Track Awesome Pentest Updates Weekly

A collection of awesome penetration testing resources, tools and other shiny things

馃彔 Home馃攳 Search馃敟 Feed馃摦 Subscribe鉂わ笍 Sponsor馃樅 enaqx/awesome-pentest猸 17K馃彿锔 Security

[ Daily / Weekly / Overview ]

Jan 02 - Jan 08, 2023

Vulnerability Databases / Social Engineering Tools

Aug 22 - Aug 28, 2022

Web Exploitation / Web path discovery and bruteforcing tools

Aug 01 - Aug 07, 2022

Network Tools / Network Reconnaissance Tools

Mar 28 - Apr 03, 2022

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Feb 28 - Mar 06, 2022

Online Resources / Other Lists Online

Feb 07 - Feb 13, 2022

Web Exploitation / Web shells and C2 frameworks

Jan 31 - Feb 06, 2022

Network Tools / DDoS Tools

Privilege Escalation Tools / Web application and resource analysis tools

Jan 24 - Jan 30, 2022

Network Tools / Network Reconnaissance Tools

Network Vulnerability Scanners / Web Vulnerability Scanners

Web Exploitation / Social Engineering Tools

Oct 25 - Oct 31, 2021

Cloud Platform Attack Tools / Malware Analysis Books

Oct 18 - Oct 24, 2021

Privilege Escalation Tools / Web application and resource analysis tools

Oct 04 - Oct 10, 2021

Collaboration Tools / Malware Analysis Books

Sep 27 - Oct 03, 2021

Security Education Courses / Reverse Engineering Tools

Sep 20 - Sep 26, 2021

Exfiltration Tools / Zealandia

Mar 22 - Mar 28, 2021

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Mar 08 - Mar 14, 2021

Collaboration Tools / Malware Analysis Books

Open Sources Intelligence (OSINT) / Web application and resource analysis tools

Web Exploitation / Social Engineering Tools

Web Exploitation / Intercepting Web proxies

Web Exploitation / Web file inclusion tools

Web Exploitation / Web injection tools

Web Exploitation / Web path discovery and bruteforcing tools

Web Exploitation / Web shells and C2 frameworks

Web Exploitation / Web-accessible source code ripping tools

Feb 01 - Feb 07, 2021

Network Vulnerability Scanners / Wireless Network Tools

Vulnerability Databases / Social Engineering Tools

Dec 21 - Dec 27, 2020

Conferences and Events / South America

Dec 14 - Dec 20, 2020

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Dec 07 - Dec 13, 2020

Online Resources / Other Lists Online

Privilege Escalation Tools / Password Spraying Tools

Oct 12 - Oct 18, 2020

Network Tools / Protocol Analyzers and Sniffers

Oct 05 - Oct 11, 2020

Reverse Engineering / Reverse Engineering Tools

Steganography Tools / Social Engineering Tools

Aug 31 - Sep 06, 2020

Web Exploitation / Web shells and C2 frameworks

Aug 24 - Aug 30, 2020

Android Utilities

Anonymity Tools

Books / Tor Tools

CTF Tools / Malware Analysis Books

Collaboration Tools / Malware Analysis Books

Conferences and Events / Malware Analysis Books

Exfiltration Tools / Zealandia

Exploit Development Tools / Zealandia

Hash Cracking Tools / Zealandia

Industrial Control and SCADA Systems / Zealandia

Intentionally Vulnerable Systems / Intentionally Vulnerable Systems as Docker Containers

macOS Utilities / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Network Reconnaissance Tools

Network Tools / Wireless Network Tools

Online Resources / Other Lists Online

Open Sources Intelligence (OSINT) / Penetration Testing Report Templates

Open Sources Intelligence (OSINT) / Data Broker and Search Engine Services

Open Sources Intelligence (OSINT) / Dorking tools

Open Sources Intelligence (OSINT) / Email search and analysis tools

Open Sources Intelligence (OSINT) / Metadata harvesting and analysis

Open Sources Intelligence (OSINT) / Network device discovery tools

Open Sources Intelligence (OSINT) / OSINT Online Resources

Open Sources Intelligence (OSINT) / Source code repository searching tools

Privilege Escalation Tools / Web application and resource analysis tools

Reverse Engineering / Reverse Engineering Books

Reverse Engineering / Reverse Engineering Tools

Shellcoding Guides and Tutorials / Reverse Engineering Tools

Social Engineering / Social Engineering Books

Social Engineering / Social Engineering Online Resources

Steganography Tools / Social Engineering Tools

Vulnerability Databases / Social Engineering Tools

Web Exploitation / Web Exploitation Books

Windows Utilities / Web Exploitation Books

Jul 20 - Jul 26, 2020

Network Tools / Intentionally Vulnerable Systems as Docker Containers

May 18 - May 24, 2020

Windows Utilities / Web Exploitation Books

May 11 - May 17, 2020

Conferences and Events / Asia

Apr 27 - May 03, 2020

Side-channel Tools / Reverse Engineering Tools

Apr 13 - Apr 19, 2020

Network Tools / DDoS Tools

Reverse Engineering / Reverse Engineering Tools

Vulnerability Databases / Social Engineering Tools

Apr 06 - Apr 12, 2020

Hash Cracking Tools / Zealandia

Mar 30 - Apr 05, 2020

Windows Utilities / Web Exploitation Books

Mar 23 - Mar 29, 2020

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Online Resources / Other Lists Online

