Security Tools

Explore our collection of 200 tools for cybersecurity professionals and enthusiasts curated by the members and executives of MQCyberSec.

Please note to use these tools responsibly. MQCyberSec is not responsible for any misuse of these tools. Don't be evil.
Search Tips: Type to search by tool name or description. Use #tag to search by specific tags. Matching text will be highlighted as you type.

Filter by Subcategory

Aircrack-ng

Network security suite for monitoring, attacking, testing, and cracking WiFi networks with tools for all aspects of WiFi...

🌐 Network 🔐 Credential 🔓 FullPwn
#wifi-cracking #wireless-security #wep #wpa #network-analysis

Amass

In-depth attack surface mapping and asset discovery tool that performs network mapping of attack surfaces and external a...

🔍 OSINT 🌐 Network 🌐 Web
#subdomain-enumeration #attack-surface-mapping #reconnaissance #information-gathering #asset-discovery

Angr

Powerful binary analysis framework for symbolic execution and program state exploration that automates vulnerability dis...

⚙️ Rev 💥 Pwn
#symbolic-execution #binary-analysis #vulnerability-research #automated-exploitation #program-analysis

Aperi'Solve

Online platform that performs multiple automated steganography analysis tools on uploaded images to reveal hidden data.

🔍 Stego
#steganography #image-analysis #online-tool #data-extraction #multiple-techniques

Arjun

HTTP parameter discovery suite designed to find hidden GET and POST parameters in web applications.

🌐 Web
#parameter-discovery #web-reconnaissance #api-scanning #web-security #penetration-testing #http-enumeration

ASNLookup

Tool that retrieves organizations' Autonomous System Numbers (ASNs) and their network ranges to help identify additional...

🔍 OSINT 🌐 Network
#asn-lookup #network-ranges #ip-intelligence #scope-expansion #reconnaissance

AssetRipper

Tool for extracting assets from Unity games and projects, capable of recreating source code and unpacking resource files...

⚙️ Rev 🎮 Games
#unity #game-hacking #asset-extraction #reverse-engineering #game-modding #resource-unpacking
Autopsy logo

Autopsy

A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools, designed for d...

🔬 Forensics 💽 Disk Forensics
#disk-analysis #file-recovery #timeline-analysis #forensics

AutoVolatility

Script to run multiple Volatility plugins simultaneously, streamlining memory forensics analysis by automating common ta...

🧠 Memory Forensics
#volatility #memory-analysis #forensics #automation #plugins

AWS Exposable Resources

List of AWS resources that can be publicly exposed or shared with untrusted accounts, focusing on resource policies, sha...

☁️ Cloud
#aws #cloud-security #resource-policy #security #configuration

bettercap

The Swiss Army knife for WiFi, Bluetooth Low Energy, wireless HID hijacking, CAN-bus and IPv4 and IPv6 networks reconnai...

🌐 Network
#networking #wireless-networking

Binary Ninja

Interactive binary analysis platform with powerful disassembly, decompilation, and graphing capabilities for reverse eng...

⚙️ Rev 🧩 Wasm
#binary-analysis #disassembler #decompiler #reverse-engineering #commercial-tool

Binwalk

Firmware analysis tool that scans binary files for embedded files and executable code, essential for IoT device analysis...

⚙️ Rev 🔌 Firmware
#firmware-analysis #embedded-files #binary-extraction #iot-security #reverse-engineering

BitTorrent Traffic Analyzer

Tool for analyzing network traffic to identify and extract information from BitTorrent protocol communications.

📡 Network Forensics 🌐 Network
#traffic-analysis #bittorrent #network-forensics #data-extraction #protocol-analysis

BlockchainSQL

Tool that allows querying blockchain wallets and transactions using SQL-like syntax for cryptocurrency investigations an...

🔗 Blockchain 🔍 OSINT
#blockchain-analysis #cryptocurrency #wallet-investigation #transaction-analysis #sql-querying
Bloodhound logo

Bloodhound

A graphical interface that uses graph theory to reveal hidden and often unintended relationships within Active Directory...

🔓 FullPwn 🪟 Windows 🔑 PrivEsc 🌐 Network
#active-directory #attack-path #privilege-escalation #reconnaissance

BrowserHistoryView

NirSoft utility that displays the browsing history of multiple web browsers, allowing forensic investigators to examine ...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #history-analysis #web-artifacts #digital-forensics #browser-history

BrowsingHistoryView

NirSoft utility that displays browsing history databases from multiple browsers, providing a consolidated view for foren...

🪟 Windows Forensics 🔬 Forensics
#browser-history #web-forensics #artifact-analysis #digital-forensics #web-history
Burp Suite logo

Burp Suite

An integrated platform for performing security testing of web applications, featuring a proxy server, scanner, intruder,...

🌐 Web
#web-proxy #vulnerability-scanning #penetration-testing #web-security

Can I Take Over XYZ

Reference guide for subdomain takeover vulnerabilities, listing vulnerable services and providers.

🌐 Web 🔍 OSINT
#subdomain-takeover #vulnerability-reference #dns-configuration #bug-bounty #attack-surface

Censys

Search engine and attack surface management platform that continuously monitors the internet to find exposures before at...

🔍 OSINT 🌐 Network
#attack-surface-monitoring #internet-scanning #certificate-search #asset-discovery #security-monitoring

CF-Hero

A Cloudflare security testing framework.

🌐 Web
#cloudflare #security #framework #testing

ChromeCacheView

NirSoft utility that displays the contents of the Chrome web browser cache, allowing investigators to examine cached fil...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #cache-analysis #chrome #digital-forensics #web-artifacts

ChromeKatz

Tool for extracting passwords from Chrome browser, functioning as a standalone alternative to Mimikatz's dpapi::chrome m...

