Track Awesome Pentest Updates Daily

A collection of awesome penetration testing resources, tools and other shiny things

🏠 Home · 🔍 Search · 🔥 Feed · 📮 Subscribe · ❤️ Sponsor · 😺 enaqx/awesome-pentest · ⭐ 22K · 🏷️ Security

[ Daily / Weekly / Overview ]

Oct 25, 2024

Online Resources / Other Lists Online

Sep 23, 2024

Anti-virus Evasion Tools / Tor Tools

Network Tools / Transport Layer Security Tools

Network Tools / Secure Shell Tools

Network Vulnerability Scanners / Web Vulnerability Scanners

Online Resources / Other Lists Online

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Web Exploitation / Social Engineering Tools

Jul 07, 2024

Multi-paradigm Frameworks / Intentionally Vulnerable Systems as Docker Containers

Online Resources / Other Lists Online

Apr 29, 2024

Collaboration Tools / Malware Analysis Books

Feb 08, 2024

Books / Tor Tools

Dec 27, 2023

Intentionally Vulnerable Systems / Zealandia

Nov 04, 2023

Collaboration Tools / Malware Analysis Books

Oct 23, 2023

Industrial Control and SCADA Systems / Zealandia

Open Sources Intelligence (OSINT) / Web application and resource analysis tools

Oct 22, 2023

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Aug 17, 2023

Exploit Development Tools / Zealandia

Aug 03, 2023

Vulnerability Databases / Social Engineering Tools

Jan 04, 2023

Vulnerability Databases / Social Engineering Tools

Aug 25, 2022

Web Exploitation / Web path discovery and bruteforcing tools

Aug 03, 2022

Network Tools / Network Reconnaissance Tools

Mar 28, 2022

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Feb 28, 2022

Online Resources / Other Lists Online

Feb 11, 2022

Web Exploitation / Web shells and C2 frameworks

Feb 05, 2022

Privilege Escalation Tools / Web application and resource analysis tools

Jan 31, 2022

Network Tools / DDoS Tools

Jan 27, 2022

Network Tools / Network Reconnaissance Tools

Network Vulnerability Scanners / Web Vulnerability Scanners

Web Exploitation / Social Engineering Tools

Oct 27, 2021

Cloud Platform Attack Tools / Malware Analysis Books

Oct 20, 2021

Privilege Escalation Tools / Web application and resource analysis tools

Sep 29, 2021

Security Education Courses / Reverse Engineering Tools

Sep 25, 2021

Exfiltration Tools / Zealandia

Mar 27, 2021

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Mar 14, 2021

Collaboration Tools / Malware Analysis Books

Open Sources Intelligence (OSINT) / Web application and resource analysis tools

Web Exploitation / Social Engineering Tools

Web Exploitation / Intercepting Web proxies

Web Exploitation / Web file inclusion tools

Web Exploitation / Web injection tools

Web Exploitation / Web path discovery and bruteforcing tools

Web Exploitation / Web shells and C2 frameworks

Web Exploitation / Web-accessible source code ripping tools

Feb 06, 2021

Network Vulnerability Scanners / Wireless Network Tools

Vulnerability Databases / Social Engineering Tools

Dec 15, 2020

Conferences and Events / South America

Dec 09, 2020

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Dec 06, 2020

Online Resources / Other Lists Online

Privilege Escalation Tools / Password Spraying Tools

Oct 09, 2020

Network Tools / Protocol Analyzers and Sniffers

Oct 03, 2020

Reverse Engineering / Reverse Engineering Tools

Steganography Tools / Social Engineering Tools

Oct 02, 2020

Reverse Engineering / Reverse Engineering Tools

Aug 26, 2020

Web Exploitation / Web shells and C2 frameworks

Aug 23, 2020

Android Utilities

Anonymity Tools

Books / Tor Tools

CTF Tools / Malware Analysis Books

Conferences and Events / Malware Analysis Books

Exfiltration Tools / Zealandia

Exploit Development Tools / Zealandia

Hash Cracking Tools / Zealandia

Industrial Control and SCADA Systems / Zealandia

Intentionally Vulnerable Systems / Intentionally Vulnerable Systems as Docker Containers

macOS Utilities / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Network Reconnaissance Tools

Network Tools / Wireless Network Tools

Online Resources / Other Lists Online

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Open Sources Intelligence (OSINT) / Data Broker and Search Engine Services

Open Sources Intelligence (OSINT) / Dorking tools

Open Sources Intelligence (OSINT) / Email search and analysis tools

Open Sources Intelligence (OSINT) / Metadata harvesting and analysis

Open Sources Intelligence (OSINT) / Network device discovery tools

Open Sources Intelligence (OSINT) / OSINT Online Resources

Open Sources Intelligence (OSINT) / Source code repository searching tools

Privilege Escalation Tools / Web application and resource analysis tools

Reverse Engineering / Reverse Engineering Books

Reverse Engineering / Reverse Engineering Tools

Shellcoding Guides and Tutorials / Reverse Engineering Tools

Social Engineering / Social Engineering Books

Social Engineering / Social Engineering Online Resources

Steganography Tools / Social Engineering Tools

Vulnerability Databases / Social Engineering Tools

Web Exploitation / Web Exploitation Books

Windows Utilities / Web Exploitation Books

Jul 15, 2020

Network Tools / Intentionally Vulnerable Systems as Docker Containers

May 14, 2020

Windows Utilities / Web Exploitation Books

May 07, 2020

Conferences and Events / Asia

Apr 20, 2020

Side-channel Tools / Reverse Engineering Tools

Apr 06, 2020

Network Tools / DDoS Tools

Reverse Engineering / Reverse Engineering Tools

Vulnerability Databases / Social Engineering Tools

Apr 04, 2020

Hash Cracking Tools / Zealandia

Mar 25, 2020

Windows Utilities / Web Exploitation Books

Mar 19, 2020

Social Engineering / Social Engineering Tools

Mar 16, 2020

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Online Resources / Other Lists Online

