Web Analytics

PentestingEverything

⭐ 1435 stars Dutch by m14r41

Binnenkort:

🌐 Taal

Inhoudsopgave

| Nr. | Types of Pentesting | Nr. | Directory Name | | --- | --------------------------------------------------------------------------------------------------------------------------- | --- | ---------------------------------------------------------------------------------------------------------------------- | | 1 | Webapplicatiebeveiliging | 11 | Active Directory-beveiliging | | 2 | API-beveiliging | 12 | Infrastructuurbeveiliging | | 3 | Mobiele Applicatiebeveiliging | 13 | Threat Modeling | | 4 | Thick Client Applicatiebeveiliging | 14 | IoT-beveiliging | | 5 | Broncode Review | 15 | OSINT (Open Source Intelligence) | | 6 | Netwerkbeveiliging | 16 | Blockchain-beveiliging | | 7 | Wi-Fi-beveiliging | 17 | CI/CD Pipeline-beveiliging | | 8 | Cloudbeveiliging | 18 | Docker Container-beveiliging | | 9 | DevSecOps | 19 | Phishing Penetratietest | | 10 | Configuratie Review | 20 | Forensische Analyse |


| Nr. | Types of Pentesting | Beschrijving | | --- | ------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------- | | 1 | Webapplicatiebeveiliging | Webapplicaties beoordelen en beveiligen tegen kwetsbaarheden. | | 2 | API-beveiliging | API's en microservices testen en beveiligen. | | 3 | Mobiele Applicatiebeveiliging | De beveiliging van mobiele apps en apparaten evalueren. | | 4 | Thick Client Applicatiebeveiliging | Thick client applicaties op beveiligingsproblemen beoordelen. | | 5 | Broncode Review | Broncode analyseren om kwetsbaarheden te identificeren. | | 6 | Netwerkbeveiliging | Netwerken beveiligen door zwakke plekken te identificeren. | | 7 | Wi-Fi Netwerkbeveiliging | De beveiliging van Wi-Fi netwerken en toegangspunten testen. | | 8 | Cloudbeveiliging | De beveiliging van cloudsystemen en -diensten beoordelen. | | 9 | Active Directory-beveiliging | De beveiliging van Active Directory-omgevingen evalueren. | | 10 | Infrastructuurbeveiliging | De onderliggende IT-infrastructuur en assets beveiligen. | | 11 | Threat Modeling | Dreigingen modelleren en beoordelen voor betere beveiliging. | | 12 | IoT-beveiliging | Kwetsbaarheden in IoT-apparaten identificeren en mitigeren. | | 13 | OSINT (Open Source Intelligence) | Informatie uit open bronnen verzamelen voor analyse. | | 14 | Blockchain-beveiliging | Blockchainsystemen beoordelen op beveiliging en compliance. | | 15 | CI/CD Pipeline-beveiliging | De beveiliging van CI/CD-pijplijnen evalueren. | | 16 | Docker Container-beveiliging | Docker containers en gecontaineriseerde applicaties beveiligen.| | 17 | DevSecOps | Beveiligingspraktijken integreren in de DevOps-levenscyclus. | | 18 | Phishing Penetratietest | Phishingaanvallen simuleren voor bewustzijnstraining. | | 19 | Configuratie Review | Systeemconfiguraties beoordelen op beveiligingsproblemen. | | 20 | Forensische Analyse | Digitaal bewijs onderzoeken en analyseren na een incident. |