🔐 Credential 🪟 Windows
#browser-exploitation #password-recovery #chrome #credential-dumping #post-exploitation

chucker

An HTTP inspector for Android & OkHTTP (like Charles but on device)

📱 Mobile
#mobile-security #mobile-networking

Ciphey

Automated decryption tool using artificial intelligence to decipher encrypted text, excelling in various ciphers and enc...

🔒 Crypto
#decryption #ai #cipher #encoding #security

Coppersmith

Implementation of Coppersmith's algorithm for finding small roots of polynomial equations, useful in attacking cryptogra...

🔒 Crypto
#coppersmith #cryptography #polynomials #number-theory #attacks

CredHistView

NirSoft tool for displaying the password history of Windows credentials stored by the Credential History feature, reveal...

🪟 Windows Forensics 🔐 Credential
#password-history #credential-forensics #windows-security #authentication-history #credential-analysis

crt.sh

Certificate Transparency search tool that allows searching and monitoring SSL/TLS certificates for domains.

🔍 OSINT 🌐 Web 🔒 Crypto
#certificate-transparency #subdomain-enumeration #ssl-certificates #reconnaissance #passive-recon

Crypto-attacks

Framework containing implementations of various cryptographic attacks, providing tools for breaking cryptographic scheme...

🔒 Crypto
#cryptography #attacks #framework #security #vulnerabilities

Cryptographic-Attacks

Collection of various cryptographic attacks, focusing on implementations and theoretical vulnerabilities in cryptographi...

🔒 Crypto
#cryptography #attacks #vulnerabilities #algorithms #security

CSP Evaluator

Tool by Google that helps developers and security experts analyze Content Security Policies for security vulnerabilities...

🌐 Web
#csp-analysis #content-security-policy #web-security #security-headers #policy-review

CSPBypass

Tool that demonstrates bypass techniques for Content Security Policy (CSP) restrictions on websites, useful for security...

🌐 Web
#csp-bypass #content-security-policy #web-security #xss #security-testing

CSPrecon

Tool for finding all the resources loaded by a domain to detect possible Content Security Policy bypasses.

🌐 Web 🔍 OSINT
#csp-bypass #web-security #content-security-policy #reconnaissance #security-headers

CTF-Crypto

Collection of cryptographic challenges and solutions from Capture The Flag (CTF) competitions, covering a wide range of ...

🔒 Crypto
#ctf #cryptography #challenges #security #writeups

CTFR

Abuses Certificate Transparency logs to retrieve subdomains from a target domain, providing valuable reconnaissance data...

🔍 OSINT 🌐 Web
#subdomain-enumeration #certificate-transparency #reconnaissance #information-gathering #passive-recon

CyberChef

Web app for encryption, encoding, compression and data analysis, offering a simple interface for complex operations on d...

🔒 Crypto 🔍 Stego 🧩 Misc
#data-manipulation #encoding #encryption #forensics #data-analysis

dCode

Collection of cryptographic, mathematical, and puzzle-solving tools for decryption, encoding/decoding, and solving vario...

🔒 Crypto 🧩 Misc
#cipher-solver #decoder #cryptography #code-breaker #multi-tool

DCOMPotato

Windows local privilege escalation exploit that leverages DCOM for unauthorized privilege elevation on vulnerable system...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #dcom #potato-family #windows-exploits #local-exploit

de4dot

.NET deobfuscator and unpacker designed to undo the effects of various .NET code obfuscators, helping with malware analy...

⚙️ Rev 🪟 Windows
#dotnet-deobfuscator #decompilation #malware-analysis #code-unpacker #reverse-engineering

DeepSound

Audio steganography tool that hides secret data inside audio files with support for various audio formats and encryption...

🔍 Stego
#audio-steganography #data-hiding #encryption #file-embedding #information-concealment

DetectItEasy

Program for determining file types, compilers, and packers used in binary executables with support for multiple formats ...

⚙️ Rev 🧩 Misc
#file-analysis #binary-identification #packer-detection #compiler-detection #file-signatures

DNSDumpster

Free domain research tool that discovers hosts related to a domain through DNS records, finding subdomains and related d...

🔍 OSINT 🌐 Web
#dns-reconnaissance #subdomain-discovery #passive-scanning #domain-research #information-gathering

dnSpy

.NET debugger and assembly editor that enables debugging and editing of .NET applications even without source code, supp...

⚙️ Rev 🪟 Windows
#dotnet-debugger #assembly-editor #decompiler #reverse-engineering #code-analysis

Dogbolt

Online decompiler explorer that compares the output of various decompilers against the same binary to aid in reverse eng...

⚙️ Rev
#decompiler #binary-analysis #reverse-engineering #code-analysis #web-based

dotPeek

Free .NET decompiler and assembly browser from JetBrains that reconstructs source code from compiled assemblies with hig...

⚙️ Rev 🪟 Windows
#dotnet-decompiler #assembly-browser #source-recovery #reverse-engineering #code-analysis

DriveFS-Sleuth

Forensic tool for analyzing Google Drive File Stream artifacts on Windows systems to recover file metadata and activity ...

🪟 Windows Forensics 🔬 Forensics ☁️ Cloud
#google-drive #cloud-forensics #digital-forensics #file-stream #artifact-analysis

DS_Store_exp

Tool to parse and extract information from .DS_Store files, which can reveal directory structures and filenames on macOS...

🔍 OSINT 🌐 Web
#ds-store #information-disclosure #macos-artifacts #directory-enumeration #web-reconnaissance

ECC Attacks

Repository of known attacks on Elliptic Curve Cryptography (ECC), covering ECDH and ECDSA vulnerabilities, with explanat...

🔒 Crypto
#ecc #cryptography #ecdsa #ecdh #security #vulnerabilities

EditThisCookie2

Browser extension for managing, editing, and exporting browser cookies; useful for web development, testing, and securit...

