The arsenal, armory & library by Maderas (@hackermaderas, #CyberpunkisNow) 6/8/2019

Original / 1st version here: https://pastebin.com/rMw4WbhX
___________________________________________________________________________________

# Basic knowledge requirements for Red Teaming, PenTesting, Hacking & Cybersecurity

# These are the basic competencies expected (and tested for during the in-person technical interview) by one of the largest, most visible InfoSec companies # on Earth.


> Networking: Good understanding of OSI layer model / Communication flow through each layer / Functions of each layer / Major protocols in each layer / In-depth understanding Layer 3 & Layer 4 protocols / IP, ICMP Protocols (layer 3) / TCP, UDP Protocols (layer 4)

> Overview of TCP/IP Layer model: ARP / Client & Server communication model / Ports common services run on / Ephemeral port vs Well known ports

> Understanding of major (everyday Layer 7) services/protocols: DNS DHCP HTTP HTTP Header Fields HTTP Status Codes - How HTTP maintains state - HTTPS vs HTTP / FTP

> Active vs Passive data transfer / SSH / SSH handshake / Telnet /Telnet Handshake / SMTP / SMTP handshake (Mail from/ RCPT ) / How attachments are handled Network

> Troubleshooting Methodology: Understanding of Network Address Translation (NAT) / Port Address Translation (PAT) / Understanding of Proxies / Overview of Virtual Private Networks (VPNs)

> How to read packet headers - Know common packet header information for IP, TCP, UDP 

> Understand which device operates at which OSI layer: Hub  Switch / Managed vs Unmanaged - Firewall - IDS/IPS

> Ability to read device logs: IDS/IPS Firewall Windows

> Advanced Concepts: Content Delivery Networks (CDNs) / HTTP Pipelining / IPv4 vs IPv6 addressing scheme / IPv4 & IPv6 differences / Security Security Device Operations : Understanding of IDS/IPS technologies / Signature vs Anomaly based / HIDS vs NIDS / How Snort works / How IPS systems prevent attacks / Drop packets / TCP reset

> Security Attacks: Detailed understanding of common web attacks:  SQL Injection / Blind SQL Injection / Cross Site Scripting: Stored Reflected  DOM / Cross Site Request Forgery / Local File Inclusion / Remote File Inclusion / Basic understanding of buffer overflow / Denial of Service / Remote Code Execution / PHP attacks / Heartbleed / Shellshock / Brute Force attacks

> Understanding of the Malware Kill Chain: Worm vs Trojan / Phishing email / Landing redirect page / Exploit Kit / Malware Download / Malware Install / Phone Home / Data Exfiltration / Command and Control

> Linux: Knowledge of filesystems used / NTFS, FAT vs ext2 3 4 / Overview of a journaling filesystem / Executing commands and command options / Interactive features: job control, history / File Utilities cp mv rm ls (etc.) / Editors: vi vim vimtutor nano / Process Utilities ps kill wait sleep / Filters: cat head tail sort uniq / How to read man pages: man vs info /apropos + man -k <keyword> / Detailed knowledge of tcpdump / Detailed knowledge of grep / Overview of: sed  awk  cut  screen nohup / How to background a process: At start of process Mid-way through the process / How to bring process to foreground
______________________________________________________________________________________________________________________________

# Knowledge sources:


# The Mind Maps 

# The Mind Maps listed below were made by amanhardikar; they are gigantic, well designed, extremely detailed graphics breaking down subjects/knowledge  
# pertinent to Hacking, OffSec, Cybersecurity & General Computer Science (which makes them pertinent to InfoSec/OffSec in general). 

# Even better, amanhardikar has directions on how to create such graphics listed at the site below as well.

All Mind Maps below found at https://www.amanhardikar.com/mindmaps.html

All/Most Mind Maps below are listed in HTML (Full Size) & PNG (Image Only)form.


https://www.amanhardikar.com/mindmaps.html#
https://www.amanhardikar.com/mindmaps/AWSCompute.html
https://www.amanhardikar.com/mindmaps/AWSCompute.png
https://www.amanhardikar.com/mindmaps/AWSDatabase.html
https://www.amanhardikar.com/mindmaps/AWSDatabase.png
https://www.amanhardikar.com/mindmaps/AWSNetworking.html
https://www.amanhardikar.com/mindmaps/AWSNetworking.png
https://www.amanhardikar.com/mindmaps/AWSStorage.html
https://www.amanhardikar.com/mindmaps/AWSStorage.png
https://www.amanhardikar.com/mindmaps/BPMN2.0.html
https://www.amanhardikar.com/mindmaps/BPMN2.0.png
https://www.amanhardikar.com/mindmaps/BigDataSecurity.html
https://www.amanhardikar.com/mindmaps/BigDataSecurity.png
https://www.amanhardikar.com/mindmaps/BrowserPlugins.html
https://www.amanhardikar.com/mindmaps/BrowserPlugins.png
https://www.amanhardikar.com/mindmaps/CodeReview.html
https://www.amanhardikar.com/mindmaps/CodeReview.png
https://www.amanhardikar.com/mindmaps/Cryptography.html
https://www.amanhardikar.com/mindmaps/Cryptography.png
https://www.amanhardikar.com/mindmaps/ForensicChallenges.html
https://www.amanhardikar.com/mindmaps/ForensicChallenges.png
https://www.amanhardikar.com/mindmaps/Forensics.html
https://www.amanhardikar.com/mindmaps/ISO27001.html
https://www.amanhardikar.com/mindmaps/ISO27001.png
https://www.amanhardikar.com/mindmaps/Infrastructure.html
https://www.amanhardikar.com/mindmaps/Infrastructure.png
https://www.amanhardikar.com/mindmaps/PCIDSS.html
https://www.amanhardikar.com/mindmaps/PCIDSS.png
https://www.amanhardikar.com/mindmaps/PKI.html
https://www.amanhardikar.com/mindmaps/PKI.png
https://www.amanhardikar.com/mindmaps/Practice.html
https://www.amanhardikar.com/mindmaps/Practice.png
https://www.amanhardikar.com/mindmaps/PracticeUrls.html
https://www.amanhardikar.com/mindmaps/SABSAConcepts.html
https://www.amanhardikar.com/mindmaps/SABSAConcepts.png
https://www.amanhardikar.com/mindmaps/SABSADesign.html
https://www.amanhardikar.com/mindmaps/SABSADesign.png
https://www.amanhardikar.com/mindmaps/SABSAOperations.html
https://www.amanhardikar.com/mindmaps/SABSAOperations.png
https://www.amanhardikar.com/mindmaps/SHC.html
https://www.amanhardikar.com/mindmaps/SHC.png
https://www.amanhardikar.com/mindmaps/SecurityTests.html
https://www.amanhardikar.com/mindmaps/SecurityTests.png
https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.html
https://www.amanhardikar.com/mindmaps/VMsandLiveCDs.png
https://www.amanhardikar.com/mindmaps/VPN.html
https://www.amanhardikar.com/mindmaps/VPN.png
https://www.amanhardikar.com/mindmaps/VoIP.html
https://www.amanhardikar.com/mindmaps/VoIP.png
https://www.amanhardikar.com/mindmaps/Wireless.html
https://www.amanhardikar.com/mindmaps/Wireless.png
https://www.amanhardikar.com/mindmaps/virus-classification.html
https://www.amanhardikar.com/mindmaps/webapptest.html
https://www.amanhardikar.com/mindmaps/webapptest.png
https://www.amanhardikar.com/mindmaps/worm-classification.html



+++++++ Basic Training ++++++

#General/Basic Exploitation
############################
http://www.pentest-standard.org/index.php/Main_Page
https://www.offensive-security.com/metasploit-unleashed/
http://null-byte.wonderhowto.com/how-to/metasploit-basics/
https://www.owasp.org/index.php/Main_Page
https://github.com/nixawk/pentest-wiki
https://github.com/beefproject/beef
https://portswigger.net/burp/
https://www.metasploit.com/
http://exploitpack.com/
https://github.com/commixproject/commix
https://github.com/reverse-shell/routersploit
 
#OffSec Distros
############################
https://www.kali.org/
https://www.blackarch.org/
https://www.parrotsec.org/
https://www.backbox.org/
https://www.pentoo.ch/
https://s-t-d.org/

#Vulnscanner/Sniffer/Tools/Web Exploitation
############################################
http://www.askapache.com/security/computer-security-toolbox-2/#common_security_programs
https://pastebin.com/kP04r4PM
http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/netdiscover
http://www.tenable.com/products/nessus-vulnerability-scanner
https://www.rapid7.com/products/nexpose/
https://cirt.net/nikto2
https://nmap.org/
https://github.com/netsniff-ng/netsniff-ng
https://www.wireshark.org/
https://github.com/fwaeytens/dnsenum/
https://github.com/makefu/dnsmap/
http://www.tcpdump.org/
http://sqlmap.org/
https://www.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
https://wpscan.org/
http://networksecuritytoolkit.org/nst/index.html
https://github.com/droope/droopescan
https://github.com/andresriancho/w3af
https://www.netsparker.com/
 
#Password Cracker
############################
http://www.openwall.com/john/
http://hashcat.net/hashcat/
 
#Online Tools
############################
http://crackstation.net
http://www.tcpiputils.com/
https://shodan.io
https://urlscan.io/
https://dnsdumpster.com/
https://censys.io/
https://www.zoomeye.org/
http://crimeflare.org:82/

 
#Exploits (Exploit/Vulnerability Databases)
############################
https://exploit-db.com/
http://kernel-exploits.com
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://nvd.nist.gov/
https://www.us-cert.gov/
https://blog.osvdb.org/
http://www.securityfocus.com/
http://seclists.org/fulldisclosure/
https://technet.microsoft.com/en-us/security/bulletins
https://technet.microsoft.com/en-us/security/advisories
https://packetstormsecurity.com/
http://www.securiteam.com/
http://cxsecurity.com/
https://www.vulnerability-lab.com/
 
#Payloads/Reverse Shells
############################
https://www.veil-framework.com/framework/veil-evasion/
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://highon.coffee/blog/reverse-shell-cheat-sheet/
 

#CTFs/Practice Boxes(VMs)/War Games, etc.
##########################################
# NeverendingSecurity has a year long training plan for working through a massive list of practice boxes/wargames/CTFs at his site (link below); though it # is from 2015 & a few of the CTF/Practice Boxes/War Games listed there are gone, his post/plan is rock solid & includes a Mind Map PNG as a visual guide    # (that mind map was attached to my first Twitter post of this updated archive on 6/9/2019.

# PLEASE NOTE: The resources from the NeverendingSecurity's post (linked directly below) have already been added to this section's list ("CTFs/Practice     # Boxes (VMs)/War Games, etc.") with as many defunct entries removed as possible.

NeverendingSecurity's Penetration Testing Practice Lab - Vulnerable Apps / Systems https://neverendingsecurity.wordpress.com/category/mobile-phones-tabs/
NeverendingSecurity's Mind Map PNG for the material linked above - https://www.amanhardikar.com/mindmaps/Practice.png

# Vulnerable Web Applications:
https://www.vulnhub.com/
Vulnerable Web Applications:
OWASP BWA: http://code.google.com/p/owaspbwa
OWASP Hackademic: http://hackademic1.teilar.gr
OWASP SiteGenerator: https://www.owasp.org/index.php/Owasp_SiteGenerator
OWASP Bricks: http://sourceforge.net/projects/owaspbricks & http://sechow.com/bricks
OWASP Security Shepherd: https://www.owasp.org/index.php/OWASP_Security_Shepherd
Damn Vulnerable Web App (DVWA): http://www.dvwa.co.uk
Damn Vulnerable Web Services (DVWS): http://dvws.professionallyevil.com
WebGoat.NET: https://github.com/jerryhoff/WebGoat.NET
PentesterLab: https://pentesterlab.com
Butterfly Security Project: http://thebutterflytmp.sourceforge.net
LAMPSecurity: http://sourceforge.net/projects/lampsecurity
Moth: http://www.bonsai-sec.com/en/research/moth.php
WackoPicko: https://github.com/adamdoupe/WackoPicko & http://cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf
BadStore: http://www.badstore.net
WebSecurity Dojo: http://www.mavensecurity.com/web_security_dojo
BodgeIt Store: http://code.google.com/p/bodgeit
hackxor: http://hackxor.sourceforge.net/cgi-bin/index.pl
SecuriBench: http://suif.stanford.edu/~livshits/securibench
SQLol: https://github.com/SpiderLabs/SQLol
CryptOMG: https://github.com/SpiderLabs/CryptOMG
XMLmao: https://github.com/SpiderLabs/XMLmao
Exploit KB Vulnerable Web App: http://exploit.co.il/projects/vuln-web-app & http://sourceforge.net/projects/exploitcoilvuln
PHDays iBank CTF: http://blog.phdays.com/2012/05/once-again-about-remote-banking.html
GameOver: http://sourceforge.net/projects/null-gameover
Zap WAVE: http://code.google.com/p/zaproxy/downloads/detail?name=zap-wave-0.1.zip
PuzzleMall: http://code.google.com/p/puzzlemall
VulnApp: http://www.nth-dimension.org.uk/blog.php?id=88
sqli-labs: https://github.com/Audi-1/sqli-labs
bWAPP: http://www.mmeit.be/bwapp & http://sourceforge.net/projects/bwapp/files/bee-box & http://www.itsecgames.com
NOWASP / Mutillidae 2: http://sourceforge.net/projects/mutillidae
SocketToMe: http://digi.ninja/projects/sockettome.php
Project GameOver: http://null.co.in/2012/06/14/gameover-web-pentest-learning-platform
OWASP Vicnum Project: https://sourceforge.net/projects/vicnum & http://vicnum.ciphertechs.com
Hackademic Challenges: http://www.hackademic.eu


# Vulnerable Operating System Installations:
Damn Vulnerable Linux: http://sourceforge.net/projects/virtualhacking/files/os/dvl & http://www.damnvulnerablelinux.org
Metasploitable: http://sourceforge.net/projects/virtualhacking/files/os/metasploitable & https://sourceforge.net/projects/metasploitable
LAMPSecurity: http://sourceforge.net/projects/lampsecurity
UltimateLAMP: http://www.amanhardikar.com/mindmaps/practice-links.html & http://ronaldbradford.com/tmp/UltimateLAMP-0.2.zip
heorot: DE-ICE, hackerdemia http://hackingdojo.com/downloads/iso/De-ICE_S1.100.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.110.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.120.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S2.100.iso
DE-ICE, hackerdemia: http://hackingdojo.com/downloads/iso/De-ICE_S1.123.iso
De-ICE HackerPedia PenTest LiveCDs http://de-ice.net/hackerpedia/index.php/De-ICE.net_PenTest_Disks
pWnOS: http://www.pwnos.com & http://www.krash.in/bond00/pWnOS%20v1.0.zip & http://www.backtrack-linux.org/forums/backtrack-videos/2748-%5Bvideo%5D-attacking-pwnos.html
Holynix: http://sourceforge.net/projects/holynix/files & http://pynstrom.net/index.php?page=holynix.php
Kioptrix: http://www.kioptrix.com/blog/?page_id=135
exploit-exercises  nebula, protostar, fusion: http://exploit-exercises.com/download
PenTest Laboratory: http://pentestlab.org/lab-in-a-box
RebootUser Vulnix: http://www.rebootuser.com/?page_id=1041
neutronstar: http://neutronstar.org/goatselinux.html
scriptjunkie.us: http://www.scriptjunkie.us/2012/04/the-hacker-games
21LTR: http://21ltr.com/scenes
SecGame # 1 Sauron: http://sg6-labs.blogspot.co.uk/2007/12/secgame-1-sauron.html
Pentester Lab: https://www.pentesterlab.com/exercises
Vulnserver: http://www.thegreycorner.com/2010/12/introducing-vulnserver.html
TurnKey Linux: http://www.turnkeylinux.org
Bitnami: https://bitnami.com/stacks
Elastic Server: http://elasticserver.com
CentOS: http://www.centos.org
Katana: http://www.hackfromacave.com/katana.html
Virtual Hacking Lab: http://sourceforge.net/projects/virtualhacking/files
Hacking-Lab: http://www.hacking-lab.com/hl_livecd


# Vendor demo Sites to run security testing software against:
Acunetix acuforum: http://testasp.vulnweb.com
Acunetix acublog: http://testaspnet.vulnweb.com
Acunetix acuart: http://testphp.vulnweb.com
Cenzic crackmebank: http://crackme.cenzic.com
HP freebank: http://zero.webappsecurity.com
IBM altoromutual: http://demo.testfire.net
Mavituna testsparker: http://aspnet.testsparker.com
Mavituna testsparker: http://php.testsparker.com
NTOSpider Test Site: http://www.webscantest.com



# Sites for Downloading Older Versions of Various Software to Practice Exploiting:
Old Version: http://www.oldversion.com
Old Apps: http://www.oldapps.com
VirtualHacking Repo: http://sourceforge.net/projects/virtualhacking/files/apps%40realworld
Huge collection of old/obscure web browsers https://browsers.evolt.org/
The X2 MS-DOS Programming Archive http://ftp.lanet.lv/ftp/mirror/x2ftp/msdos/programming/00index.html
bbLean old Blackbox Windows 7 
 
#Info/Blogs/Techniques/Forums, etc.
####################################
http://wiki.bash-hackers.org/scripting/style
https://www.corelan.be/index.php/articles/
https://www.veracode.com/security/xss
http://www.thegeekstuff.com/2012/02/xss-attack-examples/
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://thehackernews.com/
http://securityidiots.com/Web-Pentest/SQL-Injection/Basic-Union-Based-SQL-Injection.html
https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/
https://hakin9.org/voip-hacking-techniques/
https://greysec.net/
https://themanyhats.club/
https://kapeli.com/cheat_sheets/Chromium_Command_Line_Switches.docset/Contents/Resources/Documents/index
https://www.andreafortuna.org/2018/07/18/tcpdump-a-simple-cheatsheet/
https://www.andreafortuna.org/2018/07/16/finding-malware-on-memory-dumps-using-volatility-and-yara-rules/
http://hacker-club-cvd.tripod.com/id20.html
Sites for Improving Your Hacking Skills:
EnigmaGroup: http://www.enigmagroup.org
Exploit Exercises: http://exploit-exercises.com
Google Gruyere: http://google-gruyere.appspot.com
Gh0st Lab: http://www.gh0st.net
Hack This Site: http://www.hackthissite.org
HackThis: http://www.hackthis.co.uk
HackQuest: http://www.hackquest.com
Hack.me: https://hack.me
Hacking-Lab: https://www.hacking-lab.com
Hacker Challenge: http://www.dareyourmind.net
Hacker Test: http://www.hackertest.net
hACME Game: http://www.hacmegame.org
Hax.Tor: http://hax.tor.hu
OverTheWire: http://www.overthewire.org/wargames
PentestIT: http://www.pentestit.ru/en
pwn0: https://pwn0.com/home.php
RootContest: http://rootcontest.com
Root Me: http://www.root-me.org/?lang=en
Security Treasure Hunt: http://www.securitytreasurehunt.com
Smash The Stack: http://www.smashthestack.org
TheBlackSheep and Erik: http://www.bright-shadows.net
ThisIsLegal: http://thisislegal.com
Try2Hack: http://www.try2hack.nl
WabLab: http://www.wablab.com/hackme
XSS  Can You XSS This?: http://canyouxssthis.com/HTMLSanitizer
XSS  ProgPHP: http://xss.progphp.com
CTFtime (Details of CTF Challenges): http://ctftime.org/ctfs
shell-storm Repo: http://shell-storm.org/repo/CTF
CAPTF Repo: http://captf.com

# Mobile Apps:
ExploitMe Mobile Android Labs: http://securitycompass.github.io/AndroidLabs
ExploitMe Mobile iPhone Labs: http://securitycompass.github.io/iPhoneLabs
OWASP iGoat: http://code.google.com/p/owasp-igoat
OWASP Goatdroid: https://github.com/jackMannino/OWASP-GoatDroid-Project
Damn Vulnerable iOS App (DVIA): http://damnvulnerableiosapp.com
Damn Vulnerable Android App (DVAA): https://code.google.com/p/dvaa
Damn Vulnerable FirefoxOS Application (DVFA): https://github.com/pwnetrationguru/dvfa
NcN Wargame: http://noconname.org/evento/wargame
Hacme Bank Android: http://www.mcafee.com/us/downloads/free-tools/hacme-bank-android.aspx
InsecureBank: http://www.paladion.net/downloadapp.html

#Miscellaneous:
VulnVPN: http://ww
VulnVoIP: http://www.rebootuser.com/?page_id=1041
NETinVM: http://informatica.uv.es/~carlos/docencia/netinvm
GNS3: http://sourceforge.net/projects/gns-3
XAMPP: https://www.apachefriends.org/index.html
 
#Lists
############################
https://code.google.com/archive/p/hacktooldepot/downloads
http://tools.kali.org/tools-listing
http://sectools.org/
https://github.com/fffaraz/awesome-cpp
https://github.com/fffaraz/awesome-cpp
https://github.com/alebcay/awesome-shell
https://github.com/dreikanter/ruby-bookmarks
https://github.com/sorrycc/awesome-javascript
https://github.com/sindresorhus/awesome-nodejs
https://github.com/dloss/python-pentest-tools
https://github.com/ashishb/android-security-awesome
https://github.com/bayandin/awesome-awesomeness
https://github.com/paragonie/awesome-appsec
https://github.com/apsdehal/awesome-ctf
https://github.com/carpedm20/awesome-hacking
https://github.com/paralax/awesome-honeypots
https://github.com/clowwindy/Awesome-Networking
https://github.com/onlurking/awesome-infosec
https://github.com/rshipp/awesome-malware-analysis
https://github.com/caesar0301/awesome-pcaptools
https://github.com/sbilly/awesome-security
https://github.com/sindresorhus/awesome
https://github.com/danielmiessler/SecLists
https://github.com/PaulSec/awesome-sec-talks


# Site with content for attacking VAX: rare, tough machines
Vax/Ultrix-32M http://ftpmirror.your.org/pub/misc/unixarchive/



#General OSINT Resources

#Domains/Sources from Awesome-OSINT  https://github.com/jivoi/awesome-osint

http://7photos.net/
http://92fiveapp.com/
http://a.nnotate.com/
http://academia.edu/
http://academic.research.microsoft.com/
http://advangle.com/
http://adwords.google.com/
http://agoa.info/
http://aiddata.org/
http://all-io.net/
http://allthefreestock.com/
http://alltop.com/
http://andrewmohawk.com/
http://annotatorjs.org/
http://answers.yahoo.com/
http://anydesk.com/
http://app.graphystories.com/
http://app.teachingprivacy.com/
http://arborjs.org/
http://archive.is/
http://archive.org/
http://archive.recapthelaw.org/
http://ascelibrary.org/
http://atlas.cid.harvard.edu/
http://auralink.com/
http://aws.amazon.com/
http://backtweets.com/
http://barometer.agorapulse.com/
http://batchgeo.com/
http://beakernotebook.com/
http://bitreading.com/
http://biznar.com/
http://blog.booksontheknob.org/
http://blog.inside.com/
http://bluenod.com/
http://boardreader.com/
http://bombbomb.com/
http://bonzobox.com/
http://booklikes.com/
http://bookseer.com/
http://booky.io/
http://bottlenose.com/
http://breachorclear.jesterscourt.cc/
http://brianfolts.com/
http://builtwith.com/
http://bunchapp.io/
http://buzzsumo.com/
http://cachedview.com/
http://campayn.com/
http://cardsmith.co/
http://ccsubs.com/
http://centralops.net/
http://channelkit.com/
http://chartico.com/
http://charts.hohli.com/
http://circos.ca/
http://citeseer.ist.psu.edu/
http://clarify.io/
http://classeur.io/
http://code-search.uni.lu/
http://collabtive.o-dyn.de/
http://colorbrewer2.org/
http://com.lullar.com/
http://commun.it/
http://competeshark.com/
http://comtrade.un.org/
http://coowon.com/
http://cosketch.com/
http://create.visual.ly/
http://creately.com/
http://creativecommons.org/
http://croppola.com/
http://crowdbase.com/
http://crowdriff.com/
http://csulb.libguides.com/
http://ctrlq.org/
http://dailyearth.com/
http://data.mashedworld.com/
http://data.un.org/
http://data.worldbank.org/
http://datatopics.worldbank.org/
http://datavizcatalogue.com/
http://dcpu.ru/
http://deathtothestockphoto.com/
http://dedicatedornot.com/
http://deturl.com/
http://dict.cn/
http://digg.com/
http://diytoolkit.org/
http://dmitrybaranovskiy.github.io/
http://dnshistory.org/
http://dnssec-debugger.verisignlabs.com/
http://dnsviz.net/
http://domainbigdata.com/
http://donottrack.us/
http://doodle.com/
http://dothop.com/
http://draw.to/
http://dropcanvas.com/
http://dygraphs.com/
http://e-mailvalidator.com/
http://ec.europa.eu/
http://edition.cnn.com/
http://education.iseek.com/
http://ekiga.org/
http://email-format.com/
http://emm.newsexplorer.eu/
http://en.arguman.org/
http://encfsmp.sourceforge.net/
http://endnote.com/
http://energyatlas.iea.org/
http://eraser.heidi.ie/
http://eu.wiley.com/
http://evernote.com/
http://exif.regex.info/
http://expertpages.com/
http://f1000.com/
http://facenama.com/
http://facesaerch.com/
http://faostat3.fao.org/
http://favobooks.com/
http://feed.exileed.com/
http://feed.janicek.co/
http://feed43.com/
http://fetchrss.com/
http://findface.ru/
http://flask.io/
http://flipboard.com/
http://flockdraw.com/
http://flumes.com/
http://foller.me/
http://follow.net/
http://followcheck.com/
http://followerwonk.com/
http://forebears.io/
http://forums.peerblock.com/
http://foswiki.org/
http://fotoflexer.com/
http://free-website-translation.com/
http://freekindlebooks.org/
http://freemind.sourceforge.net/
http://freeplane.sourceforge.net/
http://freestocks.org/
http://frengly.com/
http://freshmail.com/
http://gbimg.org/
http://ge.tt/
http://generator.acmi.net.au/
http://gengo.com/
http://geogig.org/
http://geosocialfootprint.com/
http://get-nod.com/
http://getpocket.com/
http://getstache.com/
http://gettwitterid.com/
http://gigablast.com/
http://gigatweeter.com/
http://globaledge.msu.edu/
http://googleplussearch.chromefans.org/
http://grass.osgeo.org/
http://greyguide.isti.cnr.it/
http://greylitstrategies.info/
http://groundera.com/
http://groupzap.com/
http://hashtagify.me/
http://hdlab.stanford.edu/
http://hdr.undp.org/
http://helpmeviz.com/
http://here.com/
http://highwire.stanford.edu/
http://hiverhq.com/
http://hlwiki.slais.ubc.ca/
http://home.rootsweb.ancestry.com/
http://hootsuite.com/
http://hosted.ap.org/
http://hubii.com/
http://hugin.sourceforge.net/
http://iab.worldbank.org/
http://iconosquare.com/
http://iloggo.com/
http://image.baidu.com/
http://imgur.com/
http://imindmap.com/
http://imtranslator.net/
http://indiatyping.com/
http://infinitekind.com/
http://infospace.com/
http://ink361.com/
http://inspire-geoportal.ec.europa.eu/
http://instantlogosearch.com/
http://intweets.com/
http://ip2geolocation.com/
http://iqalerts.com/
http://isorepublic.com/
http://itools.com/
http://itranslatevoice.com/
http://journals.cambridge.org/
http://journalseek.net/
http://jpgraph.net/
http://junar.com/
http://justdelete.me/
http://kaboompics.com/
http://kanbantool.com/
http://karmadecay.com/
http://kartograph.org/
http://keeeb.com/
http://keendly.com/
http://keepass.info/
http://kerika.com/
http://kerrick.github.io/
http://keywordtool.io/
http://kindlenationdaily.com/
http://kindleworld.blogspot.com/
http://kl1p.com/
http://klear.com/
http://klout.com/
http://kred.com/
http://ksosoft.com/
http://landmatrix.org/
http://le-tools.com/
http://leafletjs.com/
http://lendle.me/
http://lib.stat.cmu.edu/
http://library.columbia.edu/
http://library.morningstar.com/
http://lightzoneproject.org/
http://likealyzer.com/
http://link.springer.com/
http://linkurio.us/
http://linkydink.io/
http://listify.okfnlabs.org/
http://literatureandlatte.com/
http://losangeles.craigslist.org/
http://mag.io/
http://mailchimp.com/
http://mailtester.com/
http://manageflitter.com/
http://manybooks.net/
http://mapalist.com/
http://mapd.csail.mit.edu/
http://maperitive.net/
http://mapjam.com/
http://masterpasswordapp.com/
http://mediabugs.org/
http://mentionmapp.com/
http://metapicz.com/
http://metareddit.com/
http://metricsparrow.com/
http://mind42.com/
http://mobilimeet.com/
http://modestmaps.com/
http://moose-team.github.io/
http://mozy.com/
http://muckrack.com/
http://mustbepresent.com/
http://myfav.es/
http://neatline.org/
http://negativespace.co/
http://netbootcamp.org/
http://network-tools.com/
http://news.google.com/
http://news.yahoo.com/
http://newsblur.com/
http://newsinshorts.com/
http://newsmap.jp/
http://newspapermap.com/
http://nixory.sourceforge.net/
http://nodexl.codeplex.com/
http://nos.twnsnd.co/
http://nuzzel.com/
http://odysseytranslator.com/
http://office.microsoft.com/
http://offliberty.com/
http://oicweave.org/
http://ok.ru/
http://omeka.org/
http://omgili.com/
http://on.aol.com/
http://onemilliontweetmap.com/
http://online-barcode-reader.inliteresearch.com/
http://online.sagepub.com/
http://onwebchange.com/
http://open-data.europa.eu/
http://open.canada.ca/
http://opengovernmentdata.org/
http://openlayers.org/
http://opensyllabusproject.org/
http://orbisdirectory.bvdinfo.com/
http://origin.mxtoolbox.com/
http://osintframework.com/
http://otranscribe.com/
http://pageflow.io/
http://papersapp.com/
http://parrotread.com/
http://pennystocks.la/
http://philogb.github.io/
http://photobucket.com/
http://pingroupie.com/
http://pinstriped.com/
http://pith.li/
http://plusfeed.frosas.net/
http://polymaps.org/
http://pomodorotechnique.com/
http://popplet.com/
http://primarypad.com/
http://privazer.com/
http://qgis.org/
http://qrobe.it/
http://quibb.com/
http://qzone.qq.com/
http://rapportive.com/
http://raw.densitydesign.org/
http://recordspedia.com/
http://recruitin.net/
http://redditmetrics.com/
http://redirectdetective.com/
http://reederapp.com/
http://restya.com/
http://reunion.com/
http://reverbapp.com/
http://ricks-apps.com/
http://sameid.net/
http://scadaplan.com/
http://scribble.wreally.com/
http://scribblemaps.com/
http://scribbleton.com/
http://scylla.sh/
http://sdelements.github.io/
http://search.aol.com/
http://search.carrot2.org/
http://search.fb.com/
http://search.lycos.com/
http://search.twitter.com/
http://searchlr.net/
http://seashore.sourceforge.net/
http://selfoss.aditu.de/
http://seotoolsforexcel.com/
http://sharetronix.com/
http://simplenote.com/
http://sketchboard.io/
http://slangit.com/
http://sleepingtime.org/
http://slidedog.com/
http://slideidea.com/
http://smallpdf.com/
http://smallseotools.com/
http://smashfuse.com/
http://snapbird.org/
http://snoopsnoo.com/
http://snoopstation.com/
http://snradar.azurewebsites.net/
http://social.downornot.com/
http://socialblade.com/
http://socialmention.com/
http://socialrank.com/
http://socialsearching.info/
http://socialstats.ru/
http://softbytelabs.com/
http://somcloud.com/
http://spark.apache.org/
http://spoonbill.io/
http://spotlight.svezet.ru/
http://spydialer.com/
http://square.github.io/
http://squidnotes.com/
http://stackexchange.com/
http://start.io/
http://statpedia.com/
http://storyful.com/
http://storymaps.arcgis.com/
http://subreddits.org/
http://sunlightfoundation.com/
http://sync.in/
http://tabula.technology/
http://targetolog.com/
http://thebooksproject.co/
http://theoldreader.com/
http://thepund.it/
http://thinkery.me/
http://tiddlywiki.com/
http://timeglider.com/
http://timeline.knightlab.com/
http://tinderizer.com/
http://tinyletter.com/
http://toc.im/
http://todotxt.com/
http://toolbar.netcraft.com/
http://tools.seochat.com/
http://translate.reference.com/
http://translation.babylon.com/
http://translation2.paralink.com/
http://transparentbusiness.com/
http://trends24.in/
http://trendsmap.com/
http://trooclick.com/
http://trueconf.com/
http://twbirthday.com/
http://twchat.com/
http://tweepsect.com/
http://tweet4.me/
http://tweeten.xyz/
http://tweetpsych.com/
http://tweetreach.com/
http://tweetreports.com/
http://tweettunnel.com/
http://twicsy.com/
http://twiki.org/
http://twittercounter.com/
http://twitterfall.com/
http://twubs.com/
http://ubersuggest.org/
http://unctad.org/
http://unctadstat.unctad.org/
http://unstats.un.org/
http://updatey.com/
http://urbanlegends.about.com/
http://urlquery.net/
http://vanillaforums.org/
http://verificationhandbook.com/
http://verificationjunkie.com/
http://verify-email.org/
http://versionista.com/
http://video.search.yahoo.com/
http://viewdns.info/
http://visjs.org/
http://visual.ly/
http://visualizefree.com/
http://vizualize.me/
http://vk-to-rss.appspot.com/
http://vk.barkov.net/
http://vk.com/
http://vk5.city4me.com/
http://vkparser.ru/
http://voxalead.labs.exalead.com/
http://w3.unece.org/
http://wappwolf.com/
http://webboar.com.w3snoop.com/
http://webmeup.com/
http://website.informer.com/
http://websta.me/
http://webwhiteboard.com/
http://weibo.com/
http://whatismyipaddress.com/
http://whiteboard.co/
http://whiteboard.drewwilson.com/
http://whois.domaintools.com/
http://whoisrequest.com/
http://wiki.dbpedia.org/
http://wikidpad.sourceforge.net/
http://wikimapia.org/
http://winds.getstream.io/
http://wits.worldbank.org/
http://wn.com/
http://worldaerodata.com/
http://worldc.am/
http://worldmap.harvard.edu/
http://worldwidescience.org/
http://wridea.com/
http://www.timetoast.com/
http://www.todoyu.com/
http://www.tomighty.org/
http://www.topix.com/
http://www.torchbrowser.com/
http://www.trackur.com/
http://www.tradezone.com/
http://www.tradingeconomics.com/
http://www.transparency.org/
http://www.tripline.net/
http://www.trovando.it/
http://www.tumblr.com/
http://www.twazzup.com/
http://www.tweet-tag.com/
http://www.tweetarchivist.com/
http://www.tweetchat.com/
http://www.tweetpaths.com/
http://www.tweetstats.com/
http://www.twellow.com/
http://www.tweriod.com/
http://www.twiangulate.com/
http://www.twiddla.com/
http://www.twilert.com/
http://www.twingly.com/
http://www.twipho.net/
http://www.twitonomy.com/
http://www.twittersentiment.appspot.com/
http://www.ubicolor.com/
http://www.ucweb.com/
http://www.uis.unesco.org/
http://www.ultraedit.com/
http://www.unido.org/
http://www.urlvoid.com/
http://www.usersearch.org/
http://www.ussearch.com/
http://www.ustart.org/
http://www.uvrx.com/
http://www.vault.com/
http://www.vcasmo.com/
http://www.veoh.com/
http://www.verishow.com/
http://www.verticalresponse.com/
http://www.viadesk.com/
http://www.viamichelin.com/
http://www.videoscribe.co/
http://www.viseyes.org/
http://www.vision6.com.au/
http://www.visme.co/
http://www.vivicom.de/
http://www.vmukti.com/
http://www.walla.co.il/
http://www.wayp.com/
http://www.wdl.org/
http://www.webex.com/
http://www.webmii.com/
http://www.wepaste.com/
http://www.wepware.com/
http://www.whatshouldireadnext.com/
http://www.whitepages.com/
http://www.who.int/
http://www.whoishostingthis.com/
http://www.whoismind.com/
http://www.wiinkz.com/
http://www.wikia.com/
http://www.wikidot.com/
http://www.wikispaces.com/
http://www.wisemapping.com/
http://www.wolframalpha.com/
http://www.wonderpage.com/
http://www.wordle.net/
http://www.wordreference.com/
http://www.workboard.com/
http://www.world-newspapers.com/
http://www.worldc.am/
http://www.worldlingo.com/
http://www.xing.com/
http://www.xmarks.com/
http://www.xmind.net/
http://www.xrayz.co.uk/
http://www.yahoo.com/
http://www.yamli.com/
http://www.yandex.com/
http://www.yasni.com/
http://www.yougetsignal.com/
http://www.yournextread.com/
http://www.yourport.com/
http://www.yworks.com/
http://www.zabasearch.com/
http://www.zapmeta.com/
http://www.zaption.com/
http://www.zeadoo.com/
http://www.zeetings.com/
http://www.zenstart.com/
http://www.zingchart.com/
http://www.zoominfo.com/
http://www.zotero.org/
http://www.zyncro.com/
http://www124.lunapic.com/
http://xodo.com/
http://yippy.com/
http://yudu.com/
http://zanran.com/
http://zesty.ca/
http://zetoc.jisc.ac.uk/
http://zim-wiki.org/
http://zmail.sourceforge.net/
http://zooburst.com/


