bt3gl / Pentesting_toolkit
Licence: mit
π΄ββ οΈ Tools for pentesting, CTFs & wargames. π΄ββ οΈ
Stars: β 1,268
Programming Languages
c
50402 projects - #5 most used programming language
Labels
Projects that are alternatives of or similar to Pentesting toolkit
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: β 1,136 (-10.41%)
Mutual labels: hacking, cryptography, pentesting, infosec, steganography
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: β 4,162 (+228.23%)
Mutual labels: hacking, pentesting, infosec, forensics, reverse-engineering
Ctf Tools
Useful CTF Tools
Stars: β 190 (-85.02%)
Mutual labels: cryptography, ctf, forensics, reverse-engineering
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: β 509 (-59.86%)
Mutual labels: hacking, pentesting, infosec, ctf
Stegcloak
Hide secrets with invisible characters in plain text securely using passwords π§π»ββοΈβ
Stars: β 2,379 (+87.62%)
Mutual labels: hacking, cryptography, infosec, steganography
Rebel Framework
Advanced and easy to use penetration testing framework π£π
Stars: β 183 (-85.57%)
Mutual labels: hacking, ctf, forensics, reverse-engineering
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: β 405 (-68.06%)
Mutual labels: hacking, cryptography, pentesting, steganography
Ciphey
β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘
Stars: β 9,116 (+618.93%)
Mutual labels: hacking, cryptography, pentesting, ctf
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: β 6,270 (+394.48%)
Mutual labels: hacking, pentesting, ctf
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: β 5,615 (+342.82%)
Mutual labels: hacking, pentesting, infosec
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: β 68 (-94.64%)
Mutual labels: pentesting, ctf, post-exploitation
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: β 775 (-38.88%)
Mutual labels: hacking, pentesting, infosec
Covertutils
A framework for Backdoor development!
Stars: β 424 (-66.56%)
Mutual labels: pentesting, post-exploitation, steganography
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: β 556 (-56.15%)
Mutual labels: hacking, pentesting, infosec
Hacker Roadmap
π Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: β 7,752 (+511.36%)
Mutual labels: hacking, vulnerabilities, post-exploitation
Name That Hash
π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 3000+ other hashes β Comes with a neat web app π₯
Stars: β 540 (-57.41%)
Mutual labels: hacking, infosec, ctf
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: β 463 (-63.49%)
Mutual labels: network, hacking, pentesting
Write Ups
π VoidHack CTF write-ups
Stars: β 45 (-96.45%)
Mutual labels: cryptography, ctf, reverse-engineering
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: β 870 (-31.39%)
Mutual labels: hacking, pentesting, infosec
Pentesting Toolkit
Hi, I am Mia von Steinkirch, and this repository contains the resouces I used when I was a professional CTF player in 2014 and 2015.
Disclaimer:
All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.
Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end userβs responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Sub-directories:
- CTFs and Wargames
- Cloud and K8s Hacking
- Cryptography
- Forensics
- Linux Hacking
- Mobile Hacking
- Network and 802.11
- Other Hackings
- Pentesting Scripts
- Reverse Engineering
- Steganography
- Vulnerabilities and Exploits
- Web Hacking
Resources
General Hacking
- The Art of Intrusion.
- Krebs Series on how to be in InfoSec: Thomas Ptacek, Bruce Schneier, Charlie Miller.
- How to be a InfoSec Geek.
- Continuous security.
- How to not get hacked.
Privilege Escalation
Post-Exploitation
- Metasploit Post Exploitation Command List.
- Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List.
- OSX Post-Exploitation.
- Windows Post-Exploitation Command List.
- Linux/Unix/BSD Post-Exploitation Command List.
Books
- Bulletproof SSL and TLS.
- Reversing: Secrets of Reverse Engineering.
- The Art of Memory Forensics.
- The C Programming Language
- The Unix Programming Environment.
- UNIX Network Programming.
- Threat Modeling: Designing for Security.
- The Tangled Web.
- The Art of Exploitation.
- The Art of Software Security Assessment.
- Practical Packet Analysis.
- Gray Hat Python.
- Black Hat Python.
- Violent Python.
- Shellcoders Handbook.
- Practice Malware Analysis.
- This Machine Kills Secrets.
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].