forked from Gexos/Hacking-Tools-Repository
-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
973 lines (961 loc) · 73 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-7" />
<meta name="description" content="Hacking Tools Repository"/>
<meta name="keywords" content="hacking tools repository github"/>
<title>Hacking Tools Repository</title>
<link rel="stylesheet" type="text/css" href="style.css" />
</head>
<body>
<a href="https://github.com/Gexos/hacking-tools-repository"><img style="position: absolute; top: 0; right: 0; border: 0;" src="https://s3.amazonaws.com/github/ribbons/forkme_right_darkblue_121621.png" alt="Fork me on GitHub"></a>
<!--
<img src="Images/bluedot.png" width="800" height="1">
<img src="Images/bluedot.png" width="1" height="600">
-->
<div class="main">
<div class="left">
<span class="main_header"><b></b></span><br/>
<span class="pagetitle">Hacking Tools Repository</span>
<div style="background:transparent; border-top:1px solid #005546; width:100%;"></div>
<p class="description">
<a id = "top"></a>
Here is a list of security tools that have been collected from the internet. These tools are specifically aimed toward security professionals and enthusiasts/hobbyists for testing and demonstrating security weaknesses.
<br/><br/>
These tools are created for the sole purpose of security awareness and education, they should not be used against systems that you do not have permission to test/attack. You could end up in jail.
<br/><br/>
Most of the tools are open source/free with a couple of exceptions,
before using any tools, i recommend that you read the instructions/documentation available on each of the individual tool's websites. Although some of the tools could be listed in more than one category, they only appear in the list only once, under its primary category.
<br/><br/>
If you have suggestions or links to tools/scripts to submit, please do, you can fork, edit, send a pull request or you can leave a comment on the wiki page <a class="link" href="https://github.com/Gexos/hacking-tools-repository/wiki"target="_blank">here</a>, your name or github page will be credited.
<br/><br/>
<a href="#Passwords"><span class="green"><b>»Passwords</b></span></a> <a href="#Scanning"><span class="green"><b>»Scanning</b></span></a> <a href="#Sniffer"><span class="green"><b>»Sniffer</b></span></a> <a href="#Enumeration"><span class="green"><b>»Enumeration</b></span></a> <a href="#Networking_Tools"><span class="green"><b>»Networking Tools</b></span></a> <a href="#Wireless"><span class="green"><b>»Wireless</b></span></a> <br/><br/> <a href="#Bluetooth"><span class="green"><b>»Bluetooth</b></span></a> <a href="#Web_Scanners"><span class="green"><b>»Web Scanners</b></span></a> <a href="#Database"><span class="green"><b>»Database</b></span></a> <a href="#Vuln_Scanners"><span class="green"><b>»Vuln Scanners</b></span></a> <a href="#Vuln_Apps"><span class="green"><b>»Vuln Apps</b></span></a> <a href="#Live_CD"><span class="green"><b>»Live CD</b></span></a>
</p>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Passwords"></a>Passwords</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.oxid.it/cain.html"target="_blank">Cain & Abel</a></td>
<td class="frame">Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.off-by-one.net/"target="_blank">CacheDump</a></td>
<td class="frame">CacheDump, licensed under the GPL, demonstrates how to recover cache entry information: username and MSCASH.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.openwall.com/john/"target="_blank">John the Ripper</a></td>
<td class="frame">John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mcafee.com/us/downloads/free-tools/fscrack.aspx"target="_blank">FSCrack</a></td>
<td class="frame">GUI for John the Ripper. FSCrack is a front end for John the Ripper (JtR) that provides a graphical user interface (GUI) for access to most of JtR’s functions.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freeworld.thc.org/thc-hydra/"target="_blank">Hydra</a></td>
<td class="frame">A very fast network logon cracker which support many different services.Number one of the biggest security holes are passwords, as every password security study shows.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://github.com/inquisb/keimpx"target="_blank">keimpx</a></td>
<td class="frame">keimpx is an open source tool, released under a modified version of Apache License 1.1. It can be used to quickly check for the usefulness of credentials across a network over SMB.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.foofus.net/~jmk/medusa/medusa.html"target="_blank">Medusa</a></td>
<td class="frame">Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nmap.org/ncrack/"target="_blank">Ncrack</a></td>
<td class="frame">Ncrack is a high-speed network authentication cracking tool. It was built to help companies secure their networks by proactively testing all their hosts and networking devices for poor passwords.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://ophcrack.sourceforge.net/"target="_blank">Ophcrack</a></td>
<td class="frame">Ophcrack is a Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://project-rainbowcrack.com/"target="_blank">RainbowCrack</a></td>
<td class="frame">RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.leidecker.info/projects/phrasendrescher/in dex.shtml"target="_blank">phrasen|drescher</a></td>
<td class="frame">phrasen|drescher (p|d) is a modular and multi processing pass phrase cracking tool. It comes with a number of plugins but a simple plugin API allows an easy development of new plugins.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.lcpsoft.com/english/index.htm"target="_blank">LCP</a></td>
<td class="frame">Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/crunch-wordlist/"target="_blank">Crunch</a></td>
<td class="frame">Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://oldhome.schmorp.de/marc/fcrackzip.html"target="_blank">Fcrackzip</a></td>
<td class="frame">Naturally, programs are born out of an actual need. The situation with fcrackzip was no different... I'm not using zip very much, but recently I needed a password cracker.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://enumiax.sourceforge.net/"target="_blank">Enumiax</a></td>
<td class="frame">EnumIAX is an Inter Asterisk Exchange version 2 (IAX2) protocol username brute-force enumerator. enumIAX may operate in two distinct modes; Sequential Username Guessing or Dictionary Attack.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://linux.softpedia.com/get/Security/Wyd-23540.shtml"target="_blank">Wyd</a></td>
<td class="frame">wyd.pl was born out of those two of situations: 1. A penetration test should be performed and the default wordlist does not contain a valid password. 2. During a forensic crime investigation a password protected file must be opened without knowing the the password.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/worawita/"target="_blank">Bruter</a></td>
<td class="frame">Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.edge-security.com/edgessh.php"target="_blank">The ssh bruteforcer</a></td>
