Offensive Security for Penetration Testing

Task: Penetration Testing

Explore 205 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

HexStrike AI MCP Agents Logo

MCP server enabling AI agents to autonomously run 150+ security tools

2
CAI (Cybersecurity AI) Logo

An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.

0
PTJunior Logo

An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

2
XBOW Logo

XBOW is an AI-driven tool that autonomously discovers and exploits web application vulnerabilities, aiming to match the capabilities of experienced human pentesters.

-1
tryharder Logo

A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.

0
ffufai Logo

An AI-powered wrapper for ffuf that automatically suggests relevant file extensions for web fuzzing based on target URL analysis and response headers.

0
Read-Teaming-TTPs Logo

A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.

0
Bento Toolkit Logo

A Docker-based penetration testing toolkit that provides a portable environment with GUI support and pre-installed security tools for web application testing and CTF activities.

0
BloodHound Logo

BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.

4
FDsploit Logo

A Python-based tool that automates the identification and exploitation of file inclusion and directory traversal vulnerabilities in web applications.

0
liffier Logo

A simple snippet to increment ../ on the URL.

0
IntruderPayloads Logo

A collection of payloads and methodologies for web pentesting.

0
XXEinjector Logo

Automate the exploitation of XXE vulnerabilities

0
Burp-LFI-tests Logo

A collection of Local File Inclusion (LFI) vulnerability tests and exploitation techniques designed for use with Burp Suite.

0
Can I take over XYZ? Logo

A list of services and how to claim (sub)domains with dangling DNS records.

0
Blinder Logo

A Python library for automating time-based blind SQL injection attacks

0
httprebind Logo

Automatic tool for DNS rebinding-based SSRF attacks

0
surf Logo

A tool for identifying and exploiting SSRF vulnerabilities in modern cloud environments by filtering host lists to find viable attack candidates.

0
cariddi Logo

An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.

0
LinksDumper Logo

LinksDumper extracts links and endpoints from HTTP responses to support web application security testing and reconnaissance activities.

0
tko-subs Logo

A tool for detecting and taking over subdomains with dead DNS records

0
Puredns Logo

A fast domain resolver and subdomain bruteforcing tool

0
DNS Rebind Toolkit Logo

A front-end JavaScript toolkit for creating DNS rebinding attacks

0
gowitness Logo

A Go-based command-line tool that uses Chrome Headless to automatically capture screenshots of web pages for reconnaissance and analysis purposes.

0