Full width home advertisement

Learn How to Hack

Free Hacking Resources

Post Page Advertisement [Top]

Top 15 Tools / software for Penetration Tester and Bug Bounty


Are you looking for the best tools and software to start with bug bounty or vulnerability assessment? We have you obtained the best penetration tools for you. 


Penetration testing tools are software applications used to check for vulnerability and bugs in any web application. 


Every tool or software on this rundown gives special advantages. It will help you to decide if it is the correct decision for your web application or not.


Top Penetration Testing Software & Tools


Wapiti (BlackBox Testing)

Wapiti allows you to audit the security of your websites or web applications.


It performs "black-box" scans (it does not study the source code) of the web application by crawling the webpages of the deployed web app, looking for scripts and forms where it can inject data.

Once it gets the list of URLs, forms, and their inputs, Wapiti acts like a 


Wapiti can detect the following vulnerabilities :

  • File disclosure (Local and remote include/require, fopen, readfile...)
  • Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
  • XSS (Cross-Site Scripting) injection (reflected and permanent)
  • Command Execution detection (eval(), system(), passtru()...)
  • CRLF Injection (HTTP Response Splitting, session fixation...)
  • XXE (XML External Entity) injection
  • SSRF (Server Side Request Forgery)
  • Use of know potentially dangerous files (thanks to the Nikto database)
  • Weak .htaccess configurations that can be bypassed
  • Presence of backup files giving sensitive information (source code disclosure)
  • Shellshock (aka Bash bug)
  • Open Redirects
  • Uncommon HTTP methods that can be allowed (PUT)


Download



Arachni

Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications.


It is free, with its source code public, and available for review.

It is multi-platform, supporting all major operating systems (MS Windows, Mac OS X, and Linux) and distributed via portable packages that allow for instant deployment.


It is versatile enough to cover a lot of use cases, ranging from a simple command-line scanner utility to a global high-performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. In addition, its simple REST API makes integration a cinch.


Finally, due to its integrated browser environment, it can support highly complicated web applications that make heavy use of technologies such as JavaScript, HTML5, DOM manipulation, and AJAX.


Download



Otseca

The main assumption of creating this tool was 

For whom

Otseca

  1. It is useful for:
  2. system administrators
  3. security researchers
  4. security professionals
  5. pentester
  6. hackers


Download



Metasploit

Metasploit is an exploitation and vulnerability validation tool that helps you divide the penetration testing workflow into manageable sections. 


Metasploit


The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is owned by Boston, Massachusetts-based security company Rapid7


Download




Sherlock

With Sherlock, we can instantly hunt down social media accounts created with a unique screen name on many online platforms simultaneously. From a single clue like an email address or screen name, Sherlock can grow what we know about a target piece by piece as we learn about their activity on the internet.

Download



SQLMap

sqlmap is an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.

Download



OWASP ZAP Zed Attack Proxy

OWASP ZAP is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers. It is one of the most active Open Web Application Security Project projects and has been given Flagship status.


Download



ZWFuzz 

Wfuzz is a tool designed for brute-forcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP, etc), bruteforce Forms parameters (User/Password), Fuzzing, etc.

Download



WebScarab

WebScarab is designed to be a tool for anyone who needs to expose the workings of an HTTP(S) based application, whether to allow the developer to debug otherwise difficult problems, or to allow a security specialist to identify vulnerabilities in the way that the application has been designed or implemented.

Download



GoLismero

GoLismero is an open-source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans.

The most interesting features of the framework are:

  • Real platform independence. Tested on Windows, Linux, *BSD, and OS X.
  • No native library dependencies. All of the frameworks have been written in pure Python.
  • Good performance when compared with other frameworks written in Python and other scripting languages.
  • Very easy to use.
  • Plugin development is extremely simple.
  • The framework also collects and unifies the results of well-known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...
  • Integration with standards: CWE, CVE, and OWASP.
  • Designed for cluster deployment in mind (not available yet).


Download



OpenVAS

OpenVAS is a full-featured vulnerability scanner. Its capabilities include unauthenticated testing, authenticated testing, various high level and low-level Internet and industrial protocols, performance tuning for large-scale scans, and a powerful internal programming language to implement any type of vulnerability test.

The scanner is accompanied by vulnerability tests feed with a long history and daily updates. This 

Download



Maltego

Maltego is software used for open-source intelligence and forensics, developed by Paterva. Maltego focuses on providing a library of transforms for discovery of data from open sources and visualizing that information in a graph format, suitable for link analysis and data mining.

Download



Nikto2

Nikto is an Open Source (GPL


It also checks for server configuration items such as the presence of multiple index files, HTTP server options, and will attempt to identify installed web servers and software. Scan items and plugins are frequently updated and can be automatically updated.

Download



NMAP

Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.

Download



Amass

The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

Download



Burp Suite

Burp Suite is a leading range of cybersecurity tools, brought to you by PortSwigger. We believe in giving our users a competitive advantage through superior research.


Each new edition of Burp Suite shares a common ancestor. The DNA running through our family tree represents decades of excellence in research. As the industry has shown time and time again, Burp Suite is the tool you can trust with your online security.

Download





References:

Wikipedia

All respective tools pages


No comments:

Post a Comment

Bottom Ad [Post Page]