Search

Security distros, reconnaissance tools, exploit frameworks, CTF platforms, OSINT, certifications, and everything for offensive and defensive security.

Security Distributions
(8)
The industry-standard penetration testing distro from Offensive Security — 600+ pre-installed tools, Debian-based, ARM support
Lightweight security distro with pentesting, forensics, and privacy editions — ships with anonymity tools and Tor pre-configured
Arch-based distro with 2,800+ security tools — use as a standalone OS or add the BlackArch repo to existing Arch installs
Portable live OS that routes everything through Tor — leaves no trace on the host machine, used by journalists and activists
Desktop OS designed for advanced security and privacy — runs in two VMs to isolate the workstation from the network layer
Linux toolkit for reverse-engineering and analyzing malware — curated collection of malware analysis tools from SANS
Computer Aided Investigative Environment — Ubuntu-based forensics distro with a complete forensic analysis toolkit
Security-oriented OS using Xen virtualization to isolate apps in separate VMs — endorsed by Edward Snowden

Reconnaissance & Scanning

(11)
The gold standard network scanner — port scanning, service detection, OS fingerprinting, NSE scripting engine
Internet-scale port scanner — can scan the entire IPv4 address space in under 6 minutes using asynchronous SYN scanning
Modern port scanner that scans all 65K ports in 3 seconds, then pipes results to Nmap for service detection
OWASP project for network mapping and external asset discovery using OSINT and active recon techniques
Fast passive subdomain discovery tool using dozens of data sources — designed for minimal false positives
Fast vulnerability scanner with template-based scanning — 8,000+ community templates for CVEs, misconfigs, and exposures
Fast and multi-purpose HTTP toolkit for running probes — tech detection, status codes, content length, CDN detection
Full-featured web reconnaissance framework written in Python — modular design with a Metasploit-like interface
Gather emails, subdomains, hosts, employee names, open ports from different public sources for OSINT
Directory/file, DNS, and vhost brute-forcing tool written in Go — fast, clean, no recursive nonsense
Fast, simple, recursive content discovery tool written in Rust — like gobuster but with recursion, filters, and resume support

Web Application Security

(10)
The standard web application security testing platform — intercepting proxy, scanner, repeater, intruder, and extensions
Free and open-source web app security scanner — intercepting proxy, active/passive scanning, fuzzing, and scripting
Modern lightweight web security auditing toolkit built in Rust — fast proxy, replay, automate, and HTTPQL query language
Automatic SQL injection detection and exploitation tool — supports all major DBMS, blind injection, and OS shell access
Web server scanner that checks for 7,000+ dangerous files/programs, outdated versions, and server misconfigurations
WordPress security scanner — enumerate plugins, themes, users, and check for known vulnerabilities with the WPScan database
Fast web fuzzer written in Go — directory discovery, parameter fuzzing, virtual host discovery with filtering and recursion
Advanced XSS detection suite with crawling, fuzzing, and context analysis — identifies reflected, stored, and DOM XSS
Free interactive labs covering all OWASP Top 10 — SQL injection, XSS, SSRF, CSRF, and more with hands-on practice
The definitive awareness document for web application security — 10 most critical security risks updated periodically

Exploit Frameworks & Post-Exploitation

(9)
The world's most used penetration testing framework — exploit modules, payloads, post-exploitation, and auxiliary scanners
Modern open-source C2 framework — cross-platform implants, encrypted comms, multiplayer mode, designed for red teams
Modern C2 framework with a sleek UI — BOF support, sleep obfuscation, custom agents, built for post-exploitation
Python classes for working with network protocols — essential for Active Directory attacks, SMB, DCOM, WMI exploitation
Uses graph theory to reveal hidden attack paths in Active Directory — map domain trusts, GPO abuse, Kerberos delegation
Swiss army knife for pentesting Windows/AD environments — spray credentials, execute commands, dump secrets across the network
Ultimate Windows Remote Management shell — upload/download files, load PowerShell scripts, pass the hash, log bypasses
Fast TCP/UDP tunnel transported over HTTP and secured via SSH — essential for pivoting through networks during pentests
Advanced tunneling/pivoting tool using a TUN interface — set up reverse tunnels without SOCKS, route traffic natively

