滲透中常用的在線工具和網站總結
VSole2023-05-15 09:31:35
項目地址
作者: Threekiii 來源:https://github.com/Threekiii/Awesome-Redteam
網站導航
編碼/加密
CyberChef:編解碼及加密,可本地部署 https://github.com/gchq/CyberChef OK Tools在線工具:https://github.com/wangyiwy/oktools CTF在線工具:http://www.hiencode.com/ Unicode字符表:https://www.52unicode.com/enclosed-alphanumerics-zifu 在線MD5 Hash破解:https://www.somd5.com/
實用工具
Explain Shell:Shell命令解析 https://explainshell.com/ 在線正則表達式:https://c.runoob.com/front-end/854/ Ceye DNS:DNS oob平臺 http://ceye.io/ DNS log:DNS oob平臺 http://dnslog.cn/ Webshell Chop:https://webshellchop.chaitin.cn/demo/ XSS Chop:https://xsschop.chaitin.cn/demo/ WebShell查殺:https://n.shellpub.com/ Google Hacking Database:https://www.exploit-db.com/google-hacking-database Wayback Machine:網頁緩存查詢 https://archive.org/web 在線代碼格式標準化:http://web.chacuo.net/formatsh
IP/域名收集
確認真實IP地址
IP精準定位:https://www.ipuu.net/#/home IP 138:https://site.ip138.com/ Security Trails:https://securitytrails.com/
多個地點Ping服務器
Chinaz:https://ping.chinaz.com/ Host Tracker:https://www.host-tracker.com/ Webpage Test:https://www.webpagetest.org/ DNS Check:https://dnscheck.pingdom.com/
Whois注冊信息反查
站長之家 Whois:https://whois.chinaz.com/ 中國萬網 Whois:https://whois.aliyun.com/ 國際 Whois:https://who.is/
DNS數據聚合查詢
Hacker Target:https://hackertarget.com/find-dns-host-records DNS Dumpster:https://dnsdumpster.com DNS DB:https://dnsdb.io/zh-cn
TLS證書信息查詢
Censys:https://censys.io Certificate Search:https://crt.sh 證書透明度監控:https://developers.facebook.com/tools/ct"
IP地址段收集
CNNIC中國互聯網信息中心:http://ipwhois.cnnic.net.cn
網絡空間搜索
Fofa:https://fofa.info/ Shodan:https://www.shodan.io/ ZoomEye:https://www.zoomeye.org/ 諦聽:https://www.ditecting.com/ 360網絡空間測繪:https://quake.#/quake/#/index
威脅情報平臺
Virustotal:https://www.virustotal.com/gui/home/upload 騰訊哈勃分析系統:https://habo.qq.com/tool/index 微步在線威脅情報:https://x.threatbook.cn/ 奇安信威脅情報:https://ti.qianxin.com/ 360威脅情報:https://ti.360.net/#/homepage 安恒威脅情報:https://ti.dbappsecurity.com.cn/ 火線安全平臺:https://www.huoxian.cn Hacking8安全信息流:https://i.hacking8.com/
CTF平臺
CTF Wiki:https://ctf-wiki.org/ CTF Time:https://ctftime.org/ CTF Tools:https://github.com/zardus/ctf-tools 攻防世界:https://adworld.xctf.org.cn/ Hacker 101:https://www.hacker101.com/
漏洞平臺
Exploit Database:https://www.exploit-db.com/ HackerOne:https://www.hackerone.com/ Vulhub:https://vulhub.org/ 烏云鏡像:http://wooyun.2xss.cc/ 知道創宇漏洞平臺:https://www.seebug.org/
靶機平臺
HackTheBox:https://www.hackthebox.com/ OWASP Top10:https://owasp.org/www-project-juice-shop/ WebGoat:https://github.com/WebGoat/WebGoat
公開知識庫
狼組公開知識庫:https://wiki.wgpsec.org/ 404星鏈計劃:知道創宇 404 實驗室 https://github.com/knownsec/404StarLink
信息收集
指紋識別
Wapplyzer:Chrome插件 跨平臺網站分析工具 https://github.com/AliasIO/Wappalyzer TideFinger:提取了多個開源指紋識別工具的規則庫并進行了規則重組 https://github.com/TideSec/TideFinger 御劍web指紋識別程序:https://www.webshell.cc/4697.html 云悉指紋識別:http://www.yunsee.cn/
掃描/爆破
dirsearch:目錄掃描/爆破 https://github.com/maurosoria/dirsearch dirmap:目錄掃描/爆破 https://github.com/H4ckForJob/dirmap Arjun:HTTP參數掃描器 https://github.com/s0md3v/Arjun ksubdomain:子域名爆破 https://github.com/knownsec/ksubdomain Gobuster:URI/DNS/WEB爆破 https://github.com/OJ/gobuster
爆破字典
Dictionary-Of-Pentesting:滲透測試、SRC漏洞挖掘、爆破、Fuzzing等常用字典 https://github.com/insightglacier/Dictionary-Of-Pentesting fuzzDicts:Web滲透Fuzz字典 https://github.com/TheKingOfDuck/fuzzDicts PentesterSpecialDict:滲透測試工程師精簡化字典 https://github.com/ppbibo/PentesterSpecialDict
綜合信息收集
AlliN:https://github.com/P1-Team/AlliN Kunyu:https://github.com/knownsec/Kunyu OneForAll:https://github.com/shmilylty/OneForAll ShuiZe:https://github.com/0x727/ShuiZe_0x727 Fofa Viewer:https://github.com/wgpsec/fofa_viewer
內網信息收集
fscan:內網綜合掃描工具 https://github.com/shadow1ng/fscan EHole:紅隊重點攻擊系統指紋探測工具 https://github.com/EdgeSecurityTeam/EHole Ladon:用于大型網絡滲透的多線程插件化綜合掃描工具 https://github.com/k8gege/Ladon
漏洞研究
漏洞綜述
未授權訪問漏洞總結:http://luckyzmj.cn/posts/15dff4d3.html#toc-heading-3
漏洞挖掘
Windows-Exploit-Suggester:https://github.com/AonCyberLabs/Windows-Exploit-Suggester Linux_Exploit_Suggester:https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
開源漏洞庫
Vulhub:https://vulhub.org/ PeiQi文庫:http://wiki.peiqi.tech/ PoCBox:https://github.com/0verSp4ce/PoCBox Vulnerability:https://github.com/EdgeSecurityTeam/Vulnerability POChouse:https://github.com/DawnFlame/POChouse
POC/EXP
ysoserial:Java反序列化 https://github.com/frohoff/ysoserial Vulmap:漏洞掃描和驗證工具 https://github.com/zhzyker/vulmap Some-PoC-oR-ExP:各種漏洞PoC、ExP的收集或編寫 https://github.com/coffeehb/Some-PoC-oR-ExP CMS-Hunter:CMS漏洞測試用例集合 https://github.com/SecWiki/CMS-Hunter Penetration_Testing_POC:https://github.com/Mr-xn/Penetration_Testing_POC
內網滲透
Bypass
PHPFuck:https://github.com/splitline/PHPFuck JSFuck:http://www.jsfuck.com/
Payloads
PayloadsAllTheThings:https://github.com/swisskyrepo/PayloadsAllTheThings java.lang.Runtime.exec() Payload:java Payload在線生成 https://www.bugku.net/runtime-exec-payloads/ PHP Generic Gadget Chains:PHP反序列化Payload https://github.com/ambionics/phpgg
WebShell
Webshell收集項目:https://github.com/tennc/webshell 反彈shell命令速查:https://github.com/Threekiii/Awesome-Redteam Behinder 冰蝎:https://github.com/rebeyond/Behinder Behinder3:kali + java 11.0.14 或 windows10 + java 1.8.0_91, 注意,該環境下Behinder2無法正常運行 Behinder2:windows10 + java 1.8.0_91 Godzilla 哥斯拉:https://github.com/BeichenDream/Godzilla
內網穿透
NPS:通過web端管理,無需配置文件 https://github.com/ehang-io/nps FRP:55k star項目 https://github.com/fatedier/frp Neo-reGeorg:tunnel快速部署 https://github.com/L-codes/Neo-reGeorg Proxifier:windows代理工具 https://www.proxifier.com/ Proxychains:kali代理工具 https://github.com/haad/proxychains
容器逃逸
CDK:容器滲透 https://github.com/cdk-team/CDK
- 其他
The art of command line:快速掌握命令行 https://github.com/jlevy/the-art-of-command-line Responder:實現獲取NTLM Hash等功能 https://github.com/SpiderLabs/Responder Impacket:其中的psexec.py通過用戶名和密碼遠程連接到目標服務器 https://github.com/SecureAuthCorp/impacket PsTools:PsExec.exe功能同Impacket中的psexec.py https://docs.microsoft.com/en-us/sysinternals/downloads/pstools
移動端安全
CrackMinApp:反編譯微信小程序 https://github.com/Cherrison/CrackMinApp AppInfoScanner:移動端信息收集 https://github.com/kelvinBen/AppInfoScanner
安全廠商
安全廠商及其官網鏈接:https://github.com/Threekiii/Awesome-Redteam
Metasploit
Metasploit:https://github.com/rapid7/metasploit-framework
Cobaltstrike
Awesome CobaltStrike:CobaltStrike知識庫 https://github.com/zer0yu/Awesome-CobaltStrike Erebus:后滲透測試插件 https://github.com/DeEpinGh0st/Erebus LSTAR:綜合后滲透插件 https://github.com/lintstar/LSTAR ElevateKit:提權插件 https://github.com/rsmudge/ElevateKit
Burpsuite
HaE:高亮標記與信息提取輔助型插件 https://github.com/gh0stkey/HaE Log4j2Scan:Log4j主動掃描 https://github.com/whwlsfb/Log4j2Scan
Chrome crx
Proxy SwitchyOmega:快速切換代理 https://github.com/FelisCatus/SwitchyOmega Wappalyzer:識別網站技術/框架/語言 https://www.wappalyzer.com/ EditThisCookie:修改Cookie https://www.editthiscookie.com/ FindSomething:在網頁的源代碼或js中尋找有用信息 https://github.com/ResidualLaugh/FindSomething Disable JavaScript:禁用JavaScript繞過彈窗 https://github.com/dpacassi/disable-javascript Hunter:查找網頁暴露郵箱 https://hunter.io/chrome
Xray
Xray:安全評估工具 https://github.com/chaitin/xray
VSole
網絡安全專家