This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Appendix A: Testing Tools"
From OWASP
(Added Andrew's changes.) |
(→Open Source / Freeware) |
||
(21 intermediate revisions by 14 users not shown) | |||
Line 19: | Line 19: | ||
** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform. | ** SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform. | ||
* '''Burp Proxy''' - http://www.portswigger.net/Burp/ | * '''Burp Proxy''' - http://www.portswigger.net/Burp/ | ||
− | ** Burp Proxy is an intercepting proxy server for security testing of web applications | + | ** Burp Proxy is an intercepting proxy server for security testing of web applications. It allows intercepting and modifying all HTTP(S) traffic passing in both directions. It works with custom SSL certificates as well as non-proxy-aware clients. |
* '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/ | * '''Odysseus Proxy''' - http://www.wastelands.gen.nz/odysseus/ | ||
** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction. | ** Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction. | ||
Line 56: | Line 56: | ||
* '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US | * '''Cookie swap''' - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US | ||
** Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. | ** Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts. | ||
− | * '''Firebug lite for Chrome"" - https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench | + | * '''Firebug lite for Chrome"" - https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench''' |
**Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elements with your mouse, and live editing CSS properties | **Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elements with your mouse, and live editing CSS properties | ||
− | * '''Session Manager"" - https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi | + | * '''Session Manager"" - https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi''' |
**With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows. | **With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows. | ||
* '''Subgraph Vega''' - http://www.subgraph.com/products.html | * '''Subgraph Vega''' - http://www.subgraph.com/products.html | ||
**Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. | **Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows. | ||
− | |||
=== Testing for specific vulnerabilities === | === Testing for specific vulnerabilities === | ||
− | ==== Testing for DOM XSS ==== | + | ==== Testing for JavaScript Security, DOM XSS ==== |
− | * | + | * BlueClosure BC Detect - http://www.blueclosure.com |
Line 94: | Line 93: | ||
==== Testing SSL ==== | ==== Testing SSL ==== | ||
* Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx | * Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx | ||
− | + | * O-Saft - https://www.owasp.org/index.php/O-Saft | |
+ | * sslyze - https://github.com/iSECPartners/sslyze | ||
+ | * TestSSLServer - http://www.bolet.org/TestSSLServer/ | ||
+ | * SSLScan - http://sourceforge.net/projects/sslscan/ | ||
+ | * SSLScan windows - https://github.com/rbsec/sslscan/releases | ||
+ | * SSLLabs - https://www.ssllabs.com/ssltest/ | ||
+ | * High-Tech Bridge ImmuniWeb SSLScan - https://www.htbridge.com/ssl/ | ||
==== Testing for Brute Force Password ==== | ==== Testing for Brute Force Password ==== | ||
Line 102: | Line 107: | ||
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html | * Medusa - http://www.foofus.net/~jmk/medusa/medusa.html | ||
* Ncat - http://nmap.org/ncat/ | * Ncat - http://nmap.org/ncat/ | ||
− | + | * HashCat - http://hashcat.net/hashcat/#features-algos | |
+ | * fgdump - http://foofus.net/goons/fizzgig/fgdump/ | ||
+ | * Password Dictionary - https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm | ||
==== Testing Buffer Overflow ==== | ==== Testing Buffer Overflow ==== | ||
Line 121: | Line 128: | ||
==== Googling ==== | ==== Googling ==== | ||
− | * | + | * Bishop Fox's Google Hacking Diggity Project - http://www.bishopfox.com/resources/tools/google-hacking-diggity/ |
* Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx | * Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx | ||
+ | * Google Hacking database - https://www.exploit-db.com/google-hacking-database/ | ||
+ | ==== Slow HTTP ==== | ||
+ | * Slowloris http://ckers.org/slowloris | ||
+ | * slowhttptest https://github.com/shekyan/slowhttptest | ||
==Commercial Black Box Testing tools== | ==Commercial Black Box Testing tools== | ||
Line 129: | Line 140: | ||
* NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/ | * NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/ | ||
* IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/ | * IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/ | ||
− | * Cenzic Hailstorm - | + | * Trustwave App Scanner (Formerly Cenzic Hailstorm) - https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/ |
* Burp Intruder - http://www.portswigger.net/burp/intruder.html | * Burp Intruder - http://www.portswigger.net/burp/intruder.html | ||
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com | * Acunetix Web Vulnerability Scanner - http://www.acunetix.com | ||