🌐 Web
#cookie-management #browser-extension #web-development #security-testing

EfsPotato

Windows privilege escalation exploit that abuses the Encrypting File System Remote Protocol (MS-EFSRPC) to gain SYSTEM p...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #efs #potato-family #windows-exploits #local-exploit

Epieos

OSINT platform for retrieving information about email addresses, social media accounts, and other digital identities for...

🔍 OSINT
#email-osint #account-discovery #digital-footprint #reconnaissance #investigation-tool

Evil-WinRM

Ultimate WinRM shell for hacking/pentesting that leverages PowerShell features for Windows Remote Management exploitatio...

🪟 Windows 🌐 Network 💥 Pwn
#winrm #powershell #lateral-movement #active-directory #pentesting #privilege-escalation #remote-access

EvtxECmd

Windows Event Log parser that processes .evtx files and outputs CSV or JSON with comprehensive event data for forensic a...

🪟 Windows Forensics 🪟 Windows
#event-logs #evtx #log-parsing #windows-events #incident-response

ExifTool

Powerful metadata extraction and manipulation tool that reads, writes, and edits metadata in a wide variety of files.

🔍 OSINT 🔍 Stego 🔬 Forensics
#metadata-analysis #exif-data #forensic-analysis #image-analysis #information-gathering

FactorDB

Online database for integer factorization that stores known factorizations of numbers and provides an interface for fact...

🔒 Crypto 🧩 Misc
#factorization #cryptanalysis #number-theory #prime-numbers #mathematical-tools

feroxbuster

A fast, simple, recursive content discovery tool written in Rust designed to enumerate hidden resources in web applicati...

🌐 Web
#content-discovery #fuzzing #directory-brute-force #web-security

ffuf

A fast web fuzzer written in Go that allows for fuzzing of various parts of HTTP requests to discover content, parameter...

🌐 Web
#fuzzing #content-discovery #parameter-discovery #web-security

firefox_decrypt

Command-line tool to extract passwords from Firefox/Thunderbird profiles using NSS library, supporting master password d...

🔐 Credential 🔬 Forensics 📡 Network Forensics
#password-recovery #browser-credentials #firefox #thunderbird #password-extraction #profile-analysis #nss

FireMaster

Tool to recover forgotten master passwords in Firefox and other Mozilla-based applications, enabling access to saved cre...

🔐 Credential 🪟 Windows 🔬 Forensics
#password-recovery #browser-credentials #forensic-analysis #data-extraction #credential-dumping

Flask-Session-Cookie-Manager

Tool for Flask session cookie manipulation that allows decoding and creating secure Flask session cookies for security t...

🌐 Web 🔒 Crypto
#flask #session-manipulation #cookie-analysis #web-security #web-authentication

FontForge

Open-source font editor that can be used in forensics to analyze and extract data from font files, or create steganograp...

🔍 Stego 🧩 Misc
#font-analysis #font-editing #steganography #data-hiding #forensic-analysis

Foremost

Digital forensics tool for file carving and data recovery that can extract files from disk images based on headers, foot...

💽 Disk Forensics 🔬 Forensics 🔍 Stego
#file-carving #data-recovery #forensic-analysis #file-extraction #disk-analysis

Frida

Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers to inject JavaScript into na...

⚙️ Rev 📱 Mobile
#dynamic-instrumentation #runtime-manipulation #hooking #mobile-security #application-analysis

FTK Imager

Forensic imaging tool for creating forensically sound duplicates of digital evidence, previewing recoverable data, and m...

💽 Disk Forensics 🪟 Windows Forensics
#disk-imaging #evidence-acquisition #forensic-analysis #data-preview #commercial-tool

Gadget Inspector

Inspects Java libraries and classpaths for gadget chains used to construct exploits for deserialization vulnerabilities.

⚙️ Rev
#java #deserialization #vulnerability #gadget-chain #security

GDB

The GNU Project Debugger allows you to see what's happening inside a program while it executes, analyze memory, and trac...

⚙️ Rev 💥 Pwn
#debugging #binary-analysis #reverse-engineering #exploit-development

GDSDecomp

Godot engine project recovery tool that extracts/decompiles games, recovers original source code, and converts binary re...

⚙️ Rev 🎮 Games
#godot #decompiler #game-hacking #reverse-engineering #asset-extraction #pck-extraction #project-recovery #gdscript
Ghidra logo

Ghidra

A software reverse engineering framework developed by NSA that helps analyze malicious code and malware, featuring a dis...

⚙️ Rev 💥 Pwn 🔒 Crypto
#reverse-engineering #binary-analysis #decompiler #malware-analysis

GHunt

An OSINT tool to extract information from Google accounts, such as name, profile picture, and linked services using mini...

🔍 OSINT
#google-osint #account-investigation #information-gathering #email-reconnaissance #privacy-research

GitFive

OSINT investigation tool for GitHub that helps gather information about users, organizations, and repositories for secur...

🔍 OSINT
#github-reconnaissance #user-enumeration #information-gathering #repository-analysis #git-intelligence

GitHub Subdomains

Tool that searches for subdomains in GitHub repositories content using GitHub API.

🔍 OSINT 🌐 Web
#subdomain-enumeration #github-api #reconnaissance #information-gathering #passive-recon

GitLab Subdomains

Tool that searches for subdomains in GitLab repositories content using GitLab API.

🔍 OSINT 🌐 Web
#subdomain-enumeration #gitlab-api #reconnaissance #information-gathering #passive-recon

Gitleaks

Gitleaks is a tool for detecting secrets like passwords, API keys, and tokens in git repos, files, and whatever else you...

🔐 Credential
#secret-finding #credentials

GitTools

Collection of tools for finding, downloading, and extracting Git repositories from websites with exposed .git directorie...

