<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://securitytools.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RagManX</id>
	<title>SecurityTools - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://securitytools.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RagManX"/>
	<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php/Special:Contributions/RagManX"/>
	<updated>2026-05-09T03:38:34Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Glossary&amp;diff=1349</id>
		<title>Glossary</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Glossary&amp;diff=1349"/>
		<updated>2026-03-30T22:54:26Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add GRC, need to fill explanation subsection for GRC.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;;Blue Team&lt;br /&gt;
: Security team members who emphasize defensive security practices such as digital forensics and incident response&lt;br /&gt;
;Buffer Overflow&lt;br /&gt;
: An attack on an application where more data is sent than the program is prepared to accept, resulting in unexpected application behavior. The concept was possibly first explained in great detail in [http://www.phrack.org/issues/49/16.html Phrack issue 49] way back in 1996 by well-known hacker Aleph1 in his article &amp;quot;[https://inst.eecs.berkeley.edu/~cs161/fa08/papers/stack_smashing.pdf Smashing the Stack for Fun and Profit]&amp;quot;&lt;br /&gt;
;[https://www.cloudflare.com/learning/cloud/what-is-the-cloud/ Cloud]&lt;br /&gt;
: A software platform where another organization supports/manages the software and data storage online that in the past would have been maintained in-house. Sometimes derisively stated as &amp;quot;just someone else&#039;s computer&amp;quot; (although ZDNet points out why [https://www.zdnet.com/article/stop-saying-the-cloud-is-just-someone-elses-computer-because-its-not/ this is actually incorrect])&lt;br /&gt;
: [[File:There-is-no-cloud-sticker.jpg|alt=There is no cloud. It&#039;s someone else&#039;s computer.|none|thumb|179x179px]]&lt;br /&gt;
:&lt;br /&gt;
;Cross-Site Scripting (XSS)&lt;br /&gt;
: A web-based attack in which unsanitized inputs to the server results in unexpected behavior by the web client. For a greater discussion of Cross-Site Scripting, [https://cybr.com/courses/cross-site-scripting-xss-the-2021-guide/ see Cybr.com&#039;s XSS 2021 Guide]&lt;br /&gt;
;Database&lt;br /&gt;
: A means of storing data in a format which allows easier retrieval and analysis&lt;br /&gt;
;DFIR (Digital Forensics and Incident Response)&lt;br /&gt;
: The combined effect of examining digital media for evidence of unintended alteration and the response to the findings of that analysis&lt;br /&gt;
;Digital Forensics&lt;br /&gt;
: The method of examining digital media for evidence of malfeasance&lt;br /&gt;
;EDR (Endpoint Detection Response)&lt;br /&gt;
: The practice of detecting and responding to threats on your network or system&lt;br /&gt;
;Fuzzing&lt;br /&gt;
: The automated testing of security systems through submission of random, unexpected, or invalid data as inputs to a system designed to accept user data. For a more detailed explanation, please [https://patricegodefroid.github.io/public_psfiles/Fuzzing-101-CACM2020.pdf read this article (PDF)] from Patrice Godefroid&lt;br /&gt;
;&#039;&#039;&#039;GRC (Governance, Risk, and Compliance)&#039;&#039;&#039;&lt;br /&gt;
;HIBP (Have I Been Pwned?)&lt;br /&gt;
: A [https://haveibeenpwned.com/ password security website] run by Troy Hunt, it&#039;s most well known for tracking security leaks like the RockYou password leak from 2012 (see below) as well as offering a web interface to test visitors&#039; passwords to see if they have been leaked online at some point&lt;br /&gt;
;Incident Response&lt;br /&gt;
: The response to attacks or malware by the security team&lt;br /&gt;
;OSInt (Open-Source Intelligence)&lt;br /&gt;
: The use of freely available resources to gather information about a target. Highly recommended considering [https://cylect.io/ Cylect.io] as a jumping-off point for your OSInt research. Alternatively, view [https://osintframework.com/ the OSInt Framework] for link after link of guidance to further research tools&lt;br /&gt;
;MDR (Managed Detection and Response)&lt;br /&gt;
: A managed security service where your assets are monitored 24/7 (and you are notified if needed) by SOC staff&lt;br /&gt;
;Packet Capture&lt;br /&gt;
: The gathering of network traffic for analysis by a [[network protocol analyzer]]&lt;br /&gt;
;Penetration Testing (PenTesting)&lt;br /&gt;
: The red team practice of simulating actions of an external attacker but in a more controlled manner. This concept is written up well in the Cisco product &amp;amp; service explanation, [https://www.cisco.com/c/en/us/products/security/what-is-pen-testing.html covering methods and types of pentesting]&lt;br /&gt;
;Purple Team&lt;br /&gt;
: A security team with members focusing on both Red Team and Blue Team practices&lt;br /&gt;
;Red Team&lt;br /&gt;
: Security team members who emphasize offensive security practices such as penetration testing&lt;br /&gt;
;RockYou&lt;br /&gt;
: A company which once developed MySpace widgets and other social networks, they are responsible for [https://techcrunch.com/2009/12/14/rockyou-hack-security-myspace-facebook-passwords/ one of the largest password leaks ever released] onto the Internet&lt;br /&gt;
;[https://www.oracle.com/applications/what-is-saas/ SaaS (Software as a Service)]&lt;br /&gt;
: A cloud-based software delivery model in which the cloud provider develops and maintains cloud application software, provides automatic software updates, and makes software available to its customers via the internet on a pay-as-you-go basis&lt;br /&gt;
;[https://en.wikipedia.org/wiki/Security_information_and_event_management SIEM (Security Information and Event Management)]&lt;br /&gt;
: Real-time analysis of security alerts generated by applications and network hardware&lt;br /&gt;
;[https://www.ibm.com/topics/security-operations-center SOC (Security Operations Center)]&lt;br /&gt;
: An in-house or outsourced team of IT security professionals that monitors an organization’s entire IT infrastructure, 24/7, to detect cybersecurity events in real time and address them as quickly and effectively as possible.&lt;br /&gt;
;Structured Query Language (SQL)&lt;br /&gt;
: The most commonly used means of interacting with a database, SQL is the language used to access, process, or update information in a relational database&lt;br /&gt;
;SQL Injection (SQLi)&lt;br /&gt;
: A web attack which uses unsanitized user input to push SQL statements through a web server in order to corrupt a database or extract information from a database. A [https://www.w3schools.com/sql/sql_injection.asp brief write-up of how this can be done] is available from w3schools, and [https://cybr.com/courses/injection-attacks-the-free-guide/ a free course on SQLi] as well as other injection methods is available from Cybr&lt;br /&gt;
;[https://www.microsoft.com/en-us/security/business/security-101/what-is-xdr XDR (Extended Detection and Response)]&lt;br /&gt;
: An SaaS tool that combines prevention, detection, investigation, and response, providing visibility, analytics, correlated incident alerts, and automated responses to improve data security and combat threats. See also the [https://www.paloaltonetworks.com/cyberpedia/what-is-xdr Palo Alto Networks definition of XDR].&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=1348</id>
		<title>Useful websites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=1348"/>
		<updated>2025-11-12T21:47:38Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added roadmap.sh link for cyber-security guidance.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are many websites which provide useful information for security practitioners and those learning about security. This topic is going to eventually get unmanageable, and will need reorganized and broken down into some categories. However, until I start filling in more valuable sites, I&#039;m not sure how I&#039;m going to break it down. Expect format changes in the future.&lt;br /&gt;
&lt;br /&gt;
*[https://adsecurity.org/ AD Security] - An infrequently updated but useful guide to attacking and defending Active Directory&lt;br /&gt;
* [https://github.com/fabacab/awesome-cybersecurity-blueteam Awesome Cybersecurity Blue Team] - A GitHub page loaded with resources for [[blue team]] specialists.&lt;br /&gt;
*DFIR Diva&#039;s [https://dfirdiva.com/ Digital Forensics and Incident Response Blog] - Geared towards beginners, this links free and affordable training, resources, and a job board&lt;br /&gt;
*[https://github.com/DFIRmadness/5pillars/blob/master/5-Pillars.md Five Pillars of an Information/Cyber Security Professional] - A guide to the five key areas of proficiency necessary to excel in security&lt;br /&gt;
*The [https://old.reddit.com/r/hacking/wiki/index hacking sub-reddit wiki] - Much of the collected wisdom and guidance of /r/hacking, with a glossary, movie recommendations, an FAQ, hacking resources, and so much more. Well worth leaving this page to peruse&lt;br /&gt;
*[https://book.hacktricks.xyz/ HackTricks] - A penetration testing, red team testing, and [[CTF]] tips project which aims to offer free quality hacking resources to all the world, so people can learn for free the latest techniques in cybersecurity&lt;br /&gt;
*[https://haveibeenpwned.com/ Have I Been Pwned?] - A site for checking whether your email or password is in a data breach&lt;br /&gt;
* [https://ired.team/ ired.team] is a collection of notes on red teaming and offensive security which could be useful to practitioners just getting into this area of security&lt;br /&gt;
* [https://lolbas-project.github.io/# LOLBAS] - Living off the Land Binaries, Scripts, and Libraries - A site dedicated to helping you take advantage of common tools that might already be loaded on your target system&lt;br /&gt;
*[https://github.com/m0nad/awesome-privilege-escalation m0nad&#039;s Awesome Privilege Escalation] - A collection of Linux, Windows, Docker, and Cloud privilege escalation tips&lt;br /&gt;
*[https://github.com/carlospolop/PEASS-ng/tree/master PEASS-ng] - The Privilege Escalation Awesome Scripts SUITE new generation - a collection of macOS, Linux, and Windows tools to help you escalate your privileges once you gain a foothold on a system. Get some guidance on privilege escalation techniques, including use of PEASS-ng tools, from the [https://book.hacktricks.xyz/linux-hardening/privilege-escalation Linux privilege escalation]and [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation Windows privilege escalation] subsections of HackTricks&lt;br /&gt;
*https://roadmap.sh/cyber-security - Cyber-security roadmap - a guide on getting into cyber-security&lt;br /&gt;
*[https://www.shodan.io/ Shodan] web search engine - &amp;quot;Shodan is the world&#039;s first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.&amp;quot;&lt;br /&gt;
* [https://www.vulnhub.com/ Vulnhub] - A collection of intentionally vulnerable, downloadable virtual machines to practice your security skills&lt;br /&gt;
*[https://www.vx-underground.org/ VX-Underground] - The largest collection of malware source code, samples, and papers on the internet. For more information, also follow [https://twitter.com/vxunderground the vx-underground Twitter account]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Joplin&amp;diff=1347</id>
		<title>Joplin</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Joplin&amp;diff=1347"/>
		<updated>2025-11-03T01:21:15Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Initial description with slight &amp;quot;More Information&amp;quot; detail.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://joplinapp.org/ Joplin] is an open-source, multi-pane note-taking application available for Windows, Linux, FreeBSD, macOS, Android, and iOS. It even comes in a portable version which you can run from a USB key on Windows, so you can carry all your notes with you.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* Markdown editor&lt;br /&gt;
* [[Note-taking applications]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* Additional, [https://discourse.joplinapp.org/t/unofficial-alternative-joplin-distributions/23703 unofficial installation methods and distributions]&lt;br /&gt;
* Joplin&#039;s social media presence [https://bsky.app/profile/joplinapp.bsky.social on BlueSky]&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Obsidian]]&lt;br /&gt;
* [[CherryTree]]&lt;br /&gt;
* [[Trilium Notes]]&lt;br /&gt;
* [[Microsoft OneNote]]&lt;br /&gt;
* [[SimpleNote]]&lt;br /&gt;
* [[Notion]]&lt;br /&gt;
* [[Zim]]&lt;br /&gt;
* [[Evernote]]&lt;br /&gt;
* [[AnyType]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Online_Training_sites&amp;diff=303</id>
		<title>Online Training sites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Online_Training_sites&amp;diff=303"/>
		<updated>2024-11-06T21:53:24Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add Low Level Academy&amp;#039;s programming courses to the site list.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are listed online CyberSec training sites in no particular order which offer video training courses to help you advance your knowledge and career.&lt;br /&gt;
&lt;br /&gt;
* [https://cybr.com/courses/ Cybr]&lt;br /&gt;
