Skip to content

stevemats/Hacker-Arsenal-Toolkit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 

Repository files navigation

Hacker Arsenal Tookit (HaRT)

hart

Table of Contents

Introduction

Welcome to the Hacker Arsenal Tookit (HaRT)! This repo aims to provide a comprehensive collection of tools and resources for cyber/information security professionals and hacking enthusiasts!

Active Directory

ADCSsync - Use ESC1 to perform a makeshift DCSync and dump hashes

CrackMapExec - Enumerating logged on users, spidering SMB shares, executing psexec style attacks, auto-injecting Mimikatz/Shellcode/DLL’s into memory using Powershell, dumping the NTDS.dit, etc

LinikatzMimikatz et al on UNIX

NetExec - Post-exploitation tool that helps automate assessing the security of large Active Directory networks.

Vulnerable-AD — Create a vulnerable AD that allows you to test most AD attacks

Adversarial Operations

Awesome Command Control - Collection of Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.

Periscope — Adversarial Operations Toolkit including C2, stagers, agents, ephemeral infrastructure, phishing engine, and automation

RITA - Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

Aerospace

Aerospace Hacking Tools - Space-related cybersecurity tools

SatDump - A generic satellite data processing software.

SatIntel - OSINT tool for Satellites; Extract telemetry, receive orbital predictions, and parse TLEs

Satellite Hacking Workshop - Files for Aerospace Cybersecurity: Satellite Hacking Workshop

Ai

Ai Prompt Examples — Examples of Ai Prompts

DocsGPT - GPT-powered chat for documentation

HackBot — AI-powered cybersecurity chatbot designed to answer cybersecurity-related queries, conduct code analysis, and scan analysis.

LLM Prompt Library — Manipulation Prompts for various LLMs such as GPT-4, Claude, Llama2, Falcon, Bard, etc

PowerShellAi - PowerShell AI module for OpenAI GPT-3 and DALL-E

RateMyAi - Prompt engineering tool for AI Models with CLI prompt or API usage

Attack Surface Management

RedEye - Assess and display data, evaluate mitigation strategies, and enable decision making in response to a Red Team assessment.

Sn1per - Attack Surface Management Platform

Biological Security (BioSec/Biohacking/Augmentation)

Fingerprint BioSec - Fingerprint Pattern Recognition

Human Augmentation Toolkit - Human Augmentation Toolkit, Biohacking FAQ, Microchip Implants, Magnets, Sensory Perception, etc.

Binary Exploitation

Modern Binary Exploitation — x86 reverse engineering, vulnerability analysis, and Linux-based userland binary exploitation, protections (Canaries, DEP, ASLR, RELRO, Fortify Source, etc.) and techniques used to defeat them, kernel-land and Windows-based exploitation.

Bitlocker

ExtractBitlockerKeys - Script to automatically extract the bitlocker recovery keys from a domain.

Burp Suite

Blackbox Protobuf - Extension for decoding and modifying arbitrary protobuf messages without the protobuf type definition.

Burp Suite for Pentesters — Cheat sheet for Bug Bounty Hunters and penetration testers to hunt vulnerabilities from P4 to P1 solely and completely with "BurpSuite."

Car Hacking

AutoHack OS (Linux) VMAutomotive Pentesting/Car Hacking; Github

Operation CHARM - Car repair manuals for everyone.

Career

Hacker Hiring Discord — Curated List of Hacker Discord Servers with Hiring Channels

Charitable

DealsForMeals - Help low-income families with finding the best deals; eliminates sorting through dozens of websites of individual food banks, and shortens the distance from accessible food

CTF

BSides Belfast CTF Thread - Places to play (or compete) in CTFs all year round.

Cloud CTF Tools — Cloud CTF Docker Container

CTFd Platform — CTFs as you need them; Hosting — CTFd.io

CTF Writeups — Writeups of CTFs

Hack The Vote Challenge Repo — 48hr Jeopardy-style Capture The Flag (CTF)

HorQRux Tool — Splitting a QR code into seven fragments

NoiseFest Challenge Repo — PCAPs and prompts from GreyNoise's 2023 CTF at NoiseFest

No More Secrets Tool — Command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers.

