OWTF alternatives

Looking for an alternative tool to replace OWTF? During the review of OWTF we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. Metasploit Framework (penetration toolkit)
  2. fsociety (penetration testing framework)
  3. BetterCAP (MitM tool and framework)

These tools are ranked as the best alternatives to OWTF.

Alternatives (by score)

74

Metasploit Framework

Introduction

Metasploit is a framework that consists of tools to perform security assignments. It focuses on the offensive side of security and leverages exploit modules.

Project details

Metasploit Framework is written in Ruby.

Strengths and weaknesses

  • + More than 400 contributors
  • + More than 9000 stars
  • + Many maintainers
  • + The source code of this software is available
  • + Supported by a large company
  • + Well-known tool

    Typical usage

    • Penetration testing
    • Security assessment
    • Vulnerability scanning

    Metasploit Framework review

    64

    fsociety

    Introduction

    The fsociety toolkit is a penetration framework containing other security tools. The project states that is includes all the tools that are used in the Mr. Robot tv series.

    Project details

    fsociety is written in Python.

    Strengths and weaknesses

    • + More than 10 contributors
    • + More than 2000 GitHub stars
    • + The source code of this software is available
    • - Full name of author is unknown

    Typical usage

    • Penetration testing
    • Security assessment

    fsociety review

    100

    BetterCAP

    Introduction

    BetterCAP is often used by those who perform penetration testing and security assessments. This tool and framework is in particular useful for attempting man-in-the-middle attacks (MitM).

    Project details

    BetterCAP is written in Golang.

    Strengths and weaknesses

    • + More than 25 contributors
    • + More than 2000 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Bypassing security measures
      • Penetration testing
      • Security assessment

      BetterCAP review

      60

      Bowcaster

      Introduction

      Bowcaster is a framework to create exploits. It is written in Python and comes with a set of tool and modules to help exploit development.

      Project details

      Bowcaster is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available
      • - No updates for a while

      Typical usage

      • Exploit development
      • Penetration testing

      Bowcaster review

      60

      Kitty

      Introduction

      Kitty is a framework for those who want to do fuzzing unusual targets, like proprietary protocols. Although Kitty itself is not a fuzzing tool, it allows one to build a fuzzing tool.

      Project details

      Kitty is written in Python.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Application fuzzing

        Kitty review

        68

        Malice

        Introduction

        Malice is a malware analysis that wants to provide a free and open source version of VirusTotal. The goal of Malice is to make it usable by both independent researchers up to fortune 500 companies.

        Malice is useful for those that do malware analysis or deal with user-generated files that may contain malware. The framework allows scanning files and directories to see if they are infected.

        Project details

        Malice is written in Golang.

        Strengths and weaknesses

        • + More than 500 GitHub stars
        • + The source code of this software is available

          Typical usage

          • Malware analysis
          • Malware detection
          • Malware research
          • Malware scanning

          Malice review

          85

          Pocsuite

          Introduction

          Pocsuite is a remote vulnerability testing and development framework. It can be used by penetration testers and vulnerability researchers.

          Project details

          Pocsuite is written in Python.

          Strengths and weaknesses

          • + More than 10 contributors
          • + More than 1000 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Vulnerability development
            • Vulnerability testing

            Pocsuite review

            70

            Viper

            Introduction

            Viper organizes the malware samples and exploits you found over time. It calls itself "Metasploit for malware researchers". Viper has a terminal interface to store, search and analyze files. As it is a framework, is also allows you to create your plugins.

            Project details

            64

            Dockerscan

            Introduction

            Dockerscan is a Docker toolkit for security analysis which includes attacking tools. It is more focused on side of the offensive than defensive.

            Project details

            Dockerscan is written in Python.

            Strengths and weaknesses

            • + More than 500 GitHub stars
            • + The source code of this software is available

              Typical usage

              • Information gathering
              • Security assessment
              • Vulnerability scanning

              Dockerscan review

              60

              evilredis

              Introduction

              Evilredis tool is an offensive security program for pentesting Redis databases. It can scan the target and perform different actions, like shutting down a Redis instance.

              Project details

              evilredis is written in Node.js.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Security assessment
                • Vulnerability scanning

                evilredis review

                64

                Pyersinia

                Introduction

                Pyersinia is a tool like Yersinia and can perform network attacks such as spoofing ARP, DHCP DoS , STP DoS, and more. It is written in Python and uses Scapy.

                Project details

                Pyersinia is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Network analysis
                  • Penetration testing
                  • Security assessment

                  Pyersinia review

                  64

                  RouterSploit

                  Introduction

                  RouterSploit is a framework to exploit embedded devices such as cameras and routers. It can be used during penetration testing to test the security of a wide variety of devices. RouterSploit comes with several modules to scan and exploit the devices. The tool helps in all steps, like from credential testing to deploying a payload to perform an exploitation attempt.

                  Project details

                  RouterSploit is written in Python.

                  Strengths and weaknesses

                  • + More than 50 contributors
                  • + More than 6000 GitHub stars
                  • + The source code of this software is available

                    Typical usage

                    • Penetration testing
                    • Self-assessment
                    • Software testing
                    • Vulnerability scanning

                    RouterSploit review

                    60

                    APT2 (apt2)

                    Introduction

                    APT2 stands for Automated Penetration Testing Toolkit.

                    APT2 performs a scan with Nmap or can import the results of a scan from Nexpose or Nessus. The processed results will be used in the second phase. This phase launches exploit and enumeration modules. It helps pentesters to automate assessments and tasks.

