0% found this document useful (0 votes)
73 views17 pages

Tool List - Hailstorm Security

Tool list - Hailstorm Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views17 pages

Tool List - Hailstorm Security

Tool list - Hailstorm Security
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Tool list

12 min read

Published at: Dec 13, 2023 (Updated at: Dec 13, 2023)

Notes Member
There's generally a tool for everything in cybersecurity - but I've made an attempts to list all the tools I come across
in my work and studies.

Update

A
Tool Description Tags

Anki is a flexible flash card system that applies spaced repetition #learning, Free, Utility, Windows, Linux,
Anki
theory for improved long-term retention development. macOS, Multi-platform, Cloud Service

Try to recover plaintext password information from Hostpad-


Asleap #wifi #cracking
WPE - recoverst weak LEAP and PPTP passwords.

B
Tool Description Tags

#enum, #pen, Free, Open


Basic Blob
Search for public Azure Blobs, enumerating the files. Source, Offense, Multi-
Finder
platform

#web, #pen, Free, Open


The Browser Exploitation Framework is a suite of tools for exploiting
BeEF Source, Offense, Multi-
vulnerabilities in browsers delivered through several attack vectors.
platform

Bloodhound graphically maps the relationships to systems, permissions


on those systems, and the permissions of the users logged onto those #pen, #discovery, Free,
Bloodhound systems to help an attacker identify the most direct route to elevating Open Source, Offense,
the permissions of the system they have access to into a domain admin Linux
account.

#enum, #pen, Free, Open


Bucket Search for AWS S3 storage buckets, identifying them as protected,
Source, Offense, Multi-
Finder public, or not found.
platform

#web, #pen, Free,


Commercial, Offense,
Burp Proxy Cross-platform web proxy for inspecting, attacking web sites and clients.
Windows, Linux, macOS,
Multi-platform

The Swiss Army knife for WiFi, Bluetooth Low Energy, wireless HID #mitm, #pen, #hijacking,
Bettercap
hijacking and IPv4 and IPv6 networks reconnaissance and MITM attacks. #wifi #graphic

C
Tool Description Tags

Certificate
Examine certificate registration data for host and system #defence, #cloud, Free, Offense,
Transparency
discovery. Defense, Cloud Service
Search

Certutil is a utility that ships with Windows for managing


#pen, #defence, #post-exploit,
certificates. Certutil can also download content from an
Certutil #LOL, Commercial, Offense, Defense,
arbitrary URL, can encode and decode Base64 data, and
Utility, Windows
can calculate hashes.

#pen, #resource-dev, Free, Open


CeWL crawls a target website and collect all web pages
CeWL Source, Offense, Utility, Multi-
and common document formats (MS Office, PDF, images)
platform

#pen, #defence, #discovery, Free,


CloudMapper is an open-source tool for visualizing AWS
CloudMapper Open Source, Offense, Defense,
and auditing AWS cloud deployments.
Multi-platform

crt.sh Get hostname for given domain name and certificate


#OSINT
transparency

#pen, #defence, #enum, Free, Open


cURL is a library and command line tool for transferring
Source, Offense, Defense, Utility,
Curl data using various network protocols including HTTP,
Windows, Linux, macOS, Multi-
HTTPS, FTP, and more.
platform

#pen, #defence, #encryption, Free,


The Cyber Swiss Army Knife; a web app for encryption,
Cyber Chef Open Source, Offense, Defense,
encoding, compression and data analysis.
Multi-platform

D
Tool Description Tags

PowerShell script that parses Windows event logs for threat #defence, #parse,Free, Open
DeepBlueCLI
hunting. Source, Defense, Windows

Assess an executable file to identify the location where #pen, #obfuscation, Free, Open
DefenderCheck
Windows Defender characterizes it as malware. Source, Offense, Windows

#pen, #defence, #dns, Free, Open


DNS interrogation tool (the UNIX/Linux/macOS version of
dig Source, Offense, Defense, Utility,
nslookup).
Windows, macOS
Tool Description Tags

Various tools for interrogating Internet-connected systems


#enum, #dns, #cloud, Free, Cloud
DNSStuff including DNS information, IP address information, and
Service
various network configuration settings.

E
Tool Description Tags

Exiftool is a Perl script that extracts metadata from many #pen, #defence, #forensics, Free, Open
Exiftool different file types including Microsoft Office, PDF, many Source, Offense, Defense, Utility, Windows,
different image file types, and more. Linux, macOS, Multi-platform

EyeWitness scans a range of hosts, recording a #pen, #web, #enum, Free, Open Source,
EyeWitness
screenshot of web server content. Offense, Linux

F
Tool Description Tags

#pen, #cloud, #anonymity, Free,


FireProx AWS API proxy tool to masquerade attacker IP address. Open Source, Offense, Multi-
platform, Cloud Service

FTK #forensics, #defence, Free,


FTK Imager is a forensic data imaging and inspection tool.
Imager Defense, Windows

Captures credentials sprayed across the network by various IT and


security products.Captures credentials sprayed across the network by
Flamingo #hijacking #pen #mitm
various IT and security products. SSH, HTTP, LDAP, DNS, FTP, and
SNMP

G
Tool Description Tags

Identify and enumerate the permissions associated with #pen, #cloud, #enum, Free, Open
GCPBucketFinder
Google Compute Buckets. Source, Offense, Multi-platform

Ghidra is a software reverse engineering suite of tools #pen, #defence, #MA, Free, Open
Ghidra
developed by the NSA's Research Directorate. Source, Offense, Defense, Windows

The GNU Debugger is a portable debugger that runs on #debug, Free, Open Source,
GNU Debugger many Unix-like systems and works for many Commercial, Utility, Windows,
programming languages. Linux, macOS

Google Hacking Search tool to use Google to identify vulnerabilities in #enum, #pen, #web, Free, Cloud
Database public websites. A collection of Google Dorks Service

H
Tool Description Tags

Multi-functional password hash recovery tool; #pen, #cracking, Free, Open Source, Offense,
Hashcat
predominantly uses GPUs for cracking functionality. Windows, Linux, macOS, Multi-platform

Have I Been Service to determine if an email address or username #pen, #defence, #enum, Free, Offense,
Pwned is known to have been included in a major breach. Defense, Cloud Service

#pen, #password-harvesting, Free, Open


Hydra Online password guessing tool.
Source, Offense, Windows, Linux, macOS

Hostapd- Impersonate attacking tool against enterprise


#wifi #pen #impersonation
WPE networks.

I
Tool Description Tags

IDA Pro is a commercial disassembler, useful for malware analysis #MA, #static, Commercial, Offense,
IDA Pro
and many other reverse-engineering tasks. Defense, Windows, Linux, macOS
Tool Description Tags

Active and passive scanning for wifi. Identifies SSID, security settings,
inSSIDer signal strength, and channel information. Integrates with GPS for #pen #wifi #recon #enum
location mapping.

J
Tool Description Tags

Multi-functional password hash recovery tool;


John the #pen, #cracking, Free, Open Source, Offense,
predominantly uses the local CPU for cracking
Ripper Windows, Linux, macOS, Multi-platform
functionality.

#parse, Free, Open Source, Utility, Windows,


JQ JQ is a command line tool for processing JSON data.
Linux, macOS

K
Tool Description Tags

Passively captures Wi-Fi activity, preventing any opportunity for discovery. Provides detailed #pen #wifi
Kismet
information about network and clients as they are seen. #recon

L
Tool Description Tags

LiSt Open Files, including open TCP and UDP port #defence, Free, Open Source, Defense,
lsof
usage. Linux

Lusrmgr.msc is the snap in configuration utility to #defence, #preparation, Commercial,


