Ralf Zimmermann SIEGNETZ.IT GmbH

Nützliche Tools

Hier eine Sammlung nützlicher Tools.

Tools

Zurück zum Seitenanfang | Aktualisiert am
Tool Beschreibung Link
ack ack is a tool like grep, optimized for programmers.
apachetop Apache top is a curses-based realtime utility to display information from a running copy of Apache.
Arachni Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.
bat A cat(1) clone with wings.
BeEF BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.
BloodHound BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a PowerShell ingestor. BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.
Borg Backup BorgBackup (short: Borg) is a deduplicating backup program. Optionally, it supports compression and authenticated encryption.
Browserstack Instant access to all real mobile and desktop browsers. Say goodbye to your lab of devices and virtual machines.
Browsersync Time-saving synchronised browser testing.
Bucket Finder This is a fairly simple tool to run, all it requires is a wordlist and it will go off and check each word to see if that bucket name exists in the Amazon's S3 system. Any that it finds it will check to see if the bucket is public, private or a redirect.
Burp Proxy Burp Proxy is an intercepting proxy server for security testing of web applications. It operates as a man-in-the-middle between your browser and the target application
curl curl is a command line tool for transferring data with URL syntax, supporting DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP.
Docker Docker is the world’s leading software containerization platform
dnsgen dnsgen is somewhat like Nominum's dnsperf utility, and indeed shares many of the same command line parameters.Unlike dnsperf, it uses AF_PACKET raw sockets and therefore only runs under Linux. The use of raw sockets allows for the use of a far larger range of source ports and higher performance than using "normal" UDP sockets. The data file is loaded completely into memory on start up so that disk I/O does not affect measurements. For optimal performance dnsgen supports a raw input file mode where the data file contains raw pre-compiled DNS queries.
dnstop console tool to analyze DNS traffic
dnstwist See what sort of trouble users can get in trying to type your domain name. Find similar-looking domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud and corporate espionage. Useful as an additional source of targeted threat intelligence.
fd A simple, fast and user-friendly alternative to find.
freeradius Fast, feature-rich, modular, and scalable RADIUS Server
fwlogwatch fwlogwatch produces ipchains, netfilter/iptables, ipfilter, Cisco IOS and Cisco PIX log summary reports in text and HTML form and has a lot of options to find and display relevant patterns in connection attempts. With the data found it can also generate customizable incident reports from a template and send them to abuse contacts at offending sites or CERT coordination centers. Finally, it can also run as daemon and report anomalies or start countermeasures.
gawk pattern scanning and processing language
getdnsapi getdns is a modern asynchronous DNS API. It implements DNS entry points from a design developed and vetted by application developers, in an API specification. The open source C implementation of getdns is developed and maintained in collaboration by NLnet Labs, Sinodun and No Mountain Software. This implementation is licensed under the New BSD License.
grep GNU grep, egrep and fgrep
grepcidr Filter IPv4 and IPv6 addresses matching CIDR patterns
gron Make JSON greppable!
hping Command-line oriented TCP/IP packet assembler/analyzer
htop interactive processes viewer
httpie HTTPie (pronounced aitch-tee-tee-pie) is a command line HTTP client. Its goal is to make CLI interaction with web services as human-friendly as possible. It provides a simple http command that allows for sending arbitrary HTTP requests using a simple and natural syntax, and displays colorized output. HTTPie can be used for testing, debugging, and generally interacting with HTTP servers.
httpscreenshot HTTPScreenshot is a tool for grabbing screenshots and HTML of large numbers of websites. The goal is for it to be both thorough and fast which can sometimes oppose each other.
idn2 Internationalized domain names (IDNA2008) command line tool
iftop displays bandwidth usage information on an network interface
ipcalc parameter calculator for IPv4 addresses
iproute networking and traffic control tools
iptstate top-like interface to your netfilter connection-tracking table
iptraf Interactive Colorful IP LAN Monitor
ipv6calc small utility for manipulating IPv6 addresses
Jenkins An extensible open source continuous integration server
jq jq is a lightweight and flexible command-line JSON processor.
Knock Subdomain Scan Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically if it is enabled. Now knockpy supports queries to VirusTotal subdomains, you can setting the API_KEY within the config.json file.
letsencrypt The Let’s Encrypt Client is a fully-featured, extensible client for the Let’s Encrypt CA (or any other CA that speaks the ACME protocol) that can automate the tasks of obtaining certificates and configuring webservers to use them.
logtail Print log file lines that have not been read
lsof Utility to list open files
masscan TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
mc Midnight Commander - a powerful file manager
Metasploit The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
mitmproxy An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed.
MonoDraw Powerful ASCII art editor
mtr Full screen ncurses and X11 traceroute tool
multitail view multiple logfiles windowed on console
mytop Mytop is a console-based tool for monitoring queries and the performance of MySQL. It supports version 3.22.x, 3.23.x, 4.x and 5.x servers. It's written in Perl and support connections using TCP/IP and UNIX sockets.
