2020-07-15 15:43:14 +00:00
# More Tools
## BlueTeam
2022-02-22 21:07:28 +00:00
* [https://github.com/yarox24/attack\_monitor ](https://github.com/yarox24/attack\_monitor )
2020-07-15 15:43:14 +00:00
* [https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/ ](https://capsule8.com/blog/dont-get-kicked-out-a-tale-of-rootkits-and-other-backdoors/ )
* [https://github.com/ION28/BLUESPAWN ](https://github.com/ION28/BLUESPAWN )
* [https://github.com/PaperMtn/lil-pwny ](https://github.com/PaperMtn/lil-pwny ) : Check disclosed accounts
* [https://github.com/rabobank-cdc/DeTTECT ](https://github.com/rabobank-cdc/DeTTECT )
## OSINT
* [https://github.com/3vangel1st/kamerka ](https://github.com/3vangel1st/kamerka )
2022-02-22 21:07:28 +00:00
* [https://github.com/BullsEye0/google\_dork\_list ](https://github.com/BullsEye0/google\_dork\_list )
2020-07-15 15:43:14 +00:00
* [https://github.com/highmeh/lure ](https://github.com/highmeh/lure )
2022-02-22 21:07:28 +00:00
* [https://www.shodan.io/ ](https://www.shodan.io )
* [https://censys.io/ ](https://censys.io )
2020-07-15 15:43:14 +00:00
* [https://viz.greynoise.io/table ](https://viz.greynoise.io/table )
* [https://www.zoomeye.org ](https://www.zoomeye.org )
* [https://fofa.so ](https://fofa.so )
* [https://www.onyphe.io ](https://www.onyphe.io )
* [https://app.binaryedge.io ](https://app.binaryedge.io )
* [https://hunter.io ](https://hunter.io )
* [https://wigle.net ](https://wigle.net )
* [https://ghostproject.fr ](https://ghostproject.fr )
2022-02-22 21:07:28 +00:00
* [https://www.oshadan.com/ ](https://www.oshadan.com )
* [https://builtwith.com/ ](https://builtwith.com )
* [https://www.spiderfoot.net/ ](https://www.spiderfoot.net )
2020-07-15 15:43:14 +00:00
* [https://github.com/zricethezav/gitleaks ](https://github.com/zricethezav/gitleaks )
2021-05-29 17:49:19 +00:00
* [https://www.nmmapper.com/sys/tools/subdomainfinder/ ](https://www.nmmapper.com/sys/tools/subdomainfinder/ ) : 8 Subdomain finder tools, sublist3r, amass and more
2020-07-15 15:43:14 +00:00
## **WEB**
* [https://github.com/AlisamTechnology/ATSCAN ](https://github.com/AlisamTechnology/ATSCAN )
* [https://github.com/momenbasel/KeyFinder ](https://github.com/momenbasel/KeyFinder )
* [https://github.com/hahwul/XSpear ](https://github.com/hahwul/XSpear )
* [https://github.com/BitTheByte/Monitorizer/ ](https://github.com/BitTheByte/Monitorizer/ )
* [https://github.com/spinkham/skipfish ](https://github.com/spinkham/skipfish )
* [https://github.com/blark/aiodnsbrute ](https://github.com/blark/aiodnsbrute ) : Brute force domain names asynchronously
* [https://crt.sh/?q=%.yahoo.com ](https://crt.sh/?q=%.yahoo.com ) : Subdomain bruteforce
* [https://github.com/tomnomnom/httprobe ](https://github.com/tomnomnom/httprobe ): Check if web servers in a domain are accessible
* [https://github.com/aboul3la/Sublist3r ](https://github.com/aboul3la/Sublist3r ) : Subdomain discovery
* [https://github.com/gwen001/github-search/blob/master/github-subdomains.py ](https://github.com/gwen001/github-search/blob/master/github-subdomains.py ) : Subdomain discovery in github
