Pentesting Tools

Offensive security tools are used to discover/confirm the existence of security holes and test the ability of an organization to detect and respond to security incidents. Many offensive security tools are free or open-source.

DISCLAIMER Information provided on this site is intended to improve security for everyone. The use of some of the tools listed on this site without implicit permission from the target is probably illegal in your jurisdiction. There is no need to get arrested and go to prison doing something stupid. There are bug bounty programs and penetration testing jobs that pay well, with little risk of time in prison. Do not hack shit you do not have permission to hack!

Android Open Pwn – Hacking oriented Android distribution by Pwnie Express.

Bloodhound – Once you have credentials, where do you go first? Bloodhound pulls data from Active Directory and visualizes privileged accounts and what they have access to.

Censys – Free site for searching a database of a large number of IPV4 devices connected to the Internet.

DNSCat2 – – Tool that can create an encrypted tunnel over DNS for command and control uses.

ExploitDB – Database of exploits.

Kali Linux – Kali Linux pentesting distribution.

Metasploit – Metasploit pentesting framework.

Nmap – Nmap port scanner.

OWASP – The Open Web Application Security Project (OWASP)

PowerShell Empire – – PowerShell Post Exploitation agent.

The Penetration Testers Framework (PTF) – – A tool created by David Kennedy that handles the install and updating of penetration testing tools in Linux. Useful for creating your own custom hacking distro.

Responder – Responder is an awesome tool once you get in or for internal tests. It makes Windows networks rain passwords and password hashes., – – (Nmap project) maintains a top 125 network security tools list.

Shodan – Shodan scans the Internet and provides a searchable interface to the information collected.

Sqlmap – – Tool that can find and exploit weaknesses within various SQL database platforms.

Veil Evasion – – The Veil Evasion framework does a lot of things, including creating payloads that aim to avoid AV detection.

Vulnhub – Vulnhub provides intentionally vulnerable virtual machines to practice on.

Wall of Sheep – Site that sells all kinds of hacking gadgets, lockpicks, RFID readers and etc. Very cool stuff.

WarBerryPi – Scripts for running a number of security tools on the Raspberry Pi.