mutt text-based mailreader supporting MIME, GPG, PGP and threading
ncdu ncurses disk usage viewer
nedi NeDi discovers, maps and inventories your network devices and tracks connected endnodes.
nethogs Net top tool grouping bandwidth per process
Nessus Nessus is a proprietary comprehensive vulnerability scanner which is developed by Tenable Network Security. It is free of charge for personal use in a non-enterprise environment.
Netbeans Quickly and easily develop desktop, mobile and web applications with Java, JavaScript, HTML5, PHP, C/C++ and more.
ngrok ngrok allows you to expose a web server running on your local machine to the internet. Just tell ngrok what port your web server is listening on.
Nikto Nikto is a pluggable web server and CGI scanner written in Perl, using rfp's LibWhisker to perform fast security or informational checks.
nmon nmon is a systems administrator, tuner, benchmark tool. It can display the CPU, memory, network, disks (mini graphs or numbers), file systems, NFS, top processes, resources (Linux version & processors) and on Power micro-partition information.
nload realtime console network usage monitor
OpenVAS OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.
qsquery osquery is an operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. The tools make low-level operating system analytics and monitoring both performant and intuitive.
PHP CodeSniffer The most commonly used tool for static analysis of PHP code. It is typically used to detect violations of code formatting standards but also supports software metrics as well as the detection of potential defects.
PHP Metrics PhpMetrics provides various metrics about PHP projects.
prettyping prettyping is a wrapper around the standard ping tool, making the output prettier, more colorful, more compact, and easier to read.
pwgen Automatic Password generation
ripmime ripMIME's primary pupose is to extract attachments out of a MIME encoded email packages.
Retire.js There is a plethora of JavaScript libraries for use on the web and in node.js apps out there. This greatly simplifies, but we need to stay update on security fixes. "Using Components with Known Vulnerabilities" is now a part of the OWASP Top 10 and insecure libraries can pose a huge risk for your webapp. The goal of Retire.js is to help you detect use of version with known vulnerabilities.
rsync fast, versatile, remote (and local) file-copying tool
scapy Scapy is a Python program that enables the user to send, sniff and dissect and forge network packets. This capability allows construction of tools that can probe, scan or attack networks.
screen terminal multiplexer with VT100/ANSI terminal emulation
sed The GNU sed stream editor
selenium Selenium automates browsers. That's it!
sslscan SSLScan is a fast SSL port scanner. SSLScan connects to SSL ports and determines what ciphers are supported, which are the servers prefered ciphers, which SSL protocols are supported and returns the SSL certificate. Client certificates / private key can be configured and output is to text / XML.
sslScrape SSLScrape | A scanning tool for scaping hostnames from SSL certificates.
SonarQube The SonarQube platform offers numerous features to help you make your Continuous Inspection process a success.
SPARTA SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way. If little time is spent setting up commands and tools, more time can be spent focusing on analysing results.
speedtest-cli Command-line interface for https://speedtest.net bandwidth tests
stubby Stubby is an application that acts as a local DNS Privacy stub resolver (using DNS-over-TLS).
strace System call tracer
Suricata Suricata is a network Intrusion Detection System (IDS). It is based on rules (and is fully compatible with snort rules) to detect a variety of attacks / probes by searching packet content.
swaks SMTP command-line test tool
tcpdump command-line network traffic analyzer
testssl.sh Tool which checks for the support of TLS/SSL ciphers and flaws
tls-interposer The TLS Interposer for Linux provides an easy way to upgrade the security of existing SSL/TLS applications based on OpenSSL without having to recompile them or having to switch to newer versions with incompatible configuration or interfaces. TLS Interposer is directed at server applications, but nothing prevents you from using it with client applications.
Truffle Hog Searches through git repositories for secrets, digging deep into commit history and branches. This is effective at finding secrets accidentally committed.
tshark console version of wireshark
vim Vi IMproved - enhanced vi editor
w3af w3af is a Web Application Attack and Audit Framework which aims to identify and exploit all web application vulnerabilities.
wapiti Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scan the web pages of the deployed web applications, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
wget retrieves files from the web
whatweb WhatWeb identifies websites. It recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices.
whois intelligent WHOIS client
XCA - X Certificate and key management This application is intended for creating and managing X.509 certificates, certificate requests, RSA, DSA and EC private keys, Smartcards and CRLs. Everything that is needed for a CA is implemented. All CAs can sign sub-CAs recursively. These certificate chains are shown clearly. For an easy company-wide use there are customiseable templates that can be used for certificate or request generation. All crypto data is stored in an endian-agnostic file format portable across operating systems.
Xdebug Xdebug provides debugging and profiling capabilities for PHP
zmap ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 5 minutes, approaching the theoretical limit of ten gigabit Ethernet.
zaproxy An easy to use integrated penetration testing tool for finding vulnerablities in web applications.