* [https://github.com/robertdavidgraham/masscan ](https://github.com/robertdavidgraham/masscan ) : Fast port scanning
* [https://github.com/Threezh1/JSFinder ](https://github.com/Threezh1/JSFinder ) : Subdomains and URLs from JS files in a web
* [https://github.com/C1h2e1/MyFuzzingDict ](https://github.com/C1h2e1/MyFuzzingDict ) : Web files dictionary
* [https://github.com/TypeError/Bookmarks/blob/master/README.md ](https://github.com/TypeError/Bookmarks/blob/master/README.md ) : BurpExtension to avoid dozens repeater tabs
* [https://github.com/hakluke/hakrawler ](https://github.com/hakluke/hakrawler ) : Obtain assets
* [https://github.com/izo30/google-dorker ](https://github.com/izo30/google-dorker ) : Google dorks
2022-02-22 21:07:28 +00:00
* [https://github.com/sehno/Bug-bounty/blob/master/bugbounty\_checklist.md ](https://github.com/sehno/Bug-bounty/blob/master/bugbounty\_checklist.md ) : Web BugBounty checklist
2020-07-15 15:43:14 +00:00
* [https://github.com/Naategh/dom-red ](https://github.com/Naategh/dom-red ) : Check a list of domain against Open Redirection
* [https://github.com/prodigysml/Dr.-Watson ](https://github.com/prodigysml/Dr.-Watson ) : Burp plugin, offline analysis to discover domains, subdomains and IPs
* [https://github.com/hahwul/WebHackersWeapons ](https://github.com/hahwul/WebHackersWeapons ): List of different tools
2022-02-22 21:07:28 +00:00
* [https://github.com/gauravnarwani97/Trishul ](https://github.com/gauravnarwani97/Trishul ) : BurpSuite Plugingto find vulns (SQLi, XSS, SSTI)
2020-07-15 15:43:14 +00:00
* [https://github.com/fransr/postMessage-tracker ](https://github.com/fransr/postMessage-tracker ) : Chrome extension for tracking post-messages functions
2022-02-22 21:07:28 +00:00
* [https://github.com/Quitten/Autorize ](https://github.com/Quitten/Autorize ) : Automatic authentication tests (remove cookies and try to send the request)
* [https://github.com/pikpikcu/xrcross ](https://github.com/pikpikcu/xrcross ): XRCross is a Reconstruction, Scanner, and a tool for penetration / BugBounty testing. This tool was built to test (XSS|SSRF|CORS|SSTI|IDOR|RCE|LFI|SQLI) vulnerabilities
2020-07-15 15:43:14 +00:00
## Windows
* [https://github.com/Mr-Un1k0d3r/PoisonHandler ](https://github.com/Mr-Un1k0d3r/PoisonHandler ) : Lateral movements
* [https://freddiebarrsmith.com/trix/trix.html ](https://freddiebarrsmith.com/trix/trix.html ) : LOL bins
2022-02-22 21:07:28 +00:00
* [https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79 ](https://gist.github.com/netbiosX/ee35fcd3722e401a38136cff7b751d79 ) ([https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/](https://pentestlab.blog/2020/01/13/persistence-image-file-execution-options-injection/)): Persistence
* [https://github.com/odzhan/injection ](https://github.com/odzhan/injection ) : Windows Process Injection techniques 
* [https://github.com/BankSecurity/Red\_Team ](https://github.com/BankSecurity/Red\_Team ) : Red Team scripts
2020-07-15 15:43:14 +00:00
* [https://github.com/l0ss/Grouper2 ](https://github.com/l0ss/Grouper2 ) : find security-related misconfigurations in Active Directory Group Policy.