Red-Team Village CTF DC31 2023 Challenge Repo — Secure Terminal CTF Challenges for DC31 Red Team Village

Trace Labs OSINT Search Party CTF Participation Guide — Flag categories for Trace Labs OSINT Search Party CTF events

Back to Top⬆️

Cloud

CloudFoxable — Create a vulnerable by-design AWS penetration testing playground

Cloud CTF tools — Cloud CTF Docker Container

Conferences

Infosec Events — List of cyber-infosec-hacker related events.

Content Creation Tool

Auphonic - Audio post-production tools

Freesound - Wide variety of audio clips, sound effects, and samples that are licensed under Creative Commons licenses

TextFX - Expand the writing process by Ai-generating creative possibilities with text and language tools

Content Generation

AttackGen — Generates tailored incident response scenarios based on user-selected threat actor groups and your organization's details.

Contracting

Contracts - Collection of potentially useful pentest contract templates

Cryptography

CyberChef - App for encoding XOR and Base64, AES, DES and Blowfish, creating binary and hexdumps, compression and decompression of data, calculating hashes and checksums, IPv6 and X.509 parsing, changing character encodings, etc

Data Breaches

Data-OSINT — List of data breach acquisition websites

Data Privacy

Data Broker Opt-Out List — List of opt-out's for data brokers

Distros

AthenaOS (Arch) Docker - AthenaOS Pentesting

AutoHack OS (Linux) VMAutomotive Pentesting/Car Hacking; Github

BackTrack (Linux) VM - Kali before Kali

BlackArch (Arch) Docker - BlackArch Pentesting

ControlThings (Linux) VM - ControlThings ICS/OT/SCADA

Kali (Debian) VM - Kali Liunx Pentesting

Kali Purple (Debian) VM - Kali Purple - Red/Blue Team

Kali Nethunter (Android) Mobile - Kali but Android

ParrotOS (Debian) Docker - ParrotOS Pentesting

Security Onion 2.4 (Debian) Docker - Security Onion SIEM

Back to Top⬆️

Discord

Hacker Discords — Curated List of Hacker Discord Servers

Drones

Drone Hacking Workshop - Files and Programs for UAV and Drone Cybersecurity Workshop

DroneXtract - DroneXtract is a digital forensics suite for DJI drones

Forensics

Artifacts - Digital Forensics Artifact Repository

dfdatetime - Provides date and time objects to preserve accuracy and precision.

DroneXtract - DroneXtract is a digital forensics suite for DJI drones

Hindsight - Web browser forensics for Google Chrome/Chromium

Libyal - ollection of libraries to access various data formats, such as the OLE Compound File or NT File System

Painless Peek — Browser extension to make it easier to more safely view traumatic imagery.

Synoposis - Tool to review browser history files by providing a high-level “synopsis” of key information.

Unfurl - Extract and Visualize Data from URLs

Back to Top⬆️

General Cybersecurity / Infosec / Ethical Hacking / Penetration Testing

90-Day Cybersecurity Study Plan — Resources for learning topics such as Net+, Sec+, Linux, Python, Traffic Analysis, Git, ELK, AWS, Azure, and Hacking

Awesome-Cyber — List of cybersecurity tools for red, blue, and purple team operations.

CatSalad Social Media List - List of Cyber/Infosec/Hacker social media to follow

Bad Practices - CISA's catalog of bad practices that are exceptionally risky.

Cisco Ethical Hacker Self-Paced Learning - Learn offensive security to uncover cyber threats and vulnerabilities before the cybercriminals do.

Cybersec Content Creators and Free Learning Resources — Curated List of Cybersec Content Creators & Free Learning Resources

Cybersecurity Resources — Library of various cybersecurity resources

Defcon Parrot - Curated Lists of Tools, DCGs, Dates, etc

Free Tech Resources - Cybersecurity Content Creators & Free Learning Resources

Hack with GitHub — Open Source Hacking Tools database

Hacker Social Media — Hacker Social Media & Cotent Creators

Knowledge Book Cyber Weapons Dump - Collection of Scripts

Mindmap — Mindmaps for cyber security technologies, methodologies, courses, and certifications

SecLists - Collection of multiple types of lists including usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Back to Top⬆️

Github

Awesome README - Curated list of awesome READMEs

RepoHunt - Hunt github repositories by keywords

Google Dork

Grippy - Open-source engine for automating the download of file

Historical

DoS-Army - Collection of scripts from the early 00's used by anon, fancy bear, and LuLzec

ICS/SCADA/OT

ControlThings (Linux) VM - ControlThings ICS/OT/SCADA

DEFCON ICS Village YouTube - DEFCON ICS Village

Industrial ICS/OT Cybersecurity — List of resources for industrial (ICS/OT) cybersecurity

Intro to ICS/OT Cybersecurity — ICS/OT Intro Course Resources

NMAP & SHODAN ICS/OT Quickstart Guides — Quick start Nmap & SHODAN guides for ICS/OT assets

SHODAN ICS/OT Quickstart Guide — Quick start SHODAN guides for ICS/OT assets

Back to Top⬆️

Malware

ELFEN - Automated Linux Malware Analysis Sandbox

Malware Source Code - Collection of malware source code for a variety of platforms in an array of different programming languages.

