<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>tools Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/tools/feed/" rel="self" type="application/rss+xml" />
	<link>http://kostacipo.stream/tag/tools/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Sun, 26 Sep 2021 12:53:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>tools Archives - Tech Chronicles</title>
	<link>http://kostacipo.stream/tag/tools/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The 7 Best Free Online File Converters for Your Formatting Needs</title>
		<link>http://kostacipo.stream/the-7-best-free-online-file-converters-for-your-formatting-needs/</link>
					<comments>http://kostacipo.stream/the-7-best-free-online-file-converters-for-your-formatting-needs/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sun, 26 Sep 2021 12:53:28 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[file converters]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2108</guid>

					<description><![CDATA[<p>A file you receive may not be in the format you want it to be. But don&#8217;t worry as you can convert formats like PDF to DOC, JPG to BMP, or MP3 to WAV, documents, images, audio, and video files with ease. Each of these free online services is ideal because they provide various types [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/the-7-best-free-online-file-converters-for-your-formatting-needs/">The 7 Best Free Online File Converters for Your Formatting Needs</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A file you receive may not be in the format you want it to be. But don&#8217;t worry as you can convert formats like PDF to DOC, JPG to BMP, or MP3 to WAV, documents, images, audio, and video files with ease.</p>
<p>Each of these free online services is ideal because they provide various types of file conversions in one spot. You do not have to bookmark several sites to cover the most common kinds of conversions or those you need most often.</p>
<p>Pick any tool from this list and don&#8217;t let your work stall.</p>
<h2 id="online-convert-com">1. <a href="https://www.online-convert.com/" target="_blank" rel="noopener">Online-Convert.com</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/online-convert-home-page.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="online convert home page" width="1200" height="582" /> </picture></figure>
</div>
<p>Before you even try your first file conversion on Online-Convert.com, you can quickly check for supported file types. In the small box on the top right, pop in the file types to convert to and from.</p>
<p>Hit <strong>Go</strong> and see if the site supports what you need. Then, when you are ready to go, you can choose from audio, video, image, document, ebook, or archive converter right on the main page.</p>
<p>Select your target format from the drop-down box in the applicable section. You will land on a new page where you can browse for your file, enter its URL, or upload it from your cloud storage service. Click <strong>Convert File</strong> to finish.</p>
<p>As a bonus, Online-Convert.com offers a hash generator on the home page.</p>
<h2 id="convertfiles">2. <a href="http://www.convertfiles.com/" target="_blank" rel="noopener">ConvertFiles</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertfiles-online-files-converter.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="convertfiles online files converter" width="1200" height="934" /> </picture></figure>
</div>
<p>ConvertFiles is another simple option that covers a variety of input and output file formats. Browse for your file or enter its URL to get started. Select your formats from the document, drawing, presentation, ebook, video, image, archive, or audio types.</p>
<p>If you upload your file, the input method may populate in the correct format automatically if it is easily detected. Next, you can mark the checkbox to have a direct link emailed to you or simply hit the <strong>Convert</strong> button to grab your file right away.</p>
<p>When the conversion is complete, click the link provided to obtain your new file. And if you are looking for a specific yet rare file type, you can review <a href="http://www.convertfiles.com/#supported_formats" target="_blank" rel="noopener">all of ConvertFiles&#8217; supported formats</a>.</p>
<h2 id="convertio">3. <a href="https://convertio.co/" target="_blank" rel="noopener">Convertio</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/convertio-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="convertio homepage" width="1200" height="574" /> </picture></figure>
</div>
<p>To convert files quickly from your computer, Dropbox, Google Drive, or a URL, check out Convertio. Snag your file and then choose your conversion type from an image, document, ebook, presentation, or vector format.</p>
<p>What&#8217;s nice about Convertio is that you can convert multiple files at once by clicking the <strong>Add More Files</strong> button. And you can save your converted files to Dropbox or Google Drive if you like.</p>
<p>Click the <strong>Convert</strong> button when you are ready, and you can see the progress of the conversion along with the file size. Then, hit that <strong>Download</strong> button for each converted file. You can also download a ZIP file containing all of your conversions, which is another handy feature.</p>
<h2 id="zamzar">4. <a href="http://www.zamzar.com/" target="_blank" rel="noopener">Zamzar</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/zamzar-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="zamzar homepage" width="1200" height="588" /> </picture></figure>
</div>
<p>Zamzar supports over 1,100 file conversion types for almost any need. You can review the popular conversion kinds right on the main page if you want to be certain before you start.</p>
<p>Then, browse for your file or enter its URL and choose the output format. You can pick from image, document, music, video, ebook, compressed, or preset video options.</p>
<p>Zamzar works a bit differently than the other converters in that you must enter an email address to obtain your new file. The site also offers an inbox to manage your files <a href="http://www.zamzar.com/signup/?uc1#go" target="_blank" rel="noopener">with a paid account</a>. If you do not mind using your email address to receive your file, or even prefer it, take a look at Zamzar.</p>
<h2 id="filezigzag">5. <a href="http://www.filezigzag.com/" target="_blank" rel="noopener">FileZigZag</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/filezigzag-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="filezigzag homepage" width="1200" height="610" /> </picture></figure>
</div>
<p>FileZigZag is an email-based free online file converter similar to Zamzar. It also supports document, audio, image, video, and archive file formats.</p>
<p>ust upload your file, select the output format, enter your email address, and click <strong>Convert</strong>. When you receive the email, follow the link to obtain your converted file. After your file is converted, FileZigZag offers a few options to review before you head over to your inbox.</p>
<p>You can delete the file from their server (which is stored for three days), upload the converted file to your cloud storage, or convert the source file or converted file to a different type. Again, if you like having an email with a link to your file, FileZigZag is a good free service.</p>
<h2 id="freefileconvert">6. <a href="https://www.freefileconvert.com/" target="_blank" rel="noopener">FreeFileConvert</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/freefileconvert-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="freefileconvert homepage" width="1200" height="672" /> </picture></figure>
</div>
<p>FreeFileConvert supports a whopping 8,700 conversion combinations. So, if you have an uncommon one, this is the site to visit. You can add up to five files to convert at once, just note that they must be the same file type.</p>
<p>Once you upload your file, the output format box will adjust automatically with suggested formats. Click <strong>Convert</strong> when it is ready, and then get your file with a click on <strong>Download</strong>.</p>
<p>With FreeFileConvert, you can convert archive, document, ebook, audio, image, presentation, vector, CAD, and font file formats. And, by clicking one of these supported types on the home page, you can quickly review all file formats available.</p>
<h2 id="file-converter-online-com">7. <a href="https://file-converter-online.com" target="_blank" rel="noopener">File-Converter-Online.com</a></h2>
<div class="body-img responsive-img img-article-item">
<figure><picture><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" media="(min-width: 1024px)" sizes="750px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=750&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" media="(min-width: 768px)" sizes="943px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=943&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" media="(min-width: 481px)" sizes="767px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=767&amp;dpr=1.5" /><source srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" media="(min-width: 0px)" sizes="480px" data-srcset="https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2021/09/file-converter-rename-homepage.jpg?q=50&amp;fit=crop&amp;w=480&amp;dpr=1.5" /><img class=" lazyloaded" alt="file-converter-rename homepage" width="1200" height="701" /> </picture></figure>
</div>
<p>It doesn&#8217;t get much easier to convert a file online at no charge than with File-Converter-Online.com. Click the <strong>Choose File</strong> button to upload your file, select the file type you want to convert to, and hit <strong>Start Converting</strong>. Then, grab the converted file from your download location.</p>
<p>File-Converter-Online.com offers conversions for audio, video, images, and documents. There&#8217;s also an Others category if you need to convert an ebook file like EPUB or MOBI, or you can look at the other uncommon types of files. You can see all of these kinds of conversions along the right side of the Home page under <strong>All file types and converters</strong>.</p>
<p>Be sure to check out the site&#8217;s additional tools for compressing a PDF or video, creating a GIF, and merging PDFs.</p>
<h2 id="pick-your-free-online-file-converter">Pick Your Free Online File Converter</h2>
<p>With so many types of file conversions, from the common to the rare, having one tool to handle them all is the perfect solution. Each of these free conversion tool offers something a little different from the rest, so be sure to save the one that covers all your needs.</p>
<p>In fact, the use of file conversion has become so pervasive in our daily and professional lives that now, even the Android platform supports a dearth of conversion apps for our convenience.</p>
<p>The post <a href="http://kostacipo.stream/the-7-best-free-online-file-converters-for-your-formatting-needs/">The 7 Best Free Online File Converters for Your Formatting Needs</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/the-7-best-free-online-file-converters-for-your-formatting-needs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</title>
		<link>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/</link>
					<comments>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 09:25:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[pentest]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1964</guid>

					<description><![CDATA[<p>Penetration Testing &#38; Hacking Tools are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration Testing &#38; Haking Tools list that covers Performing Penetration testing Operation in all Environments. Penetration testing and ethical hacking tools are very essential part for every organization to [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/">A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Penetration Testing &amp; <strong>Hacking Tools</strong> are more often used by security industries to test the vulnerabilities in network and applications. Here you can find the Comprehensive Penetration Testing &amp; <strong>Haking Tools</strong> list that covers Performing Penetration testing Operation in all Environments.</p>
<p>Penetration testing and ethical <strong>hacking tools</strong> are very essential part for every organization to test the vulnerabilities and patch the vulnerable system.</p>
<p>Since the cyber attacks are rapidly increasing, organization need to pay high attention on penetration testing and keep monitoring their network to prevent the attack that may cause a serious damage that leads to hit the company reputation.</p>
<p>In order to manage a security operations, security experts and researchers needs to rely with the security and hacking tools that helps them to minimize the time and effectively monitoring and perform penetration testing on the network to protect the network.</p>
<p>Here we are posting the big list of some of the most important hacking tools that widely used by million of security professionals and thousand of organization around the world.</p>
<h2><strong>Penetration Testing &amp; Hacking Tools List</strong></h2>
<h3><a id="user-content-online-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#online-resources" aria-hidden="true"></a><strong>Online Resources – Hacking Tools</strong></h3>
<h4><a id="user-content-penetration-testing-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-resources" aria-hidden="true"></a><strong>Penetration Testing Resources</strong></h4>
<ul>
<li>Metasploit Unleashed&nbsp;– Free Offensive Security Metasploit course.</li>
<li><a href="http://www.pentest-standard.org/" target="_blank" rel="nofollow noopener noreferrer">Penetration Testing Execution Standard (PTES)</a>&nbsp;– Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.</li>
<li><a href="https://www.owasp.org/index.php/Main_Page" target="_blank" rel="nofollow noopener noreferrer">Open Web Application Security Project (OWASP)</a>&nbsp;– Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.</li>
<li><a href="https://github.com/nixawk/pentest-wiki" target="_blank" rel="nofollow noopener noreferrer">PENTEST-WIKI</a>&nbsp;– Free online security knowledge library for pentesters and researchers.</li>
<li><a href="http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html" target="_blank" rel="nofollow noopener noreferrer">Penetration Testing Framework (PTF)</a>&nbsp;– Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.</li>
