Security Tools

Explore our collection of 140 tools for cybersecurity professionals and enthusiasts curated by the members and executives of MQCyberSec.

Please note to use these tools responsibly. MQCyberSec is not responsible for any misuse of these tools. Don't be evil.
Search Tips: Type to search by tool name or description. Use #tag to search by specific tags. Matching text will be highlighted as you type.

Filter by Subcategory

Aircrack-ng

Network security suite for monitoring, attacking, testing, and cracking WiFi networks with tools for all aspects of WiFi...

🌐 Network 🔐 Credential 🔓 FullPwn
#wifi-cracking #wireless-security #wep #wpa #network-analysis

Amass

In-depth attack surface mapping and asset discovery tool that performs network mapping of attack surfaces and external a...

🔍 OSINT 🌐 Network 🌐 Web
#subdomain-enumeration #attack-surface-mapping #reconnaissance #information-gathering #asset-discovery

Angr

Powerful binary analysis framework for symbolic execution and program state exploration that automates vulnerability dis...

⚙️ Rev 💥 Pwn
#symbolic-execution #binary-analysis #vulnerability-research #automated-exploitation #program-analysis

Aperi'Solve

Online platform that performs multiple automated steganography analysis tools on uploaded images to reveal hidden data.

🔍 Stego
#steganography #image-analysis #online-tool #data-extraction #multiple-techniques

Arjun

HTTP parameter discovery suite designed to find hidden GET and POST parameters in web applications.

🌐 Web
#parameter-discovery #web-reconnaissance #api-scanning #web-security #penetration-testing #http-enumeration

ASNLookup

Tool that retrieves organizations' Autonomous System Numbers (ASNs) and their network ranges to help identify additional...

🔍 OSINT 🌐 Network
#asn-lookup #network-ranges #ip-intelligence #scope-expansion #reconnaissance
Autopsy logo

Autopsy

A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools, designed for d...

🔬 Forensics 💽 Disk Forensics
#disk-analysis #file-recovery #timeline-analysis #forensics

Binary Ninja

Interactive binary analysis platform with powerful disassembly, decompilation, and graphing capabilities for reverse eng...

⚙️ Rev 🧩 Wasm
#binary-analysis #disassembler #decompiler #reverse-engineering #commercial-tool

Binwalk

Firmware analysis tool that scans binary files for embedded files and executable code, essential for IoT device analysis...

⚙️ Rev 🔌 Firmware
#firmware-analysis #embedded-files #binary-extraction #iot-security #reverse-engineering

BitTorrent Traffic Analyzer

Tool for analyzing network traffic to identify and extract information from BitTorrent protocol communications.

📡 Network Forensics 🌐 Network
#traffic-analysis #bittorrent #network-forensics #data-extraction #protocol-analysis

BlockchainSQL

Tool that allows querying blockchain wallets and transactions using SQL-like syntax for cryptocurrency investigations an...

🔗 Blockchain 🔍 OSINT
#blockchain-analysis #cryptocurrency #wallet-investigation #transaction-analysis #sql-querying
Bloodhound logo

Bloodhound

A graphical interface that uses graph theory to reveal hidden and often unintended relationships within Active Directory...

🔓 FullPwn 🪟 Windows 🔑 PrivEsc 🌐 Network
#active-directory #attack-path #privilege-escalation #reconnaissance

BrowserHistoryView

NirSoft utility that displays the browsing history of multiple web browsers, allowing forensic investigators to examine ...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #history-analysis #web-artifacts #digital-forensics #browser-history

BrowsingHistoryView

NirSoft utility that displays browsing history databases from multiple browsers, providing a consolidated view for foren...

🪟 Windows Forensics 🔬 Forensics
#browser-history #web-forensics #artifact-analysis #digital-forensics #web-history
Burp Suite logo

Burp Suite

An integrated platform for performing security testing of web applications, featuring a proxy server, scanner, intruder,...

🌐 Web
#web-proxy #vulnerability-scanning #penetration-testing #web-security

Censys

Search engine and attack surface management platform that continuously monitors the internet to find exposures before at...

