Forked from JohnHammond/security-resources
This is a living document to host and contain links and resources for online wargames, practice environments, and activities to learn new things in cybersecurity.
- BackBox - Based on Ubuntu.
- BlackArch Linux - Based on Arch Linux.
- Fedora Security Lab - Based on Fedora.
- Kali Linux - Based on Debian.
- Parrot Security OS - Based on Debian.
- Pentoo - Based on Gentoo.
- URIX OS - Based on openSUSE.
- Wifislax - Based on Slackware.
- Flare VM - Windows-based for malware analysis and reverse engineering.
- REMnux - Debian-based for malware analysis and reverse engineering.
- CTF Tools - Collection of setup scripts to install various security research tools.
- LazyKali - A 2016 refresh of LazyKali which simplifies install of tools and configuration.
- CTF Field Guide - Field Guide by Trails of Bits.
- CTF Resources - Start Guide maintained by community.
- How to Get Started in CTF - Short guideline for CTF beginners by Endgame
- Intro. to CTF Course - A free course that teaches beginners the basics of forensics, crypto, and web-ex.
- HackerRank - Coding playground for practice.
- PicoCTF - Capture The Flag challenges for beginners and experts.
- TryHackMe - Platform to learn and practice hacking skills in a virtual environment.
- HackTheBox - An online platform for real-world penetration testing and hacking challenges.
- CTFLearn - A platform to improve your Capture The Flag skills.
- Pentesterlab - Provides exercises and labs for learning penetration testing.
- Hack This Site - Training ground for hackers.
- Hacker101 - CTF from HackerOne.
- Over The Wire - Wargame maintained by OvertheWire Community.
- Pwnable.kr - Pwn Game.
- Ringzer0Team - Ringzer0 Team Online CTF.
- Root-Me - Hacking and Information Security learning platform.
- VulnHub - Hosting various vulnerable virtual machines for hands-on experience, some of which may include malware analysis challenges.
- Crackmes - Offers reverse engineering challenges for enthusiasts, which can include analyzing malware samples.
- Microcorruption - Embedded security CTF with reverse engineering components, relevant for analyzing firmware-level malware.
- PWN Challenge - Binary Exploitation Wargame with challenges that involve reverse engineering and analyzing vulnerable binaries.
- CryptoPals - Cryptographic challenges for skill development.
- CryptoHack - Fun cryptography challenges for learning and practice.
- CyberChef - A web app for analyzing and decoding data.
- FeatherDuster - An automated, modular cryptanalysis tool.
- Hash Extender - A utility tool for performing hash length extension attacks.
- padding-oracle-attacker - A CLI tool to execute padding oracle attacks.
- PkCrack - A tool for breaking PkZip encryption.
- QuipQuip - An online tool for breaking substitution ciphers or Vigenere ciphers (without the key).
- RSACTFTool - A tool for recovering RSA private keys using various attacks.
- RSATool - Generate a private key with knowledge of p and q.
- XORTool - A tool to analyze multi-byte XOR ciphers.
Certainly, here's the list of malware analysis tools in a bullet-point format, prioritized by popularity, and including "Any.Run":
- IDA Pro - A widely-used disassembler and debugger for analyzing binary code.
- Wireshark - A network protocol analyzer for capturing and inspecting network traffic.
- Cuckoo Sandbox - An open-source automated malware analysis system.
- Volatility - A memory forensics framework for analyzing RAM dumps.
- Procmon - A Windows tool for monitoring system activity and file system changes.
- Ghidra - A free and open-source software reverse engineering suite developed by the NSA.
- Sysinternals Suite - A collection of Windows utilities for troubleshooting and analysis.
- RegShot - A tool for comparing system registry snapshots before and after an event.
- Fiddler - A web debugging proxy for capturing and analyzing HTTP traffic.
- Maltego - A popular open-source intelligence and forensics application for link analysis.
- PEStudio - A tool for static analysis of Windows executables (PE files).
- YARA - A pattern-matching swiss knife for malware researchers.
- Anubis - An online sandbox environment for analyzing suspicious files and URLs.
- OllyDbg - A 32-bit assembler level analyzing debugger for Windows.
- Radare2 - An open-source framework for reverse engineering and binary analysis.
- Hybrid Analysis - A service for analyzing and detecting malware using various engines.
- REMnux - A Linux toolkit for reverse engineering and analyzing malicious software.
- Z3 Solver - A theorem prover and SMT solver used in various security research tasks.
- CAPE Sandbox - An open-source malware analysis platform.
- Joe Sandbox - An automated dynamic malware analysis system.
- FLOSS - A tool for extracting and analyzing obfuscated strings in malware samples.
- Pyew - A Python tool for manipulation of executables.
- Any.Run - A cloud-based malware analysis platform that provides dynamic analysis of suspicious files and URLs.
- Micro Corruption - A web-based game that teaches assembly language and reverse engineering by solving various challenges.
- Crackmes.one - A collection of crackmes (reverse engineering challenges) for different skill levels.
- Binary Auditing - A platform for learning reverse engineering through hands-on labs and challenges.
- Exploit Exercises - A set of virtual machines and challenges designed to teach various aspects of exploit development and reverse engineering.
- Crack the File - An online platform with reverse engineering challenges and tutorials.
- IDA Pro - A widely-used disassembler and debugger for analyzing binary code.
- Ghidra - A free and open-source software reverse engineering suite developed by the NSA.
- OllyDbg - A 32-bit assembler level analyzing debugger for Windows.
- Radare2 - An open-source framework for reverse engineering and binary analysis.
- x64dbg - An open-source debugger for Windows, with a focus on dynamic analysis of malware.
- IDA Pro Free - The free version of IDA Pro, which provides basic disassembly and debugging capabilities.
- Aircrack-Ng - Crack 802.11 WEP and WPA-PSK keys.
apt-get install aircrack-ng
- Audacity - Analyze sound files (mp3, m4a, whatever).
apt-get install audacity
- Bkhive and Samdump2 - Dump SYSTEM and SAM files.
apt-get install samdump2 bkhive
- CFF Explorer - PE Editor.
- Creddump - Dump windows credentials.
- DVCS Ripper - Rips web accessible (distributed) version control systems.
- Exif Tool - Read, write and edit file metadata.
- Extundelete - Used for recovering lost data from mountable images.
- Fibratus - Tool for exploration and tracing of the Windows kernel.
- Foremost - Extract particular kind of files using headers.
apt-get install foremost
- Fsck.ext4 - Used to fix corrupt filesystems.
- Malzilla - Malware hunting tool.
- NetworkMiner - Network Forensic Analysis Tool.
- PDF Streams Inflater - Find and extract zlib files compressed in PDF files.
- Pngcheck - Verifies the integrity of PNG and dump all of the chunk-level information in human-readable form.
apt-get install pngcheck
- ResourcesExtract - Extract various filetypes from exes.
- Shellbags - Investigate NT_USER.dat files.
- Snow - A Whitespace Steganography Tool.
- USBRip - Simple CLI forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux.
- Volatility - To investigate memory dumps.
- Wireshark - Used to analyze pcap or pcapng files
- AperiSolve - Aperi'Solve is a platform which performs layer analysis on image (open-source).
- Convert - Convert images b/w formats and apply filters.
- Exif - Shows EXIF information in JPEG files.
- Exiftool - Read and write meta information in files.
- Exiv2 - Image metadata manipulation tool.
- Image Steganography - Embeds text and files in images with optional encryption. Easy-to-use UI.
- Image Steganography Online - This is a client-side Javascript tool to steganographically hide images inside the lower "bits" of other images
- ImageMagick - Tool for manipulating images.
- Outguess - Universal steganographic tool.
- Pngtools - For various analysis related to PNGs.
apt-get install pngtools
- SmartDeblur - Used to deblur and fix defocused images.
- Steganabara - Tool for stegano analysis written in Java.
- SteganographyOnline - Online steganography encoder and decoder.
- Stegbreak - Launches brute-force dictionary attacks on JPG image.
- StegCracker - Steganography brute-force utility to uncover hidden data inside files.
- stegextract - Detect hidden files and text in images.
- Steghide - Hide data in various kind of images.
- StegOnline - Conduct a wide range of image steganography operations, such as concealing/revealing files hidden within bits (open-source).
- Stegsolve - Apply various steganography techniques to images.
- Zsteg - PNG/BMP analysis.
- Nightmare - Challenges and resources for binary exploitation.
- pwnable.xyz - Binary exploitation challenges and learning materials.
- pwnable.kr - Diverse binary exploitation challenges for skill development.
- io.netgarage.org - Binary exploitation challenges and tutorials.
- pwn.college - Education and challenges for binary exploitation enthusiasts.
Certainly, here's the content formatted nicely for your README.md
:
- BurpSuite - A graphical tool for testing website security.
- Commix - Automated All-in-One OS Command Injection and Exploitation Tool.
- Hackbar - Firefox addon for easy web exploitation.
- OWASP ZAP - Intercepting proxy to replay, debug, and fuzz HTTP requests and responses.
- Postman - Add-on for Chrome for debugging network requests.
- Raccoon - A high-performance offensive security tool for reconnaissance and vulnerability scanning.
- SQLMap - Automatic SQL injection and database takeover tool.
- W3af - Web Application Attack and Audit Framework.
- XSSer - Automated XSS tester.