<li><a href="http://www.xss-payloads.com/" target="_blank" rel="nofollow noopener noreferrer">XSS-Payloads</a>&nbsp;– Ultimate resource for all things cross-site including payloads, tools, games and documentation.</li>
<li><a href="http://www.isecom.org/mirror/OSSTMM.3.pdf" target="_blank" rel="nofollow noopener noreferrer">Open Source Security Testing Methodology Manual (OSSTMM)</a>&nbsp;– Framework for providing test cases that result in verified facts on which to base decisions that impact an organization’s security.</li>
<li><a href="https://attack.mitre.org/" target="_blank" rel="nofollow noopener noreferrer">MITRE’s Adversarial Tactics, Techniques &amp; Common Knowledge (ATT&amp;CK)</a>&nbsp;– Curated knowledge base and model for cyber adversary behavior.</li>
</ul>
<h3><a id="user-content-exploit-development" class="anchor" href="https://github.com/enaqx/awesome-pentest#exploit-development" aria-hidden="true"></a><strong>Exploit Development</strong></h3>
<ul>
<li><a href="http://www.vividmachines.com/shellcode/shellcode.html" target="_blank" rel="nofollow noopener noreferrer">Shellcode Tutorial</a>&nbsp;– Tutorial on how to write shellcode.</li>
<li><a href="http://shell-storm.org/shellcode/" target="_blank" rel="nofollow noopener noreferrer">Shellcode Examples</a>&nbsp;– Shellcodes database.</li>
<li><a href="https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/" target="_blank" rel="nofollow noopener noreferrer">Exploit Writing Tutorials</a>&nbsp;– Tutorials on how to develop exploits.</li>
</ul>
<h3><a id="user-content-osint-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#osint-resources" aria-hidden="true"></a><strong>OSINT Resources</strong></h3>
<ul>
<li><a href="http://osintframework.com/" target="_blank" rel="nofollow noopener noreferrer">OSINT Framework</a>&nbsp;– Collection of various OSINT Hacking Tools broken out by category.</li>
<li><a href="https://inteltechniques.com/menu.html" target="_blank" rel="nofollow noopener noreferrer">Intel Techniques</a>&nbsp;– Collection of OSINT tools. Menu on the left can be used to navigate through the categories.</li>
<li><a href="http://netbootcamp.org/osinttools/" target="_blank" rel="nofollow noopener noreferrer">NetBootcamp OSINT Tools</a>&nbsp;– Collection of OSINT links and custom Web interfaces to other services such as&nbsp;<a href="http://netbootcamp.org/facebook.html" target="_blank" rel="nofollow noopener noreferrer">Facebook Graph Search</a>&nbsp;and&nbsp;<a href="http://netbootcamp.org/pastesearch.html" target="_blank" rel="nofollow noopener noreferrer">various paste sites</a>.</li>
<li><a href="https://wigle.net/" rel="nofollow">WiGLE.net</a>&nbsp;– Information about wireless networks world-wide, with user-friendly desktop and web applications.</li>
</ul>
<h3><a id="user-content-social-engineering-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-resources" aria-hidden="true"></a><strong>Social Engineering Resources</strong></h3>
<ul>
<li><a href="http://www.social-engineer.org/framework/general-discussion/" target="_blank" rel="nofollow noopener noreferrer">Social Engineering Framework</a>&nbsp;– Information resource for social engineers.</li>
</ul>
<h3><a id="user-content-lock-picking-resources" class="anchor" href="https://github.com/enaqx/awesome-pentest#lock-picking-resources" aria-hidden="true"></a><strong>Lock Picking Resources</strong></h3>
<ul>
<li><a href="https://www.youtube.com/user/SchuylerTowne/" target="_blank" rel="nofollow noopener noreferrer">Schuyler Towne channel</a>&nbsp;– Lockpicking videos and security talks.</li>
<li><a href="https://www.youtube.com/user/bosnianbill" target="_blank" rel="nofollow noopener noreferrer">bosnianbill</a>&nbsp;– More lockpicking videos.</li>
<li><a href="https://www.reddit.com/r/lockpicking" target="_blank" rel="nofollow noopener noreferrer">/r/lockpicking</a>&nbsp;– Resources for learning lockpicking, equipment recommendations.</li>
</ul>
<h3><a id="user-content-operating-systems" class="anchor" href="https://github.com/enaqx/awesome-pentest#operating-systems" aria-hidden="true"></a><strong>Operating Systems</strong></h3>
<ul>
<li><a href="http://rawsec.ml/en/security-related-os/" target="_blank" rel="nofollow noopener noreferrer">Security related Operating Systems @ Rawsec</a>&nbsp;–&nbsp;Penetration testing tools &amp; <strong>Hacking Tools</strong>&nbsp; list Related Complete list of security operating systems.</li>
<li><a href="https://n0where.net/best-linux-penetration-testing-distributions/" target="_blank" rel="nofollow noopener noreferrer">Best Linux Penetration Testing Distributions @ CyberPunk</a>&nbsp;– Description of main penetration testing distributions.</li>
<li><a href="http://distrowatch.com/search.php?category=Security" target="_blank" rel="nofollow noopener noreferrer">Security @ Distrowatch</a>&nbsp;– Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.</li>
<li><a href="https://github.com/cuckoosandbox/cuckoo" target="_blank" rel="nofollow noopener noreferrer">cuckoo</a>&nbsp;– Open source automated malware analysis system.</li>
<li><a href="http://www.caine-live.net/" target="_blank" rel="nofollow noopener noreferrer">Computer Aided Investigative Environment (CAINE)</a>&nbsp;– Italian GNU/Linux live distribution created as a digital forensics project.</li>
<li><a href="http://www.deftlinux.net/" target="_blank" rel="nofollow noopener noreferrer">Digital Evidence &amp; Forensics Toolkit (DEFT)</a>&nbsp;– Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.</li>
<li><a href="https://tails.boum.org/" target="_blank" rel="nofollow noopener noreferrer">Tails</a>&nbsp;– Live OS aimed at preserving privacy and anonymity.</li>
</ul>
<h2><strong>Hacking Tools</strong></h2>
<h3><a id="user-content-penetration-testing-distributions" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-distributions" aria-hidden="true"></a><strong>Penetration Testing Distributions</strong></h3>
<ul>
<li><a href="https://www.kali.org/" target="_blank" rel="nofollow noopener noreferrer">Kali</a>&nbsp;– GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools</li>
<li><a href="https://archstrike.org/" target="_blank" rel="nofollow noopener noreferrer">ArchStrike</a>&nbsp;– Arch GNU/Linux repository for security professionals and enthusiasts.</li>
<li><a href="https://www.blackarch.org/" target="_blank" rel="nofollow noopener noreferrer">BlackArch</a> – Arch GNU/Linux-based distribution with <strong>best Hacking Tools</strong> for penetration testers and security researchers.</li>
<li><a href="http://networksecuritytoolkit.org/" target="_blank" rel="nofollow noopener noreferrer">Network Security Toolkit (NST)</a>&nbsp;– Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.</li>
<li><a href="http://www.pentoo.ch/" target="_blank" rel="nofollow noopener noreferrer">Pentoo</a>&nbsp;– Security-focused live CD based on Gentoo.</li>
<li><a href="https://backbox.org/" rel="nofollow">BackBox</a>&nbsp;– Ubuntu-based distribution for penetration tests and security assessments.</li>
<li><a href="https://www.parrotsec.org/" target="_blank" rel="nofollow noopener noreferrer">Parrot</a> – Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.</li>
<li><a href="https://inteltechniques.com/buscador/" target="_blank" rel="nofollow noopener noreferrer">Buscador</a>&nbsp;– GNU/Linux virtual machine that is pre-configured for online investigators.</li>
<li><a href="https://labs.fedoraproject.org/en/security/" target="_blank" rel="nofollow noopener noreferrer">Fedora Security Lab</a>&nbsp;– Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.</li>
<li><a href="https://github.com/trustedsec/ptf" target="_blank" rel="nofollow noopener noreferrer">The Pentesters Framework</a>&nbsp;– Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.</li>
<li><a href="https://github.com/adi0x90/attifyos" target="_blank" rel="nofollow noopener noreferrer">AttifyOS</a>&nbsp;– GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.</li>
</ul>
<h3><a id="user-content-docker-for-penetration-testing" class="anchor" href="https://github.com/enaqx/awesome-pentest#docker-for-penetration-testing" aria-hidden="true"></a><strong>Docker for Penetration Testing</strong></h3>
<ul>
<li><code>docker pull kalilinux/kali-linux-docker</code>&nbsp;<a href="https://hub.docker.com/r/kalilinux/kali-linux-docker/" rel="nofollow">official Kali Linux</a></li>
<li><code>docker pull owasp/zap2docker-stable</code>&nbsp;–&nbsp;<a href="https://github.com/zaproxy/zaproxy">official OWASP ZAP</a></li>
<li><code>docker pull wpscanteam/wpscan</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/wpscanteam/wpscan/" rel="nofollow">official WPScan</a></li>
<li><code>docker pull citizenstig/dvwa</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/citizenstig/dvwa/" rel="nofollow">Damn Vulnerable Web Application (DVWA)</a></li>
<li><code>docker pull wpscanteam/vulnerablewordpress</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/wpscanteam/vulnerablewordpress/" rel="nofollow">Vulnerable WordPress Installation</a></li>
<li><code>docker pull hmlio/vaas-cve-2014-6271</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/" rel="nofollow">Vulnerability as a service: Shellshock</a></li>
<li><code>docker pull hmlio/vaas-cve-2014-0160</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/" rel="nofollow">Vulnerability as a service: Heartbleed</a></li>
<li><code>docker pull opendns/security-ninjas</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/opendns/security-ninjas/" rel="nofollow">Security Ninjas</a></li>
<li><code>docker pull diogomonica/docker-bench-security</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/diogomonica/docker-bench-security/" rel="nofollow">Docker Bench for Security</a></li>
<li><code>docker pull ismisepaul/securityshepherd</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/ismisepaul/securityshepherd/" rel="nofollow">OWASP Security Shepherd</a></li>
<li><code>docker pull danmx/docker-owasp-webgoat</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/danmx/docker-owasp-webgoat/" rel="nofollow">OWASP WebGoat Project docker image</a></li>
<li><code>docker-compose build &amp;&amp; docker-compose up</code>&nbsp;–&nbsp;<a href="https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker">OWASP NodeGoat</a></li>
<li><code>docker pull citizenstig/nowasp</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/citizenstig/nowasp/" rel="nofollow">OWASP Mutillidae II Web Pen-Test Practice Application</a></li>
<li><code>docker pull bkimminich/juice-shop</code>&nbsp;–&nbsp;<a href="https://github.com/bkimminich/juice-shop#docker-container--">OWASP Juice Shop</a></li>
<li><code>docker pull kalilinux/kali-linux-docker</code>&nbsp;–&nbsp;<a href="https://www.kali.org/news/official-kali-linux-docker-images/" rel="nofollow">Kali Linux Docker Image</a></li>
<li><code>docker pull phocean/msf</code>&nbsp;–&nbsp;<a href="https://hub.docker.com/r/phocean/msf/" rel="nofollow">docker-metasploit</a></li>
</ul>
<h3><a id="user-content-multi-paradigm-frameworks" class="anchor" href="https://github.com/enaqx/awesome-pentest#multi-paradigm-frameworks" aria-hidden="true"></a><strong>Multi-paradigm Frameworks</strong></h3>
<ul>
<li><a href="https://www.metasploit.com/" rel="nofollow">Metasploit</a> – post exploitaion Hacking Tools for offensive security teams to help verify vulnerabilities and manage security assessments.</li>
<li><a href="http://fastandeasyhacking.com/" target="_blank" rel="nofollow noopener noreferrer">Armitage</a>&nbsp;– Java-based GUI front-end for the Metasploit Framework.</li>
<li><a href="https://github.com/infobyte/faraday">Faraday</a>&nbsp;– Multiuser integrated pentesting environment for red teams performing cooperative penetration tests, security audits, and risk assessments.</li>
<li><a href="https://github.com/juansacco/exploitpack">ExploitPack</a>&nbsp;– Graphical tool for automating penetration tests that ships with many pre-packaged exploits.</li>
<li><a href="https://github.com/n1nj4sec/pupy">Pupy</a>&nbsp;– Cross-platform (Windows, Linux, macOS, Android) remote administration and post-exploitation tool,</li>
</ul>
<h3><a id="user-content-vulnerability-scanners" class="anchor" href="https://github.com/enaqx/awesome-pentest#vulnerability-scanners" aria-hidden="true"></a><strong>Vulnerability Scanners</strong></h3>
<ul>
<li><a href="https://www.rapid7.com/products/nexpose/" rel="nofollow">Nexpose</a>&nbsp;– Commercial vulnerability and risk management assessment engine that integrates with Metasploit, sold by Rapid7.</li>
<li><a href="https://www.tenable.com/products/nessus-vulnerability-scanner" rel="nofollow">Nessus</a>&nbsp;– Commercial vulnerability management, configuration, and compliance assessment platform, sold by Tenable.</li>
<li><a href="http://www.openvas.org/" rel="nofollow">OpenVAS</a>&nbsp;– Free software implementation of the popular Nessus vulnerability assessment system.</li>
<li><a href="https://github.com/future-architect/vuls">Vuls</a>&nbsp;– Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.</li>
</ul>
<h3><a id="user-content-static-analyzers" class="anchor" href="https://github.com/enaqx/awesome-pentest#static-analyzers" aria-hidden="true"></a><strong>Static Analyzers</strong></h3>
<ul>
<li><a href="https://github.com/presidentbeef/brakeman">Brakeman</a>&nbsp;– Static analysis security vulnerability scanner for Ruby on Rails applications.</li>
<li><a href="http://cppcheck.sourceforge.net/" rel="nofollow">cppcheck</a>&nbsp;– Extensible C/C++ static analyzer focused on finding bugs.</li>
<li><a href="http://findbugs.sourceforge.net/" rel="nofollow">FindBugs</a>&nbsp;– Free software static analyzer to look for bugs in Java code.</li>
<li><a href="https://github.com/nccgroup/sobelow">sobelow</a>&nbsp;– Security-focused static analysis for the Phoenix Framework.</li>
<li><a href="https://pypi.python.org/pypi/bandit/" rel="nofollow">bandit</a>&nbsp;– Security oriented static analyser for python code.</li>
</ul>
<h3><a id="user-content-web-scanners" class="anchor" href="https://github.com/enaqx/awesome-pentest#web-scanners" aria-hidden="true"></a><strong>Web Scanners</strong></h3>
<ul>
<li><a href="https://cirt.net/nikto2" rel="nofollow">Nikto</a>&nbsp;– Noisy but fast black box web server and web application vulnerability scanner.</li>
<li><a href="http://www.arachni-scanner.com/" rel="nofollow">Arachni</a>&nbsp;– Scriptable framework for evaluating the security of web applications.</li>
<li><a href="https://github.com/andresriancho/w3af">w3af</a> – Hacking Tools for Web application attack and audit framework.</li>
