HackTech
:: YOUR SOURCE FOR CYBER INTELLIGENCE ::
The Arsenal: Tools & Platforms
A complete redistribution of awesome-hacking tooling—each framework, image, and service placed into the operating domains where it excels. Authorization is mandatory before running any capability described below.
Featured Operating Environments
-
Debian-based distribution pre-loaded with hundreds of penetration-testing and forensics utilities. Use it as a portable red-team lab or baseline for capture-the-flag engagements.
-
Lightweight security-focused Linux that bundles privacy tooling, secure development stacks, and digital forensics suites for professionals who need a hardened daily driver.
-
Mobile Security Framework (MobSF) powers static and dynamic assessments across Android and iOS. Pair with rooted testing devices for lawful mobile application recon, malware triage, and wireless auditing.
System Exploitation Frameworks
-
Full-spectrum exploitation platform used to research vulnerabilities, validate detections, and automate post-exploitation workflows.
-
Essential Windows credential research toolkit providing Kerberos ticket manipulation, credential extraction, and more for authorized engagements.
-
Guided walk-through of staple offensive utilities—ideal for orienting junior analysts before they enter lab scenarios.
Reconnaissance & OSINT Utilities
-
Investigate Google accounts through public metadata from Gmail, Photos, Maps, and related services to build lawful intelligence profiles.
Docker Images for Penetration Testing & Security
-
docker pull kalilinux/kali-linux-docker
Official Kali Linux container delivering the entire toolkit on demand.
-
docker pull owasp/zap2docker-stable
Official OWASP ZAP build for automated web vulnerability scanning inside containers.
-
Launch WPScan instantly to audit WordPress deployments without local installs.
-
docker pull metasploitframework/metasploit-framework
Containerized Metasploit for transient lab or CI-based exploitation testing.
-
Spin up Damn Vulnerable Web Application (DVWA) to rehearse common web exploitation patterns.
-
docker pull wpscanteam/vulnerablewordpress
Intentionally exposed WordPress stack for plugin and theme security drills.
-
docker pull hmlio/vaas-cve-2014-6271
Shellshock proof-of-concept service for demonstrating environment-variable command injection.
-
docker pull hmlio/vaas-cve-2014-0160
Heartbleed lab container exposing vulnerable OpenSSL for TLS memory disclosure exercises.
-
docker pull opendns/security-ninjas
Cisco Security Ninjas curriculum packaged for rapid team enablement.
-
docker pull noncetonic/archlinux-pentest-lxde
Arch Linux pentest desktop complete with LXDE and common offensive utilities.
-
docker pull diogomonica/docker-bench-security
Docker Bench for Security automates CIS benchmark checks against container hosts.
-
docker pull ismisepaul/securityshepherd
Deploy OWASP Security Shepherd to train developers through progressive challenge tracks.
-
docker pull danmx/docker-owasp-webgoat
OWASP WebGoat packaged for quick lesson delivery on insecure coding practices.
-
docker pull vulnerables/web-owasp-nodegoat
NodeGoat intentionally vulnerable Node.js application for modern web exploitation training.
-
docker pull citizenstig/nowasp
OWASP Mutillidae II lab featuring OWASP Top Ten misconfigurations and vulns.
-
docker pull bkimminich/juice-shop
OWASP Juice Shop container for gamified web application security practice.
-
Alternative Metasploit image maintained for streamlined offensive pipelines.
Exploit & Vulnerability Archives
-
Rapid7's community-maintained exploit archive and repository of proof-of-concept vulnerable software.
Reverse Engineering Toolchain
Disassemblers & Debuggers
Multi-processor disassembler and debugger available for Windows, macOS, and Linux analysts.
32-bit assembler-level debugger favored for rapid Windows binary triage.
Open-source x86/x64 debugger with an extensible plugin architecture for Windows reversing.
Portable reversing framework providing disassembly, debugging, emulation, and scripting.
Interactive disassembler for x86/ARM/MIPS that generates readable pseudo-code.
Retargetable disassembler with IDAPython-compatible plugin API ideal for customization.