<td class="frame">Is a tool to perform dictionary attacks to the SSH servers, it's a simple tool, you set the target server, target account, wordlist, port and wait..</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/lodowep/"target="_blank">Lodowep</a></td>
<td class="frame">Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system. The tool supports both session- and basic-authentication.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freecode.com/projects/sshatter"target="_blank">SSHatter</a></td>
<td class="frame">SSHatter uses a brute force technique to determine how to log into an SSH server. It rigorously tries each combination in a list of usernames and passwords to determine which ones successfully log in.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Scanning"></a>Scanning</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freeworld.thc.org/thc-amap"target="_blank">Amap</a></td>
<td class="frame">Amap is a next-generation scanning tool, which identifies applications and services even if they are not listening on the default port by creating a bogus-communication and analyzing the responses.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.securityfriday.com/tools/DrMorena.html"target="_blank">Dr.Morena</a></td>
<td class="frame">Dr.Morena is a tool to confirm the rule configuration of a Firewall. The configuration of a Firewall is done by combining more than one rule.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://packetfactory.openwall.net/projects/firewalk/in dex.html"target="_blank">Firewalk</a></td>
<td class="frame">Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://netcat.sourceforge.net/"target="_blank">Netcat</a></td>
<td class="frame">Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.nta-monitor.com/tools-resources/security-tools/ike-scan"target="_blank">Ike Scan</a></td>
<td class="frame">Ike-scan is a command-line tool that uses the IKE protocol to discover, fingerprint and test IPSec VPN servers. It is available for Linux, Unix, MacOS and Windows under the GPL license.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nmap.org/"target="_blank">Nmap</a></td>
<td class="frame">Nmap ('Network Mapper') is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nmap.org/"target="_blank">Zenmap</a></td>
<td class="frame">Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.phreedom.org/software/onesixtyone/"target="_blank">Onesixtyone</a></td>
<td class="frame">onesixtyone is an SNMP scanner which utilizes a sweep technique to achieve very high performance. It can scan an entire class B network in under 13 minutes.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mcafee.com/us/downloads/free-tools/superscan.aspx"target="_blank">SuperScan 4</a></td>
<td class="frame">Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://autoscan-network.com/"target="_blank">Autoscan</a></td>
<td class="frame">AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network. The main goal is to print the list of connected equipments in your network.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://knocker.sourceforge.net/"target="_blank">Knocker</a></td>
<td class="frame">Knocker is a simple and easy to use TCP security port scanner written in C to analyze hosts and all of the different services started on them.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nsat.sourceforge.net/"target="_blank">Nsat</a></td>
<td class="frame">NSAT is a robust scanner which is designed for: Different kinds of wide-ranging scans, keeping stable for days. Scanning on multi-user boxes (local stealth and non-priority scanning options).</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://pbnj.sourceforge.net/"target="_blank">OutputPBNJ</a></td>
<td class="frame">PBNJ is a suite of tools to monitor changes on a network over time. It does this by checking for changes on the target machine(s), which includes the details about the services running on them as well as the service state.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://pbnj.sourceforge.net/"target="_blank">ScanPBNJ</a></td>
<td class="frame">ScanPBNJ performs an Nmap scan and then stores the results in a database. The ScanPBNJ stores information about the machine that has been scanned. ScanPBNJ stores the IP Address, Operating System, Hostname and a localhost bit.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://github.com/sensepost/glypeahead"target="_blank">glypeahead</a></td>
<td class="frame">By default the Glype proxy script has few restrictions on what hosts/ports can be accessed through it. In addition, the proxy script normally displays all cURL-related error messages.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.unicornscan.org/"target="_blank">Unicornscan</a></td>
<td class="frame">Unicornscan is a new information gathering and correlation engine built for and by members of the security research and testing communities.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.stev.org/page/TCP-Fast-Scan.aspx"target="_blank">TCP Fast Scan</a></td>
<td class="frame">A very very fast tcp port scanner for linux. Runs very quickly. Can scan a lot of hosts / ports + ranges at a time.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.secpoint.com/Multi-Threaded-TCP-Port-Scanner.html"target="_blank">Multi Threaded TCP Port Scanner 3.0</a></td>
<td class="frame">This tool could be used to scan ports of certain IP. It also could describe each port with standard name (well-known and registered ports).</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.hoobie.net/mingsweeper/"target="_blank">MingSweeper</a></td>
<td class="frame">MingSweeper is a network reconnaissance tool designed to facilitate large address space,high speed node discovery and identification.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://packetstormsecurity.com/files/90598/umap-bypass.txt"target="_blank">Umap(UPNP Map)</a></td>
<td class="frame">Umap (UPNP Map) attempts to scan open TCP ports on the hosts behind a UPNP enabled Internet Gateway Device(IGD) NAT.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.earth.li/projectpurple/progs/sendip.html"target="_blank">SendIP</a></td>
<td class="frame">SendIP has a large number of command line options to specify the content of every header of a NTP, BGP, RIP, RIPng, TCP, UDP, ICMP or raw IPv4 and IPv6 packet. It also allows any data to be added to the packet.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/sentrytools/"target="_blank">PortSentry</a></td>
<td class="frame">The Sentry tools provide host-level security services for the Unix platform. PortSentry, Logcheck/LogSentry, and HostSentry protect against portscans, automate log file auditing, and detect suspicious login activity on a continuous basis.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freestickdownload.blogspot.com/2008/06/currport.html"target="_blank">CurrPorts</a></td>