* [https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring ](https://www.wietzebeukema.nl/blog/powershell-obfuscation-using-securestring ) : Securestring obfuscation
* [https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ ](https://pentestlab.blog/2020/02/24/parent-pid-spoofing/ ) : Parent PID Spoofing
* [https://github.com/the-xentropy/xencrypt ](https://github.com/the-xentropy/xencrypt ) : Encrypt Powershell payloads
* [https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/ ](https://shells.systems/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations/ ) : Stealth C2
* [https://windows-internals.com/faxing-your-way-to-system/ ](https://windows-internals.com/faxing-your-way-to-system/ ) : Series of logs about Windows Internals
* [https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ ](https://bestestredteam.com/2018/10/02/tracking-pixel-in-microsoft-office-document/ ) : Track who open a document
* [https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet ](https://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet ) : Active Directory Cheat Sheet
## Firmware
2022-02-22 21:07:28 +00:00
Tools q veo q pueden molar para analizar firmares (automaticas):
2020-07-15 15:43:14 +00:00
* [https://github.com/craigz28/firmwalker ](https://github.com/craigz28/firmwalker )
2022-02-22 21:07:28 +00:00
* [https://github.com/fkie-cad/FACT\_core ](https://github.com/fkie-cad/FACT\_core )
2020-07-15 15:43:14 +00:00
* [https://gitlab.com/bytesweep/bytesweep-go ](https://gitlab.com/bytesweep/bytesweep-go )
Post-crema:
* [https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html ](https://blog.mindedsecurity.com/2018/09/pentesting-iot-devices-part-1-static.html )
* [https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html ](https://blog.mindedsecurity.com/2018/10/pentesting-iot-devices-part-2-dynamic.html )
Como extraer firmware si no lo encontramos online: [https://www.youtube.com/watch?v=Kxvpbu9STU4 ](https://www.youtube.com/watch?v=Kxvpbu9STU4 )
Aqui un firware con vulnerabilidades para analizar: [https://github.com/scriptingxss/IoTGoat ](https://github.com/scriptingxss/IoTGoat )
y por aqui la metodologia owasp para analizar firmware: [https://github.com/scriptingxss/owasp-fstm ](https://github.com/scriptingxss/owasp-fstm )
2022-02-22 21:07:28 +00:00
Firmware emulation: FIRMADYNE (https://github.com/firmadyne/firmadyne/) is a platform for automating the emulation and dynamic analysis of Linux-based firmware.
2020-07-15 15:43:14 +00:00
## OTHER
* [https://twitter.com/HackAndDo/status/1202695084543791117 ](https://twitter.com/HackAndDo/status/1202695084543791117 )
* [https://github.com/weev3/LKWA ](https://github.com/weev3/LKWA )
* [https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/ ](https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/ )
* [https://github.com/skelsec/jackdaw ](https://github.com/skelsec/jackdaw )
* [https://github.com/CoatiSoftware/Sourcetrail ](https://github.com/CoatiSoftware/Sourcetrail ) : Static code analysis
* [https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html ](https://www.hackerdecabecera.com/2019/12/blectf-capture-flag-en-formato-hardware.html ) : Bluetooth LE CTF
* [https://github.com/skeeto/endlessh ](https://github.com/skeeto/endlessh ) : SSH tarpit that slowly sends an endless banner.
* AWS and Cloud tools: [https://github.com/toniblyx/my-arsenal-of-aws-security-tools ](https://github.com/toniblyx/my-arsenal-of-aws-security-tools )
2022-02-22 21:07:28 +00:00
* IFS (Interplanetary File System) for phising: [https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/ ](https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/using-the-interplanetary-file-system-for-offensive-operations/ )
2020-07-15 15:43:14 +00:00
* IP rotation services: [https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212 ](https://medium.com/@lokeshdlk77/how-to-rotate-ip-address-in-brute-force-attack-e66407259212 )
* Linux rootkit: [https://github.com/aesophor/satanic-rootkit ](https://github.com/aesophor/satanic-rootkit )
2022-02-22 21:07:28 +00:00
* [https://theia-ide.org/ ](https://theia-ide.org ) : Online IDE
2020-07-15 15:43:14 +00:00
* [https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ ](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/ ) : Resources for starting on BugBounties
* [https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab ](https://medium.com/macoclock/jailbreak-and-stuff-kickstart-tools-and-techniques-for-ios-application-pentesting-6fa53a3987ab ) : IOS pentesting tools
* [https://github.com/random-robbie/keywords/blob/master/keywords.txt ](https://github.com/random-robbie/keywords/blob/master/keywords.txt ) : Keywords
2022-02-22 21:07:28 +00:00
* [https://github.com/ElevenPaths/HomePWN ](https://github.com/ElevenPaths/HomePWN ) : Hacking IoT (Wifi, BLE, SSDP, MDNS)
2020-07-15 15:43:14 +00:00
* [https://github.com/rackerlabs/scantron ](https://github.com/rackerlabs/scantron ) : automating scanning
* [https://github.com/doyensec/awesome-electronjs-hacking ](https://github.com/doyensec/awesome-electronjs-hacking ) : This list aims to cover Electron.js security related topics.
2020-11-20 10:55:52 +00:00
* [https://github.com/serain/bbrecon ](https://github.com/serain/bbrecon ) : Info about BB programs