| route-pattern | /:user_id/:repository |
| route-controller | files |
| route-action | disambiguate |
| fetch-nonce | v2:77e9c790-9342-addd-d60a-9ce47c0e8905 |
| current-catalog-service-hash | f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb |
| request-id | ECEE:147CA2:2FD9068:4068C3A:69930152 |
| html-safe-nonce | 6fb8a1a409ebb316f59ab04457a605a1753edf85bbcd42e0283ce2ba762ff624 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJFQ0VFOjE0N0NBMjoyRkQ5MDY4OjQwNjhDM0E6Njk5MzAxNTIiLCJ2aXNpdG9yX2lkIjoiNTI5MjUyNzQ5MTU0NTc2MDA4MiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 0bfe1634b09e0ebcf1dbd268997e439c2336158cd300897afc37d9fb8cb6b248 |
| hovercard-subject-tag | repository:223941849 |
| github-keyboard-shortcuts | repository,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | // |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/Luci-d/Penetration-Testing |
| twitter:image | https://opengraph.githubassets.com/a878e2bb021b1bd6d0308fd55f29032e867be89c627ac839fb0654bd3492f093/Luci-d/Penetration-Testing |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/a878e2bb021b1bd6d0308fd55f29032e867be89c627ac839fb0654bd3492f093/Luci-d/Penetration-Testing |
| og:image:alt | List of awesome penetration testing resources, tools and other shiny things - Luci-d/Penetration-Testing |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | 348cc0594c4976eb4050dc9547ecf65057ee89a2b7ed0652b983b9b539f57145 |
| turbo-cache-control | no-preview |
| go-import | github.com/Luci-d/Penetration-Testing git https://github.com/Luci-d/Penetration-Testing.git |
| octolytics-dimension-user_id | 55981308 |
| octolytics-dimension-user_login | Luci-d |
| octolytics-dimension-repository_id | 223941849 |
| octolytics-dimension-repository_nwo | Luci-d/Penetration-Testing |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 79034887 |
| octolytics-dimension-repository_parent_nwo | wtsxDev/Penetration-Testing |
| octolytics-dimension-repository_network_root_id | 79034887 |
| octolytics-dimension-repository_network_root_nwo | wtsxDev/Penetration-Testing |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 91a0a74305bca931ec621f52a6782246d341466f |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
| Skip to content | https://github.com/Luci-d/Penetration-Testing#start-of-content |
|
| https://github.com/ |
|
Sign in
| https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing |
| GitHub CopilotWrite better code with AI | https://github.com/features/copilot |
| GitHub SparkBuild and deploy intelligent apps | https://github.com/features/spark |
| GitHub ModelsManage and compare prompts | https://github.com/features/models |
| MCP RegistryNewIntegrate external tools | https://github.com/mcp |
| ActionsAutomate any workflow | https://github.com/features/actions |
| CodespacesInstant dev environments | https://github.com/features/codespaces |
| IssuesPlan and track work | https://github.com/features/issues |
| Code ReviewManage code changes | https://github.com/features/code-review |
| GitHub Advanced SecurityFind and fix vulnerabilities | https://github.com/security/advanced-security |
| Code securitySecure your code as you build | https://github.com/security/advanced-security/code-security |
| Secret protectionStop leaks before they start | https://github.com/security/advanced-security/secret-protection |
| Why GitHub | https://github.com/why-github |
| Documentation | https://docs.github.com |
| Blog | https://github.blog |
| Changelog | https://github.blog/changelog |
| Marketplace | https://github.com/marketplace |
| View all features | https://github.com/features |
| Enterprises | https://github.com/enterprise |
| Small and medium teams | https://github.com/team |
| Startups | https://github.com/enterprise/startups |
| Nonprofits | https://github.com/solutions/industry/nonprofits |
| App Modernization | https://github.com/solutions/use-case/app-modernization |
| DevSecOps | https://github.com/solutions/use-case/devsecops |
| DevOps | https://github.com/solutions/use-case/devops |
| CI/CD | https://github.com/solutions/use-case/ci-cd |
| View all use cases | https://github.com/solutions/use-case |
