Haiku Deck
Keyonote
KingSoft
KnowledgeVision
LibreOffice
Live Slides
Mighty Meeting
Movenote
MS Office
MySlidePresenter
Powtoon
Presentation Next
presenterswall
Prezi
Slidedog
Slideidea
SlidePresenter
SlideRocket
Slides
SpeechInMinutes
Sway
vcasmo
Visme
Zoho Docs
↑ Digital Publishing
Canva
Doclayer
Issuu
Lucidpress
Mag.io
My eBook
Omeka
Scribd
Yudu
↑ Newsletter Tools
AWeber
BombBomb
Campayn
Canva
ConstantContact
Freshmail
GetResponse
iContact
MadMimi
Mailchimp
Mailjet
Mailup
Newsletter Creator for Gmail
sendinblue
Sendicate
Sendloop
Signupto
TinyLetter
VerticalResponse
Vision6
↑ Digital Storytelling
Adobe Voice
Animatron
Animoto
Atavist
Capzles
Closr
eStory
Exposure
Interlude
Klynt
MakeBeliefsComix
Metta
Neatline
Odyssey
Pageflow
Photodex
Piclits
Racontr
RaptMedia
RawShorts
Shorthand Social
Slate
Steller
Storify
Storyboard
Storyform
StoryMap
StoryMaps
Sway
Thinglink
Tripline
Wevideo
VideoScribe
Zaption
Zooburst
↑ Infographics and Data Visualization
Adobe Color CC
Aeon
Arbor.js
Beaker
Befunky
Bizint
Cacoo
Canva
chartblocks
Charted
Chartico
Chart.js
Circos
creately
Crossfilter
csvkit
Data Visualization Catalogue
D3js
Datawrapper
Dropmark
dygraphs
easely
Exhibit
Flot
FusionCharts
Google Developers: Charts
GraphX
Helpmeviz
Highcharts
Hohli
Inkscape
Infogr.am
Java Infovis Toolkit
JpGraph
jqPlot
Kartograph
Knoema
Leaflet
Listify
Linkuroius
LocalFocus
Lucidchart
Mapline
Nodebox
OpenLayers
Palladio
Piktochart
Pixcone
Pixxa
Plotly
SpicyNodes
StoryMap
QlikView
Quadrigram
Raphael
RAW
RichChartLive
Shanti Interactive
Silk
Snappa
Statpedia
Tableau
Tableau Public
Tagul
Textures.js
Tiki-toki
Tik-tok
Timeflow
Timeglider
Timeline
Timeline
Timescape
Timetoast
Weave
Wordle
Venngage
Visage
Vis.js
Visme
Visualize Free
Visualize.me
visually
Vortex
ZingChart
↑ Image and Photo Editing
Apple Photos
Aviary
Befunky
Croppola
FastSTone
Fotor
Foto Flexer
Gimp
Hugin
Image Composite Editor
Image Tricks Lite
Irfanview
LightZone
Lunapic
OnlineImageSplitter
Paint.NET
PhotoPlus
Photoscape
Photoshop
picfull
PicMoneky
Pixlr
Polarr
Seashore
SumoPaint
TinyPNG
↑ Productivity Tools
2Do
Any.do
Asana
Dapulse
Droptask
Flask
Focus booster
Freecamp
Good night Chrome
Leechblock
MorningRoutine
MyLifeOrganized
Pintask
PomodoroTechnique
Producteev
Remember the Milk
RescueTime
Restya
StayFocusd
Taskade
Taskboard
TikiTiki
Tinygain
Trello
Todo.ly
Todo
Todoist
Toggle
Tomighty
Toodledo
Workflowy
Wunderlist
↑ E-mail Management
ActiveInbox
AutoHotkey
Batched Inbox
Baydin
BetterGmail
Block Sender
Boomerang Mail
ClearContext
Cleanfox
CloudMagic
Complete
FindBigMail
Followupthen
Gpum
Hiver
Integrated gmail
Mailstore
Hubspotsales
Minimalist
NudgeMail
Rapportive
Sanebox
Send for Gmail
Sortd
TrueNew
Ugly Email
Unroll.me - Easily unsubscribe in one click from email subscriptions.
Wisestamp
↑ Document and Reference Management
Colwiz
DocumentCloud
Endnote
F1000
Investigative Dashboard Search
ManualsLib - Database of More Than 2.6M Manuals.
Mendeley
Omnity
Overview
Papers
Readcube
RefME
Zotero
↑ PDF Management
Foxit Reader
ilovepdf
PDFExpert
PDFx
Smallpdf
Tabula
XODO
Xpdf
Sejda
↑ OCR Tools
I2OCR
Free Online OCR
OCRmyPDF
Online OCR
↑ Cloud Storage and File Sharing
4Shared
ADrive
Amazon Cloud drive
Box
Boxcryptor
Cloudapp
CloudFuze
CloudHQ
Copy
Dropbox
Dropcanvas
Droplr
DropSend
Duplicati
Egnyte
Ge.TT
GoodSync
Google Drive
hubiC
iCloud
Mediafire
Mega
Mindbox
Mozy
Multicloud
Onedrive
Onehub
Otixo
pCloud
Sendthisfile
Sendspace
Simple.Savr
Spideroak
SugarSync
Syncthing
TransferBigFiles
Tresorit
WeTransfer
↑ Web Automation
Cloud Work
Dropbox
IFTTT
Sikuli
WeWiredWeb
Workflow
Zapier
↑ Dashboard Tools
Analytics Portfolio
Chartio
Clicdata
Cyfe
Dashthis
DataDeck
Geckoboard
Happy Metrics
Klipfolio
Qlik
Visually
↑ Wikis
DokuWiki
Foswiki
MediaWiki
PmWiki
Scribbleton
TiddlyWiki
Tiki Wiki
Torchpad
TWiki
Wikia
Wikidot
Wikispaces
wikidPad
Zim
↑ Collaboration and Project Management
10kinsights
15Five
92fiveApp
5pm
ActionMint
ActiveCollab
Advanseez
Agilewords
Agilezen
AllThings
Any.do
Apollo
Asana
Authorea
AWW
Azendoo
Basecamp
Binfire
Breeze
Canvanizer
Casual
Cardboardit
Cardsmith - Build visual collaboration systems with the familiarity of sticky notes on a white board.
CloudApp
Cnverg
Collabtive
CollaborateCloud
Comindwork
Conceptboard
Confluence
CoSketch
Crowdbase
Dayboard
Deekit
Draw.to
eGroupWare
Elegantt
Encrypted Cloud
Firepad
Firesub
Flask
Float
Flockdraw
Flow
Frame
Freedcamp
GetDoneDone
Glasscubes
GQueues
GroupZap
Hightail
hitask
Huddle
KabanTool
Kanboard
Kerika
Linky dink
Listacular
Loomio
LumoFlow
Mammoth
MyKanzen
Nozbe
Nutcache
Minute
Mural
OmniGroup
OnlyOffice
Padlet
Piematrix
Pinstriped
PivotalTracker
Plan
Planleaf
Planzone
Podio
PrimaryPad
ProjectManager
ProjectPlace
ProofHub
Quip
Quire
Realtimeboard
Redbooth
Restya
Reverb
ScadaPlan
Scribblar
SeavusProjectViewer
Smartsheet
Stackfield
Stormboard
Sync.in
SyncSpace
Taiga
TargetProcess
Taskboard
TeamAllocator
Team.fm
Teamgum
Team Pad
TeamWork
TeamWorklive
TitanPad
Todoyu - Original project discontinued - now maintained at Todoyu-PHP7.x
Transparent Business
Trello
Tuzzit
Twiddla
Twoodo
updatey
Web Whiteboard
Weekdone
Wekan
wePaste
Whiteboard
Whiteboard
Whiteboard Fox
Worknoard
Workfront
Wrike
Yammer
YouTrack
Zoho
↑ Communication Tools
Adobe Connect
AnyDesk
AnyMeeting
Auralink
Babblebay
BeamYourScreen
Blackboard
blind
Campfire
clearvale
Digital Samba
Discourse
eBLVD
Ekiga
Encrypted Cloud
Exo Platform
FaceFlow
Fleep
Flowdock
FreeConferenceCall
FreeScreenSharing
Friends
Glance
GoToMeeting
Highfive
HipChat
Icq
iLinc
Infinite
Intercall
iWowWe
Jam vee
Jitsi
Join.me
Jostle
Lets Chat
lifesize
Linphone
Live Conference Pro
Lucid Meetings
LumoFlow
Mashme tv
Meet.fm
MeetingOne
MeWe
mikogo
mobilimeet
MyBB
omNovia
ooVoo
Open Whisper Systems
Personify
PGi iMeet
Phorum
Polycom
Quicktopic
ReadyTalk
RingCentral
Rocket.Chat
screenleap
Sharetronix
sifonr
Simple Signal
Skarpline
Skype
Slack
Socialtext
StartMeeting
Talky
Teamviewer
Telegram
Tibbr
Tixeo
Toc
TrueConf
Twchat
Unicorns
Vanilla Forums
Veeting rooms
VeriShow
Viadesk
VideoLink2
Vivicom
VMukti
Webex
WhatsApp
worklife
Yugma
Zeetings
Zoho Meeting
Zoom
Zulip
Zyncro
↑ Calendars and Scheduling
Assistant
Bunchapp
Calendly
Cozi
Doodle
Foogi
Meekan
Meetin.gs
MyMemorizer
ScheduleOnce
TeamUp
Teamweek
↑ Mind Mapping, Concept Mapping and Idea Generation Tools
The Brain
Bubbl.us
Comapping
Coogle
Creately
Edynco
Fast Idea Generator
Freemind
Freeplane
Germ
GroupMap
iMindMap
iMindQ
InstaGrok
Lucidchart
Mattermap
Mind42
Mind Genius
Mindjet
Mind Manager
Mind Map
Mindmeister
Mindomo
MindMup
Popplet
Realtimeboard
Scapple
Sketchboard
Slatebox
Spicynodes
Spiderscribe
StoryMap
Wise Maping
yWorks
Xmind
↑ Social Network Analysis
Gephi
NodeXL
ORA
Sentinel Visualizer
Wynyard Group
Visual Investigative Scenarios
↑ Privacy and Encryption Tools
Abine
AdblockPlus
Adium
Axcrypt
Blender
boxcryptor
CCleaner
Chatsecure
ClearConsole
Click&Clean
Crypto.cat
Disconnect
Do Not Track
Duck Duck Go Search Engine
EncSF MP
Encrypted Cloud
Epic Privacy Browser
Eraser
FileVault
Ghostery
Gmelius for Inbox by Gmail
GNU PG
GPG Tools
Guardian Project
Guerrilla Mail
Hotspot Shield
HTTPs Everywhere
I2P
IBackup
IPLeak
Ixquick Search Engine
justdeleteme
KeePass Password Safe
Lastpass
Lockbin
Mailbox
Mailvelope
Master Password
Motherpipe
Nixory
NoScript
Open DNS
Open PGP
Open Whisper Systems
Oscobo Search Engine
OSSEC
Panopticlick
Peerblock
Pidgin
Pixel Block
Policeman
Privacy Badger
Privacy Pal
Privazer
Proton Mail
Qubes
Ricochet
Script Safe
Securesha
Silent circle
Snort
Spideroak
Surveilliance Self Defense
Tails
Thunderbird
Tor Project
uBlock
Unseen.is
Wickr
WOT
VeraCrypt
Viivo - End Of Life annoucement. EOL = July 1 2018.
ZMail
↑ DNS
Amass - The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations. Written in Go.
↑ Other Tools
Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
Belati - Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
The Harvester - Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
Intrigue Core - Framework for attack surface discovery.
Maltego - Interactive data mining tool that renders directed graphs for link analysis.
OpenRefine - Free & open source power tool for working with messy data and improving it.
Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
OSINT Framework - Web based framework for OSINT.
OsintStalker - Python script for Facebook and geolocation OSINT.
Outwit - Find, grab and organize all kinds of data and media from online sources.
Photon - Crawler designed for OSINT
Pown Recon - Target reconnaissance framework powered by graph theory.
QuickCode - Python and R data analysis environment.
Recon-ng - Full-featured Web Reconnaissance framework written in python.
SecApps Recon - Information gathering and target reconnaissance tool and UI.
sn0int - Semi-automatic OSINT framework and package manager.
Zen - Find email addresses of Github users
https://adium.im/ https://ahrefs.com/ https://analyticsportfolio.com/ https://animoto.com/ https://app.calculist.io/ https://archive.org/ https://asana.com/ https://atavist.com/ https://atomiks.github.io/ https://awwapp.com/ https://basecamp.com/ https://bhattsameer.github.io/ https://bitbucket.org/ https://bookmate.com/ https://books.google.com/ https://brave.com/ https://bridge.leslibres.org/ https://bridge.suumitsu.eu/ https://browser.yandex.com/ https://bubbl.us/ https://buffer.com/ https://burrrd.com/ https://cacoo.com/ https://calendly.com/ https://camo.githubusercontent.com/ https://canvanizer.com/ https://captainfact.io/ https://cardboardit.com/ https://cartodb.com/ https://cartodb.github.io/ https://casual.pm/ https://charlieapp.com/ https://chartio.com/ https://chatsecure.org/ https://chema.ga/ https://chrome.google.com/ https://cloudmagic.com/ https://cloudwork.com/ https://cnverg.com/ https://coggle.it/ https://color.adobe.com/ https://complete.li/ https://conceptboard.com/ https://connect.data.com/ https://core.ac.uk/ https://crowdmap.com/ https://crypto.cat/ https://ctrlq.org/ https://d3js.org/ https://dapulse.com/ https://dashthis.com/ https://data.gov.uk/ https://data.occrp.org/ https://data.oecd.org/ https://datanews.github.io/ https://datawrapper.de/ https://dayboard.co/ https://desktop.github.com/ https://developer.apple.com/ https://developer.github.com/ https://developers.google.com/ https://disconnect.me/ https://discover.twitter.com/ https://dnsdumpster.com/ https://docs.google.com/ https://doesfollow.com/ https://dominoc925-pages.appspot.com/ https://dragdis.com/ https://droplr.com/ https://duckduckgo.com/ https://education.github.com/ https://ejfox.github.io/ https://elegantt.com/ https://elink.io/ https://emailhunter.co/ https://en.mention.com/ https://en.todoist.com/ https://en.wikipedia.org/ https://enterprise.github.com/ https://evernote.com/ https://exonerator.torproject.org/ https://explaintome.herokuapp.com/ https://exposure.co/ https://fakers.statuspeople.com/ https://familysearch.org/ https://findmyfbid.in/ https://firepad.io/ https://firesub.com/ https://fleep.io/ https://flipboard.com/ https://followyourworld.appspot.com/ https://frame.io/ https://freedcamp.com/ https://fullfact.org/ https://gaddr.me/ https://geofeedia.com/ https://gephi.org/ https://germ.io/ https://getcrate.co/ https://geti2p.net/ https://getnewsbot.com/ https://github.blog/ https://github.com/ https://github.community/ https://githubstatus.com/ https://global.factiva.com/ https://gpgtools.org/ https://groups.google.com/ https://groups.yahoo.com/ https://guardianproject.info/ https://haveibeenpwned.com/ https://help.github.com/ https://highfive.com/ https://hitask.com/ https://homemetry.com/ https://hubic.com/ https://hypothes.is/ https://icq.com/ https://ifttt.com/ https://ilmk.wordpress.com/ https://images.google.com/ https://images.search.yahoo.com/ https://info.tiki.org/ https://infogr.am/ https://inkscape.org/ https://inteltechniques.com/ https://interlude.fm/ https://issuu.com/ https://itunes.apple.com/ https://jitsi.org/ https://kanboard.net/ https://keep.google.com/ https://klart.co/ https://knoema.com/ https://lab.github.com/ https://lastpass.com/ https://laverna.cc/ https://librestock.com/ https://librivox.org/ https://liinwww.ira.uka.de/ https://lockbin.com/ https://lookup-id.com/ https://lumoflow.com/ https://madmimi.com/ https://mailbox.org/ https://majestic.com/ https://mammothhq.com/ https://mapbuildr.com/ https://mapchart.net/ https://maphub.net/ https://mapline.com/ https://maps.yahoo.com/ https://medium.com/ https://meedan.com/ https://meekan.com/ https://meet.fm/ https://mega.nz/ https://metaproductsrevolver.com/ https://mewe.com/ https://millionshort.com/ https://minbox.com/ https://mixi.jp/ https://mochimarks.com/ https://montage.storyful.com/ https://motherpipe.com/ https://moz.com/ https://mural.co/ https://my.yahoo.com/ https://mykanzen.com/ https://news.google.com/ https://news360.com/ https://noscript.net/ https://nozbe.com/ https://numspy.pythonanywhere.com/ https://oedci.uspto.gov/ https://offshoreleaks.icij.org/ https://onedrive.live.com/ https://opencorporates.com/ https://opensource.guide/ https://oscobo.co.uk/ https://ossec.github.io/ https://padlet.com/ https://panopticlick.eff.org/ https://papaly.com/ https://pdfexpert.com/ https://pentest-tools.com/ https://phishstats.info/ https://piktochart.com/ https://pintask.me/ https://pipl.com/ https://pixabay.com/ https://pixlr.com/ https://plan.io/ https://play.google.com/ https://plot.ly/ https://plus.google.com/ https://podio.com/ https://prezi.com/ https://prnmedia.prnewswire.com/ https://products.office.com/ https://protonmail.com/ https://public.tableau.com/ https://pulsedive.com/ https://queryfeed.net/ https://quickcode.io/ https://quip.com/ https://quire.io/ https://racontr.com/ https://raindrop.io/ https://rapportive.com/ https://realtimeboard.com/ https://redbooth.com/ https://redditcommentsearch.com/ https://refind.com/ https://remote.12dt.com/ https://research.microsoft.com/ https://riccardoscalco.github.io/ https://ricochet.im/ https://ritetag.com/ https://rocket.chat/ https://scholar.google.com/ https://search.nerdydata.com/ https://searchcode.com/ https://searchisback.com/ https://secapps.com/ https://secure.flickr.com/ https://securesha.re/ https://securitytrails.com/ https://sendloop.com/ https://serpstat.com/ https://shorthand.com/ https://sites.google.com/ https://skarpline.com/ https://slack.com/ https://slate.adobe.com/ https://slatebox.com/ https://slides.com/ https://smilesoftware.com/ https://snapmap.knightlab.com/ https://snappa.io/ https://sourceforge.net/ https://spideroak.com/ https://ssd.eff.org/ https://standaert.net/ https://standout.adobe.com/ https://steller.co/ https://stock.tookapic.com/ https://stocksnap.io/ https://storify.com/ https://storyform.co/ https://storymap.knightlab.com/ https://support.apple.com/ https://sway.com/ https://syncthing.net/ https://tagboard.com/ https://tagdef.com/ https://tagul.com/ https://taiga.io/ https://tails.boum.org/ https://talky.io/ https://targethunter.net/ https://taskade.com/ https://taskboard.matthewross.me/ https://team.fm/ https://teamweek.com/ https://telegram.org/ https://thatsthem.com/ https://ticktick.com/ https://tineye.com/ https://tinfoleak.com/ https://tinygain.com/ https://tinypng.com/ https://titanpad.com/ https://todo.ly/ https://tofo.me/ https://tools.verifyemailaddress.io/ https://torchpad.com/ https://torrentfreak.com/ https://trackpanel.net/ https://training.github.com/ https://translate.google.com/ https://translate.yandex.ru/ https://trello.com/ https://tresorit.com/ https://trexpertwitness.com/ https://twitrss.me/ https://twitter.com/ https://uglyemail.com/ https://unbabel.com/ https://unicorns.io/ https://unroll.me/ https://unseen.is/ https://unsplash.com/ https://us.teamblind.com/ https://venngage.com/ https://veracrypt.codeplex.com/ https://veri.ly/ https://videolink2.me/ https://viivo.com/ https://vimeo.com/ https://vis.occrp.org/ https://visage.co/ https://visualping.io/ https://visualstudio.github.com/ https://vivaldi.com/ https://vizala.com/ https://vk.com/ https://wappalyzer.com/ https://warble.co/ https://weboas.is/ https://weekdone.com/ https://wekan.io/ https://wewiredweb.com/ https://whispersystems.org/ https://whiteboardfox.com/ https://who.is/ https://whois.arin.net/ https://whoisology.com/ https://wickr.com/ https://wiki.gnome.org/ https://wiselike.com/ https://wordstotime.com/ https://workflow.is/ https://workflowy.com/ https://writeapp.me/ https://www.veeting.com/ https://www.visualintelligence.co.nz/ https://www.voilanorbert.com/ https://www.wallflux.com/ https://www.wbginvestmentclimate.org/ https://www.wetransfer.com/ https://www.wevideo.com/ https://www.whatsapp.com/ https://www.wordtracker.com/ https://www.workfront.com/ https://www.worklife.com/ https://www.wrike.com/ https://www.wto.org/ https://www.wunderlist.com/ https://www.xing.com/ https://www.yammer.com/ https://www.yandex.com/ https://www.youtube.com/ https://www.yugma.com/ https://www.zeemaps.com/ https://www.zintro.com/ https://www.ziprecruiter.com/ https://www.zoho.com/ https://www.zotero.org/ https://www.zulip.org/ https://wynyardgroup.com/ https://yvoschaap.com/ https://zapier.com/ https://zoom.us/
#Defind OSINT sources
keyword research tools
Google Keyword Suggest Tool: Gives keywords suggestions for Google, Bing, Amazon and YouTube.
