본문 바로가기

보안/웹 해킹_보안

Kali Linux Tools Reference

• http://www.aldeid.com

http://www.morningstarsecurity.com

http://www.hackingdna.com

http://zer0byte.com/2013/03/19/kali-linux-complete-tools-list-installation-screen-shots/

http://www.monkey.org/~dugsong/fragroute/

http://www.sans.org/security-resources/idfaq/fragroute.php

http://flylib.com/books/en/3.105.1.82/1/

http://www.darknet.org.uk/2008/04/cdpsnarf-cdp-packet-sniffer/

http://mateslab.weebly.com/dnmap-the-distributed-nmap.html

http://www.tuicool.com/articles/raimMz

http://backtrackwasneversoeasy.blogspot.co.uk/2012/02/terminating-internet-of-whole-network.html

http://www.ethicalhacker.net

http://nmap.org/ncat/guide/ncat-tricks.html

http://nixgeneration.com/~jaime/netdiscover/

http://csabyblog.blogspot.co.uk

http://thehackernews.com

https://code.google.com/p/wol-e/wiki/Help

http://linux.die.net/man/1/xprobe2

http://www.digininja.org/projects/twofi.php

https://code.google.com/p/intrace/wiki/intrace

https://github.com/iSECPartners/sslyze/wiki

http://www.securitytube-tools.net/index.php@title=Braa.html

http://security.radware.com


http://www.kali.org/

http://www.backtrack-linux.org

http://www.question-defense.com

http://www.vulnerabilityassessment.co.uk/torch.htm

http://myexploit.wordpress.com/network-copy-router-config-pl-merge-router-config-pl/

http://www.securitytube.net

http://www.rutschle.net/tech/sslh.shtml

http://althing.cs.dartmouth.edu/local/www.thoughtcrime.org/ie.html

http://www.thoughtcrime.org/software/sslstrip/

http://ucsniff.sourceforge.net/ace.html

http://www.phenoelit.org/irpas/docu.html

http://www.forensicswiki.org/wiki/Tcpflow

http://linux.die.net/man/1/wireshark

http://www.nta-monitor.com/tools-resources/security-tools/ike-scan

http://www.vulnerabilityassessment.co.uk/cge.htm

http://www.yersinia.net

http://www.cqure.net/wp/tools/database/dbpwaudit/

https://code.google.com/p/hexorbase/

http://sqlmap.org/

http://sqlsus.sourceforge.net/

http://www.jammed.com/~jwa/hacks/security/tnscmd/tnscmd-doc.html

http://mazzoo.de/blog/2006/08/25#ohrwurm

http://securitytools.wikidot.com


https://www.owasp.org

http://www.powerfuzzer.com

http://sipsak.org/

http://resources.infosecinstitute.com/intro-to-fuzzing/

http://www.rootkit.nl/files/lynis-documentation.html

http://www.cirt.net/nikto2

http://pentestmonkey.net/tools/audit/unix-privesc-check

http://www.openvas.org

http://blindelephant.sourceforge.net/

http://code.google.com/p/plecost

http://packetstormsecurity.com/files/94305/UA-Tester-User-Agent-Tester-1.03.html

http://portswigger.net/burp/

http://sourceforge.net/projects/websploit/

http://www.edge-security.com/wfuzz.php

https://code.google.com/p/wfuzz

http://xsser.sourceforge.net/

http://www.testingsecurity.com/paros_proxy

http://www.parosproxy.org/

http://www.edge-security.com/proxystrike.php

http://www.hackingarticles.in

http://tipstrickshack.blogspot.co.uk/2012/11/how-to-use-websploit.html

http://cutycapt.sourceforge.net/

http://dirb.sourceforge.net


http://www.skullsecurity.org/

http://deblaze-tool.appspot.com

http://www.securitytube-tools.net/index.php@title=Grabber.html

http://rgaucher.info/beta/grabber/

http://howtohack.poly.edu/wiki/Padding_Oracle_Attack

http://blog.gdssecurity.com/labs/2010/9/14/automated-padding-oracle-attacks-with-padbuster.html

https://code.google.com/p/skipfish/

http://w3af.org/

http://wapiti.sourceforge.net/

http://www.scrt.ch/en/attack/downloads/webshag

http://www.hackingdna.com/2013/01/webshag-on-backtrack-5.html

http://www.digininja.org/projects/cewl.php

http://hashcat.net

https://code.google.com/p/pyrit

http://www.securiteam.com/tools/5JP0I2KFPA.html

http://freecode.com/projects/chntpw

http://whatisgon.wordpress.com/2010/01/28/chntpw-tutorial-resetting-windows-passwords-editing-registry-linux/

http://www.cgsecurity.org/cmospwd.txt

http://adaywithtape.blogspot.co.uk/2011/05/creating-wordlists-with-crunch-v30.html

http://hashcat.net

http://ixplizit.wordpress.com/2012/04/08/hashcat-the-very-basic/

https://code.google.com/p/hash-identifier/

http://www.osix.net/modules/article/?id=455


http://cse.spsu.edu/raustin2/coursefiles/forensics/How_to_use_Volatility_v2.pdf

http://thesprawl.org/projects/pack/#maskgen

http://dev.man-online.org/man1/ophcrack-cli/

http://ophcrack.sourceforge.net/

http://manned.org

http://www.onlinehashcrack.com/how_to_crack_windows_passwords.php

http://project-rainbowcrack.com

http://www.randomstorm.com/rsmangler-security-tool.php

http://pentestn00b.wordpress.com

http://bernardodamele.blogspot.co.uk/2011/12/dump-windows-password-hashes.html

http://manpages.ubuntu.com/manpages/natty/man1/sipcrack.1.html

http://www.leidecker.info/projects/sucrack.shtml

http://santoshdudhade.blogspot.co.uk/2012/12/findmyhash-112-python-script-to-crack.html

http://www.foofus.net/jmk/medusa/medusa.html#how

http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/medusa

http://nmap.org/ncrack/man.html

http://leidecker.info/projects/phrasendrescher.shtml

http://wiki.thc.org/BlueMaho

http://flylib.com/books/en/3.418.1.83/1/

http://www.hackfromacave.com

http://www.pentest.co.uk/downloads.html?cat=downloads&section=01_bluetooth

https://github.com/rezeusor/killerbee

https://code.google.com/p/nfc-tools/source/browse/trunk/mfoc/src/mfoc.c?r=977


http://nfc-tools.org

http://www.binarytides.com/hack-windows-social-engineering-toolkit-java-applet/

http://seclists.org

http://www.openbsd.org/cgi-bin/man.cgi?query=sshd&sektion=8

http://recordmydesktop.sourceforge.net/manpage.php

http://www.truecrypt.org

http://keepnote.org

http://apache.org

https://github.com/simsong/AFFLIBv3

http://www.computersecuritystudent.com/FORENSICS/VOLATILITY

http://csabyblog.blogspot.co.uk/2013/01/backtrack-forensics-volafox.html

http://www.sleuthkit.org/autopsy/desc.php

http://sysforensics.org/2012/02/sleuth-kit-part-2-mmls-and-mmstat.html

http://guymager.sourceforge.net/

http://www.myfixlog.com/fix.php?fid=33

http://www.gnu.org/software/ddrescue/manual/ddrescue_manual.html

http://www.spenneberg.org/chkrootkit-mirror/faq/

http://www.aircrack-ng.org/

https://sites.google.com/site/clickdeathsquad/Home/cds-wpacrack

http://www.willhackforsushi.com

http://www.ciscopress.com

http://openmaniak.com/kismet_platform.php

http://sid.rstack.org/static/


http://www.digininja.org

http://thesprawl.org/projects/dnschef/

http://hackingrelated.wordpress.com

http://r00tsec.blogspot.co.uk/2011/07/hacking-with-evilgrade-on-backtrack5.html

https://github.com/vecna/sniffjoke

http://tcpreplay.synfin.net

http://dallachiesa.com/code/rtpbreak/doc/rtpbreak_en.html

http://tomeko.net/other/sipp/sipp_cheatsheet.php?lang=pl

http://sipp.sourceforge.net/

https://code.google.com/p/sipvicious/wiki/GettingStarted

http://voiphopper.sourceforge.net/

http://ohdae.github.io/Intersect-2.5/#Intro

http://obscuresecurity.blogspot.co.uk/2013/03/powersploit-metasploit-shells.html

http://dev.kryo.se/iodine/wiki/HowtoSetup

http://proxychains.sourceforge.net/

http://man.cx/ptunnel(8)

http://www.sumitgupta.net/pwnat-example/

https://github.com/

http://www.dest-unreach.org/socat/doc/README

https://bechtsoudis.com/webacoo/

http://inundator.sourceforge.net/

http://vinetto.sourceforge.net/

http://www.elithecomputerguy.com/classes/hacking/