🌐 Web 🔍 OSINT
#git-dumper #git-extractor #source-code-recovery #information-leakage #web-security

Gobuster

Fast directory/file/DNS/vhost/S3 bucket enumeration tool written in Go that helps with web application discovery and inf...

🌐 Web
#directory-enumeration #content-discovery #dns-enumeration #brute-force #reconnaissance

GodPotato

Windows local privilege escalation exploit that uses DCOM for unauthorized access escalation to SYSTEM privileges on Win...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #dcom #potato-family #windows-exploits #local-exploit

GoReSym

Reverse engineering tool for extracting symbol information from Go binaries to assist with malware analysis and vulnerab...

⚙️ Rev 🔬 Forensics
#golang #reverse-engineering #symbol-recovery #malware-analysis #binary-analysis #debugging

GTFOBins

Curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions and obtain priv...

🔑 PrivEsc 🐧 Linux
#privilege-escalation #binary-exploitation #linux-security #unix-binaries #security-reference

HackTricks

Comprehensive hacking resource containing techniques, tools, and methodologies for penetration testing and security asse...

🧩 Misc 🌐 Web 🌐 Network 💥 Pwn 🔑 Privesc
#penetration-testing #hacking-techniques #security-research #cheatsheet #knowledge-base #ctf #red-team #reference

Haiti

CLI tool that identifies hash types based on their structure, supporting over 270 hash types for use in CTFs and penetra...

🔒 Crypto 🔐 Credential
#hash-identification #cryptography #password-cracking #hash-analysis #ctf-tool

Hashcat

World's fastest password recovery tool supporting multiple algorithms with advanced features like rule-based attacks and...

🔐 Credential 🔒 Crypto
#password-cracking #hash-cracking #gpu-acceleration #rule-based-attack #mask-attack

HashID

Python tool that identifies different types of hashes used to encrypt data, particularly passwords, supporting over 220 ...

🔒 Crypto 🔐 Credential
#hash-identification #cryptography #hash-analyzer #password-cracking #hash-types

Hindsight

Tool for extracting and analyzing web browsing data from Chrome, Chromium, and other Chromium-based browsers for forensi...

🪟 Windows Forensics 🔬 Forensics
#browser-forensics #chrome-analysis #web-history #digital-forensics #artifact-analysis

Holehe

Tool that checks if an email address is registered on various websites, helping to find user information across differen...

🔍 OSINT
#email-osint #account-enumeration #information-gathering #recon #email-verification

httpx

Fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library, supporting HTTP...

🌐 Web 🌐 Network
#http-probing #web-reconnaissance #url-enumeration #status-code #content-discovery

Hurricane Electric BGP Toolkit

BGP routing and network intelligence tool providing information about autonomous systems, IP addresses, and network rela...

🌐 Network 🔍 OSINT
#bgp #autonomous-systems #network-intelligence #reconnaissance #routing-information

IDA Pro

Industry-standard interactive disassembler and debugger for software reverse engineering that supports multiple processo...

⚙️ Rev 🧩 Wasm
#disassembler #debugger #binary-analysis #reverse-engineering #malware-analysis

Impacket

Collection of Python classes for working with network protocols, providing programmatic access to low-level packet creat...

🌐 Network 🔓 FullPwn 🔑 PrivEsc
#network-protocols #lateral-movement #windows-protocols #authentication #remote-execution

Intelligence X

Search engine and data archive that provides access to leaked data, darknet information, and historical internet content...

🔍 OSINT 🧩 Misc
#threat-intelligence #data-search #darknet-monitoring #leaks-archive #information-gathering

JADX

Command line and GUI tools for producing Java source code from Android Dex and Apk files.

📱 Mobile
#mobile-security #android

JEB Decompiler

Professional reverse engineering platform that decompiles various binary formats including WASM, Android, iOS, and deskt...

⚙️ Rev 🧩 Wasm
#decompiler #reverse-engineering #wasm-analysis #binary-analysis #commercial-tool

JexBoss

JBoss verification and exploitation tool that detects and exploits vulnerabilities in JBoss Application Server and relat...

🌐 Web 🔓 FullPwn
#jboss #java-exploitation #vulnerability-scanner #server-exploitation #remote-code-execution

Joe's Sandbox

Advanced automated malware analysis platform that detects and analyzes malicious files, URLs, and other threats with det...

🔬 Forensics ⚙️ Rev
#malware-analysis #automated-analysis #threat-detection #sandbox #behavioral-analysis

John the Ripper

Popular password cracking tool that combines several cracking modes in one package, supporting hundreds of hash and ciph...

🔐 Credential 🔒 Crypto
#password-cracking #hash-cracking #brute-force #dictionary-attack #hybrid-attack

jwt_tool

Toolkit for testing, analyzing, and manipulating JSON Web Tokens for security vulnerabilities like weak signatures and i...

🌐 Web 🔒 Crypto
#jwt #web-security #token-manipulation #authentication-testing #key-cracking

JWT-Key-Recovery

A specialized tool that recovers public keys used to sign JSON Web Tokens (JWTs) for security assessment and vulnerabili...

🌐 Web 🔒 Crypto 🔑 PrivEsc
#jwt #web-security #token-analysis #cryptography #authentication-bypass #key-recovery

JWT.io

Online tool for decoding, verifying, and generating JSON Web Tokens (JWTs); enables secure inspection and debugging of J...

🌐 Web
#jwt #token-decoder #authentication #security #debugging

Kerbrute

Tool for performing Kerberos pre-auth bruteforcing, account enumeration, and password spraying against Active Directory.

🔐 Credential 🔓 FullPwn
#kerberos #password-spraying #active-directory #brute-force #authentication

LastActivityView

NirSoft utility that displays a timeline of user and system actions including file operations, application execution, an...

