Parrot - Distribution similar to Kali, with multiple architecture.
Buscador - GNU/Linux virtual machine that is pre-configured for online investigators.
Fedora Security Lab - Provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies.
The Pentesters Framework - Distro organized around the Penetration Testing Execution Standard (PTES), providing a curated collection of utilities that eliminates often unused toolchains.
dnschef - Highly configurable DNS proxy for pentesters.
DNSDumpster - Online DNS recon and search service.
CloudFail - Unmask server IP addresses hidden behind Cloudflare by searching old database records and detecting misconfigured DNS.
dnsenum - Perl script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.
tls_prober - Fingerprint a server's SSL/TLS implementation.
Web exploitation
OWASP Zed Attack Proxy (ZAP) - Feature-rich, scriptable HTTP intercepting proxy and fuzzer for penetration testing web applications.
Fiddler - Free cross-platform web debugging proxy with user-friendly companion tools.
Burp Suite - Integrated platform for performing security testing of web applications.
autochrome - Easy to install a test browser with all the appropriate setting needed for web application testing with native Burp support, from NCCGroup.
Wordpress Exploit Framework - Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.
WPSploit - Exploit WordPress-powered websites with Metasploit.
SQLmap - Automatic SQL injection and database takeover tool.
tplmap - Automatic server-side template injection and Web server takeover tool.
Kaitai Struct - File formats and network protocols dissection language and web IDE, generating parsers in C++, C#, Java, JavaScript, Perl, PHP, Python, Ruby.
Veles - Binary data visualization and analysis tool.
Hachoir - Python library to view and edit a binary stream as tree of fields and tools for metadata extraction.
UFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
社会工程学工具
Social Engineer Toolkit (SET) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly.
King Phisher - Phishing campaign toolkit used for creating and managing multiple simultaneous phishing attacks with custom email and server content.
Evilginx - MITM attack framework used for phishing credentials and session cookies from any Web service.
wifiphisher - Automated phishing attacks against WiFi networks.
Catphish - Tool for phishing and corporate espionage written in Ruby.
逆向分析工具
IDA Pro - Windows, GNU/Linux or macOS hosted multi-processor disassembler and debugger.
National Vulnerability Database (NVD) - United States government's National Vulnerability Database provides additional meta-data (CPE, CVSS scoring) of the standard CVE List along with a fine-grained search engine.
US-CERT Vulnerability Notes Database - Summaries, technical details, remediation information, and lists of vendors affected by software vulnerabilities, aggregated by the United States Computer Emergency Response Team (US-CERT).
Full-Disclosure - Public, vendor-neutral forum for detailed discussion of vulnerabilities, often publishes details before many other sources.
Bugtraq (BID) - Software security bug identification database compiled from submissions to the SecurityFocus mailing list and other sources, operated by Symantec, Inc.
Exploit-DB - Non-profit project hosting exploits for software vulnerabilities, provided as a public service by Offensive Security.
Microsoft Security Bulletins - Announcements of security issues discovered in Microsoft software, published by the Microsoft Security Response Center (MSRC).
Packet Storm - Compendium of exploits, advisories, tools, and other security-related resources aggregated from across the industry.
CXSecurity - Archive of published CVE and Bugtraq software vulnerabilities cross-referenced with a Google dork database for discovering the listed vulnerability.
SecuriTeam - Independent source of software vulnerability information.
Vulnerability Lab - Open forum for security advisories organized by category of exploit target.
Zero Day Initiative - Bug bounty program with publicly accessible archive of published security advisories, operated by TippingPoint.
Vulners - Security database of software vulnerabilities.
Inj3ct0r (Onion service) - Exploit marketplace and vulnerability information aggregator.
CTF Field Guide - Everything you need to win your next CTF competition.
ARIZONA CYBER WARFARE RANGE - 24x7 live fire exercises for beginners through real world operations; capability for upward progression into the real world of cyber warfare.
Cybrary - Free courses in ethical hacking and advanced penetration testing. Advanced penetration testing courses are based on the book 'Penetration Testing for Highly Secured Enviroments'.
Computer Security Student - Many free tutorials, great for beginners, $10/mo membership unlocks all content.