* [https://academy.tcm-sec.com/courses/ TheCyberMentor Academy]&lt;br /&gt;
* [https://academy.ehacking.net/courses Ethical Hacking Academy]&lt;br /&gt;
* [https://courses.stationx.net/ The StationX Cyber Security School]&lt;br /&gt;
* [https://my.ine.com/ INE]&lt;br /&gt;
* [https://0verfl0w.podia.com/malware-analysis-course 0verfl0w&#039;s Beginner Malware Analysis Course]&lt;br /&gt;
*[https://learnsecurity.amazon.com/ Amazon&#039;s Cybersecurity Awareness training] is now available for free to everyone&lt;br /&gt;
*[https://www.udemy.com/courses/search/?src=ukw&amp;amp;q=cybersecurity Udemy offers hundreds of video courses] covering general cybersecurity, ethical hacking, security or networking certifications, and so much more&lt;br /&gt;
*[https://courses.tib3rius.com/ Tib3rius has courses] on Linux and Windows privilege escalation techniques&lt;br /&gt;
*[https://lowlevel.academy/ Low Level Academy] offers programming courses in ARM Assembly, C, and Network coding. Lifetime access for one price (currently 20% off until November 28&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;)&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:There-is-no-cloud-sticker.jpg&amp;diff=301</id>
		<title>File:There-is-no-cloud-sticker.jpg</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:There-is-no-cloud-sticker.jpg&amp;diff=301"/>
		<updated>2024-11-02T16:19:46Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Image stating &amp;quot;There is no cloud. It&amp;#039;s just someone else&amp;#039;s computer&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Image stating &amp;quot;There is no cloud. It&#039;s just someone else&#039;s computer&amp;quot;&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=DirBuster_JF&amp;diff=296</id>
		<title>DirBuster JF</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=DirBuster_JF&amp;diff=296"/>
		<updated>2024-11-02T04:56:49Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Initial page creation. Still need to add to the More Information section - coming soon.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://sourceforge.net/projects/dirbuster/files/DirBuster%20Source/1.0-RC1/ DirBuster]  (James Fischer) is a [[fuzzer]] used for locating typically hidden web pages. This is the version included by default in [[Kali|Kali Linux]], and differs in implementation from [[DirBuster_1llusion|Dirbuster]] (Mr1llusion) while offering similar capabilities from the command line.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Here is the help output from running &#039;&#039;&#039;dirbuster -h&#039;&#039;&#039; from the command line&lt;br /&gt;
[[File:DirBuster_(James_Fisher)_-_Help_Output.png|600]]&lt;br /&gt;
* Alternatively, you can run DirBuster in graphical mode, giving you the following interface&lt;br /&gt;
[[File:DirBuster_(James_Fisher)_-_GUI.jpg|600]]&lt;br /&gt;
* If you need information about some available Word Lists fir DirBuster, you can click the &#039;&#039;&#039;List Info&#039;&#039;&#039; button in the GUI&lt;br /&gt;
[[File:DirBuster_(James_Fisher)_-_WordList_Details.jpg|600]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[Ffuf_-_Fuzz_Faster_U_Fool|ffuf]]&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_WordList_Details.jpg&amp;diff=295</id>
		<title>File:DirBuster (James Fisher) - WordList Details.jpg</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_WordList_Details.jpg&amp;diff=295"/>
		<updated>2024-11-02T04:35:45Z</updated>

		<summary type="html">&lt;p&gt;RagManX: A brief description of the word lists included with James Fisher&amp;#039;s DirBuster package on Kali Linux.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
A brief description of the word lists included with James Fisher&#039;s DirBuster package on Kali Linux.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_GUI.jpg&amp;diff=294</id>
		<title>File:DirBuster (James Fisher) - GUI.jpg</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_GUI.jpg&amp;diff=294"/>
		<updated>2024-11-02T04:34:02Z</updated>

		<summary type="html">&lt;p&gt;RagManX: The graphical interface for James Fisher&amp;#039;s DirBuster in Kali Linux.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
The graphical interface for James Fisher&#039;s DirBuster in Kali Linux.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_Help_Output.png&amp;diff=293</id>
		<title>File:DirBuster (James Fisher) - Help Output.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_Help_Output.png&amp;diff=293"/>
		<updated>2024-11-02T04:12:19Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Help output on the command line from James Fisher&amp;#039;s DirBuster included with Kali Linux&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Help output on the command line from James Fisher&#039;s DirBuster included with Kali Linux&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_GUI.png&amp;diff=292</id>
		<title>File:DirBuster (James Fisher) - GUI.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:DirBuster_(James_Fisher)_-_GUI.png&amp;diff=292"/>
		<updated>2024-11-02T04:08:44Z</updated>

		<summary type="html">&lt;p&gt;RagManX: The graphical interface for James Fisher&amp;#039;s DirBuster included with Kali Linux&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
The graphical interface for James Fisher&#039;s DirBuster included with Kali Linux&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=291</id>
		<title>Free and Open-Source Software</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=291"/>
		<updated>2024-11-02T03:52:26Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* D */ Clean up extraneous keystrokes in dirb description.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Free and Open-Source Software ([[FOSS]]) is software that is [[wikipedia:Free_software|Free Software]] and [[wikipedia:Open-source_software|Open-Source Software]]. There is so much FOSS in the security domain that I believe this warrants its own wiki page.&lt;br /&gt;
&lt;br /&gt;
=== A ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Policy Firewall]] (apf) - A [[NetFilter]] firewall command-line management tool similar to [[IPTables]]&lt;br /&gt;
* [[Advanced Port Scanner]] - A graphical port scanner for Windows which has the capability of identifying programs running on listening ports&lt;br /&gt;
* [[AirCrack-NG]] - A complete suite of tools to assess WiFi network security&lt;br /&gt;
* [[Angry IP Scanner]] - A port and host scanner for Windows.&lt;br /&gt;
* [[AutoRecon]] - A multi-threaded network reconnaisance tool intended to save time in penetration testing environments and CTFs&lt;br /&gt;
&lt;br /&gt;
=== B ===&lt;br /&gt;
&lt;br /&gt;
* [[Burp Suite|Burp Suite Community Edition]] - Web Application testing software &lt;br /&gt;
=== C ===&lt;br /&gt;
&lt;br /&gt;
* [[Cain and Abel]] - A freely available Windows password sniffer and cracker&lt;br /&gt;
&lt;br /&gt;
=== D ===&lt;br /&gt;
&lt;br /&gt;
* [[dirb]] - A CLI [[Fuzzer|fuzzing tool]] for finding hidden web objects based on dictionary attacks&lt;br /&gt;
* [[dirb-gendict]] - A command line tool for generating dictionaries to be used with the above [[dirb]] tool&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer) - A Java-based, [[Fuzzer|fuzzing tool]] with a graphical interface used for finding hidden URIs/web resources&lt;br /&gt;
* [[DirBuster 1llusion|DirBuster]] (Mr1llusion) - A Python script [[Fuzzer|fuzzing tool]] used for finding hidden URIs/web resources from the command line&lt;br /&gt;
&lt;br /&gt;
=== E ===&lt;br /&gt;
&lt;br /&gt;
* [[EtherApe]] - A graphical network monitor and sniffer&lt;br /&gt;
* [[Ettercap]] - A suite of tools for Man-in-the-Middle (MITM) attacks&lt;br /&gt;
&lt;br /&gt;
=== F ===&lt;br /&gt;
&lt;br /&gt;
* [[ffuf - Fuzz Faster U Fool]] - A fast web [[fuzzer]] written in Go&lt;br /&gt;
* [[Firewall-cmd]] - The command-line client for the firewalld daemon&lt;br /&gt;
* [[Firewall builder]] - A no-longer-maintained graphical interface to manage Netfilter/iptables, ipfw, PF, Cisco PIX, and other firewall rules&lt;br /&gt;
* [[froggy]] - A subdomain enumeration tool&lt;br /&gt;
&lt;br /&gt;
=== G ===&lt;br /&gt;
&lt;br /&gt;
* [[Garud]] - An automated reconnaisance tool which enumerates a target and all sub-domains and finds low-hanging fruit&lt;br /&gt;
* [[GoBuster]] - A [[Brute Forcer|brute-forcing]] tool finding for hidden URIs, cloud hosts, DNS subdomains, and more&lt;br /&gt;
* [[Gufw]] - A graphical interface for managing [[Uncomplicated Firewall]] rules&lt;br /&gt;
&lt;br /&gt;
=== H ===&lt;br /&gt;
&lt;br /&gt;
* [[Hashcat]] - A multi-operating system, high-speed password recovery tool&lt;br /&gt;
* [[Hash Suite]] - A Windows-based high-performance password cracker&lt;br /&gt;
* [[httpx]] - A fast HTTP toolkit&lt;br /&gt;
&lt;br /&gt;
=== I ===&lt;br /&gt;
&lt;br /&gt;
* [[INetSim]] - A suite of tools for simulating Internet services to test network behavior of tools or unknown software&lt;br /&gt;
* [[IPTables]] - The userspace command line program used to configure Linux 2.4.x and later packet filtering rulesets&lt;br /&gt;
&lt;br /&gt;
=== J ===&lt;br /&gt;
&lt;br /&gt;
* [[John the Ripper]] - A multi-platform password cracker&lt;br /&gt;
&lt;br /&gt;
=== K ===&lt;br /&gt;
&lt;br /&gt;
* [[Kismet]] - A suite of tools for wireless sniffing, network and device detection, and wardriving&lt;br /&gt;
&lt;br /&gt;
=== L ===&lt;br /&gt;
&lt;br /&gt;
* [[L0phtCrack]] - An open-source password hash cracker&lt;br /&gt;
* [[Lynis]] - An open-source security auditing tool for Unix-based operating systems&lt;br /&gt;
&lt;br /&gt;
=== M ===&lt;br /&gt;
&lt;br /&gt;
* [[Maltego|Maltego Community Edition]] - An open-source intelligence and graphical link analysis tool&lt;br /&gt;
* [[MASSSCAN]] - An extremely high-speed port scanner. Most famously used for scanning the entire internet in mere minutes&lt;br /&gt;
* [[mdk3]] - A tool for exploiting common IEEE 802.11 protocol weaknesses&lt;br /&gt;
* [[Medusa]] - The massively speedy, highly parallel, modular login brute-forcing password cracker&lt;br /&gt;
&lt;br /&gt;
=== N ===&lt;br /&gt;
&lt;br /&gt;
* [[NCrack]] - A high-speed, multi-platform network authentication cracking tool&lt;br /&gt;
* [[NetCat]] - A networking utility which reads and writes data across network connections, using the [[wikipedia:Internet_protocol_suite|TCP/IP protocol]]&lt;br /&gt;
* [[NetStumbler]] - A Windows-based wireless network detection tool used for wardriving and WiFi mapping&lt;br /&gt;
* [[NFTables]] - The newer [[NetFilter]] userspace program replacing [[IPTables]] for Linux firewall management&lt;br /&gt;
* [[Nikto]] - A free command-line utility vulnerability scanner&lt;br /&gt;
* [[NMap]] - A network discovery and security auditing port/host scanner&lt;br /&gt;
&lt;br /&gt;
=== O ===&lt;br /&gt;
&lt;br /&gt;
* [[OpenVAS]] - A full-featured vulnerability scanner forked from the [[Nessus]] code base in 2006&lt;br /&gt;
* [[ophCrack]] - An open-source Windows-password cracking program&lt;br /&gt;
* [[Oracle VirtualBox]] - An open-source system virtualization tool&lt;br /&gt;
* [[OSSEC]] - A free Host Intrusion Detection System (HIDS) tool&lt;br /&gt;
&lt;br /&gt;
=== P ===&lt;br /&gt;
&lt;br /&gt;
* [[p0f]] - An open-source, passive-listening traffic fingerprinting tool for Unix-based systems&lt;br /&gt;
* [[PimpMyKali]] - A script for fixing Kali virtualized system problems&lt;br /&gt;
* [[Port Authority]] - An [https://www.android.com/ Android based], high-speed scanner that allows you to quickly discover hosts on your network and will display useful network information about your device and other hosts&lt;br /&gt;
* [[PortQry]] - A command-line port scanner which runs on Windows 2000 based servers&lt;br /&gt;
* [[PortQryUI]] - A graphical interface the the above-listed [[PortQry]] tool&lt;br /&gt;
* [[pwncat]] - A post-exploit tool for streamlining red team operations&lt;br /&gt;
&lt;br /&gt;
=== Q ===&lt;br /&gt;
&lt;br /&gt;
=== R ===&lt;br /&gt;
&lt;br /&gt;
* [[Raccoon]] - An offensive security tool for reconnaissance and information gathering&lt;br /&gt;
&lt;br /&gt;
=== S ===&lt;br /&gt;
&lt;br /&gt;
* [[SMap]] - A command-line options compatible replacement for [[NMap]] powered for the [https://www.shodan.io/ Shodan] port scanning API&lt;br /&gt;
* [[Snort|Snort (Community Ruleset)]] - A free and open-source network intrusion detection system (NIDS) and intrusion prevention system (IPS)&lt;br /&gt;
&lt;br /&gt;
=== T ===&lt;br /&gt;
&lt;br /&gt;
* [[tcpdump]] - A powerful command-line packet analyzer&lt;br /&gt;
* [[TCP Port Scanner]] - An application that uses high-speed [[wikipedia:Transmission_Control_Protocol#Connection_establishment|SYN]] scanning to find open ports on a network&lt;br /&gt;
* [[Test My Defenses]] - A free website by ZScaler to test and advise on how to improve your protection against Ransomware&lt;br /&gt;
* [[THC-Hydra]] - A [[wikipedia:GNU_General_Public_License|GPLed]] proof-of-concept password cracking tool&lt;br /&gt;
&lt;br /&gt;
=== U ===&lt;br /&gt;
&lt;br /&gt;
* [[Uncomplicated Firewall]] (UFW) - A command-line tool for managing NetFilter firewalls, available in Ubuntu and Debian distributions&lt;br /&gt;
=== V ===&lt;br /&gt;
&lt;br /&gt;
=== W ===&lt;br /&gt;
&lt;br /&gt;
* [[Wfuzz]] - A [[Fuzzer|fuzzing tool]] for finding hidden web resources &lt;br /&gt;