🪟 Windows Forensics 🔬 Forensics
#activity-timeline #system-events #user-activity #forensic-timeline #event-analysis

LaZagne

Credential recovery tool that can retrieve passwords stored on local computers from various sources including browsers, ...

🔑 PrivEsc 🔐 Credential
#password-recovery #credential-dumping #post-exploitation #information-gathering #authentication

ldapsearch

Command-line utility for querying LDAP directory servers and retrieving information from Active Directory environments.

🌐 Network 🪟 Windows
#ldap #active-directory #enumeration #directory-services #reconnaissance #information-gathering #authentication

LeakedHandlesFinder

Tool that identifies leaked process handles in Windows systems, which could potentially be exploited for privilege escal...

🔑 PrivEsc 🪟 Windows
#handle-leaks #process-handles #privilege-escalation #vulnerability-research #windows-security

LeakIX

Open platform that indexes data leaks and vulnerable services discovered through internet scanning, helping identify exp...

🔍 OSINT 🌐 Network
#data-leaks #vulnerability-discovery #exposed-services #internet-scanning #threat-intelligence

LLM Security

Resources and guidance on security risks and vulnerabilities related to Large Language Models (LLMs) and AI applications...

AI
#llm #security #ai #machine-learning #vulnerability

LMFDB

Comprehensive database of mathematical objects related to L-functions, modular forms, and related number theory objects,...

🔒 Crypto 🧩 Misc
#number-theory #mathematical-database #modular-forms #l-functions #cryptanalysis

LOLBAS

Living Off The Land Binaries and Scripts - documentation of Windows binaries, scripts, and libraries that can be used fo...

🪟 Windows 🔑 PrivEsc
#living-off-the-land #windows-binaries #privilege-escalation #fileless-malware #red-team

Maigret

Tool for collecting a dossier on a person by username only, retrieving accounts from a large number of sites.

🔍 OSINT
#osint #username #reconnaissance #social-media #profiling
Maltego logo

Maltego

A visual link analysis tool that connects information in meaningful ways to reveal hidden connections in data for intell...

🔍 OSINT
#information-gathering #link-analysis #data-visualization #intelligence

MelonLoader

The World's First Universal Mod Loader for Unity Games compatible with both Il2Cpp and Mono.

🎮 Games
#game-modding #reverse-engineering

MemProcFS

Memory analysis toolkit exposing physical memory as a filesystem, enabling live memory forensics, extraction, and analys...

🧠 Memory Forensics
#memory-analysis #forensics #windows #filesystem #live-analysis
MetaSploit logo

MetaSploit

A penetration testing framework that makes discovering, exploiting, and sharing vulnerabilities quick and straightforwar...

💥 Pwn 🔓 FullPwn 🔑 PrivEsc 🌐 Network
#exploitation #penetration-testing #vulnerability-assessment #red-team

MFTECmd

Parser for $MFT, $Boot, $J, $SDS, and $LogFile that extracts critical file system metadata from NTFS artifacts.

🪟 Windows Forensics 💽 Disk Forensics
#mft-analysis #ntfs #file-system #timeline-analysis #metadata-extraction

Mimikatz

Powerful post-exploitation tool that extracts plaintext passwords, hashes, and Kerberos tickets from memory, among many ...

🔑 PrivEsc 🔐 Credential 🪟 Windows
#credential-dumping #pass-the-hash #kerberos #windows-security #post-exploitation

Minicom

Text-based serial port communications program for interfacing with embedded systems, routers, and other hardware devices...

🔌 Hardware 🔌 Firmware
#serial-communication #terminal-emulator #hardware-interface #embedded-systems #console-access

mitmproxy

mitmproxy is a free and open source interactive HTTPS proxy.

🌐 Network
#networking #reverse-engineering

Netcat

Versatile command-line utility for reading and writing data across network connections using TCP or UDP; widely used for...

🌐 Network
#networking #tcp #udp #port-scanning #file-transfer #command-line #security

NginxPwner

Nginx exploitation tool.

💥 Pwn 🌐 Web
#nginx #exploitation #security #web-server

Nikto

Open source web server scanner that performs comprehensive tests against web servers for multiple vulnerabilities and se...

🌐 Web 🌐 Network
#web-scanner #vulnerability-scanner #web-security #server-testing #misconfigurations
Nmap logo

Nmap

Powerful network scanner for discovering hosts, services, and vulnerabilities on computer networks through port scanning...

🌐 Network 🔓 FullPwn
#port-scanning #network-discovery #security-auditing #host-detection

Nowafpls

Tool to identify possible WAF bypasses

🌐 Web
#waf #bypass #security #web-application
Nuclei logo

Nuclei

A fast, template-based vulnerability scanner designed to probe for security issues using its extensive library of templa...

🌐 Web 🌐 Network
#vulnerability-scanner #template-based #fast-scanning #detection

objection

objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of yo...

📱 Mobile
#mobile-security

oletools

A package of Python tools to analyze Microsoft OLE2 files (Structured Storage, Compound File Binary Format) for maliciou...

🪟 Windows Forensics 🧩 Misc
#document-analysis #malware-analysis #ole #microsoft-office #vba-macros

OneForAll

Powerful subdomain enumeration tool that integrates multiple data sources and methods to find as many subdomains as poss...

🔍 OSINT 🌐 Web
#subdomain-enumeration #passive-reconnaissance #information-gathering #dns-discovery #web-security

Pacu

Open-source AWS exploitation framework designed for offensive security testing against cloud environments with numerous ...

☁️ Cloud 🔑 PrivEsc 🔓 FullPwn
#aws-security #cloud-security #penetration-testing #cloud-exploitation #red-team

PasswordFox

NirSoft tool that extracts the stored usernames and passwords from Mozilla Firefox profiles, useful for forensic investi...