# OSINT Resources by name from Awesome-OSINT  https://github.com/jivoi/awesome-osint


General Search

The main search engines used by users.

    Advangle
    Aol
    Ask
    Bing
    Better Search
    Dothop
    DuckDuckGo - an Internet search engine that emphasizes protecting searchers' privacy.
    Factbites
    Gigablast
    Goodsearch
    Google Search - Most popular search engine.
    Instya
    Impersonal.me
    iSEEK Education
    ixquick
    Lycos
    Parseek (Iran)
    Peeplo
    Search.com
    SurfCanyon
    Teoma
    Wolfram Alpha
    Yahoo! Search -

? Main National Search Engines

Localized search engines by country.

    Alleba (Philippines) - Philippines search engine
    Baidu (China) - The major search engine used in China
    Daum (South Korea)
    Eniro (Sweden)
    Goo (Japan)
    Najdsi (Slovenia)
    Naver (South Korea)
    Onet.pl (Poland)
    Orange (France)
    Parseek (Iran)
    SAPO (Portugal)
    Search.ch (Switzerland)
    Walla (Israel)
    Yandex (Russia)

? Meta Search

Lesser known and used search engines.

    All-in-One
    AllTheInternet
    Etools
    FaganFinder
    Glearch
    Goofram
    iZito
    Nextaris
    Metabear
    Myallsearch
    Qrobe
    Qwant
    Sputtr
    Trovando
    WebOasis
    WiinkZ
    Zapmeta

? Specialty Search Engines

Search engines for specific information or topics.

    2lingual Search
    Biznar
    CiteSeerX
    FindTheCompany
    Digle
    Google Custom Search
    Harmari (Unified Listings Search)
    Internet Archive
    Million Short
    WorldWideScience.org
    Zanran

? Visual Search and Clustering Search Engines

Search engines that scrape multiple sites (Google, Yahoo, Bing, Goo, etc) at the same time and return results.

    Carrot2 - Organizes your search results into topics.
    Cluuz - Generates easier to understand search results through graphs, images, and tag clouds.
    Yippy - Search using multiple sources at once

? Similar Sites Search

Find websites that are similar. Good for business competition research.

    Google Similar Pages
    SimilarPages - Find pages similar to each other
    SimilarSites - Discover websites that are similar to each other
    SitesLike - Find similar websites by category

? Document and Slides Search

Search for data located on PDFs, Word documents, presentation slides, and more.

    Authorstream
    Find-pdf-doc
    Free Full PDF
    Hashdoc
    Offshore Leak Database
    PasteLert
    PDF Search Engine
    PPTHunter
    RECAP
    Scribd
    SlideShare
    Slideworld
    soPDF.com

? Pastebins

Find information that has been uploaded to Pastebin.

    Custom Pastebin Search - A custom search page that indexes 57 different paste sites.
    PasteLert - PasteLert is a simple system to search pastebin.com and set up alerts (like google alerts) for pastebin.com entries.

? Code Search

Search by website source code

    CoCaBu - Search engine that augments user query into code-friendly for retrieving precise examples.
    FaCoY - Search engine that retrieves code examples that are syntactically and semantically similar.
    NerdyData - Search engine for source code.
    SearchCode - Help find real world examples of functions, API's and libraries across 10+ sources.

? Major Social Networks

    Draugiem (Latvia)
    Facebook
    Facenama (Iran)
    Google+
    Instagram
    Linkedin
    Mixi (Japan)
    Odnoklassniki (Russia)
    Pinterest
    Qzone (China)
    Reddit
    Taringa (Latin America)
    Tinder
    Tumblr
    Twitter
    Weibo (China)
    VKontakte
    Xing

? Real-Time Search, Social Media Search, and General Social Media Tools

    Audiense
    Bottlenose
    Brandwatch
    Buffer
    Buzz sumo
    Flumes
    Gaddr
    Geocreepy
    Geofeedia
    Hootsuite
    HowSociable
    Hashtatit
    Icerocket
    Klear
    Klout
    Kred
    MustBePresent
    Netvibes
    OpinionCrawl
    Rival IQ
    RSS Social Analyzer
    SmashFuse
    SocialBakers
    SociaBlade
    Social DownORNot
    Social Mention
    Social Searcher
    Tagboard
    Trackur
    UVRX

Social Media Tools
? Twitter

    Backtweets
    Blue Nod
    burrrd.
    Crate
    Custom Twitter Tools
    doesfollow
    Fake Follower Check
    FirstTweet
    First Tweet
    Foller.me
    FollowCheck
    Followerwonk
    Geochirp
    GeoSocial Footprint
    GetTwitterID
    Gigatweeter
    Ground Signal
    HappyGrumpy
    Harvard TweetMap
    Hashtagify
    Hashtags.org
    InTweets
    ManageFlitter
    Mentionmapp
    OneMillionTweetMap
    Queryfeed
    Rank Speed
    Riffle
    RiteTag
    Sentiment140
    Silver Bird
    SnapBird
    Sleeping Time
    Social Bearing
    Social Rank First Follower
    Spoonbill
    Tagdef
    TeachingPrivacy
    Tinfoleak
    Trends24
    TrendsMap
    Twazzup
    twbirthday
    TwChat
    tweepsect
    Tweet4me
    TweetArchivist
    Tweet Chat
    TweetDeck
    Tweeten
    TweetMap
    TweetMap
    Tweetpaths
    TweetPsych
    Tweetreach
    TweetStats
    Tweet Tag
    TweetTunnel
    Twellow
    Tweriod
    Twiangulate
    Twicsy
    Twilert
    Twipho
    Twitonomy
    TwitRSS
    Twitter Advanced Search
    Twitter Audit
    Twitter Chat Schedule
    Twitter Counter
    Twitterfall
    Twitter Search
    Twitter Search Tools
    TWUBS Twitter Chat
    Schedule Warble

? Facebook

    Agora Pulse
    Commun.it
    Custom Facebook Tools
    ExtractFace
    Fanpage Karma
    Facebook Search
    Facebook Search Tool
    Facebook Search Tools
    FaceLIVE
    Fb-sleep-stats
    Find my Facebook ID
    LikeAlyzer
    Lookup-ID.com
    SearchIsBack
    Socialsearching
    Wallfux
    Wolfram Alpha Facebook Report
    Zesty Facebook Search

? Google+

    CircleCount
    Google Plus Search
    PlusFeed

? Instagram

    Custom Instagram Search Tools
    Hashtagify
    Iconosquare
    Ink361
    Picodash
    SnapMap
    Social Rank
    Tofo.me
    Websta (Instagram)
    Worldcam

? Pinterest

    Pingroupie
    Pin Search

? Reddit

Tools to help discover more about a reddit user or subreddit.

    Imgur - The most popular image hosting website used by redditors.
    Metareddit - Explore various subreddits.
    Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
    Reddit Archive - Historical archives of reddit posts.
    Reddit Suite - Enhances your reddit experience.
    Reddit Investigator - Investigate a reddit users history.
    Reddit Metrics - Keeps track of the growth of a subreddit.
    Reddit User Analyser - reddit user account analyzer.
    SnoopSnoo - Provides reddit user and subreddits analytics.
    Subreddits - Discover new subreddits.
    Reddit Comment Search - Analyze a reddit users by comment history.

? VKontakte

Perform various OSINT on Russian social media site VKontakte.

    ????????
    Barkov.net
    Find Face - Search for people on VK by photo.
    Report Tree
    Social Stats
    Spotlight
    Snradar - Search pictures by time and location they were taken
    Target Hunter
    Target Log
    VK5
    VK Community Search
    VK Parser - A tool to search for a target audience and potential customers.
    VK People Search
    VK to RSS Appspot

? Tumblr

    Searchlr - Search engine for tumblr posts.
    Tumblr Search

? LinkedIn

    FTL - Browser plugin that finds emails of people's profiles in LinkedIn.

? Blog Search

    BlogSearchEngine
    Icerocket
    NetworkedBlogs
    Notey - Blog post search engine.
    Sphere
    Twingly

? Forums and Discussion Boards Search

    Boardreader
    Facebook Groups
    Google Groups
    Linkedin Groups
    Ning
    Omgili
    Xing Groups
    Yahoo Groups

? Username Check

    Check User Names
    Custom Username Tools
    Gaddr - Scan 50+ different websites for usernames.
    Knowem - Search for a username on over 500 popular social networks.
    Name Chk
    Name Checkr
    User Search

? People Investigations

    411 (US)
    192 (UK)
    Alumni.net
    Ancestry
    Canada411
    Cedar
    Charlie App
    Classmates
    CrunchBase
    Custom Person Search Tools
    CVGadget
    Data 24-7
    Gaddr
    facesearch - Search for images of a person by name.
    Family Search
    Family Tree Now
    Federal Bureau of Prisons - Inmate Locator (US) - Find an inmate that is in the Federal Bureau of Prisons system.
    Fold3 (US Military Records) - Browse records of US Military members.
    Forebears
    Genealogy Bank
    Genealogy Links
    Hey Press (Search for Journalists)
    Homemetry
    Infobel
    Infospace White Pages
    Interment
    International White and Yellow Pages
    Itools
    Kompass
    LookUpUK
    Lullar
    MarketVisual
    MelissaDATA
    My Life People Search
    The National Archives (UK)
    PeekYou
    People Search (Australia)
    PeopleSearch.net
    Pipl
    Rapportive
    RecordsPedia
    Recruitem
    Reunion
    Rootsweb
    SearchBug
    Skip Ease
    snitch.name
    SnoopStation
    Spokeo
    Switchboard
    ThatsThem
    USSearch
    WebMiii
    White Pages (US)
    Wink
    Yasni
    Zabasearch
    Zoominfo

? E-mail Search / E-mail Check

    Breach OR Clear
    Custom Email Search Tools
    BriteVerify Email Verification
    Email Address Validator
    Email Format
    EmailHippo
    Email Hunter
    Email Permutator+
    Emails4corporations
    EmailSearch.net
    Email Validator
    Email Validator Tool
    Have I Been Pwned - Search across multiple data breaches to see if your email address has been compromised.
    MailTester
    Peepmail
    Pipl
    ReverseGenie
    TCIPUTILS.com Email Test
    ThatsThem
    Toofr
    Verify Email
    VoilaNorbert - Find anyone's contact information for lead research or talent acquisition.

? Phone Number Research

    National Cellular Directory - was created to help people research and reconnect with one another by performing cell phone lookups. The lookup products includes have billions of records that can be accessed at any time, as well as free searches one hour a day, every day.
    NumSpy-API - find details of any mobile number in india for free and get a JSON formated output, inspired by NumSpy.
    Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
    Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
    Twilio - Look up a phone numbers carrier type, location, etc.
    Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.

? Expert Search

    Academia
    AllExperts
    CanLaw
    ExpertiseFinder
    ExpertGuide
    ExpertPages
    Experts.com
    HARO
    HerSay
    GlobalExperts
    Idealist
    Innocentive
    Internet Experts
    Library of Congress: Ask a Librarian
    Maven
    MuckRack
    National Speakers Association
    Newswise
    Patent Attorneys/Agent Search
    PRNewswire
    ProfNet
    ReseacherID
    ScholarUniverse
    SheSource
    Speakezee
    Sources
    TRExpertWitness
    Zintro

? Company Research

    AllStocksLinks
    Battle of the Internet Giants
    Better Business Bureau
    Bizeurope
    Biznar
    Bloomberg
    Business Source
    Bureau Van Dijk
    Canadian Business Research
    Canadian Business Resource
    Central and Eastern European Business Directory
    Company Registration Round the World
    Company Research Resources by Country Comparably
    CompeteShark
    Corporate Information
    CrunchBase
    Data.com Connect
    EDGAR Online
    Europages
    European Business Register
    Ezilon
    Factiva
    FindtheCompany
    Glassdoor
    Global Business Register
    globalEdge
    GuideStar
    Hoovers
    Inc. 5000
    InstantLogoSearch
    iSpionage
    Knowledge guide to international company registration
    Linkedin
    National Company Registers
    MarketVisual
    Mergent Intellect
    Mergent Online
    Morningstar Research
    Notablist
    Orbis directory
    opencorporates
    Owler
    Overseas Company Registers
    Plunkett Research
    Scoot
    SEMrush
    Serpstat
    SpyFu
    Forbes Global 2000
    Tradezone Europages
    Vault
    Xing

? Job Search Resources

    Beyond
    CampusCareerCenter
    CareerBuilder
    College Recruiter
    Craiglist
    CVFox
    Dice
    Eluta (Canada)
    Eurojobs
    Fish4Jobs
    Glassdoor
    Headhunter
    Indeed
    Jobs (Poland)
    Jobsite (UK)
    Linkedin
    Monster
    Naukri (India)
    Reed (UK)
    Seek (Australia)
    SimplyHired
    Xing
    ZipRecruiter

? Q&A Sites

    Answers.com
    Ask
    ChaCha
    eHow
    Quora
    StackExchange
    Wiselike
    Yahoo Answers

? Domain and IP Research

    Accuranker
    ahrefs - A tool for backlink research, organic traffic research, keyword research, content marketing & more.
    Alexa
    Bing Webmaster Tools
    BuiltWith
    Central Ops
    Custom Domain Search Tools
    Custom IP Address Search Tools
    Dedicated or Not
    DNSDumpster
    DNS History
    DNSStuff
    DNSViz
    Domain Big Data
    Domain Crawler
    Domain Dossier
    Domain History
    Domain Tools - Whois lookup and domain/ip historical data.
    Easy whois
    Exonera Tor - A database of IP addresses that have been part of the Tor network. It answers the question whether there was a Tor relay running on a given IP address on a given date.
    Follow.net
    GraphyStories
    HypeStat
    Infosniper
    intoDNS
    IP Checking
    IP Location
    IP 2 Geolocation
    IP 2 Location
    IPFingerprints
    IPVoid - IP address toolset.
    IntelliTamper
    Kloth
    NetworkTools
    Majestic
    MaxMind
    MXToolbox - MX record lookup tool.
    Netcraft Site Report
    OpenLinkProfiler
    Open Site Explorer
    PageGlimpse
    Pentest-Tools.com
    PhishStats
    Pulsedive
    Quantcast
    Quick Sprout
    RedirectDetective
    Remote DNS Lookup
    Robtex
    SameID
    SecurityTrails - API to search current and historical DNS records, current and historical WHOIS, technologies used by sites and whois search for phone, email, address, IPs etc.
    SEMrush
    SEO Chat Tools
    SEOTools for Excel
    Similar Web - Compare any website traffic statistics & analytics.
    SmallSEOTools
    StatsCrop
    Squatm3gator - Enumerate available domains generated modifying the original domain name through different cybersquatting techniques
    TCPIPUTILS.com
    urlQuery
    URLVoid - Analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites.
    Wappalyzer
    WebMeUp
    Website Informer
    WhatIsMyIPAddress
    Who.is - Domain whois information.
    Whois Arin Online
    WhoIsHostingThis
    WhoisMind
    Whoisology
    WhoIsRequest
    w3snoop
    Verisign
    ViewDNS.info
    You Get Signal

? Keywords Discovery and Research

    Google Adwords - Get monthly keyword volume data and stats.
    Google Keyword Suggest Tool
    Google Trends - See how many users are searching for specific keywords.
    Keyword Discovery
    Keyword Spy
    KeywordTool
    One Look Reverse Dictionary
    Word Tracker
    Soovle
    Ubersuggest

? Web History and Website Capture

    Archive.is
    BlackWidow
    CashedPages
    CachedView
    Screenshots.com
    Wayback Machine - Explore the history of a website.
    Wayback Machine Archiver

? Language Tools

    2lingual
    Apertium
    Babelfish
    Bablic
    Babylon
    Bing Translator
    Dict.cn
    Dictionary.com: Translation
    FreeTranslation
    Free Translator
    Free Website Translation
    Frengly
    Gengo
    Google Input Tools - Makes it easy to type in the language you choose, anywhere on the web.
    Google Translate
    Google Tranlslate Extension
    IdiomaX Translation
    India Typing
    imTranslator
    iTranslate
    iTranslate Voice
    Lexicool Translation
    Linguee
    LingvoSoftOnline
    Microsoft Translator
    Noslang
    OdysseyTranslator
    Pleco
    PROMT-Online
    Reddit/r/translator
    Reverso
    Slangit
    Systran
    Translate.com
    Unbabel
    WorldLingo
    WorldReference.com
    Yamli (Arabic Search Engine)
    Yandex Translate

? Image Search

    7Photos
    Baidu Images
    Bing Images
    Clarify
    Flickr
    GoodSearch Image Search
    Google Image
    Gramfeed
    Image Identification Project
    Image Raider
    KarmaDecay
    Lycos Image Search
    MyPicsMap
    PhotoBucket
    Picsearch
    PicTriev
    Reverse Image Search
    StolenCameraFinder
    TinEye - Reverse image search engine.
    Websta
    Worldcam
    Yahoo Image Search
    Yandex Images

? Image Analysis

    ExifTool
    Exif Search
    FotoForensics
    Gbimg.org
    Ghiro
    ImpulseAdventure
    Izitru
    Jeffreys Image Metadata Viewer
    JPEGsnoop
    Metapicz

? Stock Images

    AlltheFreeStock
    Death to Stock
    Freeimages
    Freestocks.org
    Gratisography
    IM Free
    ISO Republic
    iStockphoto
    Kaboompics
    LibreStock
    Life of Pix
    NegativeSpace
    New Old Stock
    Pixabay
    Pexels
    Stocksnap
    Shutterstock
    tookapic
    Unsplash - Free high-resolution photos.

? Video Search and Other Video Tools

    Aol Videos
    Bing Videos
    Blinkx
    Clarify
    Clip Blast
    Custom YouTube Search Tools
    DailyMotion
    Deturl
    DownloadHealper
    Earthcam
    Frame by Frame - Browser plugin that allows you to watch YouTube videos frame by frame.
    Geosearch
    Internet Archive: Open Source Videos
    LiveLeak
    Metacafe
    Metatube
    Montage
    Reverse Image Search Tools
    Veoh
    Vimeo
    Voxalead
    Yahoo Video Search
    YouTube
    YouTube Data Viewer
    ccSUBS - Download Closed Captions & Subtitles from YouTube

? Radio and Podcasts Tools

    Clammr
    iTunes Podcasts
    Listelive
    Pocket Casts
    Podcast Chart
    Podcast Directory
    Podkicker

? Academic Resources and Grey Literature

    Academia
    Academic Journals
    African Journal Online
    American Society of Civil Engineers
    Base
    Bibsonomy
    Cambridge Journals
    The Collection of Computer Science Bibliographies - The CCSB is a collection of bibliographies of scientific literature in computer science from various sources, covering most aspects of computer science.
    Core
    Elsevier
    Google Scholar
    Grey Guide
    Grey Literature (HLWIKI International)
    Grey Literature  List of Gateways
    Grey Literature Report
    Grey Literature Strategies
    GreyNet International
    HighWire: Free Online Full-text Articles
    Journal Guide
    Journal Seek
    JSTOR - Search over 10 million academic journal articles, books, and primary sources.
    Lazy Scholar
    Leibniz Information Centre For Science and Technology University Library - indexes all reports of German publicly funded projects and many scientific papers.
    Microsoft Academic
    NRC Research Press
    Open Access Scientific Journals
    Open Grey
    The Open Syllabus Project
    Oxford Journals
    PubMed - Search more than 27 millions citations for biomedical literature from MEDLINE, life science journals, and online books.
    Quetzal Search
    Research Gate
    SAGE Journals
    ScienceDirect
    SCIRP
    Springer
    ScienceDomain
    Science Publications
    Taylor & Francis Online
    Wiley
    World Digital Library
    World Science
    Zetoc

? Books and Reading

    Amazon Cheap Books
    Blinkist
    Bookbub
    Bookish
    Booklikes
    Bookmate
    Bookseer
    Books on the Knob
    Calibre
    Daily Cheap Reads
    ExplainToMe
    Favobooks
    Free Book Search.net
    Free Kindle Books
    Gnooks
    Google Books
    Goodreads
    Groundera
    How Long To Read
    I love my Kindle
    Internet Archive Texts
    Jellybooks
    Just Free Books
    Keendly
    KindleFeeder
    KindleNationDay
    KindleWorld
    Leatherbound
    Lendle
    LibraryThing
    Librivox
    Loyal Books
    Many Books
    MobiPocket
    Narro
    Open Culture: Free Audiobooks
    OpeningtheBook
    Overdrive
    ParrotRead
    Pixel of Ink
    Project Gutenberg
    Read
    Reader IQ
    Readgeek
    Readism
    Riffle
    SendtoKindle
    Shelfie
    TasteKid: Books
    TheBooksProject
    TheFrugaleReader
    Tinderizer
    WhatShouldIReadNext
    YourNextRead

? Geospatial Research and Mapping Tools

    Animaps
    Atlasify
    Batchgeo
    Bing Maps
    CartoDB
    Colorbrewer
    CrowdMap
    CTLRQ Address Lookup
    Custom Satellite View Tools
    Dominoc925
    DualMaps
    GeoGig
    GeoNames
    Esri
    Flash Earth
    Follow Your World
    Google Earth
    Google Maps
    Google Maps Streetview Player
    Google My Maps
    GPSVisualizer
    GrassGIS
    Here
    Hyperlapse
    Inspire Geoportal
    InstantAtlas
    Instant Google Street View
    Kartograph
    Leaflet
    MapAList
    MapBox
    Mapbuildr
    Mapchart.net
    Maperitive
    MapHub
    MapJam
    Mapline
    Mapquest
    Modest Maps
    NGA GEOINT
    OpenLayers
    Polymaps
    Perry Castaneda Library
    Open Street Map
    QGIS
    QuickMaps
    StoryMaps
    Scribble Maps
    Terrapattern
    Tableau
    Timescape
    View in Google Earth
    Wikimapia
    World Aeronautical Database
    WorldMap Harvard
    ViaMichelin
    Yahoo Maps
    Zeemaps

? News

    1st Headlines
    ABYZNewsLinks
    AllYouCanRead
    AP
    Associated France Press (AFP)
    BBC News
    Bing News
    CNN
    Cyber Alert
    DailyEarth
    DPA International
    The Economist Explorer
    Euronews
    Europe Media Monitor (EMM)
    NewsExplorer
    Factiva
    France24
    Google News
    Google News Print Archive
    HeadlineSpot
    Itar-Tass
    List of Newspapers.com
    MagPortal
    News Map
    News Now
    Newseum - Today Front Pages
    Newslink
    NewsLookup
    Newspaper Map
    Newspaperindex
    Newspapers.com
    NewsWhip
    OnlineNewspapers
    Paperboy
    PR Newswire
    Press Reader
    Reuters
    Silobreaker
    Topix
    WorldNews
    World-Newspapers
    Yahoo News

? News Digest and Discovery Tools

    Flipboard
    Hubii
    Inshorts
    Inside
    News360
    NewsBot
    Newsinshorts
    Nod
    Nuzzle
    Quibb
    Reeder
    Spike
    Storyful
    Superdesk
    Trooclick

? Fact Checking

    About Urban Legends
    Captin Fact
    Churnalism
    Check
    Citizen Desk
    Emergent
    Fact Check
    Full Fact
    MediaBugs
    Snopes - The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.
    Verification Handbook
    Verification Junkie
    Verily

? Data and Statistics

    AGOA Data Center
    AidData
    ADB Statistics and Databases
    AWS Public Datasets
    Bank for International Settlements Statistics
    BP Statistical Review of World Energy
    Berkely Library: Data Lab
    CIA World Factbook
    Center for International Earth Science Information Network
    CEPII
    Colombia University Library: General Statistical Sources, International Statistics
    Data.gov.uk
    DBPedia
    European Commission Eurobarometer
    European Union Open Data Portal
    Eurostat
    FAOSTAT
    Freebase
    Gapminder World
    GEOHIVE
    globalEDGE Database of International Business Statistics
    Google Finance
    Google Public Data Explorer
    Government of Canada Open Data
    HIS Piers
    Human Development Reports
    IDEA Databases
    International Labour Comparisons
    International Trade Center
    ILOSTAT
    ILO World Employment and Social Outlook Trends
    IMF World Economic Outlook Database
    Index Mundi
    International Data Base
    International Energy Agency Energy Atlas
    International Energy Agency Statistics
    International Finance Corporation Data and Indicators
    Junar
    Knoema
    LandMatrix
    Latinobarometro
    Library, University of Michigan: Statistics and Datasets
    Nation Master
    OECD Aid Database
    OECD Data
    OECD Factbook
    OECD Statistics Directorate
    OFFSTATS
    Open Data Network
    Open Government Data
    Paul Hensels General Informational Data Page
    Penn World Table
    Pew Research Center
    Population Reference Bureau Data Finder
    PRS Risk Indicators
    Scylla - Various scans and database dumps.
    SESRIC Basic Social and Economic Indicators
    SESRIC Databases
    Statista
    The Atlas of Economic Complexity
    The Data and Story Library
    Trading Economics
    Transparency.org Corruption Perception Index
    UN COMTRADE Database
    UNCTAD Country Fact Sheets
    UNCTAD Investment Country Profiles
    UNCTAD STAT
    UN Data
    UNDPs Human Development Index
    UNECE
    UNESCO Institute for Statistics
    UNIDO Statistical Databases
    UNStats Social Indicators
    Upsala Conflict Data Program
    US Data and Statistics
    WHO Data
    World Bank Data
    World Bank Data
    World Bank Doing Business
    World Bank Enterprise Surveys
    World Bank Investing Across Borders
    World Integrated Trade Solution
    WTO Statistics
    Vizala
    Zanran

