zoukankan      html  css  js  c++  java
  • 1021.安全资源共享

    Web安全视频

    渗透测试靶场

    渗透测试资源

    JavaWeb资源

    渗透测试思维导图

    Web安全思维导图

    移动安全思维导图

    安全开发思维导图

    • Security – 安全开发思维导图

    CTF思维导图

    业务安全思维导图

    • Security – 业务安全思维导图

    基于docker渗透测试平台

    Web漏洞docker平台

    主机漏洞docker平台

    基于Python语言POC&EXP收集

    • ActiveMQ – ActiveMQ的PUT 上传getshellExP CVE-2016-3088

    Exploit

    社会工程学

    安全工具

    集成渗透测试工具

    • Kali – 一个Linux发行版,用来做数字取证和渗透测试。
    • ArchStrike – Arch GNU/Linux repository for security professionals and enthusiasts.
    • BlackArch – Arch GNU/Linux-based distribution for penetration testers and security researchers.
    • Network Security Toolkit (NST) – 网络安全工具包发行版
    • Pentoo -着眼于安全的基于Gentoo的 LiveCD
    • BackBox – 基于Ubuntu的发行版,用于渗透测试及安全评估
    • Parrot – Distribution similar to Kali, with multiple architecture.
    • Buscador – GNU/Linux virtual machine that is pre-configured for online investigators.
    • Fedora Security Lab – Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.
    • The Pentesters Framework – Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.

    渗透测试神器

    • Metasploit Framework – 应用最广的渗透测试软件
    • burp suite – 抓包工具,针对Web应用执行安全检测
    • ExploitPack – Graphical tool for penetration testing with a bunch of exploits.
    • BeEF – Command and control server for delivering exploits to commandeered Web browsers.
    • faraday – Collaborative penetration test and vulnerability management platform.
    • evilgrade – The update explotation framework.
    • routersploit – Automated penetration testing software for router.
    • redsnarf – Post-exploitation tool for grabbing credentials.
    • Bella – Pure Python post-exploitation data mining & remote administration tool for Mac OS.
    • Offensive Web Testing Framework (OWTF) – Python-based framework for pentesting Web applications based on the OWASP Testing Guide.

    基于docker渗透测试工具

    漏洞扫描神器

    • Nexpose – 漏洞管理&风险控制软件
    • Nessus – 漏洞,配置,和合规检测
    • OpenVAS – 开源漏洞扫描器
    • Vuls – Agentless vulnerability scanner for GNU/Linux and FreeBSD, written in Go.

    代码审计

    • Brakeman – Static analysis security vulnerability scanner for Ruby on Rails applications.
    • cppcheck – Extensible C/C++ static analyzer focused on finding bugs.
    • FindBugs – Free software static analyzer to look for bugs in Java code.
    • sobelow – Security-focused static analysis for the Phoenix Framework.

    Web安全扫描工具

    • Nikto – Web服务器和Web应用程序漏洞扫描程序
    • Arachni – Scriptable framework for evaluating the security of web applications.
    • w3af – Web应用程序攻击和审计框架
    • Wapiti – Black box web application vulnerability scanner with built-in fuzzer.
    • SecApps – In-browser web application security testing suite.
    • WebReaver – Commercial, graphical web application vulnerability scanner designed for macOS.
    • WPScan – 黑盒wordpress扫描工具
    • cms-explorer – Reveal the specific modules, plugins, components and themes that various websites powered by content management systems are running.
    • joomscan – Joomla vulnerability scanner.

    网络安全扫描工具

    • zmap – 开源网络端口扫描器
    • nmap – 免费的安全扫描器,用于网络勘测和安全审计
    • pig – GNU/Linux packet crafting tool.
    • scanless – Utility for using websites to perform port scans on your behalf so as not to reveal your own IP.
    • tcpdump/libpcap – Common packet analyzer that runs under the command line.
    • Wireshark – 一个Unix和Windows系统的传输协议分析工具
    • Network Tools – Different network tools: ping, lookup, whois, etc.
    • netsniff-ng – Swiss army knife for for network sniffing.
    • Intercepter-NG – Multifunctional network toolkit.
    • SPARTA – Network infrastructure penetration testing tool.
    • dnschef – Highly configurable DNS proxy for pentesters.
    • DNSDumpster – Online DNS recon and search service.
    • CloudFail – Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
    • dnsenum – Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
    • dnsmap – Passive DNS network mapper.
    • dnsrecon – DNS enumeration script.
    • dnstracer – Determines where a given DNS server gets its information from, and follows the chain of DNS servers.
    • passivedns-client – Library and query tool for querying several passive DNS providers.
    • passivedns – Network sniffer that logs all DNS server replies for use in a passive DNS setup.
    • Mass Scan – TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
    • Zarp – Network attack tool centered around the exploitation of local networks.
    • mitmproxy – Interactive SSL-capable intercepting HTTP proxy for penetration testers and software developers.
    • Morpheus – Automated ettercap TCP/IP Hijacking tool.
    • mallory – HTTP/HTTPS proxy over SSH.
    • SSH MITM – Intercept SSH connections with a proxy; all plaintext passwords and sessions are logged to disk.
    • Netzob – Reverse engineering, traffic generation and fuzzing of communication protocols.
    • DET – Proof of concept to perform data exfiltration using either single or multiple channel(s) at the same time.
    • pwnat – Punches holes in firewalls and NATs.
    • dsniff – Collection of tools for network auditing and pentesting.
    • tgcd – Simple Unix network utility to extend the accessibility of TCP/IP based network services beyond firewalls.
    • smbmap – Handy SMB enumeration tool.
    • scapy – Python-based interactive packet manipulation program & library.
    • Dshell – Network forensic analysis framework.
    • Debookee (macOS) – Intercept traffic from any device on your network.
    • Dripcap – Caffeinated packet analyzer.
    • PRET – Printer Exploitation Toolkit offers commands useful for printer attacks and fuzzing.
    • Praeda – Automated multi-function printer data harvester for gathering usable data during security assessments.

    无线网络扫描工具

    • Aircrack-ng – Set of tools for auditing wireless networks.
    • Kismet – Wireless network detector, sniffer, and IDS.
    • Reaver – Brute force attack against WiFi Protected Setup.
    • Wifite – Automated wireless attack tool.

    SSL扫描分析工具

    • SSLyze – SSL configuration scanner.
    • sslstrip – Demonstration of the HTTPS stripping attacks.
    • sslstrip2 – SSLStrip version to defeat HSTS.
    • tls_prober – Fingerprint a server’s SSL/TLS implementation.

    Web exploitation

    • OWASP Zed Attack Proxy (ZAP) – Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
    • Fiddler – Free cross-platform web debugging proxy with user-friendly companion tools.
    • Burp Suite – Integrated platform for performing security testing of web applications.
    • autochrome – Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
    • WordPress Exploit Framework – Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
    • WPSploit – Exploit WordPress-powered websites with Metasploit.
    • SQLmap – Automatic SQL injection and database takeover tool.
    • tplmap – Automatic server-side template injection and Web server takeover tool.
    • weevely3 – Weaponized web shell.
    • Wappalyzer – Wappalyzer uncovers the technologies used on websites.
    • WhatWeb – Website fingerprinter.
    • BlindElephant – Web application fingerprinter.
    • wafw00f – Identifies and fingerprints Web Application Firewall (WAF) products.
    • fimap – Find, prepare, audit, exploit and even Google automatically for LFI/RFI bugs.
    • Kadabra – Automatic LFI exploiter and scanner.
    • Kadimus – LFI scan and exploit tool.
    • liffy – LFI exploitation tool.
    • Commix – Automated all-in-one operating system command injection and exploitation tool.
    • DVCS Ripper – Rip web accessible (distributed) version control systems: SVN/GIT/HG/BZR.
    • GitTools – Automatically find and download Web-accessible .git repositories.

    Hex Editors

    • HexEdit.js – Browser-based hex editing.
    • Hexinator – World’s finest (proprietary, commercial) Hex Editor.
    • Frhed – Binary file editor for Windows.

    文件转换分析工具

    • Kaitai Struct – File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
    • Veles – Binary data visualization and analysis tool.
    • Hachoir – Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.

    Hash破解工具

    • John the Ripper – Fast password cracker.
    • Hashcat – The more fast hash cracker.
    • CeWL – Generates custom wordlists by spidering a target’s website and collecting unique words.

    DDoS工具

    • LOIC – Open source network stress tool for Windows.
    • JS LOIC – JavaScript in-browser version of LOIC.
    • SlowLoris – DoS tool that uses low bandwidth on the attacking side.
    • HOIC – Updated version of Low Orbit Ion Cannon, has ‘boosters’ to get around common counter measures.
    • T50 – Faster network stress tool.
    • UFONet – Abuses OSI layer 7 HTTP to create/manage ‘zombies’ and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.

    社会工程学工具

    • Social Engineer Toolkit (SET) – Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
    • King Phisher – Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
    • Evilginx – MITM attack framework used for phishing credentials and session cookies from any Web service.
    • wifiphisher – Automated phishing attacks against WiFi networks.
    • Catphish – Tool for phishing and corporate espionage written in Ruby.

