🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page

Index of Tools

Footprinting & Recon Tools :

  1. Nmap : Network Mapper Tool

  2. EmailTrackerPro

  3. Foca : Ultimate GUI based recon tools

  4. Maltego Commnity Edition

  5. dnsrecon

  6. GRecon

  7. Holehe

  8. Photon

  9. Sherlock

  10. Spiderfoot

  11. Tracert , Traceroute , Path Analyzer Pro

  12. Web Data Extractor : Spider crawler

  13. HTTrack : Website cloner

Network Scanning & Enumeration Tools :

  1. Wireshark

  2. Rustscan

  3. Sx-Tool

  4. Colasoft Packet Builder

  5. Angry IP Scanner & Advanced IP Scanner

  6. SuperEnum

  7. Global Network Inventory

  8. Active Directory Explorer (LDAP)

  9. NetBIOS Enumerator

  10. SMB Eagle

  11. SMTPWalk

Vulnerability Assessment Tools :

  1. Nessus Vulnerability Scanner

  2. OpenVAS Vulnerability Scanner - Open Source

  3. ZAProxy

System Hacking Tools :

  1. CrackMapExec

  2. Ncat

  3. Poverview

  4. Impacket

  5. Rubeus

  6. WinPEAS

  7. Immunity Debugger : Buffer Overflow tool

  8. Vulnserver

  9. Reverse Shell Generator

  10. Metasploit

  11. Hashcat

  12. Hydra

  13. JohnTheRipper

  14. Spyrix Spyware

  15. OpenStego

  16. Responder

Virus & Threats

  1. Swayz Cryptor

  2. Chaos Ransomware Builder

  3. HTTP Trojan

  4. NjRAT

  5. JPS Virus Maker

  6. Internet Worm Maker thing

  7. Malware Analysis Tools :

    1. Static Malware Analysis Tools

      1. CAPA

      2. Ghidra

      3. OllyDBG

      4. IDA Pro

      5. DIE

      6. PEid

      7. PE Studio

      8. PE extractor

    2. Dynamic Malware Analysis Tools :

      1. API Monitor

      2. DNS Query Sniffer

      3. FileSight Trial : File Monitoring Tool

      4. Mirekusoft Installation Monitor

      5. Currport

      6. TCP View

      7. Process Monitor

      8. Reg Organizor

      9. Autorun for windows

      10. WinPetrol

  8. File Backup & Imaging tools :

    1. Disk Genius

    2. dd : linux image

    3. R-Drive

Social Engineering Tools :

  1. Cain & ABEL

  2. XARP

  3. SMAC & TMAC

  4. Social Engineering toolkit

  5. Shellphish

  6. Darkphish

Denial of Service (DoS & DDoS) :

  1. LOIC : Low orbit ion cannon

  2. HOIC : High orbit ion cannon

  3. ISB : Iam So Board

  4. UltraDDoS

  5. EagleDDos.py

  6. AntiDDoS Guardian

  7. PyDDoS

  8. PyFlooder

  9. Honeypot & IDS :

    1. Snort

    2. Cowrie

    3. KFsensor

    4. HoneyBOT

  10. Firewalls (Open Source) :

    1. Sophos XG

    2. Pfsense

    3. Zone Alarm Free Firewall

Server , Session & Web Application exploitation tools :

  1. CAIDO

  2. Hetty

  3. HTTP Tunneling

    1. HTTP Host

    2. HTTP Port

  4. HTTP Recon

  5. SmartScanner

  6. Vega Vulnerability Scanner (Web Application)

  7. NStalker

  8. JWT Server

  9. SQL Injection Tools :

    1. DSSS

    2. Gauri

    3. SQL Map

Wireless & Mobile Application attacks :

  1. Aircrack-ng Cracking Suite

  2. Sparrow Wifi

  3. Microsoft Network Monitor

  4. RougeHost APD

  5. AndroRAT

  6. PhoneSploit Pro

  7. ADB

Cloud , IOT & OT Hacking tools :

  1. Bitwise IOT Simulator

  2. MicroSIP

  3. ICSim

  4. AADInternals

  5. Bucket-Flaws

  6. Cloudbrute

  7. Cloudfox

  8. Larys3-master

  9. S3Scanner

  10. Trivy

Cryptography Tools :

  1. Veracrypt

  2. Alphapeeler

  3. Cryptool

  4. Advanced Encryption Package

  5. BC Text Encoder

  6. Cryptoforage

  7. Rohos Disk Encryption

  8. HashCalc

  9. HashMyFiles

  10. MD5 Calculator

PreviousGhoul's DenNextIndex of Links

Last updated 4 months ago