This is a simple list of all tools that can be related to hacking, there are windows and linux tools
This repo was created by Geluchat and laxa The overall idea is to find quickly a tool that could suits your need or help you in any way related to computer hacking. This list is suppose to be as exhaustive as possible.
All tools are listed like this [TAG1|[TAG2|TAG3...]]Clickable name: Short description
- [G]: Github/Git repository # Note, this flag automatically imply the [O] flag
- [S]: Software (Imply that it's not always 100% free and that it's not open source or restrictive license)
- [F]: Freeware (Free software, does'nt necessarily means that it's opensource)
- [I]: Website
- [P]: Plugin for chrome
- [R]: Plugin for firefox
- [C]: CLI tool
- [O]: Open source
- [M]: Misceallenous
- [L]: Reverse Flag: is set only when Linux compatible
- [W]: Reverse Flag: is set only when Windows compatible
- [I] https://malwr.com/: online binary analysis
- [I] https://retdec.com/: online decompiler for c/c++ binaries
- [I] http://www.showmycode.com/: online decompiler for .NET/flash and others...
- [I] http://www.javadecompilers.com/: java decompiler online
- [S|W] Reflector: assembly browser for .NET
- [F|O|W] Simple Assembly Explorer: another .NET disassembler
- [F|O|W] de4dot: .NET deobfuscator
- [S] IDA: debugger
- [F|O] OllyDbg: debugger
- [F|O|W] x64dbg: debugger
- [C|O|L] gdb: Gnu debugger for linux
- [M|G] peda: python plugin for gdb
- [M|G] gef: gdb plugin supporting more architectures than peda
- [C|O|L] [strace/ltrace]: system call tracers / dynamic call tracers (librairies)
- [G] dex2jar: apk unpacker (android package)
- [S] dede: delphi decompiler
- [S] Pin: dynamic binary instrumentation framework
- [G] Pintool: binary password finder for ctf using pin
- [O|L] checksec: check binary protections
- [F] DiE: binary packer detection
- [G] Qira: timeless debugger with web interface by geohot
- [G|C] ROPGadget: tool for rop chaining
- [G|C] plasma: interactive disassembler in pseudo-C with colored syntax
- [O|C|L] XOCopy: copy memory of execute only ELF binaries
- [G|C] Shellsploit: shellcode generator framework
- [G|C] radare2: analyzer, disassembler, debugger
- [G] Bokken: Python-GTK GUI for radare2
- [G|C] libformatstr: python lib to make string format exploits
- [G] pwntools: Python framework to quickly develop exploits
- [G] binjitsu: fork of pwntools
- [G|C] fixenv: Script to align stack withtout ASLR and gdb,strace,ltrace
- [O|W] cheatengine: memory scanner and other usefull things
- [G] Voltron: Great UI Debugger
- [G] Z3: Z3 is a theorem prover
- [G] angr: binary analysis, allows value-set analysis
- [G] manticore: dynamic analysis, symbolic execution framework
- [G] rop-tool: another helpful tool for ROP
- [G] villoc: visualize heap chunks on linux
- [O|C] valgrind: binary analysis allowing to spot read/write errors on memory operations
- [S|W] apimonitor: inspect process calls and trace them
- [F|W] PEiD: identify which packer has been used on PE binaries
- [F|W] ImpREC: reconstruct IAT table for unpacked binaries
- [O|C] Flawfinder: static source code analyzer for C/C++ which report possible security weakness
- [G|C] afl: fuzzer
- [G] gdbgui: web lightweight gui interface for gdb
- [G|C] one_gadget: script to find and identify constraints on magc gadget
- [G|C] Ropper: gadgets finder, better than ROPgadget for ARM
- [C|O] volatility: forensic tool to analyse memory dump from windows/linux
- [C|O] Autopsy/Sleuth: analyse hard drives and smartphones
- [C|O] Foremost: file recovery after deletion or format
- [G|C] BinWalk: find files into file
- [S] dff: complete forensic gui analyser with lots of automation
- [G|C] origami: pdf forensic analysis with optional GUI
- [F|W] MFTDump: dump/copy $MFT file on windows
- [G|C] AppCompatCacheParser: dump shimcache entries from Registry (can use offline registry)
- [F|W] RegistryExplorer: GUI to explore registry with search options and possibility to use offline register
- [C|G] xortool: find xor key/key length from xor text/binary
- [C|G] cribdrag: interactive crib dragging on xored text
- [C|G] hash_extender: hash extension forger
- [C|G] hash-identifier: hash identifier
- [C|G] PadBuster: break CBC encryption using an oracle
- [C|G] lsb-toolkit: extract bit from images for steganography