? Web Monitoring

    AlertBox
    Alltop
    Awasu
    Bridge.Leslibres
    Bridge.Suumitsu
    ChangeDetect
    ChangeDetection
    CurioStudio
    Deltafeed
    DiggReader
    Feed43
    FeedBooster
    Feederator
    Feed Exileed
    Feed Filter Maker
    Feedly
    FeedReader
    FetchRSS
    Flipboard
    FollowThatPage
    Google Alerts - A content change detection and notification service.
    InfoMinder
    IQAlerts
    Mention
    Netvibes
    Newsblur
    NewsRSSTicker
    OmeaReader
    OnWebChange
    Reeder
    RSS Bridge
    RSS Feed Reader
    RSS Micro
    RSS Search Engine
    RSS Search Hub
    RSSOwl
    RSS Subscription Extension
    Sage
    Selfoss
    Silobreaker
    Talkwalker
    The Old Reader
    versionista
    visualping
    WebReader
    WebSite Watcher
    Winds

? Bookmarking

    Bibsonomy
    BonzoBox
    Booky
    Buttons
    Candybank
    ChannelKit
    Clipix
    Curabase
    Diigo
    Dragdis
    Evernote
    Dropmark
    eLink
    FAVable
    Google Bookmarks
    Instapaper
    Juxtapost
    Keeeb
    Klart
    Linkman Pro
    Linkstash
    LiveBinders
    Memit
    Memonic
    Microsoft OneNote
    mochimarks
    Papaly
    Paperwork
    Pearltrees
    Pocket
    Raindrop
    Refind
    Scoop.it
    Scrapbook
    Scrible
    Sitehoover
    Spaaze
    Stache
    start.me
    Thinkery
    Trackplanet
    Wepware
    Wonderpage
    xmarks
    Zotero

? Startpages

    allmyfaves
    ighome
    iloggo
    Kadaza
    Myfav.es
    My Yahoo
    Protopage
    Start.io
    start.me
    Symbaloo
    uStart.org
    Yourport
    Zeadoo
    Zenstart

? Browsers

    Brave
    CentBrowser
    Chrome
    Comodo Dragon
    Coowon
    Edge
    Firefox
    Maxthon
    Opera
    Safari
    Sleipnir
    Slimjet
    SRWare Iron
    Tor Browser - Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet.
    Torch
    UCBrowser
    Vivaldi
    Yandex Browser

? Offline Browsing

    A1 Website Download - Download entire websites to disk.
    Cyotek WebCopy
    gmapcatcher
    Hooey webprint
    HTTrack - Allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.
    Offliberty
    Resolver
    SiteSucker
    WebAssistant
    Website Ripper Copier

? VPN Services

    TorrentFreak List of VPNs

? Note-taking

    Cherrytree
    Evernote
    Fetchnotes
    Google Keep
    inkdrop
    Kl1p
    Laverna
    Listacular
    Microsoft OneNote
    Notebook
    Scribble
    Simplenote
    somnote
    Squid
    Tomboy
    Workflowy
    wridea
    Calculist

? Annotation Tools

    A.nnotate
    Annotator
    Diigo
    Easy Annotate
    Hypothesis
    Note Anywhere
    Pith.li
    Pund.it
    Skitch

? Writing and Office Tools

    Arguman
    Bibme
    Cite This For Me
    Classeur.io
    FreeOffice
    Grammarly
    GoogleDocs
    KingSoft
    LibreOffice
    MS Office
    Office Online
    OmniOutliner
    OnlyOffice
    oTranscribe
    Scrivener
    TextExpander
    UltraEdit
    WriteApp

? Slide Show and Presentation Tools

    Canva
    Convert Words to Time - Converts the number of words in a presentation or speech to how many minutes it will take to read.
    Deckset
    emaze
    GoogleDocs
    Haiku Deck
    Keyonote
    KingSoft
    KnowledgeVision
    LibreOffice
    Live Slides
    Mighty Meeting
    Movenote
    MS Office
    MySlidePresenter
    Powtoon
    Presentation Next
    presenterswall
    Prezi
    Slidedog
    Slideidea
    SlidePresenter
    SlideRocket
    Slides
    SpeechInMinutes
    Sway
    vcasmo
    Visme
    Zoho Docs

? Digital Publishing

    Canva
    Doclayer
    Issuu
    Lucidpress
    Mag.io
    My eBook
    Omeka
    Scribd
    Yudu

? Newsletter Tools

    AWeber
    BombBomb
    Campayn
    Canva
    ConstantContact
    Freshmail
    GetResponse
    iContact
    MadMimi
    Mailchimp
    Mailjet
    Mailup
    Newsletter Creator for Gmail
    sendinblue
    Sendicate
    Sendloop
    Signupto
    TinyLetter
    VerticalResponse
    Vision6

? Digital Storytelling

    Adobe Voice
    Animatron
    Animoto
    Atavist
    Capzles
    Closr
    eStory
    Exposure
    Interlude
    Klynt
    MakeBeliefsComix
    Metta
    Neatline
    Odyssey
    Pageflow
    Photodex
    Piclits
    Racontr
    RaptMedia
    RawShorts
    Shorthand Social
    Slate
    Steller
    Storify
    Storyboard
    Storyform
    StoryMap
    StoryMaps
    Sway
    Thinglink
    Tripline
    Wevideo
    VideoScribe
    Zaption
    Zooburst

? Infographics and Data Visualization

    Adobe Color CC
    Aeon
    Arbor.js
    Beaker
    Befunky
    Bizint
    Cacoo
    Canva
    chartblocks
    Charted
    Chartico
    Chart.js
    Circos
    creately
    Crossfilter
    csvkit
    Data Visualization Catalogue
    D3js
    Datawrapper
    Dropmark
    dygraphs
    easely
    Exhibit
    Flot
    FusionCharts
    Google Developers: Charts
    GraphX
    Helpmeviz
    Highcharts
    Hohli
    Inkscape
    Infogr.am
    Java Infovis Toolkit
    JpGraph
    jqPlot
    Kartograph
    Knoema
    Leaflet
    Listify
    Linkuroius
    LocalFocus
    Lucidchart
    Mapline
    Nodebox
    OpenLayers
    Palladio
    Piktochart
    Pixcone
    Pixxa
    Plotly
    SpicyNodes
    StoryMap
    QlikView
    Quadrigram
    Raphael
    RAW
    RichChartLive
    Shanti Interactive
    Silk
    Snappa
    Statpedia
    Tableau
    Tableau Public
    Tagul
    Textures.js
    Tiki-toki
    Tik-tok
    Timeflow
    Timeglider
    Timeline
    Timeline
    Timescape
    Timetoast
    Weave
    Wordle
    Venngage
    Visage
    Vis.js
    Visme
    Visualize Free
    Visualize.me
    visually
    Vortex
    ZingChart

? Image and Photo Editing

    Apple Photos
    Aviary
    Befunky
    Croppola
    FastSTone
    Fotor
    Foto Flexer
    Gimp
    Hugin
    Image Composite Editor
    Image Tricks Lite
    Irfanview
    LightZone
    Lunapic
    OnlineImageSplitter
    Paint.NET
    PhotoPlus
    Photoscape
    Photoshop
    picfull
    PicMoneky
    Pixlr
    Polarr
    Seashore
    SumoPaint
    TinyPNG

? Productivity Tools

    2Do
    Any.do
    Asana
    Dapulse
    Droptask
    Flask
    Focus booster
    Freecamp
    Good night Chrome
    Leechblock
    MorningRoutine
    MyLifeOrganized
    Pintask
    PomodoroTechnique
    Producteev
    Remember the Milk
    RescueTime
    Restya
    StayFocusd
    Taskade
    Taskboard
    TikiTiki
    Tinygain
    Trello
    Todo.ly
    Todo
    Todoist
    Toggle
    Tomighty
    Toodledo
    Workflowy
    Wunderlist

? E-mail Management

    ActiveInbox
    AutoHotkey
    Batched Inbox
    Baydin
    BetterGmail
    Block Sender
    Boomerang Mail
    ClearContext
    Cleanfox
    CloudMagic
    Complete
    FindBigMail
    Followupthen
    Gpum
    Hiver
    Integrated gmail
    Mailstore
    Hubspotsales
    Minimalist
    NudgeMail
    Rapportive
    Sanebox
    Send for Gmail
    Sortd
    TrueNew
    Ugly Email
    Unroll.me - Easily unsubscribe in one click from email subscriptions.
    Wisestamp

? Document and Reference Management

    Colwiz
    DocumentCloud
    Endnote
    F1000
    Investigative Dashboard Search
    ManualsLib - Database of More Than 2.6M Manuals.
    Mendeley
    Omnity
    Overview
    Papers
    Readcube
    RefME
    Zotero

? PDF Management

    Foxit Reader
    ilovepdf
    PDFExpert
    PDFx
    Smallpdf
    Tabula
    XODO
    Xpdf
    Sejda

? OCR Tools

    I2OCR
    Free Online OCR
    OCRmyPDF
    Online OCR

? Cloud Storage and File Sharing

    4Shared
    ADrive
    Amazon Cloud drive
    Box
    Boxcryptor
    Cloudapp
    CloudFuze
    CloudHQ
    Copy
    Dropbox
    Dropcanvas
    Droplr
    DropSend
    Duplicati
    Egnyte
    Ge.TT
    GoodSync
    Google Drive
    hubiC
    iCloud
    Mediafire
    Mega
    Mindbox
    Mozy
    Multicloud
    Onedrive
    Onehub
    Otixo
    pCloud
    Sendthisfile
    Sendspace
    Simple.Savr
    Spideroak
    SugarSync
    Syncthing
    TransferBigFiles
    Tresorit
    WeTransfer

? Web Automation

    Cloud Work
    Dropbox
    IFTTT
    Sikuli
    WeWiredWeb
    Workflow
    Zapier

? Dashboard Tools

    Analytics Portfolio
    Chartio
    Clicdata
    Cyfe
    Dashthis
    DataDeck
    Geckoboard
    Happy Metrics
    Klipfolio
    Qlik
    Visually

? Wikis

    DokuWiki
    Foswiki
    MediaWiki
    PmWiki
    Scribbleton
    TiddlyWiki
    Tiki Wiki
    Torchpad
    TWiki
    Wikia
    Wikidot
    Wikispaces
    wikidPad
    Zim

? Collaboration and Project Management

    10kinsights
    15Five
    92fiveApp
    5pm
    ActionMint
    ActiveCollab
    Advanseez
    Agilewords
    Agilezen
    AllThings
    Any.do
    Apollo
    Asana
    Authorea
    AWW
    Azendoo
    Basecamp
    Binfire
    Breeze
    Canvanizer
    Casual
    Cardboardit
    Cardsmith - Build visual collaboration systems with the familiarity of sticky notes on a white board.
    CloudApp
    Cnverg
    Collabtive
    CollaborateCloud
    Comindwork
    Conceptboard
    Confluence
    CoSketch
    Crowdbase
    Dayboard
    Deekit
    Draw.to
    eGroupWare
    Elegantt
    Encrypted Cloud
    Firepad
    Firesub
    Flask
    Float
    Flockdraw
    Flow
    Frame
    Freedcamp
    GetDoneDone
    Glasscubes
    GQueues
    GroupZap
    Hightail
    hitask
    Huddle
    KabanTool
    Kanboard
    Kerika
    Linky dink
    Listacular
    Loomio
    LumoFlow
    Mammoth
    MyKanzen
    Nozbe
    Nutcache
    Minute
    Mural
    OmniGroup
    OnlyOffice
    Padlet
    Piematrix
    Pinstriped
    PivotalTracker
    Plan
    Planleaf
    Planzone
    Podio
    PrimaryPad
    ProjectManager
    ProjectPlace
    ProofHub
    Quip
    Quire
    Realtimeboard
    Redbooth
    Restya
    Reverb
    ScadaPlan
    Scribblar
    SeavusProjectViewer
    Smartsheet
    Stackfield
    Stormboard
    Sync.in
    SyncSpace
    Taiga
    TargetProcess
    Taskboard
    TeamAllocator
    Team.fm
    Teamgum
    Team Pad
    TeamWork
    TeamWorklive
    TitanPad
    Todoyu - Original project discontinued - now maintained at Todoyu-PHP7.x
    Transparent Business
    Trello
    Tuzzit
    Twiddla
    Twoodo
    updatey
    Web Whiteboard
    Weekdone
    Wekan
    wePaste
    Whiteboard
    Whiteboard
    Whiteboard Fox
    Worknoard
    Workfront
    Wrike
    Yammer
    YouTrack
    Zoho

? Communication Tools

    Adobe Connect
    AnyDesk
    AnyMeeting
    Auralink
    Babblebay
    BeamYourScreen
    Blackboard
    blind
    Campfire
    clearvale
    Digital Samba
    Discourse
    eBLVD
    Ekiga
    Encrypted Cloud
    Exo Platform
    FaceFlow
    Fleep
    Flowdock
    FreeConferenceCall
    FreeScreenSharing
    Friends
    Glance
    GoToMeeting
    Highfive
    HipChat
    Icq
    iLinc
    Infinite
    Intercall
    iWowWe
    Jam vee
    Jitsi
    Join.me
    Jostle
    Lets Chat
    lifesize
    Linphone
    Live Conference Pro
    Lucid Meetings
    LumoFlow
    Mashme tv
    Meet.fm
    MeetingOne
    MeWe
    mikogo
    mobilimeet
    MyBB
    omNovia
    ooVoo
    Open Whisper Systems
    Personify
    PGi iMeet
    Phorum
    Polycom
    Quicktopic
    ReadyTalk
    RingCentral
    Rocket.Chat
    screenleap
    Sharetronix
    sifonr
    Simple Signal
    Skarpline
    Skype
    Slack
    Socialtext
    StartMeeting
    Talky
    Teamviewer
    Telegram
    Tibbr
    Tixeo
    Toc
    TrueConf
    Twchat
    Unicorns
    Vanilla Forums
    Veeting rooms
    VeriShow
    Viadesk
    VideoLink2
    Vivicom
    VMukti
    Webex
    WhatsApp
    worklife
    Yugma
    Zeetings
    Zoho Meeting
    Zoom
    Zulip
    Zyncro

? Calendars and Scheduling

    Assistant
    Bunchapp
    Calendly
    Cozi
    Doodle
    Foogi
    Meekan
    Meetin.gs
    MyMemorizer
    ScheduleOnce
    TeamUp
    Teamweek

? Mind Mapping, Concept Mapping and Idea Generation Tools

    The Brain
    Bubbl.us
    Comapping
    Coogle
    Creately
    Edynco
    Fast Idea Generator
    Freemind
    Freeplane
    Germ
    GroupMap
    iMindMap
    iMindQ
    InstaGrok
    Lucidchart
    Mattermap
    Mind42
    Mind Genius
    Mindjet
    Mind Manager
    Mind Map
    Mindmeister
    Mindomo
    MindMup
    Popplet
    Realtimeboard
    Scapple
    Sketchboard
    Slatebox
    Spicynodes
    Spiderscribe
    StoryMap
    Wise Maping
    yWorks
    Xmind

? Social Network Analysis

    Gephi
    NodeXL
    ORA
    Sentinel Visualizer
    Wynyard Group
    Visual Investigative Scenarios

? Privacy and Encryption Tools

    Abine
    AdblockPlus
    Adium
    Axcrypt
    Blender
    boxcryptor
    CCleaner
    Chatsecure
    ClearConsole
    Click&Clean
    Crypto.cat
    Disconnect
    Do Not Track
    Duck Duck Go Search Engine
    EncSF MP
    Encrypted Cloud
    Epic Privacy Browser
    Eraser
    FileVault
    Ghostery
    Gmelius for Inbox by Gmail
    GNU PG
    GPG Tools
    Guardian Project
    Guerrilla Mail
    Hotspot Shield
    HTTPs Everywhere
    I2P
    IBackup
    IPLeak
    Ixquick Search Engine
    justdeleteme
    KeePass Password Safe
    Lastpass
    Lockbin
    Mailbox
    Mailvelope
    Master Password
    Motherpipe
    Nixory
    NoScript
    Open DNS
    Open PGP
    Open Whisper Systems
    Oscobo Search Engine
    OSSEC
    Panopticlick
    Peerblock
    Pidgin
    Pixel Block
    Policeman
    Privacy Badger
    Privacy Pal
    Privazer
    Proton Mail
    Qubes
    Ricochet
    Script Safe
    Securesha
    Silent circle
    Snort
    Spideroak
    Surveilliance Self Defense
    Tails
    Thunderbird
    Tor Project
    uBlock
    Unseen.is
    Wickr
    WOT
    VeraCrypt
    Viivo - End Of Life annoucement. EOL = July 1 2018.
    ZMail

? DNS

    Amass - The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations. Written in Go.

? Other Tools

    Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
    Belati - Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
    Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
    The Harvester - Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
    Intrigue Core - Framework for attack surface discovery.
    Maltego - Interactive data mining tool that renders directed graphs for link analysis.
    OpenRefine - Free & open source power tool for working with messy data and improving it.
    Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
    OSINT Framework - Web based framework for OSINT.
    OsintStalker - Python script for Facebook and geolocation OSINT.
    Outwit - Find, grab and organize all kinds of data and media from online sources.
    Photon - Crawler designed for OSINT
    Pown Recon - Target reconnaissance framework powered by graph theory.
    QuickCode - Python and R data analysis environment.
    Recon-ng - Full-featured Web Reconnaissance framework written in python.
    SecApps Recon - Information gathering and target reconnaissance tool and UI.
    sn0int - Semi-automatic OSINT framework and package manager.
    Zen - Find email addresses of Github users




https://adium.im/
https://ahrefs.com/
https://analyticsportfolio.com/
https://animoto.com/
https://app.calculist.io/
https://archive.org/
https://asana.com/
https://atavist.com/
https://atomiks.github.io/
https://awwapp.com/
https://basecamp.com/
https://bhattsameer.github.io/
https://bitbucket.org/
https://bookmate.com/
https://books.google.com/
https://brave.com/
https://bridge.leslibres.org/
https://bridge.suumitsu.eu/
https://browser.yandex.com/
https://bubbl.us/
https://buffer.com/
https://burrrd.com/
https://cacoo.com/
https://calendly.com/
https://camo.githubusercontent.com/
https://canvanizer.com/
https://captainfact.io/
https://cardboardit.com/
https://cartodb.com/
https://cartodb.github.io/
https://casual.pm/
https://charlieapp.com/
https://chartio.com/
https://chatsecure.org/
https://chema.ga/
https://chrome.google.com/
https://cloudmagic.com/
https://cloudwork.com/
https://cnverg.com/
https://coggle.it/
https://color.adobe.com/
https://complete.li/
https://conceptboard.com/
https://connect.data.com/
https://core.ac.uk/
https://crowdmap.com/
https://crypto.cat/
https://ctrlq.org/
https://d3js.org/
https://dapulse.com/
https://dashthis.com/
https://data.gov.uk/
https://data.occrp.org/
https://data.oecd.org/
https://datanews.github.io/
https://datawrapper.de/
https://dayboard.co/
https://desktop.github.com/
https://developer.apple.com/
https://developer.github.com/
https://developers.google.com/
https://disconnect.me/
https://discover.twitter.com/
https://dnsdumpster.com/
https://docs.google.com/
https://doesfollow.com/
https://dominoc925-pages.appspot.com/
https://dragdis.com/
https://droplr.com/
https://duckduckgo.com/
https://education.github.com/
https://ejfox.github.io/
https://elegantt.com/
https://elink.io/
https://emailhunter.co/
https://en.mention.com/
https://en.todoist.com/
https://en.wikipedia.org/
https://enterprise.github.com/
https://evernote.com/
https://exonerator.torproject.org/
https://explaintome.herokuapp.com/
https://exposure.co/
https://fakers.statuspeople.com/
https://familysearch.org/
https://findmyfbid.in/
https://firepad.io/
https://firesub.com/
https://fleep.io/
https://flipboard.com/
https://followyourworld.appspot.com/
https://frame.io/
https://freedcamp.com/
https://fullfact.org/
https://gaddr.me/
https://geofeedia.com/
https://gephi.org/
https://germ.io/
https://getcrate.co/
https://geti2p.net/
https://getnewsbot.com/
https://github.blog/
https://github.com/
https://github.community/
https://githubstatus.com/
https://global.factiva.com/
https://gpgtools.org/
https://groups.google.com/
https://groups.yahoo.com/
https://guardianproject.info/
https://haveibeenpwned.com/
https://help.github.com/
https://highfive.com/
https://hitask.com/
https://homemetry.com/
https://hubic.com/
https://hypothes.is/
https://icq.com/
https://ifttt.com/
https://ilmk.wordpress.com/
https://images.google.com/
https://images.search.yahoo.com/
https://info.tiki.org/
https://infogr.am/
https://inkscape.org/
https://inteltechniques.com/
https://interlude.fm/
https://issuu.com/
https://itunes.apple.com/
https://jitsi.org/
https://kanboard.net/
https://keep.google.com/
https://klart.co/
https://knoema.com/
https://lab.github.com/
https://lastpass.com/
https://laverna.cc/
https://librestock.com/
https://librivox.org/
https://liinwww.ira.uka.de/
https://lockbin.com/
https://lookup-id.com/
https://lumoflow.com/
https://madmimi.com/
https://mailbox.org/
https://majestic.com/
https://mammothhq.com/
https://mapbuildr.com/
https://mapchart.net/
https://maphub.net/
https://mapline.com/
https://maps.yahoo.com/
https://medium.com/
https://meedan.com/
https://meekan.com/
https://meet.fm/
https://mega.nz/
https://metaproductsrevolver.com/
https://mewe.com/
https://millionshort.com/
https://minbox.com/
https://mixi.jp/
https://mochimarks.com/
https://montage.storyful.com/
https://motherpipe.com/
https://moz.com/
https://mural.co/
https://my.yahoo.com/
https://mykanzen.com/
https://news.google.com/
https://news360.com/
https://noscript.net/
https://nozbe.com/
https://numspy.pythonanywhere.com/
https://oedci.uspto.gov/
https://offshoreleaks.icij.org/
https://onedrive.live.com/
https://opencorporates.com/
https://opensource.guide/
https://oscobo.co.uk/
https://ossec.github.io/
https://padlet.com/
https://panopticlick.eff.org/
https://papaly.com/
https://pdfexpert.com/
https://pentest-tools.com/
https://phishstats.info/
https://piktochart.com/
https://pintask.me/
https://pipl.com/
https://pixabay.com/
https://pixlr.com/
https://plan.io/
https://play.google.com/
https://plot.ly/
https://plus.google.com/
https://podio.com/
https://prezi.com/
https://prnmedia.prnewswire.com/
https://products.office.com/
https://protonmail.com/
https://public.tableau.com/
https://pulsedive.com/
https://queryfeed.net/
https://quickcode.io/
https://quip.com/
https://quire.io/
https://racontr.com/
https://raindrop.io/
https://rapportive.com/
https://realtimeboard.com/
https://redbooth.com/
https://redditcommentsearch.com/
https://refind.com/
https://remote.12dt.com/
https://research.microsoft.com/
https://riccardoscalco.github.io/
https://ricochet.im/
https://ritetag.com/
https://rocket.chat/
https://scholar.google.com/
https://search.nerdydata.com/
https://searchcode.com/
https://searchisback.com/
https://secapps.com/
https://secure.flickr.com/
https://securesha.re/
https://securitytrails.com/
https://sendloop.com/
https://serpstat.com/
https://shorthand.com/
https://sites.google.com/
https://skarpline.com/
https://slack.com/
https://slate.adobe.com/
https://slatebox.com/
https://slides.com/
https://smilesoftware.com/
https://snapmap.knightlab.com/
https://snappa.io/
https://sourceforge.net/
https://spideroak.com/
https://ssd.eff.org/
https://standaert.net/
https://standout.adobe.com/
https://steller.co/
https://stock.tookapic.com/
https://stocksnap.io/
https://storify.com/
https://storyform.co/
https://storymap.knightlab.com/
https://support.apple.com/
https://sway.com/
https://syncthing.net/
https://tagboard.com/
https://tagdef.com/
https://tagul.com/
https://taiga.io/
https://tails.boum.org/
https://talky.io/
https://targethunter.net/
https://taskade.com/
https://taskboard.matthewross.me/
https://team.fm/
https://teamweek.com/
https://telegram.org/
https://thatsthem.com/
https://ticktick.com/
https://tineye.com/
https://tinfoleak.com/
https://tinygain.com/
https://tinypng.com/
https://titanpad.com/
https://todo.ly/
https://tofo.me/
https://tools.verifyemailaddress.io/
https://torchpad.com/
https://torrentfreak.com/
https://trackpanel.net/
https://training.github.com/
https://translate.google.com/
https://translate.yandex.ru/
https://trello.com/
https://tresorit.com/
https://trexpertwitness.com/
https://twitrss.me/
https://twitter.com/
https://uglyemail.com/
https://unbabel.com/
https://unicorns.io/
https://unroll.me/
https://unseen.is/
https://unsplash.com/
https://us.teamblind.com/
https://venngage.com/
https://veracrypt.codeplex.com/
https://veri.ly/
https://videolink2.me/
https://viivo.com/
https://vimeo.com/
https://vis.occrp.org/
https://visage.co/
https://visualping.io/
https://visualstudio.github.com/
https://vivaldi.com/
https://vizala.com/
https://vk.com/
https://wappalyzer.com/
https://warble.co/
https://weboas.is/
https://weekdone.com/
https://wekan.io/
https://wewiredweb.com/
https://whispersystems.org/
https://whiteboardfox.com/
https://who.is/
https://whois.arin.net/
https://whoisology.com/
https://wickr.com/
https://wiki.gnome.org/
https://wiselike.com/
https://wordstotime.com/
https://workflow.is/
https://workflowy.com/
https://writeapp.me/
https://www.veeting.com/
https://www.visualintelligence.co.nz/
https://www.voilanorbert.com/
https://www.wallflux.com/
https://www.wbginvestmentclimate.org/
https://www.wetransfer.com/
https://www.wevideo.com/
https://www.whatsapp.com/
https://www.wordtracker.com/
https://www.workfront.com/
https://www.worklife.com/
https://www.wrike.com/
https://www.wto.org/
https://www.wunderlist.com/
https://www.xing.com/
https://www.yammer.com/
https://www.yandex.com/
https://www.youtube.com/
https://www.yugma.com/
https://www.zeemaps.com/
https://www.zintro.com/
https://www.ziprecruiter.com/
https://www.zoho.com/
https://www.zotero.org/
https://www.zulip.org/
https://wynyardgroup.com/
https://yvoschaap.com/
https://zapier.com/
https://zoom.us/

#Defind OSINT sources


keyword research tools

    Google Keyword Suggest Tool: Gives keywords suggestions for Google, Bing, Amazon and YouTube.
    Google AdWords
    Google Correlate
    Keyword Tool
    KWFinder
    Keyword discover
    Keyword Shitter
    One Look: Enter a word, phrase, sentence, or pattern to search for related words.
    Ubersuggest: suggest keywords not available in the Google Keyword Planner.

Search Engines

General Search

    Google
    Bing
    Yahoo
    AOL
    Goodsearch
    Factbites
    Infospace
    Lycos
    Exalead
    ASK
    Ecosia
    dothop
    entireweb
    teoma
    yippy

    I Search From: simulate using Google Search from a different location or device, or perform a search with custom search settings.
    millionshort: Allows you to remove the top of the search engine results (e.g Remove top 100,1000,10000)

National Search Engines

    Yandex: Russia
    Search: Switzerland
    Alleba: Philippines
    Baidu | so  | bhanvad China
    Eniro: Sweden
    Daum: South Korea
    Goo: Japan
Onet: Poland
    Parseek: Iran
    SAPO: Portugal
    AONDE: Brazil
    Lableb: Arabic based search engine
    arabo: Arabic Search engine

Privacy-oriented search engines

    DuckDuckGo: Online investigators usually use it to search the surface web while using the Tor Browser.
    Startpage: Fetch results from Google without tracking its users.
    Peekier: Privacy oriented search engines that fetch its results using its own search algorithm.
    Qwant: Based in France.
    Oscobo: Based in UK.
    Swisscows:  Privacy safe WEB-search based in Switzerland.
    Privatelee:  Search for web and images privately.
    Gigablast: Open source search engine.
    Gibiru:  Uncensored and anonymous search engine.
    jivesearch

Metadata search engines

    Excite
    Search
    MetaGer
    Zapmeta
    etools: Compile its results from major international search engines, keep user privacy by not collecting or sharing personal information of its users. This search engine is very fast and show a summary for each search query -on the right side- detailing the source of its results.
    All the interne: query major search engines including shopping site like Amazon and eBay.
    izito: Aggregate data from multiple sources (Yahoo, Bing, Wikipedia, YouTube and other) to generate optimal results which includes images, videos, news and articles.
    Metacrawler: Aggregate results from Google and Yahoo!.
    My all search: Aggregates results through Bing, DuckDuckGo, AOL Search, Ask, Oscobo, Mojeek, ZapMeta, MetaCrawler.
  Carrot2: Open Source Search Results Clustering Engine aggregate results from GoogleAPI, Bing API, eTools Meta Search, Lucene, SOLR, and more.
elocalfinder: Fetch results from Google, Yahoo!, Ask and Bing .
Opentext: Metasearch engine based on Google, Yahoo!, Ask, Bing, Wikipedia, and Open Directory.
All-in-One
Searx

FTP search engines

    Global file search
    Archie
    File watcher
    Mamont
    NAPALM FTP Indexer

Files Search Engines

    Faganfinder
    General-Search
    ShareDir

Image Search Engines

    Google image search
    Bing image search
    Yahoo images
    Yandex images
    Baidu images
    Imgur
    Photobucket
    Picsearch
    creativecommons
    Smug mug

Images shared across social media sites can be found in the following locations:

    Lakako
    Flickr
    Flicker map:
    My Pics map: View Flickr photos on a Google map.
    idGettr: Find Flicker ID number (also works for groups).
    Flickr Hive Mind: Data mining tool for the Flickr database of photography.
    Instagram
    Websta: Advanced search for Instagram website.
    Stalkture: Instagram Online Web Viewer.
    Mininsta: Advanced Instagram search engine.
    Pinterest

There are specialized sites that hold images appeared in the press and news media, to search for this type of images go to:

    Gettyimages: Contains images from news, entertainment, fashion, sports and archival imagery.
    Reuters pictures
    News press
    Associated Press images portal
    PA images
    European pressphoto agency
    Canadian Press images archive

Reverse image search

    Google reverse search
    Karmadecay
    TinEye
    REVERSE IMAGE SEARCH
    Imagebrief
    Cam finds App: this is an App available for both Android and Apple devices. It uses visual search technology to recognize uploaded picture and give instant results about it like related images, local shopping results and a vast selection of web results.
    Image Identification Project

Video Search Engines

    YouTube
    Google video
    Yahoo video search
    Bing videos
    AOL videos
    StartPage video search
    Veoh
    Vimeo
    360daily
    Official Facebook video search
    Crowd tangle (Facebook video search)
    Internet archive open source movies
    Live Leak
    Facebook live video map
    Meta Tube
    Geo Search Tool: Search for all movies according to a specific query entered by the user  the result set will be further filtered according to the distance from a specific location (city, village, intersection) and according to a specific time frame (past hour, past two or three hours ..etc.).
    Earth Cam
    Insecam

Custom Search Engines

    Google Custom Search Engines Finder
    300+ Social Networking Sites
    250+ Video Sharing Sites
    File Sharing Sites Search
    FTP and File Search Engine
    Github Awesome Custom Search Engine
    OSINT Tools, Resources & News Search
    Torrent Search
    Social Media Custom Search Engine
    IFTTT Applet Finder
    WordPress Content Hacker Search Engine
    Short URL Search Engine
    Raw Git Hacker Custom Search Engine

Internet Of Things (IoT) devices search engines

    Shodan: Shodan is the worlds first search engine for Internet-connected devices.
    ZoomEye
    123cam
    Airport webcams
    Insecam
    Lookr
    Earthcam
    Openstreetcam
    Opentopia
    Pictimo
    Reolink  list of unsecured cameras
    The webcam network
    Thingful
    Thingiverse
    Webcam.nl (NL)
    Webcams.travel
    Worldcam
    censys

Exploits search engines

    sploitus
    Google Hacking Database (GHDB)
    exploit-db

News/Newspaper Search Engines

    1stHeadlines: Breaking news headline.
    Google News Archive
    Google Newspaper Archive
    News Now
    Newspaper Archives: Contains Newspaper Archives 1607-2017 and Obituaries & Family History Records.
    All you can read
    Newspapers Search
    Findmypast: US and world  historical( China, Denmark, France, Germany, Jamaica, and South Africa are also searchable within the collection) Newspaper archive.
    Daily Earth
    Search U.S. Newspaper Directory, 1690-Present
    Newspaper Map
    World News
    The paperboy
    Newsography: International relations and armed conflicts global news aggregator and historical database.
    Online Newspapers: Online Newspaper Directory for the World.
    YouGotTheNews: Search Engine for US News  Search thousands of national, business, and local news sources.
    Library of Congress Newspapers directory  & 100 Years Ago Today: Search U.S. Newspaper Directory, 1690-Present using these two links from the Library of Congress.