<td class="frame">CurrPorts will display the list of all currently opened TCP/IP and UDP ports on your PC. For each port in the list, information about the process that opened the port is also displayed.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nscan.hypermart.net/"target="_blank">Nscan</a></td>
<td class="frame">NScan itself is a port scanner, which uses connect() method to find the list of the host's open ports. The difference from the most of other portscanners is it's flexibility and speed.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.networkactiv.com/"target="_blank">NetworkActiv Scan</a></td>
<td class="frame">NetworkActiv Port Scanner is a network exploration and administration tool that allows you to scan and explore internal LANs and external WANs.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.bluebitter.de/portscn2.htm"target="_blank">Blues Port Scanner</a></td>
<td class="frame">A good port scanner is just one of the basic tools anyone who is seriously interested in the internet needs. The BluesPortScan is, i think, the fastest scanner for 32Bit windows which you can found in the net.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://zmap.io/"target="_blank">ZMap</a></td>
<td class="frame">ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://github.com/TheRook/subbrute"target="_blank">subdomain-bruteforcer</a></td>
<td class="frame">Subdomain-bruteforcer is a multi-threaded python tool for enumerating subdomains from a dictionary file. Particularily useful for finding admin panels or other dodgy web practices.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://github.com/bwall/ircsnapshot"target="_blank">ircsnapshot</a></td>
<td class="frame">Ircsnapshot is a python tool that connects a bot to a server in order to fetch users' hostmasks, names, and channel affiliations; also supports the creation of a world map using the scraped data. Useful for reconnaissance on a IRC server full of suspected bots. Supports SOCKS and TOR.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Sniffer"></a>Sniffer</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.wireshark.org/"target="_blank">Wireshark</a></td>
<td class="frame">Wireshark is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://chaosreader.sourceforge.net/"target="_blank">Chaosreader</a></td>
<td class="frame">A freeware tool to trace TCP/UDP/... sessions and fetch application data from snoop or tcpdump logs. This is a type of "any-snarf" program, as it will fetch telnet sessions, FTP files, HTTP transfers (HTML, GIF, JPEG, ...), SMTP emails, ... from the captured data inside network traffic logs.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://monkey.org/~dugsong/dsniff/"target="_blank">dsniff</a></td>
<td class="frame">dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://ettercap.github.com/ettercap/"target="_blank">Ettercap</a></td>
<td class="frame">Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.netresec.com/?page=NetworkMiner"target="_blank">NetworkMiner</a></td>
<td class="frame">NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.netresec.com/?page=RawCap"target="_blank">RawCap</a></td>
<td class="frame">RawCap is a free command line network sniffer for Windows that uses raw sockets.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.immunitysec.com/resources-freesoftware.shtml"target="_blank">Spike proxy</a></td>
<td class="frame">Not all web applications are built in the same ways, and hence, many must be analyzed individually. SPIKE Proxy is a professional-grade tool for looking for application-level vulnerabilities in web applications.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.tcpdump.org/"target="_blank">Tcpdump</a></td>
<td class="frame">Tcpdump prints out the headers of packets on a network interface that match the boolean expression.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://tcpreplay.synfin.net/trac/"target="_blank">Tcpreplay</a></td>
<td class="frame">Tcpreplay is a suite of BSD licensed tools written by Aaron Turner for UNIX (and Win32 under Cygwin) operating systems which gives you the ability to use previously captured traffic in libpcap format to test a variety of network devices</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://code.google.com/p/n1mda-dev/wiki/PirniUsageGuide"target="_blank">Pirni Sniffer</a></td>
<td class="frame">Pirni is the worlds first native network sniffer for iPhone. The iPhone's wifi has some major drawbacks in it's hardware design, thus we can not properly set the device in promiscious mode.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.ufasoft.com/sniffer/"target="_blank">Ufasoft Snif</a></td>
<td class="frame">Ufasoft Snif is a network sniffer, designed for capturing and analysis of the packets going through the network. Using the packet driver, it requests all the packets from the network card driver (even the packets not addressed to this computer).</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Enumeration"></a>Enumeration</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://code.google.com/p/dnsenum/"target="_blank">dnsenum</a></td>
<td class="frame">The purpose of Dnsenum is to gather as much information as possible about a domain.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.systemtools.com/somarsoft/"target="_blank">DumpSec</a></td>
<td class="frame">SomarSoft's DumpSec is a security auditing program for Microsoft Windows NT/XP/200x.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.ldapbrowser.com/"target="_blank">LDAP Browser</a></td>
<td class="frame">LDAP Browser is a premier Windows Explorer-like LDAP Directory client available for Win32 platforms.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.secguru.com/link/nbtenum_netbios_enume ration_utility"target="_blank">NBTEnum</a></td>
<td class="frame">NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.unixwiz.net/tools/nbtscan.html#download"target="_blank">nbtscan</a></td>
<td class="frame">This tool that scans for open NETBIOS nameservers on a local or remote TCP/IP network, and this is a first step in finding of open shares.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://dev.zenoss.org/svn/trunk/inst/externallibs/"target="_blank">wmi client</a></td>
<td class="frame">This DCOM/WMI client implementation is based on Samba4 sources. It uses RPC/DCOM mechanisms to interact with WMI services on Windows 2000/XP/2003 machines.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.gnucitizen.org/blog/new-version-of-dnsmap-out/"target="_blank">Dnsmap</a></td>
<td class="frame">Dnsmap is mainly meant to be used by pentesters during the information gathering/enumeration phase of infrastructure security assessments.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.darkoperator.com/blog/2009/4/3/dns-recon-tool-written-in-ruby.html"target="_blank">Dnsrecon</a></td>
<td class="frame">I wrote this tool back in late 2006 and it has been my favorite tool for enumeration thru DNS, in great part because I wrote it and it gives the output in a way that I can manipulate it in my own style. One of the features that I used the most and gave me excellent results is the SRV record enumeration.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mavetju.org/unix/dnstracer.php"target="_blank">Dnstracer</a></td>
