Web Analytics

PentestingEverything

⭐ 1435 stars Indonesian by m14r41

Yang Akan Datang:

🌐 Bahasa

Daftar Isi

| No. | Jenis Pentesting | No. | Nama Direktori | | --- | ------------------------------------------------------------------------------------------------------------------------------ | --- | ------------------------------------------------------------------------------------------------------------------- | | 1 | Keamanan Aplikasi Web | 11 | Keamanan Active Directory | | 2 | Keamanan API | 12 | Keamanan Infrastruktur | | 3 | Keamanan Aplikasi Mobile | 13 | Threat Modeling | | 4 | Keamanan Aplikasi Thick Client | 14 | Keamanan IoT | | 5 | Tinjauan Kode Sumber | 15 | OSINT (Open Source Intelligence) | | 6 | Keamanan Jaringan | 16 | Keamanan Blockchain | | 7 | Keamanan Wi-Fi | 17 | Keamanan Pipeline CI/CD | | 8 | Keamanan Cloud | 18 | Keamanan Docker Container | | 9 | DevSecOps | 19 | Phishing Penetration Testing | | 10 | Tinjauan Konfigurasi | 20 | Analisis Forensik |


| No. | Jenis Pentesting | Deskripsi | | --- | ------------------------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------ | | 1 | Keamanan Aplikasi Web | Menilai dan mengamankan aplikasi web dari kerentanan. | | 2 | Keamanan API | Menguji dan meningkatkan keamanan API dan mikroservis. | | 3 | Keamanan Aplikasi Mobile | Mengevaluasi keamanan aplikasi dan perangkat mobile. | | 4 | Keamanan Aplikasi Thick Client | Menilai aplikasi thick client untuk isu keamanan. | | 5 | Tinjauan Kode Sumber | Menganalisis kode sumber untuk mengidentifikasi dan memperbaiki kerentanan. | | 6 | Keamanan Jaringan | Mengamankan jaringan dengan mengidentifikasi dan menanggulangi kelemahan. | | 7 | Keamanan Jaringan Wi-Fi | Mengevaluasi keamanan jaringan dan access point Wi-Fi. | | 8 | Keamanan Cloud | Menilai keamanan sistem dan layanan berbasis cloud. | | 9 | Keamanan Active Directory | Mengevaluasi keamanan lingkungan Active Directory. | | 10 | Keamanan Infrastruktur | Mengamankan infrastruktur TI dan aset yang mendasari. | | 11 | Threat Modeling | Memodelkan dan menilai ancaman untuk meningkatkan keamanan sistem. | | 12 | Keamanan IoT | Mengidentifikasi dan mengatasi kerentanan pada perangkat IoT. | | 13 | OSINT (Open Source Intelligence) | Mengumpulkan intelijen dari sumber terbuka untuk analisis keamanan. | | 14 | Keamanan Blockchain | Menilai sistem blockchain untuk keamanan dan kepatuhan. | | 15 | Keamanan Pipeline CI/CD | Mengevaluasi keamanan pipeline integrasi berkelanjutan. | | 16 | Keamanan Docker Container | Mengamankan Docker container dan aplikasi yang dikontainerisasi. | | 17 | DevSecOps | Mengintegrasikan praktik keamanan sepanjang siklus DevOps. | | 18 | Phishing Penetration Testing | Mensimulasikan dan menganalisis serangan phishing untuk pelatihan kesadaran. | | 19 | Tinjauan Konfigurasi | Memeriksa dan memverifikasi konfigurasi sistem untuk masalah keamanan. | | 20 | Analisis Forensik | Menyelidiki dan menganalisis bukti digital pasca insiden. |