Fake News Detection

    Snopes: Discovers false news, stories, urban legends and research/validate rumors to see whether it is true.
    Hoaxy: Check the spread of false claims (like a hoax, rumor, satire, news report) across social media sites. The site derives its results from reputable fact checking organizations to return the most accurate results.
    FactCheck: This site is partnered with Facebook to help identify and label fake news reported by its users. It also monitors different media for the false info covering a wide range of topics like health, science, hoaxes spread through Spam emails.
    ReviewMeta: Analysis Amazon user reviews.
    Reporter Lab: Gives a map of global fact-checking sites.
    Truth Or Fiction: Discover fake news in different topics like politics, nature, health, space, crime, police and terrorismetc.
    Hoax-Slayer: Focuses on email scam and social media hoaxes.
    Verification Handbook: A definitive guide to verifying digital content for emergency coverage available in different languages.
    Verification junkie: This is a directory of tools for verifying, fact checking and assessing the validity of eyewitness reports and user self-published content online.
    citizen evidence: tools and lessons to teach people how to authenticate user-generated online contents. Managed by Amnesty International.

Specialized Search Engines
Niche Search Engines

    Secret Search Engine Labs: Showing you the less popular search results often omitted by mainstream search giants.
    AllAreaCodes: Phone and Area Code Search

Patent Search Engines

    Google Advanced Patent Search Engine
    European Patent Office
    Israel Patent Office Database
    Norwegian Industrial Property Office
    Swedish Patent and Registration Office
    Switzerland 
    Taiwan Intellectual Property Office
    Japan Patent Office
    World Intellectual Property Organization (WIPO) 
    Korean Intellectual Property Rights Information Service (KIPRIS)
    State Intellectual Property Office (SIPO) of the Peoples Republic of China
    Australia Patent Search
    Canadian Intellectual Property Office
    Danish Patent and Trademark Office
    Finnish Patent and Registration Office
    France Patent Search
    Germany Patent Office
    UK Patent Search Engine
    India Patent Office
    stopfakes: The International Trade Administration (ITA), U.S. Department of Commerce, manages STOPfakes.gov to assist U.S. businesses protect and enforce their intellectual property rights against counterfeits and pirated goods in the global marketplace.
    FreePatentsOnline: Patent metadata search engine.
    Patent Lens
    Directory of Intellectual Property Offices Worldwide

Web Directories

    Search Engine Colossus
    The Ultimate Search Engine Links Page
    The WWW Virtual Library
    A web directory based on the DMOZ data
    Best of the Web
    GoWorkable  Global Business Listing
    01webdirectory

Translation services

    Google translator
    Google Input Tools: Allows a user to enter text in any supported language using his/her English (Latin) keyboard and the text will get converted into its native script.
    Apertium
    Babylon
    Bing translate
    Dictionary
    Wiktionary
    Free translator
    No slang

Business Search
Business Annual Records

    Annual Reports: Lists thousands of annual records from 5,333 companies worldwide.
    Reporter Link: Contains more than 60 Million searchable tables, figures and datasets.
    Gov.Uk
    U.S. Securities and exchange commission
    Sedar
    Company registration around the world: Give a list of government, commercial registers websites around the globe.

Business Profiles

    Open corporates: The largest open database of companies in the world.
    crunchbase
    Zoom info: List companies in the U.S categorized by industry and offer information
    corporationwiki: Allows you to search for any company and visualize the connection between people working within it
    Kompass: This is a global B2B portal with information about companies in more than 60 countries.
    Infobel
    Orbis directory
    Manta: Business directory for U.S businesses
    Canadian Company Capabilities
    Canadian Importers Database
    LittleSisThis is a powerful profiling website that lists a wealth of information about 185,000 people and 67,000 organizations in varying stages of completion.
    Companies House
    CDREX
    EUROPAGES
    Vault
    Owler
    The United Kingdom Limited Liability Company list
    International White and Yellow Pages
    Google finance

Grey literature

Grey information includes the following -and more (Academic papers, preprints, proceedings, conference & discussion papers, research reports, marketing reports, technical specifications and standards, dissertations, theses, trade publications, memoranda, government reports and documents not published commercially, translations, newsletters, market survey, draft version of books, articles.

Most important Grey literature (academic and scholarly resources) websites can be found in the following list:

    Academia
    Academic index
    Academic torrents
    American Doctoral Dissertations
    ArchiveGrid
    Google scholar
    Bielefeld academic search engine
    Archive portal Europe
    Social Science Research Network
    National library of Australia
    ScienceDirect
    PQDT Open
    The national archive of the United Kingdom
    Oxford academic
    Page Press
    CERN Document Server
    High wire
    Grey guide
    Beyond citation
    Crossref

Data Leak Websites

    WikiLeaks
    Cryptome
    GlobaLeaks: is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives
    BalkanLeaks: Focus on exposing organized crime and political corruption in Balkan.
    Al Jazeeras Investigative Unit: Leaks focusing on  Arabic countries.

Pastebin sites
Pastebin
    PasteLert: A Pastebin alerting service dedicated for Pastebin.com website.

# OSINT vs signal communications

https://numpi.com/
https://opencorporates.com/
https://phoneowner.com/
https://psbdmp.ws/
https://publicrecords.directory/
https://searchherenow.com/
https://speedyhunt.com/
https://unicourt.com/
https://www.callersmart.com/
https://www.peoplelooker.com/
https://www.phonesearchfree.com/
https://www.research.com/
https://www.snapdex.com/
https://www.spytox.com/
http://publicemailrecords.com/
http://publicsearchengine.com/
http://snapcode.net/
http://sometag.com/
http://ufind.name/
http://www.ivycall.com/
http://www.keecall.us/
http://www.peoplebyname.com/
https://golookup.com/
https://homemetry.com/


# General  OSINT sources by domain

http://123cam.com/
http://academictorrents.com/
http://airportwebcams.net/
http://archie.icm.edu.pl/
http://camfindapp.com/
http://cdrex.com/
http://cn.bhanvad.com/
http://dailyearth.com/
http://dirpopulus.org/
http://discovery.nationalarchives.gov.uk/
http://dothop.com/
http://eng.kipris.or.kr/
http://english.sipo.gov.cn/
http://facebook.com/
http://flickrhivemind.net/
http://fqs.opentext.com/
http://globalfilesearch.com/
http://google.com/
http://greyguide.isti.cnr.it/
http://highwire.stanford.edu/
http://image.baidu.com/
http://images.yahoo.com/
http://infospace.com/
http://ipindia.nic.in/
http://isearchfrom.com/
http://karmadecay.com/
http://keywordshitter.com/
http://mininsta.net/
http://newsography.com/
http://newspapermap.com/
http://osint.link/
http://pericles.ipaustralia.gov.au/
http://photobucket.com/
http://pictures.reuters.com/
http://search.carrot2.org/
http://stalkture.com/
http://strategis.ic.gc.ca/
http://tools.seochat.com/
http://translate.reference.com/
http://translation.babylon-software.com/
http://trove.nla.gov.au/
http://verificationhandbook.com/
http://verificationjunkie.com/
http://vlib.org/
http://www.01webdirectory.com/
http://www.360daily.com/
http://www.academicindex.net/
http://www.alleba.com/
http://www.allyoucanread.com/
http://www.annualreports.com/
http://www.aol.com/
http://www.aonde.com/
http://www.apimages.com/
http://www.arabo.com/
http://www.archivesportaleurope.net/
http://www.beyondcitation.org/
http://www.bing.com/
http://www.cpimages.com/
http://www.crowdtangle.com/
http://www.dkpto.org/
http://www.earthcam.com/
http://www.elocalfinder.com/
http://www.epa.eu/
http://www.etools.ch/
http://www.excite.com/
http://www.factbites.com/
http://www.factcheck.org/
http://www.faganfinder.com/
http://www.filewatcher.com/
http://www.free-translator.com/
http://www.freepatentsonline.com/
http://www.general-search.com/
http://www.gettyimages.com/
http://www.gibiru.com/
http://www.goo.ne.jp/
http://www.google.com/
http://www.goworkable.com/
http://www.hoax-slayer.com/
http://www.ic.gc.ca/
http://www.ilpatsearch.justice.gov.il/
http://www.imagebrief.com/
http://www.infobel.com/
http://www.insecam.org/
http://www.izito.com/
http://www.lycos.com/
http://www.metacrawler.com/
http://www.metatube.com/
http://www.mmnt.ru/
http://www.mypicsmap.com/
http://www.newsnow.co.uk/
http://www.onelook.com/
http://www.onlinenewspapers.com/
http://www.opendissertations.com/
http://www.opentopia.com/
http://www.pagepress.org/
http://www.parseek.com/
http://www.picsearch.com/
http://www.reverse-image-search.com/
http://www.sciencedirect.com/
http://www.searchenginecolossus.com/
http://www.searchenginelinks.co.uk/
http://www.secretsearchenginelabs.com/
http://www.sedar.com/
http://www.teoma.com/
http://www.the-webcam-network.com/
http://www.tineye.com/
http://www.truthorfiction.com/
http://www.vault.com/
http://www.veoh.com/
http://www.wayp.com/
http://www.yahoo.com/
http://yippy.com/
http://youtube.github.io/
https://academic.oup.com/
https://adwords.google.com/
https://all-io.net/
https://andrewmohawk.com/
https://archive.org/
https://balkanleaks.eu/
https://beta.companieshouse.gov.uk/
https://beta.worldcat.org/
https://botw.org/
https://ccsearch.creativecommons.org/
https://cdsweb.cern.ch/
https://censys.io/
https://chroniclingamerica.loc.gov/
https://citizenevidence.org/
https://cryptome.org/
https://cse.google.com/
https://duckduckgo.com/
https://facebook.com/
https://finance.google.com/
https://hoaxy.iuni.iu.edu/
https://images.google.com/
https://imgur.com/
https://inteltechniques.com/
https://keywordtool.io/
https://kwfinder.com/
https://littlesis.org/
https://metager.org/
https://millionshort.com/
https://news.google.com/
https://newspaperarchive.com/
https://newspapers.com/
https://opencorporates.com/
https://orbisdirectory.bvdinfo.com/
https://oscobo.co.uk/
https://osint.link/
https://pastebin.com/
https://patent.prh.fi/
https://patentscope.wipo.int/
https://peekier.com/
https://pqdtopen.proquest.com/
https://privatelee.com/
https://reolink.com/
https://reporterslab.org/
https://reviewmeta.com/
https://scholar.google.com/
https://search.crossref.org/
https://search.findmypast.com/
https://searx.me/
https://sharedir.com/
https://sploitus.com/
https://strategis.ic.gc.ca/
https://swisscows.com/
https://translate.google.com/
https://twitter.com/
https://twpat.tipo.gov.tw/
https://ubersuggest.io/
https://video.search.yahoo.com/
https://vimeo.com/
https://webcam.nl/
https://websta.me/
https://wikileaks.org/
https://wn.com/
https://worldcam.eu/
https://worldwide.espacenet.com/
https://www.1stheadlines.com/
https://www.academia.edu/
https://www.aljazeera.com/
https://www.allareacodes.com/
https://www.alltheinternet.com/
https://www.aol.com/
https://www.apertium.org/
https://www.baidu.com/
https://www.base-search.net/
https://www.bing.com/
https://www.commercial-register.sg.ch/
https://www.companiesintheuk.co.uk/
https://www.corporationwiki.com/
https://www.crunchbase.com/
https://www.daum.net/
https://www.dpma.de/
https://www.ecosia.org/
https://www.eniro.se/
https://www.entireweb.com/
https://www.europages.co.uk/
https://www.exalead.com/
https://www.exploit-db.com/
https://www.facebook.com/
https://www.flickr.com/
https://www.gigablast.com/
https://www.globaleaks.org/
https://www.goodsearch.com/
https://www.google.com/
https://www.gov.uk/
https://www.graphene-theme.com/
https://www.imageidentify.com/
https://www.inpi.fr/
https://www.instagram.com/
https://www.j-platpat.inpit.go.jp/
https://www.jivesearch.com/
https://www.keyworddiscovery.com/
https://www.kompass.com/
https://www.lableb.com/
https://www.lakako.com/
https://www.lens.org/
https://www.liveleak.com/
https://www.lookr.com/
https://www.manta.com/
https://www.myallsearch.com/
https://www.news-press.com/
https://www.noslang.com/
https://www.onet.pl/
https://www.openstreetcam.org/
https://www.owler.com/
https://www.paimages.co.uk/
https://www.patentstyret.no/
https://www.pictimo.com/
https://www.pinterest.com/
https://www.prv.se/
https://www.qwant.com/
https://www.reportlinker.com/
https://www.sapo.pt/
https://www.search.ask.com/
https://www.search.ch/
https://www.search.com/
https://www.searchftps.net/
https://www.sec.gov/
https://www.shodan.io/
https://www.smugmug.com/
https://www.snopes.com/
https://www.so.com/
https://www.ssrn.com/
https://www.startpage.com/
https://www.stopfakes.gov/
https://www.swissreg.ch/
http://10minutemail.com/
http://a.placebetween.us/
http://academia.edu/
http://aprs.fi/
http://archive.is/
http://archive.org/
http://backtweets.com/
http://baidu.com/
http://biznar.com/
http://boardreader.com/
http://brupt.com/
http://canlii.com/
http://casa-query.funnelback.com/
http://centralops.net/
http://citationmachine.net/
http://cnac.ca/
http://companycheck.co.uk/
http://copac.jisc.ac.uk/
http://cpic-cipc.ca/
http://creafy.com/
http://data.worldbank.org/
http://emm.newsbrief.eu/
http://en.utrace.de/
http://epic.org/
http://eric.ed.gov/
http://exif.regex.info/
http://fb.com/
http://finance.yahoo.com/
http://fotoforensics.com/
http://freecarrierlookup.com/
http://geosocialfootprint.com/
http://groups.yahoo.com/
http://hashtagify.me/
http://hola.org/
http://humantraffickingsearch.net/
http://image.baidu.com/
http://itools.com/
http://jurn.org/
http://justdelete.me/
http://karmadecay.com/
http://keep-tube.com/
http://keyhole.co/
http://knowem.com/
http://libguides.com/
http://mailinator.com/
http://metrocosm.com/
http://mintbusinessinfo.com/
http://mulpix.com/
http://namechk.com/
http://nationalarchives.gov.uk/
http://network-tools.com/
http://news.google.com/
http://news.silobreaker.com/
http://newspapermap.com/
http://newstrust.net/
http://oa.anu.edu.au/
http://onemilliontweetmap.com/
http://openknowledgemaps.org/
http://panopticlick.eff.org/
http://pdfmyurl.com/
http://phototracker.ru/
http://publicrecords.searchsystems.net/
http://rootabout.com/
http://scholar.google.com/
http://search.carrot2.org/
http://search.mibbit.com/
http://search.yahoo.com/
http://snitch.name/
http://socialmention.com/
http://sqoop.com/
http://syndie.i2p2.de/
http://toddington.wpengine.com/
http://translate.google.com/
http://trendsmap.com/
http://tubechop.com/
http://twitterfall.com/
http://typelink.net/
http://ucbswww.bank-banque-canada.ca/
http://vault.fbi.gov/
http://verificationhandbook.com/
http://viewdns.info/
http://waqi.info/
http://webmii.com/
http://websiteoutlook.com/
http://wikileaks.org/
http://wikistats.co/
http://wn.com/
http://worldaerodata.com/
http://worldc.am/
http://worldlii.org/
http://www.2lingual.com/
http://www.allmyfaves.com/
http://www.allyoucanread.com/
http://www.answers.com/
http://www.archives.gov/
http://www.ask.com/
http://www.bikudo.com/
http://www.bing.com/
http://www.blackbookonline.info/
http://www.blinkx.com/
http://www.blogdigger.com/
http://www.chatslang.com/
http://www.citeulike.org/
http://www.cluuz.com/
http://www.cmegroup.com/
http://www.companieshouse.gov.uk/
http://www.corporationwiki.com/
http://www.data360.org/
http://www.deeperweb.com/
http://www.dmoz.org/
http://www.dogpile.com/
http://www.domaintools.com/
http://www.europages.co.uk/
http://www.europeana.eu/
http://www.ewhois.com/
http://www.exalead.com/
http://www.facesaerch.com/
http://www.factmonster.com/
http://www.feedmyinbox.com/
http://www.flickr.com/
http://www.freetranslation.com/
http://www.geocreepy.com/
http://www.getlinkinfo.com/
http://www.globalincidentmap.com/
http://www.globalsecurity.org/
http://www.google.com/
http://www.goorulearning.org/
http://www.gramfeed.com/
http://www.gutenberg.org/
http://www.hashatit.com/
http://www.hathitrust.org/
http://www.hurisearch.org/
http://www.icc-ccs.org/
http://www.icerocket.com/
http://www.imf.org/
http://www.instya.com/
http://www.kidrex.org/
http://www.kidsclick.org/
http://www.linguee.com/
http://www.livejournal.com/
http://www.mahalo.com/
http://www.moreofit.com/
http://www.mozbot.com/
http://www.n2yo.com/
http://www.nosi.org/
http://www.noslang.com/
http://www.oanda.com/
http://www.omgili.com/
http://www.opengrey.eu/
http://www.opensiteexplorer.org/
http://www.osira.net/
http://www.pbs.org/
http://www.peekyou.com/
http://www.phonebookoftheworld.com/
http://www.photobucket.com/
http://www.police.uk/
http://www.pressdisplay.com/
http://www.proxy4free.com/
http://www.publicproxyservers.com/
http://www.quertle.info/
http://www.refdesk.com/
http://www.reference.com/
http://www.refseek.com/
http://www.reuters.com/
http://www.samair.ru/
http://www.scholaruniverse.com/
http://www.shipais.com/
http://www.shodanhq.com/
http://www.similarsites.com/
http://www.slideshare.net/
http://www.spokeo.com/
http://www.springo.com/
http://www.sputtr.com/
http://www.start.umd.edu/
http://www.stayinvisible.com/
http://www.stolencamerafinder.com/
http://www.stratfor.com/
http://www.sweetsearch.com/
http://www.systransoft.com/
http://www.tcij.org/
http://www.technorati.com/
http://www.thetimenow.com/
http://www.thetimezoneconverter.com/
http://www.tineye.com/
http://www.topix.com/
http://www.topmarks.co.uk/
http://www.truecaller.com/
http://www.urbandictionary.com/
http://www.vesseltracker.com/
http://www.visualcapitalist.com/
http://www.wdl.org/
http://www.webcitation.org/
http://www.wikipedia.org/
http://www.wolframalpha.com/
http://www.worldlingo.com/
http://www.yamli.com/
http://www.yandex.com/
http://www.yoname.com/
http://www.zabasearch.com/
http://www.zamzar.com/
http://www.zoominfo.com/
http://www.zotero.org/
http://wwwapps.tc.gc.ca/
http://yippy.com/
http://zesty.ca/
http://zetoc.jisc.ac.uk/
https://29a.ch/
https://academic.microsoft.com/
https://addons.mozilla.org/
https://app.echosec.net/
https://berify.com/
https://bestvpn.org/
https://blog.pinterest.com/
https://censys.io/
https://connectonline.asic.gov.au/
https://core.ac.uk/
https://duckduckgo.com/
https://followyourworld.appspot.com/
https://freenetproject.org/
https://geti2p.net/
https://giphy.com/
https://globaledge.msu.edu/
https://gnunet.org/
https://groups.google.com/
https://hunter.io/
https://intel.malwaretech.com/
https://intelx.io/
https://justice.gov.bc.ca/
https://keitharm.me/
https://livingatlas.arcgis.com/
https://lookup-id.com/
https://m.facebook.com/
https://noscript.net/
https://onion.cab/
https://onionview.com/
https://online.maryville.edu/
https://opencorporates.com/
https://oscobo.co.uk/
https://peekyou.com/
https://pipl.com/
https://pixelprivacy.com/
https://prism-break.org/
https://privacy.net/
https://search.creativecommons.org/
https://searchisback.com/
https://searx.me/
https://snitch.name/
https://sometag.org/
https://swisscows.com/
https://thatsthem.com/
https://translate.yandex.com/
https://transparencytoolkit.org/
https://twitter.com/
https://unfollowgram.com/
https://vimeo.com/
https://websta.me/
https://whoisology.com/
https://www.accountkiller.com/
https://www.anonymox.net/
https://www.base-search.net/
https://www.bellingcat.com/
https://www.cia.gov/
https://www.cloudwards.net/
https://www.comparitech.com/
https://www.downloadhelper.net/
https://www.earthcam.com/
https://www.facebook.com/
https://www.familysearch.org/
https://www.fbiic.gov/
https://www.geograph.org/
https://www.ghostery.com/
https://www.grammarcheck.net/
https://www.imageidentify.com/
https://www.instagram.com/
https://www.ixmaps.ca/
https://www.izito.com/
https://www.linkedin.com/
https://www.loc.gov/
https://www.numberway.com/
https://www.peoplefinders.com/
https://www.pinterest.com/
https://www.profilr.social/
https://www.pwnedlist.com/
https://www.quandl.com/
https://www.quora.com/
https://www.qwant.com/
https://www.reddit.com/
https://www.robtex.com/
https://www.safetydetective.com/
https://www.sansar.com/
https://www.searchencrypt.com/
https://www.sec.gov/
https://www.semanticscholar.org/
https://www.social-searcher.com/


#OpSec/Privacy/Anonymity
###########################
Deep dot Web Archive https://archive.fo/uIZ5T
Jolly Rogers Security Guide for Beginners https://web.archive.org/web/201903151546
https://web.archive.org/web/20190315154618/http://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/
https://archive.fo/xHVJn
https://tails.boum.org/index.en.html
https://www.torproject.org/
https://geti2p.net/en/
https://freenetproject.org/author/freenet-project-inc.html
https://www.whonix.org/
https://heads.dyne.org/
https://thatoneprivacysite.net/
https://www.wilderssecurity.com/
https://anonymous-proxy-servers.net/index.html (JonDonym mix network site)
https://neverendingsecurity.wordpress.com/
https://prism-break.org/en/
https://spyware.neocities.org/articles/
https://digdeeper.neocities.org/
https://tor.dial.ga/doc
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/a-few-recommendations/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/always-back-drives-especially-encrypted-drives/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-example-of-really-bad-opsec-smarten-up/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/an-introduction-to-an-expert-on-opsec-plus-md5-sha-1-checksums/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/another-scam-email-beware/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/are-you-using-safe-mail-net/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/bitcoin-clients-tails-blockchain-electrum/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/capabilities-of-the-nsa/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/clearnet-vs-hidden-services-why-you-should-be-careful/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cold-boot-attacks-unencrypted-ram-extraction/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn-continued/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/combining-tor-with-a-vpn/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/connecting-tor-vpn-for-windows-users/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/cookies-javascript-revisited-plus-flash-cookies-and-other-browser-tracking/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/exif-data/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/fraudulent-private-messages/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/general-security-precautions-when-posting-online-learn-from-others-mistakes/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/hiding-tor-from-your-isp-part-1-bridges-and-pluggable-transports/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-far-will-law-enforcement-go/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-connect-to-tor-over-top-of-tor/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/how-to-verify-your-downloaded-files-are-authentic/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/introduction-to-secure-communication-tor-https-ssl/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/invincibility-mindset-federal-government-bullying-tactics/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/it-is-obvious-when-you-are-using-tor/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/javascript-vulnerabilities-and-removing-personal-metadata-from-files/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-how-they-busted-sabu/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-libertas-dpr-sabu-[censored
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/learning-from-others-mistakes-sabu-became-fbi-informant-and-betrayed-jeremy-hammond/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-1-police-are-watching-it/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-2-thieves-scammers-and-counterfeit-bills/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-3-more-scam-stories/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/localbitcoins-part-4-sellers-busted-for-money-laundering/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/monitoring-you-with-an-antenna/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/obtaining-sending-and-receiving-bitcoins-anonymously/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-continued/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgp-tails-virtual-box/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/pgpgpg-email-addresses/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/retaining-a-lawyer-how-to-handle-getting-caught-or-interrogated/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/securing-your-account-from-fbi-monitoring/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/the-strengh-of-cryptography-and-anonymity-when-used-properly/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/they-are-watching-you-viruses-malware-vulnerabilities/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tor-chat/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/tracking-cookies/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/verifying-signed-messages-with-signatures-and-signing-your-own-messages/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/where-you-might-consider-running-to-if-you-had-no-other-choice/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/whole-disk-encryption-and-file-shredding/
https://www.deepdotweb.com/jolly-rogers-security-guide-for-beginners/yet-another-example-of-how-strong-cryptopgraphy-and-proper-opsec-can-protect-even-pedophiles/
https://b3rn3d.herokuapp.com/blog/2014/01/08/managing-pseudonyms/
https://b3rn3d.herokuapp.com/blog/2014/01/10/ask-him-about-his-threat-model/
https://b3rn3d.herokuapp.com/blog/2014/01/13/braintricks-for-opsec/
https://b3rn3d.herokuapp.com/blog/2014/01/22/burner-phone-best-practices/
https://b3rn3d.herokuapp.com/blog/2014/01/31/tools-to-evade-stylometrics/
https://b3rn3d.herokuapp.com/blog/2014/02/04/event-boundaries-helping-to-compartmentalize-your-operations/
https://b3rn3d.herokuapp.com/blog/2014/02/10/for-aaron/
https://b3rn3d.herokuapp.com/blog/2014/02/17/perspectives-of-opsec-models/
https://b3rn3d.herokuapp.com/blog/2014/03/05/tor-country-codes/
https://b3rn3d.herokuapp.com/blog/2014/03/09/irl-spycraft/


OPSEC: Because Jail is for wuftpd
Type: Video, conference talk
URL: https://www.youtube.com/watch?v=9XaYdCdwiWU
Description: This video covering hacker OPSEC is a necessary watch for anyone who is interested in the subject, especially hackers. The Grugq covers some very interesting case studies that allow you to learn from other hackers OPSEC failures.

B3RN3D.com
Type: OPSEC blog
URL: http://www.b3rn3d.com/
Description: B3RN3D is a blogger that is well-versed with topics such as operational security, maintaining anonymity, and mass surveillance. I often reference this blog.


The Paranoids Bible: An anti-dox effort
Type: Resource repository
URL: https://paranoidsbible.tumblr.com/library
Description: Self-described as a repository of knowledge meant to help people remove their information (Dox) from the web and people search engines. Excellent, credible resource for removing information about your current identity.

Alpraking's OPSEC guide to being a successful kingpin
Type: Text guide
URL: https://pastebin.com/0CxYx1BD
Description: Alpraking is an experienced drug kingpin in the online black market. In this post, he describes how he manages people and his drug operation with respect to operational security. Without great operational security, he would not be in business. This piece offers fantastic perspective from the black market community.

How to Disappear: Erase Your Digital Footprint, Leave False Trails, And Vanish
Type: Book
URL: https://www.amazon.com/How-Disappear-Digital-Footprint-Without/dp/1599219778
Description: This reading focuses on the offline side of disappearance; Frank Ahearn, an experienced skip tracer, guides us in preventing skip tracers and other parties from tracking our trail. This is an interesting read for anyone whom wishes to conceal his or her real identity. Pro-tip: start by buying this book with cash and a hoodie in a brick-and-mortar bookstore.

How to Lie to People: Achieving Anonymity through Disinformation and Data Poisoning
Type: Text guide
URL: https://pastebin.com/tXhiMk36
Description: DIzzIE provides helpful insight on how to lie effectively, and explains why and how lying can benefit your persona. This excellent resource can be read on your lunch break.

OPSEC failures of spies
Type: Video, conference talk
URL: https://www.youtube.com/watch?v=BwGsr3SzCZc
Description: A case study on targeted surveillance. Explains how telling metadata is, specifically metadata pertaining to cellphone networks. This case study provides the opportunity to learn from the OPSEC failures of spies.

How to Master Secret Work
Type: Text publication
URL: http://www.historyisaweapon.com/defcon1/secretwork.html
Description: Discusses the necessity of being able to carry out work and operations with assured secrecy. Governments subject to corruption have used dirty tactics to silence opposition parties in the past, and they will do it again. This resource will aid you in your thinking for illustrating underground operations in secrecy.

Centralised Place for Privacy Resources
Type: Blog, resource repository
URL: https://themanyhats.club/centralised-pla...resources/
Description: A list of privacy resources and security technologies. Great resources, it is definitely worth checking this list out to get more familiar with modern day security technologies and pro-privacy solutions.

Surveillance Self-Defense
Type: Resource repository
URL: https://ssd.eff.org/en
Description: Collection of resources, tutorials, and briefings pertaining to counter-surveillance efforts. Includes tutorials for secure deletion, using PGP, OTR, 2FA, Signal, Tor services, etc.

The Motherboard Guide to Not Getting Hacked
Type: Guide (PDF)
URL: https://assets.documentcloud.org/documen...Hacked.pdf
Description: Generally good advice for security practices. Covers security basics, mobile security, privacy, messaging, and avoiding state and police surveillance.

DEF CON 22: Blinding The Surveillance State
Type: Surveillance conference talk
URL: https://www.youtube.com/watch?v=xCH_q-xn760
Description: Christopher Soghoian discusses the importance of HTTPS for thwarting bulk data collection efforts, the importance of translating cybersecurity talk to politicians, lawmakers and court systems, among other things. I would recommend this talk for privacy activists and advocates.

Things NOT to Do
Type: OPSEC Guide
URL: https://www.whonix.org/wiki/DoNot
Description: A list of things that you should not do, with a general focus on the Tor network. Great OPSEC resource.