🛡️ Pentesting & Tools 🛡️

40 Plus Soorten Security Assessment Tools


Penetratietesten en Tools

| Categorie | Tools | | -------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Webapplicatie Pentesting | Acunetix, Burp Suite Professional, Dirb, FFUF, Nmap, Nikto, Nuclei, OWASP ZAP, SQLMap, WhatWeb, WPScan, Invicti (Netsparker), Fortify WebInspect | | Android Beveiliging | adb, APKTool, Apkscan, AndroBugs, Android Studio / Genymotion, AppMon, Dexter/Objection (Objection), Drozer, Frida, Magisk, MITMProxy, MobSF, Quark Engine, JADX | | iOS Beveiliging | checkra1n, Class-dump, Frida, iMazing, iOS-decrypt, iOS-Hook, MobSF, Needle, Objection, Palera1n, Passionfruit, SSL Kill Switch 2, Cycript | | API Pentesting | Burp Suite Professional, GraphQL Raider, GraphQL Voyager, Insomnia, Kite Runner, Postman, Swagger UI | | Secure Code Review | Bandit, Checkmarx, CodeQL, FindSecBugs, Gitleaks, Semgrep, SonarQube, Snyk, Veracode, Fortify Static (Workbench/Audit) | | Thick-Client Beveiliging | Burp Suite Professional, dnSpy, de4dot, Fiddler, Ghidra, IDA Pro, OllyDbg, Process Explorer, x64dbg, CFF Explorer, Sysinternals Suite, Wireshark | | Netwerk Pentesting | Bettercap, CrackMapExec, Metasploit, Netcat, Nessus, Nmap, OpenVAS, Responder, Wireshark |

Uitgebreide versie

| Categorie | Tools | | --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | Active Directory Pentesting | BloodHound, Mimikatz, CrackMapExec, Impacket, Kerbrute, Rubeus, LDAPDomainDump, SharpHound, PowerView, ADRecon | | Cloud Beveiliging | Prowler, ScoutSuite, CloudSploit, Pacu, Steampipe, CloudMapper, NCC Scout, kube-bench, Terrascan, KICS | | IoT Beveiliging | Firmwalker, Binwalk, Firmware-Mod-Kit, Shodan, RIOT, JTAGulator, Qiling, Ghidra, Avatar2, Firmadyne | | Firewall Pentesting | hping3, NPing, Scapy, Zmap, firewalk, FTester, Nmap (Firewall Bypass), Packet Sender, T50, Ettercap, TCPReplay | | Firmware Analyse | Binwalk, Firmware Analysis Toolkit (FAT), QEMU, Ghidra, IDA Pro, Firmware-Mod-Kit, Radare2, Firmadyne | | Container Beveiliging | Trivy, Aqua Microscanner, Clair, Anchore, Docker Bench, kube-hunter, Falco, Sysdig, Snyk, Grype | | WiFi Pentesting | Aircrack-ng, Kismet, Bettercap, Reaver, Fluxion, Wireshark, hcxtools, Fern WiFi Cracker, Wifiphisher, Hashcat | | DevSecOps | GitHub Advanced Security, Trivy, Snyk, Anchore, OWASP Dependency-Check, Jenkins, Checkmarx, Veracode, Dagda, Sysdig Secure, Cloud Custodian, Bridgecrew, Kubescape | | OSINT | theHarvester, Maltego, SpiderFoot, Recon-ng, Shodan, FOCA, Google Dorks, OSINT Framework, GHunt, Sherlock, PhoneInfoga | | Configuratie Review | Lynis, OpenSCAP, Auditd, Tripwire, cis-cat Pro, Chef InSpec, Prowler, Kubescape | | Phishing Simulatie | GoPhish, SET, Evilginx2, Phishery, King Phisher, Modlishka, Phishing Frenzy |