🔍 OSINT 🌐 Network
#attack-surface-monitoring #internet-scanning #certificate-search #asset-discovery #security-monitoring

ChromeCacheView

NirSoft utility that displays the contents of the Chrome web browser cache, allowing investigators to examine cached fil...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #cache-analysis #chrome #digital-forensics #web-artifacts

ChromeKatz

Tool for extracting passwords from Chrome browser, functioning as a standalone alternative to Mimikatz's dpapi::chrome m...

🔐 Credential 🪟 Windows
#browser-exploitation #password-recovery #chrome #credential-dumping #post-exploitation

CredHistView

NirSoft tool for displaying the password history of Windows credentials stored by the Credential History feature, reveal...

🪟 Windows Forensics 🔐 Credential
#password-history #credential-forensics #windows-security #authentication-history #credential-analysis

CSPBypass

Tool that demonstrates bypass techniques for Content Security Policy (CSP) restrictions on websites, useful for security...

🌐 Web
#csp-bypass #content-security-policy #web-security #xss #security-testing

CyberChef

Web app for encryption, encoding, compression and data analysis, offering a simple interface for complex operations on d...

🔒 Crypto 🔍 Stego 🧩 Misc
#data-manipulation #encoding #encryption #forensics #data-analysis

dCode

Collection of cryptographic, mathematical, and puzzle-solving tools for decryption, encoding/decoding, and solving vario...

🔒 Crypto 🧩 Misc
#cipher-solver #decoder #cryptography #code-breaker #multi-tool

DCOMPotato

Windows local privilege escalation exploit that leverages DCOM for unauthorized privilege elevation on vulnerable system...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #dcom #potato-family #windows-exploits #local-exploit

de4dot

.NET deobfuscator and unpacker designed to undo the effects of various .NET code obfuscators, helping with malware analy...

⚙️ Rev 🪟 Windows
#dotnet-deobfuscator #decompilation #malware-analysis #code-unpacker #reverse-engineering

DeepSound

Audio steganography tool that hides secret data inside audio files with support for various audio formats and encryption...

🔍 Stego
#audio-steganography #data-hiding #encryption #file-embedding #information-concealment

DetectItEasy

Program for determining file types, compilers, and packers used in binary executables with support for multiple formats ...

⚙️ Rev 🧩 Misc
#file-analysis #binary-identification #packer-detection #compiler-detection #file-signatures

DNSDumpster

Free domain research tool that discovers hosts related to a domain through DNS records, finding subdomains and related d...

🔍 OSINT 🌐 Web
#dns-reconnaissance #subdomain-discovery #passive-scanning #domain-research #information-gathering

dnSpy

.NET debugger and assembly editor that enables debugging and editing of .NET applications even without source code, supp...

⚙️ Rev 🪟 Windows
#dotnet-debugger #assembly-editor #decompiler #reverse-engineering #code-analysis

Dogbolt

Online decompiler explorer that compares the output of various decompilers against the same binary to aid in reverse eng...

⚙️ Rev
#decompiler #binary-analysis #reverse-engineering #code-analysis #web-based

dotPeek

Free .NET decompiler and assembly browser from JetBrains that reconstructs source code from compiled assemblies with hig...

⚙️ Rev 🪟 Windows
#dotnet-decompiler #assembly-browser #source-recovery #reverse-engineering #code-analysis

DriveFS-Sleuth

Forensic tool for analyzing Google Drive File Stream artifacts on Windows systems to recover file metadata and activity ...

🪟 Windows Forensics 🔬 Forensics ☁️ Cloud
#google-drive #cloud-forensics #digital-forensics #file-stream #artifact-analysis

DS_Store_exp

Tool to parse and extract information from .DS_Store files, which can reveal directory structures and filenames on macOS...

🔍 OSINT 🌐 Web
#ds-store #information-disclosure #macos-artifacts #directory-enumeration #web-reconnaissance

EfsPotato

Windows privilege escalation exploit that abuses the Encrypting File System Remote Protocol (MS-EFSRPC) to gain SYSTEM p...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #efs #potato-family #windows-exploits #local-exploit

Epieos

OSINT platform for retrieving information about email addresses, social media accounts, and other digital identities for...