The CryptoPaper
Type: Personal Security Guide
URL: https://github.com/cryptoseb/CryptoPaper
Description: "Privacy, Security, and Anonymity For Every Internet User" 

   ++++++++++ Arms/Armor +++++++++++

  Name    Version         Description     Homepage
    0trace  1.5     A hop enumeration tool  http://jon.oberheide.org/0trace/
    3proxy  0.7.1.1         Tiny free proxy server.         http://3proxy.ru/
    3proxy-win32    0.7.1.1         Tiny free proxy server.         http://3proxy.ru/
    42zip   42      Recursive Zip archive bomb.     http://blog.fefe.de/?ts=b6cea88d
    acccheck        0.2.1   A password dictionary attack tool that targets windows authentication via the SMB protocol.     http://labs.portcullis.co.uk/tools/acccheck/
    ace     1.10    Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface      http://ucsniff.sourceforge.net/ace.html
    admid-pack      0.1     ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.      http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
    adminpagefinder         0.1     This python script looks for a large amount of possible administrative interfaces on a given site.      http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
    admsnmp         0.1     ADM SNMP audit scanner.        
    aesfix  1.0.1   A tool to find AES key in RAM   http://citp.princeton.edu/memory/code/
    aeskeyfind      1.0     A tool to find AES key in RAM   http://citp.princeton.edu/memory/code/
    aespipe         2.4c    Reads data from stdin and outputs encrypted or decrypted results to stdout.     http://loop-aes.sourceforge.net/aespipe/
    afflib  3.7.3   An extensible open format for the storage of disk images and related forensic information.      http://www.afflib.org
    afpfs-ng        0.8.1   A client for the Apple Filing Protocol (AFP)    http://alexthepuffin.googlepages.com/
    against         0.2     A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.     http://nullsecurity.net/tools/cracker.html
    aiengine        352.fc452a9     A packet inspection engine with capabilities of learning without any human intervention.        https://bitbucket.org/camp0/aiengine/
    aimage  3.2.5   A program to create aff-images.         http://www.afflib.org
    air     2.0.0   A GUI front-end to dd/dc3dd designed for easily creating forensic images.       http://air-imager.sourceforge.net/
    airflood        0.1     A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.     http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
    airgraph-ng     2371    Graphing tool for the aircrack suite    http://www.aircrack-ng.org
    airoscript      45.0a122ee      A script to simplify the use of aircrack-ng tools.      http://midnightresearch.com/projects/wicrawl/
    airpwn  1.4     A tool for generic packet injection on an 802.11 network.       http://airpwn.sourceforge.net
    allthevhosts    1.0     A vhost discovery tool that scrapes various web applications    http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
    american-fuzzy-lop      1.47b   A practical, instrumentation-driven fuzzer for binary formats.  https://code.google.com/p/american-fuzzy-lop/
    androguard      1.9     Reverse engineering, Malware and goodware analysis of Android applications and more.    https://code.google.com/p/androguard/
    androick        5.35048d7       A python tool to help in forensics analysis on android.         https://github.com/Flo354/Androick
    android-apktool         2.0.0   A tool for reengineering Android apk files.     http://forum.xda-developers.com/showthread.php?t=1755243
    android-ndk     r9c     Android C/C++ developer kit.    http://developer.android.com/sdk/ndk/index.html
    android-sdk-platform-tools      r21     Platform-Tools for Google Android SDK (adb and fastboot).       http://developer.android.com/sdk/index.html
    android-sdk     r24.0.2         Google Android SDK.     http://developer.android.com/sdk/index.html
    android-udev-rules      135.d5aeca6     Android udev rules.     https://github.com/bbqlinux/android-udev-rules
    androidsniffer  0.1     A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.    http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
    anontwi         1.0     A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.       http://anontwi.sourceforge.net/
    aphopper        0.3     AP Hopper is a program that automatically hops between access points of different wireless networks.    http://aphopper.sourceforge.net/
    apnbf   0.1     A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.       http://www.c0decafe.de/
    arachni         1.0.6   A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.        https://www.arachni-scanner.com
    arduino         1.0.5   Arduino SDK (includes patched avrdude and librxtx)      http://arduino.cc/en/Main/Software
    argus   3.0.8   Network monitoring tool with flow control.      http://qosient.com/argus/
    argus-clients   3.0.8   Network monitoring client for Argus.    http://qosient.com/argus/
    armitage        141120  A graphical cyber attack management tool for Metasploit.        http://www.fastandeasyhacking.com/
    arp-scan        1.9     A tool that uses ARP to discover and fingerprint IP hosts on the local network  http://www.nta-monitor.com/tools/arp-scan/
    arpalert        2.0.11  Monitor ARP changes in ethernet networks.       http://www.arpalert.org/
    arpoison        0.7     The UNIX arp cache update utility       http://www.arpoison.net
    arpon   2.7     A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.    http://arpon.sourceforge.net/
    arpwner         26.f300fdf      GUI-based python tool for arp posioning and dns poisoning attacks.      https://github.com/ntrippar/ARPwner
    artillery       1.0.3   A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system  https://www.trustedsec.com/downloads/artillery/
    asleap  2.2     Actively recover LEAP/PPTP passwords.   http://www.willhackforsushi.com/Asleap.html
    asp-audit       2BETA   An ASP fingerprinting tool and vulnerability scanner.   http://seclists.org/basics/2006/Sep/128
    athena-ssl-scanner      0.5.2   a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.         http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
    atstaketools    0.1     This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.      http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
    auto-xor-decryptor      3.6a1f8f7       Automatic XOR decryptor tool.   http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
    autopsy         2.24    A GUI for The Sleuth Kit.       http://www.sleuthkit.org/autopsy
    azazel  10.401e3aa      A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.    https://github.com/chokepoint/azazel
    b2sum   20140114        BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.   https://blake2.net/
    backcookie      44.cbf5b8b      Small backdoor using cookie.    https://github.com/mrjopino/backcookie
    backdoor-factory        118.6237b9f     Patch win32/64 binaries with shellcode.         https://github.com/secretsquirrel/the-backdoor-factory
    backfuzz        36.8e54ed6      A network protocol fuzzing toolkit.     https://github.com/localh0t/backfuzz
    balbuzard       67.d6349ef1bc55         A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).         https://bitbucket.org/decalage/balbuzard/
    bamf-framework  35.30d2b4b      A modular framework designed to be a platform to launch attacks against botnets.        https://github.com/bwall/BAMF
    basedomainname  0.1     Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.       http://www.morningstarsecurity.com/research
    batman-adv      2014.4.0        Batman kernel module, (included upstream since .38)     http://www.open-mesh.net/
    bbqsql  1.2     SQL injection exploitation tool.        https://github.com/neohapsis/bbqsql
    bdfproxy        58.79edcb2      Patch Binaries via MITM: BackdoorFactory + mitmProxy    https://github.com/secretsquirrel/BDFProxy
    bdlogparser     1       This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.     http://magikh0e.xyz/
    bed     0.5     Collection of scripts to test for buffer overflows, format string vulnerabilities.      http://www.aldeid.com/wiki/Bed
    beef    0.4.5.1.59.g3b46bf1     The Browser Exploitation Framework that focuses on the web browser      http://beefproject.com/
    beeswarm        1154.29273e6    Honeypot deployment made easy http://www.beeswarm-ids.org/      https://github.com/honeynet/beeswarm/
    beholder        0.8.10  A wireless intrusion detection tool that looks for anomalies in a wifi environment.     http://www.beholderwireless.org/
    beleth  36.0963699      A Multi-threaded Dictionary based SSH cracker.  https://github.com/chokepoint/Beleth
    bfbtester       2.0.1   Performs checks of single and multiple argument command line overflows and environment variable overflows       http://sourceforge.net/projects/bfbtester/
    bgp-md5crack    0.1     RFC2385 password cracker        http://www.c0decafe.de/
    binex   1.0     Format String exploit building tool.    http://www.morxploit.com/morxtool
    bing-ip2hosts   0.4     Enumerates all hostnames which Bing has indexed for a specific IP address.      http://www.morningstarsecurity.com/research/bing-ip2hosts
    bing-lfi-rfi    0.1     This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.     http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html
    binwalk         2.0.1   A tool for searching a given binary image for embedded files.   http://binwalk.org
    binwally        4.0aabd8b       Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).     https://github.com/bmaia/binwally
    bios_memimage   1.2     A tool to dump RAM contents to disk (aka cold boot attack).     http://citp.princeton.edu/memory/code/
    birp    60.1d7c49f      A tool that will assist in the security assessment of mainframe applications served over TN3270.        https://github.com/sensepost/birp
    bittwist        2.0     A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.         http://bittwist.sourceforge.net/
    bkhive  1.1.1   Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.     http://sourceforge.net/projects/ophcrack
    blackarch-menus         0.2     BlackArch specific XDG-compliant menu   http://www.blackarch.org/
    blackhash       0.2     Creates a filter from system hashes     http://16s.us/blackhash/
    bletchley       0.0.1   A collection of practical application cryptanalysis tools.      https://code.google.com/p/bletchley/
    blindelephant   7       A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations     http://blindelephant.sourceforge.net/
    blindsql        1.0     Set of bash scripts for blind SQL injection attacks     http://www.enye-sec.org/programas.html
    bluebox-ng      82.22fd93e      A GPL VoIP/UC vulnerability scanner.    https://github.com/jesusprubio/bluebox-ng
    bluebugger      0.1     An implementation of the bluebug technique which was discovered by Martin Herfurt.      http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html
    bluelog         1.1.2   A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.         http://www.digifail.com/software/bluelog.shtml
    bluepot         0.1     A Bluetooth Honeypot written in Java, it runs on Linux  https://code.google.com/p/bluepot/
    blueprint       0.1_3   A perl tool to identify Bluetooth devices.      http://trifinite.org/trifinite_stuff_blueprinting.html
    blueranger      1.0     A simple Bash script which uses Link Quality to locate Bluetooth device radios.         http://www.hackfromacave.com/projects/blueranger.html
    bluescan        1.0.6   A Bluetooth Device Scanner.     http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/
    bluesnarfer     0.1     A bluetooth attacking tool      http://www.alighieri.org/project.html
    bmap-tools      3.2     Tool for copying largely sparse files using information from a block map file.  http://git.infradead.org/users/dedekind/bmap-tools.git
    bob-the-butcher         0.7.1   A distributed password cracker package.         http://btb.banquise.net/
    bokken  397.dfc6c536eab7        GUI for radare2 and pyew.       http://inguma.eu/projects/bokken/
    bowcaster       0.1     This framework, implemented in Python, is intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.   https://github.com/zcutlip/bowcaster
    braa    0.82    A mass snmp scanner     http://s-tech.elsat.net.pl/braa/
    braces  0.4     A Bluetooth Tracking Utility.   http://braces.shmoo.com/
    browser-fuzzer  3       Browser Fuzzer 3        http://www.krakowlabs.com/dev.html
    brutessh        0.5     A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads.   http://www.edge-security.com/edge-soft.php
    brutus  2       One of the fastest, most flexible remote password crackers you can get your hands on.   http://www.hoobie.net/brutus/
    bsdiff  4.3     bsdiff and bspatch are tools for building and applying patches to binary files.         http://www.daemonology.net/bsdiff/
    bsqlbf  2.7     Blind SQL Injection Brute Forcer.       http://code.google.com/p/bsqlbf-v2/
    bss     0.8     Bluetooth stack smasher / fuzzer        http://www.secuobs.com/news/15022006-bss_0_8.shtml
    bt_audit        0.1.1   Bluetooth audit         http://www.betaversion.net/btdsd/download/
    btcrack         1.1     The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.        http://www.nruns.com/_en/security_tools_btcrack.php
    btscanner       2.1     Bluetooth device scanner.       http://www.pentest.co.uk
    bulk-extractor  1.5.5   Bulk Email and URL extraction tool.     https://github.com/simsong/bulk_extractor
    bully   19.ba33677      A wifi-protected-setup (WPS) brute force attack tool.   http://code.google.com/p/bully/
    bunny   0.93    A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.  http://code.google.com/p/bunny-the-fuzzer/
    burpsuite       1.6     An integrated platform for attacking web applications (free edition).   http://portswigger.net/burp/
    buttinsky       138.1a2a1b2     Provide an open source framework for automated botnet monitoring.       https://github.com/buttinsky/buttinsky
    bvi     1.4.0   A display-oriented editor for binary files operate like "vi" editor.    http://bvi.sourceforge.net/
    bytecode-viewer         79.bde746b      A Java 8/Android APK Reverse Engineering Suite.         https://github.com/Konloch/bytecode-viewer
    cadaver         0.23.3  Command-line WebDAV client for Unix     http://www.webdav.org/cadaver
    canari  1.1     A transform framework for maltego       http://www.canariproject.com/
    cangibrina      87.fcbc952      Dashboard Finder.       https://github.com/fnk0c/cangibrina
    cansina         109.be98c12     A python-based Web Content Discovery Tool.      https://github.com/deibit/cansina
    capstone        3.0.1   A lightweight multi-platform, multi-architecture disassembly framework.         http://www.capstone-engine.org/index.html
    captipper       25.d3d79e9      Malicious HTTP traffic explorer tool.   http://www.omriher.com/2015/01/captipper-malicious-http-traffic.html
    carwhisperer    0.2     Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.        http://trifinite.org/trifinite_stuff_carwhisperer.html
    casefile        1.0.1   The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information        http://www.paterva.com/web6/products/casefile.php
    cdpsnarf        0.1.6   Cisco discovery protocol sniffer.       https://github.com/Zapotek/cdpsnarf
    cecster         5.15544cb       A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols        https://github.com/nccgroup/CECster
    centry  72.6de2868      Cold boot & DMA protection      https://github.com/0xPoly/Centry
    cewl    4.3     A custom word list generator    http://www.digininja.org/projects/cewl.php
    cflow   1.4     A C program flow analyzer.      http://www.gnu.org/software/cflow/
    chaosmap        1.3     An information gathering tool and dns / whois / web server scanner      http://freecode.com/projects/chaosmap
    chaosreader     0.94    A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.  http://chaosreader.sourceforge.net/
    chapcrack       17.ae2827f      A tool for parsing and decrypting MS-CHAPv2 network handshakes.         https://github.com/moxie0/chapcrack
    check-weak-dh-ssh       0.1     Debian OpenSSL weak client Diffie-Hellman Exchange checker.     http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html
    checkiban       0.2     Checks the validity of an International Bank Account Number (IBAN).     http://kernel.embedromix.ro/us/
    checkpwd        1.23    Oracle Password Checker (Cracker)       http://www.red-database-security.com/software/checkpwd.html
    checksec        1.5     The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used.     http://www.trapkit.de/tools/checksec.html
    cheetah         19.a937193      Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.)   https://github.com/bl4de/Cheetah
    chiron  0.7     An all-in-one IPv6 Penetration Testing Framework.       http://www.secfu.net/tools-scripts/
    chkrootkit      0.50    Checks for rootkits on a system         http://www.chkrootkit.org/
    chntpw  140201  Offline NT Password Editor - reset passwords in a Windows NT SAM user database file     http://pogostick.net/~pnh/ntpasswd/
    chownat         0.08b   Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other     http://samy.pl/chownat/
    chrome-decode   0.1     Chrome web browser decoder tool that demonstrates recovering passwords.         http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html
    chromefreak     22.336e323      A Cross-Platform Forensic Framework for Google Chrome   http://osandamalith.github.io/ChromeFreak/
    cidr2range      0.9     Script for listing the IP addresses contained in a CIDR netblock        http://www.cpan.org/authors/id/R/RA/RAYNERLUC
    cintruder       0.2.0   An automatic pentesting tool to bypass captchas.        http://cintruder.sourceforge.net/
    ciphertest      14.7f49ea7      A better SSL cipher checker using gnutls.       https://github.com/OpenSecurityResearch/ciphertest
    ciphr   105.db79691     A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.         https://github.com/frohoff/ciphr
    cirt-fuzzer     1.0     A simple TCP/UDP protocol fuzzer.       http://www.cirt.dk/
    cisco-auditing-tool     1       Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.    http://www.scrypt.net
    cisco-global-exploiter  1.3     A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.     http://www.blackangels.it
    cisco-ocs       0.2     Cisco Router Default Password Scanner.  http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner
    cisco-router-config     1.1     copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration        
    cisco-scanner   0.2     Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris.   http://wayreth.eu.org/old_page/
    cisco-snmp-enumeration  2.e9b1f93       Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.    https://github.com/nccgroup/cisco-snmp-enumeration
    cisco-snmp-slap         5.daf0589       IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.     https://github.com/nccgroup/cisco-snmp-slap
    cisco-torch     0.4b    Cisco Torch mass scanning, fingerprinting, and exploitation tool.       http://www.arhont.com
    cisco5crack     2.c4b228c       Crypt and decrypt the cisco enable 5 passwords.         https://github.com/madrisan/cisco7crack
    cisco7crack     2.f1c21dd       Crypt and decrypt the cisco enable 7 passwords.         https://github.com/madrisan/cisco7crack
    ciscos  1.3     Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.        
    clamscanlogparser       1       This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.  http://magikh0e.xyz/
    climber         23.f614304      Check UNIX/Linux systems for privilege escalation.      https://github.com/raffaele-forte/climber
    clusterd        129.0f04a49     Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.  https://github.com/hatRiot/clusterd
    cmospwd         5.0     Decrypts password stored in CMOS used to access BIOS setup.     http://www.cgsecurity.org/wiki/CmosPwd
    cms-explorer    1.0     Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running    http://code.google.com/p/cms-explorer
    cms-few         0.1     Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.     http://packetstormsecurity.com/files/64722/cms_few.py.txt.html
    cmsmap  198.437d764     A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.         https://www.dionach.com/blog/cmsmap-%E2%80%93-a-simple-cms-vulnerability-scanner