* [[Wireshark]] - The world’s foremost, widely-used network protocol analyzer&lt;br /&gt;
&lt;br /&gt;
=== X ===&lt;br /&gt;
&lt;br /&gt;
=== Y ===&lt;br /&gt;
&lt;br /&gt;
* [[Yuki Chan The Auto Pentest]] - A Linux-based automated penetration testing tool to audit standard security settings&lt;br /&gt;
&lt;br /&gt;
=== Z ===&lt;br /&gt;
&lt;br /&gt;
* [[ZAProxy|Zed Attack Proxy]] - The world&#039;s most widely used web application scanner&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=289</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=289"/>
		<updated>2024-11-01T04:37:11Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add help text output PDF and explainer text.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube&lt;br /&gt;
{{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]]&lt;br /&gt;
{{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Seen below is a run of &#039;&#039;&#039;ffuf&#039;&#039;&#039; targeted at a local [[Metasploitable]] virtual machine, with colorized output (-c option)&lt;br /&gt;
[[File:Ffuf-colorized-run.png|600px]]&lt;br /&gt;
* Here is the output from &#039;&#039;&#039;ffuf -h&#039;&#039;&#039;, showing the standard command help printout&lt;br /&gt;
&amp;lt;pdf&amp;gt;File:Ffuf_standard_help_text.pdf&amp;lt;/pdf&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Ffuf_standard_help_text.pdf&amp;diff=288</id>
		<title>File:Ffuf standard help text.pdf</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Ffuf_standard_help_text.pdf&amp;diff=288"/>
		<updated>2024-11-01T04:28:14Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Standard output from &amp;quot;ffuf -h&amp;quot; command run.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Standard output from &amp;quot;ffuf -h&amp;quot; command run.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=287</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=287"/>
		<updated>2024-11-01T04:26:02Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* Sample Use/Screenshots */  Playing with image display configuration&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube&lt;br /&gt;
{{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]]&lt;br /&gt;
{{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Seen below is a run of &#039;&#039;&#039;ffuf&#039;&#039;&#039; targeted at a local Metasploitable virtual machine, with colorized output (-c option)&lt;br /&gt;
[[File:Ffuf-colorized-run.png|600px]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=286</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=286"/>
		<updated>2024-11-01T04:25:13Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Clean up File insertion mistake which prevented from image from displaying.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube&lt;br /&gt;
{{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]]&lt;br /&gt;
{{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Seen below is a run of &#039;&#039;&#039;ffuf&#039;&#039;&#039; targeted at a local Metasploitable virtual machine, with colorized output (-c option)&lt;br /&gt;
[[File:Ffuf-colorized-run.png|600px||left]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=285</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=285"/>
		<updated>2024-11-01T04:23:16Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added screenshot showing actual run of ffuf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube&lt;br /&gt;
{{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]]&lt;br /&gt;
{{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Seen below is a run of &#039;&#039;&#039;ffuf&#039;&#039;&#039; targeted at a local Metasploitable virtual machine, with colorized output (-c option)&lt;br /&gt;
[[:File:Ffuf-colorized-run.png]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Ffuf-colorized-run.png&amp;diff=284</id>
		<title>File:Ffuf-colorized-run.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Ffuf-colorized-run.png&amp;diff=284"/>
		<updated>2024-11-01T04:17:55Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Screenshot of ffuf run against Metasploitable server, with colorized output.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Screenshot of ffuf run against Metasploitable server, with colorized output.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Note-taking_applications&amp;diff=283</id>
		<title>Note-taking applications</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Note-taking_applications&amp;diff=283"/>
		<updated>2024-10-31T16:29:28Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add &amp;quot;AnyType&amp;quot; editor internal link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Note-taking is such an important part of information security that it is hard to advance your skills without a good note-taking application. I&#039;m still finding which one suits me best, but below are all the tools I&#039;m working with or reading about in an attempt to find what best suits my style. I will point out that there are many, many more note-taking applications than these listed. I am simply starting with the list of tools I have used or will be trying out.&lt;br /&gt;
&lt;br /&gt;
* [[Joplin]]&lt;br /&gt;
* [[Obsidian]]&lt;br /&gt;
* [[CherryTree]]&lt;br /&gt;
* [[Trilium Notes]]&lt;br /&gt;
* [[Microsoft OneNote]]&lt;br /&gt;
* [[SimpleNote]]&lt;br /&gt;
* [[Notion]]&lt;br /&gt;
* [[Zim]]&lt;br /&gt;
* [[Evernote]]&lt;br /&gt;
* [[AnyType]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=NMap&amp;diff=282</id>
		<title>NMap</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=NMap&amp;diff=282"/>
		<updated>2024-10-30T19:49:16Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Put PDF on line below mention of the file.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
The [[SecurityTools:About|inspiration behind this wiki]], [https://nmap.org/ NMap is a port and host scanning tool] which rapidly and relatively safely scans networked systems for security auditing purposes. It supports variable scanning speeds, host operating system (OS) detection, and a vibrant support community which helps improve the tool regularly. NMap runs on all major operating systems and includes a [https://nmap.org/zenmap/ graphical scan management tool] for GUI-based systems. &lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Port Scanner]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.udemy.com/course/the-complete-nmap-ethical-hacking-course-network-security/ The Complete NMap Ethical Hacking course] on Udemy - A video guide to getting the most out of NMap from StationX&#039;s Nathan House&lt;br /&gt;
* A [https://www.freecodecamp.org/news/what-is-nmap-and-how-to-use-it-a-tutorial-for-the-greatest-scanning-tool-of-all-time/ short tutorial on running NMap] from FreeCodeCamp&lt;br /&gt;
* [https://www.tutorialspoint.com/nmap-cheat-sheet An NMap cheat sheet], collecting the most common flags into a shortened guide&lt;br /&gt;
* The [https://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/?tag=securitytoo08-20 official NMap scanning guide book]&lt;br /&gt;
* Another [http://hackingdefined.org/ NMap cheat sheet from HackingDefined] that&#039;s worth checking out&lt;br /&gt;
&amp;lt;pdf&amp;gt;File:nmap-cheat-sheet.pdf&amp;lt;/pdf&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Port Scanner]]&lt;br /&gt;
* [[Angry IP Scanner]]&lt;br /&gt;
* [[MASSSCAN]]&lt;br /&gt;
* [[NetCat]]&lt;br /&gt;
* [[Network Scanner]]&lt;br /&gt;
* [[Port Authority]]&lt;br /&gt;
* [[PortQry]] and [[PortQryUI]]&lt;br /&gt;
* [[SMap]]&lt;br /&gt;
* [[TCP Port Scanner]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Books&amp;diff=281</id>
		<title>Books</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Books&amp;diff=281"/>
		<updated>2024-10-30T16:27:51Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* E */ Remove online Ethical Hacking guide-book, as site is now defunct.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A non-exhaustive list of books covering a broad range of subjects which will interest security learners and practitioners.&lt;br /&gt;
&lt;br /&gt;
=== A ===&lt;br /&gt;
&lt;br /&gt;
* [https://nostarch.com/bughunter A Bug Hunter&#039;s Diary] - No longer available from the publisher as a printed book, this e-book is a guide to finding and testing bugs in the applications we run and the security implications of those bugs.&lt;br /&gt;
&lt;br /&gt;
=== B ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Basics-Hacking-Penetration-Testing-Ethical/dp/0124116442/?tag=securitytoo08-20 The Basics of Hacking and Penetration Testing, 2nd Edition] - An introduction to the steps used in performing a penetration test or practicing ethical hacking.&lt;br /&gt;
* [https://amzn.to/3vLTL7s Blue Team Field Manual (BTFM)] - A Cybersecurity Incident Response Guide that aligns with the NIST Cybersecurity Framework.&lt;br /&gt;
&lt;br /&gt;
=== C ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/CompTIA-Security-Certification-Guide-SY0-601/dp/1260464008/?tag=securitytoo08-20 CompTIA Security+ All-in-One Exam Guide, 6th Edition] - A complete guide to studying for and passing your CompTIA Security+ certification test.&lt;br /&gt;
* [https://github.com/opsdisk/the_cyber_plumbers_handbook/ The Cyber Plumber&#039;s Handbook] - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss, plus a purchasable [https://opsdisk.gumroad.com/l/cphlab lab guide and hands-on interactive lab] for practicing what you learn.&lt;br /&gt;
&lt;br /&gt;
=== D ===&lt;br /&gt;
&lt;br /&gt;
=== E ===&lt;br /&gt;
&lt;br /&gt;
=== F ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/exec/obidos/ASIN/0321268172/?tag=securitytoo08-20 File System Forensic Analysis] - An in-depth guide to the specifics of file systems and low-level forensic analysis.&lt;br /&gt;
* [https://link.springer.com/book/10.1007/978-1-4842-6189-7 Firewalls Don&#039;t Stop Dragons] - A step-by-step guide to computer security and privacy for non-techies.&lt;br /&gt;
&lt;br /&gt;
=== G ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/gp/product/B081Y5262X/?tag=securitytoo08-20 Getting Started Becoming the Master Hacker] - OccupyTheWeb&#039;s guide to all things hacking. It introduces the reader to the basics needed to become a master hacker. (Also available at OTW&#039;s [https://www.hackers-arise.com/online-store Hacker&#039;s Arise online store]).&lt;br /&gt;
* [https://nostarch.com/GhidraBook The Ghidra Book] - A comprehensive guide to the NSA&#039;s reverse-engineering tool (also [https://www.amazon.com/Ghidra-Book-Definitive-Guide/dp/1718501021/?tag=securitytoo08-20 available from Amazon]).&lt;br /&gt;
&lt;br /&gt;
=== H ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Hacker-Playbook-3-Book/dp/B0883B694R/?tag=securitytoo08-20 The Hacker Playbook (3 book collection)] - A step-by-step guide to the “game” of penetration hacking that features hands-on examples and helpful advice from the top of the field. I have all three books, and each is worth getting.&lt;br /&gt;
* [https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/?tag=securitytoo08-20 Hacking, the Art of Exploitation, 2nd Edition] - A hacker&#039;s guide to programming and then using that knowledge to exploit applications as well as cover your tracks and break into wireless networks.&lt;br /&gt;
* [https://nostarch.com/cybersecurityreallyworks How Cybersecurity Really Works] - A beginner&#039;s guide to the basics of security without being too technical.&lt;br /&gt;
&lt;br /&gt;
=== I ===&lt;br /&gt;
&lt;br /&gt;
=== J ===&lt;br /&gt;
&lt;br /&gt;
=== K ===&lt;br /&gt;
&lt;br /&gt;
=== L ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Linux-Basics-Hackers-Networking-Scripting/dp/1593278551/ Linux Basics for Hackers] - A guidebook to learning the basics of Linux a hacker needs to know, through working with [[Kali Linux]].&lt;br /&gt;
&lt;br /&gt;
=== M ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/?tag=securitytoo08-20 Metasploit: The Penetration Tester&#039;s Guide] - The authoritative guide to the [[Metasploit|Metasploit Framework]] (also [https://nostarch.com/metasploit available directly from the publisher]).&lt;br /&gt;
&lt;br /&gt;
=== N ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Nmap-Network-Scanning-Official-Discovery/dp/0979958717/ Nmap Network Scanning]: The Official Nmap Project Guide to Network Discovery and Security Scanning - The definitive guide to [[nmap]], but the tool&#039;s author, Fyoder.&lt;br /&gt;
&lt;br /&gt;
=== O ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Open-Source-Intelligence-Techniques-Information/dp/B08RRDTFF9/?tag=securitytoo08-20 Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information] - Yes, the title is a mouhtful. This is one of the top books on OSInt practices.&lt;br /&gt;
&lt;br /&gt;
=== P ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641/?tag=securitytoo08-20 Penetration Testing: A Hand-On Introduction to Hacking] - An introduction to the core skills and techniques that every pentester needs (also [https://nostarch.com/pentesting available directly from the publisher]).&lt;br /&gt;
* [https://www.amazon.com/Practical-Packet-Analysis-Wireshark-Real-World/dp/1593278020/?tag=securitytoo08-20 Practical Packet Analysis, 3rd Edition: Using Wireshark to Solve Real-World Network Problems] - A guide to making sense of [[Wireshark]] packet captures,  IPv6 and SMTP, plus help on the powerful command line packet analyzers [[tcpdump]] and TShark.&lt;br /&gt;
* [https://nostarch.com/nsm The Practice of Network Security Monitoring] - A detailed manual on what to watch for to help you detect and defend against intrusions on your network.&lt;br /&gt;
* [https://amzn.to/3vNBlDi Purple Team Field Manual (PTFM)] - The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.&lt;br /&gt;
&lt;br /&gt;
=== Q ===&lt;br /&gt;
&lt;br /&gt;
=== R ===&lt;br /&gt;
&lt;br /&gt;
* [https://nostarch.com/bughunting Real-World Bug Hunting] - A hands-on guide to discovering and misusing software bugs.&lt;br /&gt;
* [https://amzn.to/3vKTDFm Red Team Field Manual (RTFM)] - A thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page.&lt;br /&gt;
&lt;br /&gt;
=== S ===&lt;br /&gt;
&lt;br /&gt;
=== T ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity-ebook/dp/B08GC1QHGY/?tag=securitytoo08-20 Tribe of Hackers Blue Team] - A guide to defensive security from some of the biggest names in the field.&lt;br /&gt;
* [https://www.amazon.com/Tribe-Hackers-Red-Team-Cybersecurity/dp/1119643325/?tag=securitytoo08-20 Tribe of Hackers Red Team] - A guide to offensive security from some of the biggest names in the field.&lt;br /&gt;
* [https://www.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775/?tag=securitytoo08-20 Tribe of Hackers Security Leaders] - A guide to what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure.&lt;br /&gt;
&lt;br /&gt;
=== U ===&lt;br /&gt;
&lt;br /&gt;
=== V ===&lt;br /&gt;
&lt;br /&gt;
=== W ===&lt;br /&gt;
&lt;br /&gt;
* [https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470/?tag=securitytoo08-20 The Web Application Hacker&#039;s Handbook, 2nd Edition] - Your guide to finding and exploiting vulnerabilities in online applications.&lt;br /&gt;
* [https://amzn.to/2XTBrwQ Wireshark 101: Essential Skills for Network Analysis - 2nd Edition] - Step-by-step instructions on the key functions and features of Wireshark.&lt;br /&gt;
&lt;br /&gt;
=== X ===&lt;br /&gt;
&lt;br /&gt;
=== Y ===&lt;br /&gt;
&lt;br /&gt;
=== Z ===&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=280</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=280"/>
		<updated>2024-03-31T21:31:38Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Fix video window location layout.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube&lt;br /&gt;
{{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]]&lt;br /&gt;
{{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Coming soon&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=AutoRecon&amp;diff=279</id>
		<title>AutoRecon</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=AutoRecon&amp;diff=279"/>
		<updated>2024-03-31T21:30:02Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Correct Video screen layout locations.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/Tib3rius/AutoRecon AutoRecon] is a [https://www.python.org/ Python]-based network reconnaissance tool which automates target service enumeration. Intended as a time-saving tool for pentesting environments, AutoRecon performs port- and service-detection scans as well as deeper service enumeration on listening ports.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Reconnaissance|Reconnaissance Tool]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* A video guide to [https://www.youtube.com/watch?v=m5Onw7XedHc using AutoRecon from the tool&#039;s creator]:&lt;br /&gt;
{{#ev:youtube|m5Onw7XedHc|667x480}}&lt;br /&gt;
* Another video [https://www.youtube.com/watch?v=t5RK3hW4zOI guide to using AutoRecon] effectively:&lt;br /&gt;
{{#ev:youtube|t5RK3hW4zOI|667x480}}&lt;br /&gt;
* A short guide to [https://latesthackingnews.com/2019/08/04/autorecon-an-open-source-enumeration-tool/ downloading and using] AutoRecon&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Reconnoitre]]&lt;br /&gt;
* [[ReconScan]]&lt;br /&gt;
* [[bscan]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Snort&amp;diff=275</id>
		<title>Snort</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Snort&amp;diff=275"/>
		<updated>2023-10-02T02:49:10Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added Screenshots and Similar Tools section, plus one additional More Information link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://snort.org/ Snort] is the foremost open-source Intrusion Prevention System ([[IPS]]) in the world. It is an intrusion prevention system capable of real-time traffic analysis and packet logging. Snort is freely downloadable from [https://snort.org/ the Snort home page], with the difference between the free and commercial versions being the rulesets used by the tool. [https://snort.org/products#rule_subscriptions Ruleset annual pricing] is $29.99 for individuals or $399 per sensor for businesses. You can run a Snort sensor on the community ruleset, but you get the latest updates 30 days after paid subscribers do.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Intrusion Prevention System|Intrusion Prevention System (IPS)]]&lt;br /&gt;
* [[Intrusion Detection System|Intrusion Detection System (IDS)]]&lt;br /&gt;
* [[Network protocol analyzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* Your starting point for rule creation, tool installation, and troubleshooting documentation is [https://snort.org/documents the official Snort documentation page]&lt;br /&gt;
* Learn more about creating rules with [https://resources.infosecinstitute.com/topic/snort-rules-workshop-part-one/ this step-by-step illustrated guide], including a tip for viewing packet captures via [[Wireshark]]&lt;br /&gt;
* Another guide to [https://linuxhint.com/intrusion_detection_snort_tutorial/ installing and configuring Snort and all the necessary support tools] from LinuxHint&lt;br /&gt;
* A tutorial on how to [https://www.hackers-arise.com/post/2018/11/16/snort-basics-how-to-read-and-write-snort-rules-part-1 read and write Snort rules], focusing on learning how to evade the system&lt;br /&gt;
* [https://kalilinuxtutorials.com/how-to-use-snort/ Another guide to running Snort], whether as an Intrusion Prevention System or a simple packet sniffer&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* [[File:Snort Man Page Intro.png|alt=Snort man page|none|thumb|Snort man page]]Here is the man page&#039;s opening, showing just the available options for running Snort&lt;br /&gt;
* [[File:Snort alert fast sample logfile.png|none|thumb]]A sample of /var/log/snort/snort.alert.fast output from a recently started Snort instance&lt;br /&gt;
&lt;br /&gt;
* [[File:Snort bad traffic rules.png|alt=Snort bad traffic default rules|none|thumb|Snort bad traffic rules]]A sample of Snort rules, this from the bad-traffic default rules&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[AIDE]]&lt;br /&gt;
* [[ESET Protect Advanced]]&lt;br /&gt;
* [[OSSEC]]&lt;br /&gt;
* [[SolarWinds Security Event Manager]]&lt;br /&gt;
* [[Zeek]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Snort_bad_traffic_rules.png&amp;diff=274</id>
		<title>File:Snort bad traffic rules.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Snort_bad_traffic_rules.png&amp;diff=274"/>
		<updated>2023-10-02T02:37:28Z</updated>

		<summary type="html">&lt;p&gt;RagManX: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Snort bad traffic rules&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Snort_alert_fast_sample_logfile.png&amp;diff=273</id>
		<title>File:Snort alert fast sample logfile.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Snort_alert_fast_sample_logfile.png&amp;diff=273"/>
		<updated>2023-10-02T02:29:53Z</updated>

		<summary type="html">&lt;p&gt;RagManX: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;snort.alert.fast logfile sample&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Snort_Man_Page_Intro.png&amp;diff=272</id>
		<title>File:Snort Man Page Intro.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Snort_Man_Page_Intro.png&amp;diff=272"/>
		<updated>2023-10-02T02:26:05Z</updated>

		<summary type="html">&lt;p&gt;RagManX: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Screenshot of the Snort man page&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=SMap&amp;diff=271</id>
		<title>SMap</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=SMap&amp;diff=271"/>
		<updated>2023-09-28T01:38:36Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* More Information */ Add inline YouTube video for SMap introduction.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
&lt;br /&gt;
[https://github.com/0xSojalSec/Smap-shodan SMap] is a drop-in replacement for [[NMap]] which uses the same command line options and generates the same style output as NMap. The difference is SMap uses [https://www.shodan.io Shodan&#039;s] free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Port Scanner]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* The [https://github.com/0xSojalSec/Smap-shodan/blob/main/README.md README Usage section] for SMap, offering sample scan options&lt;br /&gt;
* A [https://github.com/0xSojalSec/Smap-shodan#usage list of considerations] to think about before using SMap instead of NMap&lt;br /&gt;
* A slightly [https://a-arich.com/ficavawu/smap-a-drop-in-replacement-for-nmap-powered-by-shodan-io/?ref=rp more in-depth guide] on getting SMap installed, up, and running on a Linux system&lt;br /&gt;
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also mostly applicable to SMap&lt;br /&gt;
* A complete list of [https://api.shodan.io/shodan/ports the 1237 ports SMap scans] by default&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=PYVml5MF44A&amp;amp;pp=ygULc2hvZGFuIHNtYXA%3D introduction to SMap] {{#ev:youtube|PYVml5MF44A|667x400}}&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Port Scanner]]&lt;br /&gt;
* [[Angry IP Scanner]]&lt;br /&gt;
* [[MASSSCAN]]&lt;br /&gt;
* [[NetCat]]&lt;br /&gt;
* [[NetScanTools Pro]]&lt;br /&gt;
* [[Network Scanner]]&lt;br /&gt;
* [[Port Authority]]&lt;br /&gt;
* [[PortQry]] and [[PortQryUI]]&lt;br /&gt;
* [[TCP Port Scanner]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=SMap&amp;diff=270</id>
		<title>SMap</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=SMap&amp;diff=270"/>
		<updated>2023-09-28T01:37:50Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Expand on tool functionality/description, add more &amp;quot;More Information&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
&lt;br /&gt;
[https://github.com/0xSojalSec/Smap-shodan SMap] is a drop-in replacement for [[NMap]] which uses the same command line options and generates the same style output as NMap. The difference is SMap uses [https://www.shodan.io Shodan&#039;s] free scanning API to gather its data, which means no actual contact with the target system(s) occurs. Since SMap uses the same command line options, you can use variable scanning speeds and host operating system (OS) detection just like you can with NMap. Additionally, only the command line flags -p, -h, -o*, and -iL are actually recognized and used. All other flags are ignored.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Port Scanner]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* The [https://github.com/0xSojalSec/Smap-shodan/blob/main/README.md README Usage section] for SMap, offering sample scan options&lt;br /&gt;
* A [https://github.com/0xSojalSec/Smap-shodan#usage list of considerations] to think about before using SMap instead of NMap&lt;br /&gt;
* A slightly [https://a-arich.com/ficavawu/smap-a-drop-in-replacement-for-nmap-powered-by-shodan-io/?ref=rp more in-depth guide] on getting SMap installed, up, and running on a Linux system&lt;br /&gt;
* An [https://allabouttesting.org/nmap-cheat-sheet/ NMap cheat sheet] which is also mostly applicable to SMap&lt;br /&gt;
* A complete list of [https://api.shodan.io/shodan/ports the 1237 ports SMap scans] by default&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=PYVml5MF44A&amp;amp;pp=ygULc2hvZGFuIHNtYXA%3D introduction to SMap]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Port Scanner]]&lt;br /&gt;
* [[Angry IP Scanner]]&lt;br /&gt;
* [[MASSSCAN]]&lt;br /&gt;
* [[NetCat]]&lt;br /&gt;
* [[NetScanTools Pro]]&lt;br /&gt;
* [[Network Scanner]]&lt;br /&gt;
* [[Port Authority]]&lt;br /&gt;
* [[PortQry]] and [[PortQryUI]]&lt;br /&gt;
* [[TCP Port Scanner]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=269</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=269"/>
		<updated>2023-09-27T23:35:33Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Change Tool Type from Web Fuzzer to Fuzzer, add DirB to Similar Tools.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube {{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]] {{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Coming soon&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB]]&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster 1lussion|DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Tool_Types&amp;diff=268</id>
		<title>Tool Types</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Tool_Types&amp;diff=268"/>
		<updated>2023-09-27T23:32:53Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Change &amp;quot;Web Fuzzer&amp;quot; to &amp;quot;Fuzzer&amp;quot;, move its location in the list.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;===Tool Types ===&lt;br /&gt;
*[[Disassembler]]&lt;br /&gt;
*[[Fuzzer]]&lt;br /&gt;
*[[Intrusion Prevention System (IPS)]]&lt;br /&gt;
*[[Intrusion Detection System (IDS)]]&lt;br /&gt;