🛡️ Pengujian Penetrasi & Alat 🛡️

40+ Jenis Alat Penilaian Keamanan


Pengujian Penetrasi dan Alat

| Kategori | Alat | | -------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Pengujian Aplikasi Web | Acunetix, Burp Suite Professional, Dirb, FFUF, Nmap, Nikto, Nuclei, OWASP ZAP, SQLMap, WhatWeb, WPScan, Invicti (Netsparker), Fortify WebInspect | | Keamanan Android | adb, APKTool, Apkscan, AndroBugs, Android Studio / Genymotion, AppMon, Dexter/Objection (Objection), Drozer, Frida, Magisk, MITMProxy, MobSF, Quark Engine, JADX | | Keamanan iOS | checkra1n, Class-dump, Frida, iMazing, iOS-decrypt, iOS-Hook, MobSF, Needle, Objection, Palera1n, Passionfruit, SSL Kill Switch 2, Cycript | | Pengujian API | Burp Suite Professional, GraphQL Raider, GraphQL Voyager, Insomnia, Kite Runner, Postman, Swagger UI | | Tinjauan Kode Aman | Bandit, Checkmarx, CodeQL, FindSecBugs, Gitleaks, Semgrep, SonarQube, Snyk, Veracode, Fortify Static (Workbench/Audit) | | Keamanan Thick-Client | Burp Suite Professional, dnSpy, de4dot, Fiddler, Ghidra, IDA Pro, OllyDbg, Process Explorer, x64dbg, CFF Explorer, Sysinternals Suite, Wireshark | | Pengujian Jaringan | Bettercap, CrackMapExec, Metasploit, Netcat, Nessus, Nmap, OpenVAS, Responder, Wireshark |

Versi Diperluas

| Kategori | Alat | | --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Pengujian Active Directory | BloodHound, Mimikatz, CrackMapExec, Impacket, Kerbrute, Rubeus, LDAPDomainDump, SharpHound, PowerView, ADRecon | | Keamanan Cloud | Prowler, ScoutSuite, CloudSploit, Pacu, Steampipe, CloudMapper, NCC Scout, kube-bench, Terrascan, KICS | | Keamanan IoT | Firmwalker, Binwalk, Firmware-Mod-Kit, Shodan, RIOT, JTAGulator, Qiling, Ghidra, Avatar2, Firmadyne | | Pengujian Firewall | hping3, NPing, Scapy, Zmap, firewalk, FTester, Nmap (Firewall Bypass), Packet Sender, T50, Ettercap, TCPReplay | | Analisis Firmware | Binwalk, Firmware Analysis Toolkit (FAT), QEMU, Ghidra, IDA Pro, Firmware-Mod-Kit, Radare2, Firmadyne | | Keamanan Kontainer | Trivy, Aqua Microscanner, Clair, Anchore, Docker Bench, kube-hunter, Falco, Sysdig, Snyk, Grype | | Pengujian WiFi | Aircrack-ng, Kismet, Bettercap, Reaver, Fluxion, Wireshark, hcxtools, Fern WiFi Cracker, Wifiphisher, Hashcat | | DevSecOps | GitHub Advanced Security, Trivy, Snyk, Anchore, OWASP Dependency-Check, Jenkins, Checkmarx, Veracode, Dagda, Sysdig Secure, Cloud Custodian, Bridgecrew, Kubescape | | OSINT | theHarvester, Maltego, SpiderFoot, Recon-ng, Shodan, FOCA, Google Dorks, OSINT Framework, GHunt, Sherlock, PhoneInfoga | | Tinjauan Konfigurasi | Lynis, OpenSCAP, Auditd, Tripwire, cis-cat Pro, Chef InSpec, Prowler, Kubescape | | Simulasi Phishing | GoPhish, SET, Evilginx2, Phishery, King Phisher, Modlishka, Phishing Frenzy |