| Healthcare | https://github.com/solutions/industry/healthcare |
| Financial services | https://github.com/solutions/industry/financial-services |
| Manufacturing | https://github.com/solutions/industry/manufacturing |
| Government | https://github.com/solutions/industry/government |
| View all industries | https://github.com/solutions/industry |
| View all solutions | https://github.com/solutions |
| AI | https://github.com/resources/articles?topic=ai |
| Software Development | https://github.com/resources/articles?topic=software-development |
| DevOps | https://github.com/resources/articles?topic=devops |
| Security | https://github.com/resources/articles?topic=security |
| View all topics | https://github.com/resources/articles |
| Customer stories | https://github.com/customer-stories |
| Events & webinars | https://github.com/resources/events |
| Ebooks & reports | https://github.com/resources/whitepapers |
| Business insights | https://github.com/solutions/executive-insights |
| GitHub Skills | https://skills.github.com |
| Documentation | https://docs.github.com |
| Customer support | https://support.github.com |
| Community forum | https://github.com/orgs/community/discussions |
| Trust center | https://github.com/trust-center |
| Partners | https://github.com/partners |
| GitHub SponsorsFund open source developers | https://github.com/sponsors |
| Security Lab | https://securitylab.github.com |
| Maintainer Community | https://maintainers.github.com |
| Accelerator | https://github.com/accelerator |
| Archive Program | https://archiveprogram.github.com |
| Topics | https://github.com/topics |
| Trending | https://github.com/trending |
| Collections | https://github.com/collections |
| Enterprise platformAI-powered developer platform | https://github.com/enterprise |
| GitHub Advanced SecurityEnterprise-grade security features | https://github.com/security/advanced-security |
| Copilot for BusinessEnterprise-grade AI features | https://github.com/features/copilot/copilot-business |
| Premium SupportEnterprise-grade 24/7 support | https://github.com/premium-support |
| Pricing | https://github.com/pricing |
| Search syntax tips | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
| documentation | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
|
Sign in
| https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing |
|
Sign up
| https://github.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=Luci-d%2FPenetration-Testing |
| Reload | https://github.com/Luci-d/Penetration-Testing |
| Reload | https://github.com/Luci-d/Penetration-Testing |
| Reload | https://github.com/Luci-d/Penetration-Testing |
|
Luci-d
| https://github.com/Luci-d |
| Penetration-Testing | https://github.com/Luci-d/Penetration-Testing |
| wtsxDev/Penetration-Testing | https://github.com/wtsxDev/Penetration-Testing |
|
Notifications
| https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing |
|
Fork
0
| https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing |
|
Star
2
| https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing |
|
2
stars
| https://github.com/Luci-d/Penetration-Testing/stargazers |
|
718
forks
| https://github.com/Luci-d/Penetration-Testing/forks |
|
Branches
| https://github.com/Luci-d/Penetration-Testing/branches |
|
Tags
| https://github.com/Luci-d/Penetration-Testing/tags |
|
Activity
| https://github.com/Luci-d/Penetration-Testing/activity |
|
Star
| https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing |
|
Notifications
| https://github.com/login?return_to=%2FLuci-d%2FPenetration-Testing |
|
Code
| https://github.com/Luci-d/Penetration-Testing |
|
Pull requests
0
| https://github.com/Luci-d/Penetration-Testing/pulls |
|
Actions
| https://github.com/Luci-d/Penetration-Testing/actions |
|
Projects
0
| https://github.com/Luci-d/Penetration-Testing/projects |
|
Security
0
| https://github.com/Luci-d/Penetration-Testing/security |
|
Insights
| https://github.com/Luci-d/Penetration-Testing/pulse |
|
Code
| https://github.com/Luci-d/Penetration-Testing |
|
Pull requests
| https://github.com/Luci-d/Penetration-Testing/pulls |
|
Actions
