271 tools and resources
Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.
Reach out!
Open-source Java application for creating proxies for traffic analysis & modification.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A specification/framework for extending default C2 communication channels in Cobalt Strike
Introduction to using GScript for Red Teams
Hidden parameters discovery suite
A simple, fast web crawler for discovering endpoints and assets in a web application
Redboto is a collection of scripts for red team operations against the AWS API.
Docker image with essential tools for Kubernetes penetration testing.
Local pentest lab using docker compose to spin up victim and attacker services.
Collection of Return-Oriented Programming challenges for practicing exploitation skills.
Stealing Signatures and Making One Invalid Signature at a Time.
A simple file format fuzzer for Android that can fuzz multiple readers at once
Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.
Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.
Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
A post-exploitation framework for attacking running AWS infrastructure
Generates shellcode that loads Windows payloads from memory and runs them with parameters.
A tool for managing multiple reverse shell sessions/clients via terminal with a RESTful API.
A framework for exploiting Android-based devices and applications
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.