🔍 OSINT
#email-osint #account-discovery #digital-footprint #reconnaissance #investigation-tool

EvtxECmd

Windows Event Log parser that processes .evtx files and outputs CSV or JSON with comprehensive event data for forensic a...

🪟 Windows Forensics 🪟 Windows
#event-logs #evtx #log-parsing #windows-events #incident-response

ExifTool

Powerful metadata extraction and manipulation tool that reads, writes, and edits metadata in a wide variety of files.

🔍 OSINT 🔍 Stego 🔬 Forensics
#metadata-analysis #exif-data #forensic-analysis #image-analysis #information-gathering

feroxbuster

A fast, simple, recursive content discovery tool written in Rust designed to enumerate hidden resources in web applicati...

🌐 Web
#content-discovery #fuzzing #directory-brute-force #web-security

ffuf

A fast web fuzzer written in Go that allows for fuzzing of various parts of HTTP requests to discover content, parameter...

🌐 Web
#fuzzing #content-discovery #parameter-discovery #web-security

FireMaster

Password recovery tool for various browsers including Firefox, Chrome, and Internet Explorer, extracting stored credenti...

🔐 Credential 🪟 Windows
#password-recovery #browser-credentials #forensic-analysis #data-extraction #credential-dumping

Flask-Session-Cookie-Manager

Tool for Flask session cookie manipulation that allows decoding and creating secure Flask session cookies for security t...

🌐 Web 🔒 Crypto
#flask #session-manipulation #cookie-analysis #web-security #web-authentication

FontForge

Open-source font editor that can be used in forensics to analyze and extract data from font files, or create steganograp...

🔍 Stego 🧩 Misc
#font-analysis #font-editing #steganography #data-hiding #forensic-analysis

Foremost

Digital forensics tool for file carving and data recovery that can extract files from disk images based on headers, foot...

💽 Disk Forensics 🔬 Forensics 🔍 Stego
#file-carving #data-recovery #forensic-analysis #file-extraction #disk-analysis

Frida

Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers to inject JavaScript into na...

⚙️ Rev 📱 Mobile
#dynamic-instrumentation #runtime-manipulation #hooking #mobile-security #application-analysis

FTK Imager

Forensic imaging tool for creating forensically sound duplicates of digital evidence, previewing recoverable data, and m...

💽 Disk Forensics 🪟 Windows Forensics
#disk-imaging #evidence-acquisition #forensic-analysis #data-preview #commercial-tool

GDB

The GNU Project Debugger allows you to see what's happening inside a program while it executes, analyze memory, and trac...

⚙️ Rev 💥 Pwn
#debugging #binary-analysis #reverse-engineering #exploit-development
Ghidra logo

Ghidra

A software reverse engineering framework developed by NSA that helps analyze malicious code and malware, featuring a dis...

⚙️ Rev 💥 Pwn 🔒 Crypto
#reverse-engineering #binary-analysis #decompiler #malware-analysis

GHunt

An OSINT tool to extract information from Google accounts, such as name, profile picture, and linked services using mini...

🔍 OSINT
#google-osint #account-investigation #information-gathering #email-reconnaissance #privacy-research

GitFive

OSINT investigation tool for GitHub that helps gather information about users, organizations, and repositories for secur...

🔍 OSINT
#github-reconnaissance #user-enumeration #information-gathering #repository-analysis #git-intelligence

GitTools

Collection of tools for finding, downloading, and extracting Git repositories from websites with exposed .git directorie...

🌐 Web 🔍 OSINT
#git-dumper #git-extractor #source-code-recovery #information-leakage #web-security

Gobuster

Fast directory/file/DNS/vhost/S3 bucket enumeration tool written in Go that helps with web application discovery and inf...

🌐 Web
#directory-enumeration #content-discovery #dns-enumeration #brute-force #reconnaissance

GodPotato

Windows local privilege escalation exploit that uses DCOM for unauthorized access escalation to SYSTEM privileges on Win...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #dcom #potato-family #windows-exploits #local-exploit

GTFOBins

Curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions and obtain priv...

🔑 PrivEsc 🐧 Linux
#privilege-escalation #binary-exploitation #linux-security #unix-binaries #security-reference

Haiti

CLI tool that identifies hash types based on their structure, supporting over 270 hash types for use in CTFs and penetra...

