Not The Hidden Wiki
- Proxychains - link
- Proxychains-ng - link
- SSHuttle - link
- Chisel - link
- Ligolo - link
- RedTeam Tools - link
- Trickest-Cli - link
- Phishing Warmer - link
- EvilGophish: Evilgnx + Gophish - link
- HiddenEye: Modern Phishing Tool - link
- Pentest Report Generator - link
- Sysreptor - link
- Regex Fuzzing - link
- RDP MiTM - link
- PentestGPT - link
- MSSQL Spider - link
- Nebula - link
- Hidden Desktop for Cobalt Strike - link
- Tunnel all your traffic over websocket protocol - Bypass firewalls/DPI - link
- Anti Forensics Tool For Red Teamers - link
- SoftICE-like kernel debugger for Windows 11 - link
- Pentester's Promiscuous Notebook - link
- Trickest: workflow orchestration - link
- n8n: Workflow automation for technical people - link
- Serveo: Expose local servers to the internet - link
- ngrok - link
- amass: A DNS enumeration / attack surface mapping & external assets discovery tool - link
- autorecon: Multi-threaded network reconnaissance tool which performs automated enumeration of services. - link
- cloudfail: a reconnaissance tool for identifying misconfigured CloudFront domains. - link
- crackmapexec: Network scanner. - link
- dnsx: A tool for DNS reconnaissance that can help identify subdomains and other related domains. - link
- enum4linux-ng: Tool for enumerating information from Windows and Samba systems. - link
- enyx: Framework for building offensive security tools. - link
- fierce: A DNS reconnaissance tool for locating non-contiguous IP space - link
- findomain: The fastest and cross-platform subdomain enumerator. - link
- freeipscanner: A simple bash script to enumerate stale ADIDNS entries - link
- dnschef: Tool for DNS MITM attacks - link
- KeePwn: KeePwn is a tool that extracts passwords from KeePass 1.x and 2.x databases. - link
- seclists: A collection of multiple types of lists used during security assessments - link
- metasploit: A popular penetration testing framework that includes many exploits and payloads - link
- swaks: Swaks is a featureful flexible scriptable transaction-oriented SMTP test tool. - link
- strace: debugging utility for Linux - link
- ssh-audit: ssh-audit is a tool to test SSH server configuration for best practices - link
- pwncat: A lightweight and versatile netcat alternative - link
- smtp-user-enum: A tool to enumerate email addresses via SMTP - link
- sipvicious: Enumeration and MITM tool for SIP devices - link
- ruler: Outlook Rules exploitation framework. - link
- gowitness: A website screenshot utility written in Golang. - link
- mitm6: Tool to conduct a man-in-the-middle attack against IPv6 protocols. - link
- onesixtyone: SNMP scanner - link
- semgrep: Static analysis tool that supports multiple languages and can find a variety of vulnerabilities and coding errors. - link
- pwnedornot: Check if a password has been leaked in a data breach. - link
- pwndb: A command-line tool for searching the pwndb database of compromised credentials. - link
- Pantheon: Insecure Camera Parsing and Intelligence - link
- VirtualMemAllocMon: too for Monitoring VirtualMemAlloc Event via ETW - link
- Find secrets in repo - link
- List of ngrok alternatives and other ngrok-like tunneling software and services. - link
- Ready to go Phishing Platform - link
- Generate unicode domains for IDN Homograph Attack and detect them. - link
- Malicious Shortcut(.lnk) Generator - link
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange - link
- BadAssMacros - C# based automated Malicous Macro Generator. - link
- GoPhish - link
- HTA encryption tool for RedTeams - link
- A collection of captive portals for phishing using a WiFi Pineapple - link
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records. - link
- A great collection of resources to thrive off the land - link
- neonito-vuln-checker: script checks for vulnerabilities (CVEs) associated with each IP address - link
- Static binary for Linux - link
- Vulnerable test websites for Vulnerability Scanners - link
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers - link
- How to launch Command Prompt and powershell from MS Paint - link
- Webhook.site | Test, process and transform emails and HTTP requests (BURP Collab alternative) - link
- Simple, private file sharing - link
- FullHunt: Secure Your Attack Surface - link
- GrayHatWarfare - link