🔜 Nieuwe Bron Beschikbaar Deze Maand.
- Nieuw Module: OWASP Top 10 LLMs en Gen AI
- Nieuw Module: OWASP MCP Top 10
- Nieuw Module: Threat Modeling
- Nieuw Module: Ontwerp Review
- Inhoudsupdates over OWASP Top 10:2025 (Webapplicatie)
- Update over automatisering voor beveiligingsbeoordeling
Tot Nu Toe Bijgewerkt: 2026
✅ iOS Pentesting Module ✅ API Pentesting Module ✅ SAST/Broncode Review ✅ Thick Client PentestingInhoudsopgave
| Nr. | Soorten Pentesting | Nr. | Directorynaam | | --- | ------------------------------------------------------------------------------------------------------------------------ | --- | -------------------------------------------------------------------------------------------------------------------- | | 1 | Webapplicatiebeveiliging | 11 | Active Directory Beveiliging | | 2 | API-beveiliging | 12 | Infrastructuurbeveiliging | | 3 | Mobiele Applicatiebeveiliging | 13 | Threat Modeling | | 4 | Thick Client Applicatiebeveiliging | 14 | IoT-beveiliging | | 5 | Broncodebeoordeling | 15 | OSINT (Open Source Intelligence) | | 6 | Netwerkbeveiliging | 16 | Blockchain Beveiliging | | 7 | Wi-Fi Beveiliging | 17 | CI/CD Pipeline Beveiliging | | 8 | Cloudbeveiliging | 18 | Docker Container Beveiliging | | 9 | DevSecOps | 19 | Phishing Penetratietesten | | 10 | Configuratiebeoordeling | 20 | Forensische Analyse |
| Nr. | Soorten Pentesting | Beschrijving | | --- | -------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------- | | 1 | Webapplicatiebeveiliging | Beoordelen en beveiligen van webapplicaties op kwetsbaarheden. | | 2 | API-beveiliging | Testen en verbeteren van de beveiliging van API's en microservices. | | 3 | Mobiele Applicatiebeveiliging | Evalueren van de beveiliging van mobiele apps en apparaten. | | 4 | Thick Client Applicatiebeveiliging | Thick client applicaties beoordelen op beveiligingsproblemen. | | 5 | Broncodebeoordeling | Analyseren van broncode om kwetsbaarheden te identificeren en te verhelpen. | | 6 | Netwerkbeveiliging | Netwerken beveiligen door zwakke plekken te identificeren en op te lossen. | | 7 | Wi-Fi Netwerkbeveiliging | Beoordelen van de beveiliging van Wi-Fi netwerken en toegangspunten. | | 8 | Cloudbeveiliging | Beoordelen van de beveiliging van cloudsystemen en -diensten. | | 9 | Active Directory Beveiliging | Evalueren van de beveiliging van Active Directory omgevingen. | | 10 | Infrastructuurbeveiliging | Onderliggende IT-infrastructuur en activa beveiligen. | | 11 | Threat Modeling | Modelleren en beoordelen van bedreigingen voor betere systeembeveiliging. | | 12 | IoT-beveiliging | Kwetsbaarheden in IoT-apparaten identificeren en mitigeren. | | 13 | OSINT (Open Source Intelligence) | Inlichtingen verzamelen uit open bronnen voor beveiligingsanalyse. | | 14 | Blockchain Beveiliging | Beoordeel blockchain-systemen op beveiliging en naleving. | | 15 | CI/CD Pipeline Beveiliging | Evalueer de beveiliging van continue integratiepipelines. | | 16 | Docker Container Beveiliging | Beveilig Docker-containers en gecontaineriseerde applicaties. | | 17 | DevSecOps | Integreer beveiligingspraktijken door de hele DevOps-levenscyclus. | | 18 | Phishing Penetratietest | Simuleer en analyseer phishing-aanvallen voor bewustwordingstraining. | | 19 | Configuratie Review | Onderzoek en verifieer systeemconfiguraties op beveiligingsproblemen. | | 20 | Forensische Analyse | Onderzoek en analyseer digitaal bewijs na een incident. |