🔒 Crypto 🔐 Credential
#hash-identification #cryptography #password-cracking #hash-analysis #ctf-tool

Hashcat

World's fastest password recovery tool supporting multiple algorithms with advanced features like rule-based attacks and...

🔐 Credential 🔒 Crypto
#password-cracking #hash-cracking #gpu-acceleration #rule-based-attack #mask-attack

HashID

Python tool that identifies different types of hashes used to encrypt data, particularly passwords, supporting over 220 ...

🔒 Crypto 🔐 Credential
#hash-identification #cryptography #hash-analyzer #password-cracking #hash-types

Hindsight

Tool for extracting and analyzing web browsing data from Chrome, Chromium, and other Chromium-based browsers for forensi...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #chrome-analysis #web-history #digital-forensics #artifact-analysis

Holehe

Tool that checks if an email address is registered on various websites, helping to find user information across differen...

🔍 OSINT
#email-osint #account-enumeration #information-gathering #recon #email-verification

httpx

Fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library, supporting HTTP...

🌐 Web 🌐 Network
#http-probing #web-reconnaissance #url-enumeration #status-code #content-discovery

IDA Pro

Industry-standard interactive disassembler and debugger for software reverse engineering that supports multiple processo...

⚙️ Rev 🧩 Wasm
#disassembler #debugger #binary-analysis #reverse-engineering #malware-analysis

Impacket

Collection of Python classes for working with network protocols, providing programmatic access to low-level packet creat...

🌐 Network 🔓 FullPwn 🔑 PrivEsc
#network-protocols #lateral-movement #windows-protocols #authentication #remote-execution

Intelligence X

Search engine and data archive that provides access to leaked data, darknet information, and historical internet content...

🔍 OSINT 🧩 Misc
#threat-intelligence #data-search #darknet-monitoring #leaks-archive #information-gathering

JEB Decompiler

Professional reverse engineering platform that decompiles various binary formats including WASM, Android, iOS, and deskt...

⚙️ Rev 🧩 Wasm
#decompiler #reverse-engineering #wasm-analysis #binary-analysis #commercial-tool

JexBoss

JBoss verification and exploitation tool that detects and exploits vulnerabilities in JBoss Application Server and relat...

🌐 Web 🔓 FullPwn
#jboss #java-exploitation #vulnerability-scanner #server-exploitation #remote-code-execution

Joe's Sandbox

Advanced automated malware analysis platform that detects and analyzes malicious files, URLs, and other threats with det...

🔬 Forensics ⚙️ Rev
#malware-analysis #automated-analysis #threat-detection #sandbox #behavioral-analysis

John the Ripper

Popular password cracking tool that combines several cracking modes in one package, supporting hundreds of hash and ciph...

🔐 Credential 🔒 Crypto
#password-cracking #hash-cracking #brute-force #dictionary-attack #hybrid-attack

jwt_ool

Toolkit for testing, analyzing, and manipulating JSON Web Tokens for security vulnerabilities like weak signatures and i...

🌐 Web 🔒 Crypto
#jwt #web-security #token-manipulation #authentication-testing #key-cracking

JWT-Key-Recovery

A specialized tool that recovers public keys used to sign JSON Web Tokens (JWTs) for security assessment and vulnerabili...

🌐 Web 🔒 Crypto 🔑 PrivEsc
#jwt #web-security #token-analysis #cryptography #authentication-bypass #key-recovery

Kerbrute

Tool for performing Kerberos pre-auth bruteforcing, account enumeration, and password spraying against Active Directory.

🔐 Credential 🔓 FullPwn
#kerberos #password-spraying #active-directory #brute-force #authentication

LastActivityView

NirSoft utility that displays a timeline of user and system actions including file operations, application execution, an...

🪟 Windows Forensics 🔬 Forensics
#activity-timeline #system-events #user-activity #forensic-timeline #event-analysis

LaZagne

Credential recovery tool that can retrieve passwords stored on local computers from various sources including browsers, ...

🔑 PrivEsc 🔐 Credential
#password-recovery #credential-dumping #post-exploitation #information-gathering #authentication

LeakedHandlesFinder

Tool that identifies leaked process handles in Windows systems, which could potentially be exploited for privilege escal...

