• Stars
    star
    257
  • Rank 158,728 (Top 4 %)
  • Language
  • License
    MIT License
  • Created almost 9 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Exhaustive list of hacking tools

This is a simple list of all tools that can be related to hacking, there are windows and linux tools

This repo was created by Geluchat and laxa The overall idea is to find quickly a tool that could suit your need or help you in any way related to computer hacking. This list is supposed to be as exhaustive as possible.

All tools are listed like this [TAG1|[TAG2|TAG3...]]Clickable name: Short description

Legend

  • [G]: Github/Git repository # Note, this flag automatically implies the [O] flag
  • [S]: Software (Imply that it's not always 100% free and that it's not open source or restrictive license)
  • [F]: Freeware (Free software, doesn't necessarily means that it's opensource)
  • [I]: Website
  • [P]: Plugin for chrome
  • [R]: Plugin for firefox
  • [D]: Plugin for IDA Pro
  • [C]: CLI tool
  • [O]: Open source
  • [M]: Misceallenous
  • [L]: Reverse Flag: is set only when Linux compatible
  • [W]: Reverse Flag: is set only when Windows compatible

Binary

  • [I] https://malwr.com/: online binary analysis (behaviour analysis in sandbox)
  • [I] https://www.virustotal.com/: online binary analysis by AV
  • [I] https://www.hybrid-analysis.com: online binary analysis (behaviour analysis in sandbox)
  • [I] https://retdec.com/: online decompiler for c/c++ binaries
  • [I] http://www.showmycode.com/: online decompiler for .NET/flash and others...
  • [I] http://www.javadecompilers.com/: java decompiler online
  • [I] https://defuse.ca/online-x86-assembler.htm: online frontend for disassembling/assembling x86/x86_64
  • [S|W] Reflector: assembly browser for .NET
  • [F|O|W] Simple Assembly Explorer: another .NET disassembler
  • [F|O|W] de4dot: .NET deobfuscator
  • [G|W] dnSpy: .NET decompiler, debugger, assembly editor and more
  • [S] IDA: debugger / disassembler, most complete tool for static/dynamic binary analysis
  • [D] FindCrypt2: Detect static code for known algorithms
  • [D|G] ScyllaHide: Anti-Anti debug
  • [D|G] DIE: Dynamic IDA Enrichment
  • [F|O] OllyDbg: debugger
  • [F|O|W] x64dbg: debugger
  • [F|W] Detect it easy: binary packer detection
  • [S|W] apimonitor: inspect process calls and trace them
  • [S|W] processmonitor: Microsoft tool to quickly see system calls
  • [F|W] PEiD: identify which packer has been used on PE binaries
  • [O|W] XNResourceEditor: Browse resources in PE
  • [F|W] ImpREC: reconstruct IAT table for unpacked binaries
  • [O|W] cheatengine: memory scanner and other usefull things
  • [C|O|L] gdb: Gnu debugger for linux
  • [M|G] peda: python plugin for gdb
  • [M|G] gef: gdb plugin supporting more architectures than peda
  • [C|O|L] [strace/ltrace]: system call tracers / dynamic call tracers (librairies)
  • [S] dede: delphi decompiler
  • [S] Pin: dynamic binary instrumentation framework
  • [G] Pintool: binary password finder for ctf using pin
  • [O|L] checksec: check binary protections
  • [G] Qira: timeless debugger with web interface by geohot
  • [G|C] ROPGadget: tool for rop chaining
  • [G|C] plasma: interactive disassembler in pseudo-C with colored syntax
  • [O|C|L] XOCopy: copy memory of execute only ELF binaries
  • [G|C] Shellsploit: shellcode generator framework
  • [G|C] radare2: analyzer, disassembler, debugger
  • [G] Bokken: Python-GTK GUI for radare2
  • [G|C] libformatstr: python lib to make string format exploits
  • [G] pwntools: Python framework to quickly develop exploits
  • [G] binjitsu: fork of pwntools
  • [G|C] fixenv: Script to align stack withtout ASLR and gdb,strace,ltrace
  • [G] Voltron: Great UI Debugger
  • [G] Z3: Z3 is a theorem prover
  • [G] angr: binary analysis, allows value-set analysis
  • [G] manticore: dynamic analysis, symbolic execution framework
  • [G] rop-tool: another helpful tool for ROP
  • [G] villoc: visualize heap chunks on linux
  • [O|C] valgrind: binary analysis allowing to spot read/write errors on memory operations
  • [O|C] Flawfinder: static source code analyzer for C/C++ which report possible security weakness
  • [G|C] afl: American Fuzy Lop is a fuzzer using dumb/instrumented/qemu
  • [G] gdbgui: web lightweight gui interface for gdb
  • [G|C] one_gadget: script to find and identify constraints on magc gadget
  • [G|C] Ropper: gadgets finder, better than ROPgadget for ARM
  • [G|C] frida: Dynamic instrumentation toolkit for most common platforms