Google AdWords
Google Correlate
Keyword Tool
KWFinder
Keyword discover
Keyword Shitter
One Look: Enter a word, phrase, sentence, or pattern to search for related words.
Ubersuggest: suggest keywords not available in the Google Keyword Planner.
Search Engines
General Search
Google
Bing
Yahoo
AOL
Goodsearch
Factbites
Infospace
Lycos
Exalead
ASK
Ecosia
dothop
entireweb
teoma
yippy
I Search From: simulate using Google Search from a different location or device, or perform a search with custom search settings.
millionshort: Allows you to remove the top of the search engine results (e.g Remove top 100,1000,10000)
National Search Engines
Yandex: Russia
Search: Switzerland
Alleba: Philippines
Baidu | so | bhanvad China
Eniro: Sweden
Daum: South Korea
Goo: Japan
Onet: Poland Parseek: Iran SAPO: Portugal AONDE: Brazil Lableb: Arabic based search engine arabo: Arabic Search engine
Privacy-oriented search engines
DuckDuckGo: Online investigators usually use it to search the surface web while using the Tor Browser.
Startpage: Fetch results from Google without tracking its users.
Peekier: Privacy oriented search engines that fetch its results using its own search algorithm.
Qwant: Based in France.
Oscobo: Based in UK.
Swisscows: Privacy safe WEB-search based in Switzerland.
Privatelee: Search for web and images privately.
Gigablast: Open source search engine.
Gibiru: Uncensored and anonymous search engine.
jivesearch
Metadata search engines
Excite
Search
MetaGer
Zapmeta
etools: Compile its results from major international search engines, keep user privacy by not collecting or sharing personal information of its users. This search engine is very fast and show a summary for each search query -on the right side- detailing the source of its results.
All the interne: query major search engines including shopping site like Amazon and eBay.
izito: Aggregate data from multiple sources (Yahoo, Bing, Wikipedia, YouTube and other) to generate optimal results which includes images, videos, news and articles.
Metacrawler: Aggregate results from Google and Yahoo!.
My all search: Aggregates results through Bing, DuckDuckGo, AOL Search, Ask, Oscobo, Mojeek, ZapMeta, MetaCrawler.
Carrot2: Open Source Search Results Clustering Engine aggregate results from GoogleAPI, Bing API, eTools Meta Search, Lucene, SOLR, and more. elocalfinder: Fetch results from Google, Yahoo!, Ask and Bing . Opentext: Metasearch engine based on Google, Yahoo!, Ask, Bing, Wikipedia, and Open Directory. All-in-One Searx
FTP search engines
Global file search
Archie
File watcher
Mamont
NAPALM FTP Indexer
Files Search Engines
Faganfinder
General-Search
ShareDir
Image Search Engines
Google image search
Bing image search
Yahoo images
Yandex images
Baidu images
Imgur
Photobucket
Picsearch
creativecommons
Smug mug
Images shared across social media sites can be found in the following locations:
Lakako
Flickr
Flicker map:
My Pics map: View Flickr photos on a Google map.
idGettr: Find Flicker ID number (also works for groups).
Flickr Hive Mind: Data mining tool for the Flickr database of photography.
Instagram
Websta: Advanced search for Instagram website.
Stalkture: Instagram Online Web Viewer.
Mininsta: Advanced Instagram search engine.
Pinterest
There are specialized sites that hold images appeared in the press and news media, to search for this type of images go to:
Gettyimages: Contains images from news, entertainment, fashion, sports and archival imagery.
Reuters pictures
News press
Associated Press images portal
PA images
European pressphoto agency
Canadian Press images archive
Reverse image search
Google reverse search
Karmadecay
TinEye
REVERSE IMAGE SEARCH
Imagebrief
Cam finds App: this is an App available for both Android and Apple devices. It uses visual search technology to recognize uploaded picture and give instant results about it like related images, local shopping results and a vast selection of web results.
Image Identification Project
Video Search Engines
YouTube
Google video
Yahoo video search
Bing videos
AOL videos
StartPage video search
Veoh
Vimeo
360daily
Official Facebook video search
Crowd tangle (Facebook video search)
Internet archive open source movies
Live Leak
Facebook live video map
Meta Tube
Geo Search Tool: Search for all movies according to a specific query entered by the user – the result set will be further filtered according to the distance from a specific location (city, village, intersection) and according to a specific time frame (past hour, past two or three hours ..etc.).
Earth Cam
Insecam
Custom Search Engines
Google Custom Search Engines Finder
300+ Social Networking Sites
250+ Video Sharing Sites
File Sharing Sites Search
FTP and File Search Engine
Github Awesome Custom Search Engine
OSINT Tools, Resources & News Search
Torrent Search
Social Media Custom Search Engine
IFTTT Applet Finder
WordPress Content Hacker Search Engine
Short URL Search Engine
Raw Git Hacker Custom Search Engine
Internet Of Things (IoT) devices search engines
Shodan: Shodan is the world’s first search engine for Internet-connected devices.
ZoomEye
123cam
Airport webcams
Insecam
Lookr
Earthcam
Openstreetcam
Opentopia
Pictimo
Reolink – list of unsecured cameras
The webcam network
Thingful
Thingiverse
Webcam.nl (NL)
Webcams.travel
Worldcam
censys
Exploits search engines
sploitus
Google Hacking Database (GHDB)
exploit-db
News/Newspaper Search Engines
1stHeadlines: Breaking news headline.
Google News Archive
Google Newspaper Archive
News Now
Newspaper Archives: Contains Newspaper Archives 1607-2017 and Obituaries & Family History Records.
All you can read
Newspapers Search
Findmypast: US and world historical( China, Denmark, France, Germany, Jamaica, and South Africa are also searchable within the collection) Newspaper archive.
Daily Earth
Search U.S. Newspaper Directory, 1690-Present
Newspaper Map
World News
The paperboy
Newsography: International relations and armed conflicts global news aggregator and historical database.
Online Newspapers: Online Newspaper Directory for the World.
YouGotTheNews: Search Engine for US News – Search thousands of national, business, and local news sources.
Library of Congress Newspapers directory & 100 Years Ago Today: Search U.S. Newspaper Directory, 1690-Present using these two links from the Library of Congress.
Fake News Detection
Snopes: Discovers false news, stories, urban legends and research/validate rumors to see whether it is true.
Hoaxy: Check the spread of false claims (like a hoax, rumor, satire, news report) across social media sites. The site derives its results from reputable fact checking organizations to return the most accurate results.
FactCheck: This site is partnered with Facebook to help identify and label fake news reported by its users. It also monitors different media for the false info covering a wide range of topics like health, science, hoaxes spread through Spam emails.
ReviewMeta: Analysis Amazon user reviews.
Reporter Lab: Gives a map of global fact-checking sites.
Truth Or Fiction: Discover fake news in different topics like politics, nature, health, space, crime, police and terrorism…etc.
Hoax-Slayer: Focuses on email scam and social media hoaxes.
Verification Handbook: A definitive guide to verifying digital content for emergency coverage available in different languages.
Verification junkie: This is a directory of tools for verifying, fact checking and assessing the validity of eyewitness reports and user self-published content online.
citizen evidence: tools and lessons to teach people how to authenticate user-generated online contents. Managed by Amnesty International.
Specialized Search Engines Niche Search Engines
Secret Search Engine Labs: Showing you the less popular search results often omitted by mainstream search giants.
AllAreaCodes: Phone and Area Code Search
Patent Search Engines
Google Advanced Patent Search Engine
European Patent Office
Israel Patent Office Database
Norwegian Industrial Property Office
Swedish Patent and Registration Office
Switzerland
Taiwan Intellectual Property Office
Japan Patent Office
World Intellectual Property Organization (WIPO)
Korean Intellectual Property Rights Information Service (KIPRIS)
State Intellectual Property Office (SIPO) of the People’s Republic of China
Australia Patent Search
Canadian Intellectual Property Office
Danish Patent and Trademark Office
Finnish Patent and Registration Office
France Patent Search
Germany Patent Office
UK Patent Search Engine
India Patent Office
stopfakes: The International Trade Administration (ITA), U.S. Department of Commerce, manages STOPfakes.gov to assist U.S. businesses protect and enforce their intellectual property rights against counterfeits and pirated goods in the global marketplace.
FreePatentsOnline: Patent metadata search engine.
Patent Lens
Directory of Intellectual Property Offices Worldwide
Web Directories
Search Engine Colossus
The Ultimate Search Engine Links Page
The WWW Virtual Library
A web directory based on the DMOZ data
Best of the Web
GoWorkable – Global Business Listing
01webdirectory
Translation services
Google translator
Google Input Tools: Allows a user to enter text in any supported language using his/her English (Latin) keyboard and the text will get converted into its native script.
Apertium
Babylon
Bing translate
Dictionary
Wiktionary
Free translator
No slang
Business Search Business Annual Records
Annual Reports: Lists thousands of annual records from 5,333 companies worldwide.
Reporter Link: Contains more than 60 Million searchable tables, figures and datasets.
Gov.Uk
U.S. Securities and exchange commission
Sedar
Company registration around the world: Give a list of government, commercial registers websites around the globe.
Business Profiles
Open corporates: The largest open database of companies in the world.
crunchbase
Zoom info: List companies in the U.S categorized by industry and offer information
corporationwiki: Allows you to search for any company and visualize the connection between people working within it
Kompass: This is a global B2B portal with information about companies in more than 60 countries.
Infobel
Orbis directory
Manta: Business directory for U.S businesses
Canadian Company Capabilities
Canadian Importers Database
LittleSisThis is a powerful profiling website that lists a wealth of information about 185,000 people and 67,000 organizations in varying stages of completion.
Companies House
CDREX
EUROPAGES
Vault
Owler
The United Kingdom Limited Liability Company list
International White and Yellow Pages
Google finance
Grey literature
Grey information includes the following -and more (Academic papers, preprints, proceedings, conference & discussion papers, research reports, marketing reports, technical specifications and standards, dissertations, theses, trade publications, memoranda, government reports and documents not published commercially, translations, newsletters, market survey, draft version of books, articles.
Most important Grey literature (academic and scholarly resources) websites can be found in the following list:
Academia
Academic index
Academic torrents
American Doctoral Dissertations
ArchiveGrid
Google scholar
Bielefeld academic search engine
Archive portal Europe
Social Science Research Network
National library of Australia
ScienceDirect
PQDT Open
The national archive of the United Kingdom
Oxford academic
Page Press
CERN Document Server
High wire
Grey guide
Beyond citation
Crossref
Data Leak Websites
WikiLeaks
Cryptome
GlobaLeaks: is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives
BalkanLeaks: Focus on exposing organized crime and political corruption in Balkan.
Al Jazeera’s Investigative Unit: Leaks focusing on Arabic countries.
Pastebin sites Pastebin PasteLert: A Pastebin alerting service dedicated for Pastebin.com website.
https://numpi.com/ https://opencorporates.com/ https://phoneowner.com/ https://psbdmp.ws/ https://publicrecords.directory/ https://searchherenow.com/ https://speedyhunt.com/ https://unicourt.com/ https://www.callersmart.com/ https://www.peoplelooker.com/ https://www.phonesearchfree.com/ https://www.research.com/ https://www.snapdex.com/ https://www.spytox.com/ http://publicemailrecords.com/ http://publicsearchengine.com/ http://snapcode.net/ http://sometag.com/ http://ufind.name/ http://www.ivycall.com/ http://www.keecall.us/ http://www.peoplebyname.com/ https://golookup.com/ https://homemetry.com/
http://123cam.com/ http://academictorrents.com/ http://airportwebcams.net/ http://archie.icm.edu.pl/ http://camfindapp.com/ http://cdrex.com/ http://cn.bhanvad.com/ http://dailyearth.com/ http://dirpopulus.org/ http://discovery.nationalarchives.gov.uk/ http://dothop.com/ http://eng.kipris.or.kr/ http://english.sipo.gov.cn/ http://facebook.com/ http://flickrhivemind.net/ http://fqs.opentext.com/ http://globalfilesearch.com/ http://google.com/ http://greyguide.isti.cnr.it/ http://highwire.stanford.edu/ http://image.baidu.com/ http://images.yahoo.com/ http://infospace.com/ http://ipindia.nic.in/ http://isearchfrom.com/ http://karmadecay.com/ http://keywordshitter.com/ http://mininsta.net/ http://newsography.com/ http://newspapermap.com/ http://osint.link/ http://pericles.ipaustralia.gov.au/ http://photobucket.com/ http://pictures.reuters.com/ http://search.carrot2.org/ http://stalkture.com/ http://strategis.ic.gc.ca/ http://tools.seochat.com/ http://translate.reference.com/ http://translation.babylon-software.com/ http://trove.nla.gov.au/ http://verificationhandbook.com/ http://verificationjunkie.com/ http://vlib.org/ http://www.01webdirectory.com/ http://www.360daily.com/ http://www.academicindex.net/ http://www.alleba.com/ http://www.allyoucanread.com/ http://www.annualreports.com/ http://www.aol.com/ http://www.aonde.com/ http://www.apimages.com/ http://www.arabo.com/ http://www.archivesportaleurope.net/ http://www.beyondcitation.org/ http://www.bing.com/ http://www.cpimages.com/ http://www.crowdtangle.com/ http://www.dkpto.org/ http://www.earthcam.com/ http://www.elocalfinder.com/ http://www.epa.eu/ http://www.etools.ch/ http://www.excite.com/ http://www.factbites.com/ http://www.factcheck.org/ http://www.faganfinder.com/ http://www.filewatcher.com/ http://www.free-translator.com/ http://www.freepatentsonline.com/ http://www.general-search.com/ http://www.gettyimages.com/ http://www.gibiru.com/ http://www.goo.ne.jp/ http://www.google.com/ http://www.goworkable.com/ http://www.hoax-slayer.com/ http://www.ic.gc.ca/ http://www.ilpatsearch.justice.gov.il/ http://www.imagebrief.com/ http://www.infobel.com/ http://www.insecam.org/ http://www.izito.com/ http://www.lycos.com/ http://www.metacrawler.com/ http://www.metatube.com/ http://www.mmnt.ru/ http://www.mypicsmap.com/ http://www.newsnow.co.uk/ http://www.onelook.com/ http://www.onlinenewspapers.com/ http://www.opendissertations.com/ http://www.opentopia.com/ http://www.pagepress.org/ http://www.parseek.com/ http://www.picsearch.com/ http://www.reverse-image-search.com/ http://www.sciencedirect.com/ http://www.searchenginecolossus.com/ http://www.searchenginelinks.co.uk/ http://www.secretsearchenginelabs.com/ http://www.sedar.com/ http://www.teoma.com/ http://www.the-webcam-network.com/ http://www.tineye.com/ http://www.truthorfiction.com/ http://www.vault.com/ http://www.veoh.com/ http://www.wayp.com/ http://www.yahoo.com/ http://yippy.com/ http://youtube.github.io/ https://academic.oup.com/ https://adwords.google.com/ https://all-io.net/ https://andrewmohawk.com/ https://archive.org/ https://balkanleaks.eu/ https://beta.companieshouse.gov.uk/ https://beta.worldcat.org/ https://botw.org/ https://ccsearch.creativecommons.org/ https://cdsweb.cern.ch/ https://censys.io/ https://chroniclingamerica.loc.gov/ https://citizenevidence.org/ https://cryptome.org/ https://cse.google.com/ https://duckduckgo.com/ https://facebook.com/ https://finance.google.com/ https://hoaxy.iuni.iu.edu/ https://images.google.com/ https://imgur.com/ https://inteltechniques.com/ https://keywordtool.io/ https://kwfinder.com/ https://littlesis.org/ https://metager.org/ https://millionshort.com/ https://news.google.com/ https://newspaperarchive.com/ https://newspapers.com/ https://opencorporates.com/ https://orbisdirectory.bvdinfo.com/ https://oscobo.co.uk/ https://osint.link/ https://pastebin.com/ https://patent.prh.fi/ https://patentscope.wipo.int/ https://peekier.com/ https://pqdtopen.proquest.com/ https://privatelee.com/ https://reolink.com/ https://reporterslab.org/ https://reviewmeta.com/ https://scholar.google.com/ https://search.crossref.org/ https://search.findmypast.com/ https://searx.me/ https://sharedir.com/ https://sploitus.com/ https://strategis.ic.gc.ca/ https://swisscows.com/ https://translate.google.com/ https://twitter.com/ https://twpat.tipo.gov.tw/ https://ubersuggest.io/ https://video.search.yahoo.com/ https://vimeo.com/ https://webcam.nl/ https://websta.me/ https://wikileaks.org/ https://wn.com/ https://worldcam.eu/ https://worldwide.espacenet.com/ https://www.1stheadlines.com/ https://www.academia.edu/ https://www.aljazeera.com/ https://www.allareacodes.com/ https://www.alltheinternet.com/ https://www.aol.com/ https://www.apertium.org/ https://www.baidu.com/ https://www.base-search.net/ https://www.bing.com/ https://www.commercial-register.sg.ch/ https://www.companiesintheuk.co.uk/ https://www.corporationwiki.com/ https://www.crunchbase.com/ https://www.daum.net/ https://www.dpma.de/ https://www.ecosia.org/ https://www.eniro.se/ https://www.entireweb.com/ https://www.europages.co.uk/ https://www.exalead.com/ https://www.exploit-db.com/ https://www.facebook.com/ https://www.flickr.com/ https://www.gigablast.com/ https://www.globaleaks.org/ https://www.goodsearch.com/ https://www.google.com/ https://www.gov.uk/ https://www.graphene-theme.com/ https://www.imageidentify.com/ https://www.inpi.fr/ https://www.instagram.com/ https://www.j-platpat.inpit.go.jp/ https://www.jivesearch.com/ https://www.keyworddiscovery.com/ https://www.kompass.com/ https://www.lableb.com/ https://www.lakako.com/ https://www.lens.org/ https://www.liveleak.com/ https://www.lookr.com/ https://www.manta.com/ https://www.myallsearch.com/ https://www.news-press.com/ https://www.noslang.com/ https://www.onet.pl/ https://www.openstreetcam.org/ https://www.owler.com/ https://www.paimages.co.uk/ https://www.patentstyret.no/ https://www.pictimo.com/ https://www.pinterest.com/ https://www.prv.se/ https://www.qwant.com/ https://www.reportlinker.com/ https://www.sapo.pt/ https://www.search.ask.com/ https://www.search.ch/ https://www.search.com/ https://www.searchftps.net/ https://www.sec.gov/ https://www.shodan.io/ https://www.smugmug.com/ https://www.snopes.com/ https://www.so.com/ https://www.ssrn.com/ https://www.startpage.com/ https://www.stopfakes.gov/ https://www.swissreg.ch/ http://10minutemail.com/ http://a.placebetween.us/ http://academia.edu/ http://aprs.fi/ http://archive.is/ http://archive.org/ http://backtweets.com/ http://baidu.com/ http://biznar.com/ http://boardreader.com/ http://brupt.com/ http://canlii.com/ http://casa-query.funnelback.com/ http://centralops.net/ http://citationmachine.net/ http://cnac.ca/ http://companycheck.co.uk/ http://copac.jisc.ac.uk/ http://cpic-cipc.ca/ http://creafy.com/ http://data.worldbank.org/ http://emm.newsbrief.eu/ http://en.utrace.de/ http://epic.org/ http://eric.ed.gov/ http://exif.regex.info/ http://fb.com/ http://finance.yahoo.com/ http://fotoforensics.com/ http://freecarrierlookup.com/ http://geosocialfootprint.com/ http://groups.yahoo.com/ http://hashtagify.me/ http://hola.org/ http://humantraffickingsearch.net/ http://image.baidu.com/ http://itools.com/ http://jurn.org/ http://justdelete.me/ http://karmadecay.com/ http://keep-tube.com/ http://keyhole.co/ http://knowem.com/ http://libguides.com/ http://mailinator.com/ http://metrocosm.com/ http://mintbusinessinfo.com/ http://mulpix.com/ http://namechk.com/ http://nationalarchives.gov.uk/ http://network-tools.com/ http://news.google.com/ http://news.silobreaker.com/ http://newspapermap.com/ http://newstrust.net/ http://oa.anu.edu.au/ http://onemilliontweetmap.com/ http://openknowledgemaps.org/ http://panopticlick.eff.org/ http://pdfmyurl.com/ http://phototracker.ru/ http://publicrecords.searchsystems.net/ http://rootabout.com/ http://scholar.google.com/ http://search.carrot2.org/ http://search.mibbit.com/ http://search.yahoo.com/ http://snitch.name/ http://socialmention.com/ http://sqoop.com/ http://syndie.i2p2.de/ http://toddington.wpengine.com/ http://translate.google.com/ http://trendsmap.com/ http://tubechop.com/ http://twitterfall.com/ http://typelink.net/ http://ucbswww.bank-banque-canada.ca/ http://vault.fbi.gov/ http://verificationhandbook.com/ http://viewdns.info/ http://waqi.info/ http://webmii.com/ http://websiteoutlook.com/ http://wikileaks.org/ http://wikistats.co/ http://wn.com/ http://worldaerodata.com/ http://worldc.am/ http://worldlii.org/ http://www.2lingual.com/ http://www.allmyfaves.com/ http://www.allyoucanread.com/ http://www.answers.com/ http://www.archives.gov/ http://www.ask.com/ http://www.bikudo.com/ http://www.bing.com/ http://www.blackbookonline.info/ http://www.blinkx.com/ http://www.blogdigger.com/ http://www.chatslang.com/ http://www.citeulike.org/ http://www.cluuz.com/ http://www.cmegroup.com/ http://www.companieshouse.gov.uk/ http://www.corporationwiki.com/ http://www.data360.org/ http://www.deeperweb.com/ http://www.dmoz.org/ http://www.dogpile.com/ http://www.domaintools.com/ http://www.europages.co.uk/ http://www.europeana.eu/ http://www.ewhois.com/ http://www.exalead.com/ http://www.facesaerch.com/ http://www.factmonster.com/ http://www.feedmyinbox.com/ http://www.flickr.com/ http://www.freetranslation.com/ http://www.geocreepy.com/ http://www.getlinkinfo.com/ http://www.globalincidentmap.com/ http://www.globalsecurity.org/ http://www.google.com/ http://www.goorulearning.org/ http://www.gramfeed.com/ http://www.gutenberg.org/ http://www.hashatit.com/ http://www.hathitrust.org/ http://www.hurisearch.org/ http://www.icc-ccs.org/ http://www.icerocket.com/ http://www.imf.org/ http://www.instya.com/ http://www.kidrex.org/ http://www.kidsclick.org/ http://www.linguee.com/ http://www.livejournal.com/ http://www.mahalo.com/ http://www.moreofit.com/ http://www.mozbot.com/ http://www.n2yo.com/ http://www.nosi.org/ http://www.noslang.com/ http://www.oanda.com/ http://www.omgili.com/ http://www.opengrey.eu/ http://www.opensiteexplorer.org/ http://www.osira.net/ http://www.pbs.org/ http://www.peekyou.com/ http://www.phonebookoftheworld.com/ http://www.photobucket.com/ http://www.police.uk/ http://www.pressdisplay.com/ http://www.proxy4free.com/ http://www.publicproxyservers.com/ http://www.quertle.info/ http://www.refdesk.com/ http://www.reference.com/ http://www.refseek.com/ http://www.reuters.com/ http://www.samair.ru/ http://www.scholaruniverse.com/ http://www.shipais.com/ http://www.shodanhq.com/ http://www.similarsites.com/ http://www.slideshare.net/ http://www.spokeo.com/ http://www.springo.com/ http://www.sputtr.com/ http://www.start.umd.edu/ http://www.stayinvisible.com/ http://www.stolencamerafinder.com/ http://www.stratfor.com/ http://www.sweetsearch.com/ http://www.systransoft.com/ http://www.tcij.org/ http://www.technorati.com/ http://www.thetimenow.com/ http://www.thetimezoneconverter.com/ http://www.tineye.com/ http://www.topix.com/ http://www.topmarks.co.uk/ http://www.truecaller.com/ http://www.urbandictionary.com/ http://www.vesseltracker.com/ http://www.visualcapitalist.com/ http://www.wdl.org/ http://www.webcitation.org/ http://www.wikipedia.org/ http://www.wolframalpha.com/ http://www.worldlingo.com/ http://www.yamli.com/ http://www.yandex.com/ http://www.yoname.com/ http://www.zabasearch.com/ http://www.zamzar.com/ http://www.zoominfo.com/ http://www.zotero.org/ http://wwwapps.tc.gc.ca/ http://yippy.com/ http://zesty.ca/ http://zetoc.jisc.ac.uk/ https://29a.ch/ https://academic.microsoft.com/ https://addons.mozilla.org/ https://app.echosec.net/ https://berify.com/ https://bestvpn.org/ https://blog.pinterest.com/ https://censys.io/ https://connectonline.asic.gov.au/ https://core.ac.uk/ https://duckduckgo.com/ https://followyourworld.appspot.com/ https://freenetproject.org/ https://geti2p.net/ https://giphy.com/ https://globaledge.msu.edu/ https://gnunet.org/ https://groups.google.com/ https://hunter.io/ https://intel.malwaretech.com/ https://intelx.io/ https://justice.gov.bc.ca/ https://keitharm.me/ https://livingatlas.arcgis.com/ https://lookup-id.com/ https://m.facebook.com/ https://noscript.net/ https://onion.cab/ https://onionview.com/ https://online.maryville.edu/ https://opencorporates.com/ https://oscobo.co.uk/ https://peekyou.com/ https://pipl.com/ https://pixelprivacy.com/ https://prism-break.org/ https://privacy.net/ https://search.creativecommons.org/ https://searchisback.com/ https://searx.me/ https://snitch.name/ https://sometag.org/ https://swisscows.com/ https://thatsthem.com/ https://translate.yandex.com/ https://transparencytoolkit.org/ https://twitter.com/ https://unfollowgram.com/ https://vimeo.com/ https://websta.me/ https://whoisology.com/ https://www.accountkiller.com/ https://www.anonymox.net/ https://www.base-search.net/ https://www.bellingcat.com/ https://www.cia.gov/ https://www.cloudwards.net/ https://www.comparitech.com/ https://www.downloadhelper.net/ https://www.earthcam.com/ https://www.facebook.com/ https://www.familysearch.org/ https://www.fbiic.gov/ https://www.geograph.org/ https://www.ghostery.com/ https://www.grammarcheck.net/ https://www.imageidentify.com/ https://www.instagram.com/ https://www.ixmaps.ca/ https://www.izito.com/ https://www.linkedin.com/ https://www.loc.gov/ https://www.numberway.com/ https://www.peoplefinders.com/ https://www.pinterest.com/ https://www.profilr.social/ https://www.pwnedlist.com/ https://www.quandl.com/ https://www.quora.com/ https://www.qwant.com/ https://www.reddit.com/ https://www.robtex.com/ https://www.safetydetective.com/ https://www.sansar.com/ https://www.searchencrypt.com/ https://www.sec.gov/ https://www.semanticscholar.org/ https://www.social-searcher.com/
