What is Scanners-Box?

Scanners-Box is a curated collection of 200+ open-source cybersecurity tools for security professionals, penetration testers, and ethical hackers. Originally created for the Chinese security community (t00ls), it covers every aspect of cybersecurity from reconnaissance to exploitation.

GitHub: https://github.com/luckybbjason1/Scanners-Box
License: Open Source Collection
Tools Count: 200+
Categories: 15+


Tool Categories Overview

CategoryTool CountExamples
Subdomain Enumeration15+subDomainsBrute, amass, subfinder, OneForAll
Database & SQL Injection10+sqlmap, jsql-injection, SQLiScanner, NoSQLAttack
Fuzzing Tools20+AFL, honggfuzz, syzkaller, libFuzzer
Port Scanning & Fingerprinting25+Nmap, masscan, whatweb, wafw00f
Weak Password & Info Leak15+htpwdScan, BBScan, GitHack, truffleHog
IoT Device Scanning5+IoTSeeker, RouterSploit, routersploit
XSS Exploitation10+BruteXSS, XSS-Radar, XSSTracer, easyXssPayload
Social Engineering15+SET, gophish, evilginx2, blackeye
WebShell Detection10+findWebshell, HaboMalHunter, PHP-Shell-Detector
Enterprise Network Audit5+theHarvester, xunfeng, LNScan
Vulnerability Scanners15+vulfocus, vulhub, VulApps, upload-labs
Wireless Security5+fern-wifi-cracker, aircrack-ng
Asset Discovery5+linglong, H, nemo_go, NextScan
Threat Intelligence3+threat-intelligence, VirusTotal, ThreatBook
Learning Resources20+sec-wiki, FreeBuf, Web Hacking 101

1. Subdomain Enumeration

OneForAll — The most comprehensive subdomain collection tool

  • Integrates 20+ data sources
  • Supports API keys for better results
  • Export to various formats

amass — Go-based subdomain enumeration

  • Fast and efficient
  • DNS, scraping, and certificate transparency
  • Graph visualization output

2. SQL Injection

sqlmap — The king of SQL injection tools

  • Automatic detection and exploitation
  • Support for 6 database types
  • Tamper scripts for WAF bypass
# Basic usage
sqlmap -u "http://target.com/page.php?id=1" --dbs

# Dump specific table
sqlmap -u "http://target.com/page.php?id=1" -D database -T users --dump

3. Fuzzing Frameworks

AFL (American Fuzzy Lop) — Coverage-guided fuzzing

  • Discovers vulnerabilities automatically
  • Generates test cases
  • Found 1000s of bugs in real software

syzkaller — Linux kernel fuzzer

  • Found 3000+ Linux kernel bugs
  • Used by Google, Microsoft
  • Supports multiple operating systems

4. Port Scanning

Nmap — The network scanner king

# Basic scan
nmap -sV -sC target.com

# Full port scan with scripts
nmap -p- -sV --script=vuln target.com

# Aggressive scan
nmap -A target.com

masscan — Fastest Internet port scanner

  • Scan entire Internet in 6 minutes
  • Compatible with Nmap
  • Asynchronous transmission

5. Social Engineering Toolkit

SET (Social-Engineer Toolkit) — Complete phishing framework

  • Website cloning
  • Email spear-phishing
  • Credential harvesting
  • Multi-attack vectors

evilginx2 — Bypass 2FA phishing framework

  • Man-in-the-middle attack
  • Session cookie capture
  • Bypass two-factor authentication

Security Learning Resources

For Beginners

  • sec-wiki — Security Wikipedia
  • FreeBuf — Hacker and geek news
  • Web Hacking 101 — Web security basics
  • Kali Linux Web Pentest Cookbook

For Intermediate

  • Burpsuite实战指南 — Web penetration testing
  • API-Security-Checklist — API security best practices
  • Web-Security-Learning — Comprehensive web security
  • 应急响应实战笔记 — Emergency response

Advanced Topics

  • Linux exploit development tutorial
  • Android penetration testing
  • Node.js Web security issues
  • Python security series

Vulnerable Targets for Practice

PlatformDescriptionLink
vulfocusDocker-based vulnerability platformGitHub
vulhubPre-built vulnerable environmentsGitHub
VulAppsVulnerable application collectionGitHub
upload-labsFile upload vulnerability practiceGitHub
bWAPPBuggy Web ApplicationSourceForge
DVWADamn Vulnerable Web ApplicationGitHub
WebGoatOWASP Web security practiceGitHub

Responsible Disclosure

⚠️ Warning: All tools listed here are for authorized security testing only. Using these tools against systems without explicit permission is illegal and unethical.

  • CFAA (Computer Fraud and Abuse Act) — US
  • Computer Misuse Act — UK
  • Cybersecurity Law — China
  • GDPR — EU data protection

Best Practices

  1. Always obtain written authorization
  2. Define scope clearly
  3. Respect business hours
  4. Report findings promptly
  5. Destroy data after testing

Tool Selection Guide

Web Application Testing

Reconnaissance: amass, subfinder, theHarvester
Scanning: Nmap, masscan, whatweb
Vulnerability: sqlmap, XSS scanners, dirsearch
Exploitation: Burp Suite, custom scripts
Reporting: Dradis, Faraday

Network Penetration Testing

Discovery: Nmap, masscan, nbtscan
Enumeration: enum4linux, snmp-check
Vulnerability: OpenVAS, Nessus
Exploitation: Metasploit, Cobalt Strike
Post-exploitation: PowerShell Empire, Mimikatz

Red Team Operations

Initial Access: SET, gophish, evilginx2
Persistence: Custom implants, scheduled tasks
Privilege Escalation: PowerUp, BeRoot
Lateral Movement: Pass-the-hash, Kerberoasting
Exfiltration: DNS tunneling, HTTPS C2


Disclaimer: This article is for educational purposes only. All tools should be used responsibly and only on systems you own or have explicit permission to test. The author and dibi8.com are not responsible for any misuse of the information provided.