René's URL Explorer Experiment


Title: GitHub - Luci-d/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things

Open Graph Title: GitHub - Luci-d/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things

X Title: GitHub - Luci-d/Penetration-Testing: List of awesome penetration testing resources, tools and other shiny things

Description: List of awesome penetration testing resources, tools and other shiny things - Luci-d/Penetration-Testing

Open Graph Description: List of awesome penetration testing resources, tools and other shiny things - Luci-d/Penetration-Testing

X Description: List of awesome penetration testing resources, tools and other shiny things - Luci-d/Penetration-Testing

Opengraph URL: https://github.com/Luci-d/Penetration-Testing

X: @github

direct link

Domain: github.com

route-pattern/:user_id/:repository
route-controllerfiles
route-actiondisambiguate
fetch-noncev2:77e9c790-9342-addd-d60a-9ce47c0e8905
current-catalog-service-hashf3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb
request-idECEE:147CA2:2FD9068:4068C3A:69930152
html-safe-nonce6fb8a1a409ebb316f59ab04457a605a1753edf85bbcd42e0283ce2ba762ff624
visitor-payloadeyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFQ0VFOjE0N0NBMjoyRkQ5MDY4OjQwNjhDM0E6Njk5MzAxNTIiLCJ2aXNpdG9yX2lkIjoiNTI5MjUyNzQ5MTU0NTc2MDA4MiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9
visitor-hmac0bfe1634b09e0ebcf1dbd268997e439c2336158cd300897afc37d9fb8cb6b248
hovercard-subject-tagrepository:223941849
github-keyboard-shortcutsrepository,copilot
google-site-verificationApib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I
octolytics-urlhttps://collector.github.com/github/collect
analytics-location//
fb:app_id1401488693436528
apple-itunes-appapp-id=1477376905, app-argument=https://github.com/Luci-d/Penetration-Testing
twitter:imagehttps://opengraph.githubassets.com/a878e2bb021b1bd6d0308fd55f29032e867be89c627ac839fb0654bd3492f093/Luci-d/Penetration-Testing
twitter:cardsummary_large_image
og:imagehttps://opengraph.githubassets.com/a878e2bb021b1bd6d0308fd55f29032e867be89c627ac839fb0654bd3492f093/Luci-d/Penetration-Testing
og:image:altList of awesome penetration testing resources, tools and other shiny things - Luci-d/Penetration-Testing
og:image:width1200
og:image:height600
og:site_nameGitHub
og:typeobject
hostnamegithub.com
expected-hostnamegithub.com
None348cc0594c4976eb4050dc9547ecf65057ee89a2b7ed0652b983b9b539f57145
turbo-cache-controlno-preview
go-importgithub.com/Luci-d/Penetration-Testing git https://github.com/Luci-d/Penetration-Testing.git
octolytics-dimension-user_id55981308
octolytics-dimension-user_loginLuci-d
octolytics-dimension-repository_id223941849
octolytics-dimension-repository_nwoLuci-d/Penetration-Testing
octolytics-dimension-repository_publictrue
octolytics-dimension-repository_is_forktrue
octolytics-dimension-repository_parent_id79034887
octolytics-dimension-repository_parent_nwowtsxDev/Penetration-Testing
octolytics-dimension-repository_network_root_id79034887
octolytics-dimension-repository_network_root_nwowtsxDev/Penetration-Testing
turbo-body-classeslogged-out env-production page-responsive
disable-turbofalse
browser-stats-urlhttps://api.github.com/_private/browser/stats
browser-errors-urlhttps://api.github.com/_private/browser/errors
release91a0a74305bca931ec621f52a6782246d341466f
ui-targetfull
theme-color#1e2327
color-schemelight dark

Links:

Skip to contenthttps://github.com/Luci-d/Penetration-Testing#start-of-content
https://github.com/
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing
GitHub CopilotWrite better code with AIhttps://github.com/features/copilot
GitHub SparkBuild and deploy intelligent appshttps://github.com/features/spark
GitHub ModelsManage and compare promptshttps://github.com/features/models
MCP RegistryNewIntegrate external toolshttps://github.com/mcp
ActionsAutomate any workflowhttps://github.com/features/actions
CodespacesInstant dev environmentshttps://github.com/features/codespaces
IssuesPlan and track workhttps://github.com/features/issues
Code ReviewManage code changeshttps://github.com/features/code-review
GitHub Advanced SecurityFind and fix vulnerabilitieshttps://github.com/security/advanced-security
Code securitySecure your code as you buildhttps://github.com/security/advanced-security/code-security
Secret protectionStop leaks before they starthttps://github.com/security/advanced-security/secret-protection
Why GitHubhttps://github.com/why-github
Documentationhttps://docs.github.com
Bloghttps://github.blog
Changeloghttps://github.blog/changelog
Marketplacehttps://github.com/marketplace
View all featureshttps://github.com/features
Enterpriseshttps://github.com/enterprise
Small and medium teamshttps://github.com/team
Startupshttps://github.com/enterprise/startups
Nonprofitshttps://github.com/solutions/industry/nonprofits
App Modernizationhttps://github.com/solutions/use-case/app-modernization
DevSecOpshttps://github.com/solutions/use-case/devsecops
DevOpshttps://github.com/solutions/use-case/devops
CI/CDhttps://github.com/solutions/use-case/ci-cd
View all use caseshttps://github.com/solutions/use-case
Healthcarehttps://github.com/solutions/industry/healthcare
Financial serviceshttps://github.com/solutions/industry/financial-services
Manufacturinghttps://github.com/solutions/industry/manufacturing
Governmenthttps://github.com/solutions/industry/government
View all industrieshttps://github.com/solutions/industry
View all solutionshttps://github.com/solutions
AIhttps://github.com/resources/articles?topic=ai
Software Developmenthttps://github.com/resources/articles?topic=software-development
DevOpshttps://github.com/resources/articles?topic=devops
Securityhttps://github.com/resources/articles?topic=security
View all topicshttps://github.com/resources/articles
Customer storieshttps://github.com/customer-stories
Events & webinarshttps://github.com/resources/events
Ebooks & reportshttps://github.com/resources/whitepapers
Business insightshttps://github.com/solutions/executive-insights
GitHub Skillshttps://skills.github.com
Documentationhttps://docs.github.com
Customer supporthttps://support.github.com
Community forumhttps://github.com/orgs/community/discussions
Trust centerhttps://github.com/trust-center
Partnershttps://github.com/partners
GitHub SponsorsFund open source developershttps://github.com/sponsors
Security Labhttps://securitylab.github.com
Maintainer Communityhttps://maintainers.github.com
Acceleratorhttps://github.com/accelerator
Archive Programhttps://archiveprogram.github.com
Topicshttps://github.com/topics
Trendinghttps://github.com/trending
Collectionshttps://github.com/collections
Enterprise platformAI-powered developer platformhttps://github.com/enterprise
GitHub Advanced SecurityEnterprise-grade security featureshttps://github.com/security/advanced-security
Copilot for BusinessEnterprise-grade AI featureshttps://github.com/features/copilot/copilot-business
Premium SupportEnterprise-grade 24/7 supporthttps://github.com/premium-support
Pricinghttps://github.com/pricing
Search syntax tipshttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
documentationhttps://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax
Sign in https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing
Sign up https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=Luci-d%2FPenetration-Testing