#OpSec/Privacy/Anonymity ########################### Deep dot Web Archive https://archive.fo/uIZ5T Jolly Roger’s Security Guide for Beginners https://web.archive.org/web/201903151546 https://web.archive.org/web/20190315154618/http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/ https://archive.fo/xHVJn https://tails.boum.org/index.en.html https://www.torproject.org/ https://geti2p.net/en/ https://freenetproject.org/author/freenet-project-inc.html https://www.whonix.org/ https://heads.dyne.org/ https://thatoneprivacysite.net/ https://www.wilderssecurity.com/ https://anonymous-proxy-servers.net/index.html (JonDonym mix network site) https://neverendingsecurity.wordpress.com/ https://prism-break.org/en/ https://spyware.neocities.org/articles/ https://digdeeper.neocities.org/ https://tor.dial.ga/doc https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/a-few-recommendations/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/always-back-drives-especially-encrypted-drives/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-example-of-really-bad-opsec-smarten-up/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-introduction-to-an-expert-on-opsec-plus-md5-sha-1-checksums/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/another-scam-email-beware/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/are-you-using-safe-mail-net/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/bitcoin-clients-tails-blockchain-electrum/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/capabilities-of-the-nsa/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cold-boot-attacks-unencrypted-ram-extraction/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn-continued/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/connecting-tor-vpn-for-windows-users/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cookies-javascript-revisited-plus-flash-cookies-and-other-browser-tracking/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/exif-data/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/fraudulent-private-messages/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/general-security-precautions-when-posting-online-learn-from-others-mistakes/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/hiding-tor-from-your-isp-part-1-bridges-and-pluggable-transports/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-far-will-law-enforcement-go/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-connect-to-tor-over-top-of-tor/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-verify-your-downloaded-files-are-authentic/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/introduction-to-secure-communication-tor-https-ssl/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/invincibility-mindset-federal-government-bullying-tactics/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/it-is-obvious-when-you-are-using-tor/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/javascript-vulnerabilities-and-removing-personal-metadata-from-files/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-how-they-busted-sabu/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-libertas-dpr-sabu-[censored https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-sabu-became-fbi-informant-and-betrayed-jeremy-hammond/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-1-police-are-watching-it/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-2-thieves-scammers-and-counterfeit-bills/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-3-more-scam-stories/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-4-sellers-busted-for-money-laundering/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/monitoring-you-with-an-antenna/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/obtaining-sending-and-receiving-bitcoins-anonymously/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-continued/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-tails-virtual-box/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgpgpg-email-addresses/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/retaining-a-lawyer-how-to-handle-getting-caught-or-interrogated/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/securing-your-account-from-fbi-monitoring/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/the-strengh-of-cryptography-and-anonymity-when-used-properly/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/they-are-watching-you-viruses-malware-vulnerabilities/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tor-chat/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tracking-cookies/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/verifying-signed-messages-with-signatures-and-signing-your-own-messages/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/where-you-might-consider-running-to-if-you-had-no-other-choice/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/whole-disk-encryption-and-file-shredding/ https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/yet-another-example-of-how-strong-cryptopgraphy-and-proper-opsec-can-protect-even-pedophiles/ https://b3rn3d.herokuapp.com/blog/2014/01/08/managing-pseudonyms/ https://b3rn3d.herokuapp.com/blog/2014/01/10/ask-him-about-his-threat-model/ https://b3rn3d.herokuapp.com/blog/2014/01/13/braintricks-for-opsec/ https://b3rn3d.herokuapp.com/blog/2014/01/22/burner-phone-best-practices/ https://b3rn3d.herokuapp.com/blog/2014/01/31/tools-to-evade-stylometrics/ https://b3rn3d.herokuapp.com/blog/2014/02/04/event-boundaries-helping-to-compartmentalize-your-operations/ https://b3rn3d.herokuapp.com/blog/2014/02/10/for-aaron/ https://b3rn3d.herokuapp.com/blog/2014/02/17/perspectives-of-opsec-models/ https://b3rn3d.herokuapp.com/blog/2014/03/05/tor-country-codes/ https://b3rn3d.herokuapp.com/blog/2014/03/09/irl-spycraft/
OPSEC: Because Jail is for wuftpd Type: Video, conference talk URL: https://www.youtube.com/watch?v=9XaYdCdwiWU Description: This video covering hacker OPSEC is a necessary watch for anyone who is interested in the subject, especially hackers. The Grugq covers some very interesting case studies that allow you to learn from other hackers OPSEC failures.
B3RN3D.com Type: OPSEC blog URL: http://www.b3rn3d.com/ Description: B3RN3D is a blogger that is well-versed with topics such as operational security, maintaining anonymity, and mass surveillance. I often reference this blog.
The Paranoid’s Bible: An anti-dox effort Type: Resource repository URL: https://paranoidsbible.tumblr.com/library Description: Self-described as a “repository of knowledge meant to help people remove their information (Dox) from the web and people search engines.” Excellent, credible resource for removing information about your current identity.
Alpraking's OPSEC guide to being a successful kingpin Type: Text guide URL: https://pastebin.com/0CxYx1BD Description: Alpraking is an experienced drug kingpin in the online black market. In this post, he describes how he manages people and his drug operation with respect to operational security. Without great operational security, he would not be in business. This piece offers fantastic perspective from the black market community.
How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish Type: Book URL: https://www.amazon.com/How-Disappear-Digital-Footprint-Without/dp/1599219778 Description: This reading focuses on the offline side of disappearance; Frank Ahearn, an experienced skip tracer, guides us in preventing skip tracers and other parties from tracking our trail. This is an interesting read for anyone whom wishes to conceal his or her real identity. Pro-tip: start by buying this book with cash and a hoodie in a brick-and-mortar bookstore.
How to Lie to People: Achieving Anonymity through Disinformation and Data Poisoning Type: Text guide URL: https://pastebin.com/tXhiMk36 Description: DIzzIE provides helpful insight on how to lie effectively, and explains why and how lying can benefit your persona. This excellent resource can be read on your lunch break.
OPSEC failures of spies Type: Video, conference talk URL: https://www.youtube.com/watch?v=BwGsr3SzCZc Description: A case study on targeted surveillance. Explains how “telling” metadata is, specifically metadata pertaining to cellphone networks. This case study provides the opportunity to learn from the OPSEC failures of spies.
How to Master Secret Work Type: Text publication URL: http://www.historyisaweapon.com/defcon1/secretwork.html Description: Discusses the necessity of being able to carry out work and operations with assured secrecy. Governments subject to corruption have used dirty tactics to silence opposition parties in the past, and they will do it again. This resource will aid you in your thinking for illustrating underground operations in secrecy.
Centralised Place for Privacy Resources Type: Blog, resource repository URL: https://themanyhats.club/centralised-pla...resources/ Description: A list of privacy resources and security technologies. Great resources, it is definitely worth checking this list out to get more familiar with modern day security technologies and pro-privacy solutions.
Surveillance Self-Defense Type: Resource repository URL: https://ssd.eff.org/en Description: Collection of resources, tutorials, and briefings pertaining to counter-surveillance efforts. Includes tutorials for secure deletion, using PGP, OTR, 2FA, Signal, Tor services, etc.
The Motherboard Guide to Not Getting Hacked Type: Guide (PDF) URL: https://assets.documentcloud.org/documen...Hacked.pdf Description: Generally good advice for security practices. Covers security basics, mobile security, privacy, messaging, and avoiding state and police surveillance.
DEF CON 22: Blinding The Surveillance State Type: Surveillance conference talk URL: https://www.youtube.com/watch?v=xCH_q-xn760 Description: Christopher Soghoian discusses the importance of HTTPS for thwarting bulk data collection efforts, the importance of “translating” cybersecurity talk to politicians, lawmakers and court systems, among other things. I would recommend this talk for privacy activists and advocates.
Things NOT to Do Type: OPSEC Guide URL: https://www.whonix.org/wiki/DoNot Description: A list of things that you should not do, with a general focus on the Tor network. Great OPSEC resource.
The CryptoPaper Type: Personal Security Guide URL: https://github.com/cryptoseb/CryptoPaper Description: "Privacy, Security, and Anonymity For Every Internet User"
++++++++++ Arms/Armor +++++++++++
• Name Version Description Homepage
0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site. http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
admsnmp 0.1 ADM SNMP audit scanner.
aesfix 1.0.1 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
aeskeyfind 1.0 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
aespipe 2.4c Reads data from stdin and outputs encrypted or decrypted results to stdout. http://loop-aes.sourceforge.net/aespipe/
afflib 3.7.3 An extensible open format for the storage of disk images and related forensic information. http://www.afflib.org
afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP) http://alexthepuffin.googlepages.com/
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. http://nullsecurity.net/tools/cracker.html
aiengine 352.fc452a9 A packet inspection engine with capabilities of learning without any human intervention. https://bitbucket.org/camp0/aiengine/
aimage 3.2.5 A program to create aff-images. http://www.afflib.org
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
airgraph-ng 2371 Graphing tool for the aircrack suite http://www.aircrack-ng.org
airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. http://midnightresearch.com/projects/wicrawl/
airpwn 1.4 A tool for generic packet injection on an 802.11 network. http://airpwn.sourceforge.net
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
american-fuzzy-lop 1.47b A practical, instrumentation-driven fuzzer for binary formats. https://code.google.com/p/american-fuzzy-lop/
androguard 1.9 Reverse engineering, Malware and goodware analysis of Android applications and more. https://code.google.com/p/androguard/
androick 5.35048d7 A python tool to help in forensics analysis on android. https://github.com/Flo354/Androick
android-apktool 2.0.0 A tool for reengineering Android apk files. http://forum.xda-developers.com/showthread.php?t=1755243
android-ndk r9c Android C/C++ developer kit. http://developer.android.com/sdk/ndk/index.html
android-sdk-platform-tools r21 Platform-Tools for Google Android SDK (adb and fastboot). http://developer.android.com/sdk/index.html
android-sdk r24.0.2 Google Android SDK. http://developer.android.com/sdk/index.html
android-udev-rules 135.d5aeca6 Android udev rules. https://github.com/bbqlinux/android-udev-rules
androidsniffer 0.1 A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more. http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
anontwi 1.0 A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com. http://anontwi.sourceforge.net/
aphopper 0.3 AP Hopper is a program that automatically hops between access points of different wireless networks. http://aphopper.sourceforge.net/
apnbf 0.1 A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device. http://www.c0decafe.de/
arachni 1.0.6 A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications. https://www.arachni-scanner.com
arduino 1.0.5 Arduino SDK (includes patched avrdude and librxtx) http://arduino.cc/en/Main/Software
argus 3.0.8 Network monitoring tool with flow control. http://qosient.com/argus/
argus-clients 3.0.8 Network monitoring client for Argus. http://qosient.com/argus/
armitage 141120 A graphical cyber attack management tool for Metasploit. http://www.fastandeasyhacking.com/
arp-scan 1.9 A tool that uses ARP to discover and fingerprint IP hosts on the local network http://www.nta-monitor.com/tools/arp-scan/
arpalert 2.0.11 Monitor ARP changes in ethernet networks. http://www.arpalert.org/
arpoison 0.7 The UNIX arp cache update utility http://www.arpoison.net
arpon 2.7 A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. http://arpon.sourceforge.net/
arpwner 26.f300fdf GUI-based python tool for arp posioning and dns poisoning attacks. https://github.com/ntrippar/ARPwner
artillery 1.0.3 A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system https://www.trustedsec.com/downloads/artillery/
asleap 2.2 Actively recover LEAP/PPTP passwords. http://www.willhackforsushi.com/Asleap.html
asp-audit 2BETA An ASP fingerprinting tool and vulnerability scanner. http://seclists.org/basics/2006/Sep/128
athena-ssl-scanner 0.5.2 a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers. http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
atstaketools 0.1 This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics. http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
auto-xor-decryptor 3.6a1f8f7 Automatic XOR decryptor tool. http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
autopsy 2.24 A GUI for The Sleuth Kit. http://www.sleuthkit.org/autopsy
azazel 10.401e3aa A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. https://github.com/chokepoint/azazel
b2sum 20140114 BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file. https://blake2.net/
backcookie 44.cbf5b8b Small backdoor using cookie. https://github.com/mrjopino/backcookie
backdoor-factory 118.6237b9f Patch win32/64 binaries with shellcode. https://github.com/secretsquirrel/the-backdoor-factory
backfuzz 36.8e54ed6 A network protocol fuzzing toolkit. https://github.com/localh0t/backfuzz
balbuzard 67.d6349ef1bc55 A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc). https://bitbucket.org/decalage/balbuzard/
bamf-framework 35.30d2b4b A modular framework designed to be a platform to launch attacks against botnets. https://github.com/bwall/BAMF
basedomainname 0.1 Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names. http://www.morningstarsecurity.com/research
batman-adv 2014.4.0 Batman kernel module, (included upstream since .38) http://www.open-mesh.net/
bbqsql 1.2 SQL injection exploitation tool. https://github.com/neohapsis/bbqsql
bdfproxy 58.79edcb2 Patch Binaries via MITM: BackdoorFactory + mitmProxy https://github.com/secretsquirrel/BDFProxy
bdlogparser 1 This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection. http://magikh0e.xyz/
bed 0.5 Collection of scripts to test for buffer overflows, format string vulnerabilities. http://www.aldeid.com/wiki/Bed
beef 0.4.5.1.59.g3b46bf1 The Browser Exploitation Framework that focuses on the web browser http://beefproject.com/
beeswarm 1154.29273e6 Honeypot deployment made easy http://www.beeswarm-ids.org/ https://github.com/honeynet/beeswarm/
beholder 0.8.10 A wireless intrusion detection tool that looks for anomalies in a wifi environment. http://www.beholderwireless.org/
beleth 36.0963699 A Multi-threaded Dictionary based SSH cracker. https://github.com/chokepoint/Beleth
bfbtester 2.0.1 Performs checks of single and multiple argument command line overflows and environment variable overflows http://sourceforge.net/projects/bfbtester/
bgp-md5crack 0.1 RFC2385 password cracker http://www.c0decafe.de/
binex 1.0 Format String exploit building tool. http://www.morxploit.com/morxtool
bing-ip2hosts 0.4 Enumerates all hostnames which Bing has indexed for a specific IP address. http://www.morningstarsecurity.com/research/bing-ip2hosts
bing-lfi-rfi 0.1 This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities. http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html
binwalk 2.0.1 A tool for searching a given binary image for embedded files. http://binwalk.org
binwally 4.0aabd8b Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep). https://github.com/bmaia/binwally
bios_memimage 1.2 A tool to dump RAM contents to disk (aka cold boot attack). http://citp.princeton.edu/memory/code/
birp 60.1d7c49f A tool that will assist in the security assessment of mainframe applications served over TN3270. https://github.com/sensepost/birp
bittwist 2.0 A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic. http://bittwist.sourceforge.net/
bkhive 1.1.1 Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive. http://sourceforge.net/projects/ophcrack
blackarch-menus 0.2 BlackArch specific XDG-compliant menu http://www.blackarch.org/
blackhash 0.2 Creates a filter from system hashes http://16s.us/blackhash/
bletchley 0.0.1 A collection of practical application cryptanalysis tools. https://code.google.com/p/bletchley/
blindelephant 7 A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations http://blindelephant.sourceforge.net/
blindsql 1.0 Set of bash scripts for blind SQL injection attacks http://www.enye-sec.org/programas.html
bluebox-ng 82.22fd93e A GPL VoIP/UC vulnerability scanner. https://github.com/jesusprubio/bluebox-ng
bluebugger 0.1 An implementation of the bluebug technique which was discovered by Martin Herfurt. http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html
bluelog 1.1.2 A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode. http://www.digifail.com/software/bluelog.shtml
bluepot 0.1 A Bluetooth Honeypot written in Java, it runs on Linux https://code.google.com/p/bluepot/
blueprint 0.1_3 A perl tool to identify Bluetooth devices. http://trifinite.org/trifinite_stuff_blueprinting.html
blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios. http://www.hackfromacave.com/projects/blueranger.html
bluescan 1.0.6 A Bluetooth Device Scanner. http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/
bluesnarfer 0.1 A bluetooth attacking tool http://www.alighieri.org/project.html
bmap-tools 3.2 Tool for copying largely sparse files using information from a block map file. http://git.infradead.org/users/dedekind/bmap-tools.git
bob-the-butcher 0.7.1 A distributed password cracker package. http://btb.banquise.net/
bokken 397.dfc6c536eab7 GUI for radare2 and pyew. http://inguma.eu/projects/bokken/
bowcaster 0.1 This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures. https://github.com/zcutlip/bowcaster
braa 0.82 A mass snmp scanner http://s-tech.elsat.net.pl/braa/
braces 0.4 A Bluetooth Tracking Utility. http://braces.shmoo.com/
browser-fuzzer 3 Browser Fuzzer 3 http://www.krakowlabs.com/dev.html
brutessh 0.5 A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads. http://www.edge-security.com/edge-soft.php
brutus 2 One of the fastest, most flexible remote password crackers you can get your hands on. http://www.hoobie.net/brutus/
bsdiff 4.3 bsdiff and bspatch are tools for building and applying patches to binary files. http://www.daemonology.net/bsdiff/
bsqlbf 2.7 Blind SQL Injection Brute Forcer. http://code.google.com/p/bsqlbf-v2/
bss 0.8 Bluetooth stack smasher / fuzzer http://www.secuobs.com/news/15022006-bss_0_8.shtml
bt_audit 0.1.1 Bluetooth audit http://www.betaversion.net/btdsd/download/
btcrack 1.1 The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges. http://www.nruns.com/_en/security_tools_btcrack.php
btscanner 2.1 Bluetooth device scanner. http://www.pentest.co.uk
bulk-extractor 1.5.5 Bulk Email and URL extraction tool. https://github.com/simsong/bulk_extractor
bully 19.ba33677 A wifi-protected-setup (WPS) brute force attack tool. http://code.google.com/p/bully/
bunny 0.93 A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs. http://code.google.com/p/bunny-the-fuzzer/
burpsuite 1.6 An integrated platform for attacking web applications (free edition). http://portswigger.net/burp/