Line 144: | Line 155: | ||
* SAINT - http://www.saintcorporation.com/ | * SAINT - http://www.saintcorporation.com/ | ||
* QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/ | * QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/ | ||
+ | * Indusface WAS- https://www.indusface.com/products/application-security/web-application-scanning | ||
* Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx | * Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx | ||
− | * | + | |
+ | ==Linux Distrubtion== | ||
+ | * PenTestBox https://tools.pentestbox.com/ | ||
+ | * Samurai https://sourceforge.net/p/samurai/wiki/Home/ | ||
+ | * Santoku https://sourceforge.net/projects/santoku/ | ||
+ | * ParrotSecurity https://sourceforge.net/projects/parrotsecurity/?source=navbar | ||
+ | * Kali https://www.kali.org/ | ||
+ | * Matriux https://sourceforge.net/projects/matriux/?source=navbar | ||
+ | * BlackArch http://www.blackarch.org/downloads.html | ||
+ | * Cyborg Hawk Linux http://cyborg.ztrela.com/tools/ | ||
+ | * PenToo http://www.pentoo.ch/download/ | ||
+ | * bugtraq http://bugtraq-team.com/ | ||
+ | |||
==Source Code Analyzers== | ==Source Code Analyzers== | ||
− | |||
===Open Source / Freeware=== | ===Open Source / Freeware=== | ||
* [[:Category:OWASP_Orizon_Project|Owasp Orizon]] | * [[:Category:OWASP_Orizon_Project|Owasp Orizon]] | ||
* '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' | * '''[[:Category:OWASP_LAPSE_Project|OWASP LAPSE]]''' | ||
* [[OWASP O2 Platform]] | * [[OWASP O2 Platform]] | ||
− | * Google CodeSearchDiggity - http://www. | + | * [[OWASP WAP-Web Application Protection]] |
+ | * Boon - http://www.cs.berkeley.edu/~daw/boon | ||
+ | * FindBugs - http://findbugs.sourceforge.net | ||
+ | * Find Security Bugs - https://find-sec-bugs.github.io/ | ||
+ | * FlawFinder - http://www.dwheeler.com/flawfinder | ||
+ | * Google CodeSearchDiggity - http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ | ||
+ | * phpcs-security-audit - https://github.com/FloeDesignTechnologies/phpcs-security-audit | ||
* PMD - http://pmd.sourceforge.net/ | * PMD - http://pmd.sourceforge.net/ | ||
− | |||
* Microsoft’s [[FxCop]] | * Microsoft’s [[FxCop]] | ||
+ | * .NET Security Guard - https://dotnet-security-guard.github.io/ | ||
+ | * Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/ | ||
+ | * Puma Scan - https://pumascan.com | ||
* Splint - http://splint.org | * Splint - http://splint.org | ||
− | * | + | * SonarQube - http://sonarqube.org |
− | |||
− | |||
− | |||
* W3af - http://w3af.sourceforge.net/ | * W3af - http://w3af.sourceforge.net/ | ||
− | * | + | * RIPS Open Source - http://rips-scanner.sourceforge.net/ |
− | |||
===Commercial === | ===Commercial === | ||
+ | * RIPS - https://www.ripstech.com/product/ | ||
* Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure | * Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure | ||
* Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm | * Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm | ||
* Checkmarx CxSuite - http://www.checkmarx.com | * Checkmarx CxSuite - http://www.checkmarx.com | ||
* HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer | * HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer | ||
− | * GrammaTech - http://www.grammatech.com | + | * GrammaTech CodeSonar - http://www.grammatech.com |
* ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html | * ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html | ||
* Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/ | * Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/ | ||
* ParaSoft - http://www.parasoft.com | * ParaSoft - http://www.parasoft.com | ||
+ | * Puma Scan Professional - https://pumascanpro.com | ||
* Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de | * Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de | ||
* Veracode - http://www.veracode.com | * Veracode - http://www.veracode.com | ||
* Armorize CodeSecure - http://www.armorize.com/codesecure/ | * Armorize CodeSecure - http://www.armorize.com/codesecure/ | ||
− | + | * Peach Fuzzer - http://www.peachfuzzer.com/ | |
+ | * Burp Suite - https://portswigger.net/burp/ | ||
==Acceptance Testing Tools== | ==Acceptance Testing Tools== | ||
Acceptance testing tools are used to validate the functionality of web applications. Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases. Most, if not all, can be adapted to perform security specific tests in addition to functional tests. | Acceptance testing tools are used to validate the functionality of web applications. Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases. Most, if not all, can be adapted to perform security specific tests in addition to functional tests. | ||
+ | * BDD Security - https://github.com/continuumsecurity/bdd-security | ||
Line 237: | Line 268: | ||
* Sam Spade - http://www.samspade.org | * Sam Spade - http://www.samspade.org | ||
* Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html | * Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html | ||
+ | |||
+ | [[Category:SAMM-CR-2]] |
Latest revision as of 09:02, 7 May 2019
This article is part of the new OWASP Testing Guide v4.
Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: https://www.owasp.org/index.php/OWASP_Testing_Project
Open Source Black Box Testing tools
General Testing
- OWASP ZAP
- The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing.
- ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually.
- OWASP WebScarab
- WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is portable to many platforms. WebScarab has several modes of operation that are implemented by a number of plugins.
- OWASP CAL9000
- CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts.
- Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more.
- OWASP Pantera Web Assessment Studio Project
- Pantera uses an improved version of SpikeProxy to provide a powerful web application analysis engine. The primary goal of Pantera is to combine automated capabilities with complete manual testing to get the best penetration testing results.
- OWASP Mantra - Security Framework
- Mantra is a web application security testing framework built on top of a browser. It supports Windows, Linux(both 32 and 64 bit) and Macintosh. In addition, it can work with other software like ZAP using built in proxy management function which makes it much more convenient. Mantra is available in 9 languages: Arabic, Chinese - Simplified, Chinese - Traditional, English, French, Portuguese, Russian, Spanish and Turkish.
- SPIKE - http://www.immunitysec.com/resources-freesoftware.shtml
- SPIKE designed to analyze new network protocols for buffer overflows or similar weaknesses. It requires a strong knowledge of C to use and only available for the Linux platform.
- Burp Proxy - http://www.portswigger.net/Burp/
- Burp Proxy is an intercepting proxy server for security testing of web applications. It allows intercepting and modifying all HTTP(S) traffic passing in both directions. It works with custom SSL certificates as well as non-proxy-aware clients.
- Odysseus Proxy - http://www.wastelands.gen.nz/odysseus/
- Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. It will intercept an HTTP session's data in either direction.
- Webstretch Proxy - http://sourceforge.net/projects/webstretch
- Webstretch Proxy enable users to view and alter all aspects of communications with a web site via a proxy. It can also be used for debugging during development.
- WATOBO - http://sourceforge.net/apps/mediawiki/watobo/index.php?title=Main_Page
- WATOBO works like a local proxy, similar to Webscarab, ZAP or BurpSuite and it supports passive and active checks.
- Firefox LiveHTTPHeaders - https://addons.mozilla.org/en-US/firefox/addon/live-http-headers/
- View HTTP headers of a page and while browsing.
- Firefox Tamper Data - https://addons.mozilla.org/en-US/firefox/addon/tamper-data/
- Use tamperdata to view and modify HTTP/HTTPS headers and post parameters
- Firefox Web Developer Tools - https://addons.mozilla.org/en-US/firefox/addon/web-developer/
- The Web Developer extension adds various web developer tools to the browser.
- DOM Inspector - https://developer.mozilla.org/en/docs/DOM_Inspector
- DOM Inspector is a developer tool used to inspect, browse, and edit the Document Object Model (DOM)
- Firefox Firebug - http://getfirebug.com/
- Firebug integrates with Firefox to edit, debug, and monitor CSS, HTML, and JavaScript.
- Grendel-Scan - http://securitytube-tools.net/index.php?title=Grendel_Scan
- Grendel-Scan is an automated security scanning of web applications and also supports manual penetration testing.
- OWASP SWFIntruder - http://www.mindedsecurity.com/swfintruder.html
- SWFIntruder (pronounced Swiff Intruder) is the first tool specifically developed for analyzing and testing security of Flash applications at runtime.
