渗透测试实战网站(渗透中常用的在线工具和网站总结)
编码/加密CyberChef:编解码及加密,可本地部署 https://github.com/gchq/CyberChefOK Tools在线工具:https://github.com/wangyiwy/oktoolsCTF在线工具:http://www.hiencode.com/Unicode字符表:https://www.52unicode.com/enclosed-alphanumerics-zifu在线MD5 Hash破解:https://www.somd5.com/
,今天小编就来说说关于渗透测试实战网站?下面更多详细答案一起来看看吧!
渗透测试实战网站
网站导航编码/加密
CyberChef:编解码及加密,可本地部署 https://github.com/gchq/CyberChefOK Tools在线工具:https://github.com/wangyiwy/oktoolsCTF在线工具:http://www.hiencode.com/Unicode字符表:https://www.52unicode.com/enclosed-alphanumerics-zifu在线MD5 Hash破解:https://www.somd5.com/
实用工具
Explain Shell:Shell命令解析 https://explainshell.com/在线正则表达式:https://c.runoob.com/front-end/854/Ceye DNS:DNS oob平台 http://ceye.io/DNS log:DNS oob平台 http://dnslog.cn/Webshell Chop:https://webshellchop.chaitin.cn/demo/XSS Chop:https://xsschop.chaitin.cn/demo/WebShell查杀:https://n.shellpub.com/Google Hacking Database:https://www.Exploit-db.com/google-hacking-databaseWayback Machine:网页缓存查询 https://archive.org/web在线代码格式标准化:http://web.chacuo.net/formatsh
IP/域名收集
确认真实IP地址
IP精准定位:https://www.ipuu.net/#/homeIP 138:https://site.ip138.com/Security Trails:https://securitytrails.com/
多个地点Ping服务器
Chinaz:https://ping.chinaz.com/Host Tracker:https://www.host-tracker.com/Webpage Test:https://www.webpagetest.org/DNS Check:https://dnscheck.pingdom.com/
Whois注册信息反查
站长之家 Whois:https://whois.chinaz.com/中国万网 Whois:https://whois.aliyun.com/国际 Whois:https://who.is/
DNS数据聚合查询
Hacker Target:https://hackertarget.com/find-dns-host-recordsDNS Dumpster:https://dnsdumpster.comDNS DB:https://dnsdb.io/zh-cn
TLS证书信息查询
Censys:https://censys.ioCertificate Search:https://crt.sh证书透明度监控:https://developers.facebook.com/tools/ct"
IP地址段收集
CNNIC中国互联网信息中心:http://ipwhois.cnnic.net.cn
网络空间搜索
Fofa:https://fofa.info/Shodan:https://www.shodan.io/ZoomEye:https://www.zoomeye.org/谛听:https://www.ditecting.com/360网络空间测绘:https://quake.360.cn/quake/#/index
威胁情报平台
Virustotal:https://www.virustotal.com/gui/home/upload腾讯哈勃分析系统:https://habo.qq.com/tool/index微步在线威胁情报:https://x.threatbook.cn/奇安信威胁情报:https://ti.qianxin.com/360威胁情报:https://ti.360.net/#/homepage安恒威胁情报:https://ti.dbappsecurity.com.cn/火线安全平台:https://www.huoxian.cnHacking8安全信息流:https://i.hacking8.com/
CTF平台
CTF Wiki:https://ctf-wiki.org/CTF Time:https://ctftime.org/CTF Tools:https://github.com/zardus/ctf-tools攻防世界:https://adworld.xctf.org.cn/Hacker 101:https://www.hacker101.com/
漏洞平台
Exploit Database:https://www.exploit-db.com/HackerOne:https://www.hackerone.com/Vulhub:https://vulhub.org/乌云镜像:http://wooyun.2xss.cc/知道创宇漏洞平台:https://www.seebug.org/
靶机平台
HackTheBox:https://www.hackthebox.com/OWASP Top10:https://owasp.org/www-project-juice-shop/WebGoat:https://github.com/WebGoat/WebGoat
公开知识库
狼组公开知识库:https://wiki.wgpsec.org/404星链计划:知道创宇 404 实验室 https://github.com/knownsec/404StarLink
信息收集
指纹识别
Wapplyzer:Chrome插件 跨平台网站分析工具 https://github.com/AliasIO/WappalyzerTideFinger:提取了多个开源指纹识别工具的规则库并进行了规则重组 https://github.com/TideSec/TideFinger御剑web指纹识别程序:https://www.webshell.cc/4697.html云悉指纹识别:http://www.yunsee.cn/
扫描/爆破
dirsearch:目录扫描/爆破 https://github.com/maurosoria/dirsearchdirmap:目录扫描/爆破 https://github.com/H4ckForJob/dirmapArjun:HTTP参数扫描器 https://github.com/s0md3v/Arjunksubdomain:子域名爆破 https://github.com/knownsec/ksubdomainGobuster:URI/DNS/WEB爆破 https://github.com/OJ/gobuster
爆破字典
Dictionary-Of-Pentesting:渗透测试、SRC漏洞挖掘、爆破、Fuzzing等常用字典 https://github.com/insightglacier/Dictionary-Of-PentestingfuzzDicts:Web渗透Fuzz字典 https://github.com/TheKingOfDuck/fuzzDictsPentesterSpecialDict:渗透测试工程师精简化字典 https://github.com/ppbibo/PentesterSpecialDict
综合信息收集
