Pentest Toolbox is a comprehensive collection of popular open-source security tools, curated and maintained by the security community. It provides a centralized platform for accessing tools categorized by type, along with detailed information about each tool.
- Curated Tool List: A categorized list of popular open-source security tools, including tools for reverse engineering, web application security, network security, and more.
- Tool Information: Each tool includes a description, features, and links to further documentation or GitHub repositories.
- Community Maintained: The toolbox is maintained by the security community, ensuring that it stays up-to-date with the latest tools and techniques.
- Information Gathering: Tools for collecting data about targets, including reconnaissance and intelligence gathering.
- Vulnerability Analysis: Tools for identifying and analyzing vulnerabilities in systems and applications.
- Exploitation: Tools for exploiting identified vulnerabilities to gain unauthorized access.
- Post Exploitation: Tools for maintaining access and escalating privileges after initial exploitation.
- Reverse Engineering: Tools for analyzing and reverse-engineering software and hardware.
- Web Application: Tools for testing and securing web applications.
- Network Security: Tools for scanning and securing network infrastructure.
- Wireless Security: Tools for testing and securing wireless networks.
- Forensics: Tools for analyzing digital evidence and investigating cybercrimes.
- Malware Analysis: Tools for analyzing and understanding malware behavior.
- OSINT: Tools for gathering intelligence from open sources.
- Social Engineering: Tools for simulating social engineering attacks and training.
- Defensive: Tools for defending against cyber threats and securing systems.
- Offensive: Tools for simulating attacks and testing defenses.
If you have a tool you'd like to add, just head to the tools json data and add the tool following the convention