| https://github.com/Luci-d/Penetration-Testing/actions |
|
Projects
| https://github.com/Luci-d/Penetration-Testing/projects |
|
Security
| https://github.com/Luci-d/Penetration-Testing/security |
|
Insights
| https://github.com/Luci-d/Penetration-Testing/pulse |
| Branches | https://github.com/Luci-d/Penetration-Testing/branches |
| Tags | https://github.com/Luci-d/Penetration-Testing/tags |
| https://github.com/Luci-d/Penetration-Testing/branches |
| https://github.com/Luci-d/Penetration-Testing/tags |
| 7 Commits | https://github.com/Luci-d/Penetration-Testing/commits/master/ |
| https://github.com/Luci-d/Penetration-Testing/commits/master/ |
| README.md | https://github.com/Luci-d/Penetration-Testing/blob/master/README.md |
| README.md | https://github.com/Luci-d/Penetration-Testing/blob/master/README.md |
| README | https://github.com/Luci-d/Penetration-Testing |
| http://kalitut.com |
| https://github.com/Luci-d/Penetration-Testing#awesome-penetration-testing- |
| http://www.youtube.com/watch?v=V3CTfJ2ZP7M |
| Online Resources | https://github.com/Luci-d/Penetration-Testing#online-resources |
| Penetration Testing Resources | https://github.com/Luci-d/Penetration-Testing#penetration-testing-resources |
| Exploit development | https://github.com/Luci-d/Penetration-Testing#exploit-development |
| Social Engineering Resources | https://github.com/Luci-d/Penetration-Testing#social-engineering-resources |
| Lock Picking Resources | https://github.com/Luci-d/Penetration-Testing#lock-picking-resources |
| Tools | https://github.com/Luci-d/Penetration-Testing#tools |
| Penetration Testing Distributions | https://github.com/Luci-d/Penetration-Testing#penetration-testing-distributions |
| Basic Penetration Testing Tools | https://github.com/Luci-d/Penetration-Testing#basic-penetration-testing-tools |
| Docker for Penetration Testing | https://github.com/Luci-d/Penetration-Testing#docker-for-penetration-testing |
| Vulnerability Scanners | https://github.com/Luci-d/Penetration-Testing#vulnerability-scanners |
| Network Tools | https://github.com/Luci-d/Penetration-Testing#network-tools |
| Wireless Network Tools | https://github.com/Luci-d/Penetration-Testing#wireless-network-tools |
| SSL Analysis Tools | https://github.com/Luci-d/Penetration-Testing#ssl-analysis-tools |
| Web exploitation | https://github.com/Luci-d/Penetration-Testing#web-exploitation |
| Hex Editors | https://github.com/Luci-d/Penetration-Testing#hex-editors |
| Crackers | https://github.com/Luci-d/Penetration-Testing#crackers |
| Windows Utils | https://github.com/Luci-d/Penetration-Testing#windows-utils |
| Linux Utils | https://github.com/Luci-d/Penetration-Testing#linux-utils |
| DDoS Tools | https://github.com/Luci-d/Penetration-Testing#ddos-tools |
| Social Engineering Tools | https://github.com/Luci-d/Penetration-Testing#social-engineering-tools |
| OSInt Tools | https://github.com/Luci-d/Penetration-Testing#osint-tools |
| Anonymity Tools | https://github.com/Luci-d/Penetration-Testing#anonymity-tools |
| Reverse Engineering Tools | https://github.com/Luci-d/Penetration-Testing#reverse-engineering-tools |
| CTF Tools | https://github.com/Luci-d/Penetration-Testing#ctf-tools |
| Books | https://github.com/Luci-d/Penetration-Testing#books |
| Penetration Testing Books | https://github.com/Luci-d/Penetration-Testing#penetration-testing-books |
| Hackers Handbook Series | https://github.com/Luci-d/Penetration-Testing#hackers-handbook-series |
| Defensive Development | https://github.com/Luci-d/Penetration-Testing#defensive-development |
| Network Analysis Books | https://github.com/Luci-d/Penetration-Testing#network-analysis-books |
| Reverse Engineering Books | https://github.com/Luci-d/Penetration-Testing#reverse-engineering-books |
| Malware Analysis Books | https://github.com/Luci-d/Penetration-Testing#malware-analysis-books |
| Windows Books | https://github.com/Luci-d/Penetration-Testing#windows-books |
| Social Engineering Books | https://github.com/Luci-d/Penetration-Testing#social-engineering-books |
| Lock Picking Books | https://github.com/Luci-d/Penetration-Testing#lock-picking-books |
