Skip to content

Latest commit

 

History

History
104 lines (90 loc) · 12.2 KB

README.md

File metadata and controls

104 lines (90 loc) · 12.2 KB

Hacking Tools

🚀complete list of hacking tools🚀

Steganography

StegAnalysis - General screening tools Tools to run in the beginning. Allow you to get a broad idea of what you are dealing with.

Tool Description Command Example
file Check out what kind of file you have file stego.jpg
exiftool Check out metadata of media files exiftool stego.jpg
binwalk Check out if other files are embedded/appended binwalk -e stego.jpg
strings Check out if there are interesting readable characters in the file strings stego.jpg
foremost Carve out embedded/appended files foremost stego.jpg
pngcheck Get details on a PNG file (or find out is is actually something else) pngcheck stego.png
identify GraphicMagick tool to check what kind of image a file is. Checks also if image is corrupted. identify -verbose stego.jpg
ffmpeg ffmpeg can be used to check integrity of audio files and let it report infos and errors ffmpeg -v info -i stego.mp3 -f null - to recode the file and throw away the result
stegoVeritas Images (JPG, PNG, GIF, TIFF, BMP) A wide variety of simple and advanced checks. Check out stegoveritas.py -h. Checks metadata, creates many transformed images and saves them to a directory, Brute forces LSB, ...
zsteg Images (PNG, BMP) - Detects various LSB stego, also openstego and the Camouflage tool zsteg -a stego.jpg to run all checks
stegdetect Images (JPG) - Performs statistical tests to find if a stego tool was used (jsteg, outguess, jphide, ...). Check out man stegdetect for details. stegdetect stego.jpg
stegbreak Images (JPG) - Brute force cracker for JPG images. Claims it can crack outguess, jphide and jsteg. stegbreak -t o -f wordlist.txt stego.jpg, use -t o for outguess, -t p for jphide or -t j for jsteg
Steghide Images (JPG, BMP) and Audio (WAV, AU) - Versatile and mature tool to encrypt and hide data. steghide eextract -sf stego.jpg

SteganoGraphy - Tools creating stego Tools designed to detect steganography in files. Mostly perform statistical tests. They will reveal hidden messages only in simple cases. However, they may provide hints what to look for if they find interesting irregularities.

Tool File types Description How to hide How to recover
AudioStego Audio (MP3 / WAV) Details on how it works are in this blog post hideme cover.mp3 secret.txt && mv ./output.mp3 stego.mp3 hideme stego.mp3 -f && cat output.txt
jphide/jpseek Image (JPG) Pretty old tool from here. Here, the version from here is installed since the original one crashed all the time. It prompts for a passphrase interactively! jphide cover.jpg stego.jpg secret.txt jpseek stego.jpg output.txt
jsteg Image (JPG) LSB stego tool. Does not encrypt the message. jsteg hide cover.jpg secret.txt stego.jpg jsteg reveal cover.jpg output.txt
mp3stego Audio (MP3) Old program. Encrypts and then hides a message (3DES encryption!). Windows tool running in Wine. Requires WAV input (may throw errors for certain WAV files. what works for me is e.g.: ffmpeg -i audio.mp3 -flags bitexact audio.wav). Important: use absolute path only! mp3stego-encode -E secret.txt -P password /path/to/cover.wav /path/to/stego.mp3 mp3stego-decode -X -P password /path/to/stego.mp3 /path/to/out.pcm /path/to/out.txt
openstego Images (PNG) Various LSB stego algorithms (check out this blog). Still maintained. openstego embed -mf secret.txt -cf cover.png -p password -sf stego.png openstego extract -sf openstego.png -p abcd -xf output.txt (leave out -xf to create file with original name!)
outguess Images (JPG) Uses "redundant bits" to hide data. Comes in two versions: old=outguess-0.13 taken from here and new=outguess from the package repos. To recover, you must use the one used for hiding. outguess -k password -d secret.txt cover.jpg stego.jpg outguess -r -k password stego.jpg output.txt
spectrology Audio (WAV) Encodes an image in the spectrogram of an audio file. TODO Use GUI tool sonic-visualiser
stegano Images (PNG) Hides data with various (LSB-based) methods. Provides also some screening tools. stegano-lsb hide --input cover.jpg -f secret.txt -e UTF-8 --output stego.png or stegano-red hide --input cover.png -m "secret msg" --output stego.png or stegano-lsb-set hide --input cover.png -f secret.txt -e UTF-8 -g $GENERATOR --output stego.png for various generators (stegano-lsb-set list-generators) stegano-lsb reveal -i stego.png -e UTF-8 -o output.txt or stegano-red reveal -i stego.png or stegano-lsb-set reveal -i stego.png -e UTF-8 -g $GENERATOR -o output.txt
Steghide Images (JPG, BMP) and Audio (WAV, AU) Versatile and mature tool to encrypt and hide data. steghide embed -f -ef secret.txt -cf cover.jpg -p password -sf stego.jpg steghide extract -sf stego.jpg -p password -xf output.txt
cloackedpixel Images (PNG) LSB stego tool for images cloackedpixel hide cover.jpg secret.txt password creates cover.jpg-stego.png cloackedpixel extract cover.jpg-stego.png output.txt password
LSBSteg Images (PNG, BMP, ...) in uncompressed formats Simple LSB tools with very nice and readable Python code LSBSteg encode -i cover.png -o stego.png -f secret.txt LSBSteg decode -i stego.png -o output.txt
f5 Images (JPG) F5 Steganographic Algorithm with detailed info on the process f5 -t e -i cover.jpg -o stego.jpg -d 'secret message' f5 -t x -i stego.jpg 1> output.txt
stegpy Images (PNG, GIF, BMP, WebP) and Audio (WAV) Simple steganography program based on the LSB method stegpy secret.jpg cover.png stegpy _cover.png