buttinsky 138.1a2a1b2 Provide an open source framework for automated botnet monitoring. https://github.com/buttinsky/buttinsky
bvi 1.4.0 A display-oriented editor for binary files operate like "vi" editor. http://bvi.sourceforge.net/
bytecode-viewer 79.bde746b A Java 8/Android APK Reverse Engineering Suite. https://github.com/Konloch/bytecode-viewer
cadaver 0.23.3 Command-line WebDAV client for Unix http://www.webdav.org/cadaver
canari 1.1 A transform framework for maltego http://www.canariproject.com/
cangibrina 87.fcbc952 Dashboard Finder. https://github.com/fnk0c/cangibrina
cansina 109.be98c12 A python-based Web Content Discovery Tool. https://github.com/deibit/cansina
capstone 3.0.1 A lightweight multi-platform, multi-architecture disassembly framework. http://www.capstone-engine.org/index.html
captipper 25.d3d79e9 Malicious HTTP traffic explorer tool. http://www.omriher.com/2015/01/captipper-malicious-http-traffic.html
carwhisperer 0.2 Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. http://trifinite.org/trifinite_stuff_carwhisperer.html
casefile 1.0.1 The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information http://www.paterva.com/web6/products/casefile.php
cdpsnarf 0.1.6 Cisco discovery protocol sniffer. https://github.com/Zapotek/cdpsnarf
cecster 5.15544cb A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols https://github.com/nccgroup/CECster
centry 72.6de2868 Cold boot & DMA protection https://github.com/0xPoly/Centry
cewl 4.3 A custom word list generator http://www.digininja.org/projects/cewl.php
cflow 1.4 A C program flow analyzer. http://www.gnu.org/software/cflow/
chaosmap 1.3 An information gathering tool and dns / whois / web server scanner http://freecode.com/projects/chaosmap
chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. http://chaosreader.sourceforge.net/
chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes. https://github.com/moxie0/chapcrack
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker. http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN). http://kernel.embedromix.ro/us/
checkpwd 1.23 Oracle Password Checker (Cracker) http://www.red-database-security.com/software/checkpwd.html
checksec 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used. http://www.trapkit.de/tools/checksec.html
cheetah 19.a937193 Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.) https://github.com/bl4de/Cheetah
chiron 0.7 An all-in-one IPv6 Penetration Testing Framework. http://www.secfu.net/tools-scripts/
chkrootkit 0.50 Checks for rootkits on a system http://www.chkrootkit.org/
chntpw 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file http://pogostick.net/~pnh/ntpasswd/
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other http://samy.pl/chownat/
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords. http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html
chromefreak 22.336e323 A Cross-Platform Forensic Framework for Google Chrome http://osandamalith.github.io/ChromeFreak/
cidr2range 0.9 Script for listing the IP addresses contained in a CIDR netblock http://www.cpan.org/authors/id/R/RA/RAYNERLUC
cintruder 0.2.0 An automatic pentesting tool to bypass captchas. http://cintruder.sourceforge.net/
ciphertest 14.7f49ea7 A better SSL cipher checker using gnutls. https://github.com/OpenSecurityResearch/ciphertest
ciphr 105.db79691 A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data. https://github.com/frohoff/ciphr
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. http://www.cirt.dk/
cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. http://www.scrypt.net
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. http://www.blackangels.it
cisco-ocs 0.2 Cisco Router Default Password Scanner. http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner
cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
cisco-snmp-enumeration 2.e9b1f93 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking. https://github.com/nccgroup/cisco-snmp-enumeration
cisco-snmp-slap 5.daf0589 IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices. https://github.com/nccgroup/cisco-snmp-slap
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool. http://www.arhont.com
cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords. https://github.com/madrisan/cisco7crack
cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords. https://github.com/madrisan/cisco7crack
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
clamscanlogparser 1 This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection. http://magikh0e.xyz/
climber 23.f614304 Check UNIX/Linux systems for privilege escalation. https://github.com/raffaele-forte/climber
clusterd 129.0f04a49 Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. https://github.com/hatRiot/clusterd
cmospwd 5.0 Decrypts password stored in CMOS used to access BIOS setup. http://www.cgsecurity.org/wiki/CmosPwd
cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running http://code.google.com/p/cms-explorer
cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. http://packetstormsecurity.com/files/64722/cms_few.py.txt.html
cmsmap 198.437d764 A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs. https://www.dionach.com/blog/cmsmap-%E2%80%93-a-simple-cms-vulnerability-scanner
codetective 39.7f44df4 A tool to determine the crypto/encoding algorithm used according to traces of its representation. https://www.digitalloft.org/init/plugin_wiki/page/codetective
complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever http://complemento.sourceforge.net
configpush 0.8.5 This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices. http://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html
conpot 0.4.0 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org"
conscan 1.1 A blackbox vulnerability scanner for the Concre5 CMS. http://nullsecurity.net/tools/scanner.html
cookie-cadger 1.08 An auditing tool for Wi-Fi or wired Ethernet connections. https://cookiecadger.com/
cowpatty 4.6 Wireless WPA/WPA2 PSK handshake cracking utility http://www.wirelessdefence.org/Contents/Files/
cpfinder 0.1 This is a simple script that looks for administrative web interfaces. http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html
cppcheck 1.68 A tool for static C/C++ code analysis http://cppcheck.wiki.sourceforge.net/
cpptest 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. http://cpptest.sourceforge.net/
crackhor 2.ae7d83f A Password cracking utility. https://github.com/CoalfireLabs/crackHOR
crackle 39.3e93196 Crack and decrypt BLE encryption https://github.com/mikeryan/crackle/
crackserver 33.e5763ab An XMLRPC server for password cracking. https://github.com/averagesecurityguy/crack
create_ap 117.3460580 This script creates a NATed or Bridged WiFi Access Point. https://github.com/oblique/create_ap
creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives. https://code.google.com/p/creddump/
creds 17.1ec8297 Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. https://github.com/DanMcInerney/creds.py
creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. http://github.com/ilektrojohn/creepy.git
crowbar 39.839c62b A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools. https://github.com/galkan/crowbar
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set. http://sourceforge.net/projects/crunch-wordlist/
crypthook 17.0728cd1 TCP/UDP symmetric encryption tunnel wrapper. https://github.com/chokepoint/CryptHook
cryptonark 0.5.6 SSL security checker. http://blog.techstacks.com/cryptonark.html
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project
ctunnel 0.7 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel. http://nardcore.org/ctunnel
cuckoo 1.1.1 A malware analysis system. http://cuckoosandbox.org/
cupp 3.0 Common User Password Profiler http://www.remote-exploit.org/?page_id=418
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page. http://cutycapt.sourceforge.net/
cvechecker 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. http://cvechecker.sourceforge.net/
cymothoa 1 A stealth backdooring tool, that inject backdoor's shellcode into an existing process. http://cymothoa.sourceforge.net/
damm 28.9af34b4 Differential Analysis of Malware in Memory. https://github.com/504ensicsLabs/DAMM
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors. http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html
darkjumper 5.8 This tool will try to find every website that host at the same server at your target http://sourceforge.net/projects/darkjumper/
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool https://github.com/BlackArch/darkmysqli
darkstat 3.0.718 Network statistics gatherer (packet sniffer) http://dmr.ath.cx/net/darkstat/
davoset 1.2.3 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. http://websecurity.com.ua/davoset/
davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target http://code.google.com/p/davtest/
dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. https://github.com/gitdurandal/dbd
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines http://www.cqure.net/wp/dbpwaudit/
dc3dd 7.2.641 A patched version of dd that includes a number of features useful for computer forensics. http://sourceforge.net/projects/dc3dd
dcfldd 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing http://dcfldd.sourceforge.net/
ddrescue 1.19 GNU data recovery tool http://www.gnu.org/software/ddrescue/ddrescue.html
deblaze 0.3 A remote method enumeration tool for flex servers http://deblaze-tool.appspot.com/
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer. https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/
depant 0.3a Check network for services with default passwords. http://midnightresearch.com/projects/depant/
depdep 2.0 A merciless sentinel which will seek sensitive files containing critical info leaking through your network. https://github.com/galkan/depdep
detect-it-easy 32.bfbeac1 A program for determining types of files. https://github.com/horsicq/Detect-It-Easy
device-pharmer 35.c1d449e Opens 1K+ IPs or Shodan search results and attempts to login. https://github.com/DanMcInerney/device-pharmer
dex2jar 0.0.9.15 A tool for converting Android's .dex format to Java's .class format http://code.google.com/p/dex2jar
dff-scanner 1.1 Tool for finding path of predictable resource locations. http://netsec.rs/70/tools.html
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow. http://www.netpatch.ru/dhcdrop.html
dhcpig 69.cc4109a Enumerates hosts, subdomains, and emails from a given domain using google https://github.com/kamorin/DHCPig
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC http://kernel.embedromix.ro/us/
dirb 2.04 A web content scanner, brute forceing for hidden files http://dirb.sourceforge.net/
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
directorytraversalscan 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications. http://sourceforge.net/projects/httpdirscan/
dirs3arch 130.8f37c7d HTTP(S) directory/file brute forcer. https://github.com/maurosoria/dirs3arch
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more. http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html
dislocker 0.3 A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in. http://www.hsc.fr/ressources/outils/dislocker/
dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
dissy 10 A graphical frontend to the objdump disassembler for compiler-generated code. http://dissy.googlecode.com/
dizzy 0.8.2 A Python based fuzzing framework with many features. http://www.c0decafe.de/
dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more. http://www.mor-pah.net/
dnmap 0.6 The distributed nmap framework http://sourceforge.net/projects/dnmap/
dns-reverse-proxy 11.ef9d062 A reverse DNS proxy written in Go. https://github.com/StalkR/dns-reverse-proxy
dns-spoof 12.3918a10 Yet another DNS spoof utility. https://github.com/maurotfilho/dns-spoof
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains. http://packetstormsecurity.com/files/118036/DNS-GeoIP.html
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
dnsa 0.5 DNSA is a dns security swiss army knife http://packetfactory.openwall.net/projects/dnsa/index.html
dnsbf 0.2 search for available domain names in an IP range http://code.google.com/p/dnsbf
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. https://github.com/d4rkcat/dnsbrute
dnschef 0.3 A highly configurable DNS proxy for pentesters. http://thesprawl.org/projects/dnschef/
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS. http://nullsecurity.net/tools/dos.html
dnsenum 1.2.4.1 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum
dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies. http://nullsecurity.net/tools/scanner.html
dnsmap 0.30 Passive DNS network mapper http://dnsmap.googlecode.com
dnspredict 0.0.2 DNS prediction http://johnny.ihackstuff.com
dnsrecon 0.8.9 Python script for enumeration of hosts, subdomains and emails from a given domain using google. https://github.com/darkoperator/dnsrecon
dnsspider 0.5 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. http://nullsecurity.net/tools/scanner.html
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers http://www.mavetju.org/unix/dnstracer.php
dnsutils 9.9.2.P2 DNS utilities: dig host nslookup http://www.isc.org/software/bind/
dnswalk 2.0.2 A DNS debugger http://sourceforge.net/projects/dnswalk/
domain-analyzer 0.8.1 Finds all the security information for a given domain name. http://sourceforge.net/projects/domainanalyzer/
doona 127.06cd178 A fork of the Bruteforce Exploit Detector Tool (BED). https://github.com/wireghoul/doona
dotdotpwn 3.0 The Transversal Directory Fuzzer http://dotdotpwn.blogspot.com
dpeparser beta002 Default password enumeration project http://www.toolswatch.org/dpe/
dpscan 0.1 Drupal Vulnerabilty Scanner. https://github.com/insaneisnotfree/Blue-Sky-Information-Security
dradis 2.9.0 An open source framework to enable effective information sharing. http://dradisframework.org/
driftnet 0.1.6 Listens to network traffic and picks out images from TCP streams it observes. http://www.ex-parrot.com/~chris/driftnet/
dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. http://www.blackhatlibrary.net/Dripper
dscanner 715.63ba816 Swiss-army knife for D source code. https://github.com/Hackerpilot/Dscanner
dsd 84.60807e0 Digital Speech Decoder https://github.com/szechyjs/dsd
dsniff 2.4b1 Collection of tools for network auditing and penetration testing http://www.monkey.org/~dugsong/dsniff/
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS. https://github.com/0verl0ad/Dumb0
dump1090 386.bff92c4 A simple Mode S decoder for RTLSDR devices. https://github.com/MalcolmRobb/dump1090
dumpacl 0.0 Dumps NTs ACLs and audit settings. http://www.systemtools.com/cgi-bin/download.pl?DumpAcl
dumpzilla 03152013 A forensic tool for firefox. http://www.dumpzilla.org/
dvcs-ripper 12.b4dc17a Rip web accessible (distributed) version control systems: SVN/GIT/... https://github.com/kost/dvcs-ripper
eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol http://www.willhackforsushi.com/?page_id=67
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials. https://github.com/brav0hax/easy-creds
easyda 7.0867f9b Easy Windows Domain Access Script. https://github.com/nccgroup/easyda
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant). http://www.mh-sec.de/downloads.html.en
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html
edb 0.9.20 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg. http://www.codef00.com/projects.php#Debugger
eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes) http://www.jonesdykstra.com/
elettra 1.0 Encryption utility by Julia Identity http://www.winstonsmith.info/julia/elettra/
elettra-gui 1.0 Gui for the elettra crypto application. http://www.winstonsmith.info/julia/elettra/
elite-proxy-finder 44.29143ad Finds public elite anonymity proxies and concurrently tests them. https://github.com/DanMcInerney/elite-proxy-finder
enabler 1 attempts to find the enable password on a cisco system via brute force. http://packetstormsecurity.org/cisco/enabler.c
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html
ent 1.0 Pseudorandom number sequence test. http://www.fourmilab.ch/random
enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account. https://github.com/dejanlevaja/enum_shares
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems. http://labs.portcullis.co.uk/application/enum4linux/
enumiax 1.0 IAX enumerator http://sourceforge.net/projects/enumiax/
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6. http://www.enye-sec.org/programas.html
epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. http://sourceforge.net/projects/epicwebhoneypot/
erase-registrations 1.0 IAX flooder http://www.hackingexposedvoip.com/
etherape 0.9.13 A graphical network monitor for various OSI layers and protocols http://etherape.sourceforge.net/
ettercap 0.8.1 A network sniffer/interceptor/logger for ethernet LANs - console http://ettercap.github.com/ettercap/
evilgrade 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates http://www.infobyte.com.ar/developments.html
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password http://theinvisiblethings.blogspot.com
exiv2 0.24 Exif and Iptc metadata manipulation library and tools http://exiv2.org
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks http://www.exploit-db.com
extracthosts 14.ec8b89c Extracts hosts (IP/Hostnames) from files. https://github.com/bwall/ExtractHosts
extundelete 0.2.4 Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal http://extundelete.sourceforge.net
eyepwn 1.0 Exploit for Eye-Fi Helper directory traversal vulnerability http://www.pentest.co.uk
eyewitness 308.db7cb97 Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness
facebot 23.57f6025 A facebook profile and reconnaissance system. https://github.com/pun1sh3r/facebot
facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). https://github.com/emerinohdz/FaceBrute
fakeap 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. http://www.blackalchemy.to/project/fakeap/
fakedns 36.90bd7e1 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses. https://github.com/Crypt0s/FakeDns
fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing. http://sourceforge.net/projects/fakemail/
fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. https://github.com/mubix/FakeNetBIOS
fang 16.b5cb86d A multi service threaded MD5 cracker. https://github.com/evilsocket/fang
faraday 858.bf9c1a3 A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit. http://www.faradaysec.com/
fbht 53.9e515ef A Facebook Hacking Tool https://github.com/chinoogawa/fbht-linux
fbid 11.b8106f8 Show info about the author by facebook photo url. https://github.com/guelfoweb/fbid
fcrackzip 1.0 Zip file password cracker http://oldhome.schmorp.de/marc/fcrackzip.html
fern-wifi-cracker 221 WEP, WPA wifi cracker for wireless penetration testing http://code.google.com/p/fern-wifi-cracker/
fernmelder 6.c6d4ebe Asynchronous mass DNS scanner. https://github.com/stealth/fernmelder
fgscanner 11.893372c An advanced, opensource URL scanner. http://www.fantaghost.com/fgscanner
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html
fierce 0.9.9 A DNS scanner http://ha.ckers.org/fierce/
fiked 0.0.5 Fake IDE daemon http://www.roe.ch/FakeIKEd
filibuster 161.37b7f9c A Egress filter mapping application with additional functionality. https://github.com/subinacls/Filibuster
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation http://code.google.com/p/fimap/
findmyhash 1.1.2 Crack different types of hashes using free online services http://code.google.com/p/findmyhash/
firewalk 5.0 An active reconnaissance network security tool http://packetfactory.openwall.net/projects/firewalk/
firmware-mod-kit 099 Modify firmware images without recompiling. http://code.google.com/p/firmware-mod-kit
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points. https://github.com/nccgroup/firstexecution
fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. http://lcamtuf.coredump.cx/
flare 0.6 Flare processes an SWF and extracts all scripts from it. http://www.nowrap.de/flare.html
flasm 1.62 Disassembler tool for SWF bytecode http://www.nowrap.de/flasm.html
flawfinder 1.31 Searches through source code for potential security flaws. http://www.dwheeler.com/flawfinder
flowinspect 94.01c8921 A network traffic inspection tool. https://github.com/7h3rAm/flowinspect
flunym0us 2.0 A Vulnerability Scanner for Wordpress and Moodle. http://code.google.com/p/flunym0us/
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures http://foremost.sourceforge.net/
forkingportscanner 1 Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp. http://magikh0e.xyz/
fpdns 20130404 Program that remotely determines DNS server versions. https://github.com/kirei/fpdns
fping 3.10 A utility to ping multiple hosts at once http://www.fping.org/
fport 2.0 Identify unknown open ports and their associated applications. http://www.foundstone.com/us/resources/proddesc/fport.htm
fprotlogparser 1 This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection. http://magikh0e.xyz/
fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6. https://github.com/stealth/fraud-bridge
freeipmi 1.4.8 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). http://www.gnu.org/software/freeipmi/
freeradius 3.0.6 The premier open source RADIUS server http://www.freeradius.org/
frisbeelite 1.2 A GUI-based USB device fuzzer. https://github.com/nccgroup/FrisbeeLite
fs-nyarl 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. http://www.fulgursecurity.com/en/content/fs-nyarl
fsnoop 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods"). http://vladz.devzero.fr/fsnoop.php
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines. http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. http://www.inversepath.com/ftester.html
ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server sofware. http://nullsecurity.net/tools/fuzzer.html
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. http://packetstormsecurity.com/files/35120/ftp-spider.pl.html
ftpmap 0.4 scans remote FTP servers to identify what software and what versions they are running. http://wcoserver.googlecode.com/files/
fusil 1.5 A Python library used to write fuzzing programs. http://bitbucket.org/haypo/fusil/wiki/Home
fuzzap 14.f13932c A python script for obfuscating wireless networks. https://github.com/lostincynicism/FuzzAP
fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. http://nologin.org/
fuzzdb 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing https://code.google.com/p/fuzzdb/
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. http://vsecurity.com/resources/tool
fuzztalk 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. https://code.google.com/p/fuzztalk
g72x++ 1 Decoder for the g72x++ codec. http://www.ps-auxw.de/
galleta 20040505_1 Examine the contents of the IE's cookie files for forensic purposes http://www.jonesdykstra.com/
gdb 7.8.2 The GNU Debugger http://www.gnu.org/software/gdb/
genlist 0.1 Generates lists of IP addresses.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
geoip 1.6.2 Non-DNS IP-to-country resolver C library & utils http://www.maxmind.com/app/c
geoipgen 0.4 GeoIPgen is a country to IP addresses generator. http://code.google.com/p/geoipgen/
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. http://www.cqure.net/wp/getsids/
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. http://www.morningstarsecurity.com/research/gggooglescan
ghettotooth 1.0 Ghettodriving for bluetooth http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
ghost-phisher 1.62 GUI suite for phishing and penetration attacks http://code.google.com/p/ghost-phisher
ghost-py 0.1b3 Webkit based webclient (relies on PyQT). http://jeanphix.github.com/Ghost.py/
