Hello, 0x00’ers!
@zSec gave us the idea to make a Wiki with working services for things such as email relays, SMS spoofing and the like. Feel free to edit this and add things you have tried and tested. The more we add in useful things, with a very quick way to access them, the more useful this page will become.
The type of information included here, should not be content for teaching new concepts, but something that you can use for reference once you know the techniques. An almost cheatsheet for Pentesters/Hackers. The little things that make you go: “what was that thing again?”
Remember that many hands make light work
Table of Contents: →
- References
- Shells
- Recon
- Rootkits
- Exploitation
- BruteForcing
- Social Engineering
- Doxing
- Web Hacking
- Exploit Development
- WiFi Hacking
- Mobile Pentesting
- Bluetooth Hacking
- Anonymity
- Forensics
- Reverse Engineering
- All-In-One OS
- Malware Sample
1. References: →
- Let’s Start Study
- CheatSheet
- My Notpad
- ASCII Table
- Conversion Tools: →
- CyberChef - kinda a Swiss army knife of encoding, decoding, hashing, etc. Quite handy.
- exe2hex - Direct Download
2. Shells: →
- Multi Reverse Shell Manager (Platypus)
- PHP Findsock Shell - Direct Download
- PHP Reverse Shell - Direct Download
- Get interactive prompt (sudo)
python -c 'import pty; pty.spawn("/bin/bash")'
- In TTY Shell → export TERM=linux
- PHPShell - Direct Download
- WebShell List
- PHP WebShell List
- STELF - Direct Download - Tutorial
- Weevely - Direct Download
3. Recon: →
- Google Dork Hacking Database
- Exploit DB
- SerchSploit
- CeWL - Direct Download
- AdminFinder - Direct Download
- Masscan - Direct Download
- TheHarvester - Direct Download
- Shodan Hat - Direct Download
- GitRob - Direct Download
- Nmap - Downloads
- Zenmap - GUI for Nmap
- Sparta - Direct Download
- Sn1per - Direct Download
- IKE-Scanner - Direct Download
- Netdiscover - Direct Download
- Recon-NG - Direct Download
- DMitry - Direct Download
- IP Geolocation
- Free IP Geolocation API - Script Download
- IP lookup
- IP/DNS Detect (LeakTest)
- Reconnoitre (OSCP)
4. Rootkits: →
5. Exploitation: →
- EternalBlue-To-PowerShell - Direct Download
- Shell Storm DB
- Termineter - Direct Download
- Cobalt Strike
- w3af (Web Application Attack and Audit Framework) - Download Page
- Metasploit Framework - Downloads
- Veil - Direct Download
- Sqlmap
- SATAN (Security Administrator Tool for Analyzing Networks) - Download Page
- Post-Exploitation: →
- Man In The Middle & Packet Sniffing: →
- Ettercap - Downloads
- Bettercap - Downloads
- XeroSploit - Direct Download
- EvilGnix2 - Download
- MITMf - Direct Download
- Wireshark - Downloads
- Driftnet - Direct Download
- Yersinia - Direct Download
- SSLsplit - Direct Download
- SSLsniff - Direct Download
- SSLstrip - Direct Download
- cports - Download Page
- netcat - Download Page
- WPE (Winsock Packet Editor) - Download Page
- TCPView - Direct Download
6. Bruteforcing: →
-
Wordlists: →
- Crackstation (4.2GiB) - Torrent - Direct Download
- John The Ripper Wordlist (10.6kB) - Direct Download
- Rockyou - Direct Download
7. Social Engineering: →
- Social Engineer Toolkit - Direct Download
- SMS/Call Spoofing
- Spoofcard - Android - iOS
- Burner App - Android
- Email Spoofing
- Emkei
- Trash-Mail
- Assets A/V
- Call Center Soundtrack
- Airport Soundtrack
- City Soundtrack
- Phishing
- Gophish Framework
8. Doxing: →
9. Web Hacking: →
- WordPress/CMS: →
- Vulnerable Web App(s)
- Arachni - Direct Download
- Zaproxy - Downloads
- Burp Suite - Downloads - Professional v1.7.35
- Browser Exploitation: →
- Directory Bruteforce:
-Dirsearch - Direct Download
10. Exploit Development: →
11. Wi-Fi Hacking: →
- WiFite - Direct Download
- Airgeddon - Direct Download
- mdk4 - Direct Download
- Aircrack-NG - Downloads
- WiFi Cracking: →
- Fake AP / Rogue AP: →
- Fake AP / Rogue AP Prevention: →
12. Mobile Pentesting: →
- zANTI (ROOT REQUIRED)
- Security Assessment /Testing Framework - Android - iOS
- Mobile Pentesting Apps
- cSploit - direct download (ROOT REQUIRED)
- NetHunter
- Http canary - Burp like tool for android
- Lazymux for Termux - Install pentesting tools on your android terminal
13. Bluetooth Hacking: →
14. Anonymity: →
15. Forensics: →
16. Reverse Engineering: →
- Flasm - Linux - Mac - Windows
- x64dbg - Download Page
- Resource Hacker - Download Page
- Ghidra: A software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission - Download Page
- OllyDBG v1.10 - Direct Download
- OllyDBG v2.01 - Direct Download
- gdb (GNU Project Debugger) - Download Page
- gdb powerups - PEDA, GEF, SymGDB, PwnDbg
- IDA - Demo Page
-
Binary Ninja - Demo Page
suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission - Download Page - ILSpy - Download Page
- .NET Reflector - Demo Page
- Apktool
- dnSpy: a .NET debugger, decomplier and assembly editor. Mainly uses ILSpy decompiler engine and the Roslyn (C# / Visual Basic) compiler
- radare: The swiss army knife for any RE related task from the commandline - cutter A GUI for radare2
17. Operating Systems: →
- Parrot Security - Download Page
- Kali Linux - Download Page
- Kali Nethunter - Download Page
- Blackarch Linux - Download Page
- Backbox Linux - Download Page
- Samuari Web Testing Framework - Download Page
- WeakNet’s Demon Linux - Download Page
- Pentoo - Download Page
- Windows 7 Ultimate SP1 64bit Official with Proof
- Windows 7 Ultimate SP1 64bit Official Virtual Machine(vmware) Updated till Feb, 2019
- Complete Mandiant Offensive VM (Commando VM)