• Foremost

    A free and open-source Linux-based file recovery tool for forensic analysis. Foremost is intended for law enforcement purposes but supports other use cases.

  • Fping

    Fping is a small command line tool to send ICMP (Internet Control Message Protocol) echo request to network hosts, similar to ping, but much higher performing when pinging multiple hosts. Fping totally differs from ping in that you can define any number of hosts on the command line or specify a file with the list of IP addresses or hosts to ping.

  • Gau

    Gau is used for finding the URLs of the target website. This tool is used to find all URLs from a website/web application. This tool helps to get subdomains of all HTTPS as well as HTTP websites.

  • Getsploit

    Command line utility for searching and downloading exploits

  • Ghost Phisher

    A free and open-source wireless and ethernet phishing tool. Ghost Phisher supports features such as webpage hosting, credential logging, Wi-Fi access point emulation, session hijacking, and more.

  • GitOops

    All paths lead to clouds. GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls.

  • Gobuster

    Gobuster is a fast brute-force tool to discover hidden URLs, files, and directories within websites. This will help us to remove/secure hidden files and sensitive data.

  • Gophish

    A free and open-source phishing toolkit for organizations. GoPhish can run on Windows, macOS, and Linux and lets users quickly and easily spin up phishing attacks.

  • Grendel-Scan

    A free and open-source automated web application scanning tool. Grendel-Scan also supports features for manual security testing.

  • GRR Rapid Response

    GRR Rapid Response: remote live forensics for incident response.

  • Gssapi-Abuse

    A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks.

  • Hakoriginfinder

    Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!