Loading...
Task: Penetration Testing
Browse 224 security tools
Validates EDR detection capabilities through autonomous penetration testing
Validates EDR detection capabilities through autonomous penetration testing
Managed Red Team service simulating real attacks to test security defenses
Managed Red Team service simulating real attacks to test security defenses
Red team exercises simulating real-world attacks to identify vulnerabilities
Red team exercises simulating real-world attacks to identify vulnerabilities
Simulated adversarial attack service to test organizational defenses
Simulated adversarial attack service to test organizational defenses
Red team attack simulation service for testing security controls and IR plans
Red team attack simulation service for testing security controls and IR plans
3-day Metasploit training course focused on Ruby scripting & custom modules
3-day Metasploit training course focused on Ruby scripting & custom modules
5-day hands-on mobile app security training for Android and iOS platforms
5-day hands-on mobile app security training for Android and iOS platforms
5-day instructor-led training on exploit development techniques
5-day instructor-led training on exploit development techniques
5-day training course on advanced penetration testing techniques
5-day training course on advanced penetration testing techniques
5-day training bootcamp on advanced persistence and data exfiltration techniques
5-day training bootcamp on advanced persistence and data exfiltration techniques
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Private training course for IoT device pentesting and exploitation
Private training course for IoT device pentesting and exploitation
Online platform offering 700+ hands-on web security exercises and training
Online platform offering 700+ hands-on web security exercises and training
Offensive security services with penetration testing and vulnerability assessments
Offensive security services with penetration testing and vulnerability assessments
Red teaming service simulating real-world adversary attacks on organizations.
Red teaming service simulating real-world adversary attacks on organizations.
Red team service simulating nation-state threats to test defenses.
Red team service simulating nation-state threats to test defenses.
Ransomware attack simulation service to test security defenses and response
Ransomware attack simulation service to test security defenses and response
Subscription-based continuous red team testing across digital, physical & social
Subscription-based continuous red team testing across digital, physical & social
Red teaming service that emulates real-world adversaries to test defenses
Red teaming service that emulates real-world adversaries to test defenses
Threat emulation tool for adversary simulations and red team operations
Threat emulation tool for adversary simulations and red team operations
MCP server enabling AI agents to autonomously run 150+ security tools
MCP server enabling AI agents to autonomously run 150+ security tools
An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.
An open-source framework that enables building and deploying AI-powered security automation tools for both offensive and defensive cybersecurity operations using over 300 AI models.
AI agent that autonomously discovers, exploits, and documents vulnerabilities.
AI agent that autonomously discovers, exploits, and documents vulnerabilities.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
A C++ staged shellcode loader with evasion capabilities, compatible with Sliver and other shellcode sources, designed for offensive security testing.
Get strategic cybersecurity insights in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs