Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
ParrotSec Logo

Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

0
Covenant Logo

Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.

0
NoSQLMap Logo

NoSQLMap is an open source Python tool that automates NoSQL injection attacks and exploits configuration weaknesses in NoSQL databases to disclose or clone data.

0
Reversing and Exploiting ARM Binaries: rwthCTF Trafman Logo

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

0
nfspy Logo

ID-spoofing NFS client

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
WordPress Exploit Framework Logo

A Ruby framework designed to aid in the penetration testing of WordPress systems.

0
Kiterunner Logo

Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.

0
Pig Logo

Linux packet crafting tool for testing IDS/IPS and creating attack signatures.

0
Saruman v0.1 Logo

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

0
jwt-heartbreaker Logo

A Burp extension to check JWT tokens for potential weaknesses

0
The Security Ledger Logo

Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

0
mimikatz Logo

A powerful tool for extracting passwords and performing various Windows security operations.

0
PowerUp Logo

PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.

0
Lambda-Proxy Logo

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

0
Pwndrop Logo

Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.

0
Damn Vulnerable iOS App (DVIA) Logo

iOS application for testing iOS penetration testing skills in a legal environment.

0
tcpkill Logo

A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

0
ARM Exploitation: Return Oriented Programming (0x64 ∧ 0x6d) ∨ 0x69 Logo

Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.

0
EvilClippy Logo

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.

0
Help Net Security Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Using a SCF file to Gather Hashes Logo

Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

0
Empire Communication Profiles Logo

Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

0
Dendrobate Logo

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.