<li><a href="http://wapiti.sourceforge.net/" rel="nofollow">Wapiti</a>&nbsp;– Black box web application vulnerability scanner with built-in fuzzer.</li>
<li><a href="https://secapps.com/" rel="nofollow">SecApps</a>&nbsp;– In-browser web application security testing suite.</li>
<li><a href="https://www.webreaver.com/" rel="nofollow">WebReaver</a>&nbsp;– Commercial, graphical web application vulnerability scanner designed for macOS.</li>
<li><a href="https://wpscan.org/" rel="nofollow">WPScan</a> – Hacking Tools of Black box WordPress vulnerability scanner.</li>
<li><a href="https://code.google.com/archive/p/cms-explorer/" rel="nofollow">cms-explorer</a>&nbsp;– Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.</li>
<li><a href="https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project" rel="nofollow">joomscan</a> – on of the best Hacking Tools for Joomla vulnerability scanner.</li>
<li><a href="https://github.com/tijme/angularjs-csti-scanner">ACSTIS</a>&nbsp;– Automated client-side template injection (sandbox escape/bypass) detection for AngularJS.</li>
</ul>
<h3><a id="user-content-network-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#network-tools" aria-hidden="true"></a><strong>Network Tools</strong></h3>
<ul>
<li><a href="https://zmap.io/" rel="nofollow">zmap</a>&nbsp;– Open source network scanner that enables researchers to easily perform Internet-wide network studies.</li>
<li><a href="https://nmap.org/" rel="nofollow">nmap</a>&nbsp;– Free security scanner for network exploration &amp; security audits.</li>
<li><a href="https://github.com/rafael-santiago/pig">pig</a> – one of the Hacking Tools forGNU/Linux packet crafting .</li>
<li><a href="https://github.com/vesche/scanless">scanless</a>&nbsp;– Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.</li>
<li><a href="http://www.tcpdump.org/" rel="nofollow">tcpdump/libpcap</a>&nbsp;– Common packet analyzer that runs under the command line.</li>
<li><a href="https://www.wireshark.org/" rel="nofollow">Wireshark</a>&nbsp;– Widely-used graphical, cross-platform network protocol analyzer.</li>
<li><a href="http://network-tools.com/" rel="nofollow">Network-Tools.com</a>&nbsp;– Website offering an interface to numerous basic network utilities like&nbsp;<code>ping</code>,&nbsp;<code>traceroute</code>,&nbsp;<code>whois</code>, and more.</li>
<li><a href="https://github.com/netsniff-ng/netsniff-ng">netsniff-ng</a>&nbsp;– Swiss army knife for for network sniffing.</li>
<li><a href="http://sniff.su/" rel="nofollow">Intercepter-NG</a>&nbsp;– Multifunctional network toolkit.</li>
<li><a href="https://sparta.secforce.com/" rel="nofollow">SPARTA</a>&nbsp;– Graphical interface offering scriptable, configurable access to existing network infrastructure scanning and enumeration tools.</li>
<li><a href="https://github.com/iphelix/dnschef">dnschef</a>&nbsp;– Highly configurable DNS proxy for pentesters.</li>
<li><a href="https://dnsdumpster.com/" rel="nofollow">DNSDumpster</a> – one of the Hacking Tools for Online DNS recon and search service.</li>
<li><a href="https://github.com/m0rtem/CloudFail">CloudFail</a>&nbsp;– Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.</li>
<li><a href="https://github.com/fwaeytens/dnsenum/">dnsenum</a>&nbsp;– Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.</li>
<li><a href="https://github.com/makefu/dnsmap/">dnsmap</a> – One of the Hacking Tools for Passive DNS network mapper.</li>
<li><a href="https://github.com/darkoperator/dnsrecon/">dnsrecon</a> – One of the Hacking Tools for DNS enumeration script.</li>
<li><a href="http://www.mavetju.org/unix/dnstracer.php" rel="nofollow">dnstracer</a>&nbsp;– Determines where a given DNS server gets its information from, and follows the chain of DNS servers.</li>
<li><a href="https://github.com/chrislee35/passivedns-client">passivedns-client</a>&nbsp;– Library and query tool for querying several passive DNS providers.</li>
<li><a href="https://github.com/gamelinux/passivedns">passivedns</a>&nbsp;– Network sniffer that logs all DNS server replies for use in a passive DNS setup.</li>
<li><a href="https://github.com/robertdavidgraham/masscan">Mass Scan</a> – best Hacking Tools for TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.</li>
<li><a href="https://github.com/hatRiot/zarp">Zarp</a>&nbsp;– Network attack tool centered around the exploitation of local networks.</li>
<li><a href="https://github.com/mitmproxy/mitmproxy">mitmproxy</a>&nbsp;– Interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.</li>
<li><a href="https://github.com/r00t-3xp10it/morpheus">Morpheus</a>&nbsp;– Automated ettercap TCP/IP Hacking Tools .</li>
<li><a href="https://github.com/justmao945/mallory">mallory</a>&nbsp;– HTTP/HTTPS proxy over SSH.</li>
<li><a href="https://github.com/jtesta/ssh-mitm">SSH MITM</a>&nbsp;– Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.</li>
<li><a href="https://github.com/netzob/netzob">Netzob</a>&nbsp;– Reverse engineering, traffic generation and fuzzing of communication protocols.</li>
<li><a href="https://github.com/sensepost/DET">DET</a>&nbsp;– Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.</li>
<li><a href="https://github.com/samyk/pwnat">pwnat</a>&nbsp;– Punches holes in firewalls and NATs.</li>
<li><a href="https://www.monkey.org/~dugsong/dsniff/" rel="nofollow">dsniff</a>&nbsp;– Collection of tools for network auditing and pentesting.</li>
<li><a href="http://tgcd.sourceforge.net/" rel="nofollow">tgcd</a>&nbsp;– Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.</li>
<li><a href="https://github.com/ShawnDEvans/smbmap">smbmap</a>&nbsp;– Handy SMB enumeration tool.</li>
<li><a href="https://github.com/secdev/scapy">scapy</a>&nbsp;– Python-based interactive packet manipulation program &amp; library.</li>
<li><a href="https://github.com/USArmyResearchLab/Dshell">Dshell</a>&nbsp;– Network forensic analysis framework.</li>
<li><a href="http://www.iwaxx.com/debookee/" rel="nofollow">Debookee</a>&nbsp;– Simple and powerful network traffic analyzer for macOS.</li>
<li><a href="https://github.com/dripcap/dripcap">Dripcap</a>&nbsp;– Caffeinated packet analyzer.</li>
<li><a href="https://github.com/RUB-NDS/PRET">Printer Exploitation Toolkit (PRET)</a>&nbsp;– Tool for printer security testing capable of IP and USB connectivity, fuzzing, and exploitation of PostScript, PJL, and PCL printer language features.</li>
<li><a href="http://h.foofus.net/?page_id=218" rel="nofollow">Praeda</a>&nbsp;– Automated multi-function printer data harvester for gathering usable data during security assessments.</li>
<li><a href="https://github.com/reverse-shell/routersploit">routersploit</a>&nbsp;– Open source exploitation framework similar to Metasploit but dedicated to embedded devices.</li>
<li><a href="https://github.com/infobyte/evilgrade">evilgrade</a>&nbsp;– Modular framework to take advantage of poor upgrade implementations by injecting fake updates.</li>
<li><a href="https://github.com/evilsocket/xray">XRay</a>&nbsp;– Network (sub)domain discovery and reconnaissance automation tool.</li>
<li><a href="http://www.ettercap-project.org/" rel="nofollow">Ettercap</a>&nbsp;– Comprehensive, mature suite for machine-in-the-middle attacks.</li>
<li><a href="https://www.bettercap.org/" rel="nofollow">BetterCAP</a>&nbsp;– Modular, portable and easily extensible MITM framework.</li>
<li><a href="https://github.com/byt3bl33d3r/CrackMapExec">CrackMapExec</a>&nbsp;– A swiss army knife for pentesting networks.</li>
<li><a href="https://github.com/CoreSecurity/impacket">impacket</a>&nbsp;– A collection of Python classes for working with network protocols.</li>
</ul>
<h3><strong>Wireless Network Hacking Tools<br />
</strong></h3>
<ul>
<li><a href="http://www.aircrack-ng.org/" rel="nofollow">Aircrack-ng</a>&nbsp;– Set of Penetration testing &amp;&nbsp;Hacking Tools list for auditing wireless networks.</li>
<li><a href="https://kismetwireless.net/" rel="nofollow">Kismet</a>&nbsp;– Wireless network detector, sniffer, and IDS.</li>
<li><a href="https://code.google.com/archive/p/reaver-wps" rel="nofollow">Reaver</a>&nbsp;– Brute force attack against WiFi Protected Setup.</li>
<li><a href="https://github.com/derv82/wifite">Wifite</a>&nbsp;– Automated wireless attack tool.</li>
<li><a href="https://github.com/FluxionNetwork/fluxion">Fluxion</a>&nbsp;– Suite of automated social engineering based WPA attacks.</li>
</ul>
<h3><a id="user-content-transport-layer-security-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#transport-layer-security-tools" aria-hidden="true"></a><strong>Transport Layer Security Tools</strong></h3>
<ul>
<li><a href="https://github.com/nabla-c0d3/sslyze">SSLyze</a>&nbsp;– Fast and comprehensive TLS/SSL configuration analyzer to help identify security mis-configurations.</li>
<li><a href="https://github.com/WestpointLtd/tls_prober">tls_prober</a>&nbsp;– Fingerprint a server’s SSL/TLS implementation.</li>
<li><a href="https://github.com/drwetter/testssl.sh">testssl.sh</a>&nbsp;– Command line tool which checks a server’s service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.</li>
</ul>
<h3><a id="user-content-web-exploitation" class="anchor" href="https://github.com/enaqx/awesome-pentest#web-exploitation" aria-hidden="true"></a><strong>Web Exploitation</strong></h3>
<ul>
<li><a href="https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project" rel="nofollow">OWASP Zed Attack Proxy (ZAP)</a>&nbsp;– Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.</li>
<li><a href="https://www.telerik.com/fiddler" rel="nofollow">Fiddler</a>&nbsp;– Free cross-platform web debugging proxy with user-friendly companion tools.</li>
<li><a href="https://portswigger.net/burp/" rel="nofollow">Burp Suite</a> – One of the Hacking Tools ntegrated platform for performing security testing of web applications.</li>
<li><a href="https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2017/march/autochrome/" rel="nofollow">autochrome</a>&nbsp;– Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.</li>
<li><a href="https://github.com/beefproject/beef">Browser Exploitation Framework (BeEF)</a>&nbsp;– Command and control server for delivering exploits to commandeered Web browsers.</li>
<li><a href="https://www.owasp.org/index.php/OWASP_OWTF" rel="nofollow">Offensive Web Testing Framework (OWTF)</a>&nbsp;– Python-based framework for pentesting Web applications based on the OWASP Testing Guide.</li>
<li><a href="https://github.com/rastating/wordpress-exploit-framework">WordPress Exploit Framework</a>&nbsp;– Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.</li>
<li><a href="https://github.com/espreto/wpsploit">WPSploit</a>&nbsp;– Exploit WordPress-powered websites with Metasploit.</li>
<li><a href="http://sqlmap.org/" rel="nofollow">SQLmap</a>&nbsp;– Automatic SQL injection and database takeover tool.</li>
<li><a href="https://github.com/epinna/tplmap">tplmap</a>&nbsp;– Automatic server-side template injection and Web server takeover Hacking Tools .</li>
<li><a href="https://github.com/epinna/weevely3">weevely3</a>&nbsp;– Weaponized web shell.</li>
<li><a href="https://www.wappalyzer.com/" rel="nofollow">Wappalyzer</a>&nbsp;– Wappalyzer uncovers the technologies used on websites.</li>
<li><a href="https://github.com/urbanadventurer/WhatWeb">WhatWeb</a>&nbsp;– Website fingerprinter.</li>
<li><a href="http://blindelephant.sourceforge.net/" rel="nofollow">BlindElephant</a>&nbsp;– Web application fingerprinter.</li>
<li><a href="https://github.com/EnableSecurity/wafw00f">wafw00f</a>&nbsp;– Identifies and fingerprints Web Application Firewall (WAF) products.</li>
<li><a href="https://github.com/kurobeats/fimap">fimap</a>&nbsp;– Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.</li>
<li><a href="https://github.com/D35m0nd142/Kadabra">Kadabra</a>&nbsp;– Automatic LFI exploiter and scanner.</li>
<li><a href="https://github.com/P0cL4bs/Kadimus">Kadimus</a>&nbsp;– LFI scan and exploit tool.</li>
<li><a href="https://github.com/hvqzao/liffy">liffy</a>&nbsp;– LFI exploitation tool.</li>
<li><a href="https://github.com/commixproject/commix">Commix</a>&nbsp;– Automated all-in-one operating system command injection and exploitation tool.</li>
<li><a href="https://github.com/kost/dvcs-ripper">DVCS Ripper</a>&nbsp;– Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.</li>
<li><a href="https://github.com/internetwache/GitTools">GitTools</a> – One of the Hacking Tools that Automatically find and download Web-accessible&nbsp;<code>.git</code>&nbsp;repositories.</li>
<li><a href="https://www.thoughtcrime.org/software/sslstrip/" rel="nofollow">sslstrip</a>&nbsp;–<br />
One of the Hacking Tools Demonstration of the HTTPS stripping attacks.</li>
<li><a href="https://github.com/LeonardoNve/sslstrip2">sslstrip2</a>&nbsp;– SSLStrip version to defeat HSTS.</li>
<li><a href="http://nosqlmap.net/" rel="nofollow">NoSQLmap</a>&nbsp;– Automatic NoSQL injection and database takeover tool.</li>
<li><a href="https://github.com/codingo/VHostScan">VHostScan</a>&nbsp;– A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.</li>
<li><a href="https://github.com/fuzzdb-project/fuzzdb">FuzzDB</a>&nbsp;– Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.</li>
<li><a href="https://github.com/ChrisTruncer/EyeWitness">EyeWitness</a>&nbsp;– Tool to take screenshots of websites, provide some server header info, and identify default credentials if possible.</li>
<li><a href="https://github.com/maaaaz/webscreenshot">webscreenshot</a>&nbsp;– A simple script to take screenshots of list of websites.</li>
</ul>
<h3><a id="user-content-hex-editors" class="anchor" href="https://github.com/enaqx/awesome-pentest#hex-editors" aria-hidden="true"></a><strong>Hex Editors</strong></h3>
<ul>
<li><a href="https://hexed.it/" rel="nofollow">HexEdit.js</a>&nbsp;– Browser-based hex editing.</li>
<li><a href="https://hexinator.com/" rel="nofollow">Hexinator</a>&nbsp;– World’s finest (proprietary, commercial) Hex Editor.</li>
<li><a href="http://frhed.sourceforge.net/" rel="nofollow">Frhed</a>&nbsp;– Binary file editor for Windows.</li>
<li><a href="http://www.suavetech.com/0xed/0xed.html" rel="nofollow">0xED</a>&nbsp;– Native macOS hex editor that supports plug-ins to display custom data types.</li>
</ul>
<h3><a id="user-content-file-format-analysis-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#file-format-analysis-tools" aria-hidden="true"></a><strong>File Format Analysis Tools</strong></h3>
<ul>
<li><a href="http://kaitai.io/" rel="nofollow">Kaitai Struct</a>&nbsp;– File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.</li>
<li><a href="https://codisec.com/veles/" rel="nofollow">Veles</a>&nbsp;– Binary data visualization and analysis tool.</li>