🪟 Windows Forensics 🔐 Credential
#firefox #password-recovery #credential-extraction #browser-forensics #password-dumping

PayloadsAllTheThings

Collection of payloads, bypass techniques, and methodologies for various security scenarios including web app security, ...

🌐 Web 🔑 PrivEsc 🧩 Misc
#payloads #bypass-techniques #web-security #pentest-cheatsheet #exploitation

pdfly

Python library for analyzing and extracting information from PDF documents, useful for forensic analysis and malicious P...

🔬 Forensics 🧩 Misc
#pdf-analysis #document-forensics #malware-detection #metadata-extraction #file-analysis

PECmd

Prefetch parser that extracts execution artifacts from Windows Prefetch files to determine program execution history and...

🪟 Windows Forensics 🪟 Windows
#prefetch #execution-history #program-execution #windows-artifacts #user-activity

PetitPotam

PoC exploit tool that forces Windows domain controllers to authenticate to arbitrary NTLM relays using MS-EFSRPC protoco...

🔑 PrivEsc 🪟 Windows 🔓 FullPwn
#ntlm-relay #active-directory #authentication #lateral-movement #domain-compromise

pkcrack

Tool for breaking PkZip encryption using known-plaintext attacks, useful for recovering password-protected zip archives ...

🔒 Crypto 🔍 Stego
#zip-cracking #encryption-breaking #known-plaintext-attack #password-recovery #archive-analysis

pngtools

Suite of tools for working with PNG images, allowing manipulation, analysis, and extraction of metadata and hidden conte...

🔍 Stego 🔬 Forensics
#png-analysis #metadata-extraction #image-manipulation #steganography #data-hiding

PowerSploit

PowerShell-based post-exploitation framework with modules for privilege escalation, reconnaissance, and exfiltration in ...

🪟 Windows 🔑 PrivEsc 🔓 FullPwn 🔐 Credential
#powershell #post-exploitation #privilege-escalation #reconnaissance #lateral-movement

pspy

Unprivileged Linux process snooper that allows monitoring processes without root permissions, useful for privilege escal...

🔑 PrivEsc 🐧 Linux
#process-monitoring #privilege-escalation #linux-security #system-monitoring #unprivileged-execution

PUK

Python Utilities Kit that provides a collection of utility functions for security professionals, including data manipula...

🧩 Misc 🔑 PrivEsc
#python-utilities #security-tools #data-manipulation #cli-utilities #security-testing

Pwndbg

A GDB plug-in that makes debugging with GDB easier while doing exploit development, providing enhanced disassembly, memo...

⚙️ Rev 💥 Pwn
#gdb-extension #debugging #exploit-development #binary-analysis #memory-analysis #reverse-engineering

PwnFox

Firefox extension designed for penetration testers, providing features like traffic coloring, multi-proxy support, and w...

🌐 Web 💥 Pwn
#penetration-testing #firefox-extension #web-security #traffic-coloring #proxy-support

Pwntools

CTF framework and exploit development library for Python that simplifies the process of writing exploits and interacting...

💥 Pwn
#exploit-development #ctf-framework #binary-exploitation #rop-chains #shellcoding

PyJail Cheatsheet

Comprehensive guide for escaping Python sandboxes and restricted environments in CTF challenges.

💥 Pwn 🧩 Misc
#pyjail #sandbox-escape #ctf #python #code-injection #security-bypass #cheatsheet

pypykatz

Pure Python implementation of Mimikatz capable of extracting credentials from Windows memory dumps without requiring Win...

🔐 Credential 🪟 Windows 🧠 Memory Forensics
#mimikatz #credential-dumping #memory-analysis #windows-security #post-exploitation

pyWhisker

Tool for manipulating Shadow Credentials in Active Directory to perform resource-based constrained delegation attacks.

🪟 Windows 🔑 PrivEsc 🔐 Credential
#active-directory #shadow-credentials #delegation-attacks #windows-security #credential-abuse

Radare2

Open-source reverse engineering framework providing disassembly, debugging, analysis, and manipulation of binary files.

⚙️ Rev
#disassembler #debugger #binary-analysis #reverse-engineering #hex-editor

RegCool

Advanced Windows Registry editor with enhanced features for searching, comparing, and modifying registry structures for ...

🪟 Windows Forensics 🪟 Windows
#registry-editor #windows-registry #forensic-analysis #system-configuration #evidence-collection

RsaCtfTool

Tool for attacking RSA encryption in CTF challenges, supporting various attack methods against weak keys and implementat...

🔒 Crypto 🔑 PrivEsc
#rsa-attacks #cryptography #key-recovery #ctf-tool #encryption-attacks

Rubeus

C# toolset for raw Kerberos interaction and abuses, useful for attacking Kerberos in Active Directory environments.

🔑 PrivEsc 🔐 Credential 🪟 Windows
#kerberos #active-directory #ticket-attacks #authentication #lateral-movement

Runtime Mobile Security (RMS)

Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android and iO...

📱 Mobile
#mobile-security

SCCMHound

Tool for identifying privilege escalation opportunities in Microsoft's System Center Configuration Manager (SCCM) enviro...

🪟 Windows 🔑 PrivEsc 🌐 Network
#sccm #active-directory #privilege-escalation #configuration-manager #lateral-movement

SecLists

Collection of multiple types of lists used during security assessments, including usernames, passwords, URLs, sensitive ...

🧩 Misc 🌐 Web 🔓 FullPwn 🔐 Credential
#wordlists #password-lists #content-discovery #penetration-testing

SecurityQuestionsView

NirSoft utility that reveals the security questions and answers stored by Windows 10 for local user accounts, useful for...

