Offensive Security

273 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

A collaborative, multi-platform, red teaming framework for simulating attacks and testing defenses.

Tool for exploiting Sixnet RTUs to gain root level access with little effort.

A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

A full-featured reconnaissance framework for web-based reconnaissance with a modular design.

Inceptor is a template-driven framework for evading Anti-Virus and Endpoint Detection and Response solutions, allowing users to create custom evasion techniques and test their security controls.

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

A collection of resources for practicing penetration testing

A cheat sheet providing examples of creating reverse shells for penetration testing.

Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.

Emulates Docker HTTP API with event logging and AWS deployment script.

A tool for testing Cross Site Scripting vulnerabilities

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

An open-source shellcode and PE packer for creating and managing portable executable files.

APT Simulator is a tool for simulating a compromised system on Windows.

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

Full-featured C2 framework for stealthy communication and control on web servers.

Preparation process for participating in the Pacific Rim CCDC 2015.

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.

Generate a variety of suspect actions detected by Falco rulesets.

1011
12
13