*[[Network protocol analyzer]]&lt;br /&gt;
*[[Packet Filter]]&lt;br /&gt;
*[[Password Cracker]]&lt;br /&gt;
*[[Port Scanner]]&lt;br /&gt;
*[[Virtualization]]&lt;br /&gt;
*[[Vulnerability Scanner]]&lt;br /&gt;
*[[Web Proxy]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=267</id>
		<title>Free and Open-Source Software</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=267"/>
		<updated>2023-09-27T23:01:17Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Change all references to &amp;quot;Web Fuzzer&amp;quot; to &amp;quot;Fuzzer&amp;quot; and change text description to &amp;quot;fuzzing tool&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Free and Open-Source Software ([[FOSS]]) is software that is [[wikipedia:Free_software|Free Software]] and [[wikipedia:Open-source_software|Open-Source Software]]. There is so much FOSS in the security domain that I believe this warrants its own wiki page.&lt;br /&gt;
&lt;br /&gt;
=== A ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Policy Firewall]] (apf) - A [[NetFilter]] firewall command-line management tool similar to [[IPTables]]&lt;br /&gt;
* [[Advanced Port Scanner]] - A graphical port scanner for Windows which has the capability of identifying programs running on listening ports&lt;br /&gt;
* [[AirCrack-NG]] - A complete suite of tools to assess WiFi network security&lt;br /&gt;
* [[Angry IP Scanner]] - A port and host scanner for Windows.&lt;br /&gt;
* [[AutoRecon]] - A multi-threaded network reconnaisance tool intended to save time in penetration testing environments and CTFs&lt;br /&gt;
&lt;br /&gt;
=== B ===&lt;br /&gt;
&lt;br /&gt;
* [[Burp Suite|Burp Suite Community Edition]] - Web Application testing software &lt;br /&gt;
=== C ===&lt;br /&gt;
&lt;br /&gt;
* [[Cain and Abel]] - A freely available Windows password sniffer and cracker&lt;br /&gt;
&lt;br /&gt;
=== D ===&lt;br /&gt;
&lt;br /&gt;
* [[dirb]] - A CLI [[Fuzzer|fuzzing t]]&amp;lt;nowiki/&amp;gt;[[Fuzzer|ool]] for finding hidden web objects based on dictionary attacks&lt;br /&gt;
* [[dirb-gendict]] - A command line tool for generating dictionaries to be used with the above [[dirb]] tool&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer) - A Java-based, [[Fuzzer|fuzzing tool]] with a graphical interface used for finding hidden URIs/web resources&lt;br /&gt;
* [[DirBuster 1llusion|DirBuster]] (Mr1llusion) - A Python script [[Fuzzer|fuzzing tool]] used for finding hidden URIs/web resources from the command line&lt;br /&gt;
&lt;br /&gt;
=== E ===&lt;br /&gt;
&lt;br /&gt;
* [[EtherApe]] - A graphical network monitor and sniffer&lt;br /&gt;
* [[Ettercap]] - A suite of tools for Man-in-the-Middle (MITM) attacks&lt;br /&gt;
&lt;br /&gt;
=== F ===&lt;br /&gt;
&lt;br /&gt;
* [[ffuf - Fuzz Faster U Fool]] - A fast web [[fuzzer]] written in Go&lt;br /&gt;
* [[Firewall-cmd]] - The command-line client for the firewalld daemon&lt;br /&gt;
* [[Firewall builder]] - A no-longer-maintained graphical interface to manage Netfilter/iptables, ipfw, PF, Cisco PIX, and other firewall rules&lt;br /&gt;
* [[froggy]] - A subdomain enumeration tool&lt;br /&gt;
&lt;br /&gt;
=== G ===&lt;br /&gt;
&lt;br /&gt;
* [[Garud]] - An automated reconnaisance tool which enumerates a target and all sub-domains and finds low-hanging fruit&lt;br /&gt;
* [[GoBuster]] - A [[Brute Forcer|brute-forcing]] tool finding for hidden URIs, cloud hosts, DNS subdomains, and more&lt;br /&gt;
* [[Gufw]] - A graphical interface for managing [[Uncomplicated Firewall]] rules&lt;br /&gt;
&lt;br /&gt;
=== H ===&lt;br /&gt;
&lt;br /&gt;
* [[Hashcat]] - A multi-operating system, high-speed password recovery tool&lt;br /&gt;
* [[Hash Suite]] - A Windows-based high-performance password cracker&lt;br /&gt;
* [[httpx]] - A fast HTTP toolkit&lt;br /&gt;
&lt;br /&gt;
=== I ===&lt;br /&gt;
&lt;br /&gt;
* [[INetSim]] - A suite of tools for simulating Internet services to test network behavior of tools or unknown software&lt;br /&gt;
* [[IPTables]] - The userspace command line program used to configure Linux 2.4.x and later packet filtering rulesets&lt;br /&gt;
&lt;br /&gt;
=== J ===&lt;br /&gt;
&lt;br /&gt;
* [[John the Ripper]] - A multi-platform password cracker&lt;br /&gt;
&lt;br /&gt;
=== K ===&lt;br /&gt;
&lt;br /&gt;
* [[Kismet]] - A suite of tools for wireless sniffing, network and device detection, and wardriving&lt;br /&gt;
&lt;br /&gt;
=== L ===&lt;br /&gt;
&lt;br /&gt;
* [[L0phtCrack]] - An open-source password hash cracker&lt;br /&gt;
* [[Lynis]] - An open-source security auditing tool for Unix-based operating systems&lt;br /&gt;
&lt;br /&gt;
=== M ===&lt;br /&gt;
&lt;br /&gt;
* [[Maltego|Maltego Community Edition]] - An open-source intelligence and graphical link analysis tool&lt;br /&gt;
* [[MASSSCAN]] - An extremely high-speed port scanner. Most famously used for scanning the entire internet in mere minutes&lt;br /&gt;
* [[mdk3]] - A tool for exploiting common IEEE 802.11 protocol weaknesses&lt;br /&gt;
* [[Medusa]] - The massively speedy, highly parallel, modular login brute-forcing password cracker&lt;br /&gt;
&lt;br /&gt;
=== N ===&lt;br /&gt;
&lt;br /&gt;
* [[NCrack]] - A high-speed, multi-platform network authentication cracking tool&lt;br /&gt;
* [[NetCat]] - A networking utility which reads and writes data across network connections, using the [[wikipedia:Internet_protocol_suite|TCP/IP protocol]]&lt;br /&gt;
* [[NetStumbler]] - A Windows-based wireless network detection tool used for wardriving and WiFi mapping&lt;br /&gt;
* [[NFTables]] - The newer [[NetFilter]] userspace program replacing [[IPTables]] for Linux firewall management&lt;br /&gt;
* [[Nikto]] - A free command-line utility vulnerability scanner&lt;br /&gt;
* [[NMap]] - A network discovery and security auditing port/host scanner&lt;br /&gt;
&lt;br /&gt;
=== O ===&lt;br /&gt;
&lt;br /&gt;
* [[OpenVAS]] - A full-featured vulnerability scanner forked from the [[Nessus]] code base in 2006&lt;br /&gt;
* [[ophCrack]] - An open-source Windows-password cracking program&lt;br /&gt;
* [[Oracle VirtualBox]] - An open-source system virtualization tool&lt;br /&gt;
* [[OSSEC]] - A free Host Intrusion Detection System (HIDS) tool&lt;br /&gt;
&lt;br /&gt;
=== P ===&lt;br /&gt;
&lt;br /&gt;
* [[p0f]] - An open-source, passive-listening traffic fingerprinting tool for Unix-based systems&lt;br /&gt;
* [[PimpMyKali]] - A script for fixing Kali virtualized system problems&lt;br /&gt;
* [[Port Authority]] - An [https://www.android.com/ Android based], high-speed scanner that allows you to quickly discover hosts on your network and will display useful network information about your device and other hosts&lt;br /&gt;
* [[PortQry]] - A command-line port scanner which runs on Windows 2000 based servers&lt;br /&gt;
* [[PortQryUI]] - A graphical interface the the above-listed [[PortQry]] tool&lt;br /&gt;
* [[pwncat]] - A post-exploit tool for streamlining red team operations&lt;br /&gt;
&lt;br /&gt;
=== Q ===&lt;br /&gt;
&lt;br /&gt;
=== R ===&lt;br /&gt;
&lt;br /&gt;
* [[Raccoon]] - An offensive security tool for reconnaissance and information gathering&lt;br /&gt;
&lt;br /&gt;
=== S ===&lt;br /&gt;
&lt;br /&gt;
* [[SMap]] - A command-line options compatible replacement for [[NMap]] powered for the [https://www.shodan.io/ Shodan] port scanning API&lt;br /&gt;
* [[Snort|Snort (Community Ruleset)]] - A free and open-source network intrusion detection system (NIDS) and intrusion prevention system (IPS)&lt;br /&gt;
&lt;br /&gt;
=== T ===&lt;br /&gt;
&lt;br /&gt;
* [[tcpdump]] - A powerful command-line packet analyzer&lt;br /&gt;
* [[TCP Port Scanner]] - An application that uses high-speed [[wikipedia:Transmission_Control_Protocol#Connection_establishment|SYN]] scanning to find open ports on a network&lt;br /&gt;
* [[Test My Defenses]] - A free website by ZScaler to test and advise on how to improve your protection against Ransomware&lt;br /&gt;
* [[THC-Hydra]] - A [[wikipedia:GNU_General_Public_License|GPLed]] proof-of-concept password cracking tool&lt;br /&gt;
&lt;br /&gt;
=== U ===&lt;br /&gt;
&lt;br /&gt;
* [[Uncomplicated Firewall]] (UFW) - A command-line tool for managing NetFilter firewalls, available in Ubuntu and Debian distributions&lt;br /&gt;
=== V ===&lt;br /&gt;
&lt;br /&gt;
=== W ===&lt;br /&gt;
&lt;br /&gt;
* [[Wfuzz]] - A [[Fuzzer|fuzzing tool]] for finding hidden web resources &lt;br /&gt;
* [[Wireshark]] - The world’s foremost, widely-used network protocol analyzer&lt;br /&gt;
&lt;br /&gt;
=== X ===&lt;br /&gt;
&lt;br /&gt;
=== Y ===&lt;br /&gt;
&lt;br /&gt;
* [[Yuki Chan The Auto Pentest]] - A Linux-based automated penetration testing tool to audit standard security settings&lt;br /&gt;
&lt;br /&gt;
=== Z ===&lt;br /&gt;
&lt;br /&gt;
* [[ZAProxy|Zed Attack Proxy]] - The world&#039;s most widely used web application scanner&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Cain_and_Abel&amp;diff=266</id>
		<title>Cain and Abel</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Cain_and_Abel&amp;diff=266"/>
		<updated>2023-09-27T22:53:11Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Changed latest release timing from hard-coded &amp;quot;8 years ago&amp;quot; to more general April 2014, which is still accurate.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://web.archive.org/web/20190603235413/http://www.oxid.it/cain.html Cain and Abel] is a no-longer-developed [[Free and Open-Source Software|freeware]] password recovery tool for Windows. The last stable version, released April 2014, is version 4.9.56.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Password Cracker]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
===Similar tools===&lt;br /&gt;
&lt;br /&gt;
* [[Hash Suite]]&lt;br /&gt;
* [[John the Ripper]]&lt;br /&gt;
* [[L0phtCrack]]&lt;br /&gt;
* [[Medusa]]&lt;br /&gt;
* [[NCrack]]&lt;br /&gt;
* [[ophCrack]]&lt;br /&gt;
* [[THC-Hydra]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=265</id>
		<title>Free and Open-Source Software</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Free_and_Open-Source_Software&amp;diff=265"/>
		<updated>2023-09-27T20:49:40Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add multiple fuzzers and internal links under the letter &amp;quot;D&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Free and Open-Source Software ([[FOSS]]) is software that is [[wikipedia:Free_software|Free Software]] and [[wikipedia:Open-source_software|Open-Source Software]]. There is so much FOSS in the security domain that I believe this warrants its own wiki page.&lt;br /&gt;
&lt;br /&gt;
=== A ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Policy Firewall]] (apf) - A [[NetFilter]] firewall command-line management tool similar to [[IPTables]]&lt;br /&gt;
* [[Advanced Port Scanner]] - A graphical port scanner for Windows which has the capability of identifying programs running on listening ports&lt;br /&gt;
* [[AirCrack-NG]] - A complete suite of tools to assess WiFi network security&lt;br /&gt;
* [[Angry IP Scanner]] - A port and host scanner for Windows.&lt;br /&gt;
* [[AutoRecon]] - A multi-threaded network reconnaisance tool intended to save time in penetration testing environments and CTFs&lt;br /&gt;
&lt;br /&gt;
=== B ===&lt;br /&gt;
&lt;br /&gt;
* [[Burp Suite|Burp Suite Community Edition]] - Web Application testing software &lt;br /&gt;
=== C ===&lt;br /&gt;
&lt;br /&gt;
* [[Cain and Abel]] - A freely available Windows password sniffer and cracker&lt;br /&gt;
&lt;br /&gt;
=== D ===&lt;br /&gt;
&lt;br /&gt;
* [[dirb]] - A CLI [[web fuzze]]&amp;lt;nowiki/&amp;gt;r for finding hidden web objects based on dictionary attacks&lt;br /&gt;
* [[dirb-gendict]] - A command line tool for generating dictionaries to be used with the above [[dirb]] tool&lt;br /&gt;
* [[DirBuster JF|DirBuster]] (James Fischer) - A Java-based, [[web fuzzer]] with a graphical interface used for finding hidden URIs/web resources&lt;br /&gt;
* [[DirBuster 1llusion|DirBuster]] (Mr1llusion) - A Python script [[web fuzzer]] used for finding hidden URIs/web resources from the command line&lt;br /&gt;
&lt;br /&gt;
=== E ===&lt;br /&gt;
&lt;br /&gt;
* [[EtherApe]] - A graphical network monitor and sniffer&lt;br /&gt;
* [[Ettercap]] - A suite of tools for Man-in-the-Middle (MITM) attacks&lt;br /&gt;
&lt;br /&gt;
=== F ===&lt;br /&gt;
&lt;br /&gt;
* [[ffuf - Fuzz Faster U Fool]] - A fast web fuzzer written in Go&lt;br /&gt;
* [[Firewall-cmd]] - The command-line client for the firewalld daemon&lt;br /&gt;
* [[Firewall builder]] - A no-longer-maintained graphical interface to manage Netfilter/iptables, ipfw, PF, Cisco PIX, and other firewall rules&lt;br /&gt;
* [[froggy]] - A subdomain enumeration tool&lt;br /&gt;
&lt;br /&gt;
=== G ===&lt;br /&gt;
&lt;br /&gt;
* [[Garud]] - An automated reconnaisance tool which enumerates a target and all sub-domains and finds low-hanging fruit&lt;br /&gt;
* [[GoBuster]] - A [[Brute Forcer|brute-forcing]] tool finding for hidden URIs, cloud hosts, DNS subdomains, and more&lt;br /&gt;
* [[Gufw]] - A graphical interface for managing [[Uncomplicated Firewall]] rules&lt;br /&gt;
&lt;br /&gt;
=== H ===&lt;br /&gt;
&lt;br /&gt;
* [[Hashcat]] - A multi-operating system, high-speed password recovery tool&lt;br /&gt;
* [[Hash Suite]] - A Windows-based high-performance password cracker&lt;br /&gt;
* [[httpx]] - A fast HTTP toolkit&lt;br /&gt;
&lt;br /&gt;
=== I ===&lt;br /&gt;
&lt;br /&gt;