<td class="frame">Dnstracer determines where a given Domain Name Server (DNS) gets its information from, and follows the chain of DNS servers back to the servers which know the data.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Networking_Tools"></a>Networking Tools</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://monkey.org/~dugsong/fragroute/"target="_blank">fragroute</a></td>
<td class="frame">fragroute intercepts, modifies, and rewrites egress traffic destined for a specified host.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.hping.org/"target="_blank">hping</a></td>
<td class="frame">hping is a command-line oriented TCP/IP packet assembler/analyzer.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.secdev.org/projects/scapy/"target="_blank">Scapy</a></td>
<td class="frame">Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.stunnel.org/"target="_blank">Stunnel</a></td>
<td class="frame">The stunnel program is designed to work as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://michael.toren.net/code/tcptraceroute/"target="_blank">tcptraceroute</a></td>
<td class="frame">tcptraceroute is a traceroute implementation using TCP packets. The more traditional traceroute(8) sends out either UDP or ICMP ECHO packets with a TTL of one, and increments the TTL until the destination has been reached.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://tracetcp.sourceforge.net/"target="_blank">tracetcp</a></td>
<td class="frame">tracetcp is a command line traceroute utility for WIN32 that uses TCP SYN packets rather than ICMP/UDP packets that the usual implementations use, thus bypassing gateways that block traditional traceroute packets.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.yersinia.net/"target="_blank">Yersinia</a></td>
<td class="frame">Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://nemesis.sourceforge.net/"target="_blank">Nemesis</a></td>
<td class="frame">Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Wireless"></a>Wireless</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.aircrack-ng.org/"target="_blank">Aircrack-ng</a></td>
<td class="frame">Aircrack is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.kismetwireless.net/"target="_blank">Kismet</a></td>
<td class="frame">Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.netstumbler.com/"target="_blank">NetStumbler</a></td>
<td class="frame">NetStumbler delivers a tool that helps you detect 802.11 a/b/g WLAN standards. While wardriving is its main use, the application also facilitates the verifying of network configurations.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.airgrab.com/AirGrab_WiFi_Radar/"target="_blank">AirGrab WiFi Radar</a></td>
<td class="frame">AirGrab WiFi Radar is a tool to display information about Apple Airport base stations and other WiFi (802.11b/g/n) wireless access points.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.airmobile.se/airmobile_agent.htm"target="_blank">AirMobile agent</a></td>
<td class="frame">Client application is downloaded in to your PDA or Windows cellular Phone where it will run in quite mode in the background. If the application finds a rouge access point it will investigate the AP and see if it posed a direct threat to your network.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.koingosw.com/products/airradar.php?affChecked=1"target="_blank">AirRadar 2</a></td>
<td class="frame">AirRadar allows you to scan for open networks and tag them as favourites or filter them out. View detailed network information, graph network signal strength, and automatically join the best open network in range.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.istumbler.net/"target="_blank">iStumbler</a></td>
<td class="frame">iStumbler is the leading wireless discovery tool for Mac OS X, providing plugins for finding AirPort networks, Bluetooth devices, Bonjour services and Location information with your Mac.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://trac.kismac-ng.org/"target="_blank">KisMAC</a></td>
<td class="frame">KisMAC is an open-source and free sniffer/scanner application for Mac OS X. It has an advantage over MacStumbler / iStumbler / NetStumbler in that it uses monitor mode and passive scanning.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.passmark.com/products/wirelessmonitor.htm"target="_blank">WirelessMon</a></td>
<td class="frame">WirelessMon is a software tool that allows users to monitor the status of wireless WiFi adapter(s) and gather information about nearby wireless access points and hot spots in real time.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.vistumbler.net/"target="_blank">Vistumbler</a></td>
<td class="frame">Vistumbler is a wireless network scanner written in AutoIT for Vista, Windows 7, and Windows 8. WiFiDB is a database written in php to store Vistumbler VS1 files. Keeps track of total access points w/gps, maps to kml, signal graphs, statistics, and more.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/tools/other/wavestumbler/"target="_blank">WaveStumbler</a></td>
<td class="frame">WaveStumbler is console based 802.11 network mapper for Linux. It reports the basic AP stuff like channel, WEP, ESSID, MAC etc.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.xirrus.com/Products/Wi-Fi-Inspector"target="_blank">Xirrus Wi-Fi Inspector</a></td>
<td class="frame"> Xirrus Wi-Fi Inspector is a powerful tool for managing and troubleshooting the Wi-Fi on a Windows XP SP2 or later, Vista, or 7 laptop. Built in tests enable you to characterize the integrity and performance of your Wi-Fi connection.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.flukenetworks.com/enterprise-network/wireless-network/AirMagnet-VoFi-Analyzer"target="_blank">AirMagnet VoFi Analyzer</a></td>
<td class="frame">AirMagnet VoFi Analyzer is the industry’s only solution for troubleshooting voice-over-WLAN problems in the field. VoFi Analyzer provides full analysis of encrypted WLAN traffic, scoring all calls in terms of call quality and proactively identifying all types of problems including phone issues, roaming issues, QoS issues, and RF.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://airpwn.sourceforge.net/Airpwn.html"target="_blank">Airpwn</a></td>
<td class="frame">Airpwn is a framework for 802.11 (wireless) packet injection. Airpwn listens to incoming wireless packets, and if the data matches a pattern specified in the config files, custom content is injected "spoofed" from the wireless access point. From the perspective of the wireless client, airpwn becomes the server.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://wifiscanner.sourceforge.net/"target="_blank">WifiScanner</a></td>
<td class="frame">WifiScanner is a tool that has been designed to discover wireless node (i.e access point and wireless clients). It is distributed under the GPL License.
It work with CISCO® card and prism card with hostap driver or wlan-ng driver, prism54g, Hermes/Orinoco, Atheros, Centrino, ...
