Deciefer Securities - Resource Library

Your Gateway to Free Cybersecurity Knowledge & Tools.

The First Step of Ethical Hacking: Gathering Intelligence.

Footprinting & Reconnaissance

  • Rustscan – Ultra-fast port scanner that quickly detects open ports.

  • sx-Tool – Multi-purpose network scanning and reconnaissance utility.

  • Banner Grabbing Tools – Capture service banners to identify software versions and vulnerabilities.

  • GitHub Tools – Detect exposed credentials, API keys, and sensitive data in repositories.

  • Packet Crafting Tools – Create and manipulate custom network packets for testing defenses.

  • Ping Sweep Tools – Discover live hosts within a network using ICMP requests.

  • Scanning Tools – Identify active systems, open ports, and running services.

The Second Phase of Ethical Hacking: Probing the Target Network.

Network Scanning & Related Tools

  • Rustscan – Ultra-fast port scanner that quickly detects open ports.

  • sx-Tool – Multi-purpose network scanning and reconnaissance utility.

  • Banner Grabbing Tools – Capture service banners to identify software versions and vulnerabilities.

  • GitHub Tools – Detect exposed credentials, API keys, and sensitive data in repositories.

  • Packet Crafting Tools – Create and manipulate custom network packets for testing defenses.

  • Ping Sweep Tools – Discover live hosts within a network using ICMP requests.

  • Scanning Tools – Identify active systems, open ports, and running services.

Enumeration Phase Tools

  • Advanced IP Scanner – Scans networks to detect live hosts and shared resources.

  • GitHub Tools – Collects exposed credentials and sensitive data from public repositories.

  • Global Network Inventory – Provides a full network inventory, including devices and services.

  • LDAP Enumeration Tools – Extracts information from LDAP directories, including users and groups.

  • NetBIOS Enumeration Tools – Gathers NetBIOS information such as shares, sessions, and service details.

  • SMBeagle – Enumerates SMB shares and permissions within a network.

  • SNMP Enumeration Tools – Extracts data from SNMP-enabled devices, such as system details and routing tables.

  • dnsrecon – Performs advanced DNS enumeration to discover hosts, records, and zones.

  • RPCScan – Enumerates services and users through exposed RPC endpoints.

  • SuperEnum – Multi-purpose enumeration tool for gathering domain, SMB, and network information.

Vulnerability Assessment – Identifying Weaknesses Before Attackers Do

Vulnerability Analysis Tools

  • Nessus – A powerful scanner that detects vulnerabilities, misconfigurations, and compliance issues across systems, networks, and applications.

  • Sn1per – An automated tool for reconnaissance, vulnerability scanning, and generating detailed security reports.

System Hacking Tools

System Hacking Tools

  • CVE-2022-37706-LPE-exploit – Exploit for privilege escalation on vulnerable systems.

  • ExtensionSpoofer-master – Spoofs file extensions to disguise malicious payloads.

  • Havoc – Advanced post-exploitation command-and-control (C2) framework.

  • LinEnum – Linux enumeration script for privilege escalation discovery.

  • ntlm_theft – Steals NTLM hashes using file/service abuse techniques.

  • PowerSploit – PowerShell exploitation and post-exploitation toolkit.

  • PowerTools-master – Offensive PowerShell tools collection.

  • PS2EXE-master – Converts PowerShell scripts into Windows executables.

  • reverse-shell-generator – Creates reverse shell payloads for multiple platforms.

  • SharPersist – Windows persistence toolkit (registry, scheduled tasks, services).

  • Wmi-Persistence-master – Persistence mechanism using WMI event subscriptions.

  • dropper.ps1 – Script to drop and execute malicious payloads.

  • metasploit-4.20.0-installer – Widely used penetration testing and exploitation framework.

  • Seatbelt.exe – Windows situational awareness and security audit tool.

  • Active Directory Tools – For enumerating and exploiting Active Directory environments.

  • Buffer Overflow Tools – Exploit memory corruption vulnerabilities for code execution.

  • Covering Tracks Tools – Hide attacker presence and tamper with logs.

  • GitHub Tools – Assorted offensive scripts collected from GitHub.

  • Password Cracking Tools – Tools for brute-force, dictionary, and hash cracking attacks.

  • Privilege Escalation Tools – Exploit misconfigurations and vulnerabilities for higher-level access.

  • Spyware – Tools that secretly monitor and steal victim activity/data.

  • Steganography Tools – Hide data or payloads inside files, images, or media.

  • Tools to Extract Password Hashes – Dump stored password hashes for cracking or reuse.

Explore Cybersecurity Careers Today!​

Are you ready to start an enjoyable profession in cybersecurity? Begin your career right now and work with us to safeguard the digital realm. Take a look at our courses and start your journey to becoming a cybersecurity expert.