Popular links for penetration testing, forensics, security, and hacking

Source: Internet
Author: User
Tags ftk imager cipher suite

Are you still looking for a tool to complete your daily activities, or are you just looking for new tools that you can try to play? No need to worry, because today is your lucky day! Today, I will mention a variety of links, resources and editing tools that can be used for penetration testing, computer forensics, security, and hacking techniques.

toolswatch.org

Toolswatch.org is maintained by NJ Ouchn (@toolswatch) and Maxi Solder (@maxisoler). This is a cool website where you can find the latest version of audit, penetration testing tools. Web Application Security Advisor, system Administrator, network administrator, malware analyst, information security enthusiast, and security specialist. You can also submit tools that promote yourself.

Toolswatch.org is also a project of NJ Ouchn (@toolswatch) and Maxi Solder (@maxisoler) including vfeed® (an open source related and cross-linked vulnerability XML database), DPE (default password enumeration project) , Firecat (Firefox directory Audit extension), as/400 security Assessment Mind Map, Kromcat (Google Chrome directory Audit extension) and SSA (Security System Analyzer 2.0).

Soldierx Tools and Labs

Soldierx.com is known to keep the world's largest public hacker database on the Web (Soldierx HDB), but they also keep their public projects available on the SX Labs page, as well as a collection of their recommended tools, which can be found in https:// Www.soldierx.com/tools found. I suggest you take a look at these three items, Agent steal, penetration test kit, and Wdivulge.

Dirk Loss : the Python tool for penetration testing

If you are a Python programmer and enthusiast, I believe you should consult the Dirk Loss ' s Python Penetration testing tool list. The tools listed on the page are categorized as network, debug and reverse engineering, fuzzing, Web, forensics, malware analysis, PDF, Miscellaneous, and other useful libraries and tools.

According to the author's page: "Some of the more offensive tools (infiltration system framework, Bluetooth Accelerator, Web Application Security vulnerability scanner, war-dialers program, etc.) are excluded because the legal status of these tools is still somewhat unclear in Germany, even after the Supreme Court decision." This list is specifically designed to help white hats, and I now prefer to be safe. "

Holisticinfosec

This is an information security tool written by Russ McRee Blog, a blog that maintains a monthly column in ISSA magazine. I like this blog, it handles different penetration tests, malware analysis, fuzzing, and security tools, including how to use it like a boss.

Www.YouXia.Org

China is a good focus on information and network security blog, usually update not too fast, of course, is not too slow. There will be some content on hacker technology, security hardening, and level protection. Of course, the most important, may regularly test some of the usual rare commercial security products.

sectools.org

Sectools.org is a website maintained by Gordon "Fyodor" Lyon (the author is the founder of the Nmap Security scanner). It contains tool descriptions and top 125 network security tools categorized as anti-malware, application-specific scanners, Web browser–related, password cracking, cryptographic tools, debuggers, firewalls, forensics, fuzzer, generic tools, intrusion detection systems (IDS), packet-based Tools, port scanners, rootkit probes, security-oriented operating systems, packet sniffers, exploit tools, traffic monitoring tools, vulnerability scanners, Web proxy servers, Web vulnerability scanners, and wireless tools.

Edge-security group-projects

Edge-security Group is focused on offensive security, malware intelligence, and mobile security professionals who also maintain their own projects: Theharvester,metagoofil Collectors, Wfuzz (Web application Bruteforcer), proxystrike (passive agent), Webslayer (Wfuzz front end), edge-ssh ssh brute force hack suite, Hosproxy and Geodedge.

Security Tool Files from Packet Storm

Security tool files from Packet storm contains the documents submitted by various safety researchers, penetration testers, programmers, etc. you can submit your own tools via mail them at packetstormsecurity.com

Viaforensics Free Tools

Viaforensics is a company known for its expertise in mobile forensics, and the project requires Santoku Linux, a Linux distribution for mobile security, malware analysis and forensics. In addition to Santoku Linux, they also maintain their own tools and projects. Here you can find: https://viaforensics.com/resources/tools/

Top Digital Forensic Investigation Tools for SysAdmins by GFI

Andrew Zammit Tabona GFI wrote a cool article for the digital Forensic investigation tools for system administrators, about 20 forensic tools. The tools listed in the blog (according to their rankings) are: SAN SIFT, Prodiscover Basic, volatility, the sleuth Kit (+autopsy), ftk Imager, Linux ' DD ', CAINE, O Xygen Forensic Suite 2013 standard, free hex editor, batch extractor, smart Linux, Xplico, Lastactivityview, Digital Forensics framework, Mandiant RedLine, Plainsight, HxD, HELIX3 Free,netsleuth and P2 eXplorer free. For more information about the mentioned tools, see the article.

Free Computer forensics tool by forensic Control

Judicial control has more than 115 free tools, digital forensics analysis; they are called disk mirroring tools, e-mail analysis, general, file and data analysis, MAC OS tools, mobile devices, data analysis Suite, file viewer, network analysis, registry analysis, application analysis, and Abandonware. You can also advise them to list other tools by email [email protected].