* [[INetSim]] - A suite of tools for simulating Internet services to test network behavior of tools or unknown software&lt;br /&gt;
* [[IPTables]] - The userspace command line program used to configure Linux 2.4.x and later packet filtering rulesets&lt;br /&gt;
&lt;br /&gt;
=== J ===&lt;br /&gt;
&lt;br /&gt;
* [[John the Ripper]] - A multi-platform password cracker&lt;br /&gt;
&lt;br /&gt;
=== K ===&lt;br /&gt;
&lt;br /&gt;
* [[Kismet]] - A suite of tools for wireless sniffing, network and device detection, and wardriving&lt;br /&gt;
&lt;br /&gt;
=== L ===&lt;br /&gt;
&lt;br /&gt;
* [[L0phtCrack]] - An open-source password hash cracker&lt;br /&gt;
* [[Lynis]] - An open-source security auditing tool for Unix-based operating systems&lt;br /&gt;
&lt;br /&gt;
=== M ===&lt;br /&gt;
&lt;br /&gt;
* [[Maltego|Maltego Community Edition]] - An open-source intelligence and graphical link analysis tool&lt;br /&gt;
* [[MASSSCAN]] - An extremely high-speed port scanner. Most famously used for scanning the entire internet in mere minutes&lt;br /&gt;
* [[mdk3]] - A tool for exploiting common IEEE 802.11 protocol weaknesses&lt;br /&gt;
* [[Medusa]] - The massively speedy, highly parallel, modular login brute-forcing password cracker&lt;br /&gt;
&lt;br /&gt;
=== N ===&lt;br /&gt;
&lt;br /&gt;
* [[NCrack]] - A high-speed, multi-platform network authentication cracking tool&lt;br /&gt;
* [[NetCat]] - A networking utility which reads and writes data across network connections, using the [[wikipedia:Internet_protocol_suite|TCP/IP protocol]]&lt;br /&gt;
* [[NetStumbler]] - A Windows-based wireless network detection tool used for wardriving and WiFi mapping&lt;br /&gt;
* [[NFTables]] - The newer [[NetFilter]] userspace program replacing [[IPTables]] for Linux firewall management&lt;br /&gt;
* [[Nikto]] - A free command-line utility vulnerability scanner&lt;br /&gt;
* [[NMap]] - A network discovery and security auditing port/host scanner&lt;br /&gt;
&lt;br /&gt;
=== O ===&lt;br /&gt;
&lt;br /&gt;
* [[OpenVAS]] - A full-featured vulnerability scanner forked from the [[Nessus]] code base in 2006&lt;br /&gt;
* [[ophCrack]] - An open-source Windows-password cracking program&lt;br /&gt;
* [[Oracle VirtualBox]] - An open-source system virtualization tool&lt;br /&gt;
* [[OSSEC]] - A free Host Intrusion Detection System (HIDS) tool&lt;br /&gt;
&lt;br /&gt;
=== P ===&lt;br /&gt;
&lt;br /&gt;
* [[p0f]] - An open-source, passive-listening traffic fingerprinting tool for Unix-based systems&lt;br /&gt;
* [[PimpMyKali]] - A script for fixing Kali virtualized system problems&lt;br /&gt;
* [[Port Authority]] - An [https://www.android.com/ Android based], high-speed scanner that allows you to quickly discover hosts on your network and will display useful network information about your device and other hosts&lt;br /&gt;
* [[PortQry]] - A command-line port scanner which runs on Windows 2000 based servers&lt;br /&gt;
* [[PortQryUI]] - A graphical interface the the above-listed [[PortQry]] tool&lt;br /&gt;
* [[pwncat]] - A post-exploit tool for streamlining red team operations&lt;br /&gt;
&lt;br /&gt;
=== Q ===&lt;br /&gt;
&lt;br /&gt;
=== R ===&lt;br /&gt;
&lt;br /&gt;
* [[Raccoon]] - An offensive security tool for reconnaissance and information gathering&lt;br /&gt;
&lt;br /&gt;
=== S ===&lt;br /&gt;
&lt;br /&gt;
* [[SMap]] - A command-line options compatible replacement for [[NMap]] powered for the [https://www.shodan.io/ Shodan] port scanning API&lt;br /&gt;
* [[Snort|Snort (Community Ruleset)]] - A free and open-source network intrusion detection system (NIDS) and intrusion prevention system (IPS)&lt;br /&gt;
&lt;br /&gt;
=== T ===&lt;br /&gt;
&lt;br /&gt;
* [[tcpdump]] - A powerful command-line packet analyzer&lt;br /&gt;
* [[TCP Port Scanner]] - An application that uses high-speed [[wikipedia:Transmission_Control_Protocol#Connection_establishment|SYN]] scanning to find open ports on a network&lt;br /&gt;
* [[Test My Defenses]] - A free website by ZScaler to test and advise on how to improve your protection against Ransomware&lt;br /&gt;
* [[THC-Hydra]] - A [[wikipedia:GNU_General_Public_License|GPLed]] proof-of-concept password cracking tool&lt;br /&gt;
&lt;br /&gt;
=== U ===&lt;br /&gt;
&lt;br /&gt;
* [[Uncomplicated Firewall]] (UFW) - A command-line tool for managing NetFilter firewalls, available in Ubuntu and Debian distributions&lt;br /&gt;
=== V ===&lt;br /&gt;
&lt;br /&gt;
=== W ===&lt;br /&gt;
&lt;br /&gt;
* [[Wfuzz]] - A web application security assessment tool&lt;br /&gt;
* [[Wireshark]] - The world’s foremost, widely-used network protocol analyzer&lt;br /&gt;
&lt;br /&gt;
=== X ===&lt;br /&gt;
&lt;br /&gt;
=== Y ===&lt;br /&gt;
&lt;br /&gt;
* [[Yuki Chan The Auto Pentest]] - A Linux-based automated penetration testing tool to audit standard security settings&lt;br /&gt;
&lt;br /&gt;
=== Z ===&lt;br /&gt;
&lt;br /&gt;
* [[ZAProxy|Zed Attack Proxy]] - The world&#039;s most widely used web application scanner&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=264</id>
		<title>Ffuf - Fuzz Faster U Fool</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Ffuf_-_Fuzz_Faster_U_Fool&amp;diff=264"/>
		<updated>2023-09-27T20:35:20Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add /* Sample Use */ and /* Similar Tools */ sections with minor content.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/ffuf/ffuf Fuzz Faster U Fool] is a Go program used for [[Fuzzing definition|fuzzing]] HTTP GET and POST parameters. It is used for discovering elements and content within web applications, such as subdirectories or subdomains.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Web fuzzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* [https://codingo.io/tools/ffuf/bounty/2020/09/17/everything-you-need-to-know-about-ffuf.html Everything you need to know about ffuf]&lt;br /&gt;
* A [https://www.youtube.com/watch?v=aN3Nayvd7FU video guide to using ffuf] from InsiderPhD on YouTube {{#ev:youtube|aN3Nayvd7FU|667x400}}&lt;br /&gt;
* A video [https://www.youtube.com/watch?v=N1VurPV0s0o comparison and explainer on the differences] between ffuf and [[wfuzz]] {{#ev:youtube|N1VurPV0s0o|667x400}}&lt;br /&gt;
* An [https://cybersecnerds.com/ffuf-everything-you-need-to-know/ installation and use guide] for ffuf&lt;br /&gt;
* And [https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 one last guide to ffuf], this one designed for beginners to fuzzing&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* Coming soon&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[DirB|DirBuster]] (James Fischer)&lt;br /&gt;
* [[DirBuster]] (Mr1llusion)&lt;br /&gt;
* [[wfuzz]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Burp_Suite&amp;diff=263</id>
		<title>Burp Suite</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Burp_Suite&amp;diff=263"/>
		<updated>2023-09-25T14:05:30Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added inline YouTube video tag for John Hammond&amp;#039;s intro&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
&lt;br /&gt;
Burp Suite is a free and commercial testing toolkit/proxy used for verifying web application security. It is available in the [https://portswigger.net/burp/communitydownload Burp Suite Community Edition] for free and the [https://portswigger.net/burp/pro Burp Suite Professional] version for $399/year. &lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Web Proxy]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* For training on Burp Suite check out [https://portswigger.net/ PortSwigger]&#039;s [https://portswigger.net/training Web Security Academy]&lt;br /&gt;
* YouTube security educator John Hammond offers [https://www.youtube.com/watch?v=G3hpAeoZ4ek a half-hour introduction to Burp Suite] Community Edition {{#ev:youtube|G3hpAeoZ4ek|667x400}}&lt;br /&gt;
* Here&#039;s [https://www.softwaretestinghelp.com/burp-suite-tutorial/ a lengthy introduction to Burp Suite] to help you get started with the tool&lt;br /&gt;
* Labelled a cheat sheet, but still lengthy, there is [https://www.comparitech.com/net-admin/burp-suite-cheat-sheet/ this briefer guide to Burp Suite] from Comparitech&lt;br /&gt;
* eSecurityPlanet with a right-to-the-meat-of-things [https://www.esecurityplanet.com/networks/getting-started-with-burp-suite-pentest-tutorial/ starter tutorial to Burp Suite use] against the [[Juice Shop]] application&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
*[[Acunetix]]&lt;br /&gt;
*[[ZAProxy|Zed Application Proxy]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Burp_Suite&amp;diff=262</id>
		<title>Burp Suite</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Burp_Suite&amp;diff=262"/>
		<updated>2023-09-25T14:04:30Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added &amp;quot;More Information&amp;quot; on Burp Suite with plenty of external links. First mention of Juice Shop on this wiki.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
&lt;br /&gt;
Burp Suite is a free and commercial testing toolkit/proxy used for verifying web application security. It is available in the [https://portswigger.net/burp/communitydownload Burp Suite Community Edition] for free and the [https://portswigger.net/burp/pro Burp Suite Professional] version for $399/year. &lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Web Proxy]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* For training on Burp Suite check out [https://portswigger.net/ PortSwigger]&#039;s [https://portswigger.net/training Web Security Academy]&lt;br /&gt;
* YouTube security educator John Hammond offers [https://www.youtube.com/watch?v=G3hpAeoZ4ek a half-hour introduction to Burp Suite] Community Edition&lt;br /&gt;
* Here&#039;s [https://www.softwaretestinghelp.com/burp-suite-tutorial/ a lengthy introduction to Burp Suite] to help you get started with the tool&lt;br /&gt;
* Labelled a cheat sheet, but still lengthy, there is [https://www.comparitech.com/net-admin/burp-suite-cheat-sheet/ this briefer guide to Burp Suite] from Comparitech&lt;br /&gt;
* eSecurityPlanet with a right-to-the-meat-of-things [https://www.esecurityplanet.com/networks/getting-started-with-burp-suite-pentest-tutorial/ starter tutorial to Burp Suite use] against the [[Juice Shop]] application&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
*[[Acunetix]]&lt;br /&gt;
*[[ZAProxy|Zed Application Proxy]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Port_Authority&amp;diff=261</id>
		<title>Port Authority</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Port_Authority&amp;diff=261"/>
		<updated>2023-09-25T02:15:16Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Initial Port Authority page creation.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/aaronjwood/PortAuthority Port Authority is a &#039;&#039;very&#039;&#039; fast port scanner] written for Android tablets and phones. It can perform host discovery in just a few seconds, and scan ports 1-65535 for a single host in as little as 30 seconds. As it is open source, you can download and install it from the [https://play.google.com/store/apps/details?id=com.aaronjwood.portauthority.free Google Play Store] or [https://f-droid.org/app/com.aaronjwood.portauthority F-Droid] for free (although there is [https://play.google.com/store/apps/details?id=com.aaronjwood.portauthority.donate a donate version] if you want to support the author). The tool offers built-in DNS lookups, MAC address vendor detection, and custom port range scans, among a host of other features.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Port Scanner]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* The [https://forum.xda-developers.com/t/app-4-0-port-authority-a-very-fast-port-scanner.3150999/ XDA-Developer&#039;s thread announcing Port Authority] by the author&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
&lt;br /&gt;
* [[File:Port Authority Basic Interface.png|alt=The basic Port Authority user interface.|none|thumb|The basic Port Authority user interface.]]&lt;br /&gt;
* [[File:Port Authority Port Range Interface.png|alt=The Port Authority port range selection interface.|none|thumb|The Port Authority port range selection interface.]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[Advanced Port Scanner]]&lt;br /&gt;
* [[Angry IP Scanner]]&lt;br /&gt;
* [[MASSSCAN]]&lt;br /&gt;
* [[NetCat]]&lt;br /&gt;
* [[Network Scanner]]&lt;br /&gt;
* [[NMap]]&lt;br /&gt;
* [[PortQry]] and [[PortQryUI]]&lt;br /&gt;
* [[TCP Port Scanner]]&lt;br /&gt;
* [[SMap]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Port_Authority_Port_Range_Interface.png&amp;diff=260</id>
		<title>File:Port Authority Port Range Interface.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Port_Authority_Port_Range_Interface.png&amp;diff=260"/>
		<updated>2023-09-25T02:12:57Z</updated>

		<summary type="html">&lt;p&gt;RagManX: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The two scrolling selectors for choosing a port range to scan.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=File:Port_Authority_Basic_Interface.png&amp;diff=259</id>
		<title>File:Port Authority Basic Interface.png</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=File:Port_Authority_Basic_Interface.png&amp;diff=259"/>
		<updated>2023-09-25T02:11:13Z</updated>

		<summary type="html">&lt;p&gt;RagManX: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The basic layout of the Port Authority interface.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=NetFilter&amp;diff=258</id>
		<title>NetFilter</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=NetFilter&amp;diff=258"/>
		<updated>2023-09-25T00:08:36Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Change &amp;quot;Headers&amp;quot; to &amp;quot;Sub-heading 1&amp;quot; to match the appearance of other wiki pages.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
NetFilter is an Open-Source project which provides the packet filtering framework for Linux kernels 2.4 and higher. It is typically associated with the [[iptables]] and [[nftables]] tools. It supports packet filtering, network address and port translation, packet logging, user-space packet queuing and other packet mangling. NetFilter is the successor to [[wikipedia:Ipchains|ipchains]].&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
* [[Packet Filter]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
* DigitalOcean with [https://www.digitalocean.com/community/tutorials/a-deep-dive-into-iptables-and-netfilter-architecture a nice deep dive on the differences] between NetFilter and [[iptables]]/[[nftables]] and how they work together to provide firewalling services&lt;br /&gt;
* The [https://netfilter.org/documentation/ official NetFilter documentation page], with loads of links to additional information&lt;br /&gt;
* An [https://linux-kernel-labs.github.io/refs/heads/master/labs/networking.html in-depth, technical review of NetFilter], including code samples and labs for greater understanding&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Online_Training_sites&amp;diff=257</id>
		<title>Online Training sites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Online_Training_sites&amp;diff=257"/>
		<updated>2023-09-24T20:54:41Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Added link to Tib3rius&amp;#039; offerings on Windows and Linux privilege escalation.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are listed online CyberSec training sites in no particular order which offer video training courses to help you advance your knowledge and career.&lt;br /&gt;
&lt;br /&gt;
* [https://cybr.com/courses/ Cybr]&lt;br /&gt;
* [https://academy.tcm-sec.com/courses/ TheCyberMentor Academy]&lt;br /&gt;
* [https://academy.ehacking.net/courses Ethical Hacking Academy]&lt;br /&gt;
* [https://courses.stationx.net/ The StationX Cyber Security School]&lt;br /&gt;
* [https://my.ine.com/ INE]&lt;br /&gt;
* [https://0verfl0w.podia.com/malware-analysis-course 0verfl0w&#039;s Beginner Malware Analysis Course]&lt;br /&gt;
*[https://learnsecurity.amazon.com/ Amazon&#039;s Cybersecurity Awareness training] is now available for free to everyone&lt;br /&gt;
*[https://www.udemy.com/courses/search/?src=ukw&amp;amp;q=cybersecurity Udemy offers hundreds of video courses] covering general cybersecurity, ethical hacking, security or networking certifications, and so much more&lt;br /&gt;
*[https://courses.tib3rius.com/ Tib3rius has courses] on Linux and Windows privilege escalation techniques&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=256</id>
		<title>Useful websites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=256"/>
		<updated>2023-09-24T19:56:41Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Expanded HackTricks explainer text based on creator&amp;#039;s Twitter bio.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are many websites which provide useful information for security practitioners and those learning about security. This topic is going to eventually get unmanageable, and will need reorganized and broken down into some categories. However, until I start filling in more valuable sites, I&#039;m not sure how I&#039;m going to break it down. Expect format changes in the future.&lt;br /&gt;
&lt;br /&gt;
*[https://adsecurity.org/ AD Security] - An infrequently updated but useful guide to attacking and defending Active Directory&lt;br /&gt;
* [https://github.com/fabacab/awesome-cybersecurity-blueteam Awesome Cybersecurity Blue Team] - A GitHub page loaded with resources for [[blue team]] specialists.&lt;br /&gt;
*DFIR Diva&#039;s [https://dfirdiva.com/ Digital Forensics and Incident Response Blog] - Geared towards beginners, this links free and affordable training, resources, and a job board&lt;br /&gt;
*[https://github.com/DFIRmadness/5pillars/blob/master/5-Pillars.md Five Pillars of an Information/Cyber Security Professional] - A guide to the 5 key areas of proficiency necessary to excel in security&lt;br /&gt;
*The [https://old.reddit.com/r/hacking/wiki/index hacking sub-reddit wiki] - Much of the collected wisdom and guidance of /r/hacking, with a glossary, movie recommendations, an FAQ, hacking resources, and so much more. Well worth leaving this page to peruse&lt;br /&gt;
*[https://book.hacktricks.xyz/ HackTricks] - A penetration testing, red team testing, and [[CTF]] tips project which aims to offer free quality hacking resources to all the world, so people can learn for free the latest techniques in cybersecurity&lt;br /&gt;
* [https://haveibeenpwned.com/ Have I Been Pwned?] - A site for checking whether your email or password is in a data breach&lt;br /&gt;
* [https://lolbas-project.github.io/# LOLBAS] - Living off the Land Binaries, Scripts, and Libraries - A site dedicated to helping you take advantage of common tools that might already be loaded on your target system&lt;br /&gt;
*[https://github.com/m0nad/awesome-privilege-escalation m0nad&#039;s Awesome Privilege Escalation] - A collection of Linux, Windows, Docker, and Cloud privilege escalation tips&lt;br /&gt;
*[https://github.com/carlospolop/PEASS-ng/tree/master PEASS-ng] - The Privilege Escalation Awesome Scripts SUITE new generation - a collection of macOS, Linux, and Windows tools to help you escalate your privileges once you gain a foothold on a system. Get some guidance on privilege escalation techniques, including use of PEASS-ng tools, from the [https://book.hacktricks.xyz/linux-hardening/privilege-escalation Linux privilege escalation]and [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation Windows privilege escalation] subsections of HackTricks&lt;br /&gt;
*[https://www.shodan.io/ Shodan] web search engine - &amp;quot;Shodan is the world&#039;s first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.&amp;quot;&lt;br /&gt;
* [https://www.vulnhub.com/ Vulnhub] - A collection of intentionally vulnerable, downloadable virtual machines to practice your security skills&lt;br /&gt;
*[https://www.vx-underground.org/ VX-Underground] - The largest collection of malware source code, samples, and papers on the internet. For more information, also follow [https://twitter.com/vxunderground the vx-underground Twitter account]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=255</id>
		<title>Useful websites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=255"/>
		<updated>2023-09-24T19:51:40Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add PEASS-ng GitHub page, with additional links to guidance on using escalation tools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are many websites which provide useful information for security practitioners and those learning about security. This topic is going to eventually get unmanageable, and will need reorganized and broken down into some categories. However, until I start filling in more valuable sites, I&#039;m not sure how I&#039;m going to break it down. Expect format changes in the future.&lt;br /&gt;
&lt;br /&gt;
*[https://adsecurity.org/ AD Security] - An infrequently updated but useful guide to attacking and defending Active Directory&lt;br /&gt;
* [https://github.com/fabacab/awesome-cybersecurity-blueteam Awesome Cybersecurity Blue Team] - A GitHub page loaded with resources for [[blue team]] specialists.&lt;br /&gt;
*DFIR Diva&#039;s [https://dfirdiva.com/ Digital Forensics and Incident Response Blog] - Geared towards beginners, this links free and affordable training, resources, and a job board&lt;br /&gt;
*[https://github.com/DFIRmadness/5pillars/blob/master/5-Pillars.md Five Pillars of an Information/Cyber Security Professional] - A guide to the 5 key areas of proficiency necessary to excel in security&lt;br /&gt;
*The [https://old.reddit.com/r/hacking/wiki/index hacking sub-reddit wiki] - Much of the collected wisdom and guidance of /r/hacking, with a glossary, movie recommendations, an FAQ, hacking resources, and so much more. Well worth leaving this page to peruse&lt;br /&gt;
*[https://book.hacktricks.xyz/ HackTricks] - Penetration testing, red team testing, and [[CTF]] tips&lt;br /&gt;
* [https://haveibeenpwned.com/ Have I Been Pwned?] - A site for checking whether your email or password is in a data breach&lt;br /&gt;
* [https://lolbas-project.github.io/# LOLBAS] - Living off the Land Binaries, Scripts, and Libraries - A site dedicated to helping you take advantage of common tools that might already be loaded on your target system&lt;br /&gt;
*[https://github.com/m0nad/awesome-privilege-escalation m0nad&#039;s Awesome Privilege Escalation] - A collection of Linux, Windows, Docker, and Cloud privilege escalation tips&lt;br /&gt;
*[https://github.com/carlospolop/PEASS-ng/tree/master PEASS-ng] - The Privilege Escalation Awesome Scripts SUITE new generation - a collection of macOS, Linux, and Windows tools to help you escalate your privileges once you gain a foothold on a system. Get some guidance on privilege escalation techniques, including use of PEASS-ng tools, from the [https://book.hacktricks.xyz/linux-hardening/privilege-escalation Linux privilege escalation]and [https://book.hacktricks.xyz/windows-hardening/checklist-windows-privilege-escalation Windows privilege escalation] subsections of HackTricks&lt;br /&gt;
*[https://www.shodan.io/ Shodan] web search engine - &amp;quot;Shodan is the world&#039;s first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.&amp;quot;&lt;br /&gt;
* [https://www.vulnhub.com/ Vulnhub] - A collection of intentionally vulnerable, downloadable virtual machines to practice your security skills&lt;br /&gt;
*[https://www.vx-underground.org/ VX-Underground] - The largest collection of malware source code, samples, and papers on the internet. For more information, also follow [https://twitter.com/vxunderground the vx-underground Twitter account]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=254</id>
		<title>Useful websites</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Useful_websites&amp;diff=254"/>
		<updated>2023-09-24T19:33:01Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add LOLBAS GitHub site, link to page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Below are many websites which provide useful information for security practitioners and those learning about security. This topic is going to eventually get unmanageable, and will need reorganized and broken down into some categories. However, until I start filling in more valuable sites, I&#039;m not sure how I&#039;m going to break it down. Expect format changes in the future.&lt;br /&gt;
&lt;br /&gt;
*[https://adsecurity.org/ AD Security] - An infrequently updated but useful guide to attacking and defending Active Directory&lt;br /&gt;
* [https://github.com/fabacab/awesome-cybersecurity-blueteam Awesome Cybersecurity Blue Team] - A GitHub page loaded with resources for [[blue team]] specialists.&lt;br /&gt;
*DFIR Diva&#039;s [https://dfirdiva.com/ Digital Forensics and Incident Response Blog] - Geared towards beginners, this links free and affordable training, resources, and a job board&lt;br /&gt;
*[https://github.com/DFIRmadness/5pillars/blob/master/5-Pillars.md Five Pillars of an Information/Cyber Security Professional] - A guide to the 5 key areas of proficiency necessary to excel in security&lt;br /&gt;
*The [https://old.reddit.com/r/hacking/wiki/index hacking sub-reddit wiki] - Much of the collected wisdom and guidance of /r/hacking, with a glossary, movie recommendations, an FAQ, hacking resources, and so much more. Well worth leaving this page to peruse&lt;br /&gt;
*[https://book.hacktricks.xyz/ HackTricks] - Penetration testing, red team testing, and [[CTF]] tips&lt;br /&gt;
* [https://haveibeenpwned.com/ Have I Been Pwned?] - A site for checking whether your email or password is in a data breach&lt;br /&gt;
* [https://lolbas-project.github.io/# LOLBAS] - Living off the Land Binaries, Scripts, and Libraries - A site dedicated to helping you take advantage of common tools that might already be loaded on your target system&lt;br /&gt;
*[https://github.com/m0nad/awesome-privilege-escalation m0nad&#039;s Awesome Privilege Escalation] - A collection of Linux, Windows, Docker, and Cloud privilege escalation tips.&lt;br /&gt;
*[https://www.shodan.io/ Shodan] web search engine - &amp;quot;Shodan is the world&#039;s first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.&amp;quot;&lt;br /&gt;
* [https://www.vulnhub.com/ Vulnhub] - A collection of intentionally vulnerable, downloadable virtual machines to practice your security skills&lt;br /&gt;
*[https://www.vx-underground.org/ VX-Underground] - The largest collection of malware source code, samples, and papers on the internet. For more information, also follow [https://twitter.com/vxunderground the vx-underground Twitter account]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=EtherApe&amp;diff=253</id>
		<title>EtherApe</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=EtherApe&amp;diff=253"/>
		<updated>2023-09-24T17:57:59Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add in-line EtherApe screenshot to /* More Information */ section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://etherape.sourceforge.io/ EtherApe is a graphical network monitoring tool] for Unix and Unix-like operating systems. It is used for viewing network traffic visually. This means the more &amp;quot;talkative&amp;quot; a node is, the bigger its representation, and node and link colors show the most used protocol. While originally created as an etherman clone, it has since evolved to have some unique features. In addition to running as an active network capture tool, it can also read [[tcpdump]] capture files.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Network protocol analyzer]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* Get [https://etherape.sourceforge.io/introduction.html additional information on EtherApe&#039;s features] from the tool&#039;s home page&lt;br /&gt;
* [[File:EtherApe-v0 9 3 Screenshot.png|alt=EtherApe v0.9.3 screenshot|none|thumb|EtherApe v0.9.3 screenshot]]Take a look at [https://etherape.sourceforge.io/images/v0.9.3.png a screenshot of EtherApe] for version 0.9.3 &lt;br /&gt;
* Although it&#039;s not difficult to install, if you need help getting EtherApe on [[Kali|Kali Linux]], there&#039;s [https://installati.one/install-etherape-kalilinux/ a tutorial for that]&lt;br /&gt;
* Account IT Best Practices has this [https://www.youtube.com/watch?v=mtxCsaiOins brief video guide to identifying network traffic] with EtherApe {{#ev:youtube|mtxCsaiOins|667x400}}&lt;br /&gt;
* A slightly outdated but still accurate [https://www.unixmen.com/install-graphical-network-monitor-etherape-on-ubuntu-linux-16/ guide to installing and using EtherApe] from unixmen&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[netsniff-ng]]&lt;br /&gt;
* [[ngrep]]&lt;br /&gt;
* [[tcpdump]]&lt;br /&gt;
* [[Wireshark]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Virtual_Machines&amp;diff=252</id>
		<title>Virtual Machines</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Virtual_Machines&amp;diff=252"/>
		<updated>2023-09-24T14:37:33Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Replace OWASP Web Application Testing Environment with OWASP Broken Web Applications Project, correct internal link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
Many vendors provide downloadable virtual machines to use as practice targets or as attack hosts. Below are a collection of systems you can download and run on your primary system.&lt;br /&gt;
&lt;br /&gt;
* [[Metasploitable]]&lt;br /&gt;
* [[Metasploitable 2]]&lt;br /&gt;
* [[Metasploitable 3]]&lt;br /&gt;
* [[Kali]]&lt;br /&gt;
* [[Parrot OS]]&lt;br /&gt;
* [[Windows]]&lt;br /&gt;
* [[OWASP Broken Web Applications Project]]&lt;br /&gt;
*[[FLARE VM]]&lt;br /&gt;
&lt;br /&gt;
=== Hypervisors ===&lt;br /&gt;
In addition to the above-listed downloadable virtual machines (VMs), you will need some type of VM management tool. For more information on &#039;&#039;&#039;what&#039;&#039;&#039; a hypervisor is, please see [https://phoenixnap.com/kb/what-is-hypervisor-type-1-2 this article from phoenixNAP]. Below are the currently available hypervisors for managing your VMs.&lt;br /&gt;
&lt;br /&gt;
* [[VMWare|VMWare Player]]&lt;br /&gt;
* [[VMWare|VMWare Workstation Pro]]&lt;br /&gt;
* [[VMWare|VMWare Fusion]]&lt;br /&gt;
* [[VMWare|VMWare VSphere withESXi]]&lt;br /&gt;
* [[Oracle VirtualBox]]&lt;br /&gt;
* [[Hyper-V|Microsoft Hyper-V]]&lt;br /&gt;
* [[KVM]]&lt;br /&gt;
* [[Virtual PC|Windows Virtual PC]]&lt;br /&gt;
* [[Parallels]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=Metasploitable_2&amp;diff=251</id>
		<title>Metasploitable 2</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=Metasploitable_2&amp;diff=251"/>
		<updated>2023-09-24T14:17:37Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Add links to compressed file extraction tools&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Metasploitable2 is the second incarnation of an intentionally vulnerable, Linux-based virtual machine used for practicing penetration testing and security research. The tool is [https://docs.rapid7.com/metasploit/metasploitable-2/ lightly documented at Rapid7&#039;s website], which contains links to download the VM. To get the tool, you first need to register at the source site, then download an 800 MB file. Once downloaded, extract with [https://7-zip.org/ 7-zip], [https://github.com/M2Team/NanaZip NanaZip], or [https://duckduckgo.com/?q=compressed+file+extractor&amp;amp;t=newext&amp;amp;atb=v384-1&amp;amp;ia=web a similar tool] and import in VMWare or VirtualBox. To get started with breaking into the Metasploitable2 machine, check out [https://docs.rapid7.com/metasploit/metasploitable-2-exploitability-guide/ the Exploitability guide] from Rapid7. For help setting up Metasploitable2 in VirtualBox, check out [https://www.geeksforgeeks.org/how-to-install-metasploitable-2-in-virtualbox/ this blog post from Geeks for Geeks]. If you&#039;d rather use the tool from VMWare, take a look at [https://www.exploit-db.com/docs/english/44040-the-easiest-metasploit-guide-you%E2%80%99ll-ever-read.pdf Exploit-DB&#039;s Easiest Metasploit guide] ever.&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=250</id>
		<title>THC-Hydra</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=250"/>
		<updated>2023-09-24T13:23:10Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* Similar Tools */ Correct missing HashCat on-site missing link.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/vanhauser-thc/thc-hydra thc-hydra] is a modular, parallelized network logon cracking tool. It supports a great many networking protocols, such as POP3, FTP, SMTP, SMB, and SSH (v1 and v2), and is available on all major operating systems.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Password Cracker]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* A brief [https://www.cyberpunk.rs/password-cracker-thc-hydra introduction to thc-hydra], including basic installation and use examples from CyberPunk&lt;br /&gt;
* The Kali tools website has [https://www.kali.org/tools/hydra/ a short introduction to thc-hydra], including tool use examples and subtool (dpl4hydra, xhydra, hydra-wizard, and more) functions&lt;br /&gt;
* Automate the Planet gives us a [https://www.automatetheplanet.com/thc-hydra-password-cracking-by-examples/ thc-hydra examples write-up], including installation in brief for Windows&lt;br /&gt;
* Watch a [https://www.youtube.com/watch?v=z4_oqTZJqCo&amp;amp;pp=ygUJdGhjLWh5ZHJh video introduction to thc-hydra] from Network Chuck {{#ev:youtube|z4_oqTZJqCo|667x400}}&lt;br /&gt;
* Get a [https://www.bookofnetwork.com/hacking-tutorials/THC-Hydra step-by-step walkthrough of using the graphical tool xhydra] to brute-force an SSH login on a remote server&lt;br /&gt;
* [https://www.freecodecamp.org/news/how-to-use-hydra-pentesting-tutorial/ A practical tutorial to installing] and running thc-hydra on a Linux system from FreeCodeCamp&lt;br /&gt;
* Another guide to [https://kalilinuxtutorials.com/thc-hydra/ installing, running, and viewing output for thc-hydra] on Kali Linux Tutorials&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
[[File:XHydra GUI.png|alt=xHydra GUI|none|thumb|The xHydra GUI]]&lt;br /&gt;
[[File:Hydra Default Usage.png|alt=The thc-hydra main program usage/help output|none|thumb|The thc-hydra main program usage/help output.]]&lt;br /&gt;
[[File:Hydra Retrieve Default Password List.png|none|thumb]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[AirCrack-NG]]&lt;br /&gt;
* [[Cain and Abel]]&lt;br /&gt;
* [[Hashcat|HashCat]]&lt;br /&gt;
* [[Hash Suite]]&lt;br /&gt;
* [[John the Ripper]]&lt;br /&gt;
* [[L0phtcrack]]&lt;br /&gt;
* [[Medusa]]&lt;br /&gt;
* [[ncrack]]&lt;br /&gt;
* [[ophcrack]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=249</id>
		<title>THC-Hydra</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=249"/>
		<updated>2023-09-24T13:22:02Z</updated>

		<summary type="html">&lt;p&gt;RagManX: /* More Information */ Add inline YouTube video for Network Chuck&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/vanhauser-thc/thc-hydra thc-hydra] is a modular, parallelized network logon cracking tool. It supports a great many networking protocols, such as POP3, FTP, SMTP, SMB, and SSH (v1 and v2), and is available on all major operating systems.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Password Cracker]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* A brief [https://www.cyberpunk.rs/password-cracker-thc-hydra introduction to thc-hydra], including basic installation and use examples from CyberPunk&lt;br /&gt;
* The Kali tools website has [https://www.kali.org/tools/hydra/ a short introduction to thc-hydra], including tool use examples and subtool (dpl4hydra, xhydra, hydra-wizard, and more) functions&lt;br /&gt;
* Automate the Planet gives us a [https://www.automatetheplanet.com/thc-hydra-password-cracking-by-examples/ thc-hydra examples write-up], including installation in brief for Windows&lt;br /&gt;
* Watch a [https://www.youtube.com/watch?v=z4_oqTZJqCo&amp;amp;pp=ygUJdGhjLWh5ZHJh video introduction to thc-hydra] from Network Chuck {{#ev:youtube|z4_oqTZJqCo|667x400}}&lt;br /&gt;
* Get a [https://www.bookofnetwork.com/hacking-tutorials/THC-Hydra step-by-step walkthrough of using the graphical tool xhydra] to brute-force an SSH login on a remote server&lt;br /&gt;
* [https://www.freecodecamp.org/news/how-to-use-hydra-pentesting-tutorial/ A practical tutorial to installing] and running thc-hydra on a Linux system from FreeCodeCamp&lt;br /&gt;
* Another guide to [https://kalilinuxtutorials.com/thc-hydra/ installing, running, and viewing output for thc-hydra] on Kali Linux Tutorials&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
[[File:XHydra GUI.png|alt=xHydra GUI|none|thumb|The xHydra GUI]]&lt;br /&gt;
[[File:Hydra Default Usage.png|alt=The thc-hydra main program usage/help output|none|thumb|The thc-hydra main program usage/help output.]]&lt;br /&gt;
[[File:Hydra Retrieve Default Password List.png|none|thumb]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[AirCrack-NG]]&lt;br /&gt;
* [[Cain and Abel]]&lt;br /&gt;
* HashCat&lt;br /&gt;
* [[Hash Suite]]&lt;br /&gt;
* [[John the Ripper]]&lt;br /&gt;
* [[L0phtcrack]]&lt;br /&gt;
* [[Medusa]]&lt;br /&gt;
* [[ncrack]]&lt;br /&gt;
* [[ophcrack]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
	<entry>
		<id>https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=248</id>
		<title>THC-Hydra</title>
		<link rel="alternate" type="text/html" href="https://securitytools.wiki/index.php?title=THC-Hydra&amp;diff=248"/>
		<updated>2023-09-24T13:20:28Z</updated>

		<summary type="html">&lt;p&gt;RagManX: Setup initial hydra details page. Add more information links, plus the new screenshots section for the tool&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Description ===&lt;br /&gt;
[https://github.com/vanhauser-thc/thc-hydra thc-hydra] is a modular, parallelized network logon cracking tool. It supports a great many networking protocols, such as POP3, FTP, SMTP, SMB, and SSH (v1 and v2), and is available on all major operating systems.&lt;br /&gt;
&lt;br /&gt;
=== Tool Type ===&lt;br /&gt;
&lt;br /&gt;
* [[Password Cracker]]&lt;br /&gt;
&lt;br /&gt;
=== More Information ===&lt;br /&gt;
&lt;br /&gt;
* A brief [https://www.cyberpunk.rs/password-cracker-thc-hydra introduction to thc-hydra], including basic installation and use examples from CyberPunk&lt;br /&gt;
* The Kali tools website has [https://www.kali.org/tools/hydra/ a short introduction to thc-hydra], including tool use examples and subtool (dpl4hydra, xhydra, hydra-wizard, and more) functions&lt;br /&gt;
* Automate the Planet gives us a [https://www.automatetheplanet.com/thc-hydra-password-cracking-by-examples/ thc-hydra examples write-up], including installation in brief for Windows&lt;br /&gt;
* Watch a [https://www.youtube.com/watch?v=z4_oqTZJqCo&amp;amp;pp=ygUJdGhjLWh5ZHJh video introduction to thc-hydra] from Network Chuck&lt;br /&gt;
* Get a [https://www.bookofnetwork.com/hacking-tutorials/THC-Hydra step-by-step walkthrough of using the graphical tool xhydra] to brute-force an SSH login on a remote server&lt;br /&gt;
* [https://www.freecodecamp.org/news/how-to-use-hydra-pentesting-tutorial/ A practical tutorial to installing] and running thc-hydra on a Linux system from FreeCodeCamp&lt;br /&gt;
* Another guide to [https://kalilinuxtutorials.com/thc-hydra/ installing, running, and viewing output for thc-hydra] on Kali Linux Tutorials&lt;br /&gt;
&lt;br /&gt;
=== Sample Use/Screenshots ===&lt;br /&gt;
[[File:XHydra GUI.png|alt=xHydra GUI|none|thumb|The xHydra GUI]]&lt;br /&gt;
[[File:Hydra Default Usage.png|alt=The thc-hydra main program usage/help output|none|thumb|The thc-hydra main program usage/help output.]]&lt;br /&gt;
[[File:Hydra Retrieve Default Password List.png|none|thumb]]&lt;br /&gt;
&lt;br /&gt;
=== Similar Tools ===&lt;br /&gt;
&lt;br /&gt;
* [[AirCrack-NG]]&lt;br /&gt;
* [[Cain and Abel]]&lt;br /&gt;
* HashCat&lt;br /&gt;
* [[Hash Suite]]&lt;br /&gt;
* [[John the Ripper]]&lt;br /&gt;
* [[L0phtcrack]]&lt;br /&gt;
* [[Medusa]]&lt;br /&gt;
* [[ncrack]]&lt;br /&gt;
* [[ophcrack]]&lt;/div&gt;</summary>
		<author><name>RagManX</name></author>
	</entry>
</feed>