<li><a href="http://hachoir3.readthedocs.io/" rel="nofollow">Hachoir</a>&nbsp;– Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.</li>
</ul>
<h3><a id="user-content-defense-evasion-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#defense-evasion-tools" aria-hidden="true"></a><strong>Defense Evasion Tools</strong></h3>
<ul>
<li><a href="https://www.veil-framework.com/" rel="nofollow">Veil</a>&nbsp;– Generate metasploit payloads that bypass common anti-virus solutions.</li>
<li><a href="https://github.com/Exploit-install/shellsploit-framework">shellsploit</a>&nbsp;– Generates custom shellcode, backdoors, injectors, optionally obfuscates every byte via encoders.</li>
<li><a href="http://nullsecurity.net/tools/binary.html" rel="nofollow">Hyperion</a>&nbsp;– Runtime encryptor for 32-bit portable executables (“PE&nbsp;<code>.exe</code>s”).</li>
<li><a href="https://github.com/govolution/avet">AntiVirus Evasion Tool (AVET)</a>&nbsp;– Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.</li>
<li><a href="https://www.securitysift.com/pecloak-py-an-experiment-in-av-evasion/" rel="nofollow">peCloak.py</a>&nbsp;– Automates the process of hiding a malicious Windows executable from antivirus (AV) detection.</li>
<li><a href="https://github.com/v-p-b/peCloakCapstone">peCloakCapstone</a>&nbsp;– Multi-platform fork of the peCloak.py automated malware antivirus evasion tool.</li>
<li><a href="https://github.com/Mr-Un1k0d3r/UniByAv">UniByAv</a>&nbsp;– Simple obfuscator that takes raw shellcode and generates Anti-Virus friendly executables by using a brute-forcable, 32-bit XOR key.</li>
</ul>
<h3><a id="user-content-hash-cracking-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#hash-cracking-tools" aria-hidden="true"></a><strong>Hash Cracking Hacking Tools</strong></h3>
<ul>
<li><a href="http://www.openwall.com/john/" rel="nofollow">John the Ripper</a> – One of the best Hacking Tools for Fast password cracker.</li>
<li><a href="http://hashcat.net/hashcat/" rel="nofollow">Hashcat</a> – Another One of the Hacking Tools The more fast hash cracker.</li>
<li><a href="https://digi.ninja/projects/cewl.php" rel="nofollow">CeWL</a>&nbsp;– Generates custom wordlists by spidering a target’s website and collecting unique words.</li>
<li><a href="https://github.com/lmammino/jwt-cracker">JWT Cracker</a>&nbsp;– Simple HS256 JWT token brute force cracker.</li>
<li><a href="http://rarcrack.sourceforge.net/" rel="nofollow">Rar Crack</a>&nbsp;– RAR bruteforce cracker.</li>
<li><a href="https://github.com/glv2/bruteforce-wallet">BruteForce Wallet</a>&nbsp;– Find the password of an encrypted wallet file (i.e.&nbsp;<code>wallet.dat</code>).</li>
</ul>
<h3><a id="user-content-windows-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#windows-utilities" aria-hidden="true"></a><strong>Windows Utilities</strong></h3>
<ul>
<li><a href="https://technet.microsoft.com/en-us/sysinternals/bb842062" rel="nofollow">Sysinternals Suite</a>&nbsp;– The Sysinternals Troubleshooting Utilities.</li>
<li><a href="http://www.ampliasecurity.com/research/windows-credentials-editor/" rel="nofollow">Windows Credentials Editor</a>&nbsp;– Inspect logon sessions and add, change, list, and delete associated credentials, including Kerberos tickets.</li>
<li><a href="http://blog.gentilkiwi.com/mimikatz" rel="nofollow">mimikatz</a>&nbsp;– Credentials extraction tool for Windows operating system.</li>
<li><a href="https://github.com/PowerShellMafia/PowerSploit">PowerSploit</a>&nbsp;– PowerShell Post-Exploitation Framework.</li>
<li><a href="https://github.com/GDSSecurity/Windows-Exploit-Suggester">Windows Exploit Suggester</a>&nbsp;– Detects potential missing patches on the target.</li>
<li><a href="https://github.com/SpiderLabs/Responder">Responder</a>&nbsp;– LLMNR, NBT-NS and MDNS poisoner.</li>
<li><a href="https://github.com/adaptivethreat/Bloodhound/wiki">Bloodhound</a>&nbsp;– Graphical Active Directory trust relationship explorer.</li>
<li><a href="https://www.powershellempire.com/" rel="nofollow">Empire</a>&nbsp;– Pure PowerShell post-exploitation agent.</li>
<li><a href="https://github.com/rabbitstack/fibratus">Fibratus</a>&nbsp;– Tool for exploration and tracing of the Windows kernel.</li>
<li><a href="https://labs.mwrinfosecurity.com/tools/wepwnise/" rel="nofollow">wePWNise</a>&nbsp;– Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software.</li>
<li><a href="https://github.com/nccgroup/redsnarf">redsnarf</a>&nbsp;– Post-exploitation tool for retrieving password hashes and credentials from Windows workstations, servers, and domain controllers.</li>
<li><a href="https://github.com/trustedsec/unicorn">Magic Unicorn</a>&nbsp;– Shellcode generator for numerous attack vectors, including Microsoft Office macros, PowerShell, HTML applications (HTA), or&nbsp;<code>certutil</code>&nbsp;(using fake certificates).</li>
<li><a href="https://github.com/byt3bl33d3r/DeathStar">DeathStar</a>&nbsp;– Python script that uses Empire’s RESTful API to automate gaining Domain Admin rights in Active Directory environments.</li>
</ul>
<h3><a id="user-content-gnulinux-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#gnulinux-utilities" aria-hidden="true"></a><strong>GNU/Linux Utilities</strong></h3>
<ul>
<li><a href="https://github.com/PenturaLabs/Linux_Exploit_Suggester">Linux Exploit Suggester</a>&nbsp;– Heuristic reporting on potentially viable exploits for a given GNU/Linux system.</li>
</ul>
<h3><a id="user-content-macos-utilities" class="anchor" href="https://github.com/enaqx/awesome-pentest#macos-utilities" aria-hidden="true"></a><strong>macOS Utilities</strong></h3>
<ul>
<li><a href="https://github.com/Trietptm-on-Security/Bella">Bella</a>&nbsp;– Pure Python post-exploitation data mining and remote administration tool for macOS.</li>
</ul>
<h3><a id="user-content-ddos-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#ddos-tools" aria-hidden="true"></a><strong>DDoS Tools</strong></h3>
<ul>
<li><a href="https://github.com/NewEraCracker/LOIC/">LOIC</a>&nbsp;– Open source network stress tool for Windows.</li>
<li><a href="http://metacortexsecurity.com/tools/anon/LOIC/LOICv1.html" rel="nofollow">JS LOIC</a>&nbsp;– JavaScript in-browser version of LOIC.</li>
<li><a href="https://github.com/gkbrk/slowloris">SlowLoris</a>&nbsp;– DoS tool that uses low bandwidth on the attacking side.</li>
<li><a href="https://sourceforge.net/projects/high-orbit-ion-cannon/" rel="nofollow">HOIC</a>&nbsp;– Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common counter measures.</li>
<li><a href="https://sourceforge.net/projects/t50/" rel="nofollow">T50</a>&nbsp;– Faster network stress tool.</li>
<li><a href="https://github.com/epsylon/ufonet">UFONet</a>&nbsp;– Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using;&nbsp;<code>GET</code>/<code>POST</code>, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.</li>
</ul>
<h3><a id="user-content-social-engineering-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-tools" aria-hidden="true"></a><strong>Social Engineering Tools</strong></h3>
<ul>
<li><a href="https://github.com/trustedsec/social-engineer-toolkit">Social Engineer Toolkit (SET)</a>&nbsp;– Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.</li>
<li><a href="https://github.com/securestate/king-phisher">King Phisher</a> – One of the Hacking Tools for Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.</li>
<li><a href="https://github.com/kgretzky/evilginx">Evilginx</a>&nbsp;– MITM attack framework used for phishing credentials and session cookies from any Web service.</li>
<li><a href="https://github.com/sophron/wifiphisher">wifiphisher</a>&nbsp;– Automated phishing attacks against WiFi networks.</li>
<li><a href="https://github.com/ring0lab/catphish">Catphish</a>&nbsp;– Tool for phishing and corporate espionage written in Ruby.</li>
<li><a href="https://github.com/4w4k3/BeeLogger">Beelogger</a>&nbsp;– Tool for generating keylooger.</li>
</ul>
<h3><a id="user-content-osint-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#osint-tools" aria-hidden="true"></a><strong>OSINT Tools</strong></h3>
<ul>
<li><a href="http://www.paterva.com/web7/" rel="nofollow">Maltego</a> – One of the Hacking Tools and Proprietary software for open source intelligence and forensics, from Paterva.</li>
<li><a href="https://github.com/laramies/theHarvester">theHarvester</a>&nbsp;– E-mail, subdomain and people names harvester.</li>
<li><a href="https://github.com/ilektrojohn/creepy">creepy</a>&nbsp;– Geolocation OSINT tool.</li>
<li><a href="https://github.com/laramies/metagoofil">metagoofil</a>&nbsp;– Metadata harvester.</li>
<li><a href="https://www.exploit-db.com/google-hacking-database/" rel="nofollow">Google Hacking Database</a>&nbsp;– Database of Google dorks; can be used for recon.</li>
<li><a href="https://github.com/JohnTroony/Google-dorks">Google-dorks</a>&nbsp;– Common Google dorks and others you probably don’t know.</li>
<li><a href="https://github.com/k3170makan/GooDork">GooDork</a>&nbsp;– Command line Google dorking tool.</li>
<li><a href="https://github.com/jgor/dork-cli">dork-cli</a>&nbsp;– Command line Google dork tool.</li>
<li><a href="https://www.censys.io/" rel="nofollow">Censys</a>&nbsp;– Collects data on hosts and websites through daily ZMap and ZGrab scans.</li>
<li><a href="https://www.shodan.io/" rel="nofollow">Shodan</a>&nbsp;– World’s first search engine for Internet-connected devices.</li>
<li><a href="https://bitbucket.org/LaNMaSteR53/recon-ng" rel="nofollow">recon-ng</a> – One of the Hacking Tools Full-featured Web Reconnaissance framework written in Python.</li>
<li><a href="https://github.com/techgaun/github-dorks">github-dorks</a>&nbsp;– CLI tool to scan Github repos/organizations for potential sensitive information leak.</li>
<li><a href="https://github.com/melvinsh/vcsmap">vcsmap</a>&nbsp;– Plugin-based tool to scan public version control systems for sensitive information.</li>
<li><a href="http://www.spiderfoot.net/" rel="nofollow">Spiderfoot</a>&nbsp;– Multi-source OSINT automation tool with a Web UI and report visualizations</li>
<li><a href="https://github.com/Hood3dRob1n/BinGoo">BinGoo</a>&nbsp;– GNU/Linux bash based Bing and Google Dorking Tool.</li>
<li><a href="https://github.com/DanMcInerney/fast-recon">fast-recon</a>&nbsp;– Perform Google dorks against a domain.</li>
<li><a href="https://github.com/Smaash/snitch">snitch</a>&nbsp;– Information gathering via dorks.</li>
<li><a href="https://github.com/1N3/Sn1per">Sn1per</a> – ons of the Hacking Tools for Automated Pentest Recon Scanner.</li>
<li><a href="https://www.threatcrowd.org/" rel="nofollow">Threat Crowd</a>&nbsp;– Search engine for threats.</li>
<li><a href="https://www.virustotal.com/" rel="nofollow">Virus Total</a>&nbsp;– VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware.</li>
<li><a href="https://github.com/upgoingstar/datasploit">DataSploit</a>&nbsp;– OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.</li>
<li><a href="https://github.com/michenriksen/aquatone">AQUATONE</a>&nbsp;– Subdomain discovery tool utilizing various open sources producing a report that can be used as input to other tools.</li>
<li><a href="http://intrigue.io/" rel="nofollow">Intrigue</a>&nbsp;– Automated OSINT &amp; Attack Surface discovery framework with powerful API, UI and CLI.</li>
<li><a href="https://www.zoomeye.org/" rel="nofollow">ZoomEye</a>&nbsp;– Search engine for cyberspace that lets the user find specific network components.</li>
</ul>
<h3><a id="user-content-anonymity-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#anonymity-tools" aria-hidden="true"></a><strong>Anonymity Tools</strong></h3>
<ul>
<li><a href="https://www.torproject.org/" rel="nofollow">Tor</a>&nbsp;– Free software and onion routed overlay network that helps you defend against traffic analysis.</li>
<li><a href="https://onionscan.org/" rel="nofollow">OnionScan</a> – One of the Hacking Tools for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.</li>
<li><a href="https://geti2p.net/" rel="nofollow">I2P</a>&nbsp;– The Invisible Internet Project.</li>
<li><a href="https://github.com/GouveaHeitor/nipe">Nipe</a>&nbsp;– Script to redirect all traffic from the machine to the Tor network.</li>
<li><a href="http://webkay.robinlinus.com/" rel="nofollow">What Every Browser Knows About You</a>&nbsp;– Comprehensive detection page to test your own Web browser’s configuration for privacy and identity leaks.</li>
</ul>
<h3><a id="user-content-reverse-engineering-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#reverse-engineering-tools" aria-hidden="true"></a><strong>Reverse Engineering Tools</strong></h3>
<ul>
<li><a href="https://www.hex-rays.com/products/ida/" rel="nofollow">Interactive Disassembler (IDA Pro)</a>&nbsp;– Proprietary multi-processor disassembler and debugger for Windows, GNU/Linux, or macOS; also has a free version,&nbsp;<a href="https://www.hex-rays.com/products/ida/support/download_freeware.shtml" rel="nofollow">IDA Free</a>.</li>
<li><a href="https://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx" rel="nofollow">WDK/WinDbg</a>&nbsp;– Windows Driver Kit and WinDbg.</li>
<li><a href="http://www.ollydbg.de/" rel="nofollow">OllyDbg</a>&nbsp;– x86 debugger for Windows binaries that emphasizes binary code analysis.</li>
<li><a href="http://rada.re/r/index.html" rel="nofollow">Radare2</a>&nbsp;– Open source, crossplatform reverse engineering framework.</li>
<li><a href="http://x64dbg.com/" rel="nofollow">x64dbg</a>&nbsp;– Open source x64/x32 debugger for windows.</li>
<li><a href="http://debugger.immunityinc.com/" rel="nofollow">Immunity Debugger</a>&nbsp;– Powerful way to write exploits and analyze malware.</li>
<li><a href="http://www.codef00.com/projects#debugger" rel="nofollow">Evan’s Debugger</a>&nbsp;– OllyDbg-like debugger for GNU/Linux.</li>
<li><a href="https://github.com/wisk/medusa">Medusa</a>&nbsp;– Open source, cross-platform interactive disassembler.</li>
<li><a href="https://github.com/joelpx/plasma">plasma</a>&nbsp;– Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.</li>
<li><a href="https://github.com/longld/peda">peda</a>&nbsp;– Python Exploit Development Assistance for GDB.</li>
<li><a href="https://github.com/0xd4d/dnSpy">dnSpy</a> – one of the Hacking Tools to reverse engineer .NET assemblies.</li>
<li><a href="https://github.com/devttys0/binwalk">binwalk</a>&nbsp;– Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.</li>
<li><a href="https://github.com/Cisco-Talos/pyrebox">PyREBox</a>&nbsp;– Python scriptable Reverse Engineering sandbox by Cisco-Talos.</li>