Reloadhttps://github.com/Luci-d/Penetration-Testing
Reloadhttps://github.com/Luci-d/Penetration-Testing
Reloadhttps://github.com/Luci-d/Penetration-Testing
Luci-d https://github.com/Luci-d
Penetration-Testinghttps://github.com/Luci-d/Penetration-Testing
wtsxDev/Penetration-Testinghttps://github.com/wtsxDev/Penetration-Testing
Notifications https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing
Fork 0 https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing
Star 2 https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing
2 stars https://github.com/Luci-d/Penetration-Testing/stargazers
718 forks https://github.com/Luci-d/Penetration-Testing/forks
Branches https://github.com/Luci-d/Penetration-Testing/branches
Tags https://github.com/Luci-d/Penetration-Testing/tags
Activity https://github.com/Luci-d/Penetration-Testing/activity
Star https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing
Notifications https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing
Code https://github.com/Luci-d/Penetration-Testing
Pull requests 0 https://github.com/Luci-d/Penetration-Testing/pulls
Actions https://github.com/Luci-d/Penetration-Testing/actions
Projects 0 https://github.com/Luci-d/Penetration-Testing/projects
Security 0 https://github.com/Luci-d/Penetration-Testing/security
Insights https://github.com/Luci-d/Penetration-Testing/pulse
Code https://github.com/Luci-d/Penetration-Testing
Pull requests https://github.com/Luci-d/Penetration-Testing/pulls
Actions https://github.com/Luci-d/Penetration-Testing/actions
Projects https://github.com/Luci-d/Penetration-Testing/projects
Security https://github.com/Luci-d/Penetration-Testing/security
Insights https://github.com/Luci-d/Penetration-Testing/pulse
Brancheshttps://github.com/Luci-d/Penetration-Testing/branches
Tagshttps://github.com/Luci-d/Penetration-Testing/tags
https://github.com/Luci-d/Penetration-Testing/branches
https://github.com/Luci-d/Penetration-Testing/tags
7 Commitshttps://github.com/Luci-d/Penetration-Testing/commits/master/
https://github.com/Luci-d/Penetration-Testing/commits/master/
README.mdhttps://github.com/Luci-d/Penetration-Testing/blob/master/README.md
README.mdhttps://github.com/Luci-d/Penetration-Testing/blob/master/README.md
READMEhttps://github.com/Luci-d/Penetration-Testing
http://kalitut.com
https://github.com/Luci-d/Penetration-Testing#awesome-penetration-testing-
http://www.youtube.com/watch?v=V3CTfJ2ZP7M
Online Resourceshttps://github.com/Luci-d/Penetration-Testing#online-resources
Penetration Testing Resourceshttps://github.com/Luci-d/Penetration-Testing#penetration-testing-resources
Exploit developmenthttps://github.com/Luci-d/Penetration-Testing#exploit-development
Social Engineering Resourceshttps://github.com/Luci-d/Penetration-Testing#social-engineering-resources
Lock Picking Resourceshttps://github.com/Luci-d/Penetration-Testing#lock-picking-resources
Toolshttps://github.com/Luci-d/Penetration-Testing#tools
Penetration Testing Distributionshttps://github.com/Luci-d/Penetration-Testing#penetration-testing-distributions
Basic Penetration Testing Toolshttps://github.com/Luci-d/Penetration-Testing#basic-penetration-testing-tools
Docker for Penetration Testinghttps://github.com/Luci-d/Penetration-Testing#docker-for-penetration-testing
Vulnerability Scannershttps://github.com/Luci-d/Penetration-Testing#vulnerability-scanners
Network Toolshttps://github.com/Luci-d/Penetration-Testing#network-tools
Wireless Network Toolshttps://github.com/Luci-d/Penetration-Testing#wireless-network-tools
SSL Analysis Toolshttps://github.com/Luci-d/Penetration-Testing#ssl-analysis-tools
Web exploitationhttps://github.com/Luci-d/Penetration-Testing#web-exploitation
Hex Editorshttps://github.com/Luci-d/Penetration-Testing#hex-editors
Crackershttps://github.com/Luci-d/Penetration-Testing#crackers
Windows Utilshttps://github.com/Luci-d/Penetration-Testing#windows-utils
Linux Utilshttps://github.com/Luci-d/Penetration-Testing#linux-utils