Pentesting & Tools
40+ Soorten Beveiligingsbeoordelingshulpmiddelen
Penetratietesten en Tools
| Categorie | Tools | | -------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Webapplicatie Pentesten | Acunetix, Burp Suite Professional, Dirb, FFUF, Nmap, Nikto, Nuclei, OWASP ZAP, SQLMap, WhatWeb, WPScan, Invicti (Netsparker), Fortify WebInspect | | Android Beveiliging | adb, APKTool, Apkscan, AndroBugs, Android Studio / Genymotion, AppMon, Dexter/Objection (Objection), Drozer, Frida, Magisk, MITMProxy, MobSF, Quark Engine, JADX | | iOS Beveiliging | checkra1n, Class-dump, Frida, iMazing, iOS-decrypt, iOS-Hook, MobSF, Needle, Objection, Palera1n, Passionfruit, SSL Kill Switch 2, Cycript | | API Pentesten | Burp Suite Professional, GraphQL Raider, GraphQL Voyager, Insomnia, Kite Runner, Postman, Swagger UI | | Beveiligde Code Review | Bandit, Checkmarx, CodeQL, FindSecBugs, Gitleaks, Semgrep, SonarQube, Snyk, Veracode, Fortify Static (Workbench/Audit) | | Thick-Client Beveiliging | Burp Suite Professional, dnSpy, de4dot, Fiddler, Ghidra, IDA Pro, OllyDbg, Process Explorer, x64dbg, CFF Explorer, Sysinternals Suite, Wireshark | | Netwerk Pentesten | Bettercap, CrackMapExec, Metasploit, Netcat, Nessus, Nmap, OpenVAS, Responder, Wireshark |
Uitgebreide versie
| Categorie | Tools | | --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Active Directory Pentesten | BloodHound, Mimikatz, CrackMapExec, Impacket, Kerbrute, Rubeus, LDAPDomainDump, SharpHound, PowerView, ADRecon | | Cloud Beveiliging | Prowler, ScoutSuite, CloudSploit, Pacu, Steampipe, CloudMapper, NCC Scout, kube-bench, Terrascan, KICS | | IoT Beveiliging | Firmwalker, Binwalk, Firmware-Mod-Kit, Shodan, RIOT, JTAGulator, Qiling, Ghidra, Avatar2, Firmadyne | | Firewall Pentesting | hping3, NPing, Scapy, Zmap, firewalk, FTester, Nmap (Firewall Bypass), Packet Sender, T50, Ettercap, TCPReplay | | Firmware Analyse | Binwalk, Firmware Analysis Toolkit (FAT), QEMU, Ghidra, IDA Pro, Firmware-Mod-Kit, Radare2, Firmadyne | | Containerbeveiliging | Trivy, Aqua Microscanner, Clair, Anchore, Docker Bench, kube-hunter, Falco, Sysdig, Snyk, Grype | | WiFi Pentesting | Aircrack-ng, Kismet, Bettercap, Reaver, Fluxion, Wireshark, hcxtools, Fern WiFi Cracker, Wifiphisher, Hashcat | | DevSecOps | GitHub Advanced Security, Trivy, Snyk, Anchore, OWASP Dependency-Check, Jenkins, Checkmarx, Veracode, Dagda, Sysdig Secure, Cloud Custodian, Bridgecrew, Kubescape | | OSINT | theHarvester, Maltego, SpiderFoot, Recon-ng, Shodan, FOCA, Google Dorks, OSINT Framework, GHunt, Sherlock, PhoneInfoga | | Configuratie Review | Lynis, OpenSCAP, Auditd, Tripwire, cis-cat Pro, Chef InSpec, Prowler, Kubescape | | Phishing Simulatie | GoPhish, SET, Evilginx2, Phishery, King Phisher, Modlishka, Phishing Frenzy | | Forensisch Onderzoek | Autopsy, Volatility, Sleuth Kit, FTK Imager, Redline, Magnet AXIOM, X-Ways, Bulk Extractor, ExifTool | | Blockchain Beveiliging | Mythril, Slither, Manticore, Remix