Mar 14, 2020

Network Tools / Wireless Network Tools

Feb 27, 2020

Vulnerability Databases / Social Engineering Tools

Feb 26, 2020

CTF Tools / Malware Analysis Books

Feb 20, 2020

Side-channel Tools / Reverse Engineering Tools

Feb 10, 2020

Physical Access Tools / Web application and resource analysis tools

Jan 27, 2020

Network Tools / DDoS Tools

Network Tools / Network Reconnaissance Tools

Network Vulnerability Scanners / Wireless Network Tools

Operating System Distributions / Web application and resource analysis tools

Jan 16, 2020

Collaboration Tools / Malware Analysis Books

Nov 25, 2019

Conferences and Events / Europe

Nov 06, 2019

Anonymity Tools

Anonymity Tools / Tor Tools

File Format Analysis Tools / Zealandia

Nov 04, 2019

Conferences and Events / Asia

Conferences and Events / Europe

Conferences and Events / North America

Conferences and Events / South America

Conferences and Events / Zealandia

Nov 03, 2019

Anonymity Tools / Tor Tools

Conferences and Events / North America

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Oct 31, 2019

Online Resources / Other Lists Online

Oct 17, 2019

Conferences and Events / North America

Online Resources / Other Lists Online

Oct 13, 2019

Hash Cracking Tools / Zealandia

Sep 23, 2019

Windows Utilities / Web Exploitation Books

Sep 13, 2019

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Aug 29, 2019

Anti-virus Evasion Tools / Tor Tools

Aug 07, 2019

Books / Tor Tools

Aug 05, 2019

Reverse Engineering / Reverse Engineering Tools

Jul 26, 2019

Network Tools / Network Traffic Replay and Editing Tools

Jul 24, 2019

Vulnerability Databases / Social Engineering Tools

Jul 16, 2019

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Jul 10, 2019

Static Analyzers / Social Engineering Tools

May 07, 2019

Network Vulnerability Scanners / Wireless Network Tools

Apr 26, 2019

Online Resources / Other Lists Online

Apr 03, 2019

Network Vulnerability Scanners / Web Vulnerability Scanners

Online Resources / Other Lists Online

Windows Utilities / Web Exploitation Books

Mar 29, 2019

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Mar 28, 2019

Anonymity Tools

Anonymity Tools / Tor Tools

Anti-virus Evasion Tools / Tor Tools

Books / Tor Tools

CTF Tools / Malware Analysis Books

Collaboration Tools / Malware Analysis Books

Conferences and Events / Malware Analysis Books

Conferences and Events / Europe

Conferences and Events / North America

File Format Analysis Tools / Zealandia

GNU/Linux Utilities / Zealandia

Hash Cracking Tools / Zealandia

Hex Editors / Zealandia

Industrial Control and SCADA Systems / Zealandia

Multi-paradigm Frameworks / Intentionally Vulnerable Systems as Docker Containers

Network Tools / DDoS Tools

Network Tools / Network Reconnaissance Tools

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Network Tools / Transport Layer Security Tools

Network Tools / Wireless Network Tools

Network Vulnerability Scanners / Wireless Network Tools

Network Vulnerability Scanners / Web Vulnerability Scanners

Online Resources / Online Operating Systems Resources

Online Resources / Online Penetration Testing Resources

Online Resources / Other Lists Online

Online Resources / Penetration Testing Report Templates

Operating System Distributions / Web application and resource analysis tools

Periodicals / Web application and resource analysis tools

Physical Access Tools / Web application and resource analysis tools

Reverse Engineering / Reverse Engineering Tools

Security Education Courses / Reverse Engineering Tools

Social Engineering / Social Engineering Tools

Static Analyzers / Social Engineering Tools

Vulnerability Databases / Social Engineering Tools

Web Exploitation / Social Engineering Tools

Web Exploitation / Web injection tools

Web Exploitation / Web shells and C2 frameworks

Windows Utilities / Web Exploitation Books

Mar 27, 2019

Network Tools / Transport Layer Security Tools

Mar 11, 2019

Reverse Engineering / Reverse Engineering Tools

Feb 19, 2019

Reverse Engineering / Reverse Engineering Tools

Jan 06, 2019

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Nov 23, 2018

Network Tools / Protocol Analyzers and Sniffers

Reverse Engineering / Reverse Engineering Tools

Apr 14, 2018

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Aug 17, 2017

Reverse Engineering / Reverse Engineering Tools

Jul 28, 2017

Side-channel Tools / Reverse Engineering Tools

Jul 19, 2017

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Jul 18, 2017

Reverse Engineering / Reverse Engineering Tools

Jul 14, 2017

Reverse Engineering / Reverse Engineering Tools

Jul 12, 2017

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Jul 08, 2017

Vulnerability Databases / Social Engineering Tools

Jul 06, 2017

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Network Reconnaissance Tools

Jun 18, 2017

Network Tools / Network Reconnaissance Tools