Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Security: rydalch/risk

Security

.github/security.md

InfoSec Resources

VMs to test tools and explore vulnerabilities:

Metasploitable:

Webgoat: Insecure J2EE website for testing web vulnerabilities.

Certified Hacker: Various exploitable websites http://certifiedhacker.com

Wireshark Trace Files

Basic Tools

Methodologies & Standards

Penetration Testing Execution Standard http://www.pentest-standard.org/

Open Web Application Security Project https://www.owasp.org

Open Source Security Testing Methodology Manual http://www.isecom.org/

NIST

ISO

GLBA

HIPAA

FISMA

Vulnerability Research Sites

National Vulnerability Database nvd.nist.gov

SecurityTracker

SecuriTeam

Secunia

Hackerstorm Vulnerability Database Tool

HackerWatch

SecurityFocus

Security Magazine

SC Magazine

Exploit Database

https://pwnedlist.com/ : Database of compromised accounts by email address

http://www.wirelessdefence.org/

Footprinting Tools

Website Research Tools

Netcraft

Webmaster http://webmaster-a.com/link-extractor-internal.php

iWEBTOOL

Archive www.archive.org

DNS and WHOIS tools

nslookup

Sam Spade

WebFerret

ARIN

DomainTools

Network Solutions

WherISIP

DNSStuff

BetterWhois

DNS-Digger

SpyFu

Dig (part of BIND) www.isc.org/software/bind

Traceroute Tools and Links

VisualRoute Trace

3d Visual Route

VisualIPTrace

Trout www.foundstone.com

PingPlotter

Path Analyzer Pro

Website Mirroring Tools and Sites

BlackWidow

Reamweaver

Wget

Teleport Pro

Archive

Google cache

E-mail Tracking

eMailTrackerPro

PoliteMail

Google Hacking

Google Hacking Database www.hackersforcharity.org/ghdb

Google Hacks http://code.google.com/p/googlehacks/

Google Hacking Master List http://it.toolbox.com/blogs/managing-infosec/google-hacking-master-list-28302

Scanning and Enumeration Tools

Ping Sweep

Angry IP Scanner

Colasoft Ping

Ultra Ping Pro

Ping Scanner Pro

MegaPing

Friendly Pinger

Scanning Tools

SuperScan

Nmap (ZenMap)

NetScan Tools Pro

Hping

LAN Surveyor

MegaPing

NScan

Infilitrator

Netcat

IPEye

THC-AMap

War Dialing

THC-SCAN

TeleSweep

ToneLoc

PAWS

WarVOX

Banner Grabbing

Telnet

ID Serve

Netcraft

Xprobe

THC-AMAP

Vulnerability Scanning

Nessus

SAINT

GFI LanGuard

Retina

Core Impact

MBSA

Nikto

WebInspect

GFI Languard

Proxy, Anonymizer, and Tunneling

Tor

ProxyChains

SoftCab

Proxifier

HTTP Tunnel

Anonymouse

Anonymizer

Psiphon

Enumeration

PSTools

P0f

SuperScan

User2Sid/Sid2User www.svrops.com/svrops/dwnldutil.htm OR http://windowssecurity.com

SNMP Scanner

NSauditor

SolarWinds

LDAP Admin

LEX

Ldp.exe

SNMPUTIL

IP Network Browser www.solarwinds.com

Xprobe www.sys-security.com/index.php?page-xprobe

System Hacking Tools

Password Hacking Tools

Cain

John the Ripper

LCP

THC-Hydra

ElcomSoft

Lastbit

Ophcrack

Aircrack

Rainbow crack

Brutus

Windows Password Recovery

KerbCrack

Sniffing

Wireshark

Ace

KerbSniff

Ettercap

Keyloggers and Screen Capture

KeyProwler

Handy Key Logger

Actual Keylogger

Actual Spy

Ghost

Hidden Recorder

IcyScreen

DesktopSpy

USB Grabber

Covering Tracks

ELsave

EraserPro

WindowWasher

Auditpol

WinZapper

EvidenceEliminator

Packet Crafting

Homodia

Hping2

PackEth

Packet generator

Netscan

Scapy

Nemesis

Session Hijacking

Paros Proxy

Burp Suite

Firesheep

Hamster/Ferret http://erratasec.blogspot.com/2009/03/hamster-20-and-ferret-20.html