    codetective     39.7f44df4      A tool to determine the crypto/encoding algorithm used according to traces of its representation.       https://www.digitalloft.org/init/plugin_wiki/page/codetective
    complemento     0.7.6   A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever       http://complemento.sourceforge.net
    configpush      0.8.5   This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.        http://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html
    conpot  0.4.0   ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org"    
    conscan         1.1     A blackbox vulnerability scanner for the Concre5 CMS.   http://nullsecurity.net/tools/scanner.html
    cookie-cadger   1.08    An auditing tool for Wi-Fi or wired Ethernet connections.       https://cookiecadger.com/
    cowpatty        4.6     Wireless WPA/WPA2 PSK handshake cracking utility        http://www.wirelessdefence.org/Contents/Files/
    cpfinder        0.1     This is a simple script that looks for administrative web interfaces.   http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html
    cppcheck        1.68    A tool for static C/C++ code analysis   http://cppcheck.wiki.sourceforge.net/
    cpptest         1.1.2   A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.        http://cpptest.sourceforge.net/
    crackhor        2.ae7d83f       A Password cracking utility.    https://github.com/CoalfireLabs/crackHOR
    crackle         39.3e93196      Crack and decrypt BLE encryption        https://github.com/mikeryan/crackle/
    crackserver     33.e5763ab      An XMLRPC server for password cracking.         https://github.com/averagesecurityguy/crack
    create_ap       117.3460580     This script creates a NATed or Bridged WiFi Access Point.       https://github.com/oblique/create_ap
    creddump        0.3     A python tool to extract various credentials and secrets from Windows registry hives.   https://code.google.com/p/creddump/
    creds   17.1ec8297      Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.       https://github.com/DanMcInerney/creds.py
    creepy  137.9f60449     A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.       http://github.com/ilektrojohn/creepy.git
    crowbar         39.839c62b      A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.       https://github.com/galkan/crowbar
    crunch  3.6     A wordlist generator for all combinations/permutations of a given character set.        http://sourceforge.net/projects/crunch-wordlist/
    crypthook       17.0728cd1      TCP/UDP symmetric encryption tunnel wrapper.    https://github.com/chokepoint/CryptHook
    cryptonark      0.5.6   SSL security checker.   http://blog.techstacks.com/cryptonark.html
    csrftester      1.0     The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.         http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project
    ctunnel         0.7     Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.  http://nardcore.org/ctunnel
    cuckoo  1.1.1   A malware analysis system.      http://cuckoosandbox.org/
    cupp    3.0     Common User Password Profiler   http://www.remote-exploit.org/?page_id=418
    cutycapt        10      A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.      http://cutycapt.sourceforge.net/
    cvechecker      3.5     The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.   http://cvechecker.sourceforge.net/
    cymothoa        1       A stealth backdooring tool, that inject backdoor's shellcode into an existing process.  http://cymothoa.sourceforge.net/
    damm    28.9af34b4      Differential Analysis of Malware in Memory.     https://github.com/504ensicsLabs/DAMM
    darkbing        0.1     A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.       http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html
    darkd0rk3r      1.0     Python script that performs dork searching and searches for local file inclusion and SQL injection errors.      http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html
    darkjumper      5.8     This tool will try to find every website that host at the same server at your target    http://sourceforge.net/projects/darkjumper/
    darkmysqli      1.6     Multi-Purpose MySQL Injection Tool      https://github.com/BlackArch/darkmysqli
    darkstat        3.0.718         Network statistics gatherer (packet sniffer)    http://dmr.ath.cx/net/darkstat/
    davoset         1.2.3   A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.    http://websecurity.com.ua/davoset/
    davtest         1.0     Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target        http://code.google.com/p/davtest/
    dbd     1.50    A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.     https://github.com/gitdurandal/dbd
    dbpwaudit       0.8     A Java tool that allows you to perform online audits of password quality for several database engines   http://www.cqure.net/wp/dbpwaudit/
    dc3dd   7.2.641         A patched version of dd that includes a number of features useful for computer forensics.       http://sourceforge.net/projects/dc3dd
    dcfldd  1.3.4.1         DCFL (DoD Computer Forensics Lab) dd replacement with hashing   http://dcfldd.sourceforge.net/
    ddrescue        1.19    GNU data recovery tool  http://www.gnu.org/software/ddrescue/ddrescue.html
    deblaze         0.3     A remote method enumeration tool for flex servers       http://deblaze-tool.appspot.com/
    delldrac        0.1a    DellDRAC and Dell Chassis Discovery and Brute Forcer.   https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/
    depant  0.3a    Check network for services with default passwords.      http://midnightresearch.com/projects/depant/
    depdep  2.0     A merciless sentinel which will seek sensitive files containing critical info leaking through your network.     https://github.com/galkan/depdep
    detect-it-easy  32.bfbeac1      A program for determining types of files.       https://github.com/horsicq/Detect-It-Easy
    device-pharmer  35.c1d449e      Opens 1K+ IPs or Shodan search results and attempts to login.   https://github.com/DanMcInerney/device-pharmer
    dex2jar         0.0.9.15        A tool for converting Android's .dex format to Java's .class format     http://code.google.com/p/dex2jar
    dff-scanner     1.1     Tool for finding path of predictable resource locations.        http://netsec.rs/70/tools.html
    dhcdrop         0.5     Remove illegal dhcp servers with IP-pool underflow.     http://www.netpatch.ru/dhcdrop.html
    dhcpig  69.cc4109a      Enumerates hosts, subdomains, and emails from a given domain using google       https://github.com/kamorin/DHCPig
    dinouml         0.9.5   A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC   http://kernel.embedromix.ro/us/
    dirb    2.04    A web content scanner, brute forceing for hidden files  http://dirb.sourceforge.net/
    dirbuster       1.0_RC1         An application designed to brute force directories and files names on web/application servers   http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
    directorytraversalscan  1.0.1.0         Detect directory traversal vulnerabilities in HTTP servers and web applications.        http://sourceforge.net/projects/httpdirscan/
    dirs3arch       130.8f37c7d     HTTP(S) directory/file brute forcer.    https://github.com/maurosoria/dirs3arch
    dirscanner      0.1     This is a python script that scans webservers looking for administrative directories, php shells, and more.     http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html
    dislocker       0.3     A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.      http://www.hsc.fr/ressources/outils/dislocker/
    dissector       1       This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.    http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
    dissy   10      A graphical frontend to the objdump disassembler for compiler-generated code.   http://dissy.googlecode.com/
    dizzy   0.8.2   A Python based fuzzing framework with many features.    http://www.c0decafe.de/
    dmitry  1.3a    Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.       http://www.mor-pah.net/
    dnmap   0.6     The distributed nmap framework  http://sourceforge.net/projects/dnmap/
    dns-reverse-proxy       11.ef9d062      A reverse DNS proxy written in Go.      https://github.com/StalkR/dns-reverse-proxy
    dns-spoof       12.3918a10      Yet another DNS spoof utility.  https://github.com/maurotfilho/dns-spoof
    dns2geoip       0.1     A simple python script that brute forces DNS and subsequently geolocates the found subdomains.  http://packetstormsecurity.com/files/118036/DNS-GeoIP.html
    dns2tcp         0.5.2   A tool for relaying TCP connections over DNS.   http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
    dnsa    0.5     DNSA is a dns security swiss army knife         http://packetfactory.openwall.net/projects/dnsa/index.html
    dnsbf   0.2     search for available domain names in an IP range        http://code.google.com/p/dnsbf
    dnsbrute        2.b1dc84a       Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.        https://github.com/d4rkcat/dnsbrute
    dnschef         0.3     A highly configurable DNS proxy for pentesters.         http://thesprawl.org/projects/dnschef/
    dnsdrdos        0.1     Proof of concept code for distributed DNS reflection DoS.       http://nullsecurity.net/tools/dos.html
    dnsenum         1.2.4.1         Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.       http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum
    dnsgoblin       0.1     Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.     http://nullsecurity.net/tools/scanner.html
    dnsmap  0.30    Passive DNS network mapper      http://dnsmap.googlecode.com
    dnspredict      0.0.2   DNS prediction  http://johnny.ihackstuff.com
    dnsrecon        0.8.9   Python script for enumeration of hosts, subdomains and emails from a given domain using google.         https://github.com/darkoperator/dnsrecon
    dnsspider       0.5     A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.     http://nullsecurity.net/tools/scanner.html
    dnstracer       1.9     Determines where a given DNS server gets its information from, and follows the chain of DNS servers     http://www.mavetju.org/unix/dnstracer.php
    dnsutils        9.9.2.P2        DNS utilities: dig host nslookup        http://www.isc.org/software/bind/
    dnswalk         2.0.2   A DNS debugger  http://sourceforge.net/projects/dnswalk/
    domain-analyzer         0.8.1   Finds all the security information for a given domain name.     http://sourceforge.net/projects/domainanalyzer/
    doona   127.06cd178     A fork of the Bruteforce Exploit Detector Tool (BED).   https://github.com/wireghoul/doona
    dotdotpwn       3.0     The Transversal Directory Fuzzer        http://dotdotpwn.blogspot.com
    dpeparser       beta002         Default password enumeration project    http://www.toolswatch.org/dpe/
    dpscan  0.1     Drupal Vulnerabilty Scanner.    https://github.com/insaneisnotfree/Blue-Sky-Information-Security
    dradis  2.9.0   An open source framework to enable effective information sharing.       http://dradisframework.org/
    driftnet        0.1.6   Listens to network traffic and picks out images from TCP streams it observes.   http://www.ex-parrot.com/~chris/driftnet/
    dripper         v1.r1.gc9bb0c9  A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.      http://www.blackhatlibrary.net/Dripper
    dscanner        715.63ba816     Swiss-army knife for D source code.     https://github.com/Hackerpilot/Dscanner
    dsd     84.60807e0      Digital Speech Decoder  https://github.com/szechyjs/dsd
    dsniff  2.4b1   Collection of tools for network auditing and penetration testing        http://www.monkey.org/~dugsong/dsniff/
    dumb0   19.1493e74      A simple tool to dump users in popular forums and CMS.  https://github.com/0verl0ad/Dumb0
    dump1090        386.bff92c4     A simple Mode S decoder for RTLSDR devices.     https://github.com/MalcolmRobb/dump1090
    dumpacl         0.0     Dumps NTs ACLs and audit settings.      http://www.systemtools.com/cgi-bin/download.pl?DumpAcl
    dumpzilla       03152013        A forensic tool for firefox.    http://www.dumpzilla.org/
    dvcs-ripper     12.b4dc17a      Rip web accessible (distributed) version control systems: SVN/GIT/...   https://github.com/kost/dvcs-ripper
    eapmd5pass      1.4     An implementation of an offline dictionary attack against the EAP-MD5 protocol  http://www.willhackforsushi.com/?page_id=67
    easy-creds      3.9     A bash script that leverages ettercap and other tools to obtain credentials.    https://github.com/brav0hax/easy-creds
    easyda  7.0867f9b       Easy Windows Domain Access Script.      https://github.com/nccgroup/easyda
    easyfuzzer      3.6     A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant).     http://www.mh-sec.de/downloads.html.en
    eazy    0.1     This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.        http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html
    edb     0.9.20  A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.         http://www.codef00.com/projects.php#Debugger
    eindeutig       20050628_1      Examine the contents of Outlook Express DBX email repository files (forensic purposes)  http://www.jonesdykstra.com/
    elettra         1.0     Encryption utility by Julia Identity    http://www.winstonsmith.info/julia/elettra/
    elettra-gui     1.0     Gui for the elettra crypto application.         http://www.winstonsmith.info/julia/elettra/
    elite-proxy-finder      44.29143ad      Finds public elite anonymity proxies and concurrently tests them.       https://github.com/DanMcInerney/elite-proxy-finder
    enabler         1       attempts to find the enable password on a cisco system via brute force.         http://packetstormsecurity.org/cisco/enabler.c
    encodeshellcode         0.1b    This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.   http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html
    ent     1.0     Pseudorandom number sequence test.      http://www.fourmilab.ch/random
    enum-shares     7.97cba5a       Tool that enumerates shared folders across the network and under a custom user account.         https://github.com/dejanlevaja/enum_shares
    enum4linux      0.8.9   A tool for enumerating information from Windows and Samba systems.      http://labs.portcullis.co.uk/application/enum4linux/
    enumiax         1.0     IAX enumerator  http://sourceforge.net/projects/enumiax/
    enyelkm         1.2     Rootkit for Linux x86 kernels v2.6.     http://www.enye-sec.org/programas.html
    epicwebhoneypot         2.0a    Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.     http://sourceforge.net/projects/epicwebhoneypot/
    erase-registrations     1.0     IAX flooder     http://www.hackingexposedvoip.com/
    etherape        0.9.13  A graphical network monitor for various OSI layers and protocols        http://etherape.sourceforge.net/
    ettercap        0.8.1   A network sniffer/interceptor/logger for ethernet LANs - console        http://ettercap.github.com/ettercap/
    evilgrade       2.0.0   Modular framework that takes advantage of poor upgrade implementations by injecting fake updates        http://www.infobyte.com.ar/developments.html
    evilmaid        1.01    TrueCrypt loader backdoor to sniff volume password      http://theinvisiblethings.blogspot.com
    exiv2   0.24    Exif and Iptc metadata manipulation library and tools   http://exiv2.org
    exploit-db      1.6     The Exploit Database (EDB)  an ultimate archive of exploits and vulnerable software - A collection of hacks  http://www.exploit-db.com
    extracthosts    14.ec8b89c      Extracts hosts (IP/Hostnames) from files.       https://github.com/bwall/ExtractHosts
    extundelete     0.2.4   Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal  http://extundelete.sourceforge.net
    eyepwn  1.0     Exploit for Eye-Fi Helper directory traversal vulnerability     http://www.pentest.co.uk
    eyewitness      308.db7cb97     Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.        https://github.com/ChrisTruncer/EyeWitness
    facebot         23.57f6025      A facebook profile and reconnaissance system.   https://github.com/pun1sh3r/facebot
    facebrute       7.ece355b       This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).       https://github.com/emerinohdz/FaceBrute
    fakeap  0.3.2   Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames.     http://www.blackalchemy.to/project/fakeap/
    fakedns         36.90bd7e1      A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses.       https://github.com/Crypt0s/FakeDns
    fakemail        1.0     Fake mail server that captures e-mails as files for acceptance testing.         http://sourceforge.net/projects/fakemail/
    fakenetbios     7.b83701e       A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.        https://github.com/mubix/FakeNetBIOS
    fang    16.b5cb86d      A multi service threaded MD5 cracker.   https://github.com/evilsocket/fang
    faraday         858.bf9c1a3     A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.   http://www.faradaysec.com/
    fbht    53.9e515ef      A Facebook Hacking Tool         https://github.com/chinoogawa/fbht-linux
    fbid    11.b8106f8      Show info about the author by facebook photo url.       https://github.com/guelfoweb/fbid
    fcrackzip       1.0     Zip file password cracker       http://oldhome.schmorp.de/marc/fcrackzip.html
    fern-wifi-cracker       221     WEP, WPA wifi cracker for wireless penetration testing  http://code.google.com/p/fern-wifi-cracker/
    fernmelder      6.c6d4ebe       Asynchronous mass DNS scanner.  https://github.com/stealth/fernmelder
    fgscanner       11.893372c      An advanced, opensource URL scanner.    http://www.fantaghost.com/fgscanner
    fhttp   1.3     This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.  http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html
    fierce  0.9.9   A DNS scanner   http://ha.ckers.org/fierce/
    fiked   0.0.5   Fake IDE daemon         http://www.roe.ch/FakeIKEd
    filibuster      161.37b7f9c     A Egress filter mapping application with additional functionality.      https://github.com/subinacls/Filibuster
    fimap   1.00    A little tool for local and remote file inclusion auditing and exploitation     http://code.google.com/p/fimap/
    findmyhash      1.1.2   Crack different types of hashes using free online services      http://code.google.com/p/findmyhash/
    firewalk        5.0     An active reconnaissance network security tool  http://packetfactory.openwall.net/projects/firewalk/
    firmware-mod-kit        099     Modify firmware images without recompiling.     http://code.google.com/p/firmware-mod-kit
    firstexecution  6.a275793       A Collection of different ways to execute code outside of the expected entry points.    https://github.com/nccgroup/firstexecution
    fl0p    0.1     A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks.        http://lcamtuf.coredump.cx/
    flare   0.6     Flare processes an SWF and extracts all scripts from it.        http://www.nowrap.de/flare.html
    flasm   1.62    Disassembler tool for SWF bytecode      http://www.nowrap.de/flasm.html
    flawfinder      1.31    Searches through source code for potential security flaws.      http://www.dwheeler.com/flawfinder
    flowinspect     94.01c8921      A network traffic inspection tool.      https://github.com/7h3rAm/flowinspect
    flunym0us       2.0     A Vulnerability Scanner for Wordpress and Moodle.       http://code.google.com/p/flunym0us/
    foremost        1.5.7   A console program to recover files based on their headers, footers, and internal data structures        http://foremost.sourceforge.net/
    forkingportscanner      1       Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.      http://magikh0e.xyz/
    fpdns   20130404        Program that remotely determines DNS server versions.   https://github.com/kirei/fpdns
    fping   3.10    A utility to ping multiple hosts at once        http://www.fping.org/
    fport   2.0     Identify unknown open ports and their associated applications.  http://www.foundstone.com/us/resources/proddesc/fport.htm
    fprotlogparser  1       This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.        http://magikh0e.xyz/
    fraud-bridge    10.775c563      ICMP and DNS tunneling via IPv4 and IPv6.       https://github.com/stealth/fraud-bridge
    freeipmi        1.4.8   Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).   http://www.gnu.org/software/freeipmi/
    freeradius      3.0.6   The premier open source RADIUS server   http://www.freeradius.org/
    frisbeelite     1.2     A GUI-based USB device fuzzer.  https://github.com/nccgroup/FrisbeeLite
    fs-nyarl        1.0     A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.    http://www.fulgursecurity.com/en/content/fs-nyarl
    fsnoop  3.3     A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").        http://vladz.devzero.fr/fsnoop.php
    fstealer        0.1     Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.        http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html
    ftester         1.0     A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.      http://www.inversepath.com/ftester.html
    ftp-fuzz        1337    The master of all master fuzzing scripts specifically targeted towards FTP server sofware.      http://nullsecurity.net/tools/fuzzer.html
    ftp-scanner     0.2.5   Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris.   http://wayreth.eu.org/old_page/
    ftp-spider      1.0     FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.   http://packetstormsecurity.com/files/35120/ftp-spider.pl.html
    ftpmap  0.4     scans remote FTP servers to identify what software and what versions they are running.  http://wcoserver.googlecode.com/files/
    fusil   1.5     A Python library used to write fuzzing programs.        http://bitbucket.org/haypo/fusil/wiki/Home
    fuzzap  14.f13932c      A python script for obfuscating wireless networks.      https://github.com/lostincynicism/FuzzAP
    fuzzball2       0.7     A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.      http://nologin.org/
    fuzzdb  1.09    Attack and Discovery Pattern Database for Application Fuzz Testing      https://code.google.com/p/fuzzdb/
    fuzzdiff        1.0     A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.    http://vsecurity.com/resources/tool
    fuzztalk        1.0.0.0         An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.        https://code.google.com/p/fuzztalk
    g72x++  1       Decoder for the g72x++ codec.   http://www.ps-auxw.de/
    galleta         20040505_1      Examine the contents of the IE's cookie files for forensic purposes     http://www.jonesdykstra.com/
    gdb     7.8.2   The GNU Debugger        http://www.gnu.org/software/gdb/
    genlist         0.1     Generates lists of IP addresses.        
    geoedge         0.2     This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).    
    geoip   1.6.2   Non-DNS IP-to-country resolver C library & utils        http://www.maxmind.com/app/c
    geoipgen        0.4     GeoIPgen is a country to IP addresses generator.        http://code.google.com/p/geoipgen/
    getsids         0.0.1   Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing lsnrctl service.    http://www.cqure.net/wp/getsids/
    gggooglescan    0.4     A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.      http://www.morningstarsecurity.com/research/gggooglescan
    ghettotooth     1.0     Ghettodriving for bluetooth     http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
    ghost-phisher   1.62    GUI suite for phishing and penetration attacks  http://code.google.com/p/ghost-phisher
    ghost-py        0.1b3   Webkit based webclient (relies on PyQT).        http://jeanphix.github.com/Ghost.py/
    giskismet       20110805        A program to visually represent the Kismet data in a flexible manner.   http://www.giskismet.org
    gnuradio        3.7.6.1         General purpose DSP and SDR toolkit. With drivers for usrp and fcd.     http://gnuradio.org
    gnutls2         2.12.23         A library which provides a secure layer over a reliable transport layer (Version 2)     http://gnutls.org/
    goldeneye       16.7a38fe9      A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.       https://github.com/jseidl/GoldenEye
    golismero       2.0     Opensource web security testing framework.      https://github.com/golismero/golismero
    goodork         2.2     A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.   http://goo-dork.blogspot.com/
    goofile         1.5     Command line filetype search    https://code.google.com/p/goofile/
    goog-mail       1.0     Enumerate domain emails from google.    http://www.darkc0de.com/others/goog-mail.py
    googlesub       1.2     A python script to find domains by using google dorks.  https://github.com/zombiesam/googlesub
    gooscan         1.0.9   A tool that automates queries against Google search appliances, but with a twist.       http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/
    gpredict        1.3     A real-time satellite tracking and orbit prediction application.        http://gpredict.oz9aec.net/
    gqrx    2.3.2   Interactive SDR receiver waterfall for many devices.    http://gqrx.dk/
    grabber         0.1     A web application scanner. Basically it detects some kind of vulnerabilities in your website.   http://rgaucher.info/beta/grabber/
    grepforrfi      0.1     Simple script for parsing web logs for RFIs and Webshells v1.2  http://www.irongeek.com/downloads/grepforrfi.txt
    grokevt         0.5.0   A collection of scripts built for reading Windows NT/2K/XP/2K eventlog files.         http://code.google.com/p/grokevt/
    gtalk-decode    0.1     Google Talk decoder tool that demonstrates recovering passwords from accounts.  http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html
    gtp-scan        0.7     A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.      http://www.c0decafe.de/
    guymager        0.7.4   A forensic imager for media acquisition.        http://guymager.sourceforge.net/
    gwcheck         0.1     A simple program that checks if a host in an ethernet network is a gateway to Internet.         http://packetstormsecurity.com/files/62047/gwcheck.c.html
    gwtenum         7.f27a5aa       Enumeration of GWT-RCP method calls.    http://www.gdssecurity.com/l/t/d.php?k=GwtEnum
    hackersh        0.2.0   A shell for with Pythonect-like syntax, including wrappers for commonly used security tools     http://www.hackersh.org/
    halberd         0.2.4   Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.  http://halberd.superadditive.com/
    halcyon         0.1     A repository crawler that runs checksums for static files found within a given git repository.  http://www.blackhatlibrary.net/Halcyon
    hamster         2.0.0   Tool for HTTP session sidejacking.      http://hamster.erratasec.com/
    handle  0.0     An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..  http://www.tarasco.org/security/handle/index.html
    hasere  1.0     Discover the vhosts using google and bing.      https://github.com/galkan/hasere
    hash-identifier         1.1     Identifies the different types of hashes used to encrypt data, especially passwords     http://code.google.com/p/hash-identifier
    hashcat         0.49    A multithreaded cross platform hash cracker.    http://hashcat.net/hashcat/
    hashcat-utils   1.1     Utilites for Hashcat    http://hashcat.net/wiki/doku.php?id=hashcat_utils
    hasher  33.17592ed      A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.    https://github.com/ChrisTruncer/Hasher
    hashfind        8.e9a9a14       A tool to search files for matching password hash types and other interesting data.     https://github.com/rurapenthe/hashfind
    hashid  315.3f9cddf     Software to identify the different types of hashes used to encrypt data.        https://github.com/psypanda/hashID
    hashpump        34.0b3c286      A tool to exploit the hash length extension attack in various hashing algorithms.       https://github.com/bwall/HashPump
    hashtag         0.41    A python script written to parse and identify password hashes.  https://github.com/SmeegeSec/HashTag
    haystack        1035.ac2ffa4    A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.  https://github.com/trolldbois/python-haystack
    hbad    1.0     This tool allows you to test clients on the heartbleed bug.     http://www.curesec.com/
    hcraft  1.0.0   HTTP Vuln Request Crafter       http://sourceforge.net/projects/hcraft/
    hdcp-genkey     18.e8d342d      Generate HDCP source and sink keys from the leaked master key.  https://github.com/rjw57/hdcp-genkey
    hdmi-sniff      5.f7fbc0e       HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.        https://github.com/ApertureLabsLtd/hdmi-sniff
    heartbleed-honeypot     0.1     Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's  http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
    hex2bin         1.0.12  Converts Motorola and Intel hex files to binary.        http://hex2bin.sourceforge.net/
    hexinject       1.5     A very versatile packet injector and sniffer that provides a command-line framework for raw network access.     http://hexinject.sourceforge.net
    hexorbase       6       A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).  https://code.google.com/p/hexorbase/
    hharp   1beta   This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.   http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html
    hidattack       0.1     HID Attack (attacking HID host implementations)         http://mulliner.org/bluetooth/hidattack.php
    honeyd  1.6.7   A small daemon that creates virtual hosts on a network.         https://github.com/DataSoft/Honeyd/
    honssh  49.0c06ee8      A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.       https://code.google.com/p/honssh/
    hookanalyser    3.1     A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.         http://hookanalyser.blogspot.de/
    host-extract    9       Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.         https://code.google.com/p/host-extract/
    hostbox-ssh     0.1.1   A ssh password/account scanner.         http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/
    hotpatch        0.2     Hot patches executables on Linux using .so file injection.      http://www.selectiveintellect.com/hotpatch.html
    hotspotter      0.4     Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.    http://www.remote-exploit.org/?page_id=418
    hpfeeds         138.249b2f7     Honeynet Project generic authenticated datafeed protocol.       https://github.com/rep/hpfeeds
    hping   3.0.0   A command-line oriented TCP/IP packet assembler/analyzer.       http://www.hping.org
    hqlmap  35.081395e      A tool to exploit HQL Injections.       https://github.com/PaulSec/HQLmap
    htexploit       0.77    A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process    http://www.mkit.com.ar/labs/htexploit/
    htrosbif        134.9dc3f86     Active HTTP server fingerprinting and recon tool.       https://github.com/lkarsten/htrosbif
    htshells        760b5e9         Self contained web shells and other attacks via .htaccess files.        https://github.com/wireghoul/htshells
    http-enum       0.3     A tool to enumerate the enabled HTTP methods supported on a webserver.  https://www.thexero.co.uk/tools/http-enum/
    http-fuzz       0.1     A simple http fuzzer.   none
    http-put        1.0     Simple http put perl script    
    http-traceroute         0.5     This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.  http://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html
    httpbog         1.0.0.0         A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.     http://sourceforge.net/projects/httpbog/
    httpforge       11.02.01        A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.         http://packetstormsecurity.com/files/98109/HTTPForge.02.01.html
    httping         2.3.4   A 'ping'-like tool for http-requests.   http://www.vanheusden.com/httping/
    httprint        301     A web server fingerprinting tool.       http://www.net-square.com/httprint.html
    httprint-win32  301     A web server fingerprinting tool (Windows binaries).    http://net-square.com/httprint
    httpry  0.1.8   A specialized packet sniffer designed for displaying and logging HTTP traffic.  http://dumpsterventures.com/jason/httpry/
    httpsniff       0.4     Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.      http://www.sump.org/projects/httpsniff/
    httpsscanner    1.2     A tool to test the strength of a SSL web server.        https://code.google.com/p/libre-tools/
    httptunnel      3.3     Creates a bidirectional virtual data connection tunnelled in HTTP requests      http://www.nocrew.org/software/httptunnel
    hulk    11.a9b9ad4      A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.    https://github.com/grafov/hulk
    hwk     0.4     Collection of packet crafting and wireless network flooding tools       http://www.nullsecurity.net/
    hydra   8.1     A very fast network logon cracker which support many different services.        http://www.thc.org/thc-hydra/
    hyenae  0.36_1  flexible platform independent packet generator  http://sourceforge.net/projects/hyenae/
    hyperfox        45.79ffeb5      A security tool for proxying and recording HTTP and HTTPs traffic.      https://hyperfox.org/
    hyperion        1.2     A runtime encrypter for 32-bit portable executables.    http://nullsecurity.net/tools/binary.html
    iaxflood        0.1     IAX flooder.    http://www.hackingexposedvoip.com/
    iaxscan         0.02    A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.        http://code.google.com/p/iaxscan/
    ibrute  12.3a6a11e      An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.       https://github.com/hackappcom/ibrute/
    icmpquery       1.0     Send and receive ICMP queries for address mask and current time.        http://www.angio.net/security/
    icmptx  0.01    IP over ICMP    http://thomer.com/icmptx/
    idswakeup       1.0     A collection of tools that allows to test network intrusion detection systems.  http://www.hsc.fr/ressources/outils/idswakeup/index.html.en
    iheartxor       0.01    iheartxor is a tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.    http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html
    iisbruteforcer  15      HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server.    http://www.open-labs.org/
    ike-scan        1.9     A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers       http://www.nta-monitor.com/tools/ike-scan/
    ikecrack        1.00    An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication     http://sourceforge.net/projects/ikecrack/
    ikeprobe        0.1     Determine vulnerabilities in the PSK implementation of the VPN server.  http://www.ernw.de/download/ikeprobe.zip
    ikeprober       1.12    Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors    http://ikecrack.sourceforge.net/
    ilty    1.0     An interception phone system for VoIP network.  http://chdir.org/~nico/ilty/
    imagejs         48.1faf262      Small tool to package javascript into a valid image file.       https://github.com/jklmnn/imagejs
    inception       418.48b6072     A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.  http://www.breaknenter.org/projects/inception/
    indxparse       162.83dae16     A Tool suite for inspecting NTFS artifacts.     http://www.williballenthin.com/forensics/mft/indxparse/
    inetsim         1.2.5   A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.     http://www.inetsim.org
    infip   0.1     A python script that checks output from netstat against RBLs from Spamhaus.     http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html
    inguma  0.1.1   A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.     http://inguma.sourceforge.net
    intercepter-ng  0.9.8   A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.   http://intercepter.nerf.ru/#down
    interrogate     0.0.4   A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.    https://github.com/carmaa/interrogate
    intersect       2.5     Post-exploitation framework     https://github.com/ohdae/Intersect.5
    intrace         1.5     Traceroute-like application piggybacking on existing TCP connections    http://intrace.googlecode.com
    inundator       0.5     An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.    http://inundator.sourceforge.net/
    inurlbr         13.66de321      Advanced search in the search engines - Inurl scanner, dorker, exploiter.       https://code.google.com/p/inurlbr/
    inviteflood     2.0     Flood a device with INVITE requests     https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635
    iodine  0.7.0   Tunnel IPv4 data through a DNS server   http://code.kryo.se/iodine
    iosforensic     1.0     iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic    https://github.com/Flo354/iOSForensic
    ip-https-tools  5.b22e2b3       Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.      https://github.com/takeshixx/ip-https-tools
    ipaudit         1.0rc9  Monitors network activity on a network.         http://ipaudit.sourceforge.net
    ipba2   032013  IOS Backup Analyzer     http://www.ipbackupanalyzer.com/
    ipdecap         69.f3a08f6      Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.       http://www.loicp.eu/ipdecap#dependances
    iphoneanalyzer  2.1.0   Allows you to forensically examine or recover date from in iOS device.  http://www.crypticbit.com/zen/products/iphoneanalyzer
    ipscan  3.3.2   Angry IP scanner is a very fast IP address and port scanner.    http://www.angryziber.com/
    iputils         20121221        Network monitoring tools, including ping        http://www.skbuff.net/iputils/
    ipv6toolkit     2.0beta         SI6 Networks' IPv6 Toolkit      http://www.si6networks.com/tools/ipv6toolkit/
    ircsnapshot     93.9ba3c6c      Tool to gather information from IRC servers.    https://github.com/bwall/ircsnapshot
    irpas   0.10    Internetwork Routing Protocol Attack Suite.     http://phenoelit-us.org/irpas
    isr-form        1.0     Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.      http://www.infobyte.com.ar/
    jad     1.5.8e  Java decompiler         http://www.varaneckas.com/jad
    jadx    0.5.4   Dex to Java command line and GUI decompiler tool that produces Java source code from Android Dex and APK files.         https://github.com/skylot/jadx
    javasnoop       1.1     A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer        https://code.google.com/p/javasnoop/
    jboss-autopwn   1.3bc2d29       A JBoss script for obtaining remote shell access.       https://github.com/SpiderLabs/jboss-autopwn
    jbrofuzz        2.5     Web application protocol fuzzer that emerged from the needs of penetration testing.     http://sourceforge.net/projects/jbrofuzz/
    jbrute  0.99    Open Source Security tool to audit hashed passwords.    http://sourceforge.net/projects/jbrute/
    jd-gui  0.3.5   A standalone graphical utility that displays Java source codes of .class files  http://java.decompiler.free.fr/?q=jdgui
    jhead   2.97    EXIF JPEG info parser and thumbnail remover     http://www.sentex.net/~mwandel/jhead/
    jigsaw  1.3     A simple ruby script for enumerating information about a company's employees. It is useful for Social Engineering or Email Phishing.    https://github.com/pentestgeek/jigsaw
    jnetmap         0.5.3   A network monitor of sorts      http://www.rakudave.ch/jnetmap/?file=introduction
    john    1.7.9   John The Ripper - A fast password cracker (jumbo included)      http://www.openwall.com/john/
    johnny  20120424        GUI for John the Ripper.        http://openwall.info/wiki/john/johnny
    jomplug         0.1     This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.  http://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html
    joomlascan      1.2     Joomla scanner scans for known vulnerable remote file inclusion paths and files.        http://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html
    joomscan        2012.03.10      Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.  http://joomscan.sourceforge.net/
    js-beautify     1.5.4   This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.   https://github.com/einars/js-beautify
    jsql    0.6     A lightweight application used to find database information from a distant server.      https://code.google.com/p/jsql-injection/
    junkie  1338.baa4524    A modular packet sniffer and analyzer.  https://github.com/securactive/junkie
    jwscan  6.b0306f0       Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.  https://github.com/katjahahn/JWScan
    jynx2   2.0     An expansion of the original Jynx LD_PRELOAD rootkit    http://www.blackhatlibrary.net/Jynx2
    kalibrate-rtl   11.aae11c8      Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices.         https://github.com/steve-m/kalibrate-rtl
    katsnoop        0.1     Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.   http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html
    kautilya        0.5.5   Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.   https://github.com/samratashok/Kautilya/releases
    keimpx  163.2df1eb2     Tool to verify the usefulness of credentials across a network over SMB.         http://code.google.com/p/keimpx/
    khc     0.2     A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.         http://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html
    killerbee       85      Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.   https://code.google.com/p/killerbee/
    kippo   0.9     A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.       https://github.com/desaster/kippo
    kismet  2013_03_R1b     802.11 layer2 wireless network detector, sniffer, and intrusion detection system        http://www.kismetwireless.net/
    kismet-earth    0.1     Various scripts to convert kismet logs to kml file to be used in Google Earth.  http://
    kismet2earth    1.0     A set of utilities that convert from Kismet logs to Google Earth .kml format    http://code.google.com/p/kismet2earth/
    klogger         1.0     A keystroke logger for the NT-series of Windows.        http://ntsecurity.nu/toolbox/klogger/
    knock   27.b1acf04      Subdomain scanner.      https://github.com/guelfoweb/knock
    kolkata         3.0     A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.    http://www.blackhatlibrary.net/Kolkata
    kraken  32.368a837      A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.    http://opensource.srlabs.de/projects/a51-decrypt
    laf     12.7a456b3      Login Area Finder: scans host/s for login panels.       https://github.com/takeshixx/laf
