Ethical hacking tools and resources for penetration testing and red team operations. Task: Appsec
Explore 30 curated tools and resources
A Python-based tool for identifying and exploiting file inclusion and directory traversal vulnerabilities in web applications.
A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.
A Python library for exploiting race conditions in web apps
A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.
Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.
Stealing Signatures and Making One Invalid Signature at a Time.
Macro_Pack is a tool used to automate obfuscation and generation of Office documents for pentest, demo, and social engineering assessments.
A framework for exploiting Android-based devices and applications
A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.
A tool for interacting with the MSBuild API, enabling malicious activities and evading detection.
A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.
Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.
A black-box obfuscation tool for Android apps with Android App Bundle support.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.