| Vulnerability Databases | https://github.com/Luci-d/Penetration-Testing#vulnerability-databases |
| Security Courses | https://github.com/Luci-d/Penetration-Testing#security-courses |
| Information Security Conferences | https://github.com/Luci-d/Penetration-Testing#information-security-conferences |
| Information Security Magazines | https://github.com/Luci-d/Penetration-Testing#information-security-magazines |
| https://github.com/Luci-d/Penetration-Testing#online-resources |
| https://github.com/Luci-d/Penetration-Testing#penetration-testing-resources |
| Metasploit Unleashed | https://www.offensive-security.com/metasploit-unleashed/ |
| PTES | http://www.pentest-standard.org/ |
| OWASP | https://www.owasp.org/index.php/Main_Page |
| PENTEST-WIKI | https://github.com/nixawk/pentest-wiki |
| Vulnerability Assessment Framework | http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html |
| The Pentesters Framework | https://github.com/trustedsec/ptf |
| https://github.com/Luci-d/Penetration-Testing#exploit-development |
| Shellcode Tutorial | http://www.vividmachines.com/shellcode/shellcode.html |
| Shellcode Examples | http://shell-storm.org/shellcode/ |
| Exploit Writing Tutorials | https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ |
| shellsploit | https://github.com/b3mb4m/shellsploit-framework |
| Voltron | https://github.com/snare/voltron |
| https://github.com/Luci-d/Penetration-Testing#social-engineering-resources |
| Social Engineering Framework | http://www.social-engineer.org/framework/general-discussion/ |
| https://github.com/Luci-d/Penetration-Testing#lock-picking-resources |
| Schuyler Towne channel | https://www.youtube.com/user/SchuylerTowne/ |
| /r/lockpicking | https://www.reddit.com/r/lockpicking |
| https://github.com/Luci-d/Penetration-Testing#tools |
| https://github.com/Luci-d/Penetration-Testing#penetration-testing-distributions |
| Kali | https://www.kali.org/ |
| ArchStrike | https://archstrike.org/ |
| BlackArch | https://www.blackarch.org/ |
| NST | http://networksecuritytoolkit.org/ |
| Pentoo | http://www.pentoo.ch/ |
| BackBox | https://backbox.org/ |
| Parrot | https://www.parrotsec.org/ |
| Fedora Security Lab | https://labs.fedoraproject.org/en/security/ |
| https://github.com/Luci-d/Penetration-Testing#basic-penetration-testing-tools |
| Metasploit Framework | https://www.metasploit.com/ |
| Burp Suite | https://portswigger.net/burp/ |
| ExploitPack | http://exploitpack.com/ |
| BeeF | https://github.com/beefproject/beef |
| faraday | https://github.com/infobyte/faraday |
| evilgrade | https://github.com/infobyte/evilgrade |
| commix | https://github.com/stasinopoulos/commix |
| routersploit | https://github.com/reverse-shell/routersploit |
| https://github.com/nccgroup/redsnarf | https://github.com/nccgroup/redsnarf |
| https://github.com/Luci-d/Penetration-Testing#docker-for-penetration-testing |
| official Kali Linux | https://hub.docker.com/r/kalilinux/kali-linux-docker/ |
| official OWASP ZAP | https://github.com/zaproxy/zaproxy |
| official WPScan | https://hub.docker.com/r/wpscanteam/wpscan/ |
| docker-metasploit | https://hub.docker.com/r/pandrew/metasploit/ |
| Damn Vulnerable Web Application (DVWA) | https://hub.docker.com/r/citizenstig/dvwa/ |
| Vulnerable WordPress Installation | https://hub.docker.com/r/wpscanteam/vulnerablewordpress/ |
| Vulnerability as a service: Shellshock | https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/ |
| Vulnerability as a service: Heartbleed | https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/ |
| Security Ninjas | https://hub.docker.com/r/opendns/security-ninjas/ |
| Docker Bench for Security | https://hub.docker.com/r/diogomonica/docker-bench-security/ |
| OWASP Security Shepherd | https://hub.docker.com/r/ismisepaul/securityshepherd/ |
| OWASP WebGoat Project docker image | https://hub.docker.com/r/danmx/docker-owasp-webgoat/ |
| OWASP NodeGoat | https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker |
| OWASP Mutillidae II Web Pen-Test Practice Application | https://hub.docker.com/r/citizenstig/nowasp/ |
| OWASP Juice Shop | https://github.com/bkimminich/juice-shop#docker-container-- |
