awesome-hacking/README.md
Chad 56ae10b3d8
add a few tools
added findsubdomains, cirt-fuzzer and aslookup
2019-09-05 15:51:24 +00:00

291 lines
18 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Awesome Hacking [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)](https://github.com/sindresorhus/awesome)
A curated list of awesome Hacking. Inspired by [awesome-machine-learning](https://github.com/josephmisiti/awesome-machine-learning/)
If you want to contribute to this list (please do), send me a pull request or contact me [@carpedm20](https://twitter.com/carpedm20)
For a list of free hacking books available for download, go [here](https://github.com/Hack-with-Github/Free-Security-eBooks)
## Table of Contents
<!-- MarkdownTOC depth=4 -->
- [System](#system)
- [Tutorials](#tutorials)
- [Tools](#tools)
- [Docker](#docker-images-for-penetration-testing--security)
- [General](#general)
- [Reverse Engineering](#reverse-engineering)
- [Tutorials](#tutorials-1)
- [Tools](#tools-1)
- [General](#general-1)
- [Web](#web)
- [Tools](#tools-2)
- [General](#general-2)
- [Network](#network)
- [Tools](#tools-3)
- [Forensic](#forensic)
- [Tools](#tools-4)
- [Cryptography](#cryptography)
- [Tools](#tools-5)
- [Wargame](#wargame)
- [System](#system-1)
- [Reverse Engineering](#reverse-engineering-1)
- [Web](#web-1)
- [Cryptography](#cryptography-1)
- [Bug bounty](#bug-bounty)
- [CTF](#ctf)
- [Competition](#competition)
- [General](#general-2)
- [OS](#os)
- [Online resources](#online-resources)
- [Post exploitation](#post-exploitation)
- [tools](#tools-6)
- [ETC](#etc)
<!-- /MarkdownTOC -->
# System
## Tutorials
* [Corelan Team's Exploit writing tutorial](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Exploit Writing Tutorials for Pentesters](http://www.punter-infosec.com/exploit-writing-tutorials-for-pentesters/)
* [Understanding the basics of Linux Binary Exploitation](https://github.com/r0hi7/BinExp)
## Tools
* [Metasploit](https://github.com/rapid7/metasploit-framework) A computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
* [mimikatz](https://github.com/gentilkiwi/mimikatz) - A little tool to play with Windows security
### Docker Images for Penetration Testing & Security
* `docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
* `docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
* `docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
* `docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
* `docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
* `docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
* `docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
* `docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
* `docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
* `docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
* `docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
* `docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
* `docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
* `docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
* `docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
* `docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
## General
* [Exploit database](https://www.exploit-db.com/) - An ultimate archive of exploits and vulnerable software
# Reverse Engineering
## Tutorials
* [Lenas Reversing for Newbies](https://tuts4you.com/download.php?list.17)
* [Malware Analysis Tutorials: a Reverse Engineering Approach](http://fumalwareanalysis.blogspot.kr/p/malware-analysis-tutorials-reverse.html)
## Tools
### Disassemblers and debuggers
* [IDA](https://www.hex-rays.com/products/ida/) - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
* [OllyDbg](http://www.ollydbg.de/) - A 32-bit assembler level analysing debugger for Windows
* [x64dbg](https://github.com/x64dbg/x64dbg) - An open-source x64/x32 debugger for Windows
* [radare2](https://github.com/radare/radare2) - A portable reversing framework
* [plasma](https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
* [ScratchABit](https://github.com/pfalcon/ScratchABit) - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
* [Capstone](https://github.com/aquynh/capstone)
### Decompilers
* JVM-based languages
* [Krakatau](https://github.com/Storyyeller/Krakatau) - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
* [JD-GUI](https://github.com/java-decompiler/jd-gui)
* [procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler)
* [Luyten](https://github.com/deathmarine/Luyten) - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
* [JAD](http://varaneckas.com/jad/) - JAD Java Decompiler (closed-source, unmaintained)
* [JADX](https://github.com/skylot/jadx) - a decompiler for Android apps. Not related to JAD.
* .net-based languages
* [dotPeek](https://www.jetbrains.com/decompiler/) - a free-of-charge .NET decompiler from JetBrains
* [ILSpy](https://github.com/icsharpcode/ILSpy/) - an open-source .NET assembly browser and decompiler
* [dnSpy](https://github.com/0xd4d/dnSpy) - .NET assembly editor, decompiler, and debugger
* native code
* [Hopper](https://www.hopperapp.com) - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.
* [cutter](https://github.com/radareorg/cutter) - a decompiler based on radare2.
* [retdec](https://github.com/avast-tl/retdec)
* [snowman](https://github.com/yegord/snowman)
* [Hex-Rays](https://www.hex-rays.com/products/decompiler/)
### Deobfuscators
* [de4dot](https://github.com/0xd4d/de4dot) - .NET deobfuscator and unpacker.
* [JS Beautifier](https://github.com/beautify-web/js-beautify)
* [JS Nice](http://jsnice.org/) - a web service guessing JS variables names and types based on the model derived from open source.