🔑 PrivEsc 🪟 Windows
#handle-leaks #process-handles #privilege-escalation #vulnerability-research #windows-security

LeakIX

Open platform that indexes data leaks and vulnerable services discovered through internet scanning, helping identify exp...

🔍 OSINT 🌐 Network
#data-leaks #vulnerability-discovery #exposed-services #internet-scanning #threat-intelligence

LOLBAS

Living Off The Land Binaries and Scripts - documentation of Windows binaries, scripts, and libraries that can be used fo...

🪟 Windows 🔑 PrivEsc
#living-off-the-land #windows-binaries #privilege-escalation #fileless-malware #red-team
Maltego logo

Maltego

A visual link analysis tool that connects information in meaningful ways to reveal hidden connections in data for intell...

🔍 OSINT
#information-gathering #link-analysis #data-visualization #intelligence
MetaSploit logo

MetaSploit

A penetration testing framework that makes discovering, exploiting, and sharing vulnerabilities quick and straightforwar...

💥 Pwn 🔓 FullPwn 🔑 PrivEsc 🌐 Network
#exploitation #penetration-testing #vulnerability-assessment #red-team

MFTECmd

Parser for $MFT, $Boot, $J, $SDS, and $LogFile that extracts critical file system metadata from NTFS artifacts.

🪟 Windows Forensics 💽 Disk Forensics
#mft-analysis #ntfs #file-system #timeline-analysis #metadata-extraction

Mimikatz

Powerful post-exploitation tool that extracts plaintext passwords, hashes, and Kerberos tickets from memory, among many ...

🔑 PrivEsc 🔐 Credential 🪟 Windows
#credential-dumping #pass-the-hash #kerberos #windows-security #post-exploitation

Nikto

Open source web server scanner that performs comprehensive tests against web servers for multiple vulnerabilities and se...

🌐 Web 🌐 Network
#web-scanner #vulnerability-scanner #web-security #server-testing #misconfigurations
Nmap logo

Nmap

Powerful network scanner for discovering hosts, services, and vulnerabilities on computer networks through port scanning...

🌐 Network 🔓 FullPwn
#port-scanning #network-discovery #security-auditing #host-detection
Nuclei logo

Nuclei

A fast, template-based vulnerability scanner designed to probe for security issues using its extensive library of templa...

🌐 Web 🌐 Network
#vulnerability-scanner #template-based #fast-scanning #detection

oletools

A package of Python tools to analyze Microsoft OLE2 files (Structured Storage, Compound File Binary Format) for maliciou...

🪟 Windows Forensics 🧩 Misc
#document-analysis #malware-analysis #ole #microsoft-office #vba-macros

OneForAll

Powerful subdomain enumeration tool that integrates multiple data sources and methods to find as many subdomains as poss...

🔍 OSINT 🌐 Web
#subdomain-enumeration #passive-reconnaissance #information-gathering #dns-discovery #web-security

Pacu

Open-source AWS exploitation framework designed for offensive security testing against cloud environments with numerous ...

☁️ Cloud 🔑 PrivEsc 🔓 FullPwn
#aws-security #cloud-security #penetration-testing #cloud-exploitation #red-team

PasswordFox

NirSoft tool that extracts the stored usernames and passwords from Mozilla Firefox profiles, useful for forensic investi...

🪟 Windows Forensics 🔐 Credential
#firefox #password-recovery #credential-extraction #browser-forensics #password-dumping

PayloadsAllTheThings

Collection of payloads, bypass techniques, and methodologies for various security scenarios including web app security, ...

🌐 Web 🔑 PrivEsc 🧩 Misc
#payloads #bypass-techniques #web-security #pentest-cheatsheet #exploitation

pdfly

Python library for analyzing and extracting information from PDF documents, useful for forensic analysis and malicious P...

🔬 Forensics 🧩 Misc
#pdf-analysis #document-forensics #malware-detection #metadata-extraction #file-analysis

PECmd

Prefetch parser that extracts execution artifacts from Windows Prefetch files to determine program execution history and...

🪟 Windows Forensics 🪟 Windows
#prefetch #execution-history #program-execution #windows-artifacts #user-activity

PetitPotam

PoC exploit tool that forces Windows domain controllers to authenticate to arbitrary NTLM relays using MS-EFSRPC protoco...