DDoS Toolshttps://github.com/Luci-d/Penetration-Testing#ddos-tools
Social Engineering Toolshttps://github.com/Luci-d/Penetration-Testing#social-engineering-tools
OSInt Toolshttps://github.com/Luci-d/Penetration-Testing#osint-tools
Anonymity Toolshttps://github.com/Luci-d/Penetration-Testing#anonymity-tools
Reverse Engineering Toolshttps://github.com/Luci-d/Penetration-Testing#reverse-engineering-tools
CTF Toolshttps://github.com/Luci-d/Penetration-Testing#ctf-tools
Bookshttps://github.com/Luci-d/Penetration-Testing#books
Penetration Testing Bookshttps://github.com/Luci-d/Penetration-Testing#penetration-testing-books
Hackers Handbook Serieshttps://github.com/Luci-d/Penetration-Testing#hackers-handbook-series
Defensive Developmenthttps://github.com/Luci-d/Penetration-Testing#defensive-development
Network Analysis Bookshttps://github.com/Luci-d/Penetration-Testing#network-analysis-books
Reverse Engineering Bookshttps://github.com/Luci-d/Penetration-Testing#reverse-engineering-books
Malware Analysis Bookshttps://github.com/Luci-d/Penetration-Testing#malware-analysis-books
Windows Bookshttps://github.com/Luci-d/Penetration-Testing#windows-books
Social Engineering Bookshttps://github.com/Luci-d/Penetration-Testing#social-engineering-books
Lock Picking Bookshttps://github.com/Luci-d/Penetration-Testing#lock-picking-books
Vulnerability Databaseshttps://github.com/Luci-d/Penetration-Testing#vulnerability-databases
Security Courseshttps://github.com/Luci-d/Penetration-Testing#security-courses
Information Security Conferenceshttps://github.com/Luci-d/Penetration-Testing#information-security-conferences
Information Security Magazineshttps://github.com/Luci-d/Penetration-Testing#information-security-magazines
https://github.com/Luci-d/Penetration-Testing#online-resources
https://github.com/Luci-d/Penetration-Testing#penetration-testing-resources
Metasploit Unleashedhttps://www.offensive-security.com/metasploit-unleashed/
PTEShttp://www.pentest-standard.org/
OWASPhttps://www.owasp.org/index.php/Main_Page
PENTEST-WIKIhttps://github.com/nixawk/pentest-wiki
Vulnerability Assessment Frameworkhttp://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
The Pentesters Frameworkhttps://github.com/trustedsec/ptf
https://github.com/Luci-d/Penetration-Testing#exploit-development
Shellcode Tutorialhttp://www.vividmachines.com/shellcode/shellcode.html
Shellcode Exampleshttp://shell-storm.org/shellcode/
Exploit Writing Tutorialshttps://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
shellsploithttps://github.com/b3mb4m/shellsploit-framework
Voltronhttps://github.com/snare/voltron
https://github.com/Luci-d/Penetration-Testing#social-engineering-resources
Social Engineering Frameworkhttp://www.social-engineer.org/framework/general-discussion/
https://github.com/Luci-d/Penetration-Testing#lock-picking-resources
Schuyler Towne channelhttps://www.youtube.com/user/SchuylerTowne/
/r/lockpickinghttps://www.reddit.com/r/lockpicking
https://github.com/Luci-d/Penetration-Testing#tools
https://github.com/Luci-d/Penetration-Testing#penetration-testing-distributions
Kalihttps://www.kali.org/
ArchStrikehttps://archstrike.org/
BlackArchhttps://www.blackarch.org/
NSThttp://networksecuritytoolkit.org/
Pentoohttp://www.pentoo.ch/
BackBoxhttps://backbox.org/
Parrothttps://www.parrotsec.org/
Fedora Security Labhttps://labs.fedoraproject.org/en/security/
https://github.com/Luci-d/Penetration-Testing#basic-penetration-testing-tools
Metasploit Frameworkhttps://www.metasploit.com/
Burp Suitehttps://portswigger.net/burp/
ExploitPackhttp://exploitpack.com/
BeeFhttps://github.com/beefproject/beef
faradayhttps://github.com/infobyte/faraday
evilgradehttps://github.com/infobyte/evilgrade
commixhttps://github.com/stasinopoulos/commix
routersploithttps://github.com/reverse-shell/routersploit
https://github.com/nccgroup/redsnarfhttps://github.com/nccgroup/redsnarf
https://github.com/Luci-d/Penetration-Testing#docker-for-penetration-testing