CERT Linux Forensic Tools Library

CERT (Computer Emergency Response Team) The Linux Forensics Tool Library is a digital forensics tool that can install or use the CERT Forensics toolkit on demand. The memory card works primarily for Fedora and Centos/rhel Linux distributions.

NirSoft

NirSoft is a NIR Sofer maintained web site that is used by experienced developers using the C + +,. NET Framework, Windows API, and reverse engineering undocumented binary formats and encryption algorithms. His website contains his projects and free software utilities, which are categorized as password recovery tools, network monitoring tools, Internet related tools, MS Outlook tools, command line tools, desktop tools, and free software system tools.

securityxploded Security Tools

Securityxploded is a known and most popular information security research and development organization offering free security software, up-to-date research articles and free training in reverse engineering and malware analysis. They also launched more than 150 free security software. Here are some of their projects, listed by Category:

Password recovery tool:

• Asterisk password Viewer

• Browser Password Dump

Facebook Cipher decryption device

FileZilla Cipher Decryption device

• Google password decryption device

SX Hash Kit

SX Cipher Suite

• Yahoo! Password decryption device

Zip password Unlocking device

Anti-spyware/anti--rootkit tools:

• Advanced Service Manager

• Auto-run file removal

DLL Hijacking Audit

• Encrypted File Scanner update

exe file scanning

• Hide File Lookup

Malpimp

py Mal

• Shell Detection

• Spy BHO Uninstall

• Spyware DLL Offload

Stream Armor

• Virus scanners

Network Security Tools:

• Directory scanners

Facebook Blocking program updates

• Updated Google ad blocker

• Hide Computer

• Instant Blocker updates

IPv6 Disabling updates

LDAP Search

MAC Address scanning program

• Network Database Scanner

• Network sharing monitoring

System Security Tools:

ASLR Process Scanner

• Automatic screen Capture

• Browser History view

DEP Process Scanner

DLL Finder

DLL Magic

DLL Relocation Finder

DLL Removal

• Download hash value verification

• Enable Administrator updates

Exe64bit Detectors

• File Time Changer

• Comparison of hash values

• Hashing Console

• Hash generator

• Hidden CMD Detector

Open source Digital Forensics tools

Open source Digital Forensics (www2.opensourceforensics.org) is a reference site for open source software tools, which are categorized as follows:

Bootable environments--uses a suspicious system to boot to a trusted state.

Data acquisition--uses the collected information from dead or alive suspicious systems.

Volume system--is used to examine the data structure of organized media, such as partition tables and disk labels.

File system--is used to examine a filesystem or disk image and display file contents and other market data.

application--is used to analyze the contents of a file (that is, at the application layer).

network--is used to analyze network packets and traffic. This does not include logs for network devices.

The memory--is used to analyze memory dumps from the computer.

frameworks--is used to build custom tools.

Backbox Linux Team Project

In addition to the Backbox Linux project, the Backbox Linux team has its own projects, which are listed below:

Dsploit--android Network Penetration Kit

pycryptocat--a cryptocat independent client

weevely--generate and manage hard-to-detect PHP Trojans

climber--checking the privilege escalation of the unix/linux system

Netcommander--arp Cheat Tool

fang--a multi-service thread MD5 hack

help page for network security software

In addition to information security articles, help the Web Security Maintenance page, which lists the most popular security software for Windows, Linux, and Mac OS x. The software is divided into Access control, analyzer, anti-spam, antispyware, antivirus, audit, encryption, firewall, monitoring, network, password, portable storage, privacy, programming, scanners, various, and wireless.

UIC R.E. Academy ' s download page

UIC R.E. Academy has a download page that includes a list of tools for reverse engineering and malware analysis, categorized as compilers, Disassembler and debugger, logging and monitoring tools, malware analysis tools, and PE tools.

SecurityFocus Tools

SecurityFocus Tools is known to have an updated vulnerability database and an active mailing list, but, beyond that, they also keep the Resources page and you can submit new tools and beta programs.

ISC Tools

The ISC tools page is where you can find online tools such as Base 64 decoder, EXIF Reader, Ipv6/ipv4 conversion and analysis, website usability check, GDI scan etc. The page is maintained by the SAN Internet Storm Center.

This article has the small Ann Attack and Defense Research Laboratory translation, if has the translation and the editing error please contact the Administrator, we will revise as soon as possible.

Original: http://resources.infosecinstitute.com/top-links-tools-compilation-pentesting-forensics-security-hacking/

Resources:

http://pentestlab.org/blogs-articles-about-pentesting-tools-compilation/

http://securityxploded.com/about.php

Http://www2.opensourceforensics.org/tools

Http://www.backbox.org/projects

Author Profile:

Jay Turla is a security researcher at the Philippine Institute of Information Security and a student of safe programming. He is interested in Linux, penetration testing, and vulnerability assessment. He is a Rootcon (Philippine hacker Conference mania.

Popular links for penetration testing, forensics, security, and hacking

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.