WebApp Pentesting

1. Reconnaissance 2. Scanning/Enumeration WebApp Proxies
1/2 Dir Fuzzing 1/2 Tools Burpsuite - Burpsuite is a graphical tool for testing Web application security
Dirbuster [wpscan] ZAP One of the world’s most popular free security tools (https://github.com/wpscanteam/wpscan) (for WordPress)
FeroxBuster (Brute force directories on a web server) nmap (open ports) Mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
wfuzz Nikto Proxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
2/2 Online tools testssl.sh
whois.domaintools.com 2/2 Online tools
reverseip.domaintools.com (web-based reverse DNS lookup) ipaddressguide.com/cidr
searchdns.netcraft.com (web-based DNS lookup) calculator.net/ip-subnet-calculator.html
search.censys.io (domain lookup) speedguide.net/ports.php
crt.sh (certificate fingerprinting) securityheaders.com
commoncrawl.org (web crawl dumps) csp-evaluator.withgoogle.com (Content Security Policy evaluator)
opendata.rapid7.com (scan dumps)
virustotal.com (malware database lookup)
isithacked.com
haveibeenpwned.com
hackedlist.io
intelx.io (database breaches)
search.wikileaks.org
archive.org (wayback machine)
pgp.circl.lu (OpenPGP key server)
shodan.io (IoT search engine)

Cryptography

Binary Exploitation

Reverse Engineering

Password Cracking

Identify Hash

Tool Description Command Example
hash-identifier Software to identify the different types of hashes used to encrypt data and especially passwords. hash-identifier
name-that-hash Have you ever come across a hash such as 5f4dcc3b5aa765d61d8327deb882cf99 and wondered what type of hash that is? 🤔...Name-that-hash will name that hash type! nth --help

Useful Websites

Cracking Tools

Tool Description Command Example
hashcat world's fastest and most advanced password recovery utility MD5 hashes: hashcat -m 0 -a 3 --session=cracking --force --status -O -o hashcat_results.txt hashes.txt NTLMv1 hashes: hashcat -m 5500 -a 3 --session=cracking --force --status -O -o hashcat_results.txt hashes.txt
JohnTheRipper Its primary purpose is to detect weak Unix passwords. john --wordlist=/usr/share/wordlists/rockyou.txt --format=raw-sha1 crack.txt
WiFi Cracking The tool first will display a list of WiFi networks near to you (by utilizing pywifi python library) after choosing targeted wifi and insert a dictionary brute force file it will look for the password and once the cracking was successfully it will show the password.