OSINT & Intelligence Gathering

(10)
Search engine for internet-connected devices — find exposed servers, webcams, databases, industrial control systems worldwide
Internet-wide scanning platform — discover and monitor attack surfaces, exposed services, TLS certificates across the internet
Visual link analysis tool for OSINT — map relationships between people, companies, domains, IPs, and social media
Automated OSINT collection tool with 200+ modules — scans IPs, domains, emails, names, and correlates findings
Hunt down social media accounts by username across 400+ platforms — fast, simple, and incredibly effective for profiling
Check if an email is attached to accounts on 120+ sites — LinkedIn, Twitter, Instagram, and more without sending any alerts
Check if your email or password has been exposed in data breaches — free API, domain monitoring, breach notifications
Technology lookup tool — discover what technologies any website is using from CMS to analytics to CDN to hosting
Comprehensive collection of OSINT tools organized by category — the go-to starting point for any intelligence gathering
Michael Bazzell's OSINT tools and training — custom search tools, books, podcast, and professional investigation resources

Network Security & Packet Analysis

(8)
The world's foremost network protocol analyzer — deep inspection of hundreds of protocols, live capture, and offline analysis
Open-source intrusion detection and prevention system — real-time packet analysis, protocol analysis, content matching rules
High-performance IDS/IPS and network security monitoring engine — multi-threaded, Lua scripting, JA3 fingerprinting
Powerful network analysis framework that creates detailed logs of network activity — DNS, HTTP, SSL, SMB, and more
Classic command-line packet analyzer — capture and display network traffic with powerful BPF filtering on any Unix system
LLMNR, NBT-NS, and MDNS poisoner — captures NTLMv1/v2 hashes on local networks, essential for AD pentesting
Swiss army knife for network attacks and monitoring — ARP spoofing, DNS spoofing, WiFi deauth, BLE, and HTTP proxying
Network forensic analysis tool — extract files, images, and credentials from packet captures without deep protocol knowledge

Password & Credential Tools

(7)
World's fastest password recovery tool — GPU-accelerated, supports 300+ hash types, rule-based attacks, and combinator mode
Classic password cracker supporting hundreds of hash and cipher types — CPU-based, jumbo community edition adds even more
Fast and flexible online password brute-forcer — supports 50+ protocols including SSH, FTP, HTTP, SMB, RDP, and databases
Windows credential extraction tool — dump passwords, hashes, PINs, and Kerberos tickets from memory. The tool that changed AD security forever
Collection of multiple types of lists used during security assessments — usernames, passwords, URLs, fuzzing payloads, web shells
Custom word list generator that spiders a target website to create password lists based on the content it finds
Tool to brute-force and enumerate valid Active Directory accounts through Kerberos pre-authentication

Wireless Security

(6)
Complete suite for WiFi security assessment — packet capture, WEP/WPA cracking, replay attacks, and deauthentication
Wireless network and device detector, sniffer, wardriving tool, and WIDS — WiFi, Bluetooth, Zigbee, and more
Automated wireless attack tool — scans for targets, captures handshakes, runs attacks, and cracks passwords unattended
Social engineering WiFi attack tool — creates evil twin access points to capture WPA credentials through fake captive portals
Hak5's portable wireless auditing platform — rogue AP, MITM, recon, and reporting in a pocket-sized device
Tool to capture PMKID and handshakes from WiFi networks for offline cracking — works without deauth attacks on modern WPA

Vulnerability Scanners

(7)
Industry-leading vulnerability scanner from Tenable — 200K+ plugins, compliance checks, and configuration auditing
Full-featured open-source vulnerability scanner — 100K+ NVTs, network and web scanning, reporting and remediation tracking
All-in-one security scanner — find vulnerabilities, misconfigurations, and secrets in containers, filesystems, repos, and cloud
Cloud-based vulnerability management with up to 16 IPs free — asset discovery, prioritization, and compliance checks
Vulnerability scanner for container images and filesystems — finds CVEs in OS packages and language dependencies
Open-source security platform — SIEM, intrusion detection, vulnerability detection, compliance monitoring, and incident response
Agentless vulnerability scanner for Linux, FreeBSD, and containers — uses CVE databases and package manager info

Digital Forensics & Incident Response

(8)
Open-source digital forensics platform — timeline analysis, keyword search, hash filtering, web artifact extraction, registry analysis
The gold standard for memory forensics — extract running processes, network connections, loaded DLLs, and artifacts from RAM dumps
Pattern matching swiss knife for malware researchers — create rules to identify and classify malware families based on binary patterns
NSA's open-source reverse engineering framework — disassembler, decompiler, scripting, and collaboration for binary analysis
Advanced endpoint visibility and forensics — hunt across thousands of endpoints, collect artifacts, live response at scale
Open-source incident response platform — case management, alert triage, observable analysis, and team collaboration
Automated malware analysis system — submit suspicious files and get detailed reports on behavior, API calls, and network traffic
GCHQ's web app for encoding, decoding, encrypting, analyzing data — drag-and-drop recipe builder for any data transformation