giskismet 20110805 A program to visually represent the Kismet data in a flexible manner. http://www.giskismet.org
gnuradio 3.7.6.1 General purpose DSP and SDR toolkit. With drivers for usrp and fcd. http://gnuradio.org
gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2) http://gnutls.org/
goldeneye 16.7a38fe9 A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. https://github.com/jseidl/GoldenEye
golismero 2.0 Opensource web security testing framework. https://github.com/golismero/golismero
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. http://goo-dork.blogspot.com/
goofile 1.5 Command line filetype search https://code.google.com/p/goofile/
goog-mail 1.0 Enumerate domain emails from google. http://www.darkc0de.com/others/goog-mail.py
googlesub 1.2 A python script to find domains by using google dorks. https://github.com/zombiesam/googlesub
gooscan 1.0.9 A tool that automates queries against Google search appliances, but with a twist. http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/
gpredict 1.3 A real-time satellite tracking and orbit prediction application. http://gpredict.oz9aec.net/
gqrx 2.3.2 Interactive SDR receiver waterfall for many devices. http://gqrx.dk/
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website. http://rgaucher.info/beta/grabber/
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2 http://www.irongeek.com/downloads/grepforrfi.txt
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files. http://code.google.com/p/grokevt/
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts. http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. http://www.c0decafe.de/
guymager 0.7.4 A forensic imager for media acquisition. http://guymager.sourceforge.net/
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet. http://packetstormsecurity.com/files/62047/gwcheck.c.html
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls. http://www.gdssecurity.com/l/t/d.php?k=GwtEnum
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools http://www.hackersh.org/
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. http://halberd.superadditive.com/
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. http://www.blackhatlibrary.net/Halcyon
hamster 2.0.0 Tool for HTTP session sidejacking. http://hamster.erratasec.com/
handle 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,.. http://www.tarasco.org/security/handle/index.html
hasere 1.0 Discover the vhosts using google and bing. https://github.com/galkan/hasere
hash-identifier 1.1 Identifies the different types of hashes used to encrypt data, especially passwords http://code.google.com/p/hash-identifier
hashcat 0.49 A multithreaded cross platform hash cracker. http://hashcat.net/hashcat/
hashcat-utils 1.1 Utilites for Hashcat http://hashcat.net/wiki/doku.php?id=hashcat_utils
hasher 33.17592ed A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. https://github.com/ChrisTruncer/Hasher
hashfind 8.e9a9a14 A tool to search files for matching password hash types and other interesting data. https://github.com/rurapenthe/hashfind
hashid 315.3f9cddf Software to identify the different types of hashes used to encrypt data. https://github.com/psypanda/hashID
hashpump 34.0b3c286 A tool to exploit the hash length extension attack in various hashing algorithms. https://github.com/bwall/HashPump
hashtag 0.41 A python script written to parse and identify password hashes. https://github.com/SmeegeSec/HashTag
haystack 1035.ac2ffa4 A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics. https://github.com/trolldbois/python-haystack
hbad 1.0 This tool allows you to test clients on the heartbleed bug. http://www.curesec.com/
hcraft 1.0.0 HTTP Vuln Request Crafter http://sourceforge.net/projects/hcraft/
hdcp-genkey 18.e8d342d Generate HDCP source and sink keys from the leaked master key. https://github.com/rjw57/hdcp-genkey
hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices. https://github.com/ApertureLabsLtd/hdmi-sniff
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
hex2bin 1.0.12 Converts Motorola and Intel hex files to binary. http://hex2bin.sourceforge.net/
hexinject 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access. http://hexinject.sourceforge.net
hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). https://code.google.com/p/hexorbase/
hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html
hidattack 0.1 HID Attack (attacking HID host implementations) http://mulliner.org/bluetooth/hidattack.php
honeyd 1.6.7 A small daemon that creates virtual hosts on a network. https://github.com/DataSoft/Honeyd/
honssh 49.0c06ee8 A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. https://code.google.com/p/honssh/
hookanalyser 3.1 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. http://hookanalyser.blogspot.de/
host-extract 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. https://code.google.com/p/host-extract/
hostbox-ssh 0.1.1 A ssh password/account scanner. http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/
hotpatch 0.2 Hot patches executables on Linux using .so file injection. http://www.selectiveintellect.com/hotpatch.html
hotspotter 0.4 Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names. http://www.remote-exploit.org/?page_id=418
hpfeeds 138.249b2f7 Honeynet Project generic authenticated datafeed protocol. https://github.com/rep/hpfeeds
hping 3.0.0 A command-line oriented TCP/IP packet assembler/analyzer. http://www.hping.org
hqlmap 35.081395e A tool to exploit HQL Injections. https://github.com/PaulSec/HQLmap
htexploit 0.77 A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process http://www.mkit.com.ar/labs/htexploit/
htrosbif 134.9dc3f86 Active HTTP server fingerprinting and recon tool. https://github.com/lkarsten/htrosbif
htshells 760b5e9 Self contained web shells and other attacks via .htaccess files. https://github.com/wireghoul/htshells
http-enum 0.3 A tool to enumerate the enabled HTTP methods supported on a webserver. https://www.thexero.co.uk/tools/http-enum/
http-fuzz 0.1 A simple http fuzzer. none
http-put 1.0 Simple http put perl script
http-traceroute 0.5 This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality. http://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html
httpbog 1.0.0.0 A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses. http://sourceforge.net/projects/httpbog/
httpforge 11.02.01 A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions. http://packetstormsecurity.com/files/98109/HTTPForge.02.01.html
httping 2.3.4 A 'ping'-like tool for http-requests. http://www.vanheusden.com/httping/
httprint 301 A web server fingerprinting tool. http://www.net-square.com/httprint.html
httprint-win32 301 A web server fingerprinting tool (Windows binaries). http://net-square.com/httprint
httpry 0.1.8 A specialized packet sniffer designed for displaying and logging HTTP traffic. http://dumpsterventures.com/jason/httpry/
httpsniff 0.4 Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review. http://www.sump.org/projects/httpsniff/
httpsscanner 1.2 A tool to test the strength of a SSL web server. https://code.google.com/p/libre-tools/
httptunnel 3.3 Creates a bidirectional virtual data connection tunnelled in HTTP requests http://www.nocrew.org/software/httptunnel
hulk 11.a9b9ad4 A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features. https://github.com/grafov/hulk
hwk 0.4 Collection of packet crafting and wireless network flooding tools http://www.nullsecurity.net/
hydra 8.1 A very fast network logon cracker which support many different services. http://www.thc.org/thc-hydra/
hyenae 0.36_1 flexible platform independent packet generator http://sourceforge.net/projects/hyenae/
hyperfox 45.79ffeb5 A security tool for proxying and recording HTTP and HTTPs traffic. https://hyperfox.org/
hyperion 1.2 A runtime encrypter for 32-bit portable executables. http://nullsecurity.net/tools/binary.html
iaxflood 0.1 IAX flooder. http://www.hackingexposedvoip.com/
iaxscan 0.02 A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts. http://code.google.com/p/iaxscan/
ibrute 12.3a6a11e An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented. https://github.com/hackappcom/ibrute/
icmpquery 1.0 Send and receive ICMP queries for address mask and current time. http://www.angio.net/security/
icmptx 0.01 IP over ICMP http://thomer.com/icmptx/
idswakeup 1.0 A collection of tools that allows to test network intrusion detection systems. http://www.hsc.fr/ressources/outils/idswakeup/index.html.en
iheartxor 0.01 iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255. http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html
iisbruteforcer 15 HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server. http://www.open-labs.org/
ike-scan 1.9 A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers http://www.nta-monitor.com/tools/ike-scan/
ikecrack 1.00 An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication http://sourceforge.net/projects/ikecrack/
ikeprobe 0.1 Determine vulnerabilities in the PSK implementation of the VPN server. http://www.ernw.de/download/ikeprobe.zip
ikeprober 1.12 Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors http://ikecrack.sourceforge.net/
ilty 1.0 An interception phone system for VoIP network. http://chdir.org/~nico/ilty/
imagejs 48.1faf262 Small tool to package javascript into a valid image file. https://github.com/jklmnn/imagejs
inception 418.48b6072 A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA. http://www.breaknenter.org/projects/inception/
indxparse 162.83dae16 A Tool suite for inspecting NTFS artifacts. http://www.williballenthin.com/forensics/mft/indxparse/
inetsim 1.2.5 A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples. http://www.inetsim.org
infip 0.1 A python script that checks output from netstat against RBLs from Spamhaus. http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html
inguma 0.1.1 A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler. http://inguma.sourceforge.net
intercepter-ng 0.9.8 A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc. http://intercepter.nerf.ru/#down
interrogate 0.0.4 A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage. https://github.com/carmaa/interrogate
intersect 2.5 Post-exploitation framework https://github.com/ohdae/Intersect.5
intrace 1.5 Traceroute-like application piggybacking on existing TCP connections http://intrace.googlecode.com
inundator 0.5 An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack. http://inundator.sourceforge.net/
inurlbr 13.66de321 Advanced search in the search engines - Inurl scanner, dorker, exploiter. https://code.google.com/p/inurlbr/
inviteflood 2.0 Flood a device with INVITE requests https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635
iodine 0.7.0 Tunnel IPv4 data through a DNS server http://code.kryo.se/iodine
iosforensic 1.0 iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic https://github.com/Flo354/iOSForensic
ip-https-tools 5.b22e2b3 Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol. https://github.com/takeshixx/ip-https-tools
ipaudit 1.0rc9 Monitors network activity on a network. http://ipaudit.sourceforge.net
ipba2 032013 IOS Backup Analyzer http://www.ipbackupanalyzer.com/
ipdecap 69.f3a08f6 Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header. http://www.loicp.eu/ipdecap#dependances
iphoneanalyzer 2.1.0 Allows you to forensically examine or recover date from in iOS device. http://www.crypticbit.com/zen/products/iphoneanalyzer
ipscan 3.3.2 Angry IP scanner is a very fast IP address and port scanner. http://www.angryziber.com/
iputils 20121221 Network monitoring tools, including ping http://www.skbuff.net/iputils/
ipv6toolkit 2.0beta SI6 Networks' IPv6 Toolkit http://www.si6networks.com/tools/ipv6toolkit/
ircsnapshot 93.9ba3c6c Tool to gather information from IRC servers. https://github.com/bwall/ircsnapshot
irpas 0.10 Internetwork Routing Protocol Attack Suite. http://phenoelit-us.org/irpas
isr-form 1.0 Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data. http://www.infobyte.com.ar/
jad 1.5.8e Java decompiler http://www.varaneckas.com/jad
jadx 0.5.4 Dex to Java command line and GUI decompiler tool that produces Java source code from Android Dex and APK files. https://github.com/skylot/jadx
javasnoop 1.1 A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer https://code.google.com/p/javasnoop/
jboss-autopwn 1.3bc2d29 A JBoss script for obtaining remote shell access. https://github.com/SpiderLabs/jboss-autopwn
jbrofuzz 2.5 Web application protocol fuzzer that emerged from the needs of penetration testing. http://sourceforge.net/projects/jbrofuzz/
jbrute 0.99 Open Source Security tool to audit hashed passwords. http://sourceforge.net/projects/jbrute/
jd-gui 0.3.5 A standalone graphical utility that displays Java source codes of .class files http://java.decompiler.free.fr/?q=jdgui
jhead 2.97 EXIF JPEG info parser and thumbnail remover http://www.sentex.net/~mwandel/jhead/
jigsaw 1.3 A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing. https://github.com/pentestgeek/jigsaw
jnetmap 0.5.3 A network monitor of sorts http://www.rakudave.ch/jnetmap/?file=introduction
john 1.7.9 John The Ripper - A fast password cracker (jumbo included) http://www.openwall.com/john/
johnny 20120424 GUI for John the Ripper. http://openwall.info/wiki/john/johnny
jomplug 0.1 This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components. http://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html
joomlascan 1.2 Joomla scanner scans for known vulnerable remote file inclusion paths and files. http://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html
joomscan 2012.03.10 Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site. http://joomscan.sourceforge.net/
js-beautify 1.5.4 This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com. https://github.com/einars/js-beautify
jsql 0.6 A lightweight application used to find database information from a distant server. https://code.google.com/p/jsql-injection/
junkie 1338.baa4524 A modular packet sniffer and analyzer. https://github.com/securactive/junkie
jwscan 6.b0306f0 Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe. https://github.com/katjahahn/JWScan
jynx2 2.0 An expansion of the original Jynx LD_PRELOAD rootkit http://www.blackhatlibrary.net/Jynx2
kalibrate-rtl 11.aae11c8 Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices. https://github.com/steve-m/kalibrate-rtl
katsnoop 0.1 Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form. http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html
kautilya 0.5.5 Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices. https://github.com/samratashok/Kautilya/releases
keimpx 163.2df1eb2 Tool to verify the usefulness of credentials across a network over SMB. http://code.google.com/p/keimpx/
khc 0.2 A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents. http://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html
killerbee 85 Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks. https://code.google.com/p/killerbee/
kippo 0.9 A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker. https://github.com/desaster/kippo
kismet 2013_03_R1b 802.11 layer2 wireless network detector, sniffer, and intrusion detection system http://www.kismetwireless.net/
kismet-earth 0.1 Various scripts to convert kismet logs to kml file to be used in Google Earth. http://
kismet2earth 1.0 A set of utilities that convert from Kismet logs to Google Earth .kml format http://code.google.com/p/kismet2earth/
klogger 1.0 A keystroke logger for the NT-series of Windows. http://ntsecurity.nu/toolbox/klogger/
knock 27.b1acf04 Subdomain scanner. https://github.com/guelfoweb/knock
kolkata 3.0 A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion. http://www.blackhatlibrary.net/Kolkata
kraken 32.368a837 A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack. http://opensource.srlabs.de/projects/a51-decrypt
laf 12.7a456b3 Login Area Finder: scans host/s for login panels. https://github.com/takeshixx/laf
lanmap2 124.4f8afed Passive network mapping tool http://github.com/rflynn/lanmap2
lans 164.36797ad A Multithreaded asynchronous packet parsing/injecting arp spoofer. https://github.com/DanMcInerney/LANs.py
latd 1.31 A LAT terminal daemon for Linux and BSD. http://sourceforge.net/projects/linux-decnet/files/latd/1.31/
laudanum 1.0 A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments. http://laudanum.inguardians.com/#
lbd 20130719 Load Balancing detector http://ge.mine.nu/code/lbd
lbmap 145.93e6b71 Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012. https://github.com/wireghoul/lbmap
ldap-brute 21.acc06e3 A semi fast tool to bruteforce values of LDAP injections over HTTP. https://github.com/droope/ldap-brute
ldapenum 0.1 Enumerate domain controllers using LDAP. https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/
leo 5.0 Literate programmer's editor, outliner, and project manager. http://webpages.charter.net/edreamleo/front.html
leroy-jenkins 0.r3.bdc3965 A python tool that will allow remote execution of commands on a Jenkins server and its nodes. https://github.com/captainhooligan/Leroy-Jenkins
levye 84.5406303 A brute force tool which is support sshkey, vnckey, rdp, openvpn. https://github.com/galkan/levye
lfi-autopwn 3.0 A Perl script to try to gain code execution on a remote server via LFI http://www.blackhatlibrary.net/Lfi_autopwn.pl
lfi-exploiter 1.1 This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability.. http://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html
lfi-fuzzploit 1.1 A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications. http://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html
lfi-scanner 4.0 This is a simple perl script that enumerates local file inclusion attempts when given a specific target. http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html
lfi-sploiter 1.0 This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities. http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html
lfimap 1.4.8 This script is used to take the highest beneficts of the local file include vulnerability in a webserver. https://code.google.com/p/lfimap/
lft 3.73 A layer four traceroute implementing numerous other features. http://pwhois.org/lft/
libdisasm 0.23 A disassembler library. http://bastard.sourceforge.net/libdisasm.html
libpst 0.6.63 Outlook .pst file converter http://www.five-ten-sg.com/libpst/
liffy 63.238ce6d A Local File Inclusion Exploitation tool. https://github.com/rotlogix/liffy
linenum 18.b4c2541 Scripted Local Linux Enumeration & Privilege Escalation Checks https://github.com/rebootuser/LinEnum
linset 9.8746b1f Evil Twin Attack Bash script - An automated WPA/WPA2 hacker. https://github.com/vk496/linset
linux-exploit-suggester 32.9db2f5a A Perl script that tries to suggest exploits based OS version number. https://github.com/PenturaLabs/Linux_Exploit_Suggester
lisa.py 28.5b3156b An Exploit Dev Swiss Army Knife. https://github.com/ant4g0nist/lisa.py
list-urls 0.1 Extracts links from webpage http://www.whoppix.net
littleblackbox 0.1.3 Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices. http://code.google.com/p/littleblackbox/wiki/FAQ
lldb 3.5.1 The LLDB Debugger. http://llvm.org/
lodowep 1.2.1 Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system. http://www.cqure.net/wp/lodowep/
logkeys 0.1.1a Simple keylogger supporting also USB keyboards. http://logkeys.googlecode.com/
loki 0.2.7 Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols. http://c0decafe.de/loki.html
lorcon 2.0.0.20091101 Generic library for injecting 802.11 frames http://802.11ninja.net/
lotophagi 0.1 a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases. http://packetstormsecurity.com/files/55250/lotophagi.rar.html
lsrtunnel 0.2 lsrtunnel spoofs connections using source routed packets. http://www.synacklabs.net/projects/lsrtunnel/
lte-cell-scanner 57.5fa3df8 LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure). https://github.com/Evrytania/LTE-Cell-Scanner
luksipc 0.01 A tool to convert unencrypted block devices to encrypted LUKS devices in-place. http://www.johannes-bauer.com/linux/luksipc
luyten 0.4.4 An Open Source Java Decompiler Gui for Procyon. https://github.com/deathmarine/Luyten
lynis 1.6.4 An auditing tool for Unix (specialists). http://www.rootkit.nl/projects/lynis.html
mac-robber 1.02 A digital investigation tool that collects data from allocated files in a mounted file system. http://www.sleuthkit.org/mac-robber/download.php
macchanger 1.6.0 A small utility to change your NIC's MAC address http://ftp.gnu.org/gnu/macchanger
maclookup 0.3 Lookup MAC addresses in the IEEE MA-L/OUI public listing. https://github.com/paraxor/maclookup
magicrescue 1.1.9 Find and recover deleted files on block devices http://freshmeat.net/projects/magicrescue/
magictree 1.3 A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation http://www.gremwell.com
make-pdf 0.1.5 This tool will embed javascript inside a PDF document. http://blog.didierstevens.com/programs/pdf-tools/
makepasswd 1.10_9 Generates true random passwords with the emphasis on security over pronounceability (Debian version) http://packages.qa.debian.org/m/makepasswd.html
malheur 0.5.4 A tool for the automatic analyze of malware behavior. http://www.mlsec.org/malheur/
maligno 1.5 An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. http://www.encripto.no/tools/
malmon 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor. http://sourceforge.net/projects/malmon/
maltego 3.5.3 An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc. http://www.paterva.com/web5
maltrieve 175.8c68c7e Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites. https://github.com/technoskald/maltrieve
malware-check-tool 1.2 Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature. http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html
malwareanalyser 3.3 A freeware tool to perform static and dynamic analysis on malware. http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html
malwaredetect 0.1 Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware http://www.virustotal.com
malwasm 0.2 Offline debugger for malware's reverse engineering. https://code.google.com/p/malwasm/
malybuzz 1.0 A Python tool focused in discovering programming faults in network software. http://eternal-todo.com/tools/malybuzz-network-fuzzer
marc4dasm 6.f11860f This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro). https://github.com/ApertureLabsLtd/marc4dasm
maskprocessor 0.72 A High-Performance word generator with a per-position configurable charset. http://hashcat.net/wiki/doku.php?id=maskprocessor
masscan 391.a60cc70 TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. https://github.com/robertdavidgraham/masscan
mat 0.5.2 Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library. https://mat.boum.org/
matahari 0.1.30 A reverse HTTP shell to execute commands on remote machines behind firewalls. http://matahari.sourceforge.net
mausezahn 0.40 A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. http://www.perihel.at/sec/mz/
mbenum 1.5.0 Queries the master browser for whatever information it has registered. http://www.cqure.net/wp/mbenum/
mboxgrep 0.7.9 A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats. http://mboxgrep.sourceforge.net
md5deep 4.3 Advanced checksum hashing tool http://md5deep.sourceforge.net
mdbtools 0.7.1 Utilities for viewing data and exporting schema from Microsoft Access Database files http://sourceforge.net/projects/mdbtools/
mdcrack 1.2 MD4/MD5/NTLM1 hash cracker http://c3rb3r.openwall.net/mdcrack/
mdk3 6 WLAN penetration tool http://homepages.tu-darmstadt.de/~p_larbig/wlan/
mdns-scan 0.5 Scan mDNS/DNS-SD published services on the local network.