                    Suggested components to have installed: convert, dirb, hydra, java, john, ldapsearch, msfconsole, nmap, nmblookup, phantomjs, responder, rpcclient, secretsdump.py, smbclient, snmpwalk, sslscan, xwd

                    Project details

                    APT2 is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available

                      Typical usage

                      • Penetration testing
                      • Security assessment

                      APT2 review

                      93

                      BeEF

                      Introduction

                      BeEF is used by penetration testers to assess the security of a system by leveraging the web browser. This makes the tool different to many other tools, as it ignores the security on network or system level. It uses command modules from within the web browser to perform requested attacks against the system.

                      Project details

                      56

                      domain

                      Introduction

                      Domain is a Python script written by Jason Haddix to combine the tools Recon-ng and altdns. It allows to use the two tool one multiple domains within the same session.

                      Project details

                      domain is written in Python.

                      Strengths and weaknesses

                      • + More than 500 GitHub stars
                      • + The source code of this software is available
                      • - Unknown project license

                      Typical usage

                      • Subdomain enumeration

                      domain review

                      100

                      Faraday

                      Introduction

                      Faraday helps teams to collaborate when working on penetration tests or vulnerability management. It stores related security information in one place, which can be easily tracked and tested by other colleagues.

                      Project details

                      Faraday is written in Python.

                      Strengths and weaknesses

                      • + Commercial support available
                      • + More than 1000 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Collaboration
                        • Penetration testing
                        • Security assessment
                        • Vulnerability scanning

                        Faraday review

                        60

                        InstaRecon

                        Introduction

                        InstaRecon is a security tool that can help with the reconnaissance phase of a penetration test. It can collect a number of data points with limited input.

                        Project details

                        InstaRecon is written in Python.

                        Strengths and weaknesses

                        • + The source code of this software is available

                          Typical usage

                          • Penetration testing
                          • Reconnaissance

                          InstaRecon review

                          56

                          p0f

                          Introduction

                          This tool is a great addition to nmap, especially if that reveals not reliable data or none at all. Due to the passive way of working, it won't be detected nor influences any connection.

                          - Version 3 of p0f is a full rewrite
                          - The idea for p0f dates back to June 10, 2000
                          - Tool can run in foreground or as a daemon process

                          Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellaneous forensics.

                          Project details

                          Strengths and weaknesses

                          • + Project is mature (10+ years)
                          • + The source code of this software is available
                          • + Well-known tool

                            p0f review

                            100

                            PTF (The PenTesters Framework)

                            Introduction

                            PTF or the PenTesters Framework is a Python script to keep your penetration testing toolkit up-to-date. It is designed for distributions running Debian, Ubuntu, Arch Linux, or related clones. PTF will do the retrieval, compilation, and installation of the tools that you use. As it is a modular framework, you can use many of the common pentesting tools or add your own tools.

                            Project details

                            PTF is written in Python.

                            Strengths and weaknesses

                            • + More than 50 contributors
                            • + Tool is easy to use
                            • + More than 1000 GitHub stars
                            • + The source code of this software is available

                              Typical usage

                              • Penetration testing
                              • Security assessment
                              • Software management
                              • Software testing

                              PTF review

                              74

                              SearchSploit

                              Introduction

                              SearchSploit is a small by OffensiveSecurity to search for exploits and related data in the exploit database (Exploit-DB). This may help penetration testers in their security assignments.

                              Project details

                              SearchSploit is written in shell script.

                              Strengths and weaknesses

                              • + The source code is easy to read and understand
                              • + Tool is easy to use
                              • + Used language is shell script
                              • - Full name of author is unknown

                              Typical usage

                              • Information gathering
                              • Penetration testing
                              • Service exploitation
                              • System exploitation
                              • Vulnerability testing

                              SearchSploit review

                              78

                              Sn1per

                              Introduction

                              Sn1per is security scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.

                              Project details

                              Sn1per is written in Python, shell script.

                              Strengths and weaknesses

                              • + More than 10 contributors
                              • + More than 1000 GitHub stars
                              • + The source code of this software is available
                              • - Unknown project license

                              Typical usage

                              • Penetration testing
                              • Reconnaissance

                              Sn1per review

                              60

                              TheDoc

                              Introduction

                              TheDoc is a tool written in shell-script to automate the usage of sqlmap. It comes with a built-in admin finder and hash cracker, using the Hashcat tool.

                              Project details

                              TheDoc is written in shell script.

                              Strengths and weaknesses

                              • + Used language is shell script
                              • + Very low number of dependencies
                              • + The source code of this software is available
                              • - Full name of author is unknown
                              • - Unknown project license

                              Typical usage

                              • Penetration testing

                              TheDoc review

                              64

                              WarBerryPi

                              Introduction

                              WarBerryPi is a toolkit to provide a hardware implant during Physical penetration testing or red teaming. The primary goal of the tool is to obtain as much information as possible, in a short period of time. The secondary goal is to be stealthy to avoid detection. As the name implies, the tool can be used on a small device like a RaspberryPi.

                              Another use-case of WarBerryPi is to be an entry point to the network. In that case, a 3G connection is suggested, to avoid the outgoing network filtering (egress rules).

                              Project details

                              WarBerryPi is written in Python.

                              Strengths and weaknesses

                              • + More than 2000 GitHub stars
                              • + The source code of this software is available
                              • - Minimal or no documentation available
                              • - No releases on GitHub available

                              Typical usage

                              • Information gathering
                              • Information snooping
                              • Penetration testing
                              • Red teaming

                              WarBerryPi review

                              Some relevant tool missing as an alternative to OWTF? Please contact us with your suggestion.