An IDS system is integrated to detect anomaly like MAC usurpation.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Bluetooth"></a>Bluetooth</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://code.google.com/p/haraldscan/"target="_blank">Haraldscan</a></td>
<td class="frame">A Bluetooth Scanner for Linux and Mac OS X. Harald Scan is able to determine Major and Minor device class of device, as well as attempt to resolve the device's MAC address to the largest known Bluetooth MAC address Vendor list.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.fte.com/products/FTS4BT.aspx"target="_blank">FTS4BT</a></td>
<td class="frame">Frontline FTS4BT Bluetooth Protocol Analyzer. Developers and test engineers rely on FTS4BT to get them through the design, debug, test, verify, and qualification cycle.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/bluescanner/"target="_blank">BlueScanner</a></td>
<td class="frame">BlueScanner is a bash script that implements a scanner for Bluetooth devices. It's a tool designed to extract as much information as possible from Bluetooth devices without the requeriment to pair.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://trifinite.org/trifinite_stuff_bloooverii.html"target="_blank">Blooover II</a></td>
<td class="frame">Blooover II is a tool for audit based on Java (J2ME). It exists in version Blooover II for audit J2ME mobiles and as a breeeder edition. Easy utility for vulnerability testing.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.pentest.co.uk/downloads.html"target="_blank">BTScanner</a></td>
<td class="frame">BTScanner for XP is a Bluetooth environment auditing tool for Microsoft Windows XP, implemented using the bluecove libraries (an open source implementation of the JSR-82 Bluetooth API for Java).</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mulliner.org/palm/bluespam.php"target="_blank">BlueSpam</a></td>
<td class="frame">BlueSpam searches for all discoverable bluetooth devices and sends a file to them (spams them) if they support OBEX. By default a small text will be send. To customize the message that should be send you need a palm with an SD/MMC card, then you create the directory /PALM/programs/BlueSpam/Send/ and put the file (any type of file will work .jpg is allways fun) you would like to send into this directory.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/btcrawler/"target="_blank">BTCrawler</a></td>
<td class="frame">An application used to to discover Bluetooth devices and the services they provide. Runs on J2ME enabled devices supporting MIDP 2.0 and JSR082 (Java API for Bluetooth)</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://bluediving.sourceforge.net/"target="_blank">Bluediving</a></td>
<td class="frame">Bluediving is a Bluetooth penetration testing suite.
It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode (using more than one hci device).</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.alighieri.org/project.html"target="_blank">Bluesnarfer</a></td>
<td class="frame">Bluesnarfer steals informations from a wireless device through a Bluetooth connection. The connection can be between mobile phones, PDAs or Laptops. You can access to a calendar, contact list, emails and text messages.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Web_Scanners"></a>Web Scanners</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://arachni-scanner.com/"target="_blank">Arachni</a></td>
<td class="frame">Arachni is a fully automated system which tries to enforce the fire and forget principle. As soon as a scan is started it will not bother you for anything nor require further user interaction.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.portswigger.net/burp/"target="_blank">Burp Suite</a></td>
<td class="frame">Burp Suite is an integrated platform for performing security testing of web applications.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://www.owasp.org/index.php/Category:OWASP_C AL9000_Project"target="_blank">CAL9000</a></td>
<td class="frame">CAL9000 is a collection of web application security testing tools that complement the feature set of current web proxies and automated scanners. CAL9000 gives you the flexibility and functionality you need for more effective manual testing efforts.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.contextis.co.uk/research/tools/cat/"target="_blank">CAT</a></td>
<td class="frame">CAT is designed to facilitate manual web application penetration testing for more complex, demanding application testing tasks.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mcafee.com/us/downloads/free-tools/cookiedigger.aspx"target="_blank">CookieDigger</a></td>
<td class="frame">CookieDigger helps identify weak cookie generation and insecure implementations of session management by web applications. The tool works by collecting and analyzing cookies issued by a web application for multiple users.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://dirb.sourceforge.net/"target="_blank">DIRB</a></td>
<td class="frame">DIRB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary based attack against a web server and analizing the response.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.fiddler2.com/fiddler2/"target="_blank">Fiddler</a></td>
<td class="frame">Fiddler is a Web Debugging Proxy which logs all HTTP(S) traffic between your computer and the Internet. Fiddler allows you to inspect all HTTP(S) traffic, set breakpoints, and 'fiddle' with incoming or outgoing data.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/gamja/"target="_blank">Gamja</a></td>
<td class="frame">Gamja will find XSS(Cross site scripting) & SQL Injection weak point also URL parameter validation error. Who knows that which parameter is weak parameter? Gamja will be helpful for finding vulnerability[ XSS , Validation Error , SQL Injection].</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/grendel/"target="_blank">Grendel-Scan</a></td>
<td class="frame">A tool for automated security scanning of web applications. Many features are also present for manual penetration testing.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.httrack.com/"target="_blank">HTTrack</a></td>
<td class="frame">HTTrack is a free and easy-to-use offline browser utility. It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://michaelhendrickx.com/lilith"target="_blank">LiLith</a></td>
<td class="frame">LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html <form> tags, which often refer to dynamic pages that might be subject to SQL injection or other flaws.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cirt.net/nikto2"target="_blank">Nikto2</a></td>
<td class="frame">Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6500 potentially dangerous files/CGIs.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.parosproxy.org/index.shtml"target="_blank">Paros</a></td>
<td class="frame">A program called 'Paros' for people who need to evaluate the security of their web applications. It is free of charge and completely written in Java.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.powerfuzzer.com/"target="_blank">Powerfuzzer</a></td>
<td class="frame">Powerfuzzer is a highly automated and fully customizable web fuzzer (HTTP protocol based application fuzzer) based on many other Open Source fuzzers available and information gathered from numerous security resources and websites.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freecode.com/projects/proxyscan"target="_blank">ProxyScan.pl</a></td>
<td class="frame">proxyScan.pl is a security penetration testing tool to scan for hosts and ports through a Web proxy server. Features include various HTTP methods such as GET, CONNECT, HEAD as well as host and port ranges.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://code.google.com/p/ratproxy/"target="_blank">Ratproxy</a></td>