### Other
* [nudge4j](https://github.com/lorenzoongithub/nudge4j) - Java tool to let the browser talk to the JVM
* [dex2jar](https://github.com/pxb1988/dex2jar) - Tools to work with Android .dex and Java .class files
* [androguard](https://code.google.com/p/androguard/) - Reverse engineering, malware and goodware analysis of Android applications
* [antinet](https://github.com/0xd4d/antinet) - .NET anti-managed debugger and anti-profiler code
* [UPX](http://upx.sourceforge.net/) - the Ultimate Packer (and unpacker) for eXecutables
### Execution logging and tracing
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer
* [tcpdump](http://www.tcpdump.org/) - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
* [Charles Proxy](https://charlesproxy.com) - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
* [usbmon](https://www.kernel.org/doc/Documentation/usb/usbmon.txt) - USB capture for Linux.
* [USBPcap](https://github.com/desowin/usbpcap) - USB capture for Windows.
* [dynStruct](https://github.com/ampotos/dynStruct) - structures recovery via dynamic instrumentation.
* [drltrace](https://github.com/mxmssh/drltrace) - shared library calls tracing.
### Binary files examination and editing
#### Hex editors
* [HxD](http://mh-nexus.de/en/hxd/) - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
* [WinHex](http://www.winhex.com/winhex/) - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
* [wxHexEditor](https://github.com/EUA/wxHexEditor)
* [Synalize It](https://www.synalysis.net/)/[Hexinator](https://hexinator.com/) -
#### Other
* [Binwalk](https://github.com/ReFirmLabs/binwalk) - Detects signatures, unpacks archives, visualizes entropy.
* [Veles](https://github.com/codilime/veles) - a visualizer for statistical properties of blobs.
* [Kaitai Struct](https://github.com/kaitai-io/kaitai_struct) - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
* [Protobuf inspector](https://github.com/jmendeth/protobuf-inspector)
* [DarunGrim](https://github.com/ohjeongwook/DarunGrim) - executable differ.
* [DBeaver](https://github.com/dbeaver/dbeaver) - a DB editor.
* [Dependencies](https://github.com/lucasg/Dependencies) - a FOSS replacement to Dependency Walker.
* [PEview](http://wjradburn.com/software/) - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
* [BinText](https://web.archive.org/web/http://www.mcafee.com/kr/downloads/free-tools/bintext.aspx) - A small, very fast and powerful text extractor that will be of particular interest to programmers.
## General
* [Open Malware](http://www.offensivecomputing.net/)
# Web
## Tools
* [sqlmap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool
* [NoSQLMap](https://github.com/codingo/NoSQLMap) - Automated NoSQL database enumeration and web application exploitation tool.
* [tools.web-max.ca](http://tools.web-max.ca/encode_decode.php) - base64 base85 md4,5 hash, sha1 hash encoding/decoding
* [VHostScan](https://github.com/codingo/VHostScan) - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
* [SubFinder](https://github.com/subfinder/subfinder) - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
* [badtouch](https://github.com/kpcyrd/badtouch) - Scriptable network authentication cracker
## General
* [Strong node.js](https://github.com/jesusprubio/strong-node) - An exhaustive checklist to assist in the source code security analysis of a node.js web service.
# Network
## Tools
* [NetworkMiner](http://www.netresec.com/?page=NetworkMiner) - A Network Forensic Analysis Tool (NFAT)
* [Paros](http://sourceforge.net/projects/paros/) - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
* [pig](https://github.com/rafael-santiago/pig) - A Linux packet crafting tool
* [findsubdomains](https://findsubdomains.com) - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
* [cirt-fuzzer](http://www.cirt.dk/) - A simple TCP/UDP protocol fuzzer.
* [ASlookup](https://aslookup.com/) - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
* [ZAP](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project) - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
* [mitmsocks4j](https://github.com/Akdeniz/mitmsocks4j) - Man-in-the-middle SOCKS Proxy for Java
* [ssh-mitm](https://github.com/jtesta/ssh-mitm) - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
* [nmap](https://nmap.org/) - Nmap (Network Mapper) is a security scanner
* [Aircrack-ng](http://www.aircrack-ng.org/) - An 802.11 WEP and WPA-PSK keys cracking program
* [Nipe](https://github.com/GouveaHeitor/nipe) - A script to make Tor Network your default gateway.
* [Habu](https://github.com/portantier/habu) - Python Network Hacking Toolkit
* [Wifi Jammer](https://n0where.net/wifijammer/) - Free program to jam all wifi clients in range
* [Firesheep](https://codebutler.github.io/firesheep/) - Free program for HTTP session hijacking attacks.