| https://github.com/Luci-d/Penetration-Testing#vulnerability-scanners |
| Nexpose | https://www.rapid7.com/products/nexpose/ |
| Nessus | http://www.tenable.com/products/nessus-vulnerability-scanner |
| Nikto | https://cirt.net/nikto2 |
| OpenVAS | http://www.openvas.org/ |
| OWASP Zed Attack Proxy | https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project |
| Secapps | https://secapps.com/ |
| w3af | https://github.com/andresriancho/w3af |
| Wapiti | http://wapiti.sourceforge.net/ |
| WebReaver | http://www.webreaver.com/ |
| DVCS Ripper | https://github.com/kost/dvcs-ripper |
| arachni | https://github.com/Arachni/arachni |
| https://github.com/Luci-d/Penetration-Testing#network-tools |
| nmap | https://nmap.org/ |
| pig | https://github.com/rafael-santiago/pig |
| tcpdump/libpcap | http://www.tcpdump.org/ |
| Wireshark | https://www.wireshark.org/ |
| Network Tools | http://network-tools.com/ |
| netsniff-ng | https://github.com/netsniff-ng/netsniff-ng |
| Intercepter-NG | http://sniff.su/ |
| SPARTA | http://sparta.secforce.com/ |
| dnschef | http://thesprawl.org/projects/dnschef/ |
| DNSDumpster | https://dnsdumpster.com/ |
| dnsenum | https://github.com/fwaeytens/dnsenum/ |
| dnsmap | https://github.com/makefu/dnsmap/ |
| dnsrecon | https://github.com/darkoperator/dnsrecon/ |
| dnstracer | http://www.mavetju.org/unix/dnstracer.php |
| passivedns-client | https://github.com/chrislee35/passivedns-client |
| passivedns | https://github.com/gamelinux/passivedns |
| Mass Scan | https://github.com/robertdavidgraham/masscan |
| Zarp | https://github.com/hatRiot/zarp |
| mitmproxy | https://github.com/mitmproxy/mitmproxy |
| mallory | https://github.com/justmao945/mallory |
| Netzob | https://github.com/netzob/netzob |
| DET | https://github.com/sensepost/DET |
| pwnat | https://github.com/samyk/pwnat |
| dsniff | https://www.monkey.org/~dugsong/dsniff/ |
| tgcd | http://tgcd.sourceforge.net/ |
| smbmap | https://github.com/ShawnDEvans/smbmap |
| scapy | https://github.com/secdev/scapy |
| Dshell | https://github.com/USArmyResearchLab/Dshell |
| Debookee (MAC OS X) | http://www.iwaxx.com/debookee/ |
| Dripcap | https://github.com/dripcap/dripcap |
| https://github.com/Luci-d/Penetration-Testing#wireless-network-tools |
| Aircrack-ng | http://www.aircrack-ng.org/ |
| Kismet | https://kismetwireless.net/ |
| Reaver | https://code.google.com/archive/p/reaver-wps |
| Wifite | https://github.com/derv82/wifite |
| wifiphisher | https://github.com/sophron/wifiphisher |
| https://github.com/Luci-d/Penetration-Testing#ssl-analysis-tools |
| SSLyze | https://github.com/nabla-c0d3/sslyze |
| sslstrip | https://www.thoughtcrime.org/software/sslstrip/ |
| sslstrip2 | https://github.com/LeonardoNve/sslstrip2 |
| tls_prober | https://github.com/WestpointLtd/tls_prober |
| https://github.com/Luci-d/Penetration-Testing#web-exploitation |
| WPScan | https://wpscan.org/ |
| SQLmap | http://sqlmap.org/ |
| weevely3 | https://github.com/epinna/weevely3 |
| Wappalyzer | https://wappalyzer.com/ |
| cms-explorer | https://code.google.com/archive/p/cms-explorer/ |
| joomscan | https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project |
| WhatWeb | https://github.com/urbanadventurer/WhatWeb |
| BlindElephant | http://blindelephant.sourceforge.net/ |
| fimap | https://github.com/kurobeats/fimap |
| Kadabra | https://github.com/D35m0nd142/Kadabra |
| Kadimus | https://github.com/P0cL4bs/Kadimus |
| liffy | https://github.com/hvqzao/liffy |
| https://github.com/Luci-d/Penetration-Testing#hex-editors |
| HexEdit.js | https://hexed.it |
| Hexinator | https://hexinator.com/ |
| HxD - Freeware Hex Editor and Disk Editor | https://mh-nexus.de/en/hxd/ |
| https://github.com/Luci-d/Penetration-Testing#crackers |
| John the Ripper | http://www.openwall.com/john/ |
| Online MD5 cracker | http://www.md5crack.com/ |
| Hashcat | http://hashcat.net/hashcat/ |
| THC Hydra | http://sectools.org/tool/hydra/ |
| https://github.com/Luci-d/Penetration-Testing#windows-utils |
| Sysinternals Suite | https://technet.microsoft.com/en-us/sysinternals/bb842062 |