Social Engineering / Social Engineering Tools

Mar 16 - Mar 22, 2020

Network Tools / Wireless Network Tools

Mar 02 - Mar 08, 2020

CTF Tools / Malware Analysis Books

Vulnerability Databases / Social Engineering Tools

Feb 24 - Mar 01, 2020

Side-channel Tools / Reverse Engineering Tools

Feb 17 - Feb 23, 2020

Physical Access Tools / Web application and resource analysis tools

Feb 03 - Feb 09, 2020

Network Tools / DDoS Tools

Network Tools / Network Reconnaissance Tools

Network Vulnerability Scanners / Wireless Network Tools

Operating System Distributions / Web application and resource analysis tools

Jan 20 - Jan 26, 2020

Collaboration Tools / Malware Analysis Books

Dec 02 - Dec 08, 2019

Conferences and Events / Europe

Nov 11 - Nov 17, 2019

Anonymity Tools

Anonymity Tools / Tor Tools

Conferences and Events / Asia

Conferences and Events / Europe

Conferences and Events / North America

Conferences and Events / South America

Conferences and Events / Zealandia

File Format Analysis Tools / Zealandia

Nov 04 - Nov 10, 2019

Anonymity Tools / Tor Tools

Conferences and Events / North America

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Online Resources / Other Lists Online

Oct 21 - Oct 27, 2019

Conferences and Events / North America

Online Resources / Other Lists Online

Oct 14 - Oct 20, 2019

Hash Cracking Tools / Zealandia

Sep 30 - Oct 06, 2019

Windows Utilities / Web Exploitation Books

Sep 16 - Sep 22, 2019

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Sep 02 - Sep 08, 2019

Anti-virus Evasion Tools / Tor Tools

Aug 12 - Aug 18, 2019

Books / Tor Tools

Reverse Engineering / Reverse Engineering Tools

Jul 29 - Aug 04, 2019

Network Tools / Network Traffic Replay and Editing Tools

Vulnerability Databases / Social Engineering Tools

Jul 22 - Jul 28, 2019

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Jul 15 - Jul 21, 2019

Static Analyzers / Social Engineering Tools

May 13 - May 19, 2019

Network Vulnerability Scanners / Wireless Network Tools

Apr 29 - May 05, 2019

Online Resources / Other Lists Online

Apr 08 - Apr 14, 2019

Network Vulnerability Scanners / Web Vulnerability Scanners

Online Resources / Other Lists Online

Windows Utilities / Web Exploitation Books

Apr 01 - Apr 07, 2019

Anonymity Tools

Anonymity Tools / Tor Tools

Anti-virus Evasion Tools / Tor Tools

Books / Tor Tools

CTF Tools / Malware Analysis Books

Collaboration Tools / Malware Analysis Books

Conferences and Events / Malware Analysis Books

Conferences and Events / Europe

Conferences and Events / North America

File Format Analysis Tools / Zealandia

GNU/Linux Utilities / Zealandia

Hash Cracking Tools / Zealandia

Hex Editors / Zealandia

Industrial Control and SCADA Systems / Zealandia

Multi-paradigm Frameworks / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / DDoS Tools

Network Tools / Network Reconnaissance Tools

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Network Tools / Transport Layer Security Tools

Network Tools / Wireless Network Tools

Network Vulnerability Scanners / Wireless Network Tools

Network Vulnerability Scanners / Web Vulnerability Scanners

Online Resources / Online Operating Systems Resources

Online Resources / Online Penetration Testing Resources

Online Resources / Other Lists Online

Online Resources / Penetration Testing Report Templates

Operating System Distributions / Web application and resource analysis tools

Periodicals / Web application and resource analysis tools

Physical Access Tools / Web application and resource analysis tools

Reverse Engineering / Reverse Engineering Tools

Security Education Courses / Reverse Engineering Tools

Social Engineering / Social Engineering Tools

Static Analyzers / Social Engineering Tools

Vulnerability Databases / Social Engineering Tools

Web Exploitation / Social Engineering Tools

Web Exploitation / Web injection tools

Web Exploitation / Web shells and C2 frameworks

Windows Utilities / Web Exploitation Books

Mar 18 - Mar 24, 2019

Reverse Engineering / Reverse Engineering Tools

Feb 25 - Mar 03, 2019

Reverse Engineering / Reverse Engineering Tools

Jan 07 - Jan 13, 2019

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Nov 19 - Nov 25, 2018

Network Tools / Protocol Analyzers and Sniffers

Reverse Engineering / Reverse Engineering Tools

Apr 09 - Apr 15, 2018

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Aug 14 - Aug 20, 2017

Reverse Engineering / Reverse Engineering Tools

Jul 24 - Jul 30, 2017

Side-channel Tools / Reverse Engineering Tools

Jul 17 - Jul 23, 2017

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Reverse Engineering / Reverse Engineering Tools

Jul 10 - Jul 16, 2017

Network Tools / Protocol Analyzers and Sniffers

Network Tools / Proxies and Machine-in-the-Middle (MITM) Tools

Reverse Engineering / Reverse Engineering Tools

Jul 03 - Jul 09, 2017

Network Tools / Intentionally Vulnerable Systems as Docker Containers

Network Tools / Network Reconnaissance Tools

Vulnerability Databases / Social Engineering Tools

Jun 12 - Jun 18, 2017

Network Tools / Network Reconnaissance Tools