    逆向分析工具

    • IDA Pro – Windows, GNU/Linux or macOS hosted multi-processor disassembler and debugger.
    • IDA Free – The freeware version of IDA v5.0.
    • WDK/WinDbg – Windows Driver Kit and WinDbg.
    • OllyDbg – x86 debugger for Windows binaries that emphasizes binary code analysis.
    • Radare2 – Open source, crossplatform reverse engineering framework.
    • x64dbg – Open source x64/x32 debugger for windows.
    • Immunity Debugger – Powerful way to write exploits and analyze malware.
    • Evan’s Debugger – OllyDbg-like debugger for GNU/Linux.
    • Medusa disassembler – Open source interactive disassembler.
    • plasma – Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
    • peda – Python Exploit Development Assistance for GDB.
    • dnSpy – Tool to reverse engineer .NET assemblies.

    CTF工具

    • ctf-tools – Collection of setup scripts to install various security research tools easily and quickly deployable to new machines.
    • Pwntools – Rapid exploit development framework built for use in CTFs.
    • RsaCtfTool – Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.

    在线漏洞推荐列表

    • Common Vulnerabilities and Exposures (CVE) – Dictionary of common names (i.e., CVE Identifiers) for publicly known security vulnerabilities.
    • National Vulnerability Database (NVD) – United States government’s National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
    • US-CERT Vulnerability Notes Database – Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
    • Full-Disclosure – Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
    • Bugtraq (BID) – Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
    • Exploit-DB – Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
    • Microsoft Security Bulletins – Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).
    • Microsoft Security Advisories – Archive of security advisories impacting Microsoft software.
    • Mozilla Foundation Security Advisories – Archive of security advisories impacting Mozilla software, including the Firefox Web Browser.
    • Packet Storm – Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
    • CXSecurity – Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
    • SecuriTeam – Independent source of software vulnerability information.
    • Vulnerability Lab – Open forum for security advisories organized by category of exploit target.
    • Zero Day Initiative – Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
    • Vulners – Security database of software vulnerabilities.
    • Inj3ct0r (Onion service) – Exploit marketplace and vulnerability information aggregator.
    • Open Source Vulnerability Database (OSVDB) – Historical archive of security vulnerabilities in computerized equipment, no longer adding to its vulnerability database as of April, 2016. Continued by Risk Based Security as a commercial VDB.

    安全课程

    信息安全会议

    • DEF CON – Annual hacker convention in Las Vegas.
    • Black Hat – Annual security conference in Las Vegas.
    • BSides – Framework for organising and holding security conferences.
    • CCC – Annual meeting of the international hacker scene in Germany.
    • DerbyCon – Annual hacker conference based in Louisville.
    • PhreakNIC – Technology conference held annually in middle Tennessee.
    • ShmooCon – Annual US East coast hacker convention.
    • CarolinaCon – Infosec conference, held annually in North Carolina.
    • CHCon – Christchurch Hacker Con, Only South Island of New Zealand hacker con.
    • SummerCon – One of the oldest hacker conventions, held during Summer.
    • Hack.lu – Annual conference held in Luxembourg.
    • Hackfest – Largest hacking conference in Canada.
    • HITB – Deep-knowledge security conference held in Malaysia and The Netherlands.
    • Troopers – Annual international IT Security event with workshops held in Heidelberg, Germany.
    • Hack3rCon – Annual US hacker conference.
    • ThotCon – Annual US hacker conference held in Chicago.
    • LayerOne – Annual US security conference held every spring in Los Angeles.
    • DeepSec – Security Conference in Vienna, Austria.
    • SkyDogCon – Technology conference in Nashville.
    • SECUINSIDE – Security Conference in Seoul.
    • DefCamp – Largest Security Conference in Eastern Europe, held anually in Bucharest, Romania.
    • AppSecUSA – Annual conference organised by OWASP.
    • BruCON – Annual security conference in Belgium.
    • Infosecurity Europe – Europe’s number one information security event, held in London, UK.
    • Nullcon – Annual conference in Delhi and Goa, India.
    • RSA Conference USA – Annual security conference in San Francisco, California, USA.
    • Swiss Cyber Storm – Annual security conference in Lucerne, Switzerland.
    • Virus Bulletin Conference – Annual conference going to be held in Denver, USA for 2016.
    • Ekoparty – Largest Security Conference in Latin America, held annually in Buenos Aires, Argentina.
    • 44Con – Annual Security Conference held in London.
    • BalCCon – Balkan Computer Congress, annualy held in Novi Sad, Serbia.
    • FSec – FSec – Croatian Information Security Gathering in Varaždin, Croatia.

    信息安全杂志

  • 相关阅读:
    FileZilla
    dos2unix转换从win下vimruntime下的文件
    在 MFC SDI 程序中实现多语言程序界面
    AheadLib 2.2.150
    F982,F983班数理逻辑期末考试试题
    论文公式规范。
    Servlet/JSP配置详解
    COM沉思录(八)
    XML配置文件的读取处理
    天使和魔鬼(转载)
  • 原文地址:https://www.cnblogs.com/yh-ma/p/10302407.html
Copyright © 2011-2022 走看看