🔑 PrivEsc 🪟 Windows 🔓 FullPwn
#ntlm-relay #active-directory #authentication #lateral-movement #domain-compromise

pkcrack

Tool for breaking PkZip encryption using known-plaintext attacks, useful for recovering password-protected zip archives ...

🔒 Crypto 🔍 Stego
#zip-cracking #encryption-breaking #known-plaintext-attack #password-recovery #archive-analysis

pngtools

Suite of tools for working with PNG images, allowing manipulation, analysis, and extraction of metadata and hidden conte...

🔍 Stego 🔬 Forensics
#png-analysis #metadata-extraction #image-manipulation #steganography #data-hiding

PowerSploit

PowerShell-based post-exploitation framework with modules for privilege escalation, reconnaissance, and exfiltration in ...

🪟 Windows 🔑 PrivEsc 🔓 FullPwn 🔐 Credential
#powershell #post-exploitation #privilege-escalation #reconnaissance #lateral-movement

pspy

Unprivileged Linux process snooper that allows monitoring processes without root permissions, useful for privilege escal...

🔑 PrivEsc 🐧 Linux
#process-monitoring #privilege-escalation #linux-security #system-monitoring #unprivileged-execution

PUK

Python Utilities Kit that provides a collection of utility functions for security professionals, including data manipula...

🧩 Misc 🔑 PrivEsc
#python-utilities #security-tools #data-manipulation #cli-utilities #security-testing

Pwndbg

A GDB plug-in that makes debugging with GDB easier while doing exploit development, providing enhanced disassembly, memo...

⚙️ Rev 💥 Pwn
#gdb-extension #debugging #exploit-development #binary-analysis #memory-analysis #reverse-engineering

Pwntools

CTF framework and exploit development library for Python that simplifies the process of writing exploits and interacting...

💥 Pwn
#exploit-development #ctf-framework #binary-exploitation #rop-chains #shellcoding

pypykatz

Pure Python implementation of Mimikatz capable of extracting credentials from Windows memory dumps without requiring Win...

🔐 Credential 🪟 Windows 🧠 Memory Forensics
#mimikatz #credential-dumping #memory-analysis #windows-security #post-exploitation

pyWhisker

Tool for manipulating Shadow Credentials in Active Directory to perform resource-based constrained delegation attacks.

🪟 Windows 🔑 PrivEsc 🔐 Credential
#active-directory #shadow-credentials #delegation-attacks #windows-security #credential-abuse

Radare2

Open-source reverse engineering framework providing disassembly, debugging, analysis, and manipulation of binary files.

⚙️ Rev
#disassembler #debugger #binary-analysis #reverse-engineering #hex-editor

RegCool

Advanced Windows Registry editor with enhanced features for searching, comparing, and modifying registry structures for ...

🪟 Windows Forensics 🪟 Windows
#registry-editor #windows-registry #forensic-analysis #system-configuration #evidence-collection

RsaCtfTool

Tool for attacking RSA encryption in CTF challenges, supporting various attack methods against weak keys and implementat...

🔒 Crypto 🔑 PrivEsc
#rsa-attacks #cryptography #key-recovery #ctf-tool #encryption-attacks

Rubeus

C# toolset for raw Kerberos interaction and abuses, useful for attacking Kerberos in Active Directory environments.

🔑 PrivEsc 🔐 Credential 🪟 Windows
#kerberos #active-directory #ticket-attacks #authentication #lateral-movement

SCCMHound

Tool for identifying privilege escalation opportunities in Microsoft's System Center Configuration Manager (SCCM) enviro...

🪟 Windows 🔑 PrivEsc 🌐 Network
#sccm #active-directory #privilege-escalation #configuration-manager #lateral-movement

SecLists

Collection of multiple types of lists used during security assessments, including usernames, passwords, URLs, sensitive ...

🧩 Misc 🌐 Web 🔓 FullPwn 🔐 Credential
#wordlists #password-lists #content-discovery #penetration-testing

SecurityQuestionsView

NirSoft utility that reveals the security questions and answers stored by Windows 10 for local user accounts, useful for...