🪟 Windows Forensics 🔐 Credential
#security-questions #credential-recovery #windows-security #account-information #password-recovery

ShadowFinder

Tool for detecting shadow accounts in Microsoft environments.

🔍 OSINT
#osint #shadow-accounts #reconnaissance #security

SharpDPAPI

C# implementation of DPAPI (Data Protection API) functionality, allowing for decryption of secrets protected by DPAPI.

💥 Pwn
#csharp #dpapi #security #credentials #windows

SharpUp

C# port of PowerUp privilege escalation checks that helps identify potential privilege escalation vectors on Windows sys...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #enumeration #windows-security #post-exploitation #ghostpack

Shodan

Search engine for internet-connected devices, services, and systems, allowing users to find specific types of computers ...

🔍 OSINT 🌐 Network
#device-discovery #internet-scanning #vulnerability-intelligence #attack-surface-analysis #iot-search

ShortScan

Scanner for finding dangerous URL shortener open redirects that can be exploited for phishing campaigns.

🌐 Web 🌐 Network
#url-shorteners #open-redirect #vulnerability-scanning #phishing #web-security #reconnaissance

SilentEye

Steganography tool that embeds and extracts data from image and audio files using LSB (Least Significant Bit) techniques...

🔍 Stego
#steganography #lsb #data-hiding #image-steganography #audio-steganography

Slack-Parser

Tool for extracting and analyzing data from Slack workspaces, including messages, files, and user information for forens...

🔬 Forensics 🔍 OSINT
#slack-analysis #message-extraction #digital-forensics #communication-analysis #evidence-collection

SmartDeblur

Tool for fixing blurry, defocused, and motion-blurred images using deconvolution algorithms and specialized filters.

🔍 Stego 🔬 Forensics
#image-processing #deblurring #forensic-analysis #image-enhancement #photo-recovery

Sonic Visualiser

Application for viewing and analyzing the contents of audio files, revealing hidden patterns and data through visualizat...

🔍 Stego 🧩 Misc
#audio-analysis #spectral-analysis #waveform-visualization #steganography #frequency-analysis

SQLMap

Automatic SQL injection and database takeover tool that detects, exploits, and extracts data from vulnerable web applica...

🌐 Web 🔓 FullPwn
#sql-injection #database-exploitation #penetration-testing #web-security #automated-exploitation

StegCloak

Tool for hiding text within text using invisible unicode characters, allowing steganography with no visible changes to t...

🔍 Stego
#text-steganography #unicode-hiding #invisible-characters #message-concealment #cryptography

Steghide

Command-line tool for hiding data in various image and audio files using steganography techniques with encryption suppor...

🔍 Stego 🔬 Forensics
#steganography #data-hiding #encryption #image-analysis #audio-analysis #file-manipulation #information-hiding

StegoVeritas

Comprehensive steganography tool that automates the process of detecting and extracting hidden information from image fi...

🔍 Stego
#steganography #image-analysis #data-extraction #automated-tool #multi-format

Stegseek

Lightning fast steganography cracker that detects hidden data in files protected with steghide, significantly faster tha...

🔍 Stego
#steganography #password-cracking #data-extraction #image-analysis #brute-force

stegsnow

Tool for hiding messages in ASCII text by appending whitespace characters, creating steganography that's virtually invis...

🔍 Stego
#text-steganography #whitespace-hiding #data-concealment #information-hiding #message-encryption

Subfinder

Fast passive subdomain discovery tool that uses various sources to discover subdomains efficiently.

🔍 OSINT 🌐 Web 🌐 Network
#subdomain-enumeration #reconnaissance #information-gathering #passive-recon #asset-discovery

SweetPotato

Local privilege escalation tool that combines different known Windows privilege escalation techniques with a focus on se...

🔑 PrivEsc 🪟 Windows
#privilege-escalation #potato-family #service-accounts #windows-exploits #local-exploit

TotalRecall

An incident response Swiss Army knife that automates memory forensics, event log analysis, and system artifact collectio...

🪟 Windows Forensics 🧠 Memory Forensics
#incident-response #memory-acquisition #triage #evidence-collection #forensic-analysis

TotalRecall

An incident response Swiss Army knife that automates memory forensics, event log analysis, and system artifact collectio...

🪟 Windows Forensics 🧠 Memory Forensics
#incident-response #memory-acquisition #triage #evidence-collection #forensic-analysis

TreeHouse-Wordlists

Comprehensive collection of wordlists organized by categories for various security testing scenarios including passwords...

🔐 Credential 🌐 Web 🧩 Misc
#wordlists #password-lists #brute-force #directory-enumeration #username-lists

TruffleHog

Advanced secret scanning tool that finds credentials, API keys, and other sensitive information in Git repositories and ...

🔍 OSINT 🌐 Web 🔐 Credential
#secret-scanning #credential-detection #git-scanning #api-keys #data-exposure

TShark

Command-line network protocol analyzer, part of the Wireshark suite, for capturing and analyzing network traffic in real...

🌐 Network
#packet-capture #network-analysis #protocol-analyzer #cli #wireshark

Uber-APK-Signer

Tool to sign and align single APKs or multiple APKs (ApkBundles, xAPKs, split APKs) with Uber's method.

📱 Mobile
#apk #mobile #android #security #signing

unredacter

A tool that reverses pixelation/blurring to reveal redacted information in images and documents through machine learning...

🧩 Misc 🔍 OSINT
#deblurring #image-analysis #redaction-reversal #privacy-research #machine-learning

UPX

High-performance executable packer that compresses and modifies binary files while preserving their functionality. Has a...

⚙️ Rev 🧩 Misc
#binary-packing #compression #executable-modification #anti-analysis #reverse-engineering #file-compression

USB Detective

Forensic tool for analyzing USB device artifacts and history on Windows systems, helping track USB activity and data tra...