- SWFScan - http://h30499.www3.hp.com/t5/Following-the-Wh1t3-Rabbit/SWFScan-FREE-Flash-decompiler/ba-p/5440167
- Flash decompiler
- Wikto - http://www.sensepost.com/labs/tools/pentest/wikto
- Wikto features including fuzzy logic error code checking, a back-end miner, Google-assisted directory mining and real time HTTP request/response monitoring.
- w3af - http://w3af.org
- w3af is a Web Application Attack and Audit Framework. The project’s goal is finding and exploiting web application vulnerabilities.
- skipfish - http://code.google.com/p/skipfish/
- Skipfish is an active web application security reconnaissance tool.
- Web Developer toolbar - https://chrome.google.com/webstore/detail/bfbameneiokkgbdmiekhjnmfkcnldhhm
- The Web Developer extension adds a toolbar button to the browser with various web developer tools. This is the official port of the Web Developer extension for Firefox.
- HTTP Request Maker - https://chrome.google.com/webstore/detail/kajfghlhfkcocafkcjlajldicbikpgnp?hl=en-US
- Request Maker is a tool for penetration testing. With it you can easily capture requests made by web pages, tamper with the URL, headers and POST data and, of course, make new requests
- Cookie Editor - https://chrome.google.com/webstore/detail/fngmhnnpilhplaeedifhccceomclgfbg?hl=en-US
- Edit This Cookie is a cookie manager. You can add, delete, edit, search, protect and block cookies
- Cookie swap - https://chrome.google.com/webstore/detail/dffhipnliikkblkhpjapbecpmoilcama?hl=en-US
- Swap My Cookies is a session manager, it manages cookies, letting you login on any website with several different accounts.
- Firebug lite for Chrome"" - https://chrome.google.com/webstore/detail/bmagokdooijbeehmkpknfglimnifench
- Firebug Lite is not a substitute for Firebug, or Chrome Developer Tools. It is a tool to be used in conjunction with these tools. Firebug Lite provides the rich visual representation we are used to see in Firebug when it comes to HTML elements, DOM elements, and Box Model shading. It provides also some cool features like inspecting HTML elements with your mouse, and live editing CSS properties
- Session Manager"" - https://chrome.google.com/webstore/detail/bbcnbpafconjjigibnhbfmmgdbbkcjfi
- With Session Manager you can quickly save your current browser state and reload it whenever necessary. You can manage multiple sessions, rename or remove them from the session library. Each session remembers the state of the browser at its creation time, i.e the opened tabs and windows.
- Subgraph Vega - http://www.subgraph.com/products.html
- Vega is a free and open source scanner and testing platform to test the security of web applications. Vega can help you find and validate SQL Injection, Cross-Site Scripting (XSS), inadvertently disclosed sensitive information, and other vulnerabilities. It is written in Java, GUI based, and runs on Linux, OS X, and Windows.
Testing for specific vulnerabilities
Testing for JavaScript Security, DOM XSS
- BlueClosure BC Detect - http://www.blueclosure.com
Testing AJAX
Testing for SQL Injection
- OWASP SQLiX
- Sqlninja: a SQL Server Injection & Takeover Tool - http://sqlninja.sourceforge.net
- Bernardo Damele A. G.: sqlmap, automatic SQL injection tool - http://sqlmap.org/
- Absinthe 1.1 (formerly SQLSqueal) - http://sourceforge.net/projects/absinthe/
- SQLInjector - Uses inference techniques to extract data and determine the backend database server. http://www.databasesecurity.com/sql-injector.htm
- Bsqlbf-v2: A perl script allows extraction of data from Blind SQL Injections - http://code.google.com/p/bsqlbf-v2/
- Pangolin: An automatic SQL injection penetration testing tool - http://www.darknet.org.uk/2009/05/pangolin-automatic-sql-injection-tool/
- Antonio Parata: Dump Files by sql inference on Mysql - SqlDumper - http://www.ruizata.com/
- Multiple DBMS Sql Injection tool - SQL Power Injector - http://www.sqlpowerinjector.com/
- MySql Blind Injection Bruteforcing, Reversing.org - sqlbftools - http://packetstormsecurity.org/files/43795/sqlbftools-1.2.tar.gz.html
Testing Oracle
- TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html