<li><a href="https://github.com/snare/voltron">Voltron</a>&nbsp;– Extensible debugger UI toolkit written in Python.</li>
<li><a href="http://www.capstone-engine.org/" rel="nofollow">Capstone</a>&nbsp;– Lightweight multi-platform, multi-architecture disassembly framework.</li>
<li><a href="https://github.com/fireeye/rVMI">rVMI</a>&nbsp;– Debugger on steroids; inspect userspace processes, kernel drivers, and preboot environments in a single tool.</li>
<li><a href="https://www.frida.re/" rel="nofollow">Frida</a>&nbsp;– Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.</li>
</ul>
<h3><a id="user-content-physical-access-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#physical-access-tools" aria-hidden="true"></a><strong>Physical Access Tools</strong></h3>
<ul>
<li><a href="https://lanturtle.com/" rel="nofollow">LAN Turtle</a>&nbsp;– Covert “USB Ethernet Adapter” that provides remote access, network intelligence gathering, and MITM capabilities when installed in a local network.</li>
<li><a href="http://usbrubberducky.com/" rel="nofollow">USB Rubber Ducky</a>&nbsp;– Customizable keystroke injection attack platform masquerading as a USB thumbdrive.</li>
<li><a href="https://samy.pl/poisontap/" rel="nofollow">Poisontap</a>&nbsp;– Siphons cookies, exposes internal (LAN-side) router and installs web backdoor on locked computers.</li>
<li><a href="https://www.wifipineapple.com/" rel="nofollow">WiFi Pineapple</a>&nbsp;– Wireless auditing and penetration testing platform.</li>
<li><a href="https://proxmark3.com/" rel="nofollow">Proxmark3</a>&nbsp;– RFID/NFC cloning, replay, and spoofing toolkit often used for analyzing and attacking proximity cards/readers, wireless keys/keyfobs, and more.</li>
</ul>
<h3><a id="user-content-side-channel-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#side-channel-tools" aria-hidden="true"></a><strong>Side-channel Tools</strong></h3>
<ul>
<li><a href="http://chipwhisperer.com/" rel="nofollow">ChipWhisperer</a>&nbsp;– Complete open-source toolchain for side-channel power analysis and glitching attacks.</li>
</ul>
<h3><a id="user-content-ctf-tools" class="anchor" href="https://github.com/enaqx/awesome-pentest#ctf-tools" aria-hidden="true"></a><strong>CTF Tools</strong></h3>
<ul>
<li><a href="https://github.com/zardus/ctf-tools">ctf-tools</a>&nbsp;– Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.</li>
<li><a href="https://github.com/Gallopsled/pwntools">Pwntools</a>&nbsp;– Rapid exploit development framework built for use in CTFs.</li>
<li><a href="https://github.com/sourcekris/RsaCtfTool">RsaCtfTool</a>&nbsp;– Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.</li>
</ul>
<h3><a id="user-content-penetration-testing-report-templates" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-report-templates" aria-hidden="true"></a><strong>Penetration Testing Report Templates</strong></h3>
<ul>
<li><a href="https://github.com/juliocesarfort/public-pentesting-reports">Public Pentesting Reports</a>&nbsp;– Curated list of public penetration test reports released by several consulting firms and academic security groups.</li>
<li><a href="https://www.testandverification.com/wp-content/uploads/template-penetration-testing-report-v03.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– testandverification.com template.</li>
<li><a href="https://www.hitachi-systems-security.com/wp-content/uploads/Above-Security-Technical-Security-Audit-Demo-Report_En_FINAL.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– hitachi-systems-security.com template.</li>
<li><a href="http://lucideus.com/pdf/stw.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– lucideus.com template.</li>
<li><a href="https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– crest-approved.org templage.</li>
<li><a href="https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf" rel="nofollow">Pentesting Report Template</a>&nbsp;– pcisecuritystandards.org template.</li>
</ul>
<h2><a id="user-content-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#books" aria-hidden="true"></a><strong>Books</strong></h2>
<h3><a id="user-content-penetration-testing-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#penetration-testing-books" aria-hidden="true"></a><strong>Penetration Testing Books</strong></h3>
<ul>
<li><a href="https://www.nostarch.com/hacking2.htm" rel="nofollow">The Art of Exploitation by Jon Erickson, 2008</a></li>
<li><a href="https://www.nostarch.com/metasploit" rel="nofollow">Metasploit: The Penetration Tester’s Guide by David Kennedy et al., 2011</a></li>
<li><a href="https://www.nostarch.com/pentesting" rel="nofollow">Penetration Testing: A Hands-On Introduction to Hacking by Georgia Weidman, 2014</a></li>
<li><a href="http://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504/" rel="nofollow">Rtfm: Red Team Field Manual by Ben Clark, 2014</a></li>
<li><a href="http://www.amazon.com/The-Hacker-Playbook-Practical-Penetration/dp/1494932636/" rel="nofollow">The Hacker Playbook by Peter Kim, 2014</a></li>
<li><a href="https://www.elsevier.com/books/the-basics-of-hacking-and-penetration-testing/engebretson/978-1-59749-655-1" rel="nofollow">The Basics of Hacking and Penetration Testing by Patrick Engebretson, 2013</a></li>
<li><a href="https://www.elsevier.com/books/professional-penetration-testing/wilhelm/978-1-59749-993-4" rel="nofollow">Professional Penetration Testing by Thomas Wilhelm, 2013</a></li>
<li><a href="http://www.packtpub.com/networking-and-servers/advanced-penetration-testing-highly-secured-environments-ultimate-security-gu" rel="nofollow">Advanced Penetration Testing for Highly-Secured Environments by Lee Allen, 2012</a></li>
<li><a href="https://www.elsevier.com/books/violent-python/unknown/978-1-59749-957-6" rel="nofollow">Violent Python by TJ O’Connor, 2012</a></li>
<li><a href="http://www.fuzzing.org/" rel="nofollow">Fuzzing: Brute Force Vulnerability Discovery by Michael Sutton et al., 2007</a></li>
<li><a href="http://www.amazon.com/Black-Hat-Python-Programming-Pentesters/dp/1593275900" rel="nofollow">Black Hat Python: Python Programming for Hackers and Pentesters by Justin Seitz, 2014</a></li>
<li><a href="http://www.amazon.com/Penetration-Testing-Procedures-Methodologies-EC-Council/dp/1435483677" rel="nofollow">Penetration Testing: Procedures &amp; Methodologies by EC-Council, 2010</a></li>
<li><a href="http://www.amazon.com/Unauthorised-Access-Physical-Penetration-Security-ebook/dp/B005DIAPKE" rel="nofollow">Unauthorised Access: Physical Penetration Testing For IT Security Teams by Wil Allsopp, 2010</a></li>
<li><a href="http://www.amazon.com/Advanced-Persistent-Threat-Hacking-Organization/dp/0071828362" rel="nofollow">Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization by Tyler Wrightson, 2014</a></li>
<li><a href="https://www.nostarch.com/bughunter" rel="nofollow">Bug Hunter’s Diary by Tobias Klein, 2011</a></li>
<li><a href="https://www.amazon.com/Advanced-Penetration-Testing-Hacking-Networks/dp/1119367689/" rel="nofollow">Advanced Penetration Testing by <strong>Wil Allsopp, 2017</strong></a></li>
</ul>
<h3><strong><a id="user-content-hackers-handbook-series" class="anchor" href="https://github.com/enaqx/awesome-pentest#hackers-handbook-series" aria-hidden="true"></a>Hackers Handbook Series</strong></h3>
<ul>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764578014.html" rel="nofollow">The Database Hacker’s Handbook, David Litchfield et al., 2005</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html" rel="nofollow">The Shellcoders Handbook by Chris Anley et al., 2007</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470395362.html" rel="nofollow">The Mac Hacker’s Handbook by Charlie Miller &amp; Dino Dai Zovi, 2009</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html" rel="nofollow">The Web Application Hackers Handbook by D. Stuttard, M. Pinto, 2011</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118204123.html" rel="nofollow">iOS Hackers Handbook by Charlie Miller et al., 2012</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-111860864X.html" rel="nofollow">Android Hackers Handbook by Joshua J. Drake et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118662091.html" rel="nofollow">The Browser Hackers Handbook by Wade Alcorn et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html" rel="nofollow">The Mobile Application Hackers Handbook by Dominic Chell et al., 2015</a></li>
<li><a href="https://www.nostarch.com/carhacking" rel="nofollow">Car Hacker’s Handbook by Craig Smith, 2016</a></li>
</ul>
<h3><strong><a id="user-content-defensive-development" class="anchor" href="https://github.com/enaqx/awesome-pentest#defensive-development" aria-hidden="true"></a>Defensive Development</strong></h3>
<ul>
<li><a href="https://leanpub.com/holistic-infosec-for-web-developers" rel="nofollow">Holistic Info-Sec for Web Developers (Fascicle 0)</a></li>
<li><a href="https://leanpub.com/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications" rel="nofollow">Holistic Info-Sec for Web Developers (Fascicle 1)</a></li>
</ul>
<h3><a id="user-content-network-analysis-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#network-analysis-books" aria-hidden="true"></a><strong>Network Analysis Books</strong></h3>
<ul>
<li><a href="https://nmap.org/book/" rel="nofollow">Nmap Network Scanning by Gordon Fyodor Lyon, 2009</a></li>
<li><a href="https://www.nostarch.com/packet2.htm" rel="nofollow">Practical Packet Analysis by Chris Sanders, 2011</a></li>
<li><a href="https://www.amazon.com/Wireshark-Network-Analysis-Second-Certified/dp/1893939944" rel="nofollow">Wireshark Network Analysis by by Laura Chappell &amp; Gerald Combs, 2012</a></li>
<li><a href="http://www.amazon.com/Network-Forensics-Tracking-Hackers-Cyberspace-ebook/dp/B008CG8CYU/" rel="nofollow">Network Forensics: Tracking Hackers through Cyberspace by Sherri Davidoff &amp; Jonathan Ham, 2012</a></li>
</ul>
<h3><a id="user-content-reverse-engineering-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#reverse-engineering-books" aria-hidden="true"></a><strong>Reverse Engineering Books</strong></h3>
<ul>
<li><a href="http://beginners.re/" rel="nofollow">Reverse Engineering for Beginners by Dennis Yurichev</a></li>
<li><a href="https://www.nostarch.com/xbox.htm" rel="nofollow">Hacking the Xbox by Andrew Huang, 2003</a></li>
<li><a href="https://www.nostarch.com/idapro2.htm" rel="nofollow">The IDA Pro Book by Chris Eagle, 2011</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118787315.html" rel="nofollow">Practical Reverse Engineering by Bruce Dang et al., 2014</a></li>
<li><a href="http://www.amazon.com/Hacking-Ethical-Hackers-Handbook-Edition/dp/0071832386" rel="nofollow">Gray Hat Hacking The Ethical Hacker’s Handbook by Daniel Regalado et al., 2015</a></li>
</ul>
<h3><a id="user-content-malware-analysis-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#malware-analysis-books" aria-hidden="true"></a><strong>Malware Analysis Books</strong></h3>
<ul>
<li><a href="https://www.nostarch.com/malware" rel="nofollow">Practical Malware Analysis by Michael Sikorski &amp; Andrew Honig, 2012</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html" rel="nofollow">The Art of Memory Forensics by Michael Hale Ligh et al., 2014</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html" rel="nofollow">Malware Analyst’s Cookbook and DVD by Michael Hale Ligh et al., 2010</a></li>
</ul>
<h3><a id="user-content-windows-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#windows-books" aria-hidden="true"></a><strong>Windows Books</strong></h3>
<ul>
<li><a href="http://www.amazon.com/Windows-Internals-Part-Developer-Reference/dp/0735648735/" rel="nofollow">Windows Internals by Mark Russinovich et al., 2012</a></li>
<li><a href="https://www.amazon.com/Troubleshooting-Windows-Sysinternals-Tools-2nd/dp/0735684448/" rel="nofollow">Troubleshooting with the Windows Sysinternals Tools by Mark Russinovich &amp; Aaron Margosis, 2016</a></li>
</ul>
<h3><a id="user-content-social-engineering-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#social-engineering-books" aria-hidden="true"></a><strong>Social Engineering Books</strong></h3>
<ul>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0471237124.html" rel="nofollow">The Art of Deception by Kevin D. Mitnick &amp; William L. Simon, 2002</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0764569597.html" rel="nofollow">The Art of Intrusion by Kevin D. Mitnick &amp; William L. Simon, 2005</a></li>
<li><a href="http://www.hachettebookgroup.com/titles/kevin-mitnick/ghost-in-the-wires/9780316134477/" rel="nofollow">Ghost in the Wires by Kevin D. Mitnick &amp; William L. Simon, 2011</a></li>
<li><a href="https://www.elsevier.com/books/no-tech-hacking/mitnick/978-1-59749-215-7" rel="nofollow">No Tech Hacking by Johnny Long &amp; Jack Wiles, 2008</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470639539.html" rel="nofollow">Social Engineering: The Art of Human Hacking by Christopher Hadnagy, 2010</a></li>
<li><a href="http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118608577.html" rel="nofollow">Unmasking the Social Engineer: The Human Element of Security by Christopher Hadnagy, 2014</a></li>
<li><a href="https://www.mhprofessional.com/product.php?isbn=0071818464" rel="nofollow">Social Engineering in IT Security: Tools, Tactics, and Techniques by Sharon Conheady, 2014</a></li>
</ul>
<h3><a id="user-content-lock-picking-books" class="anchor" href="https://github.com/enaqx/awesome-pentest#lock-picking-books" aria-hidden="true"></a><strong>Lock Picking Books</strong></h3>
<ul>
<li><a href="https://www.elsevier.com/books/practical-lock-picking/ollam/978-1-59749-989-7" rel="nofollow">Practical Lock Picking by Deviant Ollam, 2012</a></li>
<li><a href="https://www.elsevier.com/books/keys-to-the-kingdom/ollam/978-1-59749-983-5" rel="nofollow">Keys to the Kingdom by Deviant Ollam, 2012</a></li>
<li><a href="https://www.dropbox.com/s/y39ix9u9qpqffct/Lockpicking%20Detail%20Overkill.pdf?dl=0" rel="nofollow">Lock Picking: Detail Overkill by Solomon</a></li>
<li><a href="https://www.dropbox.com/sh/k3z4dm4vyyojp3o/AAAIXQuwMmNuCch_StLPUYm-a?dl=0" rel="nofollow">Eddie the Wire books</a></li>
</ul>
<h3><a id="user-content-defcon-suggested-reading" class="anchor" href="https://github.com/enaqx/awesome-pentest#defcon-suggested-reading" aria-hidden="true"></a><strong>Defcon Suggested Reading –&nbsp;Hacking Tools</strong></h3>
<ul>
<li><a href="https://www.defcon.org/html/links/book-list.html" rel="nofollow">Defcon Suggested Reading</a></li>
</ul>
