Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Browse 458 offensive security tools

GEF (pronounced ʤɛf - 'Jeff') Logo

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

0
Troy Hunt Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Caldera Logo

Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

0
exploit_me Logo

A deliberately vulnerable ARM/ARM64 application with 14 different vulnerability levels designed for CTF-style exploitation training and education.

0
Infosecurity Magazine Logo

Sysreptor offers a customizable reporting solution for offensive security assessments.

0
DiskShadow Logo

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

0
DET (extensible) Data Exfiltration Toolkit Logo

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

0
ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution Logo

A technique for social engineering and untrusted command execution using ClickOnce technology

0
Sysreptor Logo

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

0
aem-hacker Logo

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

0
Operating System Based Redirection with Apache mod_rewrite Logo

Detect users' operating systems and perform redirection with Apache mod_rewrite.

0
Browser Exploitation Framework (BeEF) Logo

BeEF is a penetration testing framework that exploits web browsers to assess client-side security vulnerabilities and launch attacks from within the browser context.

0
AutoTTP Logo

AutoTTP automates complex attack sequences and testing scenarios for regression tests and research using frameworks like Empire, Metasploit, and Cobalt Strike.

0
FingerprintX Logo

FingerprintX is a standalone utility for service discovery on open ports.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0
Windows 7 UAC Whitelist Code-Injection Issue Logo

Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

0
task_vaccine Logo

Code injection library for OS X with cross-architecture support.

0
SSH MITM v2.3-dev Logo

A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.

0
LinEnum Logo

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

0
SharpPrinter Logo

SharpPrinter enables efficient discovery of network printers for security and management purposes.

0
Ultimate AppLocker Bypass List Logo

A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
Gitjacker Logo

A tool to leak git repositories from misconfigured websites

0
Windows Oneliners for Remote Code Execution Logo

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

0

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Mandos Brief Logo

Weekly cybersecurity newsletter covering security incidents, AI, and leadership

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.