Penetration Testing

18 bookmarks
Custom sorting
Cure53
Cure53
Fine penetration tests for fine websites
·cure53.de·
Cure53
Frida
Frida
A world-class dynamic instrumentation toolkit. Observe and reprogram running programs on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX.
·frida.re·
Frida
HackTheBox
HackTheBox
The #1 cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.
·hackthebox.com·
HackTheBox
PortSwigger
PortSwigger
PortSwigger offers tools for web application security, testing, & scanning. Choose from a range of security tools, & identify the very latest vulnerabilities.
·portswigger.net·
PortSwigger
PentesterLab
PentesterLab
Learn Web Penetration Testing The Right Way. Agreat resource for learning about web application security and ways how it can be subverted.
·pentesterlab.com·
PentesterLab
Kali Linux
Kali Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
·kali.org·
Kali Linux
O.MG
O.MG
Handmade USB cables with an advance WiFi implant inside. Designed to allow Red Teams to emulate sophisticated attack scenarios previously only capable with $20,000 cables.
·o.mg.lol·
O.MG
WPScan
WPScan
A WordPress vulnerability database for WordPress core security vulnerabilities, plugin vulnerabilities and theme vulnerabilities.
·wpscan.com·
WPScan
Flipper Zero
Flipper Zero
Portable Multi-tool Device for Geeks. Based on ultra low power STM32 MCU for daily exploration of access control systems and radio protocols. Open source and customizable
·flipperzero.one·
Flipper Zero
Assetnote Wordlists
Assetnote Wordlists
Wordlists that are up to date and effective against the most popular technologies on the internet.
·wordlists.assetnote.io·
Assetnote Wordlists
LOLBAS
LOLBAS
A curated list of Windows binaries that can used to bypass local security restrictions in misconfigured systems.
·lolbas-project.github.io·
LOLBAS
GTFOBins
GTFOBins
A curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.
·gtfobins.github.io·
GTFOBins
SmashTheStack
SmashTheStack
The Smash the Stack Wargaming Network is an ethical hacking environment that simulates real-world software vulnerabilities using challenges, which we call wargames.
·smashthestack.org·
SmashTheStack
Exploit Database
Exploit Database
Exploits for Penetration Testers, Researchers, and Ethical Hackers
·exploit-db.com·
Exploit Database
The Big List of Naughty Strings
The Big List of Naughty Strings
An evolving list of strings which have a high probability of causing issues when used as user-input data. This is intended for use in helping both automated and manual QA testing;
·github.com·
The Big List of Naughty Strings
Metasploit
Metasploit
The world's best penetration testing software. Metasploit helps security teams do more than just verify vulnerabilities, manage security assessments, and improve security awareness;
·metasploit.com·
Metasploit
CyberChef
CyberChef
The Cyber Swiss Army Knife. A web app for carrying out all manner of "cyber" operations within a web browser: encryption, encoding, compression & data analysis.
·gchq.github.io·
CyberChef
Pwnagotchi
Pwnagotchi
Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.
·pwnagotchi.ai·
Pwnagotchi