Hacking Software Techniques

Techniques

Hackable Applications and CTF

These are websites, virtual machines, etc. that are intentionally vulnerable and intended for practice.

Capture the Flag (CTF)

CTF Tools

Tools which may have broader use but were developed out of the competitive environment of CTFs

Linux Distros

Windows Tools

Decoding data

Port scanners

Mapping

IP trackers

IP geolocation

Reverse Engineering Binaries

Reverse engineering is the process of inferring the behavior of software binaries when source code is unavailable. See Reverse Engineering.

URL Checker

What's this weird URL? These tools will go to a URL for you instead of opening it on your own computer. Note: Just because it passes muster on a site like this does not necessarily mean it is harmless.

Network Monitoring Tools

Packet Capture

Firewall

Passwords

Password Recovery

Dictionary Creation

Web Applications

Vulnerability Scanning

Exploit Frameworks

OSINT

See OSINT