Lusrmgr.msc
manage local users and groups. Defense, Utility, Windows

M
Tool Description Tags

Port scanning tool designed to scan large quantities of IP #pen, #enum, Free, Open Source,
Massscan
addresses. Offense, Linux

#pen, #impersonation, Free,


A free assembler, disassembler, and compiler written in Ruby.
Metasm Open Source, Offense, Windows,
Metasm can be used for Ghostwriting attacks.
Linux, macOS, Multi-platform

Attack framework for combining exploits, payloads, auxiliary


Metasploit #pen, #framework, Free, Open
modules, and post-exploitation modules against identified
Framework Source, Offense, Multi-platform
targets.

Metasploit Advanced Command & Control framework that is part of the #pen, #shell, Free, Open Source,
Meterpreter Metasploit Framework. Offense, Multi-platform

#pen, #password-harvesting,
Mimikatz is a well-known password and password hash
Mimikatz Free, Open Source, Offense,
extraction tool for Windows.
Windows

#compiler, #C, #pen, #LOL,


MSBuild.exe is a built-in Windows tool for building and
MSBuild Commercial, Offense, Utility,
executing C/C++/C# code.
Windows

The Msconfig.exe utility is the Windows System Configuration #defence, #detection, #LOL,
Msconfig utility, intended for managing configuration and troubleshooting Commercial, Defense, Utility,
tasks on Windows. Windows

#pen, #resource-dev, Free, Open


MsfVenom is a part of the Metasploit Framework, capable of
Source, Offense, Utility,
MsfVenom generating and encoding Metasploit Framework payloads into
Windows, Linux, macOS, Multi-
independent executables.
platform

#pen, #M365, #password-


Microsoft 365 password attack tool. Customised version harvesting, Free, Open Source,
MSOLSpray
available at https://github.com/joswr1ght/MSOLSpray. Offense, Multi-platform, Cloud
Service

N
Tool Description Tags

#enum, #pen, #impersonation, Free,


Namechk Check multiple online sources for registered usernames.
Offense, Defense, Cloud Service
Tool Description Tags

#pen, #defence, #enum, #collection,


Nbtstat is a built-in Windows tool for collecting information on
Nbtstat #SMB, Commercial, Offense,
SMB servers over the NetBIOS protocol, over TCP.
Defense, Utility, Windows

#pen, #defence, #privesc,


Net Commands can be used to perform operations on Groups,
Net Commercial, Offense, Defense,
users, account policies, shares etc.
Utility, Windows

#pen, #defence, Free, Open Source,


Netcat is a featured networking utility which reads and writes data
Netcat Offense, Defense, Utility, Windows,
across network connections, using the TCP/IP protocol.
Linux, macOS, Multi-platform

Netsh is a command line scripting utility that allows you to display


#pen, #defence, #enum, #packet-
or modify the network configuration of a computer that is
Netsh capture, #LOL Commercial, Offense,
currently running. Netsh can be used to create local packet
Defense, Utility, Windows
captures on Windows hosts.

#pen, #defence, #network, Free,


Open Source, Commercial, Offense,
Netstat Identify listening services, connections on a host system.
Defense, Utility, Windows, Linux,
macOS, Multi-platform

#pen, #enum, Free, Open Source,


Nmap Network port scan, mapping, and assessment tool.
Offense, Windows, Linux, macOS

Ntdsutil.exe is a command line tool that provides management


facilities for Active Directory Domain Services (AD DS) and Active #pen, #defence, #AD, #password-
Ntdsutil) Directory Lightweight Directory Services (AD LDS). Widely used by harvesting, Commercial, Offense,
attackers to retrieve domain password hash data for processing Defense, Utility, Windows
with Impacket secretsdump.py.

O
Tool Description Tags

#encryption, OpenSSL is a programming library for encryption and encoding


Free, Open Source,
operations, implementing several common network protocols (such as TLS and
OpenSSL Utility, Windows,
SSL). OpenSSL also has a command-line companion tool openssl that can be
Linux, macOS
used as a listener or a client.