<h2><a id="user-content-vulnerability-databases" class="anchor" href="https://github.com/enaqx/awesome-pentest#vulnerability-databases" aria-hidden="true"></a><strong>Vulnerability Databases –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://cve.mitre.org/" rel="nofollow">Common Vulnerabilities and Exposures (CVE)</a>&nbsp;– Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.</li>
<li><a href="https://nvd.nist.gov/" rel="nofollow">National Vulnerability Database (NVD)</a>&nbsp;– United States government’s National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.</li>
<li><a href="https://www.kb.cert.org/vuls/" rel="nofollow">US-CERT Vulnerability Notes Database</a>&nbsp;– Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).</li>
<li><a href="http://seclists.org/fulldisclosure/" rel="nofollow">Full-Disclosure</a>&nbsp;– Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.</li>
<li><a href="http://www.securityfocus.com/bid/" rel="nofollow">Bugtraq (BID)</a>&nbsp;– Software security bug identification database compiled from submissions to the SecurityFocus mailing&nbsp;Penetration testing tools list and other sources, operated by Symantec, Inc.</li>
<li><a href="https://www.exploit-db.com/" rel="nofollow">Exploit-DB</a>&nbsp;– Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.</li>
<li><a href="https://technet.microsoft.com/en-us/security/bulletins#sec_search" rel="nofollow">Microsoft Security Bulletins</a>&nbsp;– Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).</li>
<li><a href="https://technet.microsoft.com/en-us/security/advisories#APUMA" rel="nofollow">Microsoft Security Advisories</a>&nbsp;– Archive of security advisories impacting Microsoft software.</li>
<li><a href="https://www.mozilla.org/security/advisories/" rel="nofollow">Mozilla Foundation Security Advisories</a>&nbsp;– Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.</li>
<li><a href="https://packetstormsecurity.com/files/" rel="nofollow">Packet Storm</a>&nbsp;– Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.</li>
<li><a href="https://cxsecurity.com/" rel="nofollow">CXSecurity</a>&nbsp;– Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.</li>
<li><a href="http://www.securiteam.com/" rel="nofollow">SecuriTeam</a>&nbsp;– Independent source of software vulnerability information.</li>
<li><a href="https://www.vulnerability-lab.com/" rel="nofollow">Vulnerability Lab</a>&nbsp;– Open forum for security advisories organized by category of exploit target.</li>
<li><a href="http://zerodayinitiative.com/advisories/published/" rel="nofollow">Zero Day Initiative</a>&nbsp;– Bug bounty program with the publicly accessible archive of published security advisories, operated by TippingPoint.</li>
<li><a href="https://vulners.com/" rel="nofollow">Vulners</a>&nbsp;– Security database of software vulnerabilities.</li>
<li><a href="https://www.0day.today/" rel="nofollow">Inj3ct0r</a>&nbsp;(<a href="http://mvfjfugdwgc5uwho.onion/" rel="nofollow">Onion service</a>) – Exploit marketplace and vulnerability information aggregator.</li>
<li><a href="https://osvdb.org/" rel="nofollow">Open Source Vulnerability Database (OSVDB)</a>&nbsp;– Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016.Hacking Tools</li>
<li><a href="https://hpi-vdb.de/" rel="nofollow">HPI-VDB</a>&nbsp;– Aggregator of cross-referenced software vulnerabilities offering free-of-charge API access, provided by the Hasso-Plattner Institute, Potsdam.Hacking Tools</li>
</ul>
<h2><a id="user-content-security-courses" class="anchor" href="https://github.com/enaqx/awesome-pentest#security-courses" aria-hidden="true"></a><strong>Security Courses –&nbsp;Hacking Tools –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.offensive-security.com/information-security-training/" rel="nofollow">Offensive Security Training</a>&nbsp;– Training from BackTrack/Kali developers.</li>
<li><a href="http://www.sans.org/" rel="nofollow">SANS Security Training</a>&nbsp;– Computer Security Training &amp; Certification.</li>
<li><a href="http://opensecuritytraining.info/" rel="nofollow">Open Security Training</a>&nbsp;– Training material for computer security classes.</li>
<li><a href="https://trailofbits.github.io/ctf/" rel="nofollow">CTF Field Guide</a>&nbsp;– Everything you need to win your next CTF competition.</li>
<li><a href="http://azcwr.org/" rel="nofollow">ARIZONA CYBER WARFARE RANGE</a>&nbsp;– 24×7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.</li>
<li><a href="http://cybrary.it/" rel="nofollow">Cybrary</a>&nbsp;– Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book ‘Penetration Testing for Highly-Secured Environments’.</li>
<li><a href="http://computersecuritystudent.com/" rel="nofollow">Computer Security Student</a>&nbsp;– Many free tutorials, great for beginners, $10/mo membership unlocks all content.</li>
<li><a href="https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material" rel="nofollow">European Union Agency for Network and Information Security</a>&nbsp;– ENISA Cyber Security Training material.</li>
</ul>
<h2><a id="user-content-information-security-conferences" class="anchor" href="https://github.com/enaqx/awesome-pentest#information-security-conferences" aria-hidden="true"></a><strong>Information Security Conferences –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.defcon.org/" rel="nofollow">DEF CON</a>&nbsp;– Annual hacker convention in Las Vegas.</li>
<li><a href="http://www.blackhat.com/" rel="nofollow">Black Hat</a>&nbsp;– Annual security conference in Las Vegas.</li>
<li><a href="http://www.securitybsides.com/" rel="nofollow">BSides</a>&nbsp;– Framework for organising and holding security conferences.</li>
<li><a href="https://events.ccc.de/congress/" rel="nofollow">CCC</a>&nbsp;– Annual meeting of the international hacker scene in Germany.</li>
<li><a href="https://www.derbycon.com/" rel="nofollow">DerbyCon</a>&nbsp;– Annual hacker conference based in Louisville.</li>
<li><a href="http://phreaknic.info/" rel="nofollow">PhreakNIC</a>&nbsp;– Technology conference held annually in middle Tennessee.</li>
<li><a href="http://shmoocon.org/" rel="nofollow">ShmooCon</a>&nbsp;– Annual US East coast hacker convention.</li>
<li><a href="http://www.carolinacon.org/" rel="nofollow">CarolinaCon</a>&nbsp;– Infosec conference, held annually in North Carolina.</li>
<li><a href="https://2016.chcon.nz/" rel="nofollow">CHCon</a>&nbsp;– Christchurch Hacker Con, Only South Island of New Zealand hacker con.</li>
<li><a href="http://www.summercon.org/" rel="nofollow">SummerCon</a>&nbsp;– One of the oldest hacker conventions, held during Summer.</li>
<li><a href="https://2016.hack.lu/" rel="nofollow">Hack.lu</a>&nbsp;– Annual conference held in Luxembourg.</li>
<li><a href="https://hackfest.ca/" rel="nofollow">Hackfest</a>&nbsp;– Largest hacking conference in Canada.</li>
<li><a href="https://conference.hitb.org/" rel="nofollow">HITB</a>&nbsp;– Deep-knowledge security conference held in Malaysia and The Netherlands.</li>
<li><a href="https://www.troopers.de/" rel="nofollow">Troopers</a>&nbsp;– Annual international IT Security event with workshops held in Heidelberg, Germany.</li>
<li><a href="http://hack3rcon.org/" rel="nofollow">Hack3rCon</a>&nbsp;– Annual US hacker conference.</li>
<li><a href="http://thotcon.org/" rel="nofollow">ThotCon</a>&nbsp;– Annual US hacker conference held in Chicago.</li>
<li><a href="http://www.layerone.org/" rel="nofollow">LayerOne</a>&nbsp;– Annual US security conference held every spring in Los Angeles.</li>
<li><a href="https://deepsec.net/" rel="nofollow">DeepSec</a>&nbsp;– Security Conference in Vienna, Austria.</li>
<li><a href="http://www.skydogcon.com/" rel="nofollow">SkyDogCon</a>&nbsp;– Technology conference in Nashville.</li>
<li><a href="http://secuinside.com/" rel="nofollow">SECUINSIDE</a>&nbsp;– Security Conference in&nbsp;<a href="https://en.wikipedia.org/wiki/Seoul" rel="nofollow">Seoul</a>.</li>
<li><a href="http://def.camp/" rel="nofollow">DefCamp</a>&nbsp;– Largest Security Conference in Eastern Europe, held annually in Bucharest, Romania.</li>
<li><a href="https://2016.appsecusa.org/" rel="nofollow">AppSecUSA</a>&nbsp;– Annual conference organized by OWASP.</li>
<li><a href="http://brucon.org/" rel="nofollow">BruCON</a>&nbsp;– Annual security conference in Belgium.</li>
<li><a href="http://www.infosecurityeurope.com/" rel="nofollow">Infosecurity Europe</a>&nbsp;– Europe’s number one information security event, held in London, UK.</li>
<li><a href="http://nullcon.net/website/" rel="nofollow">Nullcon</a>&nbsp;– Annual conference in Delhi and Goa, India.</li>
<li><a href="https://www.rsaconference.com/" rel="nofollow">RSA Conference USA</a>&nbsp;– Annual security conference in San Francisco, California, USA.</li>
<li><a href="https://www.swisscyberstorm.com/" rel="nofollow">Swiss Cyber Storm</a>&nbsp;– Annual security conference in Lucerne, Switzerland.</li>
<li><a href="https://www.virusbulletin.com/conference/index" rel="nofollow">Virus Bulletin Conference</a>&nbsp;– Annual conference going to be held in Denver, USA for 2016.</li>
<li><a href="http://www.ekoparty.org/" rel="nofollow">Ekoparty</a>&nbsp;– Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.</li>
<li><a href="https://44con.com/" rel="nofollow">44Con</a>&nbsp;– Annual Security Conference held in London.</li>
<li><a href="https://www.balccon.org/" rel="nofollow">BalCCon</a>&nbsp;– Balkan Computer Congress, annually held in Novi Sad, Serbia.</li>
<li><a href="http://fsec.foi.hr/" rel="nofollow">FSec</a>&nbsp;– FSec – Croatian Information Security Gathering in Varaždin, Croatia.</li>
</ul>
<h2><a id="user-content-information-security-magazines" class="anchor" href="https://github.com/enaqx/awesome-pentest#information-security-magazines" aria-hidden="true"></a><strong>Information Security Magazines –&nbsp;Hacking Tools</strong></h2>
<ul>
<li><a href="https://www.2600.com/Magazine/DigitalEditions" rel="nofollow">2600: The Hacker Quarterly</a>&nbsp;– American publication about technology and computer “underground.”</li>
<li><a href="http://www.phrack.org/" rel="nofollow">Phrack Magazine</a>&nbsp;– By far the longest running hacker zine.</li>
</ul>
<h2><a id="user-content-awesome-lists" class="anchor" href="https://github.com/enaqx/awesome-pentest#awesome-lists" aria-hidden="true"></a><strong>Awesome Lists – Hacking Tools –</strong></h2>
<ul>
<li><a href="https://gbhackers.com/kalitutorials/">Kali Linux Tools</a> – List of Hacking tools present in Kali Linux.</li>
<li><a href="http://sectools.org/" rel="nofollow">SecTools</a> – Top 125 Network Security Hacking Tools.</li>
<li><a href="https://github.com/coreb1t/awesome-pentest-cheat-sheets">Pentest Cheat Sheets</a>&nbsp;– Awesome Pentest Cheat Sheets.</li>
<li><a href="https://github.com/fffaraz/awesome-cpp">C/C++ Programming</a>&nbsp;– One of the main language for open source security tools.</li>
<li><a href="https://github.com/quozd/awesome-dotnet">.NET Programming</a>&nbsp;– Software framework for Microsoft Windows platform development.</li>
<li><a href="https://github.com/alebcay/awesome-shell">Shell Scripting</a>&nbsp;– Command line frameworks, toolkits, guides and gizmos.</li>
<li><a href="https://github.com/dreikanter/ruby-bookmarks">Ruby Programming by @dreikanter</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/markets/awesome-ruby">Ruby Programming by @markets</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/Sdogruyol/awesome-ruby">Ruby Programming by @Sdogruyol</a>&nbsp;– The de-facto language for writing exploits.</li>
<li><a href="https://github.com/sorrycc/awesome-javascript">JavaScript Programming</a>&nbsp;– In-browser development and scripting.</li>
<li><a href="https://github.com/sindresorhus/awesome-nodejs">Node.js Programming by @sindresorhus</a>&nbsp;– Curated list of delightful Node.js packages and resources.</li>
<li><a href="https://github.com/dloss/python-pentest-tools">Python tools for penetration testers</a>&nbsp;– Lots of pentesting tools are written in Python.</li>
<li><a href="https://github.com/svaksha/pythonidae">Python Programming by @svaksha</a>&nbsp;– General Python programming.</li>
<li><a href="https://github.com/vinta/awesome-python">Python Programming by @vinta</a>&nbsp;– General Python programming.</li>
<li><a href="https://github.com/ashishb/android-security-awesome">Android Security</a>&nbsp;– Collection of Android security-related resources.</li>
<li><a href="https://github.com/bayandin/awesome-awesomeness">Awesome Awesomness</a>&nbsp;– The List of the Lists.</li>
<li><a href="https://github.com/paragonie/awesome-appsec">AppSec</a>&nbsp;– Resources for learning about application security.</li>
<li><a href="https://github.com/apsdehal/awesome-ctf">CTFs</a>&nbsp;– Capture The Flag frameworks, libraries, etc.</li>
<li><a href="https://github.com/AnarchoTechNYC/meta/wiki/InfoSec#hacking-challenges">InfoSec § Hacking challenges</a>&nbsp;– Comprehensive directory of CTFs, wargames, hacking challenge websites,Penetration testing tools list practice lab exercises, and more.</li>
<li><a href="https://github.com/carpedm20/awesome-hacking">Hacking</a>&nbsp;– Tutorials, tools, and resources.</li>
<li><a href="https://github.com/paralax/awesome-honeypots">Honeypots</a>&nbsp;– Honeypots, tools, components, and more.</li>
<li><a href="https://github.com/onlurking/awesome-infosec">Infosec</a>&nbsp;– Information security resources for pentesting, forensics, and more.</li>
<li><a href="https://github.com/Cugu/awesome-forensics">Forensics</a>&nbsp;– Free (mostly open source) forensic analysis tools and resources.</li>
<li><a href="https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/" target="_blank" rel="noopener noreferrer">Malware Analysis</a>&nbsp;– Tools and resources for analysts.</li>
<li><a href="https://github.com/caesar0301/awesome-pcaptools">PCAP Tools</a>&nbsp;– Tools for processing network traffic.</li>
<li><a href="https://github.com/sbilly/awesome-security">Security</a>&nbsp;– Software, libraries, documents, and other resources.</li>
<li><a href="https://github.com/meitar/awesome-lockpicking">Awesome Lockpicking</a>&nbsp;– Awesome guides, tools, and other resources about the security and compromise of locks, safes, and keys.</li>
<li><a href="https://github.com/danielmiessler/SecLists">SecLists</a>&nbsp;– Collection of multiple types of lists used during security assessments.</li>
<li><a href="https://github.com/PaulSec/awesome-sec-talks">Security Talks</a>&nbsp;– Curated list of security conferences.</li>
<li><a href="https://github.com/jivoi/awesome-osint">OSINT</a>&nbsp;– Awesome OSINT list containing great resources.</li>