IDE, Oyente, SmartCheck, Echidna, Tenderly | | Threat Modeling | Microsoft TMT, OWASP Threat Dragon, IriusRisk, SeaSponge, Draw.io, Pytm | | Red Team Tools | Cobalt Strike, Sliver, Mythic, Empire, Metasploit, Brute Ratel, Koadic, FudgeC2, Nishang, PowerShell Empire | | Blue Team Tools | Velociraptor, Wazuh, OSQuery, GRR, Sysmon, CrowdStrike Falcon, Elastic Security, Sigma Rules | | SIEM & Log Analyse | Splunk, ELK Stack, Graylog, Wazuh, AlienVault OSSIM, SIEMonster, Logstash, Fluentd, Loki, Falco, Humio, Kibana, Loggly, Logz.io | | Wachtwoord Kraken | Hashcat, John the Ripper, Hydra, CrackStation, Cain & Abel, Medusa, THC-Hydra | | Reverse Engineering | Ghidra, IDA Pro, x64dbg, OllyDbg, Binary Ninja, Radare2, Cutter | | Hardware Hacking | ChipWhisperer, Saleae Logic, OpenOCD, JTAGulator, Bus Pirate, Flashrom, Arduino, Raspberry Pi, RTL-SDR | | Social Engineering | SET, BeEF, King Phisher, Evilginx / Evilginx2, Modlishka, EyeWitness, PhishToolkit, PhishX, Psychological Frameworks (Pretexting, Elicitation) | | SCADA/ICS Beveiliging | Snort, Wireshark, ModScan, ModbusPal, Scadafence, OpenPLC, GasPot, Conpot, PLCScan | | Supply Chain Beveiliging | Snyk, OWASP Dependency-Check, Trivy, Syft, Grype, CycloneDX, Whitesource, Anchore Engine | | E-mail Beveiliging Testen | GoPhish, Modlishka, SMTPTester, MailSniper, Evilginx2, Phish5, Email Header Analyzer | | Mobiele Malware Analyse | APKTool, MobSF, Jadx, Frida, VirusTotal Mobile, Droidbox, Bytecode Viewer, Drozer, Quark-Engine | | AI/ML Beveiliging | Adversarial Robustness Toolbox (ART), TextAttack, Foolbox, IBM AI Explainability 360, CleverHans, Alibi Detect, SecML, DeepExploit | | Security Automation / SOAR | StackStorm, Cortex XSOAR, Shuffle, DFIR-IR-Playbook, Phantom Cyber, Tines | | Bug Bounty Toolkit | Amass, Sublist3r, Nuclei, HTTPX, Naabu, FFUF, GF, Dalfox, Kiterunner, Hakrawler, JSParser, ParamSpider | | Credential Dumping & Kraken | LaZagne, Mimikatz, Hashcat, John the Ripper, Windows Credential Editor, CrackMapExec, GetNPUsers.py | | Payload Generatie | MSFVenom, Unicorn, Shellter, Veil, Nishang, Empire, Obfuscation.io, Metasploit, Donut | | Honeypots / Misleiding | Cowrie, Dionaea, Kippo, Honeyd, T-Pot, Conpot, Canarytokens, Artillery | | MacOS Beveiliging | KnockKnock, BlockBlock, OSXCollector, Objective-See Suite, MacMonitor, Little Snitch, Dylib Hijack Scanner | | Windows Post-Exploitation | PowerView, Seatbelt, SharpUp, WinPEAS, Sherlock, Empire, FireEye Red Team Tools, SharpHound | | Linux Post-Exploitation | LinPEAS, Linux Exploit Suggester, pspy, Chkrootkit, rkhunter, bashark, GTFOBins, Sudomy | | Browser Beveiliging Testen | BeEF, XSStrike, XSSer, Burp Collaborator, NoScript, uBlock Origin, Chrome Developer Tools |
👨💻Bijdragers👩💻
>Ik waardeer je interesse om bij te dragen! Lees aub Bijdrage Richtlijnen.
>Een oprechte dank aan de geweldige individuen voor hun bijdragen aan dit project. Je kunt de emoji-sleutel bekijken om te zien op welke verschillende manieren je kunt bijdragen!
Marko Živanović 🔧 |
Madhurendra kumar 💻 |
0xanon 💻 |
InfoBugs 💻 |
Ratnesh kumar 💻 |
Chandrabhushan Kumar 💻 |
Satya Prakash 💻 👀 |
Wei Lin 🌍 |
Sterren Geschiedenis
Steun:

--- Tranlated By Open Ai Tx | Last indexed: 2026-04-11 ---