🚀complete list of hacking tools🚀
- Steganography
- WebApp Pentesting
- Cryptography
- Binary Exploitation
- Reverse Engineering
- Password Cracking
StegAnalysis - General screening tools Tools to run in the beginning. Allow you to get a broad idea of what you are dealing with.
Tool | Description | Command Example |
---|---|---|
file | Check out what kind of file you have | file stego.jpg |
exiftool | Check out metadata of media files | exiftool stego.jpg |
binwalk | Check out if other files are embedded/appended | binwalk -e stego.jpg |
strings | Check out if there are interesting readable characters in the file | strings stego.jpg |
foremost | Carve out embedded/appended files | foremost stego.jpg |
pngcheck | Get details on a PNG file (or find out is is actually something else) | pngcheck stego.png |
identify | GraphicMagick tool to check what kind of image a file is. Checks also if image is corrupted. | identify -verbose stego.jpg |
ffmpeg | ffmpeg can be used to check integrity of audio files and let it report infos and errors | ffmpeg -v info -i stego.mp3 -f null - to recode the file and throw away the result |
stegoVeritas | Images (JPG, PNG, GIF, TIFF, BMP) | A wide variety of simple and advanced checks. Check out stegoveritas.py -h . Checks metadata, creates many transformed images and saves them to a directory, Brute forces LSB, ... |
zsteg | Images (PNG, BMP) - Detects various LSB stego, also openstego and the Camouflage tool | zsteg -a stego.jpg to run all checks |
stegdetect | Images (JPG) - Performs statistical tests to find if a stego tool was used (jsteg, outguess, jphide, ...). Check out man stegdetect for details. |
stegdetect stego.jpg |
stegbreak | Images (JPG) - Brute force cracker for JPG images. Claims it can crack outguess , jphide and jsteg . |
stegbreak -t o -f wordlist.txt stego.jpg , use -t o for outguess, -t p for jphide or -t j for jsteg |
Steghide | Images (JPG, BMP) and Audio (WAV, AU) - Versatile and mature tool to encrypt and hide data. | steghide eextract -sf stego.jpg |
SteganoGraphy - Tools creating stego Tools designed to detect steganography in files. Mostly perform statistical tests. They will reveal hidden messages only in simple cases. However, they may provide hints what to look for if they find interesting irregularities.
Tool | File types | Description | How to hide | How to recover |
---|---|---|---|---|
AudioStego | Audio (MP3 / WAV) | Details on how it works are in this blog post | hideme cover.mp3 secret.txt && mv ./output.mp3 stego.mp3 |
hideme stego.mp3 -f && cat output.txt |
jphide/jpseek | Image (JPG) | Pretty old tool from here. Here, the version from here is installed since the original one crashed all the time. It prompts for a passphrase interactively! | jphide cover.jpg stego.jpg secret.txt |
jpseek stego.jpg output.txt |
jsteg | Image (JPG) | LSB stego tool. Does not encrypt the message. | jsteg hide cover.jpg secret.txt stego.jpg |
jsteg reveal cover.jpg output.txt |
mp3stego | Audio (MP3) | Old program. Encrypts and then hides a message (3DES encryption!). Windows tool running in Wine. Requires WAV input (may throw errors for certain WAV files. what works for me is e.g.: ffmpeg -i audio.mp3 -flags bitexact audio.wav ). Important: use absolute path only! |
mp3stego-encode -E secret.txt -P password /path/to/cover.wav /path/to/stego.mp3 |
mp3stego-decode -X -P password /path/to/stego.mp3 /path/to/out.pcm /path/to/out.txt |
openstego | Images (PNG) | Various LSB stego algorithms (check out this blog). Still maintained. | openstego embed -mf secret.txt -cf cover.png -p password -sf stego.png |
openstego extract -sf openstego.png -p abcd -xf output.txt (leave out -xf to create file with original name!) |
outguess | Images (JPG) | Uses "redundant bits" to hide data. Comes in two versions: old=outguess-0.13 taken from here and new=outguess from the package repos. To recover, you must use the one used for hiding. |
outguess -k password -d secret.txt cover.jpg stego.jpg |
outguess -r -k password stego.jpg output.txt |
spectrology | Audio (WAV) | Encodes an image in the spectrogram of an audio file. | TODO |
Use GUI tool sonic-visualiser |