<td class="frame">A semi-automated, largely passive web application security audit tool, optimized for an accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex web 2.0 environments.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.blueinfy.com/tools.html"target="_blank">ScanEx</a></td>
<td class="frame">This is a simple utility which runs against target site and look for external references and cross domain malicious injections. There are several vulnerable sites which get manipulated with these types of injections and compromised.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://h30406.www3.hp.com/campaigns/2008/wwca mpaign/1-57C4K/index.php"target="_blank">Scrawlr</a></td>
<td class="frame">Scrawlr, developed by the HP Web Security Research Group in coordination with the MSRC, is short for SQL Injector and Crawler. Scrawlr will crawl a website while simultaneously analyzing the parameters of each individual web page for SQL Injection vulnerabilities.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/springenwerk/"target="_blank">Springenwerk</a></td>
<td class="frame">Springenwerk is a free Cross Site Scripting (XSS) security scanner written in Python.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sqlmap.org/"target="_blank">Sqlmap</a></td>
<td class="frame">sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sqlsus.sourceforge.net/"target="_blank">Sqlsus</a></td>
<td class="frame">sqlsus is an open source MySQL injection and takeover tool, written in perl.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freeworld.thc.org/root/tools/"target="_blank">THCSSLCheck</a></td>
<td class="frame">Windows tool that checks the remote ssl stack for supported ciphers and version.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://w3af.org/"target="_blank">w3af</a></td>
<td class="frame">w3af is a Web Application Attack and Audit Framework. The project’s goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://wapiti.sourceforge.net/"target="_blank">Wapiti</a></td>
<td class="frame">Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://gunzip.altervista.org/g.php?f=projects#webfuzzer"target="_blank">Webfuzzer</a></td>
<td class="frame">Webfuzzer is a tool that can be useful for both pen testers and web masters, it's a poor man web vulnerability scanner.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.owasp.org/index.php/Category:OWASP_W ebGoat_Project"target="_blank">WebGoat</a></td>
<td class="frame">WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.websecurify.com/"target="_blank">Websecurify</a></td>
<td class="frame">The Websecurify Suite is a web application security solution designed to run entirely from your web browser.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.owasp.org/index.php/Category:OWASP_W ebslayer_Project"target="_blank">WebSlayer</a></td>
<td class="frame">WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools has a payload generator and a easy and powerful results analyzer.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://github.com/urbanadventurer/WhatWeb/wiki"target="_blank">WhatWeb</a></td>
<td class="frame">WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.sensepost.com/labs/tools/pentest/wikto"target="_blank">Wikto</a></td>
<td class="frame">Wikto is Nikto for Windows - but with a couple of fancy extra features including Fuzzy logic error code checking, a back-end miner, Google assisted directory mining and real time HTTP request/response monitoring.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.mcafee.com/us/downloads/free-tools/wsdigger.aspx"target="_blank">WSDigger</a></td>
<td class="frame">WSDigger is a free open source tool designed by McAfee Foundstone to automate black-box web services security testing (also known as penetration testing). WSDigger is more than a tool, it is a web services testing framework.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.scrt.ch/en/attack/downloads/xssploit"target="_blank">XSSploit</a></td>
<td class="frame">XSSploit is a multi-platform Cross-Site Scripting scanner and exploiter written in Python. It has been developed to help discovery and exploitation of XSS vulnerabilities in penetration testing missions.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.scrt.ch/en/attack/downloads/fireforce"target="_blank">Fireforce</a></td>
<td class="frame">Fireforce is a Firefox extension designed to perform brute-force attacks on GET and POST forms. Fireforce can use dictionaries or generate passwords based on several character types.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://www.mavitunasecurity.com/netsparker/"target="_blank">Netsparker</a></td>
<td class="frame">Netsparker is a web application security scanner, with support for both detection and exploitation of vulnerabilities. It aims to be false positive–free by only reporting confirmed vulnerabilities after successfully exploiting or otherwise testing them.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://itsecteam.com/en/projects/project1_page2.htm"target="_blank">Havij</a></td>
<td class="frame">Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Database"></a>Database Vulnerabilities</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.oracle.com/us/products/database/berkele y-db/index.html"target="_blank">Berkeley DB</a></td>
<td class="frame">Oracle Berkeley DB is a family of open source, embeddable databases that allows developers to incorporate within their applications a fast, scalable, transactional database engine with industrial grade reliability and availability.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.dbsoftlab.com/database-editors/database-browser/overview.html"target="_blank">Database browser</a></td>
<td class="frame">Database browser is an universal table editor. This easy to use tool allows user to connect to any database and browse or modify data,run sql scripts, export and print data.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/db2utils/"target="_blank">Db2utils</a></td>
<td class="frame">db2utils is a small collection of db2 utilities. It currently features three different tools db2disco, db2fakesrv and db2getprofile.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/test/"target="_blank">Oracle Auditing Tools</a></td>
<td class="frame">The Oracle Auditing Tools is a toolkit that could be used to audit security within Oracle database servers.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/oscanner/"target="_blank">Oscanner</a></td>
<td class="frame">Oscanner is an Oracle assessment framework developed in Java. It has a plugin-based architecture and comes with a couple of plugins.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/sql-auditing-tools/"target="_blank">SQL Auditing Tools</a></td>
<td class="frame">SQLAT is a suite of tools which could be usefull for pentesting a MS SQL Server. The tools are still in development but tend to be quite stable. The tools do dictionary attacks, upload files, read registry and dump the SAM.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freeworld.thc.org/thc-orakel/"target="_blank">THC-ORACLE</a></td>
<td class="frame">THC presents a crypto paper analyzing the database authentication mechansim used by oracle. THC further releases practical tools to sniff and crack the password of an oracle database within seconds.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://freeworld.thc.org/thc-orakelcrackert11g/"target="_blank">thc-orakelcrackert11g</a></td>
<td class="frame">OrakelCrackert is an Oracle 11g database password hash cracker using a weakness in the Oracle password storage strategy. With Oracle 11g, case sensitive SHA1 based hashing is introduced.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.cqure.net/wp/tools/database/dbpwaudit/"target="_blank">DBPwAudit</a></td>
<td class="frame">DBPwAudit is a Java tool that allows you to perform online audits of password quality for several database engines. The application design allows for easy adding of additional database drivers by simply copying new JDBC drivers to the jdbc directory.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.darkoperator.com/tools-and-scripts/"target="_blank">MYSQLAudit</a></td>
