Penetration testing commands for Other

This section includes cybersecurity tools, frameworks, and resources that are valuable but do not fit neatly into the predefined categories.

NameDescriptionPrice
ADB-ToolkitWrapper around adb to ease certain tasksFree
ADelegActive Directory delegation management tool allowing to make a detailed inventory of delegations set up so far in a forestFree
AppsecStudyeLearning management system for information securityFree
AtherisCoverage-guided Python fuzzing engineFree
Avast Hack CheckService to check if an account has been compromised in a data breach, send an email with the breaches not the passwordFree
AxiomDynamic infrastructure framework to distribute the workload of many different scanning tools with easeFree
BHQWExtract information from BloodHound and Neo4JFree
BQMBloodhound Query Merger; deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json fileFree
BreachDirectoryService to check if an account has been compromised in a data breach, display the breaches, partial password and hashFree
CameradarRTSP stream access; detect open hosts, device model, automated dictionary attacks on stream route and credentialsFree
ccsCode Credential Scanner; scan a large, diverse codebase for hard-coded credentials, or credentials present in configuration filesFree
changedetection.ioSelf-hosted website change detection tracking, monitoring and notification serviceFree
ConvertHoundConvert BloodHound output files into nmap XML that can be imported into reporting software like Dradis and PlextracFree
ctf-partyLibrary to enhance and speed up script/exploit writing for CTF playersFree
CyberChefData manipulation toolkit in web browserFree
cybernews personal data leak checkService to check if an account has been compromised in a data breach, only tells if the account is compromisedFree
DeHashedService to check if an account has been compromised in a data breachPaid
discoverScripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with MetasploitFree
DoubleTapHeadless browser in order to load pages and execute JavaScript that often generates things like dynamic nonces that validate the page was actually rendered by a human for password sprayingFree
doxycannonProxycannon and botnet, using docker, ovpn files, tor nodes, and dante socks5 proxies that may be used for password sprayingFree
F-Secure Identity Theft CheckerService to check if an account has been compromised in a data breach, send an email with the breaches not the passwordFree
Firefox MonitorService to check if an account has been compromised in a data breach, display the breaches not the passwordFree
getsploitCLI utility for searching and downloading exploits from Exploit-DB, Metasploit, Packetstorm and othersFree
GOADGame Of Active Directory is a test environment lab that includes all the common vulnerabilities of an active directoryFree
GodehashedUses the dehashed.com API to search for compromised assetsFree
gtfoCLI for searching gtfobins and lolbas from the terminalFree
GTFOBLookupCLI for earching gtfobins and lolbas from the terminal; allows more advanced search than gtfoFree
HackToolsWeb browser extension (Chromium, Firefox, Safari) including common functions for web pentestFree
Have I been pwned?Service to check if an account has been compromised in a data breach, display the breaches not the passwordFree
HiddenWallLinux kernel module generator for custom rules with netfilterFree
hideNsneakCLI tool for ephemeral penetration testing, rapidly deploy and manage various cloud servicesFree
HoundSploitGraphical search engine for Exploit-DBFree
Identity Leak CheckerService to check if an account has been compromised in a data breach, send the breaches by emailFree
inliteScan QR-code, 1D, DataMatrix, Postal, PDF417, and moreFree
InterlaceTurn single threaded command line applications into a multi-threaded application with CIDR and glob supportFree
itdisIs This Domain In Scope; a small tool that allows you to check if a list of domains you have been provided is in the scope of your pentest or notFree
Leak LookupService to check if an account has been compromised in a data breach, requires an accountFree
LOADLord Of Active Directory is a test environment lab that includes all the common vulnerabilities of an active directory and deploys automatically on AWS; based on AWS-Redteam-Lab and GOADFree
LookylooA web interface that allows you to capture a website page and display a tree of domainsFree
mecMassExploitConsole; mass reconnaissance and exploitation frameworkFree
MetasploitTool and framework for pentesting system, web and many more, contains a lot a ready to use exploit, 4 versions: Pro (paid), Express (paid), Community (free with GUI but on request), Framework (free, open source, CLI)Paid
NameScan Email Compromised CheckService to check if an account has been compromised in a data breach, display the breaches not the passwordFree
objectionRuntime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreakFree
OpenVASOpen Vulnerability Assessment ScannerFree
Pass StationCLI & library to search for default credentials among thousands of Products / VendorsFree
PentestBoxPre-configured portable penetration testing environment for Windows, all-in-one boxFree
PhoneSploit ProRemotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter sessionFree
PipalAnalyze password dump and return statistics about passwords' strengthFree
PWDQUERYService to check if an account has been compromised in a data breach, doesn't display breaches, partially display passwordFree
rawsec_cliRawsec Inventory search CLI to find security tools and resourcesFree
Reverse Shell GeneratorWeb-based reverse shell generator, includes features such as listener generation, raw mode, bind shell generation, msfvenom generation, payload encoding, many different languages, tools and shells supportedFree
RoninToolkit for security research and development allowing for the rapid development and distribution of code, exploits, payloads, etc, via 3rd party git repositoriesFree
ronin-exploitsA micro-framework for writing and running exploitsFree
ronin-payloadsA micro-framework for writing and running exploit payloadsFree
ScroungerMobile application testing toolkit, the mobile metasploit-like frameworkFree
SearchSploitCLI tool to search among Exploit-DB exploitsFree
SeccubusVulnerability scanning, reporting and analysisFree
sploitctlFetch, install and search exploit archives from exploit sites like Packet Storm or Exploit-DBFree
SprayingToolkitPassword spraying scripts for Lync/S4B and OWAFree
Tool-XKali linux hacking tool installerFree
unisecToolkit for security research manipulating Unicode: confusables, homoglyphs, hexdump, code point, UTF-8, UTF-16, UTF-32, properties, regexp search, size, grapheme, surrogates, version, ICU, CLDR, UCDFree
UnredacterBruteforce to reverse the text of image redacted with pixelation blurFree
v0ltCTF toolkit / frameworkFree
VBSminVBScript minifierFree
webqrScan & create QR-codeFree
ysoserialTool for generating payloads that exploit unsafe Java object deserializationFree