🪟 Windows Forensics 🔐 Credential
#security-questions #credential-recovery #windows-security #account-information #password-recovery

SharpUp

C# port of PowerUp privilege escalation checks that helps identify potential privilege escalation vectors on Windows sys...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #enumeration #windows-security #post-exploitation #ghostpack

Shodan

Search engine for internet-connected devices, services, and systems, allowing users to find specific types of computers ...

🔍 OSINT 🌐 Network
#device-discovery #internet-scanning #vulnerability-intelligence #attack-surface-analysis #iot-search

SilentEye

Steganography tool that embeds and extracts data from image and audio files using LSB (Least Significant Bit) techniques...

🔍 Stego
#steganography #lsb #data-hiding #image-steganography #audio-steganography

Slack-Parser

Tool for extracting and analyzing data from Slack workspaces, including messages, files, and user information for forens...

🔬 Forensics 🔍 OSINT
#slack-analysis #message-extraction #digital-forensics #communication-analysis #evidence-collection

SmartDeblur

Tool for fixing blurry, defocused, and motion-blurred images using deconvolution algorithms and specialized filters.

🔍 Stego 🔬 Forensics
#image-processing #deblurring #forensic-analysis #image-enhancement #photo-recovery

Sonic Visualiser

Application for viewing and analyzing the contents of audio files, revealing hidden patterns and data through visualizat...

🔍 Stego 🧩 Misc
#audio-analysis #spectral-analysis #waveform-visualization #steganography #frequency-analysis

SQLMap

Automatic SQL injection and database takeover tool that detects, exploits, and extracts data from vulnerable web applica...

🌐 Web 🔓 FullPwn
#sql-injection #database-exploitation #penetration-testing #web-security #automated-exploitation

StegCloak

Tool for hiding text within text using invisible unicode characters, allowing steganography with no visible changes to t...

🔍 Stego
#text-steganography #unicode-hiding #invisible-characters #message-concealment #cryptography

StegoVeritas

Comprehensive steganography tool that automates the process of detecting and extracting hidden information from image fi...

🔍 Stego
#steganography #image-analysis #data-extraction #automated-tool #multi-format

Stegseek

Lightning fast steganography cracker that detects hidden data in files protected with steghide, significantly faster tha...

🔍 Stego
#steganography #password-cracking #data-extraction #image-analysis #brute-force

stegsnow

Tool for hiding messages in ASCII text by appending whitespace characters, creating steganography that's virtually invis...

🔍 Stego
#text-steganography #whitespace-hiding #data-concealment #information-hiding #message-encryption

SweetPotato

Local privilege escalation tool that combines different known Windows privilege escalation techniques with a focus on se...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #potato-family #service-accounts #windows-exploits #local-exploit

TotalRecall

An incident response Swiss Army knife that automates memory forensics, event log analysis, and system artifact collectio...

🪟 Windows Forensics 🧠 Memory Forensics
#incident-response #memory-acquisition #triage #evidence-collection #forensic-analysis

TreeHouse-Wordlists

Comprehensive collection of wordlists organized by categories for various security testing scenarios including passwords...

🔐 Credential 🌐 Web 🧩 Misc
#wordlists #password-lists #brute-force #directory-enumeration #username-lists

TruffleHog

Advanced secret scanning tool that finds credentials, API keys, and other sensitive information in Git repositories and ...

🔍 OSINT 🌐 Web 🔐 Credential
#secret-scanning #credential-detection #git-scanning #api-keys #data-exposure

unredacter

A tool that reverses pixelation/blurring to reveal redacted information in images and documents through machine learning...

🧩 Misc 🔍 OSINT
#deblurring #image-analysis #redaction-reversal #privacy-research #machine-learning

USB Detective

Forensic tool for analyzing USB device artifacts and history on Windows systems, helping track USB activity and data tra...

🪟 Windows Forensics 🔬 Forensics
#usb-forensics #device-history #windows-artifacts #digital-forensics #removable-media

USBDeview

NirSoft tool that lists all USB devices currently connected or previously connected to the system, providing detailed in...

🪟 Windows Forensics 🔬 Forensics
#usb-devices #device-history #windows-artifacts #digital-forensics #hardware-enumeration

username-anarchy

Tool for generating username lists from real names to use in security assessments, supporting various username formats a...