<li><a href="https://github.com/InQuest/awesome-yara">YARA</a>&nbsp;– YARA rules, tools, and people.</li>
</ul>
<p>The post <a href="http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/">A Complete Penetration Testing &#038; Hacking Tools List for Hackers &#038; Security Professionals</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/a-complete-penetration-testing-hacking-tools-list-for-hackers-security-professionals/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Gitjacker tool lets you find .git folders exposed online</title>
		<link>http://kostacipo.stream/new-gitjacker-tool-lets-you-find-git-folders-exposed-online/</link>
					<comments>http://kostacipo.stream/new-gitjacker-tool-lets-you-find-git-folders-exposed-online/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 27 Oct 2020 19:42:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1829</guid>

					<description><![CDATA[<p>The Tool can also download your Git repositories, allowing attackers to retrieve sensitive configuration files and source code. A new tool called Gitjacker can help developers discover when they’ve accidentally uploaded /.git folders online and have left sensitive information exposed to attackers. Gitjacker was created by British software engineer&#160;Liam Galvin, is written in Go, and [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/new-gitjacker-tool-lets-you-find-git-folders-exposed-online/">New Gitjacker tool lets you find .git folders exposed online</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>The Tool can also download your Git repositories, allowing attackers to retrieve sensitive configuration files and source code.</strong></p>
<div class="row">
<div class="col-12">
<p>A new tool called Gitjacker can help developers discover when they’ve accidentally uploaded /.git folders online and have left sensitive information exposed to attackers.</p>
<div class="relatedContent alignRight">
<p>Gitjacker was created by British software engineer&nbsp;<a href="https://twitter.com/liam_galvin" target="_blank" rel="noopener noreferrer" data-component="externalLink">Liam Galvin</a>, is written in Go, and was released as a free download last month&nbsp;<a href="https://github.com/liamg/gitjacker" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">on GitHub</a>.</p>
<p>In its simplest form, the tool lets users scan a domain and identify the location of a /.git folder on their production systems.</p>
<p>/.git folders should never be uploaded online.</p>
<p>“A .git directory stores all of your [Git] repository data, such as configuration, commit history, and actual content of each file in the repository,” Galvin said in a&nbsp;<a href="https://www.liam-galvin.co.uk/security/2020/09/26/leaking-git-repos-from-misconfigured-sites.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">blog post</a>&nbsp;last month when he launched Gitjacker.</p>
<p>“If you can retrieve the full contents of a .git directory for a given website, you will be able to access raw source code for that site, and often juicy configuration data like database passwords, password salts, and more,” he added.</p>
<p>All developers know this; however, accidents happen.</p>
<p>For example, developers working on a website or a web app can accidentally copy their entire Git repository online, including the /.git folder, and forget to remove it. Furthermore, /.git folders can also be included in automated build chains and added to Docker containers that are later installed as web servers.</p>
<p><strong>GITJACKER NOT ONLY FINDS /.GIT FOLDERS BUT IT CAN ALSO FETCH THEIR CONTENT</strong></p>
<p>Attackers can scan the internet for these types of folders, identify accidentally exposed systems, download their content, and gain access to sensitive configuration data or even to an app’s source code.</p>
<p>“Webservers with directory listings enabled make this kind of attack especially easy, as it’s simply a matter of recursively downloading every file in the .git directory and running the following to pull files from the stored object files: <strong><em>git checkout — .</em></strong>“, Galvin said.</p>
<p>“The attack is still possible when directory listings are disabled, but it’s often difficult to retrieve a complete repository in such cases,” Galvin added.</p>
<p>However, this is where Gitjacker comes in. Galvin said he developed Gitjacker to handle the download and extraction of a git repository for users, even in cases where web directory listings are disabled.</p>
<p>Galvin said he developed the tool to be used in penetration tests, but due to its capabilities, Gitjacker will most likely be abused by threat actors as well (<em>as threat actors have a long history of&nbsp;</em><a href="https://www.zdnet.com/article/malware-gangs-love-open-source-offensive-hacking-tools/" target="_blank" rel="noopener noreferrer"><em>abusing open source tools for their operations</em></a>).</p>
<p>And why not? Gitjacker’s capabilities allow attackers to retrieve sensitive configuration files with a few keyboard strokes.</p>
<p>In addition, there’s an incentive for attackers to look for /.git folders. Even after years of warnings [<a href="https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">1</a>,&nbsp;<a href="https://dev.to/seds/finding-exposed-git-repositories-49bj" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">2</a>,&nbsp;<a href="https://medium.com/dev-genius/source-code-disclosure-via-exposed-git-folder-24993c7561f1" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">3</a>,&nbsp;<a href="https://medium.com/swlh/hacking-git-directories-e0e60fa79a36" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">4</a>], /.git exposure is still in high numbers, meaning attackers will have an easy time finding domains with /.git folders left exposed online.</p>
<p>For example, in 2018, a Czech developer scanned more than 230 million sites and found that <a href="https://smitka.me/open-git/" target="_blank" rel="noopener noreferrer nofollow" data-component="externalLink">390,000 were exposing /.git folders</a>, but <span style="color: #ff0000;"><strong>only 150,000 of these were fixed</strong></span>.</p>
</div>
</div>
</div>
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div>
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="second-place clear">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="post__block post__block_lead-text" data-v-a249f5ee="">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">
<header class="storyHeader article">
<div class="topContent container">
<div class="row">
<div class="row">
<div class="col-12">&nbsp;</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
</div>
</header>
</div>
</div>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/new-gitjacker-tool-lets-you-find-git-folders-exposed-online/">New Gitjacker tool lets you find .git folders exposed online</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/new-gitjacker-tool-lets-you-find-git-folders-exposed-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Getting started with awk, a powerful text-parsing tool</title>
		<link>http://kostacipo.stream/getting-started-with-awk-a-powerful-text-parsing-tool/</link>
					<comments>http://kostacipo.stream/getting-started-with-awk-a-powerful-text-parsing-tool/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 09 Dec 2019 11:02:13 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[awk]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1436</guid>

					<description><![CDATA[<p>&#160; Awk is a powerful text-parsing tool for Unix and Unix-like systems, but because it has programmed functions that you can use to perform common parsing tasks, it&#8217;s also considered a programming language. You probably won&#8217;t be developing your next GUI application with awk, and it likely won&#8217;t take the place of your default scripting [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/getting-started-with-awk-a-powerful-text-parsing-tool/">Getting started with awk, a powerful text-parsing tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p id="introduction-to-awk">Awk is a powerful text-parsing tool for Unix and Unix-like systems, but because it has programmed functions that you can use to perform common parsing tasks, it&#8217;s also considered a programming language. You probably won&#8217;t be developing your next GUI application with awk, and it likely won&#8217;t take the place of your default scripting language, but it&#8217;s a powerful utility for specific tasks.</p>
<p>What those tasks may be is surprisingly diverse. The best way to discover which of your problems might be best solved by awk is to learn awk; you&#8217;ll be surprised at how awk can help you get more done but with a lot less effort.</p>
<p>Awk&#8217;s basic syntax is:</p>
<pre><span class="geshifilter"><code class="bash geshifilter-bash"><span class="kw2">awk</span> <span class="br0">[</span>options<span class="br0">]</span> <span class="st_h">'pattern {action}'</span> <span class="kw2">file</span></code></span></pre>
<p>To get started, create this sample file and save it as <strong>colours.txt</strong></p>
<div class="geshifilter">
<div class="text geshifilter-text">name &nbsp; &nbsp; &nbsp; color &nbsp;amount<br />apple &nbsp; &nbsp; &nbsp;red &nbsp; &nbsp;4<br />banana &nbsp; &nbsp; yellow 6<br />strawberry red &nbsp; &nbsp;3<br />grape &nbsp; &nbsp; &nbsp;purple 10<br />apple &nbsp; &nbsp; &nbsp;green &nbsp;8<br />plum &nbsp; &nbsp; &nbsp; purple 2<br />kiwi &nbsp; &nbsp; &nbsp; brown &nbsp;4<br />potato &nbsp; &nbsp; brown &nbsp;9<br />pineapple &nbsp;yellow 5</p>
</div>
</div>
<p>This data is separated into columns by one or&nbsp;more spaces. It&#8217;s common for data that you are analyzing to be organized in some way. It may not always be columns separated by whitespace, or even a comma or semicolon, but especially in log files or data dumps, there&#8217;s generally a predictable pattern.&nbsp;You can use patterns of data to help awk extract and process the data that you want to focus on.</p>
<h2 id="printing-a-column">Printing a column</h2>
<p>In awk, the <strong>print</strong> function displays whatever you specify. There are many predefined variables you can use, but some of the most common are integers designating columns in a text file. Try it out:</p>
<div class="geshifilter">
<div class="bash geshifilter-bash">$ <span class="kw2">awk</span> <span class="st_h">&#8216;{print $2;}&#8217;</span> colours.txt<br />color<br /><span class="kw2">red</span><br />yellow<br /><span class="kw2">red</span><br />purple<br />green<br />purple<br />brown<br />brown<br />yellow</div>
</div>
<p>&nbsp;</p>
<p>In this case, awk displays the second column, denoted by <strong>$2</strong>. This is relatively intuitive, so you can probably guess that <strong>print $1</strong> displays the first column, and <strong>print $3</strong> displays the third, and so on.</p>
<p>To display <em>all</em> columns, use <strong>$0</strong>.</p>
<p>The number after the dollar sign (<strong>$</strong>) is an <em>expression</em>, so <strong>$2</strong> and <strong>$(1+1)</strong> mean the same thing.</p>
<h2 id="conditionally-selecting-columns">Conditionally selecting columns</h2>
<p>The example file you&#8217;re using is very structured. It has a row that serves as a header, and the columns relate directly to one another. By defining <em>conditional</em> requirements, you can qualify what you want awk to return when looking at this data. For instance, to view items in column 2 that match &#8220;yellow&#8221; and print the contents of column 1:</p>
<div class="geshifilter">
<div class="bash geshifilter-bash"><span class="kw2">awk</span> <span class="st_h">&#8216;$2==&#8221;yellow&#8221;{print $1}&#8217;</span> colours.txt<br />banana<br />pineapple</div>
</div>
<p>&nbsp;</p>
<p>Regular expressions work as well. This conditional looks at <strong>$2</strong> for approximate matches to the letter <strong>p</strong> followed by any number of (one or more) characters, which are in turn followed by the letter <strong>p</strong>:</p>
<div class="geshifilter">
<div class="bash geshifilter-bash">$ <span class="kw2">awk</span> <span class="st_h">&#8216;$2 ~ /p.+p/ {print $0}&#8217;</span> colours.txt<br />grape &nbsp; purple &nbsp;<span class="nu0">10</span><br />plum &nbsp; &nbsp;purple &nbsp;<span class="nu0">2</span></div>
</div>
<p>&nbsp;</p>
<p>Numbers are interpreted naturally by awk. For instance, to print any row with a third column containing an integer greater than 5:</p>
<div class="geshifilter">
<div class="bash geshifilter-bash"><span class="kw2">awk</span> <span class="st_h">&#8216;$3&gt;5 {print $1, $2}&#8217;</span> colours.txt<br />name &nbsp; &nbsp;color<br />banana &nbsp;yellow<br />grape &nbsp; purple<br />apple &nbsp; green<br />potato &nbsp;brown</div>
</div>
<h2 id="field-separator">Field separator</h2>
<p>By default, awk uses whitespace as the field separator. Not all text files use whitespace to define fields, though. For example, create a file called <strong>colours.csv</strong> with this content:</p>
<div class="geshifilter">
<div class="text geshifilter-text">name,color,amount<br />apple,red,4<br />banana,yellow,6<br />strawberry,red,3<br />grape,purple,10<br />apple,green,8<br />plum,purple,2<br />kiwi,brown,4<br />potato,brown,9<br />pineapple,yellow,5</div>
</div>
<p>&nbsp;</p>
<p>Awk can treat the data in exactly the same way, as long as you specify which character it should use as the field separator in your command. Use the <strong>&#8211;field-separator</strong> (or just <strong>-F</strong> for short) option to define the delimiter:</p>
<div class="geshifilter">
<div class="bash geshifilter-bash">$ <span class="kw2">awk</span> <span class="re5">-F</span><span class="st0">&#8220;,&#8221;</span> <span class="st_h">&#8216;$2==&#8221;yellow&#8221; {print $1}&#8217;</span> file1.csv<br />banana<br />pineapple</div>
</div>
<h2 id="saving-output">Saving output</h2>
<p>Using output redirection, you can write your results to a file. For example:</p>
<pre><span class="geshifilter"><code class="bash geshifilter-bash"><span class="co4">$ </span><span class="kw2">awk</span> -F, <span class="st_h">'$3&gt;5 {print $1, $2} colours.csv &gt; output.txt</span></code></span></pre>
<p>This creates a file with the contents of your awk query.</p>
<p>You can also split a file into multiple files&nbsp;grouped by column data. For example, if you want to split colours.txt into multiple files according to what color appears in each row, you can cause awk to redirect <em>per query</em> by including the redirection in your awk statement:</p>
