Here you can find my usual “go-to” toolkit for CTFs, Reverse Engineering, Modding or other fun stuff.

For obvious reasons, I do not condone the usage of these tools in malicious or illegal contexts. Please don’t aim them at random infrastructure unless you enjoy emails from legal departments.

Recon & Enumeration
  • RustScan - Blazing Fast Port Scanner

    Rust-based scanner built to complement Nmap. Can scan all 65k ports in seconds before handing results to deeper scanners.

  • MassScan - High-Speed SYN Scanner

    Asynchronous scanner capable of millions of packets per second. Extremely fast. Extremely noisy.

  • Naabu - Bug Bounty Friendly Port Scanner

    Fast and stable port scanner commonly used in automated bounty pipelines.

  • Feroxbuster - Recursive Content Discovery

    Bruteforces directories and files with recursion support for endpoint discovery.

  • KiteRunner - Recursive Web Permutation Tool

    Performs large-scale recursive wordlist permutations for web discovery.

  • Arjun - HTTP Parameter Discovery

    Automates parameter fuzzing across multiple HTTP methods to discover hidden parameters.

  • crt.sh - Certificate Transparency Search

    Useful for discovering subdomains via CT logs.

  • Subfinder - Passive Subdomain Enumeration

    Gathers subdomains from passive online sources.

  • httpx-toolkit - Mass HTTP Probing

    Validates large domain lists and checks which targets are alive.


Access & Shells
  • RevShells - Reverse Shell Generator

    Flexible reverse shell generator covering multiple languages and techniques.

  • Hoaxshell - Windows Reverse Shell Generator

    Previously low-detection Windows reverse shell generator. Reliability may vary depending on modern defenses.

  • p0wny-shell - Minimal PHP Web Shell

    Lightweight in-browser PHP shell deployed via file upload vulnerabilities.

  • wwwolf PHP Webshell - Cross-Platform PHP Shell

    Works on UNIX and Windows systems without modification.


Exploitation & Priv Esc
  • PayloadsAllTheThings - Payload Encyclopedia

    Large curated list of payloads for web and infrastructure exploitation.

  • Responder - Credential Poisoner

    Captures credentials via LLMNR/NBT-NS/MDNS poisoning in Windows networks.

  • Chisel - HTTP/SSH Tunneling Tool

    Lightweight pivoting and firewall bypass tool.

  • RunasCs - Alternate Credential Execution

    Runs Windows processes under different user contexts.

  • SweetPotato - Windows Privilege Escalation Toolkit

    Consolidates multiple Windows privilege escalation techniques.

  • PEASS-ng - Privilege Escalation Scripts Suite

    Comprehensive Windows and Linux scripts highlighting misconfigurations and escalation paths.

  • GTFOBins - UNIX Binary Abuse Reference

    Catalog of UNIX binaries that can be abused for privilege escalation or breakout.

  • LOLBAS - Windows Binary Abuse Reference

    Windows counterpart to GTFOBins for “living off the land” techniques.


Cryptography & Data Analysis
  • CyberChef - Data Transformation Toolkit

    Web-based tool for encoding, decoding, encryption, compression, and analysis workflows.

  • Ares - Automatic Cipher Solver

    Attempts to identify and decrypt unknown encodings or ciphers.

  • RsaCtfTool - RSA Attack Toolkit

    Multi-attack RSA analysis tool for weak configurations and CTF challenges.

  • Dcode - Cipher & Encoding Reference

    Large collection of classical cipher solvers and encoding utilities.

  • NTLM.pw - NTLM Hash Lookup Database

    Massive NTLM hash database useful for comparison during cracking attempts.


Hardware & Embedded Exploitation
  • PRET - Printer Exploitation Toolkit

    Interacts with printer services to execute commands and perform network recon.

  • RouterSploit - Embedded Device Exploitation Framework

    Framework for exploiting routers, IP cameras, and embedded devices.


OSINT
  • Google - Search Engine

    Advanced search operators and dorking remain foundational OSINT techniques.

  • TinEye - Reverse Image Search

    Strong for tracking image reuse across the web.

  • Yandex - Alternative Reverse Image Search

    Often better at surfacing older or less indexed images.

  • FastPeopleSearch - US Public Index

    Aggregated public records search. May require US VPN access.

  • CyberBackgroundChecks - US Records Index

    Similar public data aggregation service.

  • Sherlock - Username Enumeration Tool

    Checks username presence across many social platforms.

  • Maigret - Expanded Username Hunter

    Fork of Sherlock with broader site coverage and Tor support.

  • Holehe - Email Account Discovery Tool

    Checks if an email is linked to various social media services without alerting the target.

  • Toutatis - Instagram Information Tool

    Extracts publicly accessible Instagram account data.

