Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Boomerang Decompiler Logo

An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.

0
PINCE Logo

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

0
Papa Shango Logo

A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.

0
FeatherDuster (and Cryptanalib) Logo

FeatherDuster is a cryptanalysis tool that automatically identifies and exploits weaknesses in cryptographic systems by analyzing ciphertext files.

0
Payloads All The Things Logo

A comprehensive repository of payloads and bypass techniques for web application security testing and penetration testing across multiple platforms and attack vectors.

0
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

0
Charlotte Logo

Charlotte is an undetected C++ shellcode launcher for executing shellcode with stealth.

0
OneGadget Logo

OneGadget is a CTF-focused tool that uses symbolic execution to find RCE gadgets in binaries that can execute shell commands through execve('/bin/sh', NULL, NULL).

0
dvcs-ripper Logo

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

0
h2csmuggler Logo

A tool for exploiting HTTP/2 cleartext smuggling vulnerabilities

0
Daniel Miessler/Unsupervised Learning Logo

Sysreptor offers a customizable reporting solution for offensive security assessments.

0
Aptoide Logo

Aptoide is an alternative Android application marketplace that enables APK downloads and metadata retrieval for mobile security research and analysis.

0
MFFA - Media Fuzzing Framework for Android Logo

A fuzzing framework for Android that creates corrupt media files to identify potential vulnerabilities

0
JavaScript Beautifier Logo

Reformat and re-indent bookmarklets, ugly JavaScript, and unpack scripts with options available via UI.

0
Tao Security Logo

Sysreptor provides a customizable reporting platform for pentesters and red teamers to efficiently document security assessments.

0
delete-self-poc Logo

A demonstration of a method to delete a locked executable or currently running file from disk.

0
Seatbelt Logo

Comprehensive host-survey tool for security checks in C#.

0
AggressiveProxy Logo

Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.

0
SharpC2 Logo

SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.

0
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence Logo

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

0
Finshir Logo

High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.

0
The CyberWire Logo

Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

0
DorkSearch Logo

An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

0
Lab of a Penetration Tester: Week of Evading Microsoft ATA Logo

A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.