<pre><span class="geshifilter"><code class="bash geshifilter-bash"><span class="co4">$ </span><span class="kw2">awk</span> <span class="st_h">'{print &gt; $2".txt"}'</span> colours.txt</code></span></pre>
<p>This produces files named <strong>yellow.txt</strong>, <strong>red.txt</strong>, and so on.</p>
<p>The post <a href="http://kostacipo.stream/getting-started-with-awk-a-powerful-text-parsing-tool/">Getting started with awk, a powerful text-parsing tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/getting-started-with-awk-a-powerful-text-parsing-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A quick introduction to tmux</title>
		<link>http://kostacipo.stream/a-quick-introduction-to-tmux/</link>
					<comments>http://kostacipo.stream/a-quick-introduction-to-tmux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 09 Dec 2019 10:54:49 +0000</pubDate>
				<category><![CDATA[Linux]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[linux]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1432</guid>

					<description><![CDATA[<p>&#160; For many people, the Linux terminal represents a substantial portion of where their most important work happens. Whether a system administrator managing multiple remote machines, a programmer trying to run a new snippet of code as they walk through the source, or simply an ordinary user who is trying to read a man page [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/a-quick-introduction-to-tmux/">A quick introduction to tmux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>For many people, the Linux terminal represents a substantial portion of where their most important work happens. Whether a system administrator managing multiple remote machines, a programmer trying to run a new snippet of code as they walk through the source, or simply an ordinary user who is trying to read a man page for documentation as they step through pecking out a lengthy command, it&#8217;s not uncommon to need to run and see the output of multiple terminal applications at a time.</p>
<p>Why should keeping track of multiple applications be a difficult proposition that requires a fancy modern GUI? Sure, you can launch multiple terminal instances, or use a <a href="https://opensource.com/life/15/11/top-open-source-terminal-emulators" target="_blank" rel="noopener noreferrer">terminal emulator</a> that tiles terminals for you. But there&#8217;s an easier, and arguably better way, by using a native terminal application to manage your multiple applications just like you would in a traditional windowed environment. Enter <a href="https://tmux.github.io/" target="_blank" rel="noopener noreferrer">tmux</a>, the terminal multiplexer.</p>
<p>Before we get to tmux and why it will change the way you interact with the&nbsp;command line, let&#8217;s talk a bit about processes. When you launch a program from the terminal, it may seem like your terminal is now entirely consumed by that process. But that&#8217;s not actually the case. In a Bash shell (and many others) you can send your application to the background either at launch (by placing a <strong>&amp;</strong>&nbsp;at the end of the command) or by pressing ctrl+z to suspend the job and then sending your command to the background with <strong>bg</strong>, and returning it with <strong>fg</strong>, or view a list of jobs with the <strong>jobs</strong> command.</p>
<p>Process control is itself an important concept in the Linux world, one that any Linux user would benefit from taking a little time to understand, but it&#8217;s a big enough area to be beyond the scope of this article. I mention it here because it&#8217;s a common misconception of newcomers that launching a command at the command line always “ties up” the terminal that launched it until the process is terminated, which isn&#8217;t the case.</p>
<p>There are many problems that tmux can help solve, but the primary purpose is to allow you to run several applications within the same terminal window, either side-by-side or allowing you to easily switch between applications, or groups of applications together in the same window, with a simple keystroke. It also allows you “attach” or “detach” from a tmux instance, in effect, keeping your applications running just like you left them if you close your terminal, allowing you to come back later.</p>
<p>Installing tmux is easy. If it&#8217;s not already on your machine, it&#8217;s also certainly in your Linux distribution&#8217;s default repositories, so installation with your package manager of choice will be simple. On Fedora, that means a simple <strong>$ </strong><strong>sudo</strong> <strong>dnf</strong><strong> install tmux -y </strong>will install it for you and you&#8217;ll be ready to get up and running in seconds.</p>
<p>Once you&#8217;ve installed and launched tmux for the first time, you&#8217;ll see a green bar at the bottom of your terminal. By default, the bar will give you a list of your open windows, your hostname, and the time, but you can configure it to show much more.</p>
<p>Commands in tmux are issued by first issuing a command prefix. By default, this is <strong>ctrl+b</strong>, but you can change this as well. After pressing <strong>ctrl+b</strong>, you can then create a new window by pressing the <strong>c</strong> key. You can then issue commands in this new window, and switch back to your original window by pressing <strong>p</strong> for the&nbsp;previous window, or <strong>w</strong> to list all of the windows you have created, from which you can jump between them.</p>
<p>You can also split a window into multiple panes by pressing <strong>ctrl+b</strong> or whatever you have assigned your command prefix to be, and then either <strong>%</strong> to split the screen vertically or <strong>&#8220;</strong> to split it horizontally. You can then jump between panes with your prefix and the arrow keys.</p>
<p>Those are the basics. When you&#8217;re done using a pane or window, you can remove it with your command prefix and <strong>x</strong> for a pane or <strong>&amp;</strong> for a window. Want to learn more? The prefix followed by <strong>?</strong> will tell you quite a bit more; it&#8217;s the built-in command list.</p>
<p class="rtecenter"><img loading="lazy" decoding="async" src="https://opensource.com/sites/default/files/resize/images/business-uploads/tmux-overview-650x467.png" alt="tmux-overview.png" width="650" height="467"></p>
<p>Once you&#8217;ve started using tmux, explored these basic commands, and begun to set up a terminal environment customized to your needs, you&#8217;ll want to move beyond the basic instructions I&#8217;ve included here. And well you should—there&#8217;s a lot of great information out there! Here are a few other resources I&#8217;ve found helpful:</p>
<ul>
<li>Go read the <a href="http://man7.org/linux/man-pages/man1/tmux.1.html" target="_blank" rel="noopener noreferrer">man page</a>. Seriously, there&#8217;s a reason that man pages exist, even in the modern world of search-enabled everything. The man page will always be there at your fingertips, Internet access or not. It will tell you all of the basics that you need to know.</li>
<li>Take a look at another guide that details how other people are using and configuring tmux to meet their needs. Here are <a href="https://mutelight.org/practical-tmux" target="_blank" rel="noopener noreferrer">a</a> <a href="https://coderwall.com/p/_g2vpq/workflow-in-tmux" target="_blank" rel="noopener noreferrer">few</a> <a href="https://www.unwiredcouch.com/2013/11/15/my-tmux-setup.html" target="_blank" rel="noopener noreferrer">good</a> <a href="http://perltricks.com/article/an-introduction-to-tmux/" target="_blank" rel="noopener noreferrer">ones</a>. Then, go take a look at your .tmux.conf file your home directory, where you can customize tmux in great detail. Here&#8217;s a <a href="http://www.hamvocke.com/blog/a-guide-to-customizing-your-tmux-conf/" target="_blank" rel="noopener noreferrer">good guide</a> for that.</li>
<li>Read a book. Two of better I&#8217;ve found include <a href="https://pragprog.com/book/bhtmux2/tmux-2" target="_blank" rel="noopener noreferrer">tmux 2: Productive Mouse-Free Development</a>, available in paper or as an ebook from Pragmatic Press, and <a href="https://leanpub.com/the-tao-of-tmux" target="_blank" rel="noopener noreferrer">The Tao of tmux</a>, which in addition to the paper or ebook versions is also available to <a href="https://leanpub.com/the-tao-of-tmux/read" target="_blank" rel="noopener noreferrer">read online</a> for free under a <a href="https://github.com/git-pull/tao-of-tmux" target="_blank" rel="noopener noreferrer">CC BY-NC-SA 3.0</a> license.</li>
<li>Print out or study a cheat sheet. There are <a href="https://gist.github.com/MohamedAlaa/2961058" target="_blank" rel="noopener noreferrer">plenty</a> <a href="https://tmuxcheatsheet.com/" target="_blank" rel="noopener noreferrer">of</a> <a href="http://alvinalexander.com/linux-unix/tmux-cheat-sheet-commands-pdf" target="_blank" rel="noopener noreferrer">options</a>.</li>
<li>Join a community. Reddit has a <a href="https://www.reddit.com/r/tmux/" target="_blank" rel="noopener noreferrer">r/tmux</a> group, most Linux user groups will have at least one other tmux user who&#8217;s willing to help you, and the #tmux channel on Freenode IRC is usually full of hundreds of helpful people.</li>
</ul>
<p>Is tmux the only tool out there which provides this functionality? As is often the case in the open source world, the answer is no! <a href="https://www.gnu.org/software/screen/" target="_blank" rel="noopener noreferrer">GNU Screen</a> is another popular tool providing similar functionality. While there are some subtle difference between GNU Screen and tmux, which one you choose to use is really a matter of individual preference. GNU Screen is decades old and very stable; the flip side of its age is that it hasn&#8217;t seen nearly as much active development.</p>
<p>And while greybeards and other old-timers might be perfectly happy GNU Screen, tmux seems to have wider interest among the broader Linux community these days. That doesn&#8217;t make it better or worse, but it does mean that I&#8217;ve found it&#8217;s often easier to find someone who has already solved my exact problem or configuration challenge when looking around support communities and the Internet. Its unique name also makes tmux a lot easier to find plugins for when looking around GitHub and other software repositories, too.</p>
<p>The post <a href="http://kostacipo.stream/a-quick-introduction-to-tmux/">A quick introduction to tmux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/a-quick-introduction-to-tmux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>4 Fundamental Open Source Security Tools</title>
		<link>http://kostacipo.stream/4-fundamental-open-source-security-tools/</link>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 12:15:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1378</guid>

					<description><![CDATA[<p>&#160; In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>In the world of cyber security, there are thousands of open source security tools with both defensive and offensive security capabilities that many professionals prefer to assess systems. The following are 4 essential security tools that will help you to secure your systems and networks. These open source security tools have been given the essential rating due to the fact that they are effective, well supported and easy to start getting value from.</p>
<p><b>Nmap:</b></p>
<p>Nmap (&#8220;Network Mapper&#8221;) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. It uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s1600/nmap.png"><img loading="lazy" decoding="async" src="https://4.bp.blogspot.com/-_c7y4ztidt4/WDQ6bhcDU_I/AAAAAAAAAhA/vWYl9-yaZ8Y3GUL0TFiD2uA5CxMdeFUmQCLcB/s320/nmap.png" width="320" height="248" border="0"></a></div>
<p><b><br />
Metasploit Framework:</b></p>
<p>Metasploit framework is an advanced open-source platform for developing, testing, and using exploit code. The extensible model through which payloads, encoders, no-op generators, and exploits can be integrated has made it possible to use the Metasploit Framework as an outlet for cutting-edge exploitation research. Metasploit was completely free, but the project was acquired by Rapid7 in 2009 and it soon sprouted commercial variants.</p>
<div class="separator"><a href="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s1600/metasploit_ie_xp_pfv_metafile.png"><img loading="lazy" decoding="async" src="https://1.bp.blogspot.com/-8C7MZlXz-oo/WDQ6hi7gu2I/AAAAAAAAAhE/JOAwLJtQQXINn2OQoLlQb46EunKwVtroACLcB/s400/metasploit_ie_xp_pfv_metafile.png" width="400" height="308" border="0"></a></div>
<p><b><br />
Wireshark:</b></p>
<p>Wireshark is a fantastic open source, multi-platform network protocol analyzer that allows examining the data from a live network or from a capture file on disk. It enables us to capture data and take a deep look into packet details. It also supports hundreds of protocols and media types. Wireshark has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.</p>
<div class="separator"><a href="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s1600/wireshark.png"><img loading="lazy" decoding="async" src="https://2.bp.blogspot.com/-bJ_o0lGNUhU/WDQ6mRilEWI/AAAAAAAAAhI/oXAIbAF8kDcZbtPhzhRt-h2M9Sg--nMZgCLcB/s400/wireshark.png" width="400" height="107" border="0"></a></div>
<p><b><br />
Nikto:</b></p>
<p>Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6400 potentially dangerous files/CGIs, checks for outdated versions of over 1200 servers, and version specific problems on over 270 servers. Nikto is great for firing at a web server to find known vulnerable scripts, configuration mistakes and related security problems.</p>
<div class="separator"><a href="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s1600/9657814_orig.png"><img loading="lazy" decoding="async" src="https://4.bp.blogspot.com/-3k45N4lHPL4/WDQ6u2epvEI/AAAAAAAAAhM/k2Yj3AJ80WIGq20JHTLfWSvD2sgMxsabwCLcB/s400/9657814_orig.png" width="400" height="225" border="0"></a></div>
<p>These security tools are well known and are updated by the providers to allow effective use. However, there are many other security tools as well which are being used by many professional as per their requirements.</p>
<p>The post <a href="http://kostacipo.stream/4-fundamental-open-source-security-tools/">4 Fundamental Open Source Security Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