| Forensisch onderzoek | Autopsy, Volatility, Sleuth Kit, FTK Imager, Redline, Magnet AXIOM, X-Ways, Bulk Extractor, ExifTool | | Blockchainbeveiliging | Mythril, Slither, Manticore, Remix IDE, Oyente, SmartCheck, Echidna, Tenderly | | Threat Modeling | Microsoft TMT, OWASP Threat Dragon, IriusRisk, SeaSponge, Draw.io, Pytm | | Red Team Tools | Cobalt Strike, Sliver, Mythic, Empire, Metasploit, Brute Ratel, Koadic, FudgeC2, Nishang, PowerShell Empire | | Blue Team Tools | Velociraptor, Wazuh, OSQuery, GRR, Sysmon, CrowdStrike Falcon, Elastic Security, Sigma Rules | | SIEM & Log Analyse | Splunk, ELK Stack, Graylog, Wazuh, AlienVault OSSIM, SIEMonster, Logstash, Fluentd, Loki, Falco, Humio, Kibana, Loggly, Logz.io | | Wachtwoord kraken | Hashcat, John the Ripper, Hydra, CrackStation, Cain & Abel, Medusa, THC-Hydra | | Reverse Engineering | Ghidra, IDA Pro, x64dbg, OllyDbg, Binary Ninja, Radare2, Cutter | | Hardware Hacking | ChipWhisperer, Saleae Logic, OpenOCD, JTAGulator, Bus Pirate, Flashrom, Arduino, Raspberry Pi, RTL-SDR | | Social Engineering | SET, BeEF, King Phisher, Evilginx / Evilginx2, Modlishka, EyeWitness, PhishToolkit, PhishX, Psychological Frameworks (Pretexting, Elicitation) | | SCADA/ICS Beveiliging | Snort, Wireshark, ModScan, ModbusPal, Scadafence, OpenPLC, GasPot, Conpot, PLCScan | | Supply Chain Beveiliging | Snyk, OWASP Dependency-Check, Trivy, Syft, Grype, CycloneDX, Whitesource, Anchore Engine | | Email Security Testing | GoPhish, Modlishka, SMTPTester, MailSniper, Evilginx2, Phish5, Email Header Analyzer | | Analyse van mobiele malware | APKTool, MobSF, Jadx, Frida, VirusTotal Mobile, Droidbox, Bytecode Viewer, Drozer, Quark-Engine | | AI/ML Beveiliging | Adversarial Robustness Toolbox (ART), TextAttack, Foolbox, IBM AI Explainability 360, CleverHans, Alibi Detect, SecML, DeepExploit | | Security Automation / SOAR | StackStorm, Cortex XSOAR, Shuffle, DFIR-IR-Playbook, Phantom Cyber, Tines | | Bug Bounty Toolkit | Amass, Sublist3r, Nuclei, HTTPX, Naabu, FFUF, GF, Dalfox, Kiterunner, Hakrawler, JSParser, ParamSpider | | Credential Dumping & Cracking | LaZagne, Mimikatz, Hashcat, John the Ripper, Windows Credential Editor, CrackMapExec, GetNPUsers.py | | Payload Generatie | MSFVenom, Unicorn, Shellter, Veil, Nishang, Empire, Obfuscation.io, Metasploit, Donut | | Honeypots / Deceptie | Cowrie, Dionaea, Kippo, Honeyd, T-Pot, Conpot, Canarytokens, Artillery | | MacOS Beveiliging | KnockKnock, BlockBlock, OSXCollector, Objective-See Suite, MacMonitor, Little Snitch, Dylib Hijack Scanner | | Windows Post-Exploitation | PowerView, Seatbelt, SharpUp, WinPEAS, Sherlock, Empire, FireEye Red Team Tools, SharpHound | | Linux Post-Exploitation | LinPEAS, Linux Exploit Suggester, pspy, Chkrootkit, rkhunter, bashark, GTFOBins, Sudomy | | Browser Security Testing | BeEF, XSStrike, XSSer, Burp Collaborator, NoScript, uBlock Origin, Chrome Developer Tools |


👨‍💻👩‍💻 Bijdragers ✨👨‍💻👩‍💻

>Hartelijk dank voor je interesse om bij te dragen! Lees alsjeblieft de Bijdragingsrichtlijnen.

>Een oprechte dank aan de geweldige mensen voor hun bijdragen aan dit project. Je kunt de emoji key bekijken om te zien op welke manieren je kunt bijdragen!

Marko Živanović
Marko Živanović

🔧
Madhurendra kumar
Madhurendra kumar

💻
0xanon
0xanon

💻
InfoBugs
InfoBugs

💻
Ratnesh kumar
Ratnesh kumar

💻
Chandrabhushan Kumar
Chandrabhushan Kumar

💻
Satya Prakash
Satya Prakash

💻 👀
Wei Lin
Wei Lin

🌍


Stergeschiedenis

Stergeschiedenis Grafiek


Steun:

m14r41

--- Tranlated By Open Ai Tx | Last indexed: 2026-01-08 ---