<td class="frame">Python Script for basic auditing of common security misconfigurations in MySQL.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sqlninja.sourceforge.net/"target="_blank">sqlininja</a></td>
<td class="frame">sqlininja exploits web applications that use Microsoft SQL Server as a database backend. Its focus is on getting a running shell on the remote host. sqlninja doesn't find an SQL injection in the first place, but automates the exploitation process once one has been discovered.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.greensql.net/"target="_blank">GreenSql</a></td>
<td class="frame">GreenSQL is an Open Source database firewall used to protect databases from SQL injection attacks. GreenSQL works as a proxy and has built in support for MySQL and PostgreSQL.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Vuln_Scanners"></a>Vuln Scanners</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.metasploit.com/"target="_blank">Metasploit Framework</a></td>
<td class="frame">The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.openvas.org/"target="_blank">OpenVAS</a></td>
<td class="frame">OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.tenable.com/products/nessus"target="_blank">Nessus</a></td>
<td class="frame">Nessus detects, scans, and profiles numerous devices and resources to increase security and compliance across your network.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://innu.org/"target="_blank">Porkbind</a></td>
<td class="frame">Porkbind is a multi-threaded nameserver scanner that can recursively query nameservers of subdomains for version strings. (i.e. sub.host.dom's nameservers then host.dom's nameservers)</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.immunitysec.com/products-canvas.shtml"target="_blank">Canvas</a></td>
<td class="frame">Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.social-engineer.org/framework/Computer_Based_Social_Engineering_Tools:_Social_Engineer_Toolkit_(SET)"target="_blank">Social-Engineer Toolkit (SET)</a></td>
<td class="frame">The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.acunetix.com/vulnerability-scanner/"target="_blank">Acunetix</a></td>
<td class="frame">Acunetix web vulnerability scanner is a tool designed to discover security holes in your web applications that an at-tacker would likely abuse to gain illicit access to your systems and data. It looks for multiple vulnerabilities includingSQL injection, cross site scripting, and weak passwords.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://rips-scanner.sourceforge.net/"target="_blank">RIPS</a></td>
<td class="frame">RIPS is a tool written in PHP to find vulnerabilities in PHP applications using static code analysis.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.rapid7.com/products/nexpose/editions-and-features.jsp"target="_blank">Rapid7 NeXpose</a></td>
<td class="frame">Rapid7 NeXpose is a vulnerability scanner which aims to support the entire vulnerability management lifecycle, including discovery, detection, verification, risk classification, impact analysis, reporting and mitigation. It integrates with Rapid7's Metasploit for vulnerability exploitation</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://bcable.net/project.php?vulndetector"target="_blank">VulnDetector</a></td>
<td class="frame">VulnDetector is a project aimed to scan a website and detect various web based security vulnerabilities in the website. Currently, VulnDetector can detect Cross Site Scripting (XSS) and SQL Injection (SQLI) vulnerabilities on a web based script, but has no easy to use interface. </td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://unconciousmind.blogspot.com/"target="_blank">Damn Small SQLi Scanner</a></td>
<td class="frame"> DSSS supports blind/error SQLi tests, depth 1 crawling and advanced comparison of different attributes to distinguish blind responses (titles, HTTP status codes, filtered text only lengths and fuzzy comparison of contents itself). If you are satisfied with your commercial tool scanning results then I believe that you could even be more satisfied with this one.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.microsoft.com/en-us/download/details.aspx?id=19968"target="_blank">CAT.NET</a></td>
<td class="frame">CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site Scripting (XSS), SQL Injection and XPath Injection.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://peachfuzzer.com/"target="_blank">Peach Fuzzer</a></td>
<td class="frame">Peach is a SmartFuzzer that is capable of performing both generation and mutation based fuzzing. Peach requires the creation of PeachPit files that define the structure, type information, and relationships in the data to be fuzzed.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.gfi.com/products-and-solutions/network-security-solutions/gfi-languard"target="_blank">GFI LanGuard</a></td>
<td class="frame">GFI LanGuard is a network security and vulnerability scanner designed to help with patch management, network and software audits, and vulnerability assessments. The price is based on the number of IP addresses you wish to scan. A free trial version (up to 5 IP addresses) is available.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://technet.microsoft.com/en-us/security/cc184923"target="_blank">MBSA</a></td>
<td class="frame">Microsoft Baseline Security Analyzer (MBSA) is an easy-to-use tool designed for the IT professional that helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Vuln_Apps"></a>Vuln Apps</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.dvwa.co.uk/"target="_blank">Damn Vulnerable Web Application (DVWA)</a></td>
<td class="frame">Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.damnvulnerablelinux.org/"target="_blank">Damn Vulnerable Linux</a></td>
<td class="frame">Damn Vulnerable Linux (DVL) is everything a good Linux distribution isn’t. Its developers have spent hours stuffing it with broken, ill-configured, outdated, and exploitable software that makes it vulnerable to attacks. DVL isn’t built to run on your desktop – it’s a learning tool for security students</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/metasploitable/"target="_blank">Metasploitable</a></td>
<td class="frame">Metasploitable is an intentionally vulnerable Linux virtual machine. This VM can be used to conduct security training, test security tools, and practice common penetration testing techniques. </td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.kioptrix.com/blog/?page_id=135"target="_blank">Kioptrix</a></td>
<td class="frame">This Kioptrix VM Image are easy challenges. The object of the game is to acquire root access via any means possible (except actually hacking the VM server or player). The purpose of these games are to learn the basic tools and techniques in vulnerability assessment and exploitation.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://bruteforce.gr/honeydrive"target="_blank">HoneyDrive</a></td>
<td class="frame">HoneyDrive is a virtual appliance (OVA) with Xubuntu Desktop 12.04 32-bit edition installed. It contains various honeypot software packages such as Kippo SSH honeypot, Dionaea malware honeypot, Honeyd low-interaction honeypot, Glastopf web honeypot along with Wordpot, Thug honeyclient and more.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.badstore.net/"target="_blank">Badstore</a></td>
<td class="frame">Badstore.net is dedicated to helping you understand how hackers prey on Web application vulnerabilities, and to showing you how to reduce your exposure. </td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project"target="_blank">OWASP Insecure Web App Project</a></td>