- Toad for Oracle - http://www.quest.com/toad
Testing SSL
- Foundstone SSL Digger - http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx
- O-Saft - https://www.owasp.org/index.php/O-Saft
- sslyze - https://github.com/iSECPartners/sslyze
- TestSSLServer - http://www.bolet.org/TestSSLServer/
- SSLScan - http://sourceforge.net/projects/sslscan/
- SSLScan windows - https://github.com/rbsec/sslscan/releases
- SSLLabs - https://www.ssllabs.com/ssltest/
- High-Tech Bridge ImmuniWeb SSLScan - https://www.htbridge.com/ssl/
Testing for Brute Force Password
- THC Hydra - http://www.thc.org/thc-hydra/
- John the Ripper - http://www.openwall.com/john/
- Brutus - http://www.hoobie.net/brutus/
- Medusa - http://www.foofus.net/~jmk/medusa/medusa.html
- Ncat - http://nmap.org/ncat/
- HashCat - http://hashcat.net/hashcat/#features-algos
- fgdump - http://foofus.net/goons/fizzgig/fgdump/
- Password Dictionary - https://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm
Testing Buffer Overflow
- OllyDbg - http://www.ollydbg.de
- "A windows based debugger used for analyzing buffer overflow vulnerabilities"
- Spike - http://www.immunitysec.com/downloads/SPIKE2.9.tgz
- A fuzzer framework that can be used to explore vulnerabilities and perform length testing
- Brute Force Binary Tester (BFB) - http://bfbtester.sourceforge.net
- A proactive binary checker
- Metasploit - http://www.metasploit.com/
- A rapid exploit development and Testing frame work
Fuzzer
- OWASP WSFuzzer
- Wfuzz - http://www.darknet.org.uk/2007/07/wfuzz-a-tool-for-bruteforcingfuzzing-web-applications/
Googling
- Bishop Fox's Google Hacking Diggity Project - http://www.bishopfox.com/resources/tools/google-hacking-diggity/
- Foundstone Sitedigger (Google cached fault-finding) - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx
- Google Hacking database - https://www.exploit-db.com/google-hacking-database/
Slow HTTP
- Slowloris http://ckers.org/slowloris
- slowhttptest https://github.com/shekyan/slowhttptest
Commercial Black Box Testing tools
- NGS Typhon III - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-typhon-iii/
- NGSSQuirreL - http://www.nccgroup.com/en/our-services/security-testing-audit-compliance/information-security-software/ngs-squirrel-vulnerability-scanners/
- IBM AppScan - http://www-01.ibm.com/software/awdtools/appscan/
- Trustwave App Scanner (Formerly Cenzic Hailstorm) - https://www.trustwave.com/Products/Application-Security/App-Scanner-Family/App-Scanner-Enterprise/
- Burp Intruder - http://www.portswigger.net/burp/intruder.html
- Acunetix Web Vulnerability Scanner - http://www.acunetix.com
- Sleuth - http://www.sandsprite.com
- NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php
- MaxPatrol Security Scanner - http://www.maxpatrol.com
- Ecyware GreenBlue Inspector - http://www.ecyware.com
- Parasoft SOAtest (more QA-type tool)- http://www.parasoft.com/jsp/products/soatest.jsp?itemId=101
- MatriXay - http://www.dbappsecurity.com/webscan.html
- N-Stalker Web Application Security Scanner - http://www.nstalker.com
- HP WebInspect - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-webinspect
- SoapUI (Web Service security testing) - http://www.soapui.org/Security/getting-started.html
- Netsparker - http://www.mavitunasecurity.com/netsparker/
- SAINT - http://www.saintcorporation.com/
- QualysGuard WAS - http://www.qualys.com/enterprises/qualysguard/web-application-scanning/
- Indusface WAS- https://www.indusface.com/products/application-security/web-application-scanning
- Retina Web - http://www.eeye.com/Products/Retina/Web-Security-Scanner.aspx
Linux Distrubtion
- PenTestBox https://tools.pentestbox.com/
- Samurai https://sourceforge.net/p/samurai/wiki/Home/
- Santoku https://sourceforge.net/projects/santoku/
- ParrotSecurity https://sourceforge.net/projects/parrotsecurity/?source=navbar
- Kali https://www.kali.org/
- Matriux https://sourceforge.net/projects/matriux/?source=navbar
- BlackArch http://www.blackarch.org/downloads.html
- Cyborg Hawk Linux http://cyborg.ztrela.com/tools/
- PenToo http://www.pentoo.ch/download/
- bugtraq http://bugtraq-team.com/