- [C|O] john: hash cracker (bruteforce + dico attacks)
- [F|O] hashcat: hash bruteforce cracker that support GPU
- [C|G] rsatool: calculates RSA (p, q, n, d, e) and RSA-CRT (dP, dQ, qInv) parameters given either two primes (p, q) or modulus and private exponent (n, d)
- [I] http://quipqiup.com/: basic cryptography solver
- [G|C] python-paddingoracle: python tool to exploit padding oracle
- [F|O] DirBuster: bruteforce/dictionnary attack on webserver to find hidden directories
- [I] http://pkav.net/XSS2.png: XSS spreadsheet
- [C|O] sqlmap: sql injection
- [S] Burp suite: request tool analysis/forge request
- [S|W] fiddler: HTTP web proxy
- [I] http://requestb.in/: get a temporary page to receive GET/POST request
- [I] http://en.42.meup.org/ : Temporary web hosting
- [I] https://zerobin.net/: anonymous encrypted pastebin
- [I] http://pastebin.com/: paste code/text with coloration
- [I] http://portquiz.net/: test outgoing ports
- [I] http://botscout.com/: check if an IP is flagged as spam/bot
- [P|R] HackBar: xss/sql tests
- [R] TamperData: modify and tamper HTTP requests
- [R] Advanced Cookie Manager: Edit cookie
- [R] Modify Headers: Edit HTTP headers
- [R] HTTP Requester: Edit HTTP requests
- [R] FlagFox: Info about current website
- [R] Live HTTP Headers: View Headers
- [P] ModHeader: edit HTTP requests
- [G] Nikto2: web server scanner
- [P] EditThisCookie: edit cookie, can lock cookie
- [I] https://dnsdumpster.com/: free domain research tools, find subdomains
- [I] https://pentest-tools.com/home: subdomain bruteforce not 100% free
- [G] Hydra: remote password cracker
- [G|C] wuzz: webclient curl like using ncurses
- [C|O] Netcat: network tool, can listen or connect using TCP/UDP
- [C|O] nmap: network tool to scan ports and discover services
- [C|O] Scapy: powerful interactive packet manipulation program
- [C|O] Aircrack: wi-fi injection/monitoring/cracking
- [S|O] Wireshark: network packet analyzer
- [S|W] NetworkMiner: sniffer/pcap analyzer, pretty good for files and see what's going on with HTTP traffic
- [C|O] Hexinject: Packer injector and sniffer. Allows to modify packets on the fly
- [C|F] exiftags: linux package to check jpg tags
- [O|C] ExifTool: read/edit metadata of various file formats
- [F|O|W] tweakpng: tool to resize image for steganography
- [F|O] Stegsolve: perform quick image analysis to find hidden things
- [F|O] Wbstego: retrieve/hide messages in various container
- [F|O|W] Cuckoo: interactive sandbox malware analysis
- [F|O|W] Photorec: recover erased file
- [C|O] QEMU: machine emulator and virtualizer
- [C|S] metasploit: Generate payload and browser exploits
- [C|O] binutils: tons of CLI tools
- [S] vmware: virtualization products
- [I] https://regex101.com/: javascript/python/php regex online
- [I] http://rubular.com/: ruby regex online
- [M|O] kali: hacking linux OS
- [I] https://www.exploit-db.com/: exploits database
- [G|C] AutoLocalPrivilegeEscalation: bash script to get root if possible
- [C|O] sshpass: pass ssh password without typing it (highly insecure)
- [C|O] virt-what: simple bash script to detect virtualization environment
- [W|O] ProcessHacker: Extended taskmanager
- [G]: english-words: simple english wordlist
- [G]: fuzzdb: tons of lists for fuzzing
- [W] pax0r: another huge list of tools
- [G] SecLists: SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments
- [G] ctf-tools: list of tools similar to this one
- [I] http://resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/
- [G] https://github.com/Hack-with-Github/Awesome-Hacking: awesome list related to hacking
- [I] http://www.tutorialspoint.com/: online programmation on most languages
- [I] https://gcc.godbolt.org/: check disassembly code produced with different versions of gcc
If you wanna improve or add your tool here, fork this repo then push onto your own master then make a pull request. I won't accept any software that is specific to OS X if it doesn't work on linux or windows. If you think you have a nice feature idea, open an issue. This list isn't mean to be ordered in some way, but if people like it, it is already noted that making a proper wiki referencing tools name with link might be a better thing than a Markdown page. Github wiki is also an option when the list is going to be too long.