Offensive Security Tools
Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.
Browse 246 offensive security tools
FEATURED
USE CASES
POPULAR
TRENDING CATEGORIES
Digital Forensics and Incident Response
Digital Forensics and Incident Response (DFIR) tools for digital forensic analysis, evidence collection, malware analysis, and cyber incident investigation.
509
Threat Intelligence Platforms
TIP for collecting, analyzing, and sharing cyber threat data, indicators of compromise (IOCs), and threat feeds.
357
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
263
Offensive Security
Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.
246
Identity Governance and Administration
Identity Governance and Administration (IGA) platforms for identity lifecycle management, access governance, role management, and compliance reporting.
230
View All Categories โStay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox
246 tools ยท 230 free, 16 commercial|Related:
Offensive Security Tools FAQ
Common questions about Offensive Security tools, selection guides, pricing, and comparisons.
Penetration testing evaluates specific systems or applications for vulnerabilities within a defined scope and timeframe. Red teaming simulates a real adversary with minimal restrictions, attempting to achieve specific objectives (access CEO email, exfiltrate customer data) using any attack vector: technical exploitation, social engineering, and physical access. Red teaming tests your entire security program, not just your technology.
Have more questions? Browse our categories or search for specific tools.