P
Tool Description Tags

#pen, #framework, #cloud,


Pacu is a modular collection of exploits for multiple cloud
Pacu Free, Open Source, Offense,
enumeration, privilege escalation, and data exfiltration.
Multi-platform

Passwd is a Linux utility to change your password, or other user's #LOLFree, Open Source,
passwd
passwords when you have root privileges. Offense, Defense, Utility, Linux

#enum, #windows, #post-


PowerShell cmdlets for interrogating Windows systems including
PowerView exploit, #pen, Free, Open
multiple scanning and enumeration functions.
Source, Offense, Windows

#forensics, #graphic, Free,


ProcDOT takes output from Process Monitor, and optionally a
ProcDOT Open Source, Defense,
PCAP file, and displays the events graphically.
Windows, Linux

Procdump is part of the SysInternals suite for Windows, allowing


#password-harvesting, #LOL,
an administrator to dump the memory from running processes.
Procdump Free, Offense, Defense, Utility,
Procdump is often used with Mimikatz for password and password
Windows
hash retrieval.

Process Explorer of a part of the Microsoft SysInternals suite of #defence, #windows,


Process
tools, used for tracking process execution for Windows #detection, #LOL, Free,
Explorer
executables. Defense, Utility, Windows

Procmon is a component of the Microsoft SysInternals suite of


Process #defence, #detection,
tools, used for real-time file system, Registry and process
Monitor #windows, #LOL, Free,
monitoring. It replaces the two legacy SysInternals utilities, Filemon
(Procmon) Defense, Utility, Windows
and Regmon.

Ptunnel TCP over ICMP Echo and Reply #pen, #exfiltration

#pen #anonymity #post-


Phant0m A tool to identify and kill Windows Event Log Threads
exploit

R
Tool Description Tags

#defence, #threat-hunt,
Real
Free, Open Source,
Intelligence RITA is an open source framework for network traffic analysis and threat
Defense, Windows,
Threat hunting.
Linux, macOS, Multi-
Analytics
platform
Tool Description Tags

#windows, #registry,
The reg utility reads and writes to the Windows registry from the Commercial, Offense,
Reg
command line. Defense, Utility,
Windows

Regshot is a snapshot recording tool for Windows. It allows you to record


a snapshot of the registry and optionally the file system at two points in #MA, #registry, Free,
Regshot time. Regshot provides a high level summary of the changes, showing the Open Source, Utility,
registry keys that were added, removed, and modified. It will also Windows
summarize the files that were added, removed, and modified.

Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in


HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting #hijacking, #pen, Free,
NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP Open Source, Offense,
Responder
authentication. Responder is commonly used to steal authentication Windows, Linux,
credentials from Windows victims on the LAN through the LLMNR macOS
protocol.

#RPC, Free, Open


Rpcclient Interrogate Windows RPC services from Linux.
Source, Utility, Linux

S
Tool Description Tags

#cloud, #parse, Free, Open


s3logparse Summarise and collect data from AWS S3 logs. Source, Defense, Utility, Multi-
platform

Collection of tools to interact with Windows systems from #SMB, Free, Open Source,
Samba
Linux. Offense, Utility, Linux

#windows, #services,
Service Control, control Windows services from the command
sc Commercial, Offense, Defense,
line.
Utility, Windows

#LOL, #persistence, Commercial,


Schtasks is a Windows built-in utility for managing scheduled
Schtasks Offense, Defense, Utility,
tasks.
Windows

#cloud, #enum, Free, Open


ScoutSuite is a dedicated vulnerability assessment tool for
ScoutSuite Source, Offense, Defense, Multi-
cloud environments
platform
Tool Description Tags

Part of Impacket, secretsdump.py extracts password hash #gen, #password-harvesting,