🔍 OSINT 🔐 Credential
#username-generation #user-enumeration #brute-force #identity-research #reconnaissance

VaultPasswordView

NirSoft utility that extracts and displays passwords stored in the Windows Credential Manager vault, including web crede...

🪟 Windows Forensics 🔐 Credential
#credential-manager #password-extraction #windows-vault #stored-credentials #credential-recovery
Volatility2 logo

Volatility2

Classic memory forensics framework (version 2) for analyzing RAM dumps with Python 2 compatibility and a robust plugin e...

🧠 Memory Forensics 🪟 Windows Forensics
#memory-analysis #incident-response #malware-detection #forensics #legacy-tool
Volatility3 logo

Volatility3

Rewritten memory forensics framework with improved performance, object-oriented architecture, and Python 3 support for m...

🧠 Memory Forensics 🪟 Windows Forensics
#memory-analysis #incident-response #malware-detection #forensics #modern-framework

WABT

The WebAssembly Binary Toolkit providing tools to translate between WebAssembly text and binary formats, with focus on w...

⚙️ Rev 🧩 Wasm
#wasm-tools #binary-translation #wasm2c #webassembly #binary-analysis

WADComs

Interactive cheat sheet of commands for Windows/AD security assessments and privilege escalation, organized by attack te...

🪟 Windows 🔑 PrivEsc
#windows-commands #active-directory #cheat-sheet #privilege-escalation #lateral-movement

WayMore

Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!

🌐 Web 🔍 OSINT
#web-reconnaissance #web-security #content-discovery #historical-data #url-discovery #passive-reconnaissance

WebBrowserPassView

NirSoft password recovery tool that reveals saved passwords from multiple web browsers including Chrome, Firefox, Opera,...

🪟 Windows Forensics 🔐 Credential
#password-recovery #credential-extraction #browser-forensics #saved-passwords #digital-forensics

wfuzz

Web application fuzzer that can be used to find resources, discover parameters, and identify vulnerabilities in web appl...

🌐 Web
#fuzzing #web-security #parameter-discovery #content-discovery

Wifite

Automated wireless attack tool designed to simplify WiFi penetration testing by automating attacks against multiple wire...

🌐 Network 🔐 Credential 🔓 FullPwn
#wifi-cracking #wireless-security #automated-attacks #wpa #network-penetration

WiGLE

Database and mapping platform of wireless networks with statistics and information gathered by community wardriving and ...

🔍 OSINT 🌐 Network
#wifi-mapping #wireless-networks #geolocation #wardriving #network-discovery

WinPrefetchView

NirSoft utility that reads the prefetch files stored in Windows, providing insights into application execution history a...

🪟 Windows Forensics 🔬 Forensics
#prefetch-analysis #execution-history #windows-artifacts #application-tracking #digital-forensics

WirelessKeyView

NirSoft utility that recovers all wireless network security keys/passwords stored on the computer by the Wireless Zero C...

🪟 Windows Forensics 🔐 Credential
#wifi-passwords #wireless-keys #credential-recovery #network-passwords #password-extraction
Wireshark logo

Wireshark

The world's foremost network protocol analyzer that lets you see what's happening on your network at a microscopic level...

📡 Network Forensics 🌐 Network
#packet-analysis #network-monitoring #traffic-inspection #forensics

WPScan

WordPress security scanner that identifies vulnerabilities, enumerates users, plugins, themes, and performs brute force ...

🌐 Web 🔓 FullPwn
#wordpress #cms-scanner #vulnerability-scanner #web-security #enumeration

ysoserial

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization, allowing remote code ex...

🌐 Web
#deserialization #java-deserialization #payload-generator #rce #serialization-attacks #security-testing

ysoserial.net

A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization, enabling remote code ex...

🌐 Web
#deserialization #.net-deserialization #payload-generator #rce #serialization-attacks #security-testing #gadget-chains

zsteg

Tool for detecting hidden data in PNG and BMP images using various steganography techniques with focus on the least sign...

🔍 Stego
#steganography #png-analysis #bmp-analysis #lsb-detection #data-extraction