docker pull owasp/zap2docker-stable – official OWASP ZAP.
docker pull kalilinux/kali-linux-docker official Kali Linux.
AttifyOS – GNU/Linux distribution focused on tools useful during Internet of Things (IoT) security assessments.
The Pentesters Framework – Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.
Fedora Security Lab – Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.
Buscador – GNU/Linux virtual machine that is pre-configured for online investigators.
Parrot – Distribution similar to Kali, with multiple architectures with 100 of Hacking Tools.
BackBox – Ubuntu-based distribution for penetration tests and security assessments.
Pentoo – Security-focused live CD based on Gentoo.
Network Security Toolkit (NST) – Fedora-based bootable live operating system designed to provide easy access to best-of-breed open source network security applications.
BlackArch – Arch GNU/Linux-based distribution with best Hacking Tools for penetration testers and security researchers.
ArchStrike – Arch GNU/Linux repository for security professionals and enthusiasts.
Kali – GNU/Linux distribution designed for digital forensics and penetration testing Hacking Tools.
Hacking Tools Penetration Testing Distributions
Tails – Live OS aimed at preserving privacy and anonymity.
Digital Evidence & Forensics Toolkit (DEFT) – Live CD for forensic analysis runnable without tampering or corrupting connected devices where the boot process takes place.
Computer Aided Investigative Environment (CAINE) – Italian GNU/Linux live distribution created as a digital forensics project.
cuckoo – Open source automated malware analysis system.
Security Distrowatch – Website dedicated to talking about, reviewing, and keeping up to date with open source operating systems.
Best Linux Penetration Testing Distributions CyberPunk – Description of main penetration testing distributions.
Security related Operating Systems Rawsec – Penetration testing tools & Hacking Tools list Related Complete list of security operating systems.
/r/lockpicking – Resources for learning lockpicking, equipment recommendations.
Schuyler Towne channel – Lockpicking videos and security talks.
Social Engineering Framework – Information resource for social engineers.
– Information about wireless networks world-wide, with user-friendly desktop and web applications.
NetBootcamp OSINT Tools – Collection of OSINT links and custom Web interfaces to other services such as Facebook Graph Search and various paste sites.
Menu on the left can be used to navigate through the categories.
Intel Techniques – Collection of OSINT tools.
OSINT Framework – Collection of various OSINT Hacking Tools broken out by category.
#Tools hack pulsa all operator how to
Exploit Writing Tutorials – Tutorials on how to develop exploits.
Shellcode Examples – Shellcodes database.
Shellcode Tutorial – Tutorial on how to write shellcode.
MITRE’s Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) – Curated knowledge base and model for cyber adversary behavior.
#Tools hack pulsa all operator manual
Open Source Security Testing Methodology Manual (OSSTMM) – Framework for providing test cases that result in verified facts on which to base decisions that impact an organization’s security.
XSS-Payloads – Ultimate resource for all things cross-site including payloads, tools, games and documentation.
Penetration Testing Framework (PTF) – Outline for performing penetration tests compiled as a general framework usable by vulnerability analysts and penetration testers alike.
#Tools hack pulsa all operator free
PENTEST-WIKI – Free online security knowledge library for pentesters and researchers.
Open Web Application Security Project (OWASP) – Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software.
Penetration Testing Execution Standard (PTES) – Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test.