RPISEC Malware Analysis Materials — Malware analysis through readings and hands-on, real-world samples

VX-API - Collection of various malicious functionality to aid in malware development

VXUG-Papers - Research code & papers from members of vx-underground.

Metasploit

Metateta — Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit

Metasploitable3

Rapid7 Metasploitable3 — VM that is built from the ground up with a large amount of security vulnerabilities.

Trembling Uterus Ubuntu - Metasploitable3 Ubuntu Walkthrough

Trembling Uterus Windows - Metasploitable3 Windows Walkthrough

Microsoft Office 365

ScubaGear — Automation to assess the state of your M365 tenant against CISA's baselines

Misinformation

Fake New Detection - Evaluate sources for misinfo using ML models

Mobile Security

Android PIN Bruteforce - Unlock an Android phone (or device) by bruteforcing the lockscreen PIN.

Awesome Mobile Security - Collection of useful android and iOS security related stuff

Bazaar - Free and open-source platform to analyze Android applications

Mobile Trackers - Repo of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads libraries.

Nessus

Nessusploitable — Parses .nessus files for exploitable vulnerabilities and outputs a report

Network Pentesting

5head — A wrapper of network pentest toolsets within a portable and modular scripting platform that allows repeatable tasks.

Malcolm - Easily deployable network analysis tool suite for full PCAP files and Zeek logs.

OSCP

Noobs Guide to OSCP 2023 - OSCP Notes

OSCP - OSCP Notes

OSCP Bible - Collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help in OSCP Preparation

OSCP Cheat Sheet - Commands, Payloads and Resources for the OSCP

OSCP Enumeration Handbook - Enumeration Handbook for the OSCP 2023

OSCP: Good, Bad, Ugly - OSCP Pros, Cons, Review, Etc.

OSCP Playbook - fareedfauzi OSCP notes

OSCP Reborn - Revamped OSCP guide which includes Active Directory exploitation.

OSINT

Alfred — Find social media accounts based on inputs

Awesome Intelligence — Curated list of Open-Source Intelligence (OSINT) Resources

Counter OSINT Guide - Comprehensive Counter OSINT and privacy guide for Runet and CIS

Discord OSINT — Resources to conduct research and OSINT investigations on Discord accounts

Geolocation OSINT — Geolocation challenge resources

Maigret - Collect a dossier on a person by username from thousands of sites

Mailcat - Find email addresses by nickname using API/SMTP checking methods without user notification

Marple - Collect links to profiles by username through search engines and analyze with various plugins

Obsidian OSINT Templates - Templates are suggestions of how the Obsidian notetaking tool can be used during an OSINT investigatio

OSINT - Collections of tools and methods created to aid in OSINT collection

OSINT Summit 2023 Resources - List of resources presented during the 2023 Sans OSINTSummit

OSINT Namecheckers List - List of tools to search accounts by username

OSINT Tools - OSINT open-source tools catalog

SatIntel - OSINT tool for Satellites; Extract telemetry, receive orbital predictions, and parse TLEs

TheScrapper - Scrape emails, phone numbers and social media accounts from a website.

Trace Labs OSINT Search Party CTF — Flag categories for Trace Labs OSINT Search Party CTF events

Trace Labs OSINT VM - OSINT VM with the most effective tools and customized scripts used during Search Party CTF’s

WhatsMyName - Username enumeration on various websites.

WiGLE — Wireless Geographic Logging Engine

YaSeeker - Yandex OSINT tool

Zehef - See if your personal or corporate email has leaked and which sites the e-mail is registered.

Back to Top⬆️

Packet Captures

Utilisec Packet Captures — Packet captures for playing with Wireshark and other sniffers

Password Cracking

Panalyzer - Password list character frequency analyzer that can output hashcat masks

Pentesting

Awesome-Pentest - Collection of awesome penetration testing resources, tools, etc.