Secretsdump.py information from the Windows domain SAM file and SYSTEM Free, Open Source, Offense,
hive (typically from the output of ntdsutil). Windows, Linux, macOS

Online vulnerability assessment/network security auditing #audit, Commercial, Cloud


SecuritySpace
services including network monitoring and notification. Service

#graphic, #defence, #services,


Services.msc is the command to open the snap-in control
services.msc Commercial, Defense, Utility,
panel for managing Windows services in a GUI interface.
Windows

Interrogate Windows properties including users, platforms, #windows, #pen, #enum, Free,
SharpView
domain settings, and more. Open Source, Offense, Windows

Use Shodan to discover Internet devices including vulnerable #OSINT, #enum, Free,
SHODAN
platforms and systems. Commercial, Cloud Service

FTP-like client to access SMB/CIFS resources on servers and to #SMB, #pen, Free, Open Source,
Smbclient
interrogate Windows settings. Offense, Utility, Linux

SMBeagle is an (SMB) fileshare auditing tool that hunts out all


Smbeagle files it can see in the network and reports if the file can be #enum, #SMB
read and/or written. Output to csv.

#OSINT, #pen, #parse, Free,


SpiderFoot collets OSINT data from hundreds of online
SpiderFoot Open Source, Offense, Windows,
sources, using the collected data to seed additional searches.
Linux, macOS

Sqlmap is an open source penetration testing tool that #web, #pen,Free, Open Source,
Sqlmap automates the process of detecting and exploiting SQL Defense, Windows, Linux, macOS,
injection flaws. Multi-platform

#defence, #web, #proxy, Free,


Squid Squid is a popular open source web proxy tool. Open Source, Defense, Windows,
Linux, macOS

A forensics tool to convert the data in the Windows SRUM


#forensics, Free, Open Source,
SRUM-Dump (System Resource Usage Monitor) database to an xlsx
Defense, Windows
spreadsheet.

The Linux strings utility extracts plaintext strings from a #MA, Free, Open Source,
Strings (Linux)
specified file, supporting both ASCII and UTF-16 string data. Defense, Utility, Linux

The Strings utility for Windows is part of the SysInternals suite


Strings #MA, Free, Defense, Utility,
of tools. Strings can extract ASCII and UTF-16 string values
(Windows) Windows
from an arbitrary file.
Tool Description Tags

Sudo is a program for Unix-like computer operating systems


#linux, Free, Open Source, Utility,
Sudo that allows users to run programs with the security privileges
Linux, macOS
of another user.

Sysinternals is a collection of tools to perform advanced


#windows, Free, Defense, Utility,
SysInternals management, diagnostics, troubleshooting, and monitoring in
Windows
a Microsoft Windows environment.

#linux, Free, Open Source,


systemctl Control Linux services.
Offense, Defense, Linux

T
Tool Description Tags

#windows, #enum,
Tasklist is a built-in Windows tool that enumerates running processes and
Tasklist Commercial, Offense,
services.
Defense, Utility, Windows

#packet-capture, Free, Open


Source, Offense, Defense,
Tcpdump Tcpdump is a command line network packet capture and analysis tool.
Utility, Windows, Linux,
macOS

TCPView is part of the Microsoft SysInternals suite of tools that will show #enum, #LOL, #windows,
TCPView you detailed listings of all TCP and UDP endpoints on your system, Free, Defense, Utility,
including the local and remote addresses and state of TCP connections. Windows

TLS-Scan by Binu Ramakrishnan is a network scanning tool to extract SSL


and TLS certificate details from servers, saving the output as a JSON file. #enum, #certificate, Free,
TLS-Scan TLS-Scan can be useful for identifying attribution for a server based on Open Source, Offense,
certificate details including the organization name and common name Utility, Linux, macOS
fields.

