ᏰᎧᎧᎷ
Loading...
~ Web
LinkDescription
CRT.shSubdomain Lookup via Certificate Transparency
WebhookSitePOST GET Request Listener
POSTMANPOST GET Request Listener
MS PortalsMicrosoft_ Administrator Sites, Training, and Licensing Resources
Google URLSGoogle Routes / Services
REQBINAPI Requester
GoLoginClean Browser for Configuring Clean Request
ShodanMass Online Device Scanner
DNS DumpsterDNS Records
WHOISWHOIS Lookup
10 Min Mail10 Min Email
Min MailTemp Email
Where GoesURL Tracer
Discord Account LookupDiscord Account Lookup
Domain GlassDNS Domain Lookup
SQL SandboxSQL Sandbox
ConvertJsonJSON to XML
Paste CPastebin
TermBinPastebin
PastebinPastebin
GhostPastePastebin
GhostBinPastebin
JWT.ioJSON Web Token Analyzer
Web Content TypesVariety of Different Web Content Types
Known APIKnown API Endpoints in Wild
User AgentsDifferent user Agent Types
GET POST PUT DELETEPlus Many More PLUS Status Codes {200, 400...}
Header InjectionsX-Forwarded-For and Such
Status CodesStatus Code Cheat Sheet
~ Forensics
LinkDescription
Any RunInteractive Online Malware Sandbox
Bazaar AbuseMalware Tracker
Virus TotalMalware Tracker
Aperi SolveImage Investigations
Meta Data 2 GoImage MetaData
Exif Tool OnlineImage MetaData
List for OSINT ToolsList for OSINT Tools
FlareThreat Intelligence
Data TrackerDocument Scraper
Site ReportSite Report
Way Back Time MachineInternet / Webpage Archives
File InfoCompressed File Types
WikiFile Signatures AKA Magic Bytes
Network InvestigationsNetwork Investigations
Rapid SaveReddit Video Download
Rocket ReachCompany Scraper
Thats ThemPhone Puller
Code BeautifyIP to Hex
IP ConvertIP Convert
String Length CalculatorString Length Calculator
ViperMonkeyVBA Emulation Engine with Docker
SNYK Code CheckerCheck Code for Known Vulnerabilities
JoesMalware Sandbox
~ Hashes / Passwords
LinkDescription
HashesDecrypt Hashes
Crack StationDecrypt Hashes
Hash CatHash Types for Cracking
DeHashedDe-Hash Passwords
Hash RulesMutation!
wlmWord List Manipulator
WordListMassive Collection of Wordlist
~ Decoding
LinkDescription
Decode FrCipher Identification
Cyber ChefMass Decoder
~ Cloud
LinkDescription
AWS EC2 LoginAWS EC2 Login
EC2 LogsEC2 Logs
Event HistoryEvent History
Cloaking FirewallCloaking Firewall
Public Bucket Data ScraperPublic Bucket Data Scraper
AWS Price CalcAWS Price Calc
CloudflareCloudflare Login
~ LLM's
LinkDescription
AI Voice MakerAI Voice Maker
ChatGPTChatGPT
Co-PilotCo-Pilot
Bard / GeminiBard / Gemini
Top 10 Exploits on LLMsTop 10 Exploits on LLMs
LLM InjectionsLLM Injections
QuilBotParaphrasing Tool
OpenAI PlatformOpenAI Platform
OpenAI API KeysOpenAI API Keys
Raw Image GeneratorJust Mofidy the URL Encoding to Bypass Limitations
~ BlockChain
LinkDescription
EtherScanCode/Contract Reader
EVM Bytecode DecompilerEVM Bytecode Decompiler
InfuraAPIs for Data Scraping
~ Networking
LinkDescription
Jodies CalculatorIP Range Finder
Hex Packet DecoderHex Packet Decoder
Online Port ScannerOnline Port Scanner
Online Port ScannerOnline Port Scanner
Online Port ScannerOnline Port Scanner
Nmap Cheat SheetNmap Cheat Sheet
Zone TransfersZone Transfers
Best IP TrackerBest IP Tracker
IPs Per Country TrackerIPs Per Country Tracker
Ports + ProtoProtocols and Networking Port Cheat Sheet
Ports + ProtoMassive List with Examples on How to Communicate With Desired Protos/Ports
Hping3NOT ICMP Host Discovery
tcpdumpCheat Sheet
~ Hack Tools
LinkDescription
Microsoft Graph APIPillaging of data from a Microsoft Entra ID (Azure AD) account
Hack Tricks TTYFull TTY Shells
NoPhishPhish ToolKit
ZPhisherANOTHER Phish Kit
RevShellsReverse Shell Generator
WpScanWordpress Exploit Scanner
XXS Filter EvasionXXS Filter Evasion