| Windows Credentials Editor | http://www.ampliasecurity.com/research/windows-credentials-editor/ |
| mimikatz | http://blog.gentilkiwi.com/mimikatz |
| PowerSploit | https://github.com/PowerShellMafia/PowerSploit |
| Windows Exploit Suggester | https://github.com/GDSSecurity/Windows-Exploit-Suggester |
| Responder | https://github.com/SpiderLabs/Responder |
| Bloodhound | https://github.com/adaptivethreat/Bloodhound/wiki |
| Empire | https://github.com/PowerShellEmpire/Empire |
| Fibratus | https://github.com/rabbitstack/fibratus |
| https://github.com/Luci-d/Penetration-Testing#linux-utils |
| Linux Exploit Suggester | https://github.com/PenturaLabs/Linux_Exploit_Suggester |
| https://github.com/Luci-d/Penetration-Testing#ddos-tools |
| LOIC | https://github.com/NewEraCracker/LOIC/ |
| JS LOIC | http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html |
| T50 | https://sourceforge.net/projects/t50/ |
| https://github.com/Luci-d/Penetration-Testing#social-engineering-tools |
| SET | https://github.com/trustedsec/social-engineer-toolkit |
| https://github.com/Luci-d/Penetration-Testing#osint-tools |
| Maltego | http://www.paterva.com/web7/ |
| theHarvester | https://github.com/laramies/theHarvester |
| creepy | https://github.com/ilektrojohn/creepy |
| metagoofil | https://github.com/laramies/metagoofil |
| Google Hacking Database | https://www.exploit-db.com/google-hacking-database/ |
| Censys | https://www.censys.io/ |
| Shodan | https://www.shodan.io/ |
| recon-ng | https://bitbucket.org/LaNMaSteR53/recon-ng |
| github-dorks | https://github.com/techgaun/github-dorks |
| vcsmap | https://github.com/melvinsh/vcsmap |
| Spiderfoot | http://www.spiderfoot.net/ |
| https://github.com/Luci-d/Penetration-Testing#anonymity-tools |
| Tor | https://www.torproject.org/ |
| I2P | https://geti2p.net/en/ |
| Nipe | https://github.com/GouveaHeitor/nipe |
| https://github.com/Luci-d/Penetration-Testing#reverse-engineering-tools |
| IDA Pro | https://www.hex-rays.com/products/ida/ |
| IDA Free | https://www.hex-rays.com/products/ida/support/download_freeware.shtml |
| WDK/WinDbg | https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx |
| OllyDbg | http://www.ollydbg.de/ |
| Radare2 | http://rada.re/r/index.html |
| x64_dbg | http://x64dbg.com/ |
| Immunity Debugger | http://debugger.immunityinc.com/ |
| Evan's Debugger | http://www.codef00.com/projects#debugger |
| Medusa disassembler | https://github.com/wisk/medusa |
| plasma | https://github.com/joelpx/plasma |
| peda | https://github.com/longld/peda |
| dnSpy | https://github.com/0xd4d/dnSpy |
| https://github.com/Luci-d/Penetration-Testing#ctf-tools |
| Pwntools | https://github.com/Gallopsled/pwntools |
| https://github.com/Luci-d/Penetration-Testing#books |
| https://github.com/Luci-d/Penetration-Testing#penetration-testing-books |
| The Art of Exploitation by Jon Erickson, 2008 | http://amzn.to/2iqhK9S |
| Metasploit: The Penetration Tester's Guide by David Kennedy et al., 2011 | http://amzn.to/2jl5pUd |
| Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014 | http://amzn.to/2jMfK8i |
| Rtfm: Red Team Field Manual by Ben Clark, 2014 | http://amzn.to/2iz9K4Y |
| The Hacker Playbook 2: Practical Guide To Penetration Testing | http://amzn.to/2jMdNbU |
| The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013 | http://amzn.to/2jMgMkj |
| Professional Penetration Testing by Thomas Wilhelm, 2013 | http://amzn.to/2jMq9AI |
| Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012 | http://amzn.to/2jl6GKU |
| Violent Python by TJ O'Connor, 2012 | http://amzn.to/2jMbTYy |
| Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007 | http://amzn.to/2izbgDS |
| Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014 | http://amzn.to/2jl5FCk |
| Penetration Testing: Procedures & Methodologies by EC-Council, 2010 | http://amzn.to/2izaBmc |
| Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010 | http://amzn.to/2izcwqI |
| Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014 | http://amzn.to/2iqoyEj |
| Bug Hunter's Diary by Tobias Klein, 2011 | http://amzn.to/2jkYHO2 |
| https://github.com/Luci-d/Penetration-Testing#hackers-handbook-series |
