MoeWalls
Security Resources
A curated collection of tools, platforms, and resources for CTF competitions and security research.
Learning Platforms
| Resource | Description |
|---|---|
| HackTheBox | Online platform for practicing penetration testing skills |
| TryHackMe | Guided cybersecurity training with hands-on labs |
| PortSwigger Web Security Academy | Free web security training from Burp Suite creators |
| PentesterLab | Hands-on web penetration testing exercises |
| OverTheWire | Wargames to learn security concepts |
| picoCTF | Beginner-friendly CTF platform |
| Root-Me | Challenges and virtual environments |
| pwnable.kr | Pwn challenges for binary exploitation |
Web Security
| Tool | Description |
|---|---|
| Burp Suite | Web application security testing |
| OWASP ZAP | Open source web app scanner |
| SQLMap | Automatic SQL injection tool |
| Nikto | Web server scanner |
| Gobuster | Directory/DNS busting tool |
| ffuf | Fast web fuzzer |
| CSP Evaluator | Content Security Policy analyzer |
| JWT.io | JWT decoder and debugger |
| RequestBin | HTTP request collector |
| Webhook.site | Webhook testing and debugging |
Cryptography
| Tool | Description |
|---|---|
| CyberChef | The cyber swiss army knife - encoding, encryption, compression |
| dCode | Cipher identifier and decoder |
| CrackStation | Online hash cracking |
| FactorDB | Integer factorization database |
| RsaCtfTool | RSA attack tool |
| QuipQiup | Substitution cipher solver |
| Boxentriq | Code breaking tools collection |
| SageMath | Mathematical software for crypto |
Forensics & Steganography
| Tool | Description |
|---|---|
| Aperi’Solve | Online steganography analysis |
| StegOnline | Online image steganography tool |
| Stegsolve | Image analysis for hidden data |
| Binwalk | Firmware analysis and extraction |
| Foremost | File recovery tool |
| Volatility | Memory forensics framework |
| Autopsy | Digital forensics platform |
| Wireshark | Network protocol analyzer |
| Exiftool | Metadata reader/writer |
| zsteg | PNG/BMP steganography detector |
OSINT
| Tool | Description |
|---|---|
| Shodan | Search engine for Internet-connected devices |
| Censys | Internet-wide scanning and search |
| Wayback Machine | Internet archive for historical snapshots |
| Hunter.io | Email finder tool |
| Sherlock | Username search across social networks |
| theHarvester | OSINT gathering tool |
| OSINT Framework | Collection of OSINT tools |
| Maltego | Interactive data mining |
Reverse Engineering
| Tool | Description |
|---|---|
| Ghidra | NSA’s reverse engineering suite |
| IDA Free | Interactive disassembler |
| Binary Ninja | Reverse engineering platform |
| Radare2 | Open source RE framework |
| Dogbolt | Online decompiler explorer |
| GDB | GNU debugger |
| pwndbg | GDB plugin for exploit dev |
| x64dbg | Windows debugger |
Password Cracking
| Tool | Description |
|---|---|
| Hashcat | Advanced password recovery |
| John the Ripper | Password cracker |
| CrackStation | Online hash lookup |
| Hashes.com | Hash decryption service |
| SecLists | Security wordlists collection |
| RockYou | Famous password wordlist |
CTF Platforms & Wargames
| Platform | Description |
|---|---|
| HackTheBox | Penetration testing labs |
| TryHackMe | Guided learning paths |
| VulnHub | Vulnerable VMs for practice |
| CTFtime | CTF event calendar and rankings |
| picoCTF | Educational CTF |
| CryptoHack | Cryptography challenges |
| Pwnable.xyz | Pwn challenges |
| Exploit Education | Binary exploitation learning |
Useful Utilities
| Tool | Description |
|---|---|
| CyberChef | Data transformation tool |
| Regex101 | Regular expression tester |
| RevShells | Reverse shell generator |
| GTFOBins | Unix binary exploitation |
| LOLBAS | Windows living-off-the-land binaries |
| PayloadsAllTheThings | Payload collection |
| HackTricks | Hacking tricks encyclopedia |
| ExploitDB | Exploit database |
Cheatsheets
| Resource | Description |
|---|---|
| Cheatsheet-God | Massive cheatsheet collection |
| CTF Tools | CTF tools compilation |
| PayloadsAllTheThings | Web attack payloads |
| HackTricks | Pentesting methodology |
| OWASP Cheat Sheet | Security best practices |
| Search CTF Writeups | CTF DataBase |
“The quieter you become, the more you can hear.” - Ram Dass