Offensive Security for Security Research
Task: Security Research
Browse 20 security tools
FEATURED
- Home
- Categories
- Offensive Security
- Security Research
USE CASES
AI agent for in-depth binary analysis and reverse engineering assistance.
R&D firm providing cyber defense & operational tech for DoD and DHS.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
Whole-system emulation environment for software dev, debugging, testing & security
A list of services and how to claim (sub)domains with dangling DNS records.
A subdomain enumeration tool for penetration testers and security researchers.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
A framework for creating XNU based rootkits for OS X and iOS security research
MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.
A collection of security research tools from Google's Project Zero team for testing and analyzing iPhone messaging systems including SMS, iMessage, and IMAP protocols.
Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.
Aptoide is an alternative Android application marketplace that enables APK downloads and metadata retrieval for mobile security research and analysis.
A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.
A comprehensive .NET post-exploitation library designed for advanced security testing.
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.
Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.