official Kali Linuxhttps://hub.docker.com/r/kalilinux/kali-linux-docker/
official OWASP ZAPhttps://github.com/zaproxy/zaproxy
official WPScanhttps://hub.docker.com/r/wpscanteam/wpscan/
docker-metasploithttps://hub.docker.com/r/pandrew/metasploit/
Damn Vulnerable Web Application (DVWA)https://hub.docker.com/r/citizenstig/dvwa/
Vulnerable WordPress Installationhttps://hub.docker.com/r/wpscanteam/vulnerablewordpress/
Vulnerability as a service: Shellshockhttps://hub.docker.com/r/hmlio/vaas-cve-2014-6271/
Vulnerability as a service: Heartbleedhttps://hub.docker.com/r/hmlio/vaas-cve-2014-0160/
Security Ninjashttps://hub.docker.com/r/opendns/security-ninjas/
Docker Bench for Securityhttps://hub.docker.com/r/diogomonica/docker-bench-security/
OWASP Security Shepherdhttps://hub.docker.com/r/ismisepaul/securityshepherd/
OWASP WebGoat Project docker imagehttps://hub.docker.com/r/danmx/docker-owasp-webgoat/
OWASP NodeGoathttps://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker
OWASP Mutillidae II Web Pen-Test Practice Applicationhttps://hub.docker.com/r/citizenstig/nowasp/
OWASP Juice Shophttps://github.com/bkimminich/juice-shop#docker-container--
https://github.com/Luci-d/Penetration-Testing#vulnerability-scanners
Nexposehttps://www.rapid7.com/products/nexpose/
Nessushttp://www.tenable.com/products/nessus-vulnerability-scanner
Niktohttps://cirt.net/nikto2
OpenVAShttp://www.openvas.org/
OWASP Zed Attack Proxyhttps://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Secappshttps://secapps.com/
w3afhttps://github.com/andresriancho/w3af
Wapitihttp://wapiti.sourceforge.net/
WebReaverhttp://www.webreaver.com/
DVCS Ripperhttps://github.com/kost/dvcs-ripper
arachnihttps://github.com/Arachni/arachni
https://github.com/Luci-d/Penetration-Testing#network-tools
nmaphttps://nmap.org/
pighttps://github.com/rafael-santiago/pig
tcpdump/libpcaphttp://www.tcpdump.org/
Wiresharkhttps://www.wireshark.org/
Network Toolshttp://network-tools.com/
netsniff-nghttps://github.com/netsniff-ng/netsniff-ng
Intercepter-NGhttp://sniff.su/
SPARTAhttp://sparta.secforce.com/
dnschefhttp://thesprawl.org/projects/dnschef/
DNSDumpsterhttps://dnsdumpster.com/
dnsenumhttps://github.com/fwaeytens/dnsenum/
dnsmaphttps://github.com/makefu/dnsmap/
dnsreconhttps://github.com/darkoperator/dnsrecon/
dnstracerhttp://www.mavetju.org/unix/dnstracer.php
passivedns-clienthttps://github.com/chrislee35/passivedns-client
passivednshttps://github.com/gamelinux/passivedns
Mass Scanhttps://github.com/robertdavidgraham/masscan
Zarphttps://github.com/hatRiot/zarp
mitmproxyhttps://github.com/mitmproxy/mitmproxy
malloryhttps://github.com/justmao945/mallory
Netzobhttps://github.com/netzob/netzob
DEThttps://github.com/sensepost/DET
pwnathttps://github.com/samyk/pwnat
dsniffhttps://www.monkey.org/~dugsong/dsniff/
tgcdhttp://tgcd.sourceforge.net/
smbmaphttps://github.com/ShawnDEvans/smbmap
scapyhttps://github.com/secdev/scapy
Dshellhttps://github.com/USArmyResearchLab/Dshell
Debookee (MAC OS X)http://www.iwaxx.com/debookee/
Dripcaphttps://github.com/dripcap/dripcap
https://github.com/Luci-d/Penetration-Testing#wireless-network-tools
Aircrack-nghttp://www.aircrack-ng.org/
Kismethttps://kismetwireless.net/
Reaverhttps://code.google.com/archive/p/reaver-wps
Wifitehttps://github.com/derv82/wifite
wifiphisherhttps://github.com/sophron/wifiphisher
https://github.com/Luci-d/Penetration-Testing#ssl-analysis-tools
SSLyzehttps://github.com/nabla-c0d3/sslyze
sslstriphttps://www.thoughtcrime.org/software/sslstrip/
sslstrip2https://github.com/LeonardoNve/sslstrip2
tls_proberhttps://github.com/WestpointLtd/tls_prober
https://github.com/Luci-d/Penetration-Testing#web-exploitation
WPScanhttps://wpscan.org/
SQLmaphttp://sqlmap.org/
weevely3https://github.com/epinna/weevely3
Wappalyzerhttps://wappalyzer.com/
cms-explorerhttps://code.google.com/archive/p/cms-explorer/
joomscanhttps://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
WhatWebhttps://github.com/urbanadventurer/WhatWeb