CTF Platforms & Practice Labs

(10)
Gamified cybersecurity platform with vulnerable machines, challenges, and pro labs — the proving ground for pentesting skills
Beginner-friendly cybersecurity training with guided rooms, learning paths, and browser-based attack machines — no setup required
Free CTF platform by Carnegie Mellon — beginner-friendly challenges in forensics, crypto, web, binary exploitation, and reverse engineering
War games to learn security concepts through SSH challenges — Bandit (Linux basics) to Vortex (advanced exploitation)
Downloadable vulnerable VMs for offline practice — hundreds of boot2root challenges with varying difficulty levels
Calendar and scoreboard for CTF competitions worldwide — find upcoming events, team rankings, and writeup archives
Structured cybersecurity courses with hands-on labs — from fundamentals to advanced AD attacks, CPTS certification path
Intentionally vulnerable PHP/MySQL web app for security testing practice — SQL injection, XSS, CSRF, file inclusion, and more
Intentionally insecure web app covering the entire OWASP Top 10 — hacking challenges with a scoreboard and tutorials
System exploitation war game — binary exploitation challenges from toddler's bottle to advanced kernel exploits

Certifications & Training

(8)
Offensive Security Certified Professional — the most respected hands-on pentesting certification with a 24-hour practical exam
Industry baseline certification for cybersecurity — covers network security, threats, cryptography, identity management, and compliance
Practical Network Penetration Tester — 5-day practical exam covering OSINT, external/internal pentesting, AD attacks, and reporting
Affordable hands-on hacking courses by Heath Adams — ethical hacking, AD pentesting, OSINT, web app pentesting, and more
Entry-level penetration testing certification — practical exam covering networking, web app, and host-based pentesting
Premium cybersecurity training and certifications — GCIH, GPEN, GCIA, GSEC, and dozens more for every security domain
Free CompTIA certification training videos — Security+, Network+, A+ courses with study groups and practice exams
Cybersecurity and IT career development platform with free and premium courses, virtual labs, and certification prep

Bug Bounty & Responsible Disclosure

(6)
World's largest hacker-powered security platform — bug bounty programs from the US DoD, Uber, GitHub, PayPal, and thousands more
Crowdsourced security platform connecting researchers with organizations — managed bug bounties, vulnerability disclosure, and pentesting
European bug bounty platform with a strong researcher community — hybrid programs combining automated and manual testing
European bug bounty and vulnerability disclosure platform — programs from major enterprises and government agencies
Methodology-focused training platform — learn recon, exploitation, and reporting specifically for bug bounty hunting
Bug bounty platform for Web3 and blockchain security — the biggest bounties in the industry, millions paid to researchers

Hacking Hardware & Gadgets

(5)
Portable multi-tool for pentesters — RFID, NFC, Sub-GHz, IR, GPIO, BadUSB, and iButton all in a Tamagotchi-sized device
Makers of pentesting gear — USB Rubber Ducky, Bash Bunny, WiFi Pineapple, Packet Squirrel, and more offensive tools
RFID research tool — read, write, clone, and emulate HID, MIFARE, EM, and other proximity cards for access control testing
Open-source software-defined radio platform — transmit and receive 1 MHz to 6 GHz for wireless protocol analysis and replay
Cable that looks normal but hides a WiFi-enabled implant — keystroke injection, payload deployment, and geofencing for red teams

Communities & News

(10)
Reddit's information security community — technical security research, CVE discussions, tool releases, and exploit writeups
Reddit community for hacking and cybersecurity — CTF writeups, tool recommendations, career advice, and news
Leading cybersecurity news publication — zero-days, data breaches, vulnerability disclosures, and malware analysis
Brian Krebs' investigative cybersecurity journalism — in-depth reporting on cybercrime, data breaches, and threat actors
Podcast telling true stories from the dark side of the internet — pentesting stories, hackers, cybercrime, and social engineering
Curated collection of hacking tools, resources, and references — one of the most comprehensive security resource lists on GitHub
Knowledge base of adversary tactics and techniques based on real-world observations — the language of threat intelligence
Archive of public exploits and vulnerable software — maintained by OffSec, searchable by CVE, platform, type, and author
YouTube channel with detailed HackTheBox walkthroughs — learn real pentesting methodology from retired machine solutions
Cybersecurity YouTuber with CTF walkthroughs, malware analysis, hacking tutorials, and tool demonstrations
No items found matching your filters.