Categories: Resources

Scanning / Pentesting

  • OpenVAS – OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.
  • Metasploit Framework – A tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
  • Kali – Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs).
  • pig – A Linux packet crafting tool.
  • scapy – Scapy: the python-based interactive packet manipulation program & library.
  • Pompem – Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters and ethical hackers. In its current version, performs searches in databases: Exploit-db, 1337day, Packetstorm Security…
  • Nmap – Nmap is a free and open source utility for network discovery and security auditing.
  • Amass – Amass performs DNS subdomain enumeration by scraping the largest number of disparate data sources, recursive brute forcing, crawling of web archives, permuting and altering names, reverse DNS sweeping and other techniques.
  • Anevicon – The most powerful UDP-based load generator, written in Rust.
  • Finshir – A coroutines-driven Low & Slow traffic generator, written in Rust.
  • Legion – Open source semi-automated discovery and reconnaissance network penetration testing framework.
  • Sublist3r – Fast subdomains enumeration tool for penetration testers
  • RustScan – Faster Nmap scanning with Rust. Take a 17 minute Nmap scan down to 19 seconds.
  • Boofuzz – Fuzzing engine and fuzz testing framework.
  • monsoon – Very flexible and fast interactive HTTP enumeration/fuzzing.
  • Netz– Discover internet-wide misconfigurations, using zgrab2 and others.
  • Deepfence ThreatMapper – Apache v2, powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless.
  • Nessus – The versatile Nessus® vulnerability scanner provides patch, configuration, and compliance auditing; mobile, malware, and botnet discovery; sensitive data identification; and many other features.
  • Netcat – Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
  • TCPDump – Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression.
  • Wazuh – Wazuh is a open source enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.
  • Powershell-Suite – The PowerShell-suite is a collection of PowerShell scripts that extract information about the handles, processes, DLLs, and many other aspects of Windows machines. By scripting together specific tasks, you can quickly navigate and check which systems on a network are vulnerable to exploit. 
  • Zmap -This is a lightweight network scanner that is capable of scanning everything from a home network to the entire Internet. This free network scanner is best used to gather baseline details about a network. If you only have an IP range to go off of, use to get a lay of the land quickly.
  • Xray – Xray is an excellent network mapping tool that uses the OSINT framework to help guide its tactics. Xray uses wordlists, DNS requests, and any API keys to help identify open ports on a network from the outside looking in.
  • SimplyEmail – This is an email recon tool used to help gather associated information found on the internet based on someone’s email address. SimplyEmail is based on the harvester solution and works to search the internet for any data that can help provide intelligence around any given email address.
  • Natlas – The goal of Natlas is not to identify a bunch of vulnerabilities, necessarily, but rather to identify exposure.

«
»
Stay up to date with the latest cyber news: