Offensive Security

273 tools and resources

Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

A document that helps inform red team planning by contrasting against the very specific red team style described in Red Teams.

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

A blog post discussing the often overlooked dangers of CSV injection in applications.

Wfuzz is a tool designed for bruteforcing Web Applications with multiple features like multiple injection points, recursion, and payload combinations.

A tool for automated security scanning of web applications and manual penetration testing.

Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.

A powerful enumeration tool for discovering assets and subdomains.

Tool for attacking Active Directory environments through SQL Server access.

Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.

Emulate operating systems behind SSH servers for testing automation.

BeEF Logo
0.0

BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

A unified repository for different Metasploit Framework payloads.

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

A guide to bypassing RFID card reader security mechanisms using specialized hardware

Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.

Back-end component for red team operations with crucial design considerations.

1112
13