Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Infosecurity Magazine Logo

Sysreptor offers a customizable reporting solution for offensive security assessments.

0
DiskShadow Logo

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

0
DET (extensible) Data Exfiltration Toolkit Logo

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

0
ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution Logo

A technique for social engineering and untrusted command execution using ClickOnce technology

0
Sysreptor Logo

A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.

0
aem-hacker Logo

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

0
Operating System Based Redirection with Apache mod_rewrite Logo

Detect users' operating systems and perform redirection with Apache mod_rewrite.

0
Browser Exploitation Framework (BeEF) Logo

BeEF is a penetration testing framework that exploits web browsers to assess client-side security vulnerabilities and launch attacks from within the browser context.

0
AutoTTP Logo

AutoTTP automates complex attack sequences and testing scenarios for regression tests and research using frameworks like Empire, Metasploit, and Cobalt Strike.

0
FingerprintX Logo

FingerprintX is a standalone utility for service discovery on open ports.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0
Windows 7 UAC Whitelist Code-Injection Issue Logo

Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

0
task_vaccine Logo

Code injection library for OS X with cross-architecture support.

0
SSH MITM v2.3-dev Logo

A penetration testing tool that intercepts SSH connections by patching OpenSSH source code to act as a proxy and log plaintext passwords and sessions.

0
LinEnum Logo

LinEnum is a tool for Linux enumeration that provides detailed system information and performs various checks and tasks.

0
SharpPrinter Logo

SharpPrinter enables efficient discovery of network printers for security and management purposes.

0
Ultimate AppLocker Bypass List Logo

A repository documenting AppLocker bypass techniques with verified methods, legacy DLL execution approaches, and a PowerShell module for identifying AppLocker weaknesses.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
Gitjacker Logo

A tool to leak git repositories from misconfigured websites

0
Windows Oneliners for Remote Code Execution Logo

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

0
Darkarmour Logo

Darkarmour is an open-source Windows antivirus evasion framework that enables security professionals to bypass antivirus detection through customizable obfuscation and anti-analysis techniques.

0
Ground Control Logo

A collection of scripts for debugging SSRF, blind XSS, and XXE vulnerabilities

0
PEDA Logo

PEDA is a Python extension for GDB that enhances debugging with colorized displays and specialized commands for exploit development and binary security analysis.

0
SharpShares Logo

SharpShares efficiently enumerates and maps network shares and resolves names within a domain.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.