Source Code Analyzers
Open Source / Freeware
- Owasp Orizon
- OWASP LAPSE
- OWASP O2 Platform
- OWASP WAP-Web Application Protection
- Boon - http://www.cs.berkeley.edu/~daw/boon
- FindBugs - http://findbugs.sourceforge.net
- Find Security Bugs - https://find-sec-bugs.github.io/
- FlawFinder - http://www.dwheeler.com/flawfinder
- Google CodeSearchDiggity - http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/
- phpcs-security-audit - https://github.com/FloeDesignTechnologies/phpcs-security-audit
- PMD - http://pmd.sourceforge.net/
- Microsoft’s FxCop
- .NET Security Guard - https://dotnet-security-guard.github.io/
- Oedipus - http://www.darknet.org.uk/2006/06/oedipus-open-source-web-application-security-analysis/
- Puma Scan - https://pumascan.com
- Splint - http://splint.org
- SonarQube - http://sonarqube.org
- W3af - http://w3af.sourceforge.net/
- RIPS Open Source - http://rips-scanner.sourceforge.net/
Commercial
- RIPS - https://www.ripstech.com/product/
- Armorize CodeSecure - http://www.armorize.com/index.php?link_id=codesecure
- Parasoft C/C++ test - http://www.parasoft.com/jsp/products/cpptest.jsp/index.htm
- Checkmarx CxSuite - http://www.checkmarx.com
- HP Fortify - http://www.hpenterprisesecurity.com/products/hp-fortify-software-security-center/hp-fortify-static-code-analyzer
- GrammaTech CodeSonar - http://www.grammatech.com
- ITS4 - http://seclab.cs.ucdavis.edu/projects/testing/tools/its4.html
- Appscan - http://www-01.ibm.com/software/rational/products/appscan/source/
- ParaSoft - http://www.parasoft.com
- Puma Scan Professional - https://pumascanpro.com
- Virtual Forge CodeProfiler for ABAP - http://www.virtualforge.de
- Veracode - http://www.veracode.com
- Armorize CodeSecure - http://www.armorize.com/codesecure/
- Peach Fuzzer - http://www.peachfuzzer.com/
- Burp Suite - https://portswigger.net/burp/
Acceptance Testing Tools
Acceptance testing tools are used to validate the functionality of web applications. Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases. Most, if not all, can be adapted to perform security specific tests in addition to functional tests.
- BDD Security - https://github.com/continuumsecurity/bdd-security
Open Source Tools
- WATIR - http://wtr.rubyforge.org
- A Ruby based web testing framework that provides an interface into Internet Explorer.
- Windows only.
- HtmlUnit - http://htmlunit.sourceforge.net
- A Java and JUnit based framework that uses the Apache HttpClient as the transport.
- Very robust and configurable and is used as the engine for a number of other testing tools.
- jWebUnit - http://jwebunit.sourceforge.net
- A Java based meta-framework that uses htmlunit or selenium as the testing engine.
- Canoo Webtest - http://webtest.canoo.com
- An XML based testing tool that provides a facade on top of htmlunit.
- No coding is necessary as the tests are completely specified in XML.
- There is the option of scripting some elements in Groovy if XML does not suffice.
- Very actively maintained.
- HttpUnit - http://httpunit.sourceforge.net
- One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.
- Watij - http://watij.com
- A Java implementation of WATIR.
- Windows only because it uses IE for its tests (Mozilla integration is in the works).
- Solex - http://solex.sourceforge.net
- An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.
- Selenium - http://seleniumhq.org/
- JavaScript based testing framework, cross-platform and provides a GUI for creating tests.
- Mature and popular tool, but the use of JavaScript could hamper certain security tests.
Other Tools
Runtime Analysis
- Rational PurifyPlus - http://www-01.ibm.com/software/awdtools/purify/
- Seeker by Quotium - http://www.quotium.com/prod/security.php
Binary Analysis
- BugScam IDC Package - http://sourceforge.net/projects/bugscam
- Veracode - http://www.veracode.com
Requirements Management
- Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro
Site Mirroring
- wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html
- curl - http://curl.haxx.se
- Sam Spade - http://www.samspade.org
- Xenu's Link Sleuth - http://home.snafu.de/tilman/xenulink.html