| Forensik | Autopsy, Volatility, Sleuth Kit, FTK Imager, Redline, Magnet AXIOM, X-Ways, Bulk Extractor, ExifTool | | Keamanan Blockchain | Mythril, Slither, Manticore, Remix IDE, Oyente, SmartCheck, Echidna, Tenderly | | Pemodelan Ancaman | Microsoft TMT, OWASP Threat Dragon, IriusRisk, SeaSponge, Draw.io, Pytm | | Alat Tim Merah | Cobalt Strike, Sliver, Mythic, Empire, Metasploit, Brute Ratel, Koadic, FudgeC2, Nishang, PowerShell Empire | | Alat Tim Biru | Velociraptor, Wazuh, OSQuery, GRR, Sysmon, CrowdStrike Falcon, Elastic Security, Sigma Rules | | SIEM & Analisis Log | Splunk, ELK Stack, Graylog, Wazuh, AlienVault OSSIM, SIEMonster, Logstash, Fluentd, Loki, Falco, Humio, Kibana, Loggly, Logz.io | | Peretasan Kata Sandi | Hashcat, John the Ripper, Hydra, CrackStation, Cain & Abel, Medusa, THC-Hydra | | Rekayasa Balik | Ghidra, IDA Pro, x64dbg, OllyDbg, Binary Ninja, Radare2, Cutter | | Peretasan Perangkat Keras | ChipWhisperer, Saleae Logic, OpenOCD, JTAGulator, Bus Pirate, Flashrom, Arduino, Raspberry Pi, RTL-SDR | | Rekayasa Sosial | SET, BeEF, King Phisher, Evilginx / Evilginx2, Modlishka, EyeWitness, PhishToolkit, PhishX, Kerangka Psikologi (Pretexting, Elicitation) | | Keamanan SCADA/ICS | Snort, Wireshark, ModScan, ModbusPal, Scadafence, OpenPLC, GasPot, Conpot, PLCScan | | Keamanan Rantai Pasok | Snyk, OWASP Dependency-Check, Trivy, Syft, Grype, CycloneDX, Whitesource, Anchore Engine | | Pengujian Keamanan Email | GoPhish, Modlishka, SMTPTester, MailSniper, Evilginx2, Phish5, Email Header Analyzer | | Analisis Malware Seluler | APKTool, MobSF, Jadx, Frida, VirusTotal Mobile, Droidbox, Bytecode Viewer, Drozer, Quark-Engine | | Keamanan AI/ML | Adversarial Robustness Toolbox (ART), TextAttack, Foolbox, IBM AI Explainability 360, CleverHans, Alibi Detect, SecML, DeepExploit | | Otomasi Keamanan / SOAR | StackStorm, Cortex XSOAR, Shuffle, DFIR-IR-Playbook, Phantom Cyber, Tines | | Perangkat Bug Bounty | Amass, Sublist3r, Nuclei, HTTPX, Naabu, FFUF, GF, Dalfox, Kiterunner, Hakrawler, JSParser, ParamSpider | | Dump & Crack Kredensial | LaZagne, Mimikatz, Hashcat, John the Ripper, Windows Credential Editor, CrackMapExec, GetNPUsers.py | | Pembuatan Payload | MSFVenom, Unicorn, Shellter, Veil, Nishang, Empire, Obfuscation.io, Metasploit, Donut | | Honeypot / Penipuan | Cowrie, Dionaea, Kippo, Honeyd, T-Pot, Conpot, Canarytokens, Artillery | | Keamanan MacOS | KnockKnock, BlockBlock, OSXCollector, Objective-See Suite, MacMonitor, Little Snitch, Dylib Hijack Scanner | | Post-Exploitation Windows | PowerView, Seatbelt, SharpUp, WinPEAS, Sherlock, Empire, FireEye Red Team Tools, SharpHound | | Post-Exploitation Linux | LinPEAS, Linux Exploit Suggester, pspy, Chkrootkit, rkhunter, bashark, GTFOBins, Sudomy | | Pengujian Keamanan Browser | BeEF, XSStrike, XSSer, Burp Collaborator, NoScript, uBlock Origin, Chrome Developer Tools |


👨‍💻👩‍💻 Kontributor ✨👨‍💻👩‍💻

>Saya sangat menghargai minat Anda untuk berkontribusi! Silakan baca Panduan Kontribusi.

>Terima kasih sebesar-besarnya kepada individu luar biasa atas kontribusinya pada proyek ini. Anda dapat melihat emoji key untuk melihat berbagai cara Anda dapat berkontribusi!

Marko Živanović
Marko Živanović

🔧
Madhurendra kumar
Madhurendra kumar

💻
0xanon
0xanon

💻
InfoBugs
InfoBugs

💻
Ratnesh kumar
Ratnesh kumar

💻
Chandrabhushan Kumar
Chandrabhushan Kumar

💻
Satya Prakash
Satya Prakash

💻 👀
Wei Lin
Wei Lin

🌍


Riwayat Bintang

Star History Chart


Dukungan:

m14r41

--- Tranlated By Open Ai Tx | Last indexed: 2026-01-08 ---