Skip to content

Latest commit

 

History

History
81 lines (79 loc) · 7.62 KB

tools.md

File metadata and controls

81 lines (79 loc) · 7.62 KB

Not The Hidden Wiki

Other Links (To be segregated in the future)


  1. Proxychains - link
  2. Proxychains-ng - link
  3. SSHuttle - link
  4. Chisel - link
  5. Ligolo - link
  6. RedTeam Tools - link
  7. Trickest-Cli - link
  8. Phishing Warmer - link
  9. EvilGophish: Evilgnx + Gophish - link
  10. HiddenEye: Modern Phishing Tool - link
  11. Pentest Report Generator - link
  12. Sysreptor - link
  13. Regex Fuzzing - link
  14. RDP MiTM - link
  15. PentestGPT - link
  16. MSSQL Spider - link
  17. Nebula - link
  18. Hidden Desktop for Cobalt Strike - link
  19. Tunnel all your traffic over websocket protocol - Bypass firewalls/DPI - link
  20. Anti Forensics Tool For Red Teamers - link
  21. SoftICE-like kernel debugger for Windows 11 - link
  22. Pentester's Promiscuous Notebook - link
  23. Trickest: workflow orchestration - link
  24. n8n: Workflow automation for technical people - link
  25. Serveo: Expose local servers to the internet - link
  26. ngrok - link
  27. amass: A DNS enumeration / attack surface mapping & external assets discovery tool - link
  28. autorecon: Multi-threaded network reconnaissance tool which performs automated enumeration of services. - link
  29. cloudfail: a reconnaissance tool for identifying misconfigured CloudFront domains. - link
  30. crackmapexec: Network scanner. - link
  31. dnsx: A tool for DNS reconnaissance that can help identify subdomains and other related domains. - link
  32. enum4linux-ng: Tool for enumerating information from Windows and Samba systems. - link
  33. enyx: Framework for building offensive security tools. - link
  34. fierce: A DNS reconnaissance tool for locating non-contiguous IP space - link
  35. findomain: The fastest and cross-platform subdomain enumerator. - link
  36. freeipscanner: A simple bash script to enumerate stale ADIDNS entries - link
  37. dnschef: Tool for DNS MITM attacks - link
  38. KeePwn: KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. - link
  39. seclists: A collection of multiple types of lists used during security assessments - link
  40. metasploit: A popular penetration testing framework that includes many exploits and payloads - link
  41. swaks: Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. - link
  42. strace: debugging utility for Linux - link
  43. ssh-audit: ssh-audit is a tool to test SSH server configuration for best practices - link
  44. pwncat: A lightweight and versatile netcat alternative - link
  45. smtp-user-enum: A tool to enumerate email addresses via SMTP - link
  46. sipvicious: Enumeration and MITM tool for SIP devices - link
  47. ruler: Outlook Rules exploitation framework. - link
  48. gowitness: A website screenshot utility written in Golang. - link
  49. mitm6: Tool to conduct a man-in-the-middle attack against IPv6 protocols. - link
  50. onesixtyone: SNMP scanner - link
  51. semgrep: Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. - link
  52. pwnedornot: Check if a password has been leaked in a data breach. - link
  53. pwndb: A command-line tool for searching the pwndb database of compromised credentials. - link
  54. Pantheon: Insecure Camera Parsing and Intelligence - link
  55. VirtualMemAllocMon: too for Monitoring VirtualMemAlloc Event via ETW - link
  56. Find secrets in repo - link
  57. List of ngrok alternatives and other ngrok-like tunneling software and services. - link
  58. Ready to go Phishing Platform - link
  59. Generate unicode domains for IDN Homograph Attack and detect them. - link
  60. Malicious Shortcut(.lnk) Generator - link
  61. MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange - link
  62. BadAssMacros - C# based automated Malicous Macro Generator. - link
  63. GoPhish - link
  64. HTA encryption tool for RedTeams - link
  65. A collection of captive portals for phishing using a WiFi Pineapple - link
  66. Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records. - link
  67. A great collection of resources to thrive off the land - link
  68. neonito-vuln-checker: script checks for vulnerabilities (CVEs) associated with each IP address - link
  69. Static binary for Linux - link
  70. Vulnerable test websites for Vulnerability Scanners - link
  71. A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers - link
  72. How to launch Command Prompt and powershell from MS Paint - link
  73. Webhook.site | Test, process and transform emails and HTTP requests (BURP Collab alternative) - link
  74. Simple, private file sharing - link
  75. FullHunt: Secure Your Attack Surface - link
  76. GrayHatWarfare - link