What is Scanners-Box?
Scanners-Box is a curated collection of 200+ open-source cybersecurity tools for security professionals, penetration testers, and ethical hackers. Originally created for the Chinese security community (t00ls), it covers every aspect of cybersecurity from reconnaissance to exploitation.
GitHub: https://github.com/luckybbjason1/Scanners-Box
License: Open Source Collection
Tools Count: 200+
Categories: 15+
Tool Categories Overview
| Category | Tool Count | Examples |
|---|---|---|
| Subdomain Enumeration | 15+ | subDomainsBrute, amass, subfinder, OneForAll |
| Database & SQL Injection | 10+ | sqlmap, jsql-injection, SQLiScanner, NoSQLAttack |
| Fuzzing Tools | 20+ | AFL, honggfuzz, syzkaller, libFuzzer |
| Port Scanning & Fingerprinting | 25+ | Nmap, masscan, whatweb, wafw00f |
| Weak Password & Info Leak | 15+ | htpwdScan, BBScan, GitHack, truffleHog |
| IoT Device Scanning | 5+ | IoTSeeker, RouterSploit, routersploit |
| XSS Exploitation | 10+ | BruteXSS, XSS-Radar, XSSTracer, easyXssPayload |
| Social Engineering | 15+ | SET, gophish, evilginx2, blackeye |
| WebShell Detection | 10+ | findWebshell, HaboMalHunter, PHP-Shell-Detector |
| Enterprise Network Audit | 5+ | theHarvester, xunfeng, LNScan |
| Vulnerability Scanners | 15+ | vulfocus, vulhub, VulApps, upload-labs |
| Wireless Security | 5+ | fern-wifi-cracker, aircrack-ng |
| Asset Discovery | 5+ | linglong, H, nemo_go, NextScan |
| Threat Intelligence | 3+ | threat-intelligence, VirusTotal, ThreatBook |
| Learning Resources | 20+ | sec-wiki, FreeBuf, Web Hacking 101 |
Featured Tools Deep Dive
1. Subdomain Enumeration
OneForAll — The most comprehensive subdomain collection tool
- Integrates 20+ data sources
- Supports API keys for better results
- Export to various formats
amass — Go-based subdomain enumeration
- Fast and efficient
- DNS, scraping, and certificate transparency
- Graph visualization output
2. SQL Injection
sqlmap — The king of SQL injection tools
- Automatic detection and exploitation
- Support for 6 database types
- Tamper scripts for WAF bypass
1# Basic usage
2sqlmap -u "http://target.com/page.php?id=1" --dbs
3
4# Dump specific table
5sqlmap -u "http://target.com/page.php?id=1" -D database -T users --dump
3. Fuzzing Frameworks
AFL (American Fuzzy Lop) — Coverage-guided fuzzing
- Discovers vulnerabilities automatically
- Generates test cases
- Found 1000s of bugs in real software
syzkaller — Linux kernel fuzzer
- Found 3000+ Linux kernel bugs
- Used by Google, Microsoft
- Supports multiple operating systems
4. Port Scanning
Nmap — The network scanner king
1# Basic scan
2nmap -sV -sC target.com
3
4# Full port scan with scripts
5nmap -p- -sV --script=vuln target.com
6
7# Aggressive scan
8nmap -A target.com
masscan — Fastest Internet port scanner
- Scan entire Internet in 6 minutes
- Compatible with Nmap
- Asynchronous transmission
5. Social Engineering Toolkit
SET (Social-Engineer Toolkit) — Complete phishing framework
- Website cloning
- Email spear-phishing
- Credential harvesting
- Multi-attack vectors
evilginx2 — Bypass 2FA phishing framework
- Man-in-the-middle attack
- Session cookie capture
- Bypass two-factor authentication
Security Learning Resources
For Beginners
- sec-wiki — Security Wikipedia
- FreeBuf — Hacker and geek news
- Web Hacking 101 — Web security basics
- Kali Linux Web Pentest Cookbook
For Intermediate
- Burpsuite — Web penetration testing
- API-Security-Checklist — API security best practices
- Web-Security-Learning — Comprehensive web security
- **** — Emergency response
Advanced Topics
- Linux exploit development tutorial
- Android penetration testing
- Node.js Web security issues
- Python security series
Vulnerable Targets for Practice
| Platform | Description | Link |
|---|---|---|
| vulfocus | Docker-based vulnerability platform | GitHub |
| vulhub | Pre-built vulnerable environments | GitHub |
| VulApps | Vulnerable application collection | GitHub |
| upload-labs | File upload vulnerability practice | GitHub |
| bWAPP | Buggy Web Application | SourceForge |
| DVWA | Damn Vulnerable Web Application | GitHub |
| WebGoat | OWASP Web security practice | GitHub |
Responsible Disclosure
⚠️ Warning: All tools listed here are for authorized security testing only. Using these tools against systems without explicit permission is illegal and unethical.
Legal Framework
- CFAA (Computer Fraud and Abuse Act) — US
- Computer Misuse Act — UK
- Cybersecurity Law — China
- GDPR — EU data protection
Best Practices
- Always obtain written authorization
- Define scope clearly
- Respect business hours
- Report findings promptly
- Destroy data after testing
Tool Selection Guide
Web Application Testing
1Reconnaissance: amass, subfinder, theHarvester
2Scanning: Nmap, masscan, whatweb
3Vulnerability: sqlmap, XSS scanners, dirsearch
4Exploitation: Burp Suite, custom scripts
5Reporting: Dradis, Faraday
Network Penetration Testing
1Discovery: Nmap, masscan, nbtscan
2Enumeration: enum4linux, snmp-check
3Vulnerability: OpenVAS, Nessus
4Exploitation: Metasploit, Cobalt Strike
5Post-exploitation: PowerShell Empire, Mimikatz
Red Team Operations
1Initial Access: SET, gophish, evilginx2
2Persistence: Custom implants, scheduled tasks
3Privilege Escalation: PowerUp, BeRoot
4Lateral Movement: Pass-the-hash, Kerberoasting
5Exfiltration: DNS tunneling, HTTPS C2
Related Articles
- Agent Reach: AI Agent Internet Access — AI-powered security automation
- Code Vault: 7 Crypto Trading Tools — Financial security tools
- Free Claude Code: Open Source AI Coding — Secure coding practices
Disclaimer: This article is for educational purposes only. All tools should be used responsibly and only on systems you own or have explicit permission to test. The author and dibi8.com are not responsible for any misuse of the information provided.
Have questions or ideas? Feel free to leave a comment below. Sign in with GitHub to join the discussion.