| The Database Hacker's Handbook, David Litchfield et al., 2005 | http://amzn.to/2jlcqEB |
| The Shellcoders Handbook by Chris Anley et al., 2007 | http://amzn.to/2iudxwQ |
| The Mac Hacker's Handbook by Charlie Miller & Dino Dai Zovi, 2009 | http://amzn.to/2jSUpxO |
| The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011 | http://amzn.to/2jl0rGQ |
| iOS Hackers Handbook by Charlie Miller et al., 2012 | http://amzn.to/2jMpWO4 |
| Android Hackers Handbook by Joshua J. Drake et al., 2014 | http://amzn.to/2jmN5tg |
| The Browser Hackers Handbook by Wade Alcorn et al., 2014 | http://amzn.to/2jl9asy |
| The Mobile Application Hackers Handbook by Dominic Chell et al., 2015 | http://amzn.to/2jMmtz1 |
| Car Hacker's Handbook by Craig Smith, 2016 | http://amzn.to/2jldxnL |
| https://github.com/Luci-d/Penetration-Testing#defensive-development |
| Holistic Info-Sec for Web Developers (Fascicle 0) | http://amzn.to/2jmRqwB |
| Holistic Info-Sec for Web Developers (Fascicle 1) | https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications |
| https://github.com/Luci-d/Penetration-Testing#network-analysis-books |
| Nmap Network Scanning by Gordon Fyodor Lyon, 2009 | http://amzn.to/2izkmAN |
| Practical Packet Analysis by Chris Sanders, 2011 | http://amzn.to/2jn091H |
| Wireshark Network Analysis by by Laura Chappell & Gerald Combs, 2012 | http://amzn.to/2jn4DFU |
| Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff & Jonathan Ham, 2012 | http://amzn.to/2izaCXe |
| https://github.com/Luci-d/Penetration-Testing#reverse-engineering-books |
| Reverse Engineering for Beginners by Dennis Yurichev | http://beginners.re/ |
| Hacking the Xbox by Andrew Huang, 2003 | http://amzn.to/2iudEbO |
| The IDA Pro Book by Chris Eagle, 2011 | http://amzn.to/2itYfbI |
| Practical Reverse Engineering by Bruce Dang et al., 2014 | http://amzn.to/2jMnAyD |
| Gray Hat Hacking The Ethical Hacker's Handbook by Daniel Regalado et al., 2015 | http://amzn.to/2iua6q7 |
| https://github.com/Luci-d/Penetration-Testing#malware-analysis-books |
| Practical Malware Analysis by Michael Sikorski & Andrew Honig, 2012 | http://amzn.to/2izon8f |
| The Art of Memory Forensics by Michael Hale Ligh et al., 2014 | http://amzn.to/2iuh1j8 |
| Malware Analyst's Cookbook and DVD by Michael Hale Ligh et al., 2010 | http://amzn.to/2jnag6W |
| https://github.com/Luci-d/Penetration-Testing#windows-books |
| Windows Internals by Mark Russinovich et al., 2012 | http://amzn.to/2jl4zGJ |
| https://github.com/Luci-d/Penetration-Testing#social-engineering-books |
| The Art of Deception by Kevin D. Mitnick & William L. Simon, 2002 | http://amzn.to/2jMhgXQ |
| The Art of Intrusion by Kevin D. Mitnick & William L. Simon, 2005 | http://amzn.to/2jl287p |
| Ghost in the Wires by Kevin D. Mitnick & William L. Simon, 2011 | http://amzn.to/2izbuuV |
| No Tech Hacking by Johnny Long & Jack Wiles, 2008 | http://amzn.to/2iudb9G |
| Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010 | http://amzn.to/2iu62WZ |
| Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014 | http://amzn.to/2izf4W5 |
| Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014 | http://amzn.to/2izlww9 |
| https://github.com/Luci-d/Penetration-Testing#lock-picking-books |
| Practical Lock Picking by Deviant Ollam, 2012 | http://amzn.to/2jmQeJy |
| Keys to the Kingdom by Deviant Ollam, 2012 | http://amzn.to/2izcvDg |
| CIA Lock Picking Field Operative Training Manual | http://amzn.to/2jMrw2c |
| Lock Picking: Detail Overkill by Solomon | https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0 |
| Eddie the Wire books | https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0 |
| https://github.com/Luci-d/Penetration-Testing#vulnerability-databases |
| NVD | https://nvd.nist.gov/ |
| CERT | https://www.us-cert.gov/ |
| OSVDB | https://blog.osvdb.org/ |
| Bugtraq | http://www.securityfocus.com/ |
| Exploit-DB | https://www.exploit-db.com/ |
| Fulldisclosure | http://seclists.org/fulldisclosure/ |
| MS Bulletin | https://technet.microsoft.com/en-us/security/bulletins |
| MS Advisory | https://technet.microsoft.com/en-us/security/advisories |