  • PhoneInfoGa - Phone Recon Framework

    Generates Google Dork schemes and integrates with APIs for phone number intelligence.

  • Ignorant - Phone Number Social Check Tool

    Checks whether a phone number is associated with major platforms.


Disassemblers / Decompilers
  • IDA Pro - Industry Standard Disassembler

    Industry standard for a good reason. Hex-Rays decompiler and a massive plugin ecosystem make it hard to replace, despite it being sliiightly pricey..

  • Binary Ninja - The Cooler Disassembler

    Cleaner than IDA and much nicer to script and automate with. The IL lifting pipeline is genuinely great for writing custom analysis passes.

  • Binwalk - Firmware & Binary Analyser

    A big favourite here. Binwalk is amazing at extracting data embedded in binaries, as well as scoping out essential info like headers, compression blocks, RSA keys and more.

  • Detect It Easy (DIE) - Binary Identifier

    First thing I run on any kind of unknown file. It’ll tell you what you’re dealing with before you spend 3 minutes booting IDA.


Process Manipulation
  • System Informer - Process & System Monitor

    Process Hacker’s successor. Deep visibility into everything on the system — handles, threads, network connections, kernel activity. Also nice for injecting DLLs on the fly.

  • Process Monitor - Process Logging

    A Sysinternals classic. Watch exactly what a binary touches in real time — filesystem, registry, etc.

  • Frida - Dynamic Instrumentation Toolkit

    Injects a JS engine into live processes. Hook functions, intercept calls, patch memory on the fly. Works across pretty much every platform. Really nice when combined with IDA to poke at functions or dynamically read data in certain chunks of memory.

  • x64dbg - 64-bit Windows Debugger

    My go-to debugger for Windows RE. It’s a must-have when combined with the ScyllaHide plugin.

  • Charles - Network Request Proxy

    A neat little HTTP/HTTPS Proxy similar to Burp Suite, but for processes too. (Since Burp can’t intercept processes to my knowledge?..)


Binary Utilities
  • Offzip - Archive Extraction

    Pulls zlib/gzip/deflate-compressed data out of binaries that skip a proper container format or have chunks located at different offsets. Saves a lot of manual hex diving.

  • CyberChef - Data Transformation

    Browser-based but too useful not to include. Decoding, encoding, encryption, compression — CyberChef handles the transformation of all of that. Good for quick transforms without scripting anything.


Extras

BinaryNinja Plugins

  • Cryptoscan - Cryptography Scanner

    A recreation of IDA’s FindCrypt plugin. Helps identify constants for different encryption, compression and hashing algorithms.

x64Dbg Plugins

  • ScyllaHide - Anti-Debugger for x64Dbg

    An x64Dbg Plugin that automatically bumps off any anti-debug shenanigans so you can actually get work done without the crashes.

  • SwissArmyKnife - General Utility for x64Dbg

    An x64Dbg Plugin that implements loading of binary patches, code signatures, and my favourite, cipher key/constraint detection via Findcrypt.

  • ClawSearch - Cheat Engine Alternative for x64Dbg

    An x64Dbg Plugin that essentially replicates Cheat Engine’s scanning in a simpler form. I don’t like having Kernel Anti-Cheats on my system alongside Cheat Engine, so I use this. (I’ve known people to be banned simply for having it on your system.)


Unreal Engine
  • FModel - Asset Exploration

    A general purpose Asset Viewer and Extractor with great functionality. One of my favourites.

  • UModel - Asset Exploration

    A “legacy” tool for viewing and exporting meshes, textures and sounds. I rarely use this, but it’s a nice fallback and allows the creation of game “presets” through .BAT files.

  • UE4SS - Scripting Framework

    A great LUA/C++ scripting framework for UE4/5 with the ability to dump a huge variety of UE data.

  • Dumper-7 - SDK Generator

    An injectable designed to dump various class pointers and create SDKs for further modding/extraction.

  • UAssetGUI - Data Modification

    A simple GUI Editor for manipulating data within .uasset files.


Unity
  • AssetRipper - Asset Exploration

    A powerful asset extractor with the added ability to “rebuild” projects from pre-existing game files, essentially replicating a developer’s project file.

  • uTinyRipper - Asset Exploration

    A lightweight version of some other asset explorers available. Great for quick browsing or extraction of game files.

  • dnSpy - C# Decompiler

    An essential tool for decompiling and editing DLLs within Mono Unity games, or confusing yourself if you’re dealing with IL2Cpp.

  • Il2CppInspector - C++ Scaffolding

    An amazing toolsuite used to extract pointers, generate scaffolding for injection, create disassembler scripts, and defeat annoying types of obfuscation.