🪟 Windows Forensics 🔬 Forensics
#usb-forensics #device-history #windows-artifacts #digital-forensics #removable-media

USB-Mouse-Pcap-Visualizer

Tool to visualize USB mouse data captured in PCAP files, aiding in analysis of mouse movements and potential input injec...

🔌 Hardware 📡 Network Forensics 🔬 Forensics 🌐 Network
#usb #mouse #pcap #visualization #input-injection #hardware-analysis

USBDeview

NirSoft tool that lists all USB devices currently connected or previously connected to the system, providing detailed in...

🪟 Windows Forensics 🔬 Forensics
#usb-devices #device-history #windows-artifacts #digital-forensics #hardware-enumeration

username-anarchy

Tool for generating username lists from real names to use in security assessments, supporting various username formats a...

🔍 OSINT 🔐 Credential
#username-generation #user-enumeration #brute-force #identity-research #reconnaissance

VaultPasswordView

NirSoft utility that extracts and displays passwords stored in the Windows Credential Manager vault, including web crede...

🪟 Windows Forensics 🔐 Credential
#credential-manager #password-extraction #windows-vault #stored-credentials #credential-recovery
Volatility2 logo

Volatility2

Classic memory forensics framework (version 2) for analyzing RAM dumps with Python 2 compatibility and a robust plugin e...

🧠 Memory Forensics 🪟 Windows Forensics
#memory-analysis #incident-response #malware-detection #forensics #legacy-tool
Volatility3 logo

Volatility3

Rewritten memory forensics framework with improved performance, object-oriented architecture, and Python 3 support for m...

🧠 Memory Forensics 🪟 Windows Forensics
#memory-analysis #incident-response #malware-detection #forensics #modern-framework

WABT

The WebAssembly Binary Toolkit providing tools to translate between WebAssembly text and binary formats, with focus on w...

⚙️ Rev 🧩 Wasm
#wasm-tools #binary-translation #wasm2c #webassembly #binary-analysis

WADComs

Interactive cheat sheet of commands for Windows/AD security assessments and privilege escalation, organized by attack te...

🪟 Windows 🔑 PrivEsc
#windows-commands #active-directory #cheat-sheet #privilege-escalation #lateral-movement

Wappalyzer

Browser extension and online service that uncovers technologies used on websites, including CMS, eCommerce platforms, we...

🌐 Web
#web-analysis #technology-detection #browser-extension #osint #cms-detection

WayMore

Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!

🌐 Web 🔍 OSINT
#web-reconnaissance #web-security #content-discovery #historical-data #url-discovery #passive-reconnaissance

WebBrowserPassView

NirSoft password recovery tool that reveals saved passwords from multiple web browsers including Chrome, Firefox, Opera,...

🪟 Windows Forensics 🔐 Credential
#password-recovery #credential-extraction #browser-forensics #saved-passwords #digital-forensics

Webhook.site

Online service for capturing, inspecting, and testing webhooks and HTTP requests; provides a unique URL to receive and d...

🌐 Web
#webhook #http #debugging #testing #payload-inspection

WESNG

Windows Exploit Suggester - Next Generation. A tool for finding potential missing patches based on the output of systemi...

💥 Pwn 🪟 Windows
#windows #exploit #security #patch #vulnerability

wfuzz

Web application fuzzer that can be used to find resources, discover parameters, and identify vulnerabilities in web appl...

🌐 Web
#fuzzing #web-security #parameter-discovery #content-discovery

Wifite

Automated wireless attack tool designed to simplify WiFi penetration testing by automating attacks against multiple wire...

🌐 Network 🔐 Credential 🔓 FullPwn
#wifi-cracking #wireless-security #automated-attacks #wpa #network-penetration

WiGLE

Database and mapping platform of wireless networks with statistics and information gathered by community wardriving and ...

🔍 OSINT 🌐 Network
#wifi-mapping #wireless-networks #geolocation #wardriving #network-discovery

WinPrefetchView

NirSoft utility that reads the prefetch files stored in Windows, providing insights into application execution history a...

🪟 Windows Forensics 🔬 Forensics
#prefetch-analysis #execution-history #windows-artifacts #application-tracking #digital-forensics

WirelessKeyView

NirSoft utility that recovers all wireless network security keys/passwords stored on the computer by the Wireless Zero C...

🪟 Windows Forensics 🔐 Credential
#wifi-passwords #wireless-keys #credential-recovery #network-passwords #password-extraction
Wireshark logo

Wireshark

The world's foremost network protocol analyzer that lets you see what's happening on your network at a microscopic level...

📡 Network Forensics 🌐 Network
#packet-analysis #network-monitoring #traffic-inspection #forensics

WPScan

WordPress security scanner that identifies vulnerabilities, enumerates users, plugins, themes, and performs brute force ...

🌐 Web 🔓 FullPwn
#wordpress #cms-scanner #vulnerability-scanner #web-security #enumeration

XSS Cheat Sheet

Comprehensive collection of cross-site scripting (XSS) attack vectors, filter evasion techniques, and testing methodolog...

🌐 Web
#xss #cross-site-scripting #web-security #payload-list #attack-vectors

ysoserial

A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization, allowing remote code ex...

🌐 Web
#deserialization #java-deserialization #payload-generator #rce #serialization-attacks #security-testing

ysoserial.net

A proof-of-concept tool for generating payloads that exploit unsafe .NET object deserialization, enabling remote code ex...

🌐 Web
#deserialization #.net-deserialization #payload-generator #rce #serialization-attacks #security-testing #gadget-chains

zsteg

Tool for detecting hidden data in PNG and BMP images using various steganography techniques with focus on the least sign...

🔍 Stego
#steganography #png-analysis #bmp-analysis #lsb-detection #data-extraction