Ethical hacking tools and resources for penetration testing and red team operations.
Explore 276 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
High-performant, coroutines-driven, and fully customisable Low & Slow load generator for real-world pentesting with undetectability through Tor.
A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
Covenant is a .NET C2 framework for red teamers, facilitating collaborative and efficient management of red team operations.
A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
A Ruby framework designed to aid in the penetration testing of WordPress systems.
A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.
A powerful tool for extracting passwords and performing various Windows security operations.
Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.
Ultimate Internet of Things/Industrial Control Systems reconnaissance tool powered by Shodan.
A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.
A standard for conducting penetration tests, covering seven main sections from planning to reporting.
Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.