medusa 2.1.1 A speedy, massively parallel, modular, login brute-forcer for network. http://www.foofus.net/jmk/medusa/medusa.html
melkor 1.0 An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base). http://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html
memdump 1.01 Dumps system memory to stdout, skipping over holes in memory maps. http://www.porcupine.org/forensics/tct.html
memfetch 0.05b dumps any userspace process memory without affecting its execution http://lcamtuf.coredump.cx/
metacoretex 0.8.0 MetaCoretex is an entirely JAVA vulnerability scanning framework for databases. http://metacoretex.sourceforge.net/
metagoofil 1.4b An information gathering tool designed for extracting metadata of public documents http://www.edge-security.com/metagoofil.php
metasploit 30949.ce688f4 An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits. http://www.metasploit.com
meterssh 10.ebb6f4e A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. https://github.com/trustedsec/meterssh
metoscan 05 Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests. http://www.open-labs.org/
mfcuk 0.3.8 MIFARE Classic Universal toolKit http://code.google.com/p/mfcuk/
mfoc 0.10.7 Mifare Classic Offline Cracker http://code.google.com/p/mfoc/
mfsniffer 0.1 A python script for capturing unencrypted TSO login credentials. http://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html
mibble 2.9.3 Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files. http://www.mibble.org/
middler 1.0 A Man in the Middle tool to demonstrate protocol middling attacks. http://code.google.com/p/middler/
mikrotik-npk 7.88d7e4b Python tools for manipulating Mikrotik NPK format. https://github.com/kost/mikrotik-npk
minimysqlator 0.5 A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r
miranda-upnp 1.3 A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices http://code.google.com/p/miranda-upnp/
miredo 1.2.6 Teredo client and server. http://www.remlab.net/miredo/
missidentify 1.0 A program to find Win32 applications. http://missidentify.sourceforge.net/
missionplanner 1.2.55 A GroundControl Station for Ardupilot. https://code.google.com/p/ardupilot-mega/wiki/Mission
mitmap 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation. http://www.darkoperator.com/tools-and-scripts/
mitmer 22.b01c7fe A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook. https://github.com/husam212/MITMer
mitmf 186.3f6bbb8 A Framework for Man-In-The-Middle attacks written in Python. https://github.com/byt3bl33d3r/MITMf
mitmproxy 0.11.1 SSL-capable man-in-the-middle HTTP proxy. http://mitmproxy.org/
mkbrutus 1.0.2 Password bruteforcer for MikroTik devices or boxes running RouterOS. http://mkbrutusproject.github.io/MKBRUTUS/
mobiusft 0.5.21 An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. http://savannah.nongnu.org/projects/mobiusft
modscan 0.1 A new tool designed to map a SCADA MODBUS TCP based network. https://code.google.com/p/modscan/
moloch 0.9.2 An open source large scale IPv4 full PCAP capturing, indexing and database system. https://github.com/aol/moloch
monocle 1.0 A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network. http://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html
morxbook 1.0 A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS. http://www.morxploit.com/
morxbrute 1.01 A customizable HTTP dictionary-based password cracking tool written in Perl http://www.morxploit.com/morxbrute/
morxbtcrack 1.0 Single Bitcoin private key cracking tool released. http://www.morxploit.com/tools/
morxcoinpwn 1.0 Mass Bitcoin private keys brute forcing/Take over tool released. http://www.morxploit.com/tools/
morxcrack 1.2 A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords. http://www.morxploit.com/morxcrack/
morxkeyfmt 1.0 Read a private key from stdin and output formatted data values. http://www.morxploit.com/tools/
morxtraversal 1.0 Path Traversal checking tool. http://www.morxploit.com/tools/
morxtunnel 1.0 Network Tunneling using TUN/TAP interfaces over TCP tool. http://www.morxploit.com/tools/
mp3nema 0.4 A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data. http://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html
mptcp 1.9.0 A tool for manipulation of raw packets that allows a large number of options. http://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html
mptcp-abuse 6.b0eeb27 A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014. https://github.com/Neohapsis/mptcp-abuse
ms-sys 2.5.0 A tool to write Win9x-.. master boot records (mbr) under linux - RTM! http://ms-sys.sourceforge.net/
mssqlscan 0.8.4 A small multi-threaded tool that scans for Microsoft SQL Servers. http://www.cqure.net/wp/mssqlscan/
msvpwn 65.328921b Bypass Windows' authentication via binary patching. https://bitbucket.org/mrabault/msvpwn
mtr 0.86 Combines the functionality of traceroute and ping into one tool (CLI version) http://www.bitwizard.nl/mtr/
multiinjector 0.3 Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation. http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html
multimac 1.0.3 Multiple MACs on an adapter http://sourceforge.net/projects/multimac/
multitun 43.9804513 Tunnel arbitrary traffic through an innocuous WebSocket. https://github.com/covertcodes/multitun
mutator 51.164132d This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012 https://bitbucket.org/alone/mutator/
mwebfp 16.a800b98 Mass Web Fingerprinter. https://github.com/falcon-lnhg/mwebfp
mysql2sqlite 14.e5b2c31 Converts a mysqldump file into a Sqlite 3 compatible file. https://gist.github.com/esperlu/943776
nacker 23.b67bb39 A tool to circumvent 802.1x Network Access Control on a wired LAN. https://github.com/carmaa/nacker
nbnspoof 1.0 NBNSpoof - NetBIOS Name Service Spoofer http://www.mcgrewsecurity.com/tools/nbnspoof/
nbtenum 3.3 A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. http://reedarvin.thearvins.com/
nbtool 2.bf90c76 Some tools for NetBIOS and DNS investigation, attacks, and communication. http://wiki.skullsecurity.org/Nbtool
nbtscan 1.5.1 NBTscan is a program for scanning IP networks for NetBIOS name information. http://www.inetcat.net/software/nbtscan.html
ncpfs 2.2.6 Allows you to mount volumes of NetWare servers under Linux. http://www.novell.com/
ncrack 0.4a A high-speed network authentication cracking tool http://nmap.org/ncrack/
neighbor-cache-fingerprinter 83.f1e596f An ARP based Operating System version scanner. https://github.com/PherricOxide/Neighbor-Cache-Fingerprinter
nemesis 1.4 command-line network packet crafting and injection utility http://nemesis.sourceforge.net/
netactview 0.6.3 A graphical network connections viewer for Linux similar in functionality with Netstat http://netactview.sourceforge.net/index.html
netbios-share-scanner 1.0 This tool could be used to check windows workstations and servers if they have accessible shared resources. http://www.secpoint.com/netbios-share-scanner.html
netcommander 1.3 An easy-to-use arp spoofing tool. https://github.com/evilsocket/netcommander
netcon 0.1 A network connection establishment and management script. http://www.paramecium.org/~leendert/
netdiscover 0.3 An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks. http://nixgeneration.com/~jaime/netdiscover/
netmap 0.1.3 Can be used to make a graphical representation of the surounding network. http://netmap.sourceforge.net
netmask 2.3.12 Helps determine network masks http://packages.qa.debian.org/n/netmask.html
netreconn 1.76 A collection of network scan/recon tools that are relatively small compared to their larger cousins. http://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html
netscan 1.0 Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection). http://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html
netsed 1.2 Small and handful utility design to alter the contents of packets forwarded thru network in real time. http://silicone.homelinux.org/projects/netsed/
netsniff-ng 0.5.9 A high performance Linux network sniffer for packet inspection. http://netsniff-ng.org/
network-app-stress-tester 19.df75391 Network Application Stress Testing Yammer. https://github.com/PherricOxide/Network-App-Stress-Tester
netzob 0.4.1 An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols. http://www.netzob.org/
nfcutils 0.3.2 Provides a simple 'lsnfc' command that list tags which are in your NFC device field http://code.google.com/p/nfc-tools
nfex 2.5 A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. https://code.google.com/p/nfex/
nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share. https://github.com/bonsaiviking/NfSpy
nfsshell 19980519 Userland NFS command tool. http://www.paramecium.org/~leendert/
ngrep 1.45 A grep-like utility that allows you to search for network packets on an interface. http://ngrep.sourceforge.net/
nield 0.6.0 A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control. http://nield.sourceforge.net/
nikto 2.1.5 A web server scanner which performs comprehensive tests against web servers for multiple items http://www.cirt.net/nikto2
nimbostratus 54.c7c206f Tools for fingerprintinging and exploiting Amazon cloud infrastructures. https://github.com/andresriancho/nimbostratus
nipper 0.11.7 Network Infrastructure Parser https://www.titania-security.com/
nishang 0.4.0 Using PowerShell for Penetration Testing. https://code.google.com/p/nishang/
nkiller2 2.0 A TCP exhaustion/stressing tool. http://sock-raw.org/projects.html
nmap 6.47 Utility for network discovery and security auditing http://nmap.org/
nmbscan 1.2.6 Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols. http://nmbscan.gbarbier.org/
nomorexor 0.1 Tool to help guess a files 256 byte XOR key by using frequency analysis https://github.com/hiddenillusion/NoMoreXOR
notspikefile 0.1 A Linux based file format fuzzing tool http://packetstormsecurity.com/files/39627/notSPIKEfile.tgz.html
nsdtool 0.1 A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password. http://www.curesec.com/en/publications/tools.html
nsec3walker 20101223 Enumerates domain names using DNSSEC http://dnscurve.org/nsec3walker.html
nsia 1.0.6 A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues. http://threatfactor.com/Products/
nsoq 1.9.5 A Network Security Tool for packet manipulation that allows a large number of options. http://www.nsoq.org/
ntds-decode 0.1 This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database. http://packetstormsecurity.com/files/121543/NTDS-Hash-Decoder.b.html
o-saft 574.6dde441 A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations. https://www.owasp.org/index.php/O-Saft
oat 1.3.1 A toolkit that could be used to audit security within Oracle database servers. http://www.cqure.net/wp/test/
obexstress 0.1 Script for testing remote OBEX service for some potential vulnerabilities. http://bluetooth-pentest.narod.ru/
obfsproxy 0.2.13 A pluggable transport proxy written in Python. https://pypi.python.org/pypi/obfsproxy
oclhashcat 1.33 Worlds fastest WPA cracker with dictionary mutation engine. http://hashcat.net/oclhashcat/
ocs 0.2 Compact mass scanner for Cisco routers with default telnet/enable passwords. http://packetstormsecurity.com/files/119462/OCS-Cisco-Scanner.2.html
ohrwurm 0.1 A small and simple RTP fuzzer. http://mazzoo.de/
oletools 0.08 Tools to analyze Microsoft OLE2 files. http://www.decalage.info/python/oletools
ollydbg 201g A 32-bit assembler-level analysing debugger http://www.ollydbg.de
onesixtyone 0.7 An SNMP scanner that sends multiple SNMP requests to multiple IP addresses http://labs.portcullis.co.uk/application/onesixtyone/
onionshare 440.e78e21a Securely and anonymously share a file of any size. https://github.com/micahflee/onionshare/
openstego 0.6.1 A tool implemented in Java for generic steganography, with support for password-based encryption of the data. http://www.openstego.info/
opensvp 64.56b2b8f A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack. https://github.com/regit/opensvp
ophcrack 3.6.0 A free Windows password cracker based on rainbow tables http://ophcrack.sourceforge.net
orakelcrackert 1.00 This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm. http://freeworld.thc.org/thc-orakelcrackert11g/
origami 1.2.7 Aims at providing a scripting tool to generate and analyze malicious PDF files. http://code.google.com/p/origami-pdf
oscanner 1.0.6 An Oracle assessment framework developed in Java. http://www.cqure.net/wp/oscanner/
ostinato 0.6 An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark. http://code.google.com/p/ostinato/
osueta 65.90323e2 A simple Python script to exploit the OpenSSH User Enumeration Timing Attack. https://github.com/c0r3dump3d/osueta
otori 0.3 A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities. http://www.beneaththewaves.net/Software/On_The_Outside_Reaching_In.html
outguess 0.2 A universal steganographic tool. http://www.outguess.org/
owabf 1.3 Outlook Web Access bruteforcer tool. http://netsec.rs/70/tools.html
owasp-bywaf 26.e730d1b A web application penetration testing framework (WAPTF). https://github.com/depasonico/OWASP-ByWaf
owtf 1017.0bbeea1 The Offensive (Web) Testing Framework. https://www.owasp.org/index.php/OWASP_OWTF
p0f 3.08b Purely passive TCP/IP traffic fingerprinting tool. http://lcamtuf.coredump.cx/p0f3/
pack 0.0.4 Password Analysis and Cracking Kit http://thesprawl.org/projects/pack/
packerid 1.4 Script which uses a PEiD database to identify which packer (if any) is being used by a binary. http://handlers.sans.org/jclausing/
packet-o-matic 351 A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module. http://www.packet-o-matic.org/
packeth 1.7.2 A Linux GUI packet generator tool for ethernet. http://packeth.sourceforge.net/
packetsender 7.4a9afa6 An open source utility to allow sending and receiving TCP and UDP packets. https://github.com/dannagle/PacketSender
packit 1.0 A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic. http://packit.sourceforge.net/
pacumen 1.92a0884 Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks). https://github.com/bniemczyk/pacumen
padbuster 0.3.3 Automated script for performing Padding Oracle attacks. http://www.gdssecurity.com/l/t.php
paketto 1.10 Advanced TCP/IP Toolkit. http://www.doxpara.com/paketto
panhunt 26.cd58866 Searches for credit card numbers (PANs) in directories. https://github.com/Dionach/PANhunt
panoptic 179.770bc70 A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability. https://github.com/lightos/Panoptic
paranoic 1.7 A simple vulnerability scanner written in Perl. http://packetstormsecurity.com/files/128065/Paranoic-Scan.7.html
paros 3.2.13 Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc. http://www.parosproxy.org
parsero 56.fc5f7ec A robots.txt audit tool. https://github.com/behindthefirewalls/Parsero
pasco 20040505_1 Examines the contents of Internet Explorer's cache files for forensic purposes http://www.jonesdykstra.com/
passcracking 20131214 A little python script for sending hashes to passcracking.com and milw0rm http://github.com/jensp/passcracking
passe-partout 0.1 Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns. http://www.hsc.fr/ressources/outils/passe-partout/index.html.en
passhunt 5.332f374 Search drives for documents containing passwords. https://github.com/Dionach/PassHunt
passivedns 1.1.3 A network sniffer that logs all DNS server replies for use in a passive DNS setup. https://github.com/gamelinux/passivedns
pastenum 0.4.1 Search Pastebins for content, fork from nullthreat corelan pastenum2 http://github.com/shadowbq/pastenum
patator 86.5c3cb0a A multi-purpose bruteforcer. https://github.com/lanjelot/patator
pblind 1.0 Little utility to help exploiting blind sql injection vulnerabilities. http://www.edge-security.com/pblind.php
pcapfix 1.1.0 Tries to repair your broken pcap and pcapng files. http://f00l.de/pcapfix/
pcapsipdump 0.2 A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions). http://pcapsipdump.sourceforge.net/
pcredz 29.05ae40f A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface. https://github.com/lgandx/PCredz
pdf-parser 0.6.0 Parses a PDF document to identify the fundamental elements used in the analyzed file. http://blog.didierstevens.com/programs/pdf-tools/
pdfbook-analyzer 2 Utility for facebook memory forensics. http://sourceforge.net/projects/pdfbook/
pdfcrack 0.14 Password recovery tool for PDF-files. http://pdfcrack.sourceforge.net/
pdfid 0.2.1 Scan a file to look for certain PDF keywords. http://blog.didierstevens.com/programs/pdf-tools/
pdfresurrect 0.12 A tool aimed at analyzing PDF documents. http://packetstormsecurity.com/files/118459/PDFResurrect-PDF-Analyzer.12.html
pdgmail 1.0 A password dictionary attack tool that targets windows authentication via the SMB protocol http://www.jeffbryner.com/code/pdgmail
peach 3.0.202 A SmartFuzzer that is capable of performing both generation and mutation based fuzzing. http://peachfuzzer.com/
peda 51.327db44 Python Exploit Development Assistance for GDB. https://github.com/longld/peda
peepdf 0.3 A Python tool to explore PDF files in order to find out if the file can be harmful or not http://eternal-todo.com/tools/peepdf-pdf-analysis-tool
peframe 81.0c4a0d5 Tool to perform static analysis on (portable executable) malware. https://github.com/guelfoweb/peframe
pemcrack 10.34b0f85 Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. https://github.com/robertdavidgraham/pemcrack
pentbox 1.8 A security suite that packs security and stability testing oriented tools for networks and systems. http://www.pentbox.net
perl-image-exiftool 9.76 Reader and rewriter of EXIF informations that supports raw files http://search.cpan.org/perldoc?exiftool
perl-tftp 1.0b3 TFTP - TFTP Client class for perl http://search.cpan.org/~gsm/TFTP/TFTP.pm
pev 0.60 Command line based tool for PE32/PE32+ file analysis http://pev.sourceforge.net/
pextractor 0.18b A forensics tool that can extract all files from an executable file created by a joiner or similar. http://packetstormsecurity.com/files/62977/PExtractor_v0.18b_binary_and_src.rar.html
pgdbf 94.baa1d95 Convert XBase / FoxPro databases to PostgreSQL https://github.com/kstrauser/pgdbf
phemail 27.7ae21f2 A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test. https://github.com/Dionach/PhEmail
phoss 0.1.13 Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins. http://www.phenoelit.org/fr/tools.html
php-mt-seed 3.2 PHP mt_rand() seed cracker http://www.openwall.com/php_mt_seed/
php-rfi-payload-decoder 30.bd42caa Decode and analyze RFI payloads developed in PHP. https://github.com/bwall/PHP-RFI-Payload-Decoder
php-vulnerability-hunter 1.4.0.20 An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications. https://phpvulnhunter.codeplex.com/
phpstress 5.f987a7e A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI. https://github.com/nightlionsecurity/phpstress
phrasendrescher 1.2.2 A modular and multi processing pass phrase cracking tool http://www.leidecker.info/projects/phrasendrescher/
pip3line 30.eae2260 The Swiss army knife of byte manipulation. https://github.com/nccgroup/pip3line
pipal 1.1 A password analyser http://www.digininja.org/projects/pipal.php
pirana 0.3.1 Exploitation framework that tests the security of a email content filter. http://www.guay-leroux.com/projects.html
plcscan 0.1 This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols. http://packetstormsecurity.com/files/119726/PLC-Device-Scanner.html
plecost 2 Wordpress finger printer tool search and retrieve information about the plugins versions installed in Wordpress systems. http://code.google.com/p/plecost/
plown 13.ccf998c A security scanner for Plone CMS. https://github.com/unweb/plown
pmcma 1.00 Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption). http://packetstormsecurity.com/files/104724/Post-Memory-Corruption-Memory-Analyzer.00.html
pnscan 1.11 A parallel network scanner that can be used to survey TCP network services. http://www.lysator.liu.se/~pen/pnscan/
pompem 77.4e77ffd A python exploit tool finder. https://github.com/rfunix/Pompem
portspoof 100.70b6bf2 This program's primary goal is to enhance OS security through a set of new techniques. http://portspoof.org/
posttester 0.1 A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin. http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html
powerfuzzer 1_beta Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others. http://www.powerfuzzer.com
powersploit 247.8b6f759 A PowerShell Post-Exploitation Framework. https://github.com/mattifestation/PowerSploit
praeda 37.093d1c0 An automated data/information harvesting tool designed to gather critical information from various embedded devices. https://github.com/percx/Praeda
procyon 0.5.28 A suite of Java metaprogramming tools focused on code generation and analysis. https://bitbucket.org/mstrobel/procyon/
prometheus 175.497b2ce A Firewall analyzer written in ruby https://github.com/averagesecurityguy/prometheus
propecia 2 A fast class scanner that scans for a specified open port with banner grabbing http://www.redlevel.org
protos-sip 2 SIP test suite. https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip
proxychains-ng 4.8.1 A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies https://github.com/rofl0r/proxychains
proxycheck 0.1 This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver. http://packetstormsecurity.com/files/61864/proxycheck.pl.txt.html
proxyp 2013 Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses. http://sourceforge.net/projects/proxyp/
proxyscan 0.3 A security penetration testing tool to scan for hosts and ports through a Web proxy server. http://packetstormsecurity.com/files/69778/proxyScan.3.tgz.html
proxytunnel 1.9.0 a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy http://proxytunnel.sourceforge.net
pscan 1.3 A limited problem scanner for C source files http://deployingradius.com/pscan/
pshitt 21.85cde65 A lightweight fake SSH server designed to collect authentication data sent by intruders. https://github.com/regit/pshitt
pstoreview 1.0 Lists the contents of the Protected Storage. http://www.ntsecurity.nu/toolbox/pstoreview/
ptunnel 0.72 A tool for reliably tunneling TCP connections over ICMP echo request and reply packets http://www.cs.uit.no/~daniels/PingTunnel/#download
pwd-hash 2.0 A password hashing tool that use the crypt function to generate the hash of a string given on standard input. http://vladz.devzero.fr/pwd-hash.php
pwdump 7.1 Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes. http://www.tarasco.org/security/pwdump_7/index.html
pwnat 0.3 A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other http://samy.pl/pwnat/