<td class="frame">InsecureWebApp is a web application that includes common web application vulnerabilities. It is a target for automated and manual penetration testing, source code analysis, vulnerability assessments and threat modeling.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.nth-dimension.org.uk/blog.php?id=88"target="_blank"> VulnApp</a></td>
<td class="frame">VulnApp, is a BSD licensed ASP.net application implementing some of the most common applications we come across on our penetration testing engagements.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://vicnum.ciphertechs.com/"target="_blank">OWASP Vicnum</a></td>
<td class="frame">Vicnum is an OWASP project consisting of vulnerable web applications based on games commonly used to kill time. These applications demonstrate common web security problems such as cross site scripting, sql injections, and session management issues.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project"target="_blank">OWASP Broken Web Applications Project</a></td>
<td class="frame">The Broken Web Applications (BWA) Project produces a Virtual Machine running a variety of applications with known vulnerabilities</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/lampsecurity/"target="_blank">LAMPSecurity</a></td>
<td class="frame">LAMPSecurity training is designed to be a series of vulnerable virtual machine images along with complementary documentation designed to teach linux,apache,php,mysql security.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/virtualhacking/"target="_blank">Virtual Hacking Lab</a></td>
<td class="frame">A mirror of deliberately insecure applications and old softwares with known vulnerabilities. Used for proof-of-concept /security training/learning purposes. Available in either virtual images or live iso or standalone formats.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="https://code.google.com/p/wavsep/"target="_blank">WAVSEP</a></td>
<td class="frame">The Web Application Vulnerability Scanner Evaluation Project, is a vulnerable web application designed to help assessing the features, quality and accuracy of web application vulnerability scanners. This evaluation platform contains a collection of unique vulnerable web pages that can be used to test the various properties of web application scanners.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.bonsai-sec.com/en/research/moth.php"target="_blank">Moth</a></td>
<td class="frame">Moth is a VMware image with a set of vulnerable Web Applications and scripts, that you may use for, testing Web Application Security Scanners, testing Static Code Analysis tools (SCA), giving an introductory course to Web Application Security</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://suif.stanford.edu/~livshits/securibench/"target="_blank">SecuriBench</a></td>
<td class="frame">Stanford SecuriBench is a set of open source real-life programs to be used as a testing ground for static and dynamic security tools. Release .91a focuses on Web-based applications written in Java.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://informatica.uv.es/~carlos/docencia/netinvm/#id7"target="_blank">NETinVM</a></td>
<td class="frame">NETinVM is a single VMware or VirtualBox virtual machine image that contains, ready to run, a series of User-mode Linux (UML) virtual machines which, when started, conform a whole computer network inside the VMware or VirtualBox virtual machine.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<table class="filelist" align="center" width="550" cellpadding="5" cellspacing="0">
<tbody>
<tr>
<th class="gray"><a id = "Live_CD"></a>Live CD</th>
<th class="gray"></th>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.backtrack-linux.org/"target="_blank">BackTrack</a></td>
<td class="frame">BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.kali.org/"target="_blank">Kali Linux</a></td>
<td class="frame">Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.backbox.org/"target="_blank">BackBox</a></td>
<td class="frame">BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://samurai.inguardians.com/"target="_blank">Samurai</a></td>
<td class="frame">The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. </td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.hackfromacave.com/katana.html"target="_blank">Katana</a></td>
<td class="frame">Katana is a portable multi-boot security suite which brings together many of today's best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, NMAP, Cain & Abel, and many more.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://sourceforge.net/projects/blackbuntu/"target="_blank">blackbuntu</a></td>
<td class="frame">Penetration Testing Distribution based on Ubuntu 10.10 which was specially designed for security training students and practitioners of information security.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://bugtraq-team.com/"target="_blank">Bugtraq</a></td>
<td class="frame">Bugtraq is a distribution based on the 2.6.38 kernel has a wide range of penetration and forensic tools. Bugtraq can install from a Live DVD or USB drive, the distribution is customized to the last package, configured and updated the kernel and the kernel has been patched for better performance and to recognize a variety of hardware, including wireless injection patches pentesting other distributions do not recognize.</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://networksecuritytoolkit.org/nst/index.html"target="_blank">Network Security Toolkit (NST)</a></td>
<td class="frame">This bootable ISO live CD/DVD (NST Live) is based on Fedora. The toolkit was designed to provide easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms.
</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.pentoo.ch/"target="_blank">Pentoo</a></td>
<td class="frame">Pentoo is a penetration testing LiveCD distribution based on Gentoo. It features a lot of tools for auditing and testing a network, from scanning and discovering to exploiting vulnerabilities</td>
</tr>
<tr>
<td class="frame"><a class="link" href="http://www.blackarch.org/"target="_blank">BlackArch</a></td>
<td class="frame">BlackArch is an Arch-based security distribution. There are over 600 tools in BlackArch's package repository. The BlackArch live ISO comes with multiple window managers, including dwm, Awesome, Fluxbox, Openbox, wmii, i3, and Spectrwm. The BlackArch package repository is compatible with existing Arch installs.</td>
</tr>
</tbody>
</table>
<center>
<a href= "#top"> Top </a>
</center>
<br/>
<div class='centered'>
<pre><a href="http://www.catb.org/esr/faqs/hacker-howto.html"target="_blank"> .
..:</a>
</pre>
</div>
</p>
</div> <!-- left stop -->
<div class="right">
<a href="http://gexos.org/"target="_blank"title="Blog">My Blog</a><br/><br/>
<a href="https://github.com/Gexos?tab=repositories"target="_blank"title="Github">My Github Repos</a><br/><br/>
<br/><br/>
<iframe src="http://ghbtns.com/github-btn.html?user=Gexos&type=follow"
allowtransparency="true" frameborder="0" scrolling="0" width="132" height="20"></iframe><br/><br/>
<a href="https://twitter.com/theGexos" class="twitter-follow-button" data-show-count="false">Follow @theGexos</a>
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>
<br/><br/>
<a href="https://twitter.com/share" class="twitter-share-button" data-text="Hacking Tools Repository" data-via="theGexos" data-count="none">Tweet</a>
<script>!function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0],p=/^http:/.test(d.location)?'http':'https';if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src=p+'://platform.twitter.com/widgets.js';fjs.parentNode.insertBefore(js,fjs);}}(document, 'script', 'twitter-wjs');</script>
<br/><br/>
<a href="http://www.reddit.com/submit" onclick="window.location = 'http://www.reddit.com/submit?url=' + encodeURIComponent(window.location); return false"> <img src="http://www.reddit.com/static/spreddit7.gif" alt="submit to reddit" border="0" /> </a>
</div> <!-- right stop -->
</div> <!-- main stop -->
</body>
</html>