BlindElephanthttp://blindelephant.sourceforge.net/
fimaphttps://github.com/kurobeats/fimap
Kadabrahttps://github.com/D35m0nd142/Kadabra
Kadimushttps://github.com/P0cL4bs/Kadimus
liffyhttps://github.com/hvqzao/liffy
https://github.com/Luci-d/Penetration-Testing#hex-editors
HexEdit.jshttps://hexed.it
Hexinatorhttps://hexinator.com/
HxD - Freeware Hex Editor and Disk Editorhttps://mh-nexus.de/en/hxd/
https://github.com/Luci-d/Penetration-Testing#crackers
John the Ripperhttp://www.openwall.com/john/
Online MD5 crackerhttp://www.md5crack.com/
Hashcathttp://hashcat.net/hashcat/
THC Hydrahttp://sectools.org/tool/hydra/
https://github.com/Luci-d/Penetration-Testing#windows-utils
Sysinternals Suitehttps://technet.microsoft.com/en-us/sysinternals/bb842062
Windows Credentials Editorhttp://www.ampliasecurity.com/research/windows-credentials-editor/
mimikatzhttp://blog.gentilkiwi.com/mimikatz
PowerSploithttps://github.com/PowerShellMafia/PowerSploit
Windows Exploit Suggesterhttps://github.com/GDSSecurity/Windows-Exploit-Suggester
Responderhttps://github.com/SpiderLabs/Responder
Bloodhoundhttps://github.com/adaptivethreat/Bloodhound/wiki
Empirehttps://github.com/PowerShellEmpire/Empire
Fibratushttps://github.com/rabbitstack/fibratus
https://github.com/Luci-d/Penetration-Testing#linux-utils
Linux Exploit Suggesterhttps://github.com/PenturaLabs/Linux_Exploit_Suggester
https://github.com/Luci-d/Penetration-Testing#ddos-tools
LOIChttps://github.com/NewEraCracker/LOIC/
JS LOIChttp://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html
T50https://sourceforge.net/projects/t50/
https://github.com/Luci-d/Penetration-Testing#social-engineering-tools
SEThttps://github.com/trustedsec/social-engineer-toolkit
https://github.com/Luci-d/Penetration-Testing#osint-tools
Maltegohttp://www.paterva.com/web7/
theHarvesterhttps://github.com/laramies/theHarvester
creepyhttps://github.com/ilektrojohn/creepy
metagoofilhttps://github.com/laramies/metagoofil
Google Hacking Databasehttps://www.exploit-db.com/google-hacking-database/
Censyshttps://www.censys.io/
Shodanhttps://www.shodan.io/
recon-nghttps://bitbucket.org/LaNMaSteR53/recon-ng
github-dorkshttps://github.com/techgaun/github-dorks
vcsmaphttps://github.com/melvinsh/vcsmap
Spiderfoothttp://www.spiderfoot.net/
https://github.com/Luci-d/Penetration-Testing#anonymity-tools
Torhttps://www.torproject.org/
I2Phttps://geti2p.net/en/
Nipehttps://github.com/GouveaHeitor/nipe
https://github.com/Luci-d/Penetration-Testing#reverse-engineering-tools
IDA Prohttps://www.hex-rays.com/products/ida/
IDA Freehttps://www.hex-rays.com/products/ida/support/download_freeware.shtml
WDK/WinDbghttps://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx
OllyDbghttp://www.ollydbg.de/
Radare2http://rada.re/r/index.html
x64_dbghttp://x64dbg.com/
Immunity Debuggerhttp://debugger.immunityinc.com/
Evan's Debuggerhttp://www.codef00.com/projects#debugger
Medusa disassemblerhttps://github.com/wisk/medusa
plasmahttps://github.com/joelpx/plasma
pedahttps://github.com/longld/peda
dnSpyhttps://github.com/0xd4d/dnSpy
https://github.com/Luci-d/Penetration-Testing#ctf-tools
Pwntoolshttps://github.com/Gallopsled/pwntools
https://github.com/Luci-d/Penetration-Testing#books
https://github.com/Luci-d/Penetration-Testing#penetration-testing-books
The Art of Exploitation by Jon Erickson, 2008http://amzn.to/2iqhK9S
Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011http://amzn.to/2jl5pUd
Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014http://amzn.to/2jMfK8i
Rtfm: Red Team Field Manual by Ben Clark, 2014http://amzn.to/2iz9K4Y
The Hacker Playbook 2: Practical Guide To Penetration Testinghttp://amzn.to/2jMdNbU
The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013http://amzn.to/2jMgMkj
Professional Penetration Testing by Thomas Wilhelm, 2013http://amzn.to/2jMq9AI
Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012http://amzn.to/2jl6GKU
Violent Python by TJ O'Connor, 2012http://amzn.to/2jMbTYy
Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007http://amzn.to/2izbgDS
Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014http://amzn.to/2jl5FCk
Penetration Testing: Procedures & Methodologies by EC-Council, 2010http://amzn.to/2izaBmc
Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010http://amzn.to/2izcwqI
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014http://amzn.to/2iqoyEj
Bug Hunter's Diary by Tobias Klein, 2011http://amzn.to/2jkYHO2
https://github.com/Luci-d/Penetration-Testing#hackers-handbook-series
The Database Hacker's Handbook, David Litchfield et al., 2005http://amzn.to/2jlcqEB
The Shellcoders Handbook by Chris Anley et al., 2007http://amzn.to/2iudxwQ
The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009http://amzn.to/2jSUpxO
The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011http://amzn.to/2jl0rGQ
iOS Hackers Handbook by Charlie Miller et al., 2012http://amzn.to/2jMpWO4
Android Hackers Handbook by Joshua J. Drake et al., 2014http://amzn.to/2jmN5tg
The Browser Hackers Handbook by Wade Alcorn et al., 2014http://amzn.to/2jl9asy
The Mobile Application Hackers Handbook by Dominic Chell et al., 2015http://amzn.to/2jMmtz1
Car Hacker's Handbook by Craig Smith, 2016http://amzn.to/2jldxnL
https://github.com/Luci-d/Penetration-Testing#defensive-development
Holistic Info-Sec for Web Developers (Fascicle 0)http://amzn.to/2jmRqwB
Holistic Info-Sec for Web Developers (Fascicle 1)https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications
https://github.com/Luci-d/Penetration-Testing#network-analysis-books
Nmap Network Scanning by Gordon Fyodor Lyon, 2009http://amzn.to/2izkmAN
Practical Packet Analysis by Chris Sanders, 2011http://amzn.to/2jn091H
Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012http://amzn.to/2jn4DFU
Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012http://amzn.to/2izaCXe
https://github.com/Luci-d/Penetration-Testing#reverse-engineering-books
Reverse Engineering for Beginners by Dennis Yurichevhttp://beginners.re/
Hacking the Xbox by Andrew Huang, 2003http://amzn.to/2iudEbO
The IDA Pro Book by Chris Eagle, 2011http://amzn.to/2itYfbI
Practical Reverse Engineering by Bruce Dang et al., 2014http://amzn.to/2jMnAyD
Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015http://amzn.to/2iua6q7
https://github.com/Luci-d/Penetration-Testing#malware-analysis-books
Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012http://amzn.to/2izon8f
The Art of Memory Forensics by Michael Hale Ligh et al., 2014http://amzn.to/2iuh1j8
Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010http://amzn.to/2jnag6W
https://github.com/Luci-d/Penetration-Testing#windows-books
Windows Internals by Mark Russinovich et al., 2012http://amzn.to/2jl4zGJ
https://github.com/Luci-d/Penetration-Testing#social-engineering-books
The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002http://amzn.to/2jMhgXQ
The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005http://amzn.to/2jl287p
Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011http://amzn.to/2izbuuV
No Tech Hacking by Johnny Long & Jack Wiles, 2008http://amzn.to/2iudb9G
Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010http://amzn.to/2iu62WZ
Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014http://amzn.to/2izf4W5
Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014http://amzn.to/2izlww9
https://github.com/Luci-d/Penetration-Testing#lock-picking-books
Practical Lock Picking by Deviant Ollam, 2012http://amzn.to/2jmQeJy
Keys to the Kingdom by Deviant Ollam, 2012http://amzn.to/2izcvDg
CIA Lock Picking Field Operative Training Manualhttp://amzn.to/2jMrw2c
Lock Picking: Detail Overkill by Solomonhttps://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0
Eddie the Wire bookshttps://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0
https://github.com/Luci-d/Penetration-Testing#vulnerability-databases
NVDhttps://nvd.nist.gov/
CERThttps://www.us-cert.gov/
OSVDBhttps://blog.osvdb.org/