CSET - Cybersecurity Evaluation Tool - Systematic and repeatable approach for assessing the cybersecurity posture of networks

Exploit Notes — Sticky notes for pentesting, bug bounty, and CTF

Offensive Bookmarks — Collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone interested in infosec topics.

Pentests Findings - Collection of AD, phishing, mobile, system, service, web app, and wireless weaknesses.

Public Pentesting Reports - List of public penetration test reports published by several consulting firms and academic security groups.

Red Team Diaries - Red Team/Pentest notes from professional engagements on several infrastructures

Red Team Field Manual Video Library - RTFM Video Library

Phishing

OpenSquat — Detect phishing domains and domain squatting; Searches for newly registered domains that impersonate legitimate domains on a daily basis.

Phishing Pot — Collection of phishing samples for researchers and detection developers.

Print Nightmare

It Was All A Dream - (CVE-2021-34527) Python Scanner; Scan entire subnets for hosts vulnerable to the PrintNightmare RCE

Privilege Escalation

Privilage Escalation from 1 to 0 Workshop — HACKTRICK'18 Privilege escalation Workshop

Purple Team

Enterprise Purple Teaming — Purple Team Resources for Enterprise Purple Teaming

Ransomware

Fake Ransomware — Non-destructive but ANNOYING ransomware lookalike for use with red team exercises.

RSA

RSACTFTool — RSA Multi-Attack Tool is a utility designed to decipher data from weak public keys and recover the corresponding private key.

Scenarios & Tabletop Exercises

AttackGen — Generates tailored incident response scenarios based on user-selected threat actor groups and your organization's details.

Search Engines

Awesome-Hacker-Search-Engines - Curated list of search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

Censys - Investigate domains and IP addresses

CensysGPT - Censys query generator

Search Engines for Pentesters — Assorted Pentest Search Engines

SHODAN - search engine for internet-connected devices

SMB

SMBmap - SMB Enumeration Tool

Threat Hunting

Cyber Threat Hunting — Collection of resources for Threat Hunters

Decider - Web app that assists that maps adversary behaviors to the MITRE ATT&CK® framework.

Untitled Goose Tool - Hunt and IR tool that adds novel authentication and data gathering methods to run a full investigation against Azure Active Directory (AzureAD), Azure, and M365 environments.

Threat Intelligence

Threat Intelligence Discord Bot - Gets updates from various clearnet domains and ransomware threat actor domains

Usernames

Username Anarchy - Tool for generating usernames during a pentest

Web Crawler

bing-ip2host - Bing.com web scraper that discovers websites by IP address

Nuke-Net - VERY VERY over powered and ridiculous web crawler that is very very noisy

Puncia - Subdomain & Exploit Hunter powered by AI

WhatWeb - Identifies websites. Recognises content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.

Web Application Security

Awesome-Web-Hacking - List is for anyone wishing to learn about web application security but no starting point.

HackTools - Web application pentest browser extension including cheat sheets and tools such as XSS payloads, Reverse shells/

H5SC - Collection of HTML5 related XSS attack vectors

HTTPLeaks - Enumerate all possible ways, a website can leak HTTP requests. In one single HTML file.

Payload Box - Web app payloads

RobotsDisallowed - List of the most common and most interesting robots.txt disallowed directories.

URLCrazy - Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.

WrongSecrets - Vulnerable app with examples showing how to not use secrets

Wifi — 802.11

802.11-Lazy - 802.11 auditing in GUI format using aircrack-ng

Kismet — Kismet and related tools and libraries for wireless monitoring, transmitting, and auditing.

Wifishark — Red-Team profile for Wireshark

Wifi Exploitation Framework (WEF) — Offensive framework to audit 802.11 networks and protocols with different types of attacks for WPA/WPA2 and WEP, automated hash cracking, and much more. Tested and supported in Kali Linux, Parrot OS and Arch Linux.

WiGLE — Wireless Geographic Logging Engine

Wireless Pentesting Cheat Sheet — Cheat Sheet for OSWP Examination by Offensive Security and Wifi Cracking

Wireshark

Wifishark — Red-Team profile for Wireshark

Wordlists

Nerdlist — Passwords more likely to be used by sysadmins and the folk with access

Back to Top⬆️

Releases

No releases published

Packages

No packages published