* [Scapy](https://github.com/secdev/scapy) - A Python tool and library for low level packet creation and manipulation
* [Amass](https://github.com/OWASP/Amass) - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
* [sniffglue](https://github.com/kpcyrd/sniffglue) - Secure multithreaded packet sniffer
# Forensic
## Tools
* [Autopsy](http://www.sleuthkit.org/autopsy/) - A digital forensics platform and graphical interface to [The Sleuth Kit](http://www.sleuthkit.org/sleuthkit/index.php) and other digital forensics tools
* [sleuthkit](https://github.com/sleuthkit/sleuthkit) - A library and collection of command-line digital forensics tools
* [EnCase](https://www.guidancesoftware.com/products/Pages/encase-forensic/overview.aspx) - The shared technology within a suite of digital investigations products by Guidance Software
* [malzilla](http://malzilla.sourceforge.net/) - Malware hunting tool
# Cryptography
### Tools
* [xortool](https://github.com/hellman/xortool) - A tool to analyze multi-byte XOR cipher
* [John the Ripper](http://www.openwall.com/john/) - A fast password cracker
* [Aircrack](http://www.aircrack-ng.org/) - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
# Wargame
## System
* [OverTheWire - Semtex](http://overthewire.org/wargames/semtex/)
* [OverTheWire - Vortex](http://overthewire.org/wargames/vortex/)
* [OverTheWire - Drifter](http://overthewire.org/wargames/drifter/)
* [pwnable.kr](http://pwnable.kr/) - Provide various pwn challenges regarding system security
* [Exploit Exercises - Nebula](https://exploit-exercises.com/nebula/)
* [SmashTheStack](http://smashthestack.org/)
## Reverse Engineering
* [Reversing.kr](http://www.reversing.kr/) - This site tests your ability to Cracking & Reverse Code Engineering
* [CodeEngn](http://codeengn.com/challenges/) - (Korean)
* [simples.kr](http://simples.kr/) - (Korean)
* [Crackmes.de](http://crackmes.de/) - The world first and largest community website for crackmes and reversemes.
## Web
* [Hack This Site!](https://www.hackthissite.org/) - a free, safe and legal training ground for hackers to test and expand their hacking skills
* [Hack The Box](https://www.hackthebox.eu) - a free site to perform pentesting in a variety of different systems.
* [Webhacking.kr](http://webhacking.kr/)
* [0xf.at](https://0xf.at/) - a website without logins or ads where you can solve password-riddles (so called hackits).
* [Gruyere](https://google-gruyere.appspot.com/)
* [Others](https://www.owasp.org/index.php/OWASP_Vulnerable_Web_Applications_Directory_Project#tab=On-Line_apps)
## Cryptography
* [OverTheWire - Krypton](http://overthewire.org/wargames/krypton/)
## Bug bounty
* [Awesome bug bounty resources by EdOverflow](https://github.com/EdOverflow/bugbounty-cheatsheet)
## Bug bounty - Earn Some Money
* [Bugcrowd](https://www.bugcrowd.com/)
* [Hackerone](https://www.hackerone.com/start-hacking)
# CTF
## Competition
* [DEF CON](https://legitbs.net/)
* [CSAW CTF](https://ctf.isis.poly.edu/)
* [hack.lu CTF](http://hack.lu/)
* [Pliad CTF](http://www.plaidctf.com/)
* [RuCTFe](http://ructf.org/e/)
* [Ghost in the Shellcode](http://ghostintheshellcode.com/)
* [PHD CTF](http://www.phdays.com/)
* [SECUINSIDE CTF](http://secuinside.com/)
* [Codegate CTF](http://ctf.codegate.org/html/Main.html?lang=eng)
* [Boston Key Party CTF](http://bostonkeyparty.net/)
* [ZeroDays CTF](https://zerodays.ie/)
* [Insomnihack](https://insomnihack.ch/)
* [Pico CTF](https://picoctf.com/)
* [prompt(1) to win](http://prompt.ml/) - XSS Challeges
## General
* [Hack+](http://hack.plus) - An Intelligent network of bots that fetch the latest InfoSec content.
* [CTFtime.org](https://ctftime.org/) - All about CTF (Capture The Flag)
* [WeChall](http://www.wechall.net/)
* [CTF archives (shell-storm)](http://shell-storm.org/repo/CTF/)
* [Rookit Arsenal](https://amzn.com/144962636X) - OS RE and rootkit development
* [Pentest Cheat Sheets](https://github.com/coreb1t/awesome-pentest-cheat-sheets) - Collection of cheat sheets useful for pentesting
* [Movies For Hackers](https://github.com/k4m4/movies-for-hackers) - A curated list of movies every hacker & cyberpunk must watch.
# OS
## Online resources
* [Security related Operating Systems @ Rawsec](http://rawsec.ml/en/security-related-os/) - Complete list of security related operating systems
* [Best Linux Penetration Testing Distributions @ CyberPunk](https://n0where.net/best-linux-penetration-testing-distributions/) - Description of main penetration testing distributions
* [Security @ Distrowatch](http://distrowatch.com/search.php?category=Security) - Website dedicated to talking about, reviewing and keeping up to date with open source operating systems
# Post exploitation
## tools
* [empire](https://github.com/EmpireProject/Empire) - A post exploitation framework for powershell and python.
* [silenttrinity](https://github.com/byt3bl33d3r/SILENTTRINITY) - A post exploitation tool that uses iron python to get past powershell restrictions.
# ETC
* [SecTools](http://sectools.org/) - Top 125 Network Security Tools