stegano | Images (PNG) | Hides data with various (LSB-based) methods. Provides also some screening tools. | stegano-lsb hide --input cover.jpg -f secret.txt -e UTF-8 --output stego.png or stegano-red hide --input cover.png -m "secret msg" --output stego.png or stegano-lsb-set hide --input cover.png -f secret.txt -e UTF-8 -g $GENERATOR --output stego.png for various generators (stegano-lsb-set list-generators ) |
stegano-lsb reveal -i stego.png -e UTF-8 -o output.txt or stegano-red reveal -i stego.png or stegano-lsb-set reveal -i stego.png -e UTF-8 -g $GENERATOR -o output.txt |
Steghide | Images (JPG, BMP) and Audio (WAV, AU) | Versatile and mature tool to encrypt and hide data. | steghide embed -f -ef secret.txt -cf cover.jpg -p password -sf stego.jpg |
steghide extract -sf stego.jpg -p password -xf output.txt |
cloackedpixel | Images (PNG) | LSB stego tool for images | cloackedpixel hide cover.jpg secret.txt password creates cover.jpg-stego.png |
cloackedpixel extract cover.jpg-stego.png output.txt password |
LSBSteg | Images (PNG, BMP, ...) in uncompressed formats | Simple LSB tools with very nice and readable Python code | LSBSteg encode -i cover.png -o stego.png -f secret.txt |
LSBSteg decode -i stego.png -o output.txt |
f5 | Images (JPG) | F5 Steganographic Algorithm with detailed info on the process | f5 -t e -i cover.jpg -o stego.jpg -d 'secret message' |
f5 -t x -i stego.jpg 1> output.txt |
stegpy | Images (PNG, GIF, BMP, WebP) and Audio (WAV) | Simple steganography program based on the LSB method | stegpy secret.jpg cover.png |
stegpy _cover.png |
1. Reconnaissance | 2. Scanning/Enumeration | WebApp Proxies |
---|---|---|
1/2 Dir Fuzzing | 1/2 Tools | Burpsuite - Burpsuite is a graphical tool for testing Web application security |
Dirbuster | [wpscan] | ZAP One of the world’s most popular free security tools |
FeroxBuster (Brute force directories on a web server) | nmap (open ports) | Mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. |
wfuzz | Nikto | Proxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go. |
2/2 Online tools | testssl.sh | |
whois.domaintools.com | 2/2 Online tools | |
reverseip.domaintools.com (web-based reverse DNS lookup) | ipaddressguide.com/cidr | |
searchdns.netcraft.com (web-based DNS lookup) | calculator.net/ip-subnet-calculator.html | |
search.censys.io (domain lookup) | speedguide.net/ports.php | |
crt.sh (certificate fingerprinting) | securityheaders.com | |
commoncrawl.org (web crawl dumps) | csp-evaluator.withgoogle.com (Content Security Policy evaluator) | |
opendata.rapid7.com (scan dumps) | ||
virustotal.com (malware database lookup) | ||
isithacked.com | ||
haveibeenpwned.com | ||
hackedlist.io | ||
intelx.io (database breaches) | ||
search.wikileaks.org | ||
archive.org (wayback machine) | ||
pgp.circl.lu (OpenPGP key server) | ||
shodan.io (IoT search engine) |
Tool | Description | Command Example |
---|---|---|
hash-identifier | Software to identify the different types of hashes used to encrypt data and especially passwords. | hash-identifier |
name-that-hash | Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? 🤔...Name-that-hash will name that hash type! |
nth --help |
- gchq.github.io/CyberChef
- onlinehashcrack.com
- hashkiller.io/listmanager (has many other tools)
- hashes.com/en/decrypt/hash (has many other tools)
- crackstation.net
- weakpass.com/wordlist (lots of password dumps)
- packetstormsecurity.com/Crackers/wordlists
Tool | Description | Command Example |
---|---|---|
hashcat | world's fastest and most advanced password recovery utility | MD5 hashes: hashcat -m 0 -a 3 --session=cracking --force --status -O -o hashcat_results.txt hashes.txt NTLMv1 hashes: hashcat -m 5500 -a 3 --session=cracking --force --status -O -o hashcat_results.txt hashes.txt |
JohnTheRipper | Its primary purpose is to detect weak Unix passwords. | john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-sha1 crack.txt |
WiFi Cracking | The tool first will display a list of WiFi networks near to you (by utilizing pywifi python library) after choosing targeted wifi and insert a dictionary brute force file it will look for the password and once the cracking was successfully it will show the password. |