Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 454 curated cybersecurity tools, with 14,630+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

HexStrike AI MCP Agents Logo

MCP server enabling AI agents to autonomously run 150+ security tools

2
CAI (Cybersecurity AI) Logo

An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.

0
AltV6 Logo

AltV6 is a proxy service provider offering residential, datacenter, and IPv6 proxies for web scraping and data collection with global network coverage and rotating IP capabilities.

0
PTJunior Logo

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

2
OFFODE Logo

A proof-of-concept Node.js tool that demonstrates automated MFA bypass techniques for Microsoft Outlook accounts using browser automation.

1
XBOW Logo

XBOW is an AI-driven tool that autonomously discovers and exploits web application vulnerabilities, aiming to match the capabilities of experienced human pentesters.

-1
tryharder Logo

A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.

0
ffufai Logo

An AI-powered wrapper for ffuf that automatically suggests relevant file extensions for web fuzzing based on target URL analysis and response headers.

0
Read-Teaming-TTPs Logo

A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.

0
Bento Toolkit Logo

A Docker-based penetration testing toolkit that provides a portable environment with GUI support and pre-installed security tools for web application testing and CTF activities.

0
getallurls (gau) Logo

Fetches known URLs from various sources for a given domain

0
Impacket Logo

A Python library for working with network protocols

1
BloodHound Logo

BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.

4
Findsploit Logo

Find exploits in local and online databases instantly

0
weaponised-XSS-payloads Logo

A collection of XSS payloads designed to turn alert(1) into P1

0
FDsploit Logo

A Python-based tool that automates the identification and exploitation of file inclusion and directory traversal vulnerabilities in web applications.

0
JSShell Logo

An interactive multi-user web JS shell

0
xssor2 Logo

A tool for testing and exploiting Cross-Site Scripting (XSS) vulnerabilities.

0
liffier Logo

A simple snippet to increment ../ on the URL.

0
Liffy Logo

A local file inclusion exploitation tool

0
jwt-cracker Logo

A simple JWT token brute force cracker

0
IntruderPayloads Logo

A collection of payloads and methodologies for web pentesting.

0
urlgrab Logo

A golang utility to spider through a website searching for additional links.

0
XXEinjector Logo

Automate the exploitation of XXE vulnerabilities

0