    lanmap2         124.4f8afed     Passive network mapping tool    http://github.com/rflynn/lanmap2
    lans    164.36797ad     A Multithreaded asynchronous packet parsing/injecting arp spoofer.      https://github.com/DanMcInerney/LANs.py
    latd    1.31    A LAT terminal daemon for Linux and BSD.        http://sourceforge.net/projects/linux-decnet/files/latd/1.31/
    laudanum        1.0     A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.         http://laudanum.inguardians.com/#
    lbd     20130719        Load Balancing detector         http://ge.mine.nu/code/lbd
    lbmap   145.93e6b71     Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.       https://github.com/wireghoul/lbmap
    ldap-brute      21.acc06e3      A semi fast tool to bruteforce values of LDAP injections over HTTP.     https://github.com/droope/ldap-brute
    ldapenum        0.1     Enumerate domain controllers using LDAP.        https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/
    leo     5.0     Literate programmer's editor, outliner, and project manager.    http://webpages.charter.net/edreamleo/front.html
    leroy-jenkins   0.r3.bdc3965    A python tool that will allow remote execution of commands on a Jenkins server and its nodes.   https://github.com/captainhooligan/Leroy-Jenkins
    levye   84.5406303      A brute force tool which is support sshkey, vnckey, rdp, openvpn.       https://github.com/galkan/levye
    lfi-autopwn     3.0     A Perl script to try to gain code execution on a remote server via LFI  http://www.blackhatlibrary.net/Lfi_autopwn.pl
    lfi-exploiter   1.1     This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..   http://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html
    lfi-fuzzploit   1.1     A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.      http://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html
    lfi-scanner     4.0     This is a simple perl script that enumerates local file inclusion attempts when given a specific target.        http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html
    lfi-sploiter    1.0     This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.   http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html
    lfimap  1.4.8   This script is used to take the highest beneficts of the local file include vulnerability in a webserver.       https://code.google.com/p/lfimap/
    lft     3.73    A layer four traceroute implementing numerous other features.   http://pwhois.org/lft/
    libdisasm       0.23    A disassembler library.         http://bastard.sourceforge.net/libdisasm.html
    libpst  0.6.63  Outlook .pst file converter     http://www.five-ten-sg.com/libpst/
    liffy   63.238ce6d      A Local File Inclusion Exploitation tool.       https://github.com/rotlogix/liffy
    linenum         18.b4c2541      Scripted Local Linux Enumeration & Privilege Escalation Checks  https://github.com/rebootuser/LinEnum
    linset  9.8746b1f       Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.    https://github.com/vk496/linset
    linux-exploit-suggester         32.9db2f5a      A Perl script that tries to suggest exploits based OS version number.   https://github.com/PenturaLabs/Linux_Exploit_Suggester
    lisa.py         28.5b3156b      An Exploit Dev Swiss Army Knife.        https://github.com/ant4g0nist/lisa.py
    list-urls       0.1     Extracts links from webpage     http://www.whoppix.net
    littleblackbox  0.1.3   Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.      http://code.google.com/p/littleblackbox/wiki/FAQ
    lldb    3.5.1   The LLDB Debugger.      http://llvm.org/
    lodowep         1.2.1   Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.       http://www.cqure.net/wp/lodowep/
    logkeys         0.1.1a  Simple keylogger supporting also USB keyboards.         http://logkeys.googlecode.com/
    loki    0.2.7   Python based framework implementing many packet generation and attack modules for Layer 2 and 3 protocols.      http://c0decafe.de/loki.html
    lorcon  2.0.0.20091101  Generic library for injecting 802.11 frames     http://802.11ninja.net/
    lotophagi       0.1     a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.     http://packetstormsecurity.com/files/55250/lotophagi.rar.html
    lsrtunnel       0.2     lsrtunnel spoofs connections using source routed packets.       http://www.synacklabs.net/projects/lsrtunnel/
    lte-cell-scanner        57.5fa3df8      LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).   https://github.com/Evrytania/LTE-Cell-Scanner
    luksipc         0.01    A tool to convert unencrypted block devices to encrypted LUKS devices in-place.         http://www.johannes-bauer.com/linux/luksipc
    luyten  0.4.4   An Open Source Java Decompiler Gui for Procyon.         https://github.com/deathmarine/Luyten
    lynis   1.6.4   An auditing tool for Unix (specialists).        http://www.rootkit.nl/projects/lynis.html
    mac-robber      1.02    A digital investigation tool that collects data from allocated files in a mounted file system.  http://www.sleuthkit.org/mac-robber/download.php
    macchanger      1.6.0   A small utility to change your NIC's MAC address        http://ftp.gnu.org/gnu/macchanger
    maclookup       0.3     Lookup MAC addresses in the IEEE MA-L/OUI public listing.       https://github.com/paraxor/maclookup
    magicrescue     1.1.9   Find and recover deleted files on block devices         http://freshmeat.net/projects/magicrescue/
    magictree       1.3     A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation        http://www.gremwell.com
    make-pdf        0.1.5   This tool will embed javascript inside a PDF document.  http://blog.didierstevens.com/programs/pdf-tools/
    makepasswd      1.10_9  Generates true random passwords with the emphasis on security over pronounceability (Debian version)    http://packages.qa.debian.org/m/makepasswd.html
    malheur         0.5.4   A tool for the automatic analyze of malware behavior.   http://www.mlsec.org/malheur/
    maligno         1.5     An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS.   http://www.encripto.no/tools/
    malmon  0.3     Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.     http://sourceforge.net/projects/malmon/
    maltego         3.5.3   An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.  http://www.paterva.com/web5
    maltrieve       175.8c68c7e     Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.       https://github.com/technoskald/maltrieve
    malware-check-tool      1.2     Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.     http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html
    malwareanalyser         3.3     A freeware tool to perform static and dynamic analysis on malware.      http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html
    malwaredetect   0.1     Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware     http://www.virustotal.com
    malwasm         0.2     Offline debugger for malware's reverse engineering.     https://code.google.com/p/malwasm/
    malybuzz        1.0     A Python tool focused in discovering programming faults in network software.    http://eternal-todo.com/tools/malybuzz-network-fuzzer
    marc4dasm       6.f11860f       This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).   https://github.com/ApertureLabsLtd/marc4dasm
    maskprocessor   0.72    A High-Performance word generator with a per-position configurable charset.     http://hashcat.net/wiki/doku.php?id=maskprocessor
    masscan         391.a60cc70     TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.        https://github.com/robertdavidgraham/masscan
    mat     0.5.2   Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.  https://mat.boum.org/
    matahari        0.1.30  A reverse HTTP shell to execute commands on remote machines behind firewalls.   http://matahari.sourceforge.net
    mausezahn       0.40    A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.        http://www.perihel.at/sec/mz/
    mbenum  1.5.0   Queries the master browser for whatever information it has registered.  http://www.cqure.net/wp/mbenum/
    mboxgrep        0.7.9   A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.   http://mboxgrep.sourceforge.net
    md5deep         4.3     Advanced checksum hashing tool  http://md5deep.sourceforge.net
    mdbtools        0.7.1   Utilities for viewing data and exporting schema from Microsoft Access Database files    http://sourceforge.net/projects/mdbtools/
    mdcrack         1.2     MD4/MD5/NTLM1 hash cracker      http://c3rb3r.openwall.net/mdcrack/
    mdk3    6       WLAN penetration tool   http://homepages.tu-darmstadt.de/~p_larbig/wlan/
    mdns-scan       0.5     Scan mDNS/DNS-SD published services on the local network.      
    medusa  2.1.1   A speedy, massively parallel, modular, login brute-forcer for network.  http://www.foofus.net/jmk/medusa/medusa.html
    melkor  1.0     An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).  http://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html
    memdump         1.01    Dumps system memory to stdout, skipping over holes in memory maps.      http://www.porcupine.org/forensics/tct.html
    memfetch        0.05b   dumps any userspace process memory without affecting its execution      http://lcamtuf.coredump.cx/
    metacoretex     0.8.0   MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.         http://metacoretex.sourceforge.net/
    metagoofil      1.4b    An information gathering tool designed for extracting metadata of public documents      http://www.edge-security.com/metagoofil.php
    metasploit      30949.ce688f4   An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.    http://www.metasploit.com
    meterssh        10.ebb6f4e      A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.    https://github.com/trustedsec/meterssh
    metoscan        05      Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.   http://www.open-labs.org/
    mfcuk   0.3.8   MIFARE Classic Universal toolKit        http://code.google.com/p/mfcuk/
    mfoc    0.10.7  Mifare Classic Offline Cracker  http://code.google.com/p/mfoc/
    mfsniffer       0.1     A python script for capturing unencrypted TSO login credentials.        http://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html
    mibble  2.9.3   Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.  http://www.mibble.org/
    middler         1.0     A Man in the Middle tool to demonstrate protocol middling attacks.      http://code.google.com/p/middler/
    mikrotik-npk    7.88d7e4b       Python tools for manipulating Mikrotik NPK format.      https://github.com/kost/mikrotik-npk
    minimysqlator   0.5     A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.    http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r
    miranda-upnp    1.3     A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices      http://code.google.com/p/miranda-upnp/
    miredo  1.2.6   Teredo client and server.       http://www.remlab.net/miredo/
    missidentify    1.0     A program to find Win32 applications.   http://missidentify.sourceforge.net/
    missionplanner  1.2.55  A GroundControl Station for Ardupilot.  https://code.google.com/p/ardupilot-mega/wiki/Mission
    mitmap  0.1     Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.        http://www.darkoperator.com/tools-and-scripts/
    mitmer  22.b01c7fe      A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.   https://github.com/husam212/MITMer
    mitmf   186.3f6bbb8     A Framework for Man-In-The-Middle attacks written in Python.    https://github.com/byt3bl33d3r/MITMf
    mitmproxy       0.11.1  SSL-capable man-in-the-middle HTTP proxy.       http://mitmproxy.org/
    mkbrutus        1.0.2   Password bruteforcer for MikroTik devices or boxes running RouterOS.    http://mkbrutusproject.github.io/MKBRUTUS/
    mobiusft        0.5.21  An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.   http://savannah.nongnu.org/projects/mobiusft
    modscan         0.1     A new tool designed to map a SCADA MODBUS TCP based network.    https://code.google.com/p/modscan/
    moloch  0.9.2   An open source large scale IPv4 full PCAP capturing, indexing and database system.      https://github.com/aol/moloch
    monocle         1.0     A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.        http://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html
    morxbook        1.0     A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.        http://www.morxploit.com/
    morxbrute       1.01    A customizable HTTP dictionary-based password cracking tool written in Perl     http://www.morxploit.com/morxbrute/
    morxbtcrack     1.0     Single Bitcoin private key cracking tool released.      http://www.morxploit.com/tools/
    morxcoinpwn     1.0     Mass Bitcoin private keys brute forcing/Take over tool released.        http://www.morxploit.com/tools/
    morxcrack       1.2     A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.     http://www.morxploit.com/morxcrack/
    morxkeyfmt      1.0     Read a private key from stdin and output formatted data values.         http://www.morxploit.com/tools/
    morxtraversal   1.0     Path Traversal checking tool.   http://www.morxploit.com/tools/
    morxtunnel      1.0     Network Tunneling using TUN/TAP interfaces over TCP tool.       http://www.morxploit.com/tools/
    mp3nema         0.4     A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data.     http://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html
    mptcp   1.9.0   A tool for manipulation of raw packets that allows a large number of options.   http://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html
    mptcp-abuse     6.b0eeb27       A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.         https://github.com/Neohapsis/mptcp-abuse
    ms-sys  2.5.0   A tool to write Win9x-.. master boot records (mbr) under linux - RTM!   http://ms-sys.sourceforge.net/
    mssqlscan       0.8.4   A small multi-threaded tool that scans for Microsoft SQL Servers.       http://www.cqure.net/wp/mssqlscan/
    msvpwn  65.328921b      Bypass Windows' authentication via binary patching.     https://bitbucket.org/mrabault/msvpwn
    mtr     0.86    Combines the functionality of traceroute and ping into one tool (CLI version)   http://www.bitwizard.nl/mtr/
    multiinjector   0.3     Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.   http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html
    multimac        1.0.3   Multiple MACs on an adapter     http://sourceforge.net/projects/multimac/
    multitun        43.9804513      Tunnel arbitrary traffic through an innocuous WebSocket.        https://github.com/covertcodes/multitun
    mutator         51.164132d      This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012   https://bitbucket.org/alone/mutator/
    mwebfp  16.a800b98      Mass Web Fingerprinter.         https://github.com/falcon-lnhg/mwebfp
    mysql2sqlite    14.e5b2c31      Converts a mysqldump file into a Sqlite 3 compatible file.      https://gist.github.com/esperlu/943776
    nacker  23.b67bb39      A tool to circumvent 802.1x Network Access Control on a wired LAN.      https://github.com/carmaa/nacker
    nbnspoof        1.0     NBNSpoof - NetBIOS Name Service Spoofer         http://www.mcgrewsecurity.com/tools/nbnspoof/
    nbtenum         3.3     A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.      http://reedarvin.thearvins.com/
    nbtool  2.bf90c76       Some tools for NetBIOS and DNS investigation, attacks, and communication.       http://wiki.skullsecurity.org/Nbtool
    nbtscan         1.5.1   NBTscan is a program for scanning IP networks for NetBIOS name information.     http://www.inetcat.net/software/nbtscan.html
    ncpfs   2.2.6   Allows you to mount volumes of NetWare servers under Linux.     http://www.novell.com/
    ncrack  0.4a    A high-speed network authentication cracking tool       http://nmap.org/ncrack/
    neighbor-cache-fingerprinter    83.f1e596f      An ARP based Operating System version scanner.  https://github.com/PherricOxide/Neighbor-Cache-Fingerprinter
    nemesis         1.4     command-line network packet crafting and injection utility      http://nemesis.sourceforge.net/
    netactview      0.6.3   A graphical network connections viewer for Linux similar in functionality with Netstat  http://netactview.sourceforge.net/index.html
    netbios-share-scanner   1.0     This tool could be used to check windows workstations and servers if they have accessible shared resources.     http://www.secpoint.com/netbios-share-scanner.html
    netcommander    1.3     An easy-to-use arp spoofing tool.       https://github.com/evilsocket/netcommander
    netcon  0.1     A network connection establishment and management script.       http://www.paramecium.org/~leendert/
    netdiscover     0.3     An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.         http://nixgeneration.com/~jaime/netdiscover/
    netmap  0.1.3   Can be used to make a graphical representation of the surounding network.       http://netmap.sourceforge.net
    netmask         2.3.12  Helps determine network masks   http://packages.qa.debian.org/n/netmask.html
    netreconn       1.76    A collection of network scan/recon tools that are relatively small compared to their larger cousins.    http://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html
    netscan         1.0     Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).  http://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html
    netsed  1.2     Small and handful utility design to alter the contents of packets forwarded thru network in real time.  http://silicone.homelinux.org/projects/netsed/
    netsniff-ng     0.5.9   A high performance Linux network sniffer for packet inspection.         http://netsniff-ng.org/
    network-app-stress-tester       19.df75391      Network Application Stress Testing Yammer.      https://github.com/PherricOxide/Network-App-Stress-Tester
    netzob  0.4.1   An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.         http://www.netzob.org/
    nfcutils        0.3.2   Provides a simple 'lsnfc' command that list tags which are in your NFC device field     http://code.google.com/p/nfc-tools
    nfex    2.5     A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.        https://code.google.com/p/nfex/
    nfspy   1.0     A Python library for automating the falsification of NFS credentials when mounting an NFS share.        https://github.com/bonsaiviking/NfSpy
    nfsshell        19980519        Userland NFS command tool.      http://www.paramecium.org/~leendert/
    ngrep   1.45    A grep-like utility that allows you to search for network packets on an interface.      http://ngrep.sourceforge.net/
    nield   0.6.0   A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.       http://nield.sourceforge.net/
    nikto   2.1.5   A web server scanner which performs comprehensive tests against web servers for multiple items  http://www.cirt.net/nikto2
    nimbostratus    54.c7c206f      Tools for fingerprintinging and exploiting Amazon cloud infrastructures.        https://github.com/andresriancho/nimbostratus
    nipper  0.11.7  Network Infrastructure Parser   https://www.titania-security.com/
    nishang         0.4.0   Using PowerShell for Penetration Testing.       https://code.google.com/p/nishang/
    nkiller2        2.0     A TCP exhaustion/stressing tool.        http://sock-raw.org/projects.html
    nmap    6.47    Utility for network discovery and security auditing     http://nmap.org/
    nmbscan         1.2.6   Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.  http://nmbscan.gbarbier.org/
    nomorexor       0.1     Tool to help guess a files 256 byte XOR key by using frequency analysis         https://github.com/hiddenillusion/NoMoreXOR
    notspikefile    0.1     A Linux based file format fuzzing tool  http://packetstormsecurity.com/files/39627/notSPIKEfile.tgz.html
    nsdtool         0.1     A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password.   http://www.curesec.com/en/publications/tools.html
    nsec3walker     20101223        Enumerates domain names using DNSSEC    http://dnscurve.org/nsec3walker.html
    nsia    1.0.6   A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.        http://threatfactor.com/Products/
    nsoq    1.9.5   A Network Security Tool for packet manipulation that allows a large number of options.  http://www.nsoq.org/
    ntds-decode     0.1     This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.  http://packetstormsecurity.com/files/121543/NTDS-Hash-Decoder.b.html
    o-saft  574.6dde441     A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.  https://www.owasp.org/index.php/O-Saft
    oat     1.3.1   A toolkit that could be used to audit security within Oracle database servers.  http://www.cqure.net/wp/test/
    obexstress      0.1     Script for testing remote OBEX service for some potential vulnerabilities.      http://bluetooth-pentest.narod.ru/
    obfsproxy       0.2.13  A pluggable transport proxy written in Python.  https://pypi.python.org/pypi/obfsproxy
    oclhashcat      1.33    Worlds fastest WPA cracker with dictionary mutation engine.     http://hashcat.net/oclhashcat/
    ocs     0.2     Compact mass scanner for Cisco routers with default telnet/enable passwords.    http://packetstormsecurity.com/files/119462/OCS-Cisco-Scanner.2.html
    ohrwurm         0.1     A small and simple RTP fuzzer.  http://mazzoo.de/
    oletools        0.08    Tools to analyze Microsoft OLE2 files.  http://www.decalage.info/python/oletools
    ollydbg         201g    A 32-bit assembler-level analysing debugger     http://www.ollydbg.de
    onesixtyone     0.7     An SNMP scanner that sends multiple SNMP requests to multiple IP addresses      http://labs.portcullis.co.uk/application/onesixtyone/
    onionshare      440.e78e21a     Securely and anonymously share a file of any size.      https://github.com/micahflee/onionshare/
    openstego       0.6.1   A tool implemented in Java for generic steganography, with support for password-based encryption of the data.   http://www.openstego.info/
    opensvp         64.56b2b8f      A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.       https://github.com/regit/opensvp
    ophcrack        3.6.0   A free Windows password cracker based on rainbow tables         http://ophcrack.sourceforge.net
    orakelcrackert  1.00    This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm.       http://freeworld.thc.org/thc-orakelcrackert11g/
    origami         1.2.7   Aims at providing a scripting tool to generate and analyze malicious PDF files.         http://code.google.com/p/origami-pdf
    oscanner        1.0.6   An Oracle assessment framework developed in Java.       http://www.cqure.net/wp/oscanner/
    ostinato        0.6     An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.      http://code.google.com/p/ostinato/
    osueta  65.90323e2      A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.   https://github.com/c0r3dump3d/osueta
    otori   0.3     A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities.    http://www.beneaththewaves.net/Software/On_The_Outside_Reaching_In.html
    outguess        0.2     A universal steganographic tool.        http://www.outguess.org/
    owabf   1.3     Outlook Web Access bruteforcer tool.    http://netsec.rs/70/tools.html
    owasp-bywaf     26.e730d1b      A web application penetration testing framework (WAPTF).        https://github.com/depasonico/OWASP-ByWaf
    owtf    1017.0bbeea1    The Offensive (Web) Testing Framework.  https://www.owasp.org/index.php/OWASP_OWTF
    p0f     3.08b   Purely passive TCP/IP traffic fingerprinting tool.      http://lcamtuf.coredump.cx/p0f3/
    pack    0.0.4   Password Analysis and Cracking Kit      http://thesprawl.org/projects/pack/
    packerid        1.4     Script which uses a PEiD database to identify which packer (if any) is being used by a binary.  http://handlers.sans.org/jclausing/
    packet-o-matic  351     A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.      http://www.packet-o-matic.org/
    packeth         1.7.2   A Linux GUI packet generator tool for ethernet.         http://packeth.sourceforge.net/
    packetsender    7.4a9afa6       An open source utility to allow sending and receiving TCP and UDP packets.      https://github.com/dannagle/PacketSender
    packit  1.0     A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.        http://packit.sourceforge.net/
    pacumen         1.92a0884       Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).      https://github.com/bniemczyk/pacumen
    padbuster       0.3.3   Automated script for performing Padding Oracle attacks.         http://www.gdssecurity.com/l/t.php
    paketto         1.10    Advanced TCP/IP Toolkit.        http://www.doxpara.com/paketto
    panhunt         26.cd58866      Searches for credit card numbers (PANs) in directories.         https://github.com/Dionach/PANhunt
    panoptic        179.770bc70     A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.         https://github.com/lightos/Panoptic
    paranoic        1.7     A simple vulnerability scanner written in Perl.         http://packetstormsecurity.com/files/128065/Paranoic-Scan.7.html
    paros   3.2.13  Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc.         http://www.parosproxy.org
    parsero         56.fc5f7ec      A robots.txt audit tool.        https://github.com/behindthefirewalls/Parsero
    pasco   20040505_1      Examines the contents of Internet Explorer's cache files for forensic purposes  http://www.jonesdykstra.com/
    passcracking    20131214        A little python script for sending hashes to passcracking.com and milw0rm       http://github.com/jensp/passcracking
    passe-partout   0.1     Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns.        http://www.hsc.fr/ressources/outils/passe-partout/index.html.en
    passhunt        5.332f374       Search drives for documents containing passwords.       https://github.com/Dionach/PassHunt
    passivedns      1.1.3   A network sniffer that logs all DNS server replies for use in a passive DNS setup.      https://github.com/gamelinux/passivedns
    pastenum        0.4.1   Search Pastebins for content, fork from nullthreat corelan pastenum2    http://github.com/shadowbq/pastenum
    patator         86.5c3cb0a      A multi-purpose bruteforcer.    https://github.com/lanjelot/patator
    pblind  1.0     Little utility to help exploiting blind sql injection vulnerabilities.  http://www.edge-security.com/pblind.php
    pcapfix         1.1.0   Tries to repair your broken pcap and pcapng files.      http://f00l.de/pcapfix/
    pcapsipdump     0.2     A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions).   http://pcapsipdump.sourceforge.net/
    pcredz  29.05ae40f      A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.         https://github.com/lgandx/PCredz
    pdf-parser      0.6.0   Parses a PDF document to identify the fundamental elements used in the analyzed file.   http://blog.didierstevens.com/programs/pdf-tools/
    pdfbook-analyzer        2       Utility for facebook memory forensics.  http://sourceforge.net/projects/pdfbook/
    pdfcrack        0.14    Password recovery tool for PDF-files.   http://pdfcrack.sourceforge.net/
    pdfid   0.2.1   Scan a file to look for certain PDF keywords.   http://blog.didierstevens.com/programs/pdf-tools/
    pdfresurrect    0.12    A tool aimed at analyzing PDF documents.        http://packetstormsecurity.com/files/118459/PDFResurrect-PDF-Analyzer.12.html
    pdgmail         1.0     A password dictionary attack tool that targets windows authentication via the SMB protocol      http://www.jeffbryner.com/code/pdgmail
    peach   3.0.202         A SmartFuzzer that is capable of performing both generation and mutation based fuzzing.         http://peachfuzzer.com/
    peda    51.327db44      Python Exploit Development Assistance for GDB.  https://github.com/longld/peda
    peepdf  0.3     A Python tool to explore PDF files in order to find out if the file can be harmful or not       http://eternal-todo.com/tools/peepdf-pdf-analysis-tool
    peframe         81.0c4a0d5      Tool to perform static analysis on (portable executable) malware.       https://github.com/guelfoweb/peframe
    pemcrack        10.34b0f85      Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.       https://github.com/robertdavidgraham/pemcrack
    pentbox         1.8     A security suite that packs security and stability testing oriented tools for networks and systems.     http://www.pentbox.net
    perl-image-exiftool     9.76    Reader and rewriter of EXIF informations that supports raw files        http://search.cpan.org/perldoc?exiftool
    perl-tftp       1.0b3   TFTP - TFTP Client class for perl       http://search.cpan.org/~gsm/TFTP/TFTP.pm
    pev     0.60    Command line based tool for PE32/PE32+ file analysis    http://pev.sourceforge.net/
    pextractor      0.18b   A forensics tool that can extract all files from an executable file created by a joiner or similar.     http://packetstormsecurity.com/files/62977/PExtractor_v0.18b_binary_and_src.rar.html
    pgdbf   94.baa1d95      Convert XBase / FoxPro databases to PostgreSQL  https://github.com/kstrauser/pgdbf
    phemail         27.7ae21f2      A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.    https://github.com/Dionach/PhEmail
    phoss   0.1.13  Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.   http://www.phenoelit.org/fr/tools.html
    php-mt-seed     3.2     PHP mt_rand() seed cracker      http://www.openwall.com/php_mt_seed/
    php-rfi-payload-decoder         30.bd42caa      Decode and analyze RFI payloads developed in PHP.       https://github.com/bwall/PHP-RFI-Payload-Decoder
    php-vulnerability-hunter        1.4.0.20        An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.   https://phpvulnhunter.codeplex.com/
    phpstress       5.f987a7e       A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.       https://github.com/nightlionsecurity/phpstress
    phrasendrescher         1.2.2   A modular and multi processing pass phrase cracking tool        http://www.leidecker.info/projects/phrasendrescher/
    pip3line        30.eae2260      The Swiss army knife of byte manipulation.      https://github.com/nccgroup/pip3line
    pipal   1.1     A password analyser     http://www.digininja.org/projects/pipal.php
    pirana  0.3.1   Exploitation framework that tests the security of a email content filter.       http://www.guay-leroux.com/projects.html
    plcscan         0.1     This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.        http://packetstormsecurity.com/files/119726/PLC-Device-Scanner.html
    plecost         2       Wordpress finger printer tool search and retrieve information about the plugins versions installed in Wordpress systems.        http://code.google.com/p/plecost/
    plown   13.ccf998c      A security scanner for Plone CMS.       https://github.com/unweb/plown
    pmcma   1.00    Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).      http://packetstormsecurity.com/files/104724/Post-Memory-Corruption-Memory-Analyzer.00.html
    pnscan  1.11    A parallel network scanner that can be used to survey TCP network services.     http://www.lysator.liu.se/~pen/pnscan/
    pompem  77.4e77ffd      A python exploit tool finder.   https://github.com/rfunix/Pompem
    portspoof       100.70b6bf2     This program's primary goal is to enhance OS security through a set of new techniques.  http://portspoof.org/
    posttester      0.1     A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.       http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html
    powerfuzzer     1_beta  Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others.    http://www.powerfuzzer.com
    powersploit     247.8b6f759     A PowerShell Post-Exploitation Framework.       https://github.com/mattifestation/PowerSploit
    praeda  37.093d1c0      An automated data/information harvesting tool designed to gather critical information from various embedded devices.    https://github.com/percx/Praeda
    procyon         0.5.28  A suite of Java metaprogramming tools focused on code generation and analysis.  https://bitbucket.org/mstrobel/procyon/
    prometheus      175.497b2ce     A Firewall analyzer written in ruby     https://github.com/averagesecurityguy/prometheus
    propecia        2       A fast class scanner that scans for a specified open port with banner grabbing  http://www.redlevel.org
    protos-sip      2       SIP test suite.         https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip
    proxychains-ng  4.8.1   A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies  https://github.com/rofl0r/proxychains
    proxycheck      0.1     This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver.  http://packetstormsecurity.com/files/61864/proxycheck.pl.txt.html
    proxyp  2013    Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.         http://sourceforge.net/projects/proxyp/
    proxyscan       0.3     A security penetration testing tool to scan for hosts and ports through a Web proxy server.     http://packetstormsecurity.com/files/69778/proxyScan.3.tgz.html
    proxytunnel     1.9.0   a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy   http://proxytunnel.sourceforge.net
    pscan   1.3     A limited problem scanner for C source files    http://deployingradius.com/pscan/
    pshitt  21.85cde65      A lightweight fake SSH server designed to collect authentication data sent by intruders.        https://github.com/regit/pshitt
    pstoreview      1.0     Lists the contents of the Protected Storage.    http://www.ntsecurity.nu/toolbox/pstoreview/
    ptunnel         0.72    A tool for reliably tunneling TCP connections over ICMP echo request and reply packets  http://www.cs.uit.no/~daniels/PingTunnel/#download
    pwd-hash        2.0     A password hashing tool that use the crypt function to generate the hash of a string given on standard input.   http://vladz.devzero.fr/pwd-hash.php
    pwdump  7.1     Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.        http://www.tarasco.org/security/pwdump_7/index.html
    pwnat   0.3     A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other    http://samy.pl/pwnat/
    pwntools        2.1.3   The CTF framework used by #Gallopsled in every CTF.     https://github.com/Gallopsled/pwntools
    pyew    2.3.0   A python tool to analyse malware.       https://code.google.com/p/pyew/
    pyexfil         36.978ec43      A couple of beta stage tools for data exfiltration.     https://github.com/ytisf/PyExfil
    pyfiscan        1169.6dc0110    Free web-application vulnerability and version scanner.         https://github.com/fgeek/pyfiscan
    pyinstaller     2.1     A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX.       http://www.pyinstaller.org/
    pyminifakedns   0.1     Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record       http://code.activestate.com/recipes/491264/
    pyrasite        2.0     Code injection and introspection of running Python processes.   http://pyrasite.com/
    pyrit   0.4.0   WPA/WPA2-PSK attacking with gpu and cluster     http://code.google.com/p/pyrit
    pytacle         alpha2  Automates the task of sniffing GSM frames       http://packetstormsecurity.com/files/124299/pytacle-alpha2.tar.gz
    pytbull         2.0     A python based flexible IDS/IPS testing framework shipped with more than 300 tests      http://pytbull.sourceforge.net/
    python-utidylib         0.2     Python bindings for Tidy HTML parser/cleaner.   http://utidylib.berlios.de
    python2-binaryornot     0.3.0   Ultra-lightweight pure Python package to check if a file is binary or text.     https://github.com/audreyr/binaryornot
    python2-yara    3.3.0   A malware identification and classification tool.       https://github.com/plusvic/yara
    quickrecon      0.3.2   A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.  http://packetstormsecurity.com/files/104314/QuickRecon.3.2.html
    radamsa         0.3     General purpose data fuzzer.    https://code.google.com/p/ouspg/wiki/Radamsa
    radare2         0.9.8   Open-source tools to disasm, debug, analyze and manipulate binary files.        http://radare.org/
    radiography     2       A forensic tool which grabs as much information as possible from a Windows system.      http://www.security-projects.com/?RadioGraPhy
    rainbowcrack    1.6     Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches.         http://project-rainbowcrack.com/
    rarcrack        0.2     This program uses bruteforce algorithm to find correct password (rar, 7z, zip).         http://rarcrack.sourceforge.net/
    ratproxy        1.58    A passive web application security assessment tool      http://code.google.com/p/ratproxy/
    rawr    45.a05c312      Rapid Assessment of Web Resources. A web enumerator.    https://bitbucket.org/al14s/rawr/wiki/Home
    rcracki-mt      0.7.0   A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com  http://rcracki.sourceforge.net/
    rdesktop-brute  1.5.0   It connects to windows terminal servers - Bruteforce patch included.    http://www.rdesktop.org/
    reaver  1.4     Implements a brute force attack against wifi protected setup WPSregistrar PINs in order to recover WPA/WPA2 passphrases.        http://code.google.com/p/reaver-wps
    rebind  0.3.4   DNS Rebinding Tool      http://code.google.com/p/rebind/
    recon-ng        888.e3a09d1     A full-featured Web Reconnaissance framework written in Python.         https://bitbucket.org/LaNMaSteR53/recon-ng
    recoverjpeg     2.3     Recover jpegs from damaged devices.     http://www.rfc1149.net/devel/recoverjpeg
    recstudio       4.0_20130717    Cross platform interactive decompiler   http://www.backerstreet.com/rec/rec.htm
    redfang         2.5     Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().        http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html
    redirectpoison  1.1     A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses.      http://www.hackingexposedvoip.com/
    redpoint        109.0405b90     Digital Bond's ICS Enumeration Tools.   https://github.com/digitalbond/Redpoint3
    regeorg         26.22fb8a9      The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.        https://github.com/sensepost/reGeorg
    reglookup       1.0.1   Command line utility for reading and querying Windows NT registries     http://projects.sentinelchicken.org/reglookup
    relay-scanner   1.7     An SMTP relay scanner.  http://www.cirt.dk
    replayproxy     1.1     Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file.    https://code.google.com/p/replayproxy/
    responder       117.6c7a5dd     A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.  https://github.com/SpiderLabs/Responder/
    rfcat   130515  RF ChipCon-based Attack Toolset         http://code.google.com/p/rfcat
    rfdump  1.6     A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible      http://www.rfdump.org
    rfidiot         e302bb7         An open source python library for exploring RFID devices.       http://rfidiot.org/
    rfidtool        0.01    A opensource tool to read / write rfid tags     http://www.bindshell.net/tools/rfidtool.html
    ridenum         39.ebbfaca      A null session RID cycle attack for brute forcing domain controllers.   https://github.com/trustedsec/ridenum
    rifiuti2        0.5.1   A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file.  https://code.google.com/p/rifiuti2/
    rinetd  0.62    internet redirection server     http://www.boutell.com/rinetd
    ripdc   0.2     A script which maps domains related to an given ip address or domainname.       http://nullsecurity.net/tools/scanner
    rkhunter        1.4.2   Checks machines for the presence of rootkits and other unwanted tools.  http://rkhunter.sourceforge.net/
    rlogin-scanner  0.2     Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris.     http://wayreth.eu.org/old_page/
    rootbrute       0.1     Local root account bruteforcer.         http://www.packetstormsecurity.org/
    ropeadope       1.1     A linux log cleaner.    http://www.highhacksociety.com/
    ropeme  1.0     ROPME is a set of python scripts to generate ROP gadgets and payload.   http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/
    ropgadget       5.3     Lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation.         https://github.com/JonathanSalwan/ROPgadget
    ropper  91.212d5da      It can show information about files in different file formats and you can find gadgets to build rop chains for different architectures. For disassembly ropper uses the awesome Capstone Framework.     https://github.com/sashs/Ropper
    roputils        124.5ab25f5     A Return-oriented Programming toolkit.  https://github.com/inaz2/roputils
    rpdscan         2.a71b0f3       Remmina Password Decoder and scanner.   https://github.com/freakyclown/RPDscan
    rrs     1.70    A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more.   http://www.cycom.se/dl/rrs
    rsakeyfind      1.0     A tool to find RSA key in RAM.  http://citp.princeton.edu/memory/code/
    rsmangler       1.4     rsmangler takes a wordlist and mangle it        http://www.randomstorm.com/rsmangler-security-tool.php
    rtlamr  197.03369d1     An rtl-sdr receiver for smart meters operating in the 900MHz ISM band.  https://github.com/bemasher/rtlamr/
    rtlizer         34.33e31ba      Simple spectrum analyzer.       https://github.com/csete/rtlizer
    rtlsdr-scanner  862.2831e0e     A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library.         https://github.com/EarToEarOak/RTLSDR-Scanner
    rtp-flood       1.0     RTP flooder     http://www.hackingexposedvoip.com/
    rtpbreak        1.3a    Detects, reconstructs and analyzes any RTP session      http://xenion.antifork.org/rtpbreak/
    rubilyn         0.0.1   64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host.  http://nullsecurity.net/tools/backdoor.html
    ruby-msgpack    0.5.8   MessagePack, a binary-based efficient data interchange format.  http://msgpack.org/
    ruby-ronin      1.5.0   A Ruby platform for exploit development and security research.  http://ronin-ruby.github.io/
    ruby-ronin-support      0.5.1   A support library for Ronin.    http://ronin-ruby.github.io/
    ruby-uri-query_params   0.7.0   Access the query parameters of a URI, just like in PHP.         http://github.com/postmodern/uri-query_params
    rww-attack      0.9.2   The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out.         http://packetstormsecurity.com/files/79021/Remote-Web-Workplace-Attack-Tool.html
    safecopy        1.7     A disk data recovery tool to extract data from damaged media    http://safecopy.sourceforge.net/
    sagan   1.0.0RC4        A snort-like log analysis engine.       http://sagan.softwink.com/
    sakis3g         0.2.0e  An all-in-one script for connecting with 3G     http://www.sakis3g.org/