Lightweight multi-architecture disassembly engine embedding easily into pipelines.
NSA-developed suite providing disassembly, decompilation, scripting, and collaboration.
Decompilers
JVM-based Languages
High-fidelity Java bytecode decompiler handling Scala and Kotlin targets.
Classic GUI decompiler for inspecting Java classes quickly.
Robust Java decompiler particularly strong with modern language features.
Swing-based front-end for Procyon delivering searchable, colorized output.
Historic closed-source Java decompiler useful when matching legacy research.
Android-focused decompiler converting DEX and APK content into readable Java.
.NET Toolchain
Native Code
macOS/Linux disassembler and decompiler targeting 32/64-bit binaries.
Qt interface for radare2 combining graph view, debug, and decompiler modes.
LLVM-based open-source decompiler for PE and ELF binaries.
User-friendly native code decompiler producing C-like pseudocode.
Commercial decompiler plugin for IDA supporting multiple architectures.
Python
Decompiler for over twenty CPython releases, great for legacy bytecode recovery.
Deobfuscation Utilities
.NET deobfuscator and unpacker supporting many commercial protectors.
Prettify JavaScript, JSON, HTML, and CSS to aid manual analysis.
Statistical variable renaming service to recover semantics from obfuscated JS.
Reverse Engineering Helpers
Bridge JVM internals to a browser for interactive inspection.
Convert Android DEX files into Java class files for downstream tooling.
Comprehensive Android reverse engineering and malware analysis framework.
Anti-managed debugger/profiler utilities for .NET security research.
Pack and unpack executables with the Ultimate Packer for eXecutables.
Execution Logging & Tracing
Industry-standard packet analyzer for capturing and inspecting network conversations.
Command-line packet capture utility paired with the libpcap capture library.
Interactive man-in-the-middle proxy for inspecting and modifying HTTP/S traffic.
Cross-platform GUI proxy for viewing, rewinding, and exporting intercepted sessions.
Linux USB bus monitor capturing control, bulk, interrupt, and isochronous transfers.
Windows kernel driver and Wireshark plugin for USB traffic capture.
Recover in-memory structure layouts via dynamic instrumentation.
Shared library call tracer built on DynamoRIO for Windows and Linux.
Binary Analysis & Editing
Hex Editors
Fast hex editor for raw disk editing and RAM inspection.
Forensics-ready hex editor supporting data recovery and low-level processing.
Open-source hex editor optimized for huge files and disks.
Grammar-based binary parsers for decoding proprietary file formats.
Binary Utilities
Firmware analysis toolkit detecting signatures, extracting archives, and visualizing entropy.
Statistical visualization platform for binary blobs and encryption research.
DSL and IDE for describing binary formats and generating parsers.
Inspect and reverse-engineer Protocol Buffers payloads.
Executable diffing solution to compare patched and unpatched binaries.
Cross-platform database client handy when analyzing embedded data stores.
Modern replacement for Dependency Walker to map DLL relationships.
Inspect PE/COFF headers and sections within Windows executables.
Extract ASCII and Unicode strings from binaries for quick triage.
Malware Samples & References
Community-driven repository of malware samples for defensive research.
Web & Network Operations
Web Assessment Tools
OSINT search engine aggregating hosts, domains, SSL data, ports, and technologies.
Automate SQL injection discovery and database takeover with tamper scripts.
Enumerate and exploit NoSQL backends through injection and privilege abuse.
Browser-based base64/base85 encoders plus MD4/MD5/SHA1 hashing helpers.
Detect virtual host mappings, wildcard DNS, and aliasing for targeted pivoting.
Passive subdomain enumeration using curated data sources and transformations.
Hosted subdomain discovery service validating results across OSINT feeds.
Scriptable network authentication cracker tailored for custom attack flows.
Covert PHP-based C2 framework for maintaining footholds on compromised web servers.
Identify publicly exposed .git directories and extract sensitive artifacts.
Analyze Content Security Policies for bypasses, missing directives, and weaknesses.