| Inj3ct0r | http://www.1337day.com/ |
| Packet Storm | https://packetstormsecurity.com/ |
| SecuriTeam | http://www.securiteam.com/ |
| CXSecurity | http://cxsecurity.com/ |
| Vulnerability Laboratory | http://www.vulnerability-lab.com/ |
| ZDI | http://www.zerodayinitiative.com/ |
| Vulners | https://vulners.com |
| https://github.com/Luci-d/Penetration-Testing#security-courses |
| Offensive Security Training | https://www.offensive-security.com/information-security-training/ |
| SANS Security Training | http://www.sans.org/ |
| Open Security Training | http://opensecuritytraining.info/ |
| CTF Field Guide | https://trailofbits.github.io/ctf/ |
| ARIZONA CYBER WARFARE RANGE | http://azcwr.org/ |
| Cybrary | http://cybrary.it |
| Computer Security Student | http://computersecuritystudent.com |
| European Union Agency for Network and Information Security | https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material |
| https://github.com/Luci-d/Penetration-Testing#information-security-conferences |
| DEF CON | https://www.defcon.org/ |
| Black Hat | http://www.blackhat.com/ |
| BSides | http://www.securitybsides.com/ |
| CCC | https://events.ccc.de/congress/ |
| DerbyCon | https://www.derbycon.com/ |
| PhreakNIC | http://phreaknic.info/ |
| ShmooCon | http://shmoocon.org/ |
| CarolinaCon | http://www.carolinacon.org/ |
| CHCon | https://chcon.nz |
| SummerCon | http://www.summercon.org/ |
| Hack.lu | https://2016.hack.lu/ |
| HITB | https://conference.hitb.org/ |
| Troopers | https://www.troopers.de |
| Hack3rCon | http://hack3rcon.org/ |
| ThotCon | http://thotcon.org/ |
| LayerOne | http://www.layerone.org/ |
| DeepSec | https://deepsec.net/ |
| SkyDogCon | http://www.skydogcon.com/ |
| SECUINSIDE | http://secuinside.com |
| Seoul | https://en.wikipedia.org/wiki/Seoul |
| DefCamp | http://def.camp/ |
| AppSecUSA | https://appsecusa.org/ |
| BruCON | http://brucon.org |
| Infosecurity Europe | http://www.infosecurityeurope.com/ |
| Nullcon | http://nullcon.net/website/ |
| RSA Conference USA | https://www.rsaconference.com/ |
| Swiss Cyber Storm | https://www.swisscyberstorm.com/ |
| Virus Bulletin Conference | https://www.virusbulletin.com/conference/index |
| Ekoparty | http://www.ekoparty.org |
| 44Con | https://44con.com/ |
| BalCCon | https://www.balccon.org |
| FSec | http://fsec.foi.hr |
| https://github.com/Luci-d/Penetration-Testing#information-security-magazines |
| 2600: The Hacker Quarterly | https://www.2600.com/Magazine/DigitalEditions |
| Phrack Magazine | http://www.phrack.org/ |
| Top Hacking Books | http://www.kalitut.com/2016/12/best-ethical-hacking-books.html |
| Top Reverse Engineering Books | http://www.kalitut.com/2017/01/Best-reverse-engineering-books.html |
| Top Machine learning Books | http://www.kalitut.com/2017/01/machine-learning-book.html |
| Top 5 books Programming Books | http://www.kalitut.com/2017/01/Top-Programming-Books.html |
| Top Java Books | http://www.kalitut.com/2017/01/Best-Java-Programming-Books.html |
|
Readme
| https://github.com/Luci-d/Penetration-Testing#readme-ov-file |
| Please reload this page | https://github.com/Luci-d/Penetration-Testing |
|
Activity | https://github.com/Luci-d/Penetration-Testing/activity |
|
2
stars | https://github.com/Luci-d/Penetration-Testing/stargazers |
|
0
watching | https://github.com/Luci-d/Penetration-Testing/watchers |
|
0
forks | https://github.com/Luci-d/Penetration-Testing/forks |
|
Report repository
| https://github.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FLuci-d%2FPenetration-Testing&report=Luci-d+%28user%29 |
| Releases | https://github.com/Luci-d/Penetration-Testing/releases |
| Packages
0 | https://github.com/users/Luci-d/packages?repo_name=Penetration-Testing |
|
| https://github.com |
| Terms | https://docs.github.com/site-policy/github-terms/github-terms-of-service |
| Privacy | https://docs.github.com/site-policy/privacy-policies/github-privacy-statement |
| Security | https://github.com/security |
| Status | https://www.githubstatus.com/ |
| Community | https://github.community/ |
| Docs | https://docs.github.com/ |
| Contact | https://support.github.com?tags=dotcom-footer |