AlliN:https://github.com/P1-Team/AlliNKunyu:https://github.com/knownsec/KunyuOneForAll:https://github.com/shmilylty/OneForAllShuiZe:https://github.com/0x727/ShuiZe_0x727Fofa Viewer:https://github.com/wgpsec/fofa_viewer
内网信息收集
fscan:内网综合扫描工具 https://github.com/shadow1ng/fscanEHole:红队重点攻击系统指纹探测工具 https://github.com/EdgeSecurityTeam/EHoleLadon:用于大型网络渗透的多线程插件化综合扫描工具 https://github.com/k8gege/Ladon
漏洞研究
漏洞综述
未授权访问漏洞总结:http://luckyzmj.cn/posts/15dff4d3.html#toc-heading-3
漏洞挖掘
Windows-Exploit-Suggester:https://github.com/AonCyberLabs/Windows-Exploit-SuggesterLinux_Exploit_Suggester:https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
开源漏洞库
Vulhub:https://vulhub.org/PeiQi文库:http://wiki.peiqi.tech/PoCBox:https://github.com/0verSp4ce/PoCBoxVulnerability:https://github.com/EdgeSecurityTeam/VulnerabilityPOChouse:https://github.com/DawnFlame/POChouse
POC/EXP
ysoserial:java反序列化 https://github.com/frohoff/ysoserialVulmap:漏洞扫描和验证工具 https://github.com/zhzyker/vulmapSome-PoC-oR-ExP:各种漏洞PoC、ExP的收集或编写 https://github.com/coffeehb/Some-PoC-oR-ExPCMS-Hunter:CMS漏洞测试用例集合 https://github.com/SecWiki/CMS-HunterPenetration_Testing_POC:https://github.com/Mr-xn/Penetration_Testing_POC
内网渗透
Bypass
PHPFuck:https://github.com/splitline/PHPFuckJSFuck:http://www.jsfuck.com/
Payloads
PayloadsAllTheThings:https://github.com/swisskyrepo/PayloadsAllTheThingsjava.lang.Runtime.exec Payload:java Payload在线生成 https://www.bugku.net/runtime-exec-payloads/PHP Generic Gadget Chains:PHP反序列化Payload https://github.com/ambionics/phpgg
WebShell
Webshell收集项目:https://github.com/tennc/webshell反弹shell命令速查:https://github.com/Threekiii/Awesome-RedteamBehinder 冰蝎:https://github.com/rebeyond/BehinderBehinder3:kali java 11.0.14 或 windows10 java 1.8.0_91,注意,该环境下Behinder2无法正常运行Behinder2:windows10 java 1.8.0_91Godzilla 哥斯拉:https://github.com/BeichenDream/Godzilla
内网穿透
NPS:通过web端管理,无需配置文件 https://github.com/ehang-io/npsFRP:55k star项目 https://github.com/fatedier/frpNeo-reGeorg:tunnel快速部署 https://github.com/L-codes/Neo-reGeorgProxifier:windows代理工具 https://www.proxifier.com/Proxychains:kali代理工具 https://github.com/haad/proxychains
容器逃逸
CDK:容器渗透 https://github.com/cdk-team/CDK
其他
The art of command line:快速掌握命令行 https://github.com/jlevy/the-art-of-command-lineResponder:实现获取NTLM Hash等功能 https://github.com/SpiderLabs/ResponderImpacket:其中的psexec.py通过用户名和密码远程连接到目标服务器 https://github.com/SecureAuthCorp/impacketPsTools:PsExec.exe功能同Impacket中的psexec.py https://docs.microsoft.com/en-us/sysinternals/downloads/pstools
移动端安全
CrackMinApp:反编译微信小程序 https://github.com/Cherrison/CrackMinAppAppInfoScanner:移动端信息收集 https://github.com/kelvinBen/AppInfoScanner
安全厂商
安全厂商及其官网链接:https://github.com/Threekiii/Awesome-Redteam
Metasploit
Metasploit:https://github.com/rapid7/metasploit-framework
Cobaltstrike
Awesome CobaltStrike:CobaltStrike知识库 https://github.com/zer0yu/Awesome-CobaltStrikeErebus:后渗透测试插件 https://github.com/DeEpinGh0st/ErebusLSTAR:综合后渗透插件 https://github.com/lintstar/LSTARElevateKit:提权插件 https://github.com/rsmudge/ElevateKit
Burpsuite
HaE:高亮标记与信息提取辅助型插件 https://github.com/gh0stkey/HaELog4j2Scan:Log4j主动扫描 https://github.com/whwlsfb/Log4j2Scan
Chrome crx
Proxy SwitchyOmega:快速切换代理 https://github.com/FelisCatus/SwitchyOmegaWappalyzer:识别网站技术/框架/语言 https://www.wappalyzer.com/EditThisCookie:修改Cookie https://www.editthiscookie.com/FindSomething:在网页的源代码或js中寻找有用信息 https://github.com/ResidualLaugh/FindSomethingDisable JavaScript:禁用JavaScript绕过弹窗 https://github.com/dpacassi/disable-javascriptHunter:查找网页暴露邮箱 https://hunter.io/chrome
Xray
Xray:安全评估工具 https://github.com/chaitin/xray
作者: Threekiii来源:https://github.com/Threekiii/Awesome-Redteam
,
免责声明:本文仅代表文章作者的个人观点,与本站无关。其原创性、真实性以及文中陈述文字和内容未经本站证实,对本文以及其中全部或者部分内容文字的真实性、完整性和原创性本站不作任何保证或承诺,请读者仅作参考,并自行核实相关内容。文章投诉邮箱:anhduc.ph@yahoo.com