Search engine for internet-connected devices, banner data, and exposed services.
Internet-scale port scanner capable of sweeping the IPv4 space rapidly.
Validate leaked credentials and API keys across SaaS providers.
Online decompiler supporting Java, Android, Python, and C# binaries.
Web Application Security References
Checklist and guidelines for securing Node.js services during code reviews.
Network Reconnaissance & Exploitation
Network forensic analysis tool extracting hosts, sessions, files, and credentials.
Java-based HTTP/HTTPS proxy for active web application vulnerability testing.
Linux packet crafting toolkit useful for fuzzing and replaying custom packets.
High-speed subdomain discovery service supporting recon-scale inventories.
Simple TCP/UDP protocol fuzzer for uncovering malformed input handling.
Investigate autonomous systems, associated CIDR blocks, and organizational metadata.
Integrated penetration testing proxy for mapping and attacking web applications.
Java-based man-in-the-middle SOCKS proxy capturing interactive sessions.
Intercept SSH/SFTP connections to log credentials and commands during authorized tests.
Swiss Army knife network scanner for host discovery, port mapping, and scripting.
802.11 suite for packet capture, WEP/WPA cracking, and wireless security assessments.
Route all host traffic through Tor to emulate anonymized adversary behavior.
Python hacking toolkit covering sniffing, spoofing, and discovery tasks.
Demonstrate Wi-Fi denial-of-service scenarios during controlled exercises.
Classic HTTP session hijacker to illustrate the need for TLS everywhere.
Powerful Python library for crafting, sending, and dissecting packets.
Enumerate attack surfaces via scraping, brute forcing, alterations, and reverse DNS sweeps.
Secure multithreaded packet sniffer with modern TLS handling.
Discover misconfigurations across the public internet using zgrab2 and supporting tools.
Lightning-fast port scanner that feeds discovered ports to nmap for deep enumeration.
Extensible TCP/UDP proxy with GUI and TLS support for traffic modification.
Digital Forensics & Cryptography
Digital Forensics Suites
GUI for The Sleuth Kit enabling timeline analysis, carving, and reporting.
Command-line forensics toolkit providing low-level disk and filesystem parsing.
Commercial investigative suite used for incident response and legal-grade evidence.
Inspect malicious web content, decode obfuscated scripts, and extract payloads.
Brazilian Federal Police digital evidence indexer and processor.
Collects critical forensic artifacts from Windows systems for rapid triage.
Ubuntu-based live environment bundling a comprehensive forensics toolkit.
Cryptography & Password Cracking Tools
Recover key size and plaintext from repeated-key XOR ciphertexts.
Password cracking powerhouse with extensive hash type support.
Use captured Wi-Fi packets to audit WEP and WPA-PSK network security.
AI-assisted automatic decryption engine for classic ciphers and encodings.
Post-Exploitation & Knowledge Bases
Post-Exploitation Frameworks
PowerShell and Python agent framework with flexible command and control.
IronPython-powered post-exploitation project bypassing constrained PowerShell environments.
PowerShell offensive security modules for reconnaissance, exploitation, and persistence.
Generate payloads keyed to environmental attributes to evade replay on other systems.
Hardware & Physical Assessment Gear
Portable wireless auditing platform with cloud management, payload ecosystem, and rich reporting.
Programmable keystroke injector demonstrating endpoint abuse from unattended workstations.
Network-enabled keylogging implant useful for illustrating physical access risks.
RFID/NFC research platform supporting sniffing, cloning, and emulation of badge technologies.
Open-source codebase powering Proxmark hardware deployments.
Multi-tool for pentesters featuring radio, RFID, infrared, and GPIO interfaces.
Security Knowledge Bases & Inventories
Community-ranked index of the top 125 network security tools.
Free course teaching security theory and defensive execution with full GitBook text.
Hands-on introduction to networking fundamentals and packet manipulation.
Rawsec's CyberSecurity Inventory
Open catalog of tools, operating systems, CTF platforms, and resources.
Open-source encyclopedia documenting cybersecurity concepts and tooling.