What is Scanners-Box?

Scanners-Box is a curated collection of 200+ open-source cybersecurity tools for security professionals, penetration testers, and ethical hackers. Originally created for the Chinese security community (t00ls), it covers every aspect of cybersecurity from reconnaissance to exploitation.

GitHub: https://github.com/luckybbjason1/Scanners-Box
License: Open Source Collection
Tools Count: 200+
Categories: 15+


Tool Categories Overview

CategoryTool CountExamples
Subdomain Enumeration15+subDomainsBrute, amass, subfinder, OneForAll
Database & SQL Injection10+sqlmap, jsql-injection, SQLiScanner, NoSQLAttack
Fuzzing Tools20+AFL, honggfuzz, syzkaller, libFuzzer
Port Scanning & Fingerprinting25+Nmap, masscan, whatweb, wafw00f
Weak Password & Info Leak15+htpwdScan, BBScan, GitHack, truffleHog
IoT Device Scanning5+IoTSeeker, RouterSploit, routersploit
XSS Exploitation10+BruteXSS, XSS-Radar, XSSTracer, easyXssPayload
Social Engineering15+SET, gophish, evilginx2, blackeye
WebShell Detection10+findWebshell, HaboMalHunter, PHP-Shell-Detector
Enterprise Network Audit5+theHarvester, xunfeng, LNScan
Vulnerability Scanners15+vulfocus, vulhub, VulApps, upload-labs
Wireless Security5+fern-wifi-cracker, aircrack-ng
Asset Discovery5+linglong, H, nemo_go, NextScan
Threat Intelligence3+threat-intelligence, VirusTotal, ThreatBook
Learning Resources20+sec-wiki, FreeBuf, Web Hacking 101

1. Subdomain Enumeration

OneForAll — The most comprehensive subdomain collection tool

  • Integrates 20+ data sources
  • Supports API keys for better results
  • Export to various formats

amass — Go-based subdomain enumeration

  • Fast and efficient
  • DNS, scraping, and certificate transparency
  • Graph visualization output

2. SQL Injection

sqlmap — The king of SQL injection tools

  • Automatic detection and exploitation
  • Support for 6 database types
  • Tamper scripts for WAF bypass
1# Basic usage
2sqlmap -u "http://target.com/page.php?id=1" --dbs
3
4# Dump specific table
5sqlmap -u "http://target.com/page.php?id=1" -D database -T users --dump

3. Fuzzing Frameworks

AFL (American Fuzzy Lop) — Coverage-guided fuzzing

  • Discovers vulnerabilities automatically
  • Generates test cases
  • Found 1000s of bugs in real software

syzkaller — Linux kernel fuzzer

  • Found 3000+ Linux kernel bugs
  • Used by Google, Microsoft
  • Supports multiple operating systems

4. Port Scanning

Nmap — The network scanner king

1# Basic scan
2nmap -sV -sC target.com
3
4# Full port scan with scripts
5nmap -p- -sV --script=vuln target.com
6
7# Aggressive scan
8nmap -A target.com

masscan — Fastest Internet port scanner

  • Scan entire Internet in 6 minutes
  • Compatible with Nmap
  • Asynchronous transmission

5. Social Engineering Toolkit

SET (Social-Engineer Toolkit) — Complete phishing framework

  • Website cloning
  • Email spear-phishing
  • Credential harvesting
  • Multi-attack vectors

evilginx2 — Bypass 2FA phishing framework

  • Man-in-the-middle attack
  • Session cookie capture
  • Bypass two-factor authentication

Security Learning Resources

For Beginners

  • sec-wiki — Security Wikipedia
  • FreeBuf — Hacker and geek news
  • Web Hacking 101 — Web security basics
  • Kali Linux Web Pentest Cookbook

For Intermediate

  • Burpsuite — Web penetration testing
  • API-Security-Checklist — API security best practices
  • Web-Security-Learning — Comprehensive web security
  • **** — Emergency response

Advanced Topics

  • Linux exploit development tutorial
  • Android penetration testing
  • Node.js Web security issues
  • Python security series

Vulnerable Targets for Practice

PlatformDescriptionLink
vulfocusDocker-based vulnerability platformGitHub
vulhubPre-built vulnerable environmentsGitHub
VulAppsVulnerable application collectionGitHub
upload-labsFile upload vulnerability practiceGitHub
bWAPPBuggy Web ApplicationSourceForge
DVWADamn Vulnerable Web ApplicationGitHub
WebGoatOWASP Web security practiceGitHub

Responsible Disclosure

⚠️ Warning: All tools listed here are for authorized security testing only. Using these tools against systems without explicit permission is illegal and unethical.

  • CFAA (Computer Fraud and Abuse Act) — US
  • Computer Misuse Act — UK
  • Cybersecurity Law — China
  • GDPR — EU data protection

Best Practices

  1. Always obtain written authorization
  2. Define scope clearly
  3. Respect business hours
  4. Report findings promptly
  5. Destroy data after testing

Tool Selection Guide

Web Application Testing

1Reconnaissance: amass, subfinder, theHarvester
2Scanning: Nmap, masscan, whatweb
3Vulnerability: sqlmap, XSS scanners, dirsearch
4Exploitation: Burp Suite, custom scripts
5Reporting: Dradis, Faraday

Network Penetration Testing

1Discovery: Nmap, masscan, nbtscan
2Enumeration: enum4linux, snmp-check
3Vulnerability: OpenVAS, Nessus
4Exploitation: Metasploit, Cobalt Strike
5Post-exploitation: PowerShell Empire, Mimikatz

Red Team Operations

1Initial Access: SET, gophish, evilginx2
2Persistence: Custom implants, scheduled tasks
3Privilege Escalation: PowerUp, BeRoot
4Lateral Movement: Pass-the-hash, Kerberoasting
5Exfiltration: DNS tunneling, HTTPS C2


Disclaimer: This article is for educational purposes only. All tools should be used responsibly and only on systems you own or have explicit permission to test. The author and dibi8.com are not responsible for any misuse of the information provided.