Ettercap

Hunt http://packetstormsecurity.com

Cryptography and Encryption

Encryption Tools

TrueCrypt

Bitlocker

DriveCrypt

Hash Tools

MD5 Hash

HashCalc

Steganography

ImageHide

gifShuffle

QuickStego

EZStego

OpenStego

S Tools

JPHIDE

wbStego

MP3Stegz

OurSecret

OmniHidePro

AudioStega

StegHide

XPTools

Cryptanalysis

Cryptanalysis

Cryptobench

EverCrack

Sniffing

Packet Capture

Wireshark

CACE

tcpdump

Capsa

OmniPeek

NetWitness

Windump

dsniff

EtherApe

Wireless

Kismet

NetStumbler

MAC Flooding/Spoofing

Macof

SMAC

ARP Poisoning

Cain

UfaSoft

WinARP Attacker

Trojans and Malware

Wrappers

EliteWrap

Monitoring Tools

HiJackThis

What's Running

CurrPorts

SysAnalyzer

Regshot

Driver Detective

SvrMan

ProcessHacker

fport

Attack Tools

netcat

nemesis

IDS

snort

Evasion Tools

ADMutate

NIDSBench

IDSInformer

Inundator

Wireless

WIGLE

AirPcap

Madwifi

Kismet

NetStumbler

AirMagnet WiFi Analyzer

Airodump

Aircrack

AirSnort

BT Browser

BlueScanner

Bluediving

SuperBlueTooth Hack

KisMAC

NetSurveyor

inSSIDer

WiFi Pilot

OmniPeek

Web Attacks

Wfetch

Httprecon

ID Serve

WebSleuth

BlackWidow

cURL

CookieDigger

WebScarab

Nstalker

NetBrute

SQL Injection

BSQL Hacker

Marathon

Havil

SQL Injection Brute

SQL Brute

SQLNinja

SQLGET

Miscellaneous

Pen Test Suites

Core Impact

CANVAS

Metasploit

Armitage

Codenomicon

Extras

SysInternals

Tripwire

Mandiant - Redline answers the question: are you compromised?

Mandiant - Web Historian browser analysis

Mandiant - Memoryze memory forensics

Mandiant - Highlighter log analysis

Mandiant - Red Curtain malware identifier

Mandiant - IOCe indicator of compromise editor

Mandiant - OpenIOC Common language to describe IOCs

Compliance Tools

http://sectools.org/

http://it-audit.sans.org/blog/

ABI-Coder Encryption

ACL Manager

AD Manager Plus

AXCrypt Encryption

BinScope

Blat

Brutus Password testing

Cain and Abel Password recovery tool for Windows

Checksum

Cryptograph Encryption

DD for Windows

DES Security Manager Encryption

DumpACL

DumpEL

DumpEVT

Dumpsec

Dumpusers

eEye Retina

EFSView Encryption

Ekahau HeatMapper

Enclave Risk Assessment

FCIV

Fiddler and Watcher

FileCheckMD5

Firewall Audit

Foundstone

FPort

FProt Desktop Encryption Encryption

FWBuilder

GNUPG Encryption

Goolag Scanner

Hex Editor Neo

HFNetChk

HoneyBOT

Hyena

Kerberos Cracker

Kiwi Cattools

LC5

LC6

LCP

LinNT

Lynis

MBCA

Md5deep

Metasploit Framework

Microsoft BSA

MiniFuzz

MySQL

NetFlow Analyzer

Netifera

NetStumbler Free Windows 802.11 Sniffer

Newt Professional

Nightwolf Binder

Ngrep

Nipper http://code.google.com/p/nipper-ng/ Firewalls and routers

Nmap Free network mapper and scanner

NStealth

NTLast

OpenVAS

Openworkbench

Paros Web application vulnerability assessment proxy

Parse Nmap

Password Recovery

PBNJ

PCI Tools

Perms

PGP Encryption

Process Explorer

ProcessDump

PSTools

PTA Professional

Pulist

Rapid7 Nexpose

Rawrite LinNT

Router Audit Tool Router

Scanline

Sdelete

Secunia

SOMAP Orico

SOSOS

Spiceworks

Splunk

Stego

SuperScan

SysinternalsSuite Collection of powerful windows utilities

Tenable Nessus Vulnerability assessment tool

Tenable NeWT

TrueCrypt

Vistumbler

W3AF

WebApp

WebScarab

WinAudit

Winfingerprint

WinHash

WinHex

Wireshark Open source network protocol analyzer for Unix and Windows.

Xcalcs

Security Sites

Isaca.org
Securitymanagement.com
Secureenterprisemag.com
Infosecuritymag.com
Securitydirectornews.com
SCmagazine.com

Business Sites

Businessweek.com
Forbes.com
Fortune.com
CFO.com
WSJ.com
Fastcompany.com

Incident Command System

Technology Sites

Baslinemag.com
Computerworld.com
CIOinsight.com
Infoworld.com
CIO.com
Optimizemag.com
TechTarget.com
Networkworld.com
CIOdecisions.com
Informationweek.com

There aren’t any published security advisories

Morty Proxy This is a proxified and sanitized view of the page, visit original site.