#forensics, Free, Open


Source, Offense, Defense,
Tshark Tshark is a command line version of Wireshark.
Utility, Windows, Linux,
macOS

U
Tool Description Tags

#cracking, Included with John the Ripper, unshadow merges Free, Open Source, Offense,
Unshadow the password and shadow files into a single unified file for Utility, Windows, Linux, macOS,
password cracking efficiency. Multi-platform

The US Government Securities and Exchange Commission


US Government #enum, #db, Free, Offense,
(SEC) can be a useful information source for collecting data
SEC Database Defense, Cloud Service
for publicly traded US companies.

Useradd is a Linux tool to add new user accounts to the #linux, Free, Open Source,
useradd
system. Offense, Defense, Utility, Linux

V
Tool Description Tags

#defence, #threat-hunt, Free,


Velociraptor uses client endpoint software to collect and report
Velociraptor Open Source, Defense,
information on Windows, Linux, and macOS systems
Windows, Linux, macOS

#memory, #forensics, Free,


Volatility Volatility is an open-source memory forensics framework. Open Source, Defense,
Windows, Linux, macOS

#graphic, #defence, Free,


Visualize AWS VPC flow logs; original source at
vpc-flow-log- Open Source, Commercial,
https://github.com/FlorianPfisterer/vpc-flow-log-analysis (URL cited
analysis Defense, Windows, Linux,
includes features added by Joshua Wright)
macOS

W
Tool Description Tags

Wevtutil is a command line tool that comes with Windows #windows, #LOL, Commercial, Offense,
Wevtutil
for managing event log data including purging event logs. Defense, Utility, Windows

#web, #enum, Free, Open Source, Offense,


wget Web Get; retrieve content from a specified URL.
Defense, Utility, Windows, Linux, macOS

whois Linux utility to interrogate DNS registration data. #dns, Utility, Linux, macOS
Tool Description Tags

#windows, #packet-capture, Free, Open


Windump Windump is a port of the TCPDump tool to Windows.
Source, Offense, Defense, Utility, Windows

#forensics, #network, Free, Open Source,


Wireshark is the world’s foremost and widely-used network
Wireshark Offense, Defense, Windows, Linux, macOS,
protocol analyser.
Multi-platform

Windows Management Instrumentation Console, access


#LOL, #windows, Commercial, Offense,
wmic several components of Windows systems and functionality
Defense, Utility, Windows
form the command line.

X
Tool Description Tags

xlek is a resource to search millions of online data records for #enum, Free, Offense, Defense, Cloud
xlek
free. Service

Z
Tool Description Tags

Zeek is a free and open-source software network analysis #defence, #detection, Free, Open
Zeek framework. Zeek logging data is used to supply RITA with data for Source, Defense, Windows, Linux,
network threat hunting analysis. macOS

#graphic, #enum, Free, Open


Zenmap GUI front-end and visualization tool for Nmap. Source, Offense, Windows, Linux,
macOS

Support me
Thank you so much for reading and I hope you found it inspirational or helpful! You can best support me by doing any of
the following bellow!

Turn off Adblocker: A simple yet impactful way to support me for free.
Sign Up: If you haven't already, consider signing up to get access to more content and receive optional newsletters.

Buy Premium: Explore the Premium option for additional perks and exclusive content.

Give a Tip: Your generosity is always very appreciated.

You can read more about the perks of being a Member or Subscriber here.

Additionally, you can stay updated and engage with me on social media:

Twitter: Follow for real-time updates and insights.

LinkedIn: Connect with me on a professional platform.

Discussion
0 comments

CA Start the conversation Add comment

Before commenting, please read the Community guidelines.

Continue reading

Nessus - TryHackMe
5 min read

In this walkthrough we will demonstrate the steps necessary


to complete the Nessus room on TryHackMe.

beginner writeup recon May 17, 2024


Manatee Snorkel Tours
Manatee Tours, Kayak Rentals, and Pontoon Rentals In Crystal River, F

Waterfront Adventures O

dé Digital Recruitment Agency

Getnoticed Open

Privacy Policy | Copyright © Hailstorm Security 2023

You might also like