Notice
Tech Haven does not condone unauthorized use of these or any hacking related tools. These tools are for educational purposes only. Only test systems that you have explicit permissions to do so.
Reply with your favorite tools and I can add them to this list!
Cracking
-
https://github.com/openwall/john - John the Ripper is an Open Source password security auditing and password recovery tool.
-
https://github.com/hashcat/hashcat - World’s fastest and most advanced password recovery utility
-
https://github.com/sp00ks-git/hat - hashcat automation
Exploitation
-
https://github.com/Screetsec/TheFatRat - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc.
-
https://github.com/n1nj4sec/pupy - Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
-
https://github.com/rapid7/metasploit-framework/wiki/How-to-use-msfvenom - Msfvenom part of metasploit framework
-
https://www.revshells.com/ - Online reverse shell generator. Great for CTFs
OSINT
- https://wigle.net/ - Find location of a Wifi SSID
- https://osintframework.com/
- GitHub - sherlock-project/sherlock: 🔎 Hunt down social media accounts by username across social networks
- GitHub - soxoj/maigret: 🕵️♂️ Collect a dossier on a person by username from thousands of sites
- https://search.censys.io/
- https://securitytrails.com/
- https://www.shodan.io/
Privilege Escalation
- GitHub - peass-ng/PEASS-ng: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors) - WinPEAS, LinPEAS, priv esc scripts
- GitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks - Linux local priv esc script
- https://gtfobins.github.io/ - List of Unix tools than can be exploited to bypass local security restrictions
- https://lolbas-project.github.io/ - List of Windows binaries can be exploited to bypass local security restrictions
- PowerSploit/Privesc at master · PowerShellMafia/PowerSploit · GitHub - PowerUp script for easing in Privliege Escalation on Windows
- FuzzySecurity | Windows Privilege Escalation Fundamentals - Windows priv esc fundementals
- Windows - Privilege Escalation - Internal All The Things
- Privilege Escalation - Windows · Total OSCP Guide
Social Engineering
Web Enumeration
- Kali Linux / Packages / dirbuster · GitLab - (included with kali) enumerate files / folders on a website
- GitHub - OJ/gobuster: Directory/File, DNS and VHost busting tool written in Go - enumerate files / folders on a website
Enumeration Tools
Windows
- Impacket – SecureAuth - Collection of Python scripts helpful for AD exploitation and recon
- GitHub - gentilkiwi/mimikatz: A little tool to play with Windows security - Extract passwords, hashes, pins, kerberos tickets from memory. Perform pass-the-hash, pass-the-ticket, build golden tickets
- GitHub - nidem/kerberoast
- GitHub - Hackplayers/evil-winrm: The ultimate WinRM shell for hacking/pentesting
- GitHub - AonCyberLabs/Windows-Exploit-Suggester: This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
- GitHub - Flangvik/SharpCollection: Nightly builds of common C# offensive tools, fresh from their respective master branches built and released in a CDI fashion using Azure DevOps release pipelines. - various C# pentest tools
- GitHub - samratashok/nishang: Nishang - Offensive PowerShell for red team, penetration testing and offensive security. - Offensive Powershell tools
- GitHub - PowerShellMafia/PowerSploit: PowerSploit - A PowerShell Post-Exploitation Framework - PowerShell Post Exploitation Framework
- GitHub - cobbr/Covenant: Covenant is a collaborative .NET C2 framework for red teamers. - .NET and web based C2 framework
- https://wadcoms.github.io/ - list of various tools for attacking Active Directory environments
- https://github.com/Orange-Cyberdefense/arsenal/blob/master/mindmap/pentest_ad_dark.png - AD pentesting mindmap
- GitHub - 61106960/adPEAS: Powershell tool to automate Active Directory enumeration. - wrapper for various other AD pentesting tools