pwntools 2.1.3 The CTF framework used by #Gallopsled in every CTF. https://github.com/Gallopsled/pwntools
pyew 2.3.0 A python tool to analyse malware. https://code.google.com/p/pyew/
pyexfil 36.978ec43 A couple of beta stage tools for data exfiltration. https://github.com/ytisf/PyExfil
pyfiscan 1169.6dc0110 Free web-application vulnerability and version scanner. https://github.com/fgeek/pyfiscan
pyinstaller 2.1 A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX. http://www.pyinstaller.org/
pyminifakedns 0.1 Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record http://code.activestate.com/recipes/491264/
pyrasite 2.0 Code injection and introspection of running Python processes. http://pyrasite.com/
pyrit 0.4.0 WPA/WPA2-PSK attacking with gpu and cluster http://code.google.com/p/pyrit
pytacle alpha2 Automates the task of sniffing GSM frames http://packetstormsecurity.com/files/124299/pytacle-alpha2.tar.gz
pytbull 2.0 A python based flexible IDS/IPS testing framework shipped with more than 300 tests http://pytbull.sourceforge.net/
python-utidylib 0.2 Python bindings for Tidy HTML parser/cleaner. http://utidylib.berlios.de
python2-binaryornot 0.3.0 Ultra-lightweight pure Python package to check if a file is binary or text. https://github.com/audreyr/binaryornot
python2-yara 3.3.0 A malware identification and classification tool. https://github.com/plusvic/yara
quickrecon 0.3.2 A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing. http://packetstormsecurity.com/files/104314/QuickRecon.3.2.html
radamsa 0.3 General purpose data fuzzer. https://code.google.com/p/ouspg/wiki/Radamsa
radare2 0.9.8 Open-source tools to disasm, debug, analyze and manipulate binary files. http://radare.org/
radiography 2 A forensic tool which grabs as much information as possible from a Windows system. http://www.security-projects.com/?RadioGraPhy
rainbowcrack 1.6 Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches. http://project-rainbowcrack.com/
rarcrack 0.2 This program uses bruteforce algorithm to find correct password (rar, 7z, zip). http://rarcrack.sourceforge.net/
ratproxy 1.58 A passive web application security assessment tool http://code.google.com/p/ratproxy/
rawr 45.a05c312 Rapid Assessment of Web Resources. A web enumerator. https://bitbucket.org/al14s/rawr/wiki/Home
rcracki-mt 0.7.0 A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com http://rcracki.sourceforge.net/
rdesktop-brute 1.5.0 It connects to windows terminal servers - Bruteforce patch included. http://www.rdesktop.org/
reaver 1.4 Implements a brute force attack against wifi protected setup WPSregistrar PINs in order to recover WPA/WPA2 passphrases. http://code.google.com/p/reaver-wps
rebind 0.3.4 DNS Rebinding Tool http://code.google.com/p/rebind/
recon-ng 888.e3a09d1 A full-featured Web Reconnaissance framework written in Python. https://bitbucket.org/LaNMaSteR53/recon-ng
recoverjpeg 2.3 Recover jpegs from damaged devices. http://www.rfc1149.net/devel/recoverjpeg
recstudio 4.0_20130717 Cross platform interactive decompiler http://www.backerstreet.com/rec/rec.htm
redfang 2.5 Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name(). http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html
redirectpoison 1.1 A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses. http://www.hackingexposedvoip.com/
redpoint 109.0405b90 Digital Bond's ICS Enumeration Tools. https://github.com/digitalbond/Redpoint3
regeorg 26.22fb8a9 The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn. https://github.com/sensepost/reGeorg
reglookup 1.0.1 Command line utility for reading and querying Windows NT registries http://projects.sentinelchicken.org/reglookup
relay-scanner 1.7 An SMTP relay scanner. http://www.cirt.dk
replayproxy 1.1 Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file. https://code.google.com/p/replayproxy/
responder 117.6c7a5dd A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication. https://github.com/SpiderLabs/Responder/
rfcat 130515 RF ChipCon-based Attack Toolset http://code.google.com/p/rfcat
rfdump 1.6 A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible http://www.rfdump.org
rfidiot e302bb7 An open source python library for exploring RFID devices. http://rfidiot.org/
rfidtool 0.01 A opensource tool to read / write rfid tags http://www.bindshell.net/tools/rfidtool.html
ridenum 39.ebbfaca A null session RID cycle attack for brute forcing domain controllers. https://github.com/trustedsec/ridenum
rifiuti2 0.5.1 A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file. https://code.google.com/p/rifiuti2/
rinetd 0.62 internet redirection server http://www.boutell.com/rinetd
ripdc 0.2 A script which maps domains related to an given ip address or domainname. http://nullsecurity.net/tools/scanner
rkhunter 1.4.2 Checks machines for the presence of rootkits and other unwanted tools. http://rkhunter.sourceforge.net/
rlogin-scanner 0.2 Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
rootbrute 0.1 Local root account bruteforcer. http://www.packetstormsecurity.org/
ropeadope 1.1 A linux log cleaner. http://www.highhacksociety.com/
ropeme 1.0 ROPME is a set of python scripts to generate ROP gadgets and payload. http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/
ropgadget 5.3 Lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation. https://github.com/JonathanSalwan/ROPgadget
ropper 91.212d5da It can show information about files in different file formats and you can find gadgets to build rop chains for different architectures. For disassembly ropper uses the awesome Capstone Framework. https://github.com/sashs/Ropper
roputils 124.5ab25f5 A Return-oriented Programming toolkit. https://github.com/inaz2/roputils
rpdscan 2.a71b0f3 Remmina Password Decoder and scanner. https://github.com/freakyclown/RPDscan
rrs 1.70 A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more. http://www.cycom.se/dl/rrs
rsakeyfind 1.0 A tool to find RSA key in RAM. http://citp.princeton.edu/memory/code/
rsmangler 1.4 rsmangler takes a wordlist and mangle it http://www.randomstorm.com/rsmangler-security-tool.php
rtlamr 197.03369d1 An rtl-sdr receiver for smart meters operating in the 900MHz ISM band. https://github.com/bemasher/rtlamr/
rtlizer 34.33e31ba Simple spectrum analyzer. https://github.com/csete/rtlizer
rtlsdr-scanner 862.2831e0e A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library. https://github.com/EarToEarOak/RTLSDR-Scanner
rtp-flood 1.0 RTP flooder http://www.hackingexposedvoip.com/
rtpbreak 1.3a Detects, reconstructs and analyzes any RTP session http://xenion.antifork.org/rtpbreak/
rubilyn 0.0.1 64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host. http://nullsecurity.net/tools/backdoor.html
ruby-msgpack 0.5.8 MessagePack, a binary-based efficient data interchange format. http://msgpack.org/
ruby-ronin 1.5.0 A Ruby platform for exploit development and security research. http://ronin-ruby.github.io/
ruby-ronin-support 0.5.1 A support library for Ronin. http://ronin-ruby.github.io/
ruby-uri-query_params 0.7.0 Access the query parameters of a URI, just like in PHP. http://github.com/postmodern/uri-query_params
rww-attack 0.9.2 The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out. http://packetstormsecurity.com/files/79021/Remote-Web-Workplace-Attack-Tool.html
safecopy 1.7 A disk data recovery tool to extract data from damaged media http://safecopy.sourceforge.net/
sagan 1.0.0RC4 A snort-like log analysis engine. http://sagan.softwink.com/
sakis3g 0.2.0e An all-in-one script for connecting with 3G http://www.sakis3g.org/
sambascan 0.5.0 Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds. http://sourceforge.net/projects/sambascan2/
samdump2 3.0.0 Dump password hashes from a Windows NT/2k/XP installation http://sourceforge.net/projects/ophcrack/files/samdump2/
samydeluxe 2.2ed1bac Automatic samdump creation script. http://github.com/jensp/samydeluxe
sandy 6.531ab16 An open-source Samsung phone encryption assessment framework https://github.com/donctl/sandy
sasm 3.1.0 A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages. https://github.com/Dman95/SASM
sb0x 19.04f40fe A simple and Lightweight framework for Penetration testing. https://github.com/levi0x0/sb0x-project
sbd 1.36 Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=sbd
scalpel 2.0 A frugal, high performance file carver http://www.digitalforensicssolutions.com/Scalpel/
scanmem 0.13 A utility used to locate the address of a variable in an executing process. http://code.google.com/p/scanmem/
scanssh 2.1 Fast SSH server and open proxy scanner. http://www.monkey.org/~provos/scanssh/
scapy 2.3.1 A powerful interactive packet manipulation program written in Python http://www.secdev.org/projects/scapy/
schnappi-dhcp 0.1 schnappi can fuck network with no DHCP http://www.emanuelegentili.eu/
scout2 208.aaf57b8 Security auditing tool for AWS environments. http://isecpartners.github.io/Scout2/
scrape-dns 58.3df392f Searches for interesting cached DNS entries. https://github.com/304GEEK/Scrape-DNS
scrapy 4443.ee17902 A fast high-level scraping and web crawling framework. http://www.scrapy.org/
scrounge-ntfs 0.9 Data recovery program for NTFS file systems http://memberwebs.com/stef/software/scrounge/
sctpscan 1.0 A network scanner for discovery and security http://www.p1sec.com/
seat 0.3 Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities. http://thesprawl.org/projects/search-engine-assessment-tool/
secscan 1.5 Web Apps Scanner and Much more utilities. http://code.google.com/p/secscan-py/
secure-delete 3.1 Secure file, disk, swap, memory erasure utilities. http://www.thc.org/
sees 67.cd741aa Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain. https://github.com/galkan/sees/
sergio-proxy 0.2.1 A multi-threaded transparent HTTP proxy for manipulating web traffic https://github.com/darkoperator/dnsrecon
sessionlist 1.0 Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth. http://www.0xrage.com/
set 6.1.2 Social-engineer toolkit. Aimed at penetration testing around Social-Engineering https://www.trustedsec.com/downloads/social-engineer-toolkit
sfuzz 0.7.0 A simple fuzzer. http://aconole.brad-x.com/programs/sfuzz.html
shellcodecs 0.1 A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process. http://www.blackhatlibrary.net/Shellcodecs
shellme 3.8c7919d Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script. https://github.com/hatRiot/shellme
shellnoob 2.1 A toolkit that eases the writing and debugging of shellcode https://github.com/reyammer/shellnoob
shocker 52.4c9df3a A tool to find and exploit servers vulnerable to Shellshock. https://github.com/nccgroup/shocker
shodan 1.2.4 Python library for Shodan (https://developer.shodan.io). http://github.com/achillean/shodan-python
shortfuzzy 0.1 A web fuzzing script written in perl. http://packetstormsecurity.com/files/104872/Short-Fuzzy-Rat-Scanner.html
sidguesser 1.0.5 Guesses sids/instances against an Oracle database according to a predefined dictionary file. http://www.cqure.net/wp/tools/database/sidguesser/
siege 3.0.9 An http regression testing and benchmarking utility http://www.joedog.org/JoeDog/Siege
silk 3.10.0 A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks. https://tools.netsa.cert.org/silk/
simple-ducky 1.1.1 A payload generator. https://code.google.com/p/simple-ducky-payload-generator
simple-lan-scan 1.0 A simple python script that leverages scapy for discovering live hosts on a network. http://packetstormsecurity.com/files/97353/Simple-LAN-Scanner.0.html
sinfp 1.22 A full operating system stack fingerprinting suite. http://www.networecon.com/tools/sinfp/
siparmyknife 11232011 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications. http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt
sipcrack 0.2 A SIP protocol login cracker. http://www.remote-exploit.org/codes_sipcrack.html
sipp 3.3 A free Open Source test tool / traffic generator for the SIP protocol. http://sipp.sourceforge.net/
sipsak 0.9.6 A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications. http://sipsak.org
sipscan 0.1 A sip scanner. http://www.hackingvoip.com/sec_tools.html
sipshock 6.1d636ab A scanner for SIP proxies vulnerable to Shellshock. https://github.com/zaf/sipshock
sipvicious 0.2.8 Tools for auditing SIP devices http://blog.sipvicious.org
skipfish 2.10b A fully automated, active web application security reconnaissance tool http://code.google.com/p/skipfish/
skyjack 7.5f7a25e Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control. https://github.com/samyk/skyjack
skype-dump 0.1 This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype. http://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html
skypefreak 30.14a81cb A Cross Platform Forensic Framework for Skype. http://osandamalith.github.io/SkypeFreak/
sleuthkit 4.1.3 File system and media management forensic analysis tools http://www.sleuthkit.org/sleuthkit
slowhttptest 1.6 A highly configurable tool that simulates application layer denial of service attacks. http://code.google.com/p/slowhttptest
slowloris 0.7 A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver. http://ha.ckers.org/slowloris/
smali 2.0.5 An assembler/disassembler for Android's dex format. http://code.google.com/p/smali/
smartphone-pentest-framework 100.399e6ce Repository for the Smartphone Pentest Framework (SPF). https://github.com/georgiaw/Smartphone-Pentest-Framework
smbbf 0.9.1 SMB password bruteforcer. http://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html
smbexec 148.7827616 A rapid psexec style attack with samba tools. https://github.com/pentestgeek/smbexec
smbrelay 3 SMB / HTTP to SMB replay attack toolkit. http://www.tarasco.org/security/smbrelay/
smtp-fuzz 1.0 Simple smtp fuzzer none
smtp-user-enum 1.2 Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO. http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum
smtp-vrfy 1.0 An SMTP Protocol Hacker.
smtpmap 0.8.234_BETA Tool to identify the running smtp software on a given host. http://www.projectiwear.org/~plasmahh/software.html
smtpscan 0.5 An SMTP scanner http://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html
smtptx 1.0 A very simple tool used for sending simple email and do some basic email testing from a pentester perspective. http://www.0x90.se/
sn00p 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests. http://www.nullsecurity.net/tools/automation.html
snapception 8.c156f9e Intercept and decrypt all snapchats received over your network. https://github.com/thebradbain/snapception
sniffjoke 0.4.1 Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft. http://www.delirandom.net/sniffjoke/
snmp-brute 11.180075b SNMP brute force, enumeration, CISCO config downloader and password cracking script. https://github.com/SECFORCE/SNMP-Brute
snmp-fuzzer 0.1.1 SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl. http://www.arhont.com/en/category/resources/tools-utilities/
snmpattack 1.8 SNMP scanner and attacking tool. http://www.c0decafe.de/
snmpcheck 1.8 A free open source utility to get information via SNMP protocols. http://www.nothink.org/perl/snmpcheck/
snmpenum 1.7 snmp enumerator http://www.filip.waeytens.easynet.be/
snmpscan 0.1 A free, multi-processes SNMP scanner http://www.nothink.org/perl/snmpscan/index.php
snoopy-ng 93.e305420 A distributed, sensor, data collection, interception, analysis, and visualization framework. https://github.com/sensepost/snoopy-ng
snort 2.9.7.0 A lightweight network intrusion detection system. http://www.snort.org
snow 20130616 Steganography program for concealing messages in text files. http://darkside.com.au/snow/index.html
snscan 1.05 A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network. http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx
socat 1.7.3.0 Multipurpose relay http://www.dest-unreach.org/socat/
sockstat 0.3 A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible. https://packages.debian.org/unstable/main/sockstat
soot 2.5.0 A Java Bytecode Analysis and Transformation Framework. http://www.sable.mcgill.ca/soot
spade 114 A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment. http://www.hoobie.net/brutus/
sparta 15.e7bdf7b Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. http://sparta.secforce.com/
sparty 0.1 An open source tool written in python to audit web applications using sharepoint and frontpage architecture. http://sparty.secniche.org/
spectools 2010_04_R1 Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version. http://www.kismetwireless.net/spectools/
speedpwn 8.3dd2793 An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected. https://gitorious.org/speedpwn/
spiderfoot 2.2.0 The Open Source Footprinting Tool. http://spiderfoot.net/
spiderpig-pdffuzzer 0.1 A javascript pdf fuzzer https://code.google.com/p/spiderpig-pdffuzzer/
spiga 7240.3a804ac Configurable web resource scanner https://github.com/getdual/scripts-n-tools/blob/master/spiga.py
spike 2.9 IMMUNITYsec's fuzzer creation kit in C http://www.immunitysec.com/resources-freesoftware.shtml
spike-proxy 148 A Proxy for detecting vulnerabilities in web applications http://www.immunitysec.com/resources-freesoftware.shtml
spiped 1.4.2 A utility for creating symmetrically encrypted and authenticated pipes between socket addresses. https://www.tarsnap.com/spiped.html
spipscan 69.4ad3235 SPIP (CMS) scanner for penetration testing purpose written in Python. https://github.com/PaulSec/SPIPScan
splint 3.1.2 A tool for statically checking C programs for security vulnerabilities and coding mistakes http://www.splint.org/
sploitctl 35.23a18ca Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm. https://github.com/BlackArch/sploitctl
sploitego 153.d9568dc Maltego Penetration Testing Transforms. https://github.com/allfro/sploitego
spooftooph 0.5.2 Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight http://www.hackfromacave.com/projects/spooftooph.html
sps 4.2 A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4. https://sites.google.com/site/simplepacketsender/
sqid 0.3 A SQL injection digger. http://sqid.rubyforge.org/
sqlbrute 1.0 Brute forces data out of databases using blind SQL injection. http://www.justinclarke.com/archives/2006/03/sqlbrute.html
sqlmap 6445.20c272b An automatic SQL injection tool developed in Python. http://sqlmap.sourceforge.net
sqlninja 0.2.999 A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end http://sqlninja.sourceforge.net/
sqlpat 1.0.1 This tool should be used to audit the strength of Microsoft SQL Server passwords offline. http://www.cqure.net/wp/sqlpat/
sqlping 4 SQL Server scanning tool that also checks for weak passwords using wordlists. http://www.sqlsecurity.com/downloads
sqlsus 0.7.2 An open source MySQL injection and takeover tool, written in perl http://sqlsus.sourceforge.net/
ssdp-scanner 1.0 SSDP amplification scanner written in Python. Makes use of Scapy. http://packetstormsecurity.com/files/127994/SSDP-Amplification-Scanner.html
ssh-privkey-crack 0.3 A SSH private key cracker https://code.google.com/p/lusas/
ssh-user-enum 5.3d83131 SSH User Enumeration Script in Python Using The Timing Attack. https://github.com/nccgroup/ssh-user-enum
sshatter 1.2 Password bruteforcer for SSH http://www.nth-dimension.org.uk/downloads.php?id=34
sshscan 7401.3bfd4ae A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass. https://github.com/getdual/scripts-n-tools/blob/master/sshscan.py
sshtrix 0.0.2 A very fast multithreaded SSH login cracker. http://nullsecurity.net/tools/cracker.html
sshuttle 198.9ce2fa0 Transparent proxy server that works as a poor man's VPN. Forwards all TCP packets over ssh (and even DNS requests when using --dns option). Doesn't require admin privileges on the server side. https://github.com/apenwarr/sshuttle
ssl-hostname-resolver 1 CN (Common Name) grabber on X.509 Certificates over HTTPS. http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html
ssl-phuck3r 2.0 All in one script for Man-In-The-Middle attacks. https://github.com/zombiesam/ssl_phuck3r
sslcat 1.0 SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection. http://www.bindshell.net/tools/sslcat
sslcaudit 522.5b6be3e Utility to perform security audits of SSL/TLS clients. https://github.com/grwl/sslcaudit
ssldump 0.9b3 an SSLv3/TLS network protocol analyzer http://www.rtfm.com/ssldump/
sslh 1.16 SSL/SSH/OpenVPN/XMPP/tinc port multiplexer http://www.rutschle.net/tech/sslh.shtml
sslmap 0.2.0 A lightweight TLS/SSL cipher suite scanner. http://thesprawl.org/projects/latest/
sslnuke 5.c5faeaa Transparent proxy that decrypts SSL traffic and prints out IRC messages. https://github.com/jtripper/sslnuke
sslscan 239.1328b49 Tests SSL/TLS enabled services to discover supported cipher suites. https://github.com/DinoTools/sslscan
sslsniff 0.8 A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly http://www.thoughtcrime.org/software/sslsniff/
sslsplit 0.4.10 A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. http://www.roe.ch/SSLsplit
sslstrip 0.9 Transparently hijack http traffic on a network, watch for https links and redirects, then map those links. http://www.thoughtcrime.org/software/sslstrip
sslyze 0.10 Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations. https://github.com/nabla-c0d3/sslyze/
stackflow 2.2af525d Universal stack-based buffer overfow exploitation tool. https://github.com/d4rkcat/stackflow
starttls-mitm 7.b257756 A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic. https://github.com/ipopov/starttls-mitm
statsprocessor 0.083 A high-performance word-generator based on per-position Markov-attack. http://hashcat.net/wiki/doku.php?id=statsprocessor
steghide 0.5.1 Embeds a message in a file by replacing some of the least significant bits http://steghide.sourceforge.net
stompy 0.0.4 an advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable. http://lcamtuf.coredump.cx/
storm-ring 0.1 This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call). http://packetstormsecurity.com/files/115852/Storm-Ringing-PABX-Test-Tool.html
stunnel 5.10 A program that allows you to encrypt arbitrary TCP connections inside SSL http://www.stunnel.org
subbrute 58.ff00d72 A python subdomain bruteforce tool for pentesters. https://github.com/TheRook/subbrute
subdomainer 1.2 A tool designed for obtaining subdomain names from public sources. http://www.edge-security.com/subdomainer.php
subterfuge 5.0 Automated Man-in-the-Middle Attack Framework http://kinozoa.com
sucrack 1.2.3 A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su http://labs.portcullis.co.uk/application/sucrack
sulley 1.0.cb5e62c A pure-python fully automated and unattended fuzzing framework. https://github.com/OpenRCE/sulley/
superscan 4 Powerful TCP port scanner, pinger, resolver. http://www.foundstone.com/us/resources/proddesc/superscan.htm
