πŸ“šresources

Information Gathering

Domain Names

Google Hacking

  • GHDBarrow-up-right - Google Hack Database

  • SearchDiggityarrow-up-right - SearchDiggity 3.1 is the primary attack tool of the Google Hacking Diggity Project

  • Katanaarrow-up-right - A Python Tool For google Hacking

  • uDorkarrow-up-right - uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.

  • Pagodoarrow-up-right - pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching .

Github

  • GitHackerarrow-up-right - πŸ•·οΈ A Git source leak exploit tool that restores the entire Git repository, including data from stash, for white-box auditing and analysis of developers' mind.

  • GitGraberarrow-up-right - gitGraber is a tool developed in Python3 to monitor GitHub to search and find sensitive data in real time for different online services.

  • GitMinerarrow-up-right - Tool for advanced mining for content on Github.

  • Gitrobarrow-up-right - Reconnaissance tool for GitHub organizations.

SVN

Port Scan

OSINT

Phishing

Vulnerability Analysis

Fuzzing

Vulnerability Scanner

Web Applications

CMS & Framwork Identification

Online Tools

Web Applications Proxies

web browser extension

Web Crawlers & Directory Brute Force

  • Dirbrutearrow-up-right - Multi-thread WEB directory blasting tool (with dics inside)

  • Dirbusterarrow-up-right - DirBuster is a multi threaded java application designed to brute force directories and files names on web/application servers

Docker Scanners

Database Assessment

Password Attacks

Wireless Attacks

Wireless Tools

  • Fern Wifi crackerarrow-up-right - Fern-Wifi-Cracker is designed to be used in testing and discovering flaws in ones own network with the aim of fixing the flaws detected

Reverse Engineering

Exploitation Tools

Vulnerability Search

Cross-site Scripting(XSSοΌ‰

Sql Injection

Command Injection

File Include

File Upload vulnerability

XML External Entity Attack(XXEοΌ‰

Cross-site request forgery (CSRFοΌ‰

Exploit Framework

Machine Learning

Automate

Sniffing & Spoofng

Maintaining Access

Shell

Web Shell

PHP

Chopper kind Webshell

  • Chopper

Tips: The tool comes from the network, no backdoor verification, please choose it on yourself......

Link: https://pan.baidu.com/s/1VnXkoQU-srSllG6JaY0nTAarrow-up-right Password: v71d

Tips: The tool comes from the network, no backdoor verification, please choose it on yourself......

Link: https://pan.baidu.com/s/1QZrnWU7DUuJhiXl7u1kELwarrow-up-right Password: hjrh

Privilege Escalation Auxiliary

C2

Golang Sec Tools

Tips: Golang is a excellent cross platform language for security.

Reporting & Collaboration

Social Engineering

System Services

Code Audit

Port Forwarding & Proxies

DevSecOps

RootKit

Audit Tools

Cyber Range

Vulnerability application

Simulation Range

Last updated