Awesome Pentesting

Return to Awesome, GitHub Pentesting, Pentesting

  1. Awesome Penetration Testing [![Awesome](https://awesome.re/badge-flat2.svg)](https://awesome.re)
A collection of awesome penetration testing and offensive cybersecurity resources.

[Penetration testing](https://en.wikipedia.org/wiki/Penetration_test) is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities. Should you discover a vulnerability, please follow [this guidance](https://kb.cert.org/vuls/guidance/) to report it responsibly.

Your contributions and suggestions are heartily♥ welcome. (✿◕‿◕). Please check the [Contributing Guidelines](CONTRIBUTING.md) for more details. This work is licensed under a [Creative Commons Attribution 4.0 International License](https://creativecommons.org/licenses/by/4.0/).

[This project is supported by Netsparker Web Application Security Scanner](https://www.netsparker.com/?utm_source=github.com&utm_content=awesome+penetration+testing&utm_medium=referral&utm_campaign=generic+advert)

  1. Contents
  1. Android Utilities
  1. Anonymity Tools
  1. Tor Tools

See also [awesome-tor](https://github.com/ajvb/awesome-tor).

  1. Anti-virus Evasion Tools
  1. Books

See also [DEF CON Suggested Reading](https://www.defcon.org/html/links/book-list.html).

  1. Malware Analysis Books

See [awesome-malware-analysis § Books](https://github.com/rshipp/awesome-malware-analysis#books).

  1. CTF Tools
  1. Cloud Platform Attack Tools

See also *[HackingThe.cloud](https://hackingthe.cloud/)*.

  1. Collaboration Tools
  1. Conferences and Events
  1. Asia
  1. Europe
  1. North America
  1. South America
  1. Zealandia
  1. Exfiltration Tools
  1. Exploit Development Tools

See also *[Reverse Engineering Tools](#reverse-engineering-tools)*.

  1. File Format Analysis Tools
  1. GNU/Linux Utilities
  1. Hash Cracking Tools
  1. Hex Editors
  1. Industrial Control and SCADA Systems

See also [awesome-industrial-control-system-security](https://github.com/hslatman/awesome-industrial-control-system-security).

  1. Intentionally Vulnerable Systems

See also [awesome-vulnerable](https://github.com/kaiiyer/awesome-vulnerable).

  1. Intentionally Vulnerable Systems as Docker Containers
  1. Lock Picking

See [awesome-lockpicking](https://github.com/fabacab/awesome-lockpicking).

  1. macOS Utilities
  1. Multi-paradigm Frameworks
  1. Network Tools
  1. DDoS Tools
  1. Network Reconnaissance Tools
  1. Protocol Analyzers and Sniffers

See also [awesome-pcaptools](https://github.com/caesar0301/awesome-pcaptools).

  1. Network Traffic Replay and Editing Tools
  1. Proxies and Machine-in-the-Middle (MITM) Tools

See also *[Intercepting Web proxies](#intercepting-web-proxies)*.

  1. Transport Layer Security Tools
  1. Wireless Network Tools
  1. Network Vulnerability Scanners
  1. Web Vulnerability Scanners
  1. Online Resources
  1. Online Operating Systems Resources
  1. Online Penetration Testing Resources
  1. Other Lists Online
  1. Penetration Testing Report Templates
  1. Open Sources Intelligence (OSINT)

See also [awesome-osint](https://github.com/jivoi/awesome-osint).

  1. Data Broker and Search Engine Services
  1. Dorking tools
  1. Email search and analysis tools
  1. Metadata harvesting and analysis
  1. Network device discovery tools
  1. OSINT Online Resources
  1. Source code repository searching tools

See also *[Web-accessible source code ripping tools](#web-accessible-source-code-ripping-tools)*.

  1. Web application and resource analysis tools
  1. Operating System Distributions
  1. Periodicals
  1. Physical Access Tools
  1. Privilege Escalation Tools
  1. Password Spraying Tools
  1. Reverse Engineering

See also [awesome-reversing](https://github.com/tylerha97/awesome-reversing), [*Exploit Development Tools*](#exploit-development-tools).

  1. Reverse Engineering Books
  1. Reverse Engineering Tools
  1. Security Education Courses
  1. Shellcoding Guides and Tutorials
  1. Side-channel Tools
  1. Social Engineering

See also [awesome-social-engineering](https://github.com/v2-dev/awesome-social-engineering).

  1. Social Engineering Books
  1. Social Engineering Online Resources
  1. Social Engineering Tools
  1. Static Analyzers
  1. Steganography Tools
  1. Vulnerability Databases
  1. Web Exploitation
  1. Intercepting Web proxies

See also *[Proxies and Machine-in-the-Middle (MITM) Tools](#proxies-and-machine-in-the-middle-mitm-tools)*.

  1. Web file inclusion tools
  1. Web injection tools
  1. Web path discovery and bruteforcing tools
  1. Web shells and C2 frameworks
  1. Web-accessible source code ripping tools
  1. Web Exploitation Books
  1. Windows Utilities
  1. License

[![CC-BY](https://mirrors.creativecommons.org/presskit/buttons/88x31/svg/by.svg)](https://creativecommons.org/licenses/by/4.0/)

This work is licensed under a [Creative Commons Attribution 4.0 International License](https://creativecommons.org/licenses/by/4.0/).