Android/IOS

  • [G] dex2jar: apk unpacker (android package)
  • [G|C] objection: mobile exploration toolkit, wrapper of frida
  • [G|C] apktool: unpack apk, repack them and various other operations
  • [G|C] uber-apk-signer: signing apk

Forensic

  • [C|O] volatility: forensic tool to analyse memory dump from windows/linux
  • [C|O] Autopsy/Sleuth: analyse hard drives and smartphones
  • [C|O] Foremost: file recovery after deletion or format
  • [G|C] BinWalk: find files into file
  • [S] dff: complete forensic gui analyser with lots of automation
  • [G|C] origami: pdf forensic analysis with optional GUI
  • [F|W] MFTDump: dump/copy $MFT file on windows
  • [G|C] AppCompatCacheParser: dump shimcache entries from Registry (can use offline registry)
  • [F|W] RegistryExplorer: GUI to explore registry with search options and possibility to use offline register
  • [S|W] Agent Ransack: GUI to search for files/content on shares/local drives

Cryptography

  • [C|G] xortool: find xor key/key length from xor text/binary
  • [C|G] cribdrag: interactive crib dragging on xored text
  • [C|G] hash_extender: hash extension forger
  • [C|G] hash-identifier: hash identifier
  • [C|G] PadBuster: break CBC encryption using an oracle
  • [C|G] lsb-toolkit: extract bit from images for steganography
  • [C|O] john: hash cracker (bruteforce + dico attacks)
  • [F|O] hashcat: hash bruteforce cracker that support GPU
  • [C|G] rsatool: calculates RSA (p, q, n, d, e) and RSA-CRT (dP, dQ, qInv) parameters given either two primes (p, q) or modulus and private exponent (n, d)
  • [I] http://quipqiup.com/: basic cryptography solver
  • [G|C] python-paddingoracle: python tool to exploit padding oracle

Web

Windows

  • [G|C] impacket: tons of CLI scripts to interact with windows protocols
  • [G|C] mimikatz: Retrieve hash/password, play with DPAPI
  • [G|C] pypykatz: python implementation of mimikatz
  • [G|W] UACME: Exploits for UAC bypass
  • [G|C] responder: Protocol poisoner and rogue server for Microsoft based networks
  • [G|C] crackmapexec: Swiss army knife for pentesting
  • [G|C] lsassy: lsass dumper and parser
  • [G|C] dumpert: lsass memory dumper techniques that can bypass some EDR
  • [G|C] phys2memprofit: lsass memory dumper through kernel driver, can bypass EDR
  • [G|C] pywerview: partial powersploit's tooling rewritten in python
  • [G|C] SharpRDP: can execute commands through RDP connection without any GUI interaction

Network

  • [C|O] Netcat: network tool, can listen or connect using TCP/UDP
  • [C|O] nmap: network tool to scan ports and discover services
  • [C|O] Scapy: powerful interactive packet manipulation program
  • [C|O] Aircrack: wi-fi injection/monitoring/cracking
  • [S|O] Wireshark: network packet analyzer
  • [S|W] NetworkMiner: sniffer/pcap analyzer, pretty good for files and see what's going on with HTTP traffic
  • [C|O] Hexinject: Packer injector and sniffer. Allows to modify packets on the fly
  • [G|C] ssf: Client/server socks proxifying and port forwarding with reverse https
  • [G|C] revsocks: Go implementation for a socks proxy with reverse SSL/TLS

Steganography

  • [C|F] exiftags: linux package to check jpg tags
  • [O|C] ExifTool: read/edit metadata of various file formats
  • [F|O|W] tweakpng: tool to resize image for steganography
  • [F|O] Stegsolve: perform quick image analysis to find hidden things
  • [F|O] Wbstego: retrieve/hide messages in various container

Misc

Sec/Tools list

Programming


If you wanna improve or add your tool here, fork this repo then push onto your own master then make a pull request. I won't accept any software that is specific to OS X if it doesn't work on linux or windows. If you think you have a nice feature idea, open an issue. This list isn't mean to be ordered in some way, but if people like it, it is already noted that making a proper wiki referencing tools name with link might be a better thing than a Markdown page. Github wiki is also an option when the list is going to be too long.