suricata 2.0.6 An Open Source Next Generation Intrusion Detection and Prevention Engine. http://openinfosecfoundation.org/index.php/download-suricata
svn-extractor 28.3af00fb A simple script to extract all web resources by means of .SVN folder exposed over network. https://github.com/anantshri/svn-extractor
swaks 20130209.0 Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH http://jetmore.org/john/code/swaks/
swfintruder 0.9.1 First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash. http://code.google.com/p/swfintruder/
synflood 0.1 A very simply script to illustrate DoS SYN Flooding attack. http://thesprawl.org/projects/syn-flooder/
synner 1.1 A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks. http://packetstormsecurity.com/files/69802/synner.c.html
synscan 5.02 fast asynchronous half-open TCP portscanner http://www.digit-labs.org/files/tools/synscan/
sysdig 1436.4db7308 Open source system-level exploration and troubleshooting tool. http://www.sysdig.org/
sysinternals-suite 1.3 Sysinternals tools suite. http://sysinternals.com/
t50 5.4.1 Experimental Multi-protocol Packet Injector Tool http://t50.sourceforge.net/
taof 0.3.2 Taof is a GUI cross-platform Python generic network protocol fuzzer. http://taof.sf.net
tbear 1.5 Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator. http://freshmeat.net/projects/t-bear
tcgetkey 0.1 A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys. http://packetstormsecurity.com/files/119146/tcgetkey.1.html
tckfc 21.a32167e TrueCrypt key file cracker. https://github.com/Octosec/tckfc
tcpcontrol-fuzzer 0.1 2^6 TCP control bit fuzzer (no ECN or CWR). https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer
tcpdump 4.6.2 A tool for network monitoring and data acquisition http://www.tcpdump.org
tcpextract 1.1 Extracts files from captured TCP sessions. Support live streams and pcap files. https://pypi.python.org/pypi/tcpextract/1.1
tcpflow 1.4.4 Captures data transmitted as part of TCP connections then stores the data conveniently http://afflib.org/software/tcpflow
tcpick 0.2.1 TCP stream sniffer and connection tracker http://tcpick.sourceforge.net/
tcpjunk 2.9.03 A general tcp protocols testing and hacking utility. http://code.google.com/p/tcpjunk
tcpreplay 4.1.0 Gives the ability to replay previously captured traffic in a libpcap format http://tcpreplay.appneta.com
tcptraceroute 1.5beta7 A traceroute implementation using TCP packets. http://michael.toren.net/code/tcptraceroute/
tcpwatch 1.3.1 A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections. http://hathawaymix.org/Software/TCPWatch
tcpxtract 1.0.1 A tool for extracting files from network traffic. http://tcpxtract.sourceforge.net
teardown 1.0 Command line tool to send a BYE request to tear down a call. http://www.hackingexposedvoip.com/
tekdefense-automater 58.a034193 IP URL and MD5 OSINT Analysis https://github.com/1aN0rmus/TekDefense-Automater
termineter 0.1.0 Smart meter testing framework https://code.google.com/p/termineter/
tftp-bruteforce 0.1 TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl. http://www.hackingexposedcisco.com/
tftp-fuzz 1337 Master TFTP fuzzing script as part of the ftools series of fuzzers. http://nullsecurity.net/tools/fuzzer.html
tftp-proxy 0.1 This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices. http://www.c0decafe.de/
thc-ipv6 2.7 A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library. http://thc.org/thc-ipv6/
thc-keyfinder 1.0 Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file. https://www.thc.org/releases.php
thc-pptp-bruter 0.1.4 A brute force program that works against pptp vpn endpoints (tcp port 1723). http://www.thc.org
thc-smartbrute 1.0 This tool finds undocumented and secret commands implemented in a smartcard. https://www.thc.org/thc-smartbrute/
thc-ssl-dos 1.4 A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned! http://www.thc.org/thc-ssl-dos/
theharvester 13.56a30e2 Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers). http://www.edge-security.com/theHarvester.php
themole 0.3 Automatic SQL injection exploitation tool. http://sourceforge.net/projects/themole/
tiger 3.2.3 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit. http://www.nongnu.org/tiger/
tilt 90.2bc2ef2 An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup. https://github.com/AeonDave/tilt
timegen 0.4 This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices. http://bastianborn.de/radio-clock-hack/
tinc 1.0.25 VPN (Virtual Private Network) daemon http://www.tinc-vpn.org/
tinfoleak 3.6469eb3 Get detailed information about a Twitter user activity. https://github.com/technoskald/tinfoleak/
tinyproxy 1.8.4 A light-weight HTTP proxy daemon for POSIX operating systems. https://banu.com/tinyproxy/
tlsenum 75.6618285 A command line tool to enumerate TLS cipher-suites supported by a server. https://github.com/Ayrx/tlsenum
tlspretense 0.6.2 SSL/TLS client testing framework https://github.com/iSECPartners/tlspretense
tlssled 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation. http://blog.taddong.com/2011/05/tlssled-v10.html
tnscmd 1.3 a lame tool to prod the oracle tnslsnr process (1521/tcp) http://www.jammed.com/~jwa/hacks/security/tnscmd/
topera 19.3e230fd An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort. https://github.com/toperaproject/topera
tor 0.2.5.10 Anonymizing overlay network. http://www.torproject.org/
tor-autocircuit 0.2 Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters. http://www.thesprawl.org/projects/tor-autocircuit/
tor-browser-en 4.0.2 Tor Browser Bundle: Anonymous browsing using firefox and tor https://www.torproject.org/projects/torbrowser.html.en
torshammer 1.0 A slow POST Denial of Service testing tool written in Python. http://sourceforge.net/projects/torshammer/
torsocks 2.0.0 Wrapper to safely torify applications http://code.google.com/p/torsocks
tpcat latest TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didn’t make it to the dest. http://sourceforge.net/projects/tpcat/
traceroute 2.0.21 Tracks the route taken by packets over an IP network http://traceroute.sourceforge.net/
trid 2.11 An utility designed to identify file types from their binary signatures http://mark0.net/soft-trid-e.html
trinity 3749.996e568 A Linux System call fuzzer. http://codemonkey.org.uk/projects/trinity/
trixd00r 0.0.1 An advanced and invisible userland backdoor based on TCP/IP for UNIX systems. http://nullsecurity.net/tools/backdoor.html
truecrack 35 Password cracking for truecrypt(c) volumes. http://code.google.com/p/truecrack/
truecrypt 7.1a Free open-source cross-platform disk encryption software http://www.truecrypt.org/
tsh 0.6 An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication. http://packetstormsecurity.com/search/?q=tsh
tsh-sctp 2.850a2da An open-source UNIX backdoor. https://github.com/infodox/tsh-sctp
tunna 14.953f745 a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments. https://github.com/SECFORCE/Tunna
tuxcut 5.1 Netcut-like program for Linux written in PyQt. http://bitbucket.org/a_atalla/tuxcut/
twofi 2.0 Twitter Words of Interest. http://www.digininja.org/projects/twofi.php
u3-pwn 2.0 A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install http://www.nullsecurity.net/tools/backdoor.html
uatester 1.06 User Agent String Tester http://code.google.com/p/ua-tester/
ubertooth 2012.10.R1 A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only http://sourceforge.net/projects/ubertooth/
ubitack 0.3 Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go. https://code.google.com/p/ubitack/
udis86 1.7.2 A minimalistic disassembler library http://udis86.sourceforge.net/
udptunnel 19 Tunnels TCP over UDP packets. http://code.google.com/p/udptunnel/
uefi-firmware-parser 103.9d4d220 Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc https://github.com/theopolis/uefi-firmware-parser
ufo-wardriving 4 Allows you to test the security of wireless networks by detecting their passwords based on the router model http://www.ufo-wardriving.com/
ufonet 12.dc92621 A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet. https://github.com/epsylon/ufonet
umap 25.3ad8121 The USB host security assessment tool. https://github.com/nccgroup/umap
umit 1.0 A powerful nmap frontend. http://www.umitproject.org/
unhide 20130526 A forensic tool to find processes hidden by rootkits, LKMs or by other techniques. http://sourceforge.net/projects/unhide/
unibrute 1.b3fb4b7 Multithreaded SQL union bruteforcer. https://github.com/GDSSecurity/Unibrute
unicorn 12.fd8cd18 A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. https://github.com/trustedsec/unicorn
unicornscan 0.4.7 A new information gathering and correlation engine. http://www.unicornscan.org/
uniofuzz 1337 The universal fuzzing tool for browsers, web services, files, programs and network services/ports http://nullsecurity.net/tools/fuzzer.html
uniscan 6.2 A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner. http://sourceforge.net/projects/uniscan/
unix-privesc-check 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases) http://pentestmonkey.net/tools/audit/unix-privesc-check
unsecure 1.2 Bruteforces network login masks. http://www.sniperx.net/
upnp-pentest-toolkit 1.1 UPnP Pentest Toolkit for Windows. https://github.com/nccgroup/UPnP-Pentest-Toolkit
upnpscan 0.4 Scans the LAN or a given address range for UPnP capable devices. http://www.cqure.net/wp/upnpscan/
upx 3.91 Ultimate executable compressor. http://upx.sourceforge.net/
urlcrazy 0.5 Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. http://www.morningstarsecurity.com/research/urlcrazy
urldigger 02c A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code https://code.google.com/p/urldigger/
username-anarchy 0.2 Tools for generating usernames when penetration testing. http://www.morningstarsecurity.com/research/username-anarchy
usernamer 7.813139d Pentest Tool to generate usernames/logins based on supplied names. https://github.com/jseidl/usernamer
uw-loveimap 0.1 Multi threaded imap bounce scanner. http://uberwall.org/bin/download/45/UWloveimap.tgz
uw-offish 0.1 Clear-text protocol simulator. http://uberwall.org/bin/download/42/UW_offish.1.tar.gz
uw-udpscan 0.1 Multi threaded udp scanner. http://uberwall.org/bin/download/44/UWudpscan.tar.gz
uw-zone 0.1 Multi threaded, randomized IP zoner. http://uberwall.org/bin/download/43/UWzone.tgz
v3n0m 77.cdaf14e Popular linux version of Balthazar/NovaCygni's 'v3n0m' scanner. Searches 18k+ dorks over 13 search engines. https://github.com/v3n0m-Scanner/V3n0M-Scanner
valgrind 3.10.1 A tool to help find memory-management problems in programs http://valgrind.org/
vane 1853.9cea741 A vulnerability scanner which checks the security of WordPress installations using a black box approach. https://github.com/delvelabs/vane
vanguard 0.1 A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications. http://packetstormsecurity.com/files/110603/Vanguard-Pentesting-Scanner.html
vbrute 1.11dda8b Virtual hosts brute forcer. https://github.com/nccgroup/vbrute
vega 1.0 An open source platform to test the security of web applications https://github.com/subgraph/Vega/wiki
veil 307.63130a3 A tool designed to generate metasploit payloads that bypass common anti-virus solutions. https://github.com/veil-evasion/Veil
veracrypt 1.0f_1 Free disk encryption software, TrueCrypt fork. http://veracrypt.codeplex.com/
vfeed 36.a0fdf06 Open Source Cross Linked and Aggregated Local Vulnerability Database main repository. http://www.toolswatch.org/vfeed
vidalia 0.2.21 Controller GUI for Tor https://www.torproject.org/vidalia
videosnarf 0.63 A new security assessment tool for pcap analysis http://ucsniff.sourceforge.net/videosnarf.html
vinetto 0.07beta A forensics tool to examine Thumbs.db files http://vinetto.sourceforge.net
viper 633.e35789e A Binary analysis framework. https://github.com/botherder/viper
viproy-voipkit 2.5 VoIP Pen-Test Kit for Metasploit Framework http://viproy.com/
vivisect 20140803 A Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto http://visi.kenshoto.com/
vlan-hopping 14.b944d17 Easy 802.1Q VLAN Hopping https://github.com/nccgroup/vlan-hopping
vnak 1.cf0fda7 Aim is to be the one tool a user needs to attack multiple VoIP protocols. https://www.isecpartners.com/vnak.html
vnc-bypauth 0.0.1 Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1. http://pentester.fr/resources/tools/techno/VNC/VNC_bypauth/
vncrack 1.21 What it looks like: crack VNC. http://phenoelit-us.org/vncrack
voiper 0.07 A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor. http://voiper.sourceforge.net/
voiphopper 2.04 A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN. http://voiphopper.sourceforge.net/
voipong 2.0 A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files. http://www.enderunix.org/voipong/
volatility 2.4.1 A memory forensics toolkit. https://www.volatilesystems.com/default/volatility
vstt 0.5.0 VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling. http://www.wendzel.de/dr.org/files/Projects/vstt/
vulscan 2.0 A module which enhances nmap to a vulnerability scanner http://www.computec.ch/projekte/vulscan/
w3af 1.6 Web Application Attack and Audit Framework. http://w3af.sourceforge.net/
waffit 30 A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website http://code.google.com/p/waffit/
wafp 0.01_26c3 An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints. http://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html
waidps 16.ff8d270 Wireless Auditing, Intrusion Detection & Prevention System. https://github.com/SYWorks/waidps
wapiti 2.3.0 A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections... http://wapiti.sourceforge.net/
wavemon 0.7.6 Ncurses-based monitoring application for wireless network devices http://eden-feed.erg.abdn.ac.uk/wavemon/
web-soul 2 A plugin based scanner for attacking and data mining web sites written in Perl. http://packetstormsecurity.com/files/122064/Web-Soul-Scanner.html
webacoo 0.2.3 Web Backdoor Cookie Script-Kit. https://bechtsoudis.com/webacoo/
webenum 0.1 Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers. http://code.google.com/p/webenum/
webhandler 321.bcd2263 A handler for PHP system functions & also an alternative 'netcat' handler. https://github.com/lnxg33k/webhandler
webpwn3r 35.3fb27bb A python based Web Applications Security Scanner. https://github.com/zigoo0/webpwn3r
webrute 3.3 Web server directory brute forcer. https://github.com/BlackArch/webrute
webscarab 20120422.001828 Framework for analysing applications that communicate using the HTTP and HTTPS protocols http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
webshag 1.10 A multi-threaded, multi-platform web server audit tool. http://www.scrt.ch/en/attack/downloads/webshag
webshells 1.c6a790b Web Backdoors. https://github.com/BlackArch/webshells
webslayer 5 A tool designed for brute forcing Web Applications https://code.google.com/p/webslayer/
websockify 0.6.0 WebSocket to TCP proxy/bridge. http://github.com/kanaka/websockify
webspa 0.8 A web knocking tool, sending a single HTTP/S to run O/S commands. http://sourceforge.net/projects/webspa/
websploit 3.0.0 An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks http://code.google.com/p/websploit/
weevely 1.1 Stealth tiny web shell http://epinna.github.io/Weevely/
wepbuster 1.0_beta_0.7 script for automating aircrack-ng http://code.google.com/p/wepbuster/
wfuzz 32.db8d1f6 Utility to bruteforce web applications to find their not linked resources. https://github.com/xmendez/wfuzz
whatweb 4023.36d2a13 Next generation web scanner that identifies what websites are running. http://www.morningstarsecurity.com/research/whatweb
wi-feye 1.0 An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily. http://wi-feye.za1d.com/download.php
wifi-honey 1.0 A management tool for wifi honeypots http://www.digininja.org/projects/wifi_honey.php
wifi-monitor 0.r22.71340a3 Prints the IPs on your local network that're sending the most packets https://github.com/DanMcInerney/wifi-monitor
wificurse 0.3.9 WiFi jamming tool. https://github.com/oblique/wificurse
wifijammer 52.20c9b70 A python script to continuosly jam all wifi clients within range. https://github.com/DanMcInerney/wifijammer
wifiphisher 71.dc13fe8 Fast automated phishing attacks against WPA networks. https://github.com/sophron/wifiphisher
wifitap 2b16088 WiFi injection tool through tun/tap device. https://github.com/GDSSecurity/wifitap
wifite 2.28fc5cd A tool to attack multiple WEP and WPA encrypted networks at the same time. http://code.google.com/p/wifite/
wig 365.e56b2bf WebApp Information Gatherer. https://github.com/jekyc/wig
wikigen 8.348aa99 A script to generate wordlists out of wikipedia pages. https://github.com/zombiesam/wikigen
winexe 1.00 Remotely execute commands on Windows NT/2000/XP/2003 systems. http://sourceforge.net/projects/winexe/
winfo 2.0 Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP. http://www.ntsecurity.nu/toolbox/winfo/
wireless-ids 24.b132071 Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets. https://github.com/SYWorks/wireless-ids
wireshark-cli 1.12.3 a free network protocol analyzer for Unix/Linux and Windows - CLI version http://www.wireshark.org/
wireshark-gtk 1.12.3 a free network protocol analyzer for Unix/Linux and Windows - GTK frontend http://www.wireshark.org/
wirouter-keyrec 1.1.2 A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2). http://www.salvatorefresta.net/tools/
witchxtool 1.1 A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner. http://packetstormsecurity.com/files/97465/Witchxtool-Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool.1.html
wlan2eth 1.3 re-writes 802.11 captures into standard Ethernet frames. http://www.willhackforsushi.com/?page_id=79
wmat 0.1 Automatic tool for testing webmail accounts http://netsec.rs/70/tools.html
wnmap 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside. http://nullsecurity.net/tools/automation.html
wol-e 2.0 A suite of tools for the Wake on LAN feature of network attached computers http://code.google.com/p/wol-e/
wordbrutepress 1.0 Python script that performs brute forcing against WordPress installs using a wordlist. http://www.homelab.it/index.php/2014/11/03/wordpress-brute-force-multithreading/
wordpot 37.e42eeda A Wordpress Honeypot. https://github.com/gbrindisi/wordpot
wpa-bruteforcer 4.d5f8586 Attacking WPA/WPA encrypted access point without client. https://github.com/SYWorks/wpa-bruteforcer
wpbf 7.11b6ac1 Multithreaded WordPress brute forcer. https://github.com/dejanlevaja/wpbf
wpscan 1868.6e01e1b A vulnerability scanner which checks the security of WordPress installations using a black box approach. http://wpscan.org
ws-attacker 1.3 A modular framework for web services penetration testing. http://ws-attacker.sourceforge.net/
wsfuzzer 1.9.5 A Python tool written to automate SOAP pentesting of web services. https://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project
wyd 0.2 Gets keywords from personal files. IT security/forensic tool. http://www.remote-exploit.org/?page_id=418
x-scan 3.3 A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable. http://www.xfocus.org/
xcavator 5.bd9e2d8 Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook. https://github.com/nccgroup/xcavator
xf86-video-qxl-git r541.cbe70e9 Xorg X11 qxl video driver. http://www.spice-space.org/
xorbruteforcer 0.1 Script that implements a XOR bruteforcing of a given file, although a specific key can be used too. http://eternal-todo.com/category/bruteforce
xorsearch 1.11.1 Program to search for a given string in an XOR, ROL or ROT encoded binary file. http://blog.didierstevens.com/programs/xorsearch/
xortool 0.96 A tool to analyze multi-byte xor cipher. https://github.com/hellman/xortool/
xplico 33.0f6d8bc Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT). http://www.xplico.org/
xprobe2 0.3 An active OS fingerprinting tool. http://sourceforge.net/apps/mediawiki/xprobe/index.php?title=Main_Page
xspy 1.0c A utility for monitoring keypresses on remote X servers http://www.freshports.org/security/xspy/
xsser 1.6 A penetration testing tool for detecting and exploiting XSS vulnerabilites. http://xsser.sourceforge.net/
xssless 35.9eee648 An automated XSS payload generator written in python. https://github.com/mandatoryprogrammer/xssless
xsss 0.40b A brute force cross site scripting scanner. http://www.sven.de/xsss/
xssscan 17.7f1ea90 Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS. https://github.com/gwroblew/detectXSSlib
xsssniper 0.9 An automatic XSS discovery tool https://github.com/gbrindisi/xsssniper
xssya 13.15ebdfe A Cross Site Scripting Scanner & Vulnerability Confirmation. https://github.com/yehia-mamdouh/XSSYA
yaaf 7.4d6273a Yet Another Admin Finder. https://github.com/Plasticoo/YAAF
yara 3.3.0 A malware identification and classification tool. https://plusvic.github.io/yara/
ycrawler 0.1 A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. It has proxy and log file support. http://packetstormsecurity.com/files/98546/yCrawler-Web-Crawling-Utility.html
yersinia 0.7.3 A network tool designed to take advantage of some weakness in different network protocols. http://www.yersinia.net/
yinjector 0.1 A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods. http://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html
zackattack 5.1f96c14 A new tool set to do NTLM Authentication relaying unlike any other tool currently out there. https://github.com/urbanesec/ZackAttack/
zaproxy 2.3.1 A local intercepting proxy with integrated penetration testing tool for finding vulnerabilities in web applications. http://code.google.com/p/zaproxy/
zarp 0.1.5 A network attack tool centered around the exploitation of local networks. https://defense.ballastsecurity.net/wiki/index.php/Zarp
zerowine 0.0.2 Malware Analysis Tool - research project to dynamically analyze the behavior of malware http://zerowine.sf.net/
zmap 1.2.1 Fast network scanner designed for Internet-wide network surveys. https://zmap.io/
zulu 0.1 A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks. http://sourceforge.net/projects/zulu-wireless/
zykeys 0.1 Demonstrates how default wireless settings are derived on some models of ZyXEL routers. http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html
zzuf 0.13 Transparent application input fuzzer. http://sam.zoy.org/zzuf/
The #Hacking, #OffSec, #Cybersecurity & #OSINT resources archive/study guide is finished. Added many hundreds, maybe thousands of new resources, cleaned up study guide, huge lists of #OSINT, #OPSEC content added. Also, llinks to graphics like below. https://hastebin.com/qamiyawiwo.nginx …