    sambascan       0.5.0   Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds.  http://sourceforge.net/projects/sambascan2/
    samdump2        3.0.0   Dump password hashes from a Windows NT/2k/XP installation       http://sourceforge.net/projects/ophcrack/files/samdump2/
    samydeluxe      2.2ed1bac       Automatic samdump creation script.      http://github.com/jensp/samydeluxe
    sandy   6.531ab16       An open-source Samsung phone encryption assessment framework    https://github.com/donctl/sandy
    sasm    3.1.0   A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages.     https://github.com/Dman95/SASM
    sb0x    19.04f40fe      A simple and Lightweight framework for Penetration testing.     https://github.com/levi0x0/sb0x-project
    sbd     1.36    Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more     http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=sbd
    scalpel         2.0     A frugal, high performance file carver  http://www.digitalforensicssolutions.com/Scalpel/
    scanmem         0.13    A utility used to locate the address of a variable in an executing process.     http://code.google.com/p/scanmem/
    scanssh         2.1     Fast SSH server and open proxy scanner.         http://www.monkey.org/~provos/scanssh/
    scapy   2.3.1   A powerful interactive packet manipulation program written in Python    http://www.secdev.org/projects/scapy/
    schnappi-dhcp   0.1     schnappi can fuck network with no DHCP  http://www.emanuelegentili.eu/
    scout2  208.aaf57b8     Security auditing tool for AWS environments.    http://isecpartners.github.io/Scout2/
    scrape-dns      58.3df392f      Searches for interesting cached DNS entries.    https://github.com/304GEEK/Scrape-DNS
    scrapy  4443.ee17902    A fast high-level scraping and web crawling framework.  http://www.scrapy.org/
    scrounge-ntfs   0.9     Data recovery program for NTFS file systems     http://memberwebs.com/stef/software/scrounge/
    sctpscan        1.0     A network scanner for discovery and security    http://www.p1sec.com/
    seat    0.3     Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities.       http://thesprawl.org/projects/search-engine-assessment-tool/
    secscan         1.5     Web Apps Scanner and Much more utilities.       http://code.google.com/p/secscan-py/
    secure-delete   3.1     Secure file, disk, swap, memory erasure utilities.      http://www.thc.org/
    sees    67.cd741aa      Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain.     https://github.com/galkan/sees/
    sergio-proxy    0.2.1   A multi-threaded transparent HTTP proxy for manipulating web traffic    https://github.com/darkoperator/dnsrecon
    sessionlist     1.0     Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth.      http://www.0xrage.com/
    set     6.1.2   Social-engineer toolkit. Aimed at penetration testing around Social-Engineering         https://www.trustedsec.com/downloads/social-engineer-toolkit
    sfuzz   0.7.0   A simple fuzzer.        http://aconole.brad-x.com/programs/sfuzz.html
    shellcodecs     0.1     A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.    http://www.blackhatlibrary.net/Shellcodecs
    shellme         3.8c7919d       Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.  https://github.com/hatRiot/shellme
    shellnoob       2.1     A toolkit that eases the writing and debugging of shellcode     https://github.com/reyammer/shellnoob
    shocker         52.4c9df3a      A tool to find and exploit servers vulnerable to Shellshock.    https://github.com/nccgroup/shocker
    shodan  1.2.4   Python library for Shodan (https://developer.shodan.io).        http://github.com/achillean/shodan-python
    shortfuzzy      0.1     A web fuzzing script written in perl.   http://packetstormsecurity.com/files/104872/Short-Fuzzy-Rat-Scanner.html
    sidguesser      1.0.5   Guesses sids/instances against an Oracle database according to a predefined dictionary file.    http://www.cqure.net/wp/tools/database/sidguesser/
    siege   3.0.9   An http regression testing and benchmarking utility     http://www.joedog.org/JoeDog/Siege
    silk    3.10.0  A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks.   https://tools.netsa.cert.org/silk/
    simple-ducky    1.1.1   A payload generator.    https://code.google.com/p/simple-ducky-payload-generator
    simple-lan-scan         1.0     A simple python script that leverages scapy for discovering live hosts on a network.    http://packetstormsecurity.com/files/97353/Simple-LAN-Scanner.0.html
    sinfp   1.22    A full operating system stack fingerprinting suite.     http://www.networecon.com/tools/sinfp/
    siparmyknife    11232011        A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.  http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt
    sipcrack        0.2     A SIP protocol login cracker.   http://www.remote-exploit.org/codes_sipcrack.html
    sipp    3.3     A free Open Source test tool / traffic generator for the SIP protocol.  http://sipp.sourceforge.net/
    sipsak  0.9.6   A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.  http://sipsak.org
    sipscan         0.1     A sip scanner.  http://www.hackingvoip.com/sec_tools.html
    sipshock        6.1d636ab       A scanner for SIP proxies vulnerable to Shellshock.     https://github.com/zaf/sipshock
    sipvicious      0.2.8   Tools for auditing SIP devices  http://blog.sipvicious.org
    skipfish        2.10b   A fully automated, active web application security reconnaissance tool  http://code.google.com/p/skipfish/
    skyjack         7.5f7a25e       Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.    https://github.com/samyk/skyjack
    skype-dump      0.1     This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.      http://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html
    skypefreak      30.14a81cb      A Cross Platform Forensic Framework for Skype.  http://osandamalith.github.io/SkypeFreak/
    sleuthkit       4.1.3   File system and media management forensic analysis tools        http://www.sleuthkit.org/sleuthkit
    slowhttptest    1.6     A highly configurable tool that simulates application layer denial of service attacks.  http://code.google.com/p/slowhttptest
    slowloris       0.7     A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver.         http://ha.ckers.org/slowloris/
    smali   2.0.5   An assembler/disassembler for Android's dex format.     http://code.google.com/p/smali/
    smartphone-pentest-framework    100.399e6ce     Repository for the Smartphone Pentest Framework (SPF).  https://github.com/georgiaw/Smartphone-Pentest-Framework
    smbbf   0.9.1   SMB password bruteforcer.       http://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html
    smbexec         148.7827616     A rapid psexec style attack with samba tools.   https://github.com/pentestgeek/smbexec
    smbrelay        3       SMB / HTTP to SMB replay attack toolkit.        http://www.tarasco.org/security/smbrelay/
    smtp-fuzz       1.0     Simple smtp fuzzer      none
    smtp-user-enum  1.2     Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.        http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum
    smtp-vrfy       1.0     An SMTP Protocol Hacker.        
    smtpmap         0.8.234_BETA    Tool to identify the running smtp software on a given host.     http://www.projectiwear.org/~plasmahh/software.html
    smtpscan        0.5     An SMTP scanner         http://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html
    smtptx  1.0     A very simple tool used for sending simple email and do some basic email testing from a pentester perspective.  http://www.0x90.se/
    sn00p   0.8     A modular tool written in bourne shell and designed to chain and automate security tools and tests.     http://www.nullsecurity.net/tools/automation.html
    snapception     8.c156f9e       Intercept and decrypt all snapchats received over your network.         https://github.com/thebradbain/snapception
    sniffjoke       0.4.1   Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.       http://www.delirandom.net/sniffjoke/
    snmp-brute      11.180075b      SNMP brute force, enumeration, CISCO config downloader and password cracking script.    https://github.com/SECFORCE/SNMP-Brute
    snmp-fuzzer     0.1.1   SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.         http://www.arhont.com/en/category/resources/tools-utilities/
    snmpattack      1.8     SNMP scanner and attacking tool.        http://www.c0decafe.de/
    snmpcheck       1.8     A free open source utility to get information via SNMP protocols.       http://www.nothink.org/perl/snmpcheck/
    snmpenum        1.7     snmp enumerator         http://www.filip.waeytens.easynet.be/
    snmpscan        0.1     A free, multi-processes SNMP scanner    http://www.nothink.org/perl/snmpscan/index.php
    snoopy-ng       93.e305420      A distributed, sensor, data collection, interception, analysis, and visualization framework.    https://github.com/sensepost/snoopy-ng
    snort   2.9.7.0         A lightweight network intrusion detection system.       http://www.snort.org
    snow    20130616        Steganography program for concealing messages in text files.    http://darkside.com.au/snow/index.html
    snscan  1.05    A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.      http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx
    socat   1.7.3.0         Multipurpose relay      http://www.dest-unreach.org/socat/
    sockstat        0.3     A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.         https://packages.debian.org/unstable/main/sockstat
    soot    2.5.0   A Java Bytecode Analysis and Transformation Framework.  http://www.sable.mcgill.ca/soot
    spade   114     A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.      http://www.hoobie.net/brutus/
    sparta  15.e7bdf7b      Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.      http://sparta.secforce.com/
    sparty  0.1     An open source tool written in python to audit web applications using sharepoint and frontpage architecture.    http://sparty.secniche.org/
    spectools       2010_04_R1      Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.       http://www.kismetwireless.net/spectools/
    speedpwn        8.3dd2793       An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.     https://gitorious.org/speedpwn/
    spiderfoot      2.2.0   The Open Source Footprinting Tool.      http://spiderfoot.net/
    spiderpig-pdffuzzer     0.1     A javascript pdf fuzzer         https://code.google.com/p/spiderpig-pdffuzzer/
    spiga   7240.3a804ac    Configurable web resource scanner       https://github.com/getdual/scripts-n-tools/blob/master/spiga.py
    spike   2.9     IMMUNITYsec's fuzzer creation kit in C  http://www.immunitysec.com/resources-freesoftware.shtml
    spike-proxy     148     A Proxy for detecting vulnerabilities in web applications       http://www.immunitysec.com/resources-freesoftware.shtml
    spiped  1.4.2   A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.        https://www.tarsnap.com/spiped.html
    spipscan        69.4ad3235      SPIP (CMS) scanner for penetration testing purpose written in Python.   https://github.com/PaulSec/SPIPScan
    splint  3.1.2   A tool for statically checking C programs for security vulnerabilities and coding mistakes      http://www.splint.org/
    sploitctl       35.23a18ca      Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.  https://github.com/BlackArch/sploitctl
    sploitego       153.d9568dc     Maltego Penetration Testing Transforms.         https://github.com/allfro/sploitego
    spooftooph      0.5.2   Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight         http://www.hackfromacave.com/projects/spooftooph.html
    sps     4.2     A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.    https://sites.google.com/site/simplepacketsender/
    sqid    0.3     A SQL injection digger.         http://sqid.rubyforge.org/
    sqlbrute        1.0     Brute forces data out of databases using blind SQL injection.   http://www.justinclarke.com/archives/2006/03/sqlbrute.html
    sqlmap  6445.20c272b    An automatic SQL injection tool developed in Python.    http://sqlmap.sourceforge.net
    sqlninja        0.2.999         A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end    http://sqlninja.sourceforge.net/
    sqlpat  1.0.1   This tool should be used to audit the strength of Microsoft SQL Server passwords offline.       http://www.cqure.net/wp/sqlpat/
    sqlping         4       SQL Server scanning tool that also checks for weak passwords using wordlists.   http://www.sqlsecurity.com/downloads
    sqlsus  0.7.2   An open source MySQL injection and takeover tool, written in perl       http://sqlsus.sourceforge.net/
    ssdp-scanner    1.0     SSDP amplification scanner written in Python. Makes use of Scapy.       http://packetstormsecurity.com/files/127994/SSDP-Amplification-Scanner.html
    ssh-privkey-crack       0.3     A SSH private key cracker       https://code.google.com/p/lusas/
    ssh-user-enum   5.3d83131       SSH User Enumeration Script in Python Using The Timing Attack.  https://github.com/nccgroup/ssh-user-enum
    sshatter        1.2     Password bruteforcer for SSH    http://www.nth-dimension.org.uk/downloads.php?id=34
    sshscan         7401.3bfd4ae    A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.  https://github.com/getdual/scripts-n-tools/blob/master/sshscan.py
    sshtrix         0.0.2   A very fast multithreaded SSH login cracker.    http://nullsecurity.net/tools/cracker.html
    sshuttle        198.9ce2fa0     Transparent proxy server that works as a poor man's VPN. Forwards all TCP packets over ssh (and even DNS requests when using --dns option). Doesn't require admin privileges on the server side.        https://github.com/apenwarr/sshuttle
    ssl-hostname-resolver   1       CN (Common Name) grabber on X.509 Certificates over HTTPS.      http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html
    ssl-phuck3r     2.0     All in one script for Man-In-The-Middle attacks.        https://github.com/zombiesam/ssl_phuck3r
    sslcat  1.0     SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.     http://www.bindshell.net/tools/sslcat
    sslcaudit       522.5b6be3e     Utility to perform security audits of SSL/TLS clients.  https://github.com/grwl/sslcaudit
    ssldump         0.9b3   an SSLv3/TLS network protocol analyzer  http://www.rtfm.com/ssldump/
    sslh    1.16    SSL/SSH/OpenVPN/XMPP/tinc port multiplexer      http://www.rutschle.net/tech/sslh.shtml
    sslmap  0.2.0   A lightweight TLS/SSL cipher suite scanner.     http://thesprawl.org/projects/latest/
    sslnuke         5.c5faeaa       Transparent proxy that decrypts SSL traffic and prints out IRC messages.        https://github.com/jtripper/sslnuke
    sslscan         239.1328b49     Tests SSL/TLS enabled services to discover supported cipher suites.     https://github.com/DinoTools/sslscan
    sslsniff        0.8     A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly   http://www.thoughtcrime.org/software/sslsniff/
    sslsplit        0.4.10  A tool for man-in-the-middle attacks against SSL/TLS encrypted network connections.     http://www.roe.ch/SSLsplit
    sslstrip        0.9     Transparently hijack http traffic on a network, watch for https links and redirects, then map those links.      http://www.thoughtcrime.org/software/sslstrip
    sslyze  0.10    Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations.       https://github.com/nabla-c0d3/sslyze/
    stackflow       2.2af525d       Universal stack-based buffer overfow exploitation tool.         https://github.com/d4rkcat/stackflow
    starttls-mitm   7.b257756       A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.     https://github.com/ipopov/starttls-mitm
    statsprocessor  0.083   A high-performance word-generator based on per-position Markov-attack.  http://hashcat.net/wiki/doku.php?id=statsprocessor
    steghide        0.5.1   Embeds a message in a file by replacing some of the least significant bits      http://steghide.sourceforge.net
    stompy  0.0.4   an advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.         http://lcamtuf.coredump.cx/
    storm-ring      0.1     This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call).  http://packetstormsecurity.com/files/115852/Storm-Ringing-PABX-Test-Tool.html
    stunnel         5.10    A program that allows you to encrypt arbitrary TCP connections inside SSL       http://www.stunnel.org
    subbrute        58.ff00d72      A python subdomain bruteforce tool for pentesters.      https://github.com/TheRook/subbrute
    subdomainer     1.2     A tool designed for obtaining subdomain names from public sources.      http://www.edge-security.com/subdomainer.php
    subterfuge      5.0     Automated Man-in-the-Middle Attack Framework    http://kinozoa.com
    sucrack         1.2.3   A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su    http://labs.portcullis.co.uk/application/sucrack
    sulley  1.0.cb5e62c     A pure-python fully automated and unattended fuzzing framework.         https://github.com/OpenRCE/sulley/
    superscan       4       Powerful TCP port scanner, pinger, resolver.    http://www.foundstone.com/us/resources/proddesc/superscan.htm
    suricata        2.0.6   An Open Source Next Generation Intrusion Detection and Prevention Engine.       http://openinfosecfoundation.org/index.php/download-suricata
    svn-extractor   28.3af00fb      A simple script to extract all web resources by means of .SVN folder exposed over network.      https://github.com/anantshri/svn-extractor
    swaks   20130209.0      Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH        http://jetmore.org/john/code/swaks/
    swfintruder     0.9.1   First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.   http://code.google.com/p/swfintruder/
    synflood        0.1     A very simply script to illustrate DoS SYN Flooding attack.     http://thesprawl.org/projects/syn-flooder/
    synner  1.1     A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.         http://packetstormsecurity.com/files/69802/synner.c.html
    synscan         5.02    fast asynchronous half-open TCP portscanner     http://www.digit-labs.org/files/tools/synscan/
    sysdig  1436.4db7308    Open source system-level exploration and troubleshooting tool.  http://www.sysdig.org/
    sysinternals-suite      1.3     Sysinternals tools suite.       http://sysinternals.com/
    t50     5.4.1   Experimental Multi-protocol Packet Injector Tool        http://t50.sourceforge.net/
    taof    0.3.2   Taof is a GUI cross-platform Python generic network protocol fuzzer.    http://taof.sf.net
    tbear   1.5     Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.     http://freshmeat.net/projects/t-bear
    tcgetkey        0.1     A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.         http://packetstormsecurity.com/files/119146/tcgetkey.1.html
    tckfc   21.a32167e      TrueCrypt key file cracker.     https://github.com/Octosec/tckfc
    tcpcontrol-fuzzer       0.1     2^6 TCP control bit fuzzer (no ECN or CWR).     https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer
    tcpdump         4.6.2   A tool for network monitoring and data acquisition      http://www.tcpdump.org
    tcpextract      1.1     Extracts files from captured TCP sessions. Support live streams and pcap files.         https://pypi.python.org/pypi/tcpextract/1.1
    tcpflow         1.4.4   Captures data transmitted as part of TCP connections then stores the data conveniently  http://afflib.org/software/tcpflow
    tcpick  0.2.1   TCP stream sniffer and connection tracker       http://tcpick.sourceforge.net/
    tcpjunk         2.9.03  A general tcp protocols testing and hacking utility.    http://code.google.com/p/tcpjunk
    tcpreplay       4.1.0   Gives the ability to replay previously captured traffic in a libpcap format     http://tcpreplay.appneta.com
    tcptraceroute   1.5beta7        A traceroute implementation using TCP packets.  http://michael.toren.net/code/tcptraceroute/
    tcpwatch        1.3.1   A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.  http://hathawaymix.org/Software/TCPWatch
    tcpxtract       1.0.1   A tool for extracting files from network traffic.       http://tcpxtract.sourceforge.net
    teardown        1.0     Command line tool to send a BYE request to tear down a call.    http://www.hackingexposedvoip.com/
    tekdefense-automater    58.a034193      IP URL and MD5 OSINT Analysis   https://github.com/1aN0rmus/TekDefense-Automater
    termineter      0.1.0   Smart meter testing framework   https://code.google.com/p/termineter/
    tftp-bruteforce         0.1     TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.   http://www.hackingexposedcisco.com/
    tftp-fuzz       1337    Master TFTP fuzzing script as part of the ftools series of fuzzers.     http://nullsecurity.net/tools/fuzzer.html
    tftp-proxy      0.1     This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.   http://www.c0decafe.de/
    thc-ipv6        2.7     A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMP6, and includes an easy to use packet factory library.   http://thc.org/thc-ipv6/
    thc-keyfinder   1.0     Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.   https://www.thc.org/releases.php
    thc-pptp-bruter         0.1.4   A brute force program that works against pptp vpn endpoints (tcp port 1723).    http://www.thc.org
    thc-smartbrute  1.0     This tool finds undocumented and secret commands implemented in a smartcard.    https://www.thc.org/thc-smartbrute/
    thc-ssl-dos     1.4     A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!    http://www.thc.org/thc-ssl-dos/
    theharvester    13.56a30e2      Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).  http://www.edge-security.com/theHarvester.php
    themole         0.3     Automatic SQL injection exploitation tool.      http://sourceforge.net/projects/themole/
    tiger   3.2.3   A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.        http://www.nongnu.org/tiger/
    tilt    90.2bc2ef2      An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.    https://github.com/AeonDave/tilt
    timegen         0.4     This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.   http://bastianborn.de/radio-clock-hack/
    tinc    1.0.25  VPN (Virtual Private Network) daemon    http://www.tinc-vpn.org/
    tinfoleak       3.6469eb3       Get detailed information about a Twitter user activity.         https://github.com/technoskald/tinfoleak/
    tinyproxy       1.8.4   A light-weight HTTP proxy daemon for POSIX operating systems.   https://banu.com/tinyproxy/
    tlsenum         75.6618285      A command line tool to enumerate TLS cipher-suites supported by a server.       https://github.com/Ayrx/tlsenum
    tlspretense     0.6.2   SSL/TLS client testing framework        https://github.com/iSECPartners/tlspretense
    tlssled         1.3     A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.   http://blog.taddong.com/2011/05/tlssled-v10.html
    tnscmd  1.3     a lame tool to prod the oracle tnslsnr process (1521/tcp)       http://www.jammed.com/~jwa/hacks/security/tnscmd/
    topera  19.3e230fd      An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.        https://github.com/toperaproject/topera
    tor     0.2.5.10        Anonymizing overlay network.    http://www.torproject.org/
    tor-autocircuit         0.2     Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.         http://www.thesprawl.org/projects/tor-autocircuit/
    tor-browser-en  4.0.2   Tor Browser Bundle: Anonymous browsing using firefox and tor    https://www.torproject.org/projects/torbrowser.html.en
    torshammer      1.0     A slow POST Denial of Service testing tool written in Python.   http://sourceforge.net/projects/torshammer/
    torsocks        2.0.0   Wrapper to safely torify applications   http://code.google.com/p/torsocks
    tpcat   latest  TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didnt make it to the dest.        http://sourceforge.net/projects/tpcat/
    traceroute      2.0.21  Tracks the route taken by packets over an IP network    http://traceroute.sourceforge.net/
    trid    2.11    An utility designed to identify file types from their binary signatures         http://mark0.net/soft-trid-e.html
    trinity         3749.996e568    A Linux System call fuzzer.     http://codemonkey.org.uk/projects/trinity/
    trixd00r        0.0.1   An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.   http://nullsecurity.net/tools/backdoor.html
    truecrack       35      Password cracking for truecrypt(c) volumes.     http://code.google.com/p/truecrack/
    truecrypt       7.1a    Free open-source cross-platform disk encryption software        http://www.truecrypt.org/
    tsh     0.6     An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.     http://packetstormsecurity.com/search/?q=tsh
    tsh-sctp        2.850a2da       An open-source UNIX backdoor.   https://github.com/infodox/tsh-sctp
    tunna   14.953f745      a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.      https://github.com/SECFORCE/Tunna
    tuxcut  5.1     Netcut-like program for Linux written in PyQt.  http://bitbucket.org/a_atalla/tuxcut/
    twofi   2.0     Twitter Words of Interest.      http://www.digininja.org/projects/twofi.php
    u3-pwn  2.0     A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install         http://www.nullsecurity.net/tools/backdoor.html
    uatester        1.06    User Agent String Tester        http://code.google.com/p/ua-tester/
    ubertooth       2012.10.R1      A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only      http://sourceforge.net/projects/ubertooth/
    ubitack         0.3     Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.     https://code.google.com/p/ubitack/
    udis86  1.7.2   A minimalistic disassembler library     http://udis86.sourceforge.net/
    udptunnel       19      Tunnels TCP over UDP packets.   http://code.google.com/p/udptunnel/
    uefi-firmware-parser    103.9d4d220     Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc  https://github.com/theopolis/uefi-firmware-parser
    ufo-wardriving  4       Allows you to test the security of wireless networks by detecting their passwords based on the router model     http://www.ufo-wardriving.com/
    ufonet  12.dc92621      A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet.    https://github.com/epsylon/ufonet
    umap    25.3ad8121      The USB host security assessment tool.  https://github.com/nccgroup/umap
    umit    1.0     A powerful nmap frontend.       http://www.umitproject.org/
    unhide  20130526        A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.      http://sourceforge.net/projects/unhide/
    unibrute        1.b3fb4b7       Multithreaded SQL union bruteforcer.    https://github.com/GDSSecurity/Unibrute
    unicorn         12.fd8cd18      A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.        https://github.com/trustedsec/unicorn
    unicornscan     0.4.7   A new information gathering and correlation engine.     http://www.unicornscan.org/
    uniofuzz        1337    The universal fuzzing tool for browsers, web services, files, programs and network services/ports       http://nullsecurity.net/tools/fuzzer.html
    uniscan         6.2     A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.    http://sourceforge.net/projects/uniscan/
    unix-privesc-check      1.4     Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases)         http://pentestmonkey.net/tools/audit/unix-privesc-check
    unsecure        1.2     Bruteforces network login masks.        http://www.sniperx.net/
    upnp-pentest-toolkit    1.1     UPnP Pentest Toolkit for Windows.       https://github.com/nccgroup/UPnP-Pentest-Toolkit
    upnpscan        0.4     Scans the LAN or a given address range for UPnP capable devices.        http://www.cqure.net/wp/upnpscan/
    upx     3.91    Ultimate executable compressor.         http://upx.sourceforge.net/
    urlcrazy        0.5     Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.   http://www.morningstarsecurity.com/research/urlcrazy
    urldigger       02c     A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code         https://code.google.com/p/urldigger/
    username-anarchy        0.2     Tools for generating usernames when penetration testing.        http://www.morningstarsecurity.com/research/username-anarchy
    usernamer       7.813139d       Pentest Tool to generate usernames/logins based on supplied names.      https://github.com/jseidl/usernamer
    uw-loveimap     0.1     Multi threaded imap bounce scanner.     http://uberwall.org/bin/download/45/UWloveimap.tgz
    uw-offish       0.1     Clear-text protocol simulator.  http://uberwall.org/bin/download/42/UW_offish.1.tar.gz
    uw-udpscan      0.1     Multi threaded udp scanner.     http://uberwall.org/bin/download/44/UWudpscan.tar.gz
    uw-zone         0.1     Multi threaded, randomized IP zoner.    http://uberwall.org/bin/download/43/UWzone.tgz
    v3n0m   77.cdaf14e      Popular linux version of Balthazar/NovaCygni's 'v3n0m' scanner. Searches 18k+ dorks over 13 search engines.     https://github.com/v3n0m-Scanner/V3n0M-Scanner
    valgrind        3.10.1  A tool to help find memory-management problems in programs      http://valgrind.org/
    vane    1853.9cea741    A vulnerability scanner which checks the security of WordPress installations using a black box approach.        https://github.com/delvelabs/vane
    vanguard        0.1     A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications.        http://packetstormsecurity.com/files/110603/Vanguard-Pentesting-Scanner.html
    vbrute  1.11dda8b       Virtual hosts brute forcer.     https://github.com/nccgroup/vbrute
    vega    1.0     An open source platform to test the security of web applications        https://github.com/subgraph/Vega/wiki
    veil    307.63130a3     A tool designed to generate metasploit payloads that bypass common anti-virus solutions.        https://github.com/veil-evasion/Veil
    veracrypt       1.0f_1  Free disk encryption software, TrueCrypt fork.  http://veracrypt.codeplex.com/
    vfeed   36.a0fdf06      Open Source Cross Linked and Aggregated Local Vulnerability Database main repository.   http://www.toolswatch.org/vfeed
    vidalia         0.2.21  Controller GUI for Tor  https://www.torproject.org/vidalia
    videosnarf      0.63    A new security assessment tool for pcap analysis        http://ucsniff.sourceforge.net/videosnarf.html
    vinetto         0.07beta        A forensics tool to examine Thumbs.db files     http://vinetto.sourceforge.net
    viper   633.e35789e     A Binary analysis framework.    https://github.com/botherder/viper
    viproy-voipkit  2.5     VoIP Pen-Test Kit for Metasploit Framework      http://viproy.com/
    vivisect        20140803        A Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto     http://visi.kenshoto.com/
    vlan-hopping    14.b944d17      Easy 802.1Q VLAN Hopping        https://github.com/nccgroup/vlan-hopping
    vnak    1.cf0fda7       Aim is to be the one tool a user needs to attack multiple VoIP protocols.       https://www.isecpartners.com/vnak.html
    vnc-bypauth     0.0.1   Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.  http://pentester.fr/resources/tools/techno/VNC/VNC_bypauth/
    vncrack         1.21    What it looks like: crack VNC.  http://phenoelit-us.org/vncrack
    voiper  0.07    A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.  http://voiper.sourceforge.net/
    voiphopper      2.04    A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.        http://voiphopper.sourceforge.net/
    voipong         2.0     A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.  http://www.enderunix.org/voipong/
    volatility      2.4.1   A memory forensics toolkit.     https://www.volatilesystems.com/default/volatility
    vstt    0.5.0   VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.         http://www.wendzel.de/dr.org/files/Projects/vstt/
    vulscan         2.0     A module which enhances nmap to a vulnerability scanner         http://www.computec.ch/projekte/vulscan/
    w3af    1.6     Web Application Attack and Audit Framework.     http://w3af.sourceforge.net/
    waffit  30      A set of security tools to identify and fingerprint Web Application Firewall/WAF products protecting a website  http://code.google.com/p/waffit/
    wafp    0.01_26c3       An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.       http://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html
    waidps  16.ff8d270      Wireless Auditing, Intrusion Detection & Prevention System.     https://github.com/SYWorks/waidps
    wapiti  2.3.0   A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...   http://wapiti.sourceforge.net/
    wavemon         0.7.6   Ncurses-based monitoring application for wireless network devices       http://eden-feed.erg.abdn.ac.uk/wavemon/
    web-soul        2       A plugin based scanner for attacking and data mining web sites written in Perl.         http://packetstormsecurity.com/files/122064/Web-Soul-Scanner.html
    webacoo         0.2.3   Web Backdoor Cookie Script-Kit.         https://bechtsoudis.com/webacoo/
    webenum         0.1     Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.        http://code.google.com/p/webenum/
    webhandler      321.bcd2263     A handler for PHP system functions & also an alternative 'netcat' handler.      https://github.com/lnxg33k/webhandler
    webpwn3r        35.3fb27bb      A python based Web Applications Security Scanner.       https://github.com/zigoo0/webpwn3r
    webrute         3.3     Web server directory brute forcer.      https://github.com/BlackArch/webrute
    webscarab       20120422.001828         Framework for analysing applications that communicate using the HTTP and HTTPS protocols        http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
    webshag         1.10    A multi-threaded, multi-platform web server audit tool.         http://www.scrt.ch/en/attack/downloads/webshag
    webshells       1.c6a790b       Web Backdoors.  https://github.com/BlackArch/webshells
    webslayer       5       A tool designed for brute forcing Web Applications      https://code.google.com/p/webslayer/
    websockify      0.6.0   WebSocket to TCP proxy/bridge.  http://github.com/kanaka/websockify
    webspa  0.8     A web knocking tool, sending a single HTTP/S to run O/S commands.       http://sourceforge.net/projects/webspa/
    websploit       3.0.0   An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks        http://code.google.com/p/websploit/
    weevely         1.1     Stealth tiny web shell  http://epinna.github.io/Weevely/
    wepbuster       1.0_beta_0.7    script for automating aircrack-ng       http://code.google.com/p/wepbuster/
    wfuzz   32.db8d1f6      Utility to bruteforce web applications to find their not linked resources.      https://github.com/xmendez/wfuzz
    whatweb         4023.36d2a13    Next generation web scanner that identifies what websites are running.  http://www.morningstarsecurity.com/research/whatweb
    wi-feye         1.0     An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.       http://wi-feye.za1d.com/download.php
    wifi-honey      1.0     A management tool for wifi honeypots    http://www.digininja.org/projects/wifi_honey.php
    wifi-monitor    0.r22.71340a3   Prints the IPs on your local network that're sending the most packets   https://github.com/DanMcInerney/wifi-monitor
    wificurse       0.3.9   WiFi jamming tool.      https://github.com/oblique/wificurse
    wifijammer      52.20c9b70      A python script to continuosly jam all wifi clients within range.       https://github.com/DanMcInerney/wifijammer
    wifiphisher     71.dc13fe8      Fast automated phishing attacks against WPA networks.   https://github.com/sophron/wifiphisher
    wifitap         2b16088         WiFi injection tool through tun/tap device.     https://github.com/GDSSecurity/wifitap
    wifite  2.28fc5cd       A tool to attack multiple WEP and WPA encrypted networks at the same time.      http://code.google.com/p/wifite/
    wig     365.e56b2bf     WebApp Information Gatherer.    https://github.com/jekyc/wig
    wikigen         8.348aa99       A script to generate wordlists out of wikipedia pages.  https://github.com/zombiesam/wikigen
    winexe  1.00    Remotely execute commands on Windows NT/2000/XP/2003 systems.   http://sourceforge.net/projects/winexe/
    winfo   2.0     Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.      http://www.ntsecurity.nu/toolbox/winfo/
    wireless-ids    24.b132071      Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.    https://github.com/SYWorks/wireless-ids
    wireshark-cli   1.12.3  a free network protocol analyzer for Unix/Linux and Windows - CLI version       http://www.wireshark.org/
    wireshark-gtk   1.12.3  a free network protocol analyzer for Unix/Linux and Windows - GTK frontend      http://www.wireshark.org/
    wirouter-keyrec         1.1.2   A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).         http://www.salvatorefresta.net/tools/
    witchxtool      1.1     A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.   http://packetstormsecurity.com/files/97465/Witchxtool-Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool.1.html
    wlan2eth        1.3     re-writes 802.11 captures into standard Ethernet frames.        http://www.willhackforsushi.com/?page_id=79
    wmat    0.1     Automatic tool for testing webmail accounts     http://netsec.rs/70/tools.html
    wnmap   0.1     A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.         http://nullsecurity.net/tools/automation.html
    wol-e   2.0     A suite of tools for the Wake on LAN feature of network attached computers      http://code.google.com/p/wol-e/
    wordbrutepress  1.0     Python script that performs brute forcing against WordPress installs using a wordlist.  http://www.homelab.it/index.php/2014/11/03/wordpress-brute-force-multithreading/
    wordpot         37.e42eeda      A Wordpress Honeypot.   https://github.com/gbrindisi/wordpot
    wpa-bruteforcer         4.d5f8586       Attacking WPA/WPA encrypted access point without client.        https://github.com/SYWorks/wpa-bruteforcer
    wpbf    7.11b6ac1       Multithreaded WordPress brute forcer.   https://github.com/dejanlevaja/wpbf
    wpscan  1868.6e01e1b    A vulnerability scanner which checks the security of WordPress installations using a black box approach.        http://wpscan.org
    ws-attacker     1.3     A modular framework for web services penetration testing.       http://ws-attacker.sourceforge.net/
    wsfuzzer        1.9.5   A Python tool written to automate SOAP pentesting of web services.      https://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project
    wyd     0.2     Gets keywords from personal files. IT security/forensic tool.   http://www.remote-exploit.org/?page_id=418
    x-scan  3.3     A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.       http://www.xfocus.org/
    xcavator        5.bd9e2d8       Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.     https://github.com/nccgroup/xcavator
    xf86-video-qxl-git      r541.cbe70e9    Xorg X11 qxl video driver.      http://www.spice-space.org/
    xorbruteforcer  0.1     Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.     http://eternal-todo.com/category/bruteforce
    xorsearch       1.11.1  Program to search for a given string in an XOR, ROL or ROT encoded binary file.         http://blog.didierstevens.com/programs/xorsearch/
    xortool         0.96    A tool to analyze multi-byte xor cipher.        https://github.com/hellman/xortool/
    xplico  33.0f6d8bc      Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT).        http://www.xplico.org/
    xprobe2         0.3     An active OS fingerprinting tool.       http://sourceforge.net/apps/mediawiki/xprobe/index.php?title=Main_Page
    xspy    1.0c    A utility for monitoring keypresses on remote X servers         http://www.freshports.org/security/xspy/
    xsser   1.6     A penetration testing tool for detecting and exploiting XSS vulnerabilites.     http://xsser.sourceforge.net/
    xssless         35.9eee648      An automated XSS payload generator written in python.   https://github.com/mandatoryprogrammer/xssless
    xsss    0.40b   A brute force cross site scripting scanner.     http://www.sven.de/xsss/
    xssscan         17.7f1ea90      Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.      https://github.com/gwroblew/detectXSSlib
    xsssniper       0.9     An automatic XSS discovery tool         https://github.com/gbrindisi/xsssniper
    xssya   13.15ebdfe      A Cross Site Scripting Scanner & Vulnerability Confirmation.    https://github.com/yehia-mamdouh/XSSYA
    yaaf    7.4d6273a       Yet Another Admin Finder.       https://github.com/Plasticoo/YAAF
    yara    3.3.0   A malware identification and classification tool.       https://plusvic.github.io/yara/
    ycrawler        0.1     A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. It has proxy and log file support.       http://packetstormsecurity.com/files/98546/yCrawler-Web-Crawling-Utility.html
    yersinia        0.7.3   A network tool designed to take advantage of some weakness in different network protocols.      http://www.yersinia.net/
    yinjector       0.1     A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.         http://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html
    zackattack      5.1f96c14       A new tool set to do NTLM Authentication relaying unlike any other tool currently out there.    https://github.com/urbanesec/ZackAttack/
    zaproxy         2.3.1   A local intercepting proxy with integrated penetration testing tool for finding vulnerabilities in web applications.    http://code.google.com/p/zaproxy/
    zarp    0.1.5   A network attack tool centered around the exploitation of local networks.       https://defense.ballastsecurity.net/wiki/index.php/Zarp
    zerowine        0.0.2   Malware Analysis Tool - research project to dynamically analyze the behavior of malware         http://zerowine.sf.net/
    zmap    1.2.1   Fast network scanner designed for Internet-wide network surveys.        https://zmap.io/
    zulu    0.1     A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.  http://sourceforge.net/projects/zulu-wireless/
    zykeys  0.1     Demonstrates how default wireless settings are derived on some models of ZyXEL routers.         http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html
    zzuf    0.13    Transparent application input fuzzer.   http://sam.zoy.org/zzuf/




The #Hacking, #OffSec, #Cybersecurity & #OSINT resources archive/study guide is finished. Added many hundreds, maybe thousands of new resources, cleaned up study guide, huge lists of #OSINT, #OPSEC content added. Also, llinks to graphics like below. https://hastebin.com/qamiyawiwo.nginx 