Offensive Security Tool: Pentesting Tools
Reading Time: 2 Minutes
Offensive Security Tool: Pentesting Tools
This repo was created containing over 48 starred tools for specific attack vectors, covering a wide range of techniques used by advanced Offensive Security and Red Teams to conduct wide range of Pentesting, Bug Bounty Hunting and more. It is a really important repo to have, and gives you the ability to train on more sophisticated attack scenarios as it gives a lot of explanation for each technique on practicality usages and more.
Some of the attack vectors covered, ranging from Recon, OSINT, Attack, Digital Forensics, Source Code, Reverse Engineering, Exploits:
- Payload Hosting & Reverse Shellz
- POST Exploitation
- Backdoor finder
- Persistence on windows
- Web Application Pentest
- Framework Scanner / Exploitation
- Network- / Service-level Vulnerability Scanner
- Windows & Linux Privilege Escalation / Audit
- Credential harvesting Linux & Windows
- Data Exfiltration – DNS/ICMP/Wi-Fi Exfiltration
- Reverse Engineering
- Forensics
- Raspberry PI Exploitation
- Social Engineering
- Source Code Analysis
And much more. The great thing is that they have categories, helping a pentester easily choose which category of attacks is needed all in one place.
See Also: BotenaGo botnet targets millions of IoT devices with 33 exploits
See Also: Hacking stories – The first botnet hijacker aka the Zombie King
Pentesting Tools
- General useful PowerShell Scripts
- AMSI Bypass restriction Bypass
- Payload Hosting
- Network Share Scanner
- Lateral Movement
- Reverse Shellz
- POST Exploitation
- Pivot
- Backdoor finder
- Persistence on windows
- Web Application Pentest
- Framework Discovery
- Framework Scanner / Exploitation
- Web Vulnerability Scanner / Burp Plugins
- Network- / Service-level Vulnerability Scanner
- Crawler
- Web Exploitation Tools
- Windows Privilege Escalation / Audit
- T3 Enumeration
- Linux Privilege Escalation / Audit
- Credential harvesting Windows Specific
- Credential harvesting Linux Specific
- Data Exfiltration – DNS/ICMP/Wi-Fi Exfiltration
- Git Specific
- Reverse Engineering / decompiler
- Forensics
- Network Attacks
- Specific MITM service Exploitation
- Sniffing / Evaluation / Filtering
- Scanner / Exploitation-Frameworks / Automation
- Default Credential Scanner
- Payload Generation / AV-Evasion / Malware Creation
- Domain Finding / Subdomain Enumeration
- Scanner network level
- Email Gathering
- Domain Auth + Exploitation
- Network service – Login Brute Force + Wordlist attacks
- Command & Control Frameworks
- Wi-Fi Tools
- Raspberry PI Exploitation
- Social Engineering
- Wordlists / Wordlist generators
- Obfuscation
- Source Code Analysis
- No category yet
- Industrial Control Systems
- NAC bypass
- JMX Exploitation
To find out about all the rest of Repos, click here
See Also: Complete Offensive Security & Ethical Hacking Course