Bugtraqhttp://www.securityfocus.com/
Exploit-DBhttps://www.exploit-db.com/
Fulldisclosurehttp://seclists.org/fulldisclosure/
MS Bulletinhttps://technet.microsoft.com/en-us/security/bulletins
MS Advisoryhttps://technet.microsoft.com/en-us/security/advisories
Inj3ct0rhttp://www.1337day.com/
Packet Stormhttps://packetstormsecurity.com/
SecuriTeamhttp://www.securiteam.com/
CXSecurityhttp://cxsecurity.com/
Vulnerability Laboratoryhttp://www.vulnerability-lab.com/
ZDIhttp://www.zerodayinitiative.com/
Vulnershttps://vulners.com
https://github.com/Luci-d/Penetration-Testing#security-courses
Offensive Security Traininghttps://www.offensive-security.com/information-security-training/
SANS Security Traininghttp://www.sans.org/
Open Security Traininghttp://opensecuritytraining.info/
CTF Field Guidehttps://trailofbits.github.io/ctf/
ARIZONA CYBER WARFARE RANGEhttp://azcwr.org/
Cybraryhttp://cybrary.it
Computer Security Studenthttp://computersecuritystudent.com
European Union Agency for Network and Information Securityhttps://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material
https://github.com/Luci-d/Penetration-Testing#information-security-conferences
DEF CONhttps://www.defcon.org/
Black Hathttp://www.blackhat.com/
BSideshttp://www.securitybsides.com/
CCChttps://events.ccc.de/congress/
DerbyConhttps://www.derbycon.com/
PhreakNIChttp://phreaknic.info/
ShmooConhttp://shmoocon.org/
CarolinaConhttp://www.carolinacon.org/
CHConhttps://chcon.nz
SummerConhttp://www.summercon.org/
Hack.luhttps://2016.hack.lu/
HITBhttps://conference.hitb.org/
Troopershttps://www.troopers.de
Hack3rConhttp://hack3rcon.org/
ThotConhttp://thotcon.org/
LayerOnehttp://www.layerone.org/
DeepSechttps://deepsec.net/
SkyDogConhttp://www.skydogcon.com/
SECUINSIDEhttp://secuinside.com
Seoulhttps://en.wikipedia.org/wiki/Seoul
DefCamphttp://def.camp/
AppSecUSAhttps://appsecusa.org/
BruCONhttp://brucon.org
Infosecurity Europehttp://www.infosecurityeurope.com/
Nullconhttp://nullcon.net/website/
RSA Conference USAhttps://www.rsaconference.com/
Swiss Cyber Stormhttps://www.swisscyberstorm.com/
Virus Bulletin Conferencehttps://www.virusbulletin.com/conference/index
Ekopartyhttp://www.ekoparty.org
44Conhttps://44con.com/
BalCConhttps://www.balccon.org
FSechttp://fsec.foi.hr
https://github.com/Luci-d/Penetration-Testing#information-security-magazines
2600: The Hacker Quarterlyhttps://www.2600.com/Magazine/DigitalEditions
Phrack Magazinehttp://www.phrack.org/
Top Hacking Bookshttp://www.kalitut.com/2016/12/best-ethical-hacking-books.html
Top Reverse Engineering Bookshttp://www.kalitut.com/2017/01/Best-reverse-engineering-books.html
Top Machine learning Bookshttp://www.kalitut.com/2017/01/machine-learning-book.html
Top 5 books Programming Bookshttp://www.kalitut.com/2017/01/Top-Programming-Books.html
Top Java Bookshttp://www.kalitut.com/2017/01/Best-Java-Programming-Books.html
Readme https://github.com/Luci-d/Penetration-Testing#readme-ov-file
Please reload this pagehttps://github.com/Luci-d/Penetration-Testing
Activityhttps://github.com/Luci-d/Penetration-Testing/activity
2 starshttps://github.com/Luci-d/Penetration-Testing/stargazers
0 watchinghttps://github.com/Luci-d/Penetration-Testing/watchers
0 forkshttps://github.com/Luci-d/Penetration-Testing/forks
Report repository https://github.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing&report=Luci-d+%28user%29
Releaseshttps://github.com/Luci-d/Penetration-Testing/releases
Packages 0https://github.com/users/Luci-d/packages?repo_name=Penetration-Testing
https://github.com
Termshttps://docs.github.com/site-policy/github-terms/github-terms-of-service
Privacyhttps://docs.github.com/site-policy/privacy-policies/github-privacy-statement
Securityhttps://github.com/security
Statushttps://www.githubstatus.com/
Communityhttps://github.community/
Docshttps://docs.github.com/
Contacthttps://support.github.com?tags=dotcom-footer

Viewport: width=device-width


URLs of crawlers that visited me.