Offensive Security

command-line-tool
Other Tags in this Category

FEATURED

Feature Your Cybersecurity Product

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Boost Your Visibility

NEW

A lightweight, first-stage C2 implant written in Nim for remote access and control.

idb Logo
0.0

A tool for iOS pentesting and research with a GUI version available.

Generates randomized C2 profiles for Cobalt Strike to evade detection.

An open-source intelligence collection, research, and artifact management tool inspired by SpiderFoot, Harpoon, and DataSploit.

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.