Offensive Security

271 tools and resources

Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

A Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.

racepwn Logo

racepwn

0 (0)

A framework for testing and exploiting race conditions in software

A collection of scripts for Turbo Intruder, a penetration testing tool

A DNS rebinding attack framework for security researchers and penetration testers.

SSTImap Logo

SSTImap

0 (0)

A tool for detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities

A Python library for exploiting race conditions in web apps

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

C3 Logo

C3

0 (0)

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.

A tool that scans for accessibility tools backdoors via RDP

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

Skyhook Logo

Skyhook

0 (0)

Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

A subdomain enumeration tool for penetration testers and security researchers.

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

WayMore Logo

WayMore

0 (0)

A tool that finds more information about a given URL or domain by querying multiple data sources.

A tool for mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing

OneFuzz Logo

OneFuzz

0 (0)

Self-hosted Fuzzing-As-A-Service platform for continuous developer-driven fuzzing.

Gato Logo

Gato

0 (0)

A tool for enumerating and attacking GitHub Actions pipelines

1
2
34