SQL InjectionsSQL Injections
Login BypassesLogin Bypasses
Attacking JSON Web TokensAttacking JSON Web Tokens
GTFOBinsPriv Esc Tactics
Hack Tricks LFILocal File Inclusion Attacks
Hack Tricks SSTIServer Side Template Injections
Hack Tricks Command InjectionsCommand Injections
Hack Tricks XSS InjectionsXSS Injections
Malicious PDF GeneratorMalicious PDF Generator
Macro Rev ShellsMacro Rev Shells
VBA Macro RevShellVBA Macro RevShell
List of Security ToolsList of Security Tools
List of Security ToolsList of Security Tools
GrabifyIP Grabber
PowerShell GalleryPowerShell Gallery
PowerShell ObfuscationThe "Bible"
CVE DetailsCVE Details
WebShellsWebShells
WebShell CollectionWebShell Collection
Exploit DBExploit DB for known exploits and details
Living off the Land BinariesStealthy System Enumeration and "living off the land" styles
PowerShell InjectionsPowerShell Injections
Google Dork Cheat SheetGoogle Dork Cheat Sheet
Default CredentialsDefault Credentials to Many Services
PayLoadsAllThingsMassive Amount of Pre-Configured Payloads
HavokPost Exploitation C2C Framework
VillianPost Exploitation C2C Framework + Multi Shell
ShellCode StormShell Code Injection Payload
Have I Been PWND?Email Checker / Data Leak Info
SMS BombersSoooo Many to Pick From!
Code CheatsMassive List of Cheats for Many Code Frameworks
AutoReconNetwork Reconnaissance Tool
BloodHoundCheat Sheet for Lookups
DystopiaBackdoor Generator "Our goal is to prove that anything can be a C2, if you want to :) "
~ RansomWare
LinkDescription
View RansomWare Chat LogsView RansomWare Chat Logs
RansomWare Attacks and GroupsRansomWare Attacks and Groups
Groups and StatusGroups and Status
Group Onion URLS.Group Onion URLS.
Ransom TrackerTracker and Data
Tracker RecentTracker Recent
Focused Group DataFocused Group Data
Free Decrypt ToolsFree Decrypt Tools for Ransom Malware
~ DarkWeb
LinkDescription
Ahmia Search EngineAhmia Search Engine
Torch Search EngineTorch Search Engine
HayStak Search EngineHayStak Search Engine
TOR Recorded LinksTOR Recorded Links
~ Reverse Engineering
LinkDescription
DogBoltOnline Decompile
PyLingualPyLingual Python Decompiler
Decompiler.comJava Decompiler
Online PythonRun Python Code
ProgramizRun Python Code
RetDecpen-source decompiler that can convert binary executables back into readable source code.
GhidraBinary Analyzer
Binary NinjaBinary Analyzer
IDA FreeFREE IDA
GEFGDB on Roids
PYDecompileDecompile PYC Files
~ Cryptography
LinkDescription
Decode RSARSA Factorization
AES EmojiAES Emojis
Decode BrainFuckEsoteric Programming Language
Decode MalbolgeEsoteric Programming Language
Decode COWEsoteric Programming Language
Cyber Chef AES Decrypt/EncryptAdvanced Encryption Standard
CTF Crypto ChallengesHTB Crypto Solves 50+
3 Can Keep A SecretHåstad's Broadcast Attack
Attacking RSANumerous Attack Vectors on RSA
~ Tunnels
LinkDescription
NgrokTunneling Service
ChiselReverse Proxy Tunnel
FRPFast Reverse Proxy
SSHSSH Tunnel
LocalExposenodejs Binding for LocalXpose
~ Reporting and Documentation
LinkDescription
Notepad ++Note Taking
ObsidianNote Taking + Canvas Documents
Cherry TreeNote Taking
GhostWriterPenTest Reporting
WriteHatPenTest Reporting
VECTRPenTest Reporting
~ Others
LinkDescription
OSCP Cheat SheetOSCP Cheat Sheet
Vulnerability Scoring SystemVulnerability Scoring System
Vulnerability Scoring CalcVulnerability Scoring Calc
MITRE ATTACKMITRE ATTACK
PTES Technical GuidelinesPTES Technical Guidelines
Online FlowChartsOnline FlowCharts
Mural CoTeam Working EnvironmentsCoTeam Working Environments
Heat Network MapHeat Network Map
ISC2ISC2
Gov Jobs"Where intelligence goes to work"
N8NProcess Flow Automation
LucidFlow Charts
LucidFlow Charts