Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 454 curated cybersecurity tools, with 14,626+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Covenant Logo

Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.

0
NoSQLMap Logo

NoSQLMap is an open source Python tool that automates NoSQL injection attacks and exploits configuration weaknesses in NoSQL databases to disclose or clone data.

0
Reversing and Exploiting ARM Binaries: rwthCTF Trafman Logo

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

0
nfspy Logo

ID-spoofing NFS client

0
C2concealer Logo

A command line tool that generates randomized malleable C2 profiles for Cobalt Strike to vary command and control communication patterns.

0
WordPress Exploit Framework Logo

A Ruby framework designed to aid in the penetration testing of WordPress systems.

0
Kiterunner Logo

Kiterunner is a tool for lightning-fast traditional content discovery and bruteforcing API endpoints in modern applications.

0
Pig Logo

Linux packet crafting tool for testing IDS/IPS and creating attack signatures.

0
Saruman v0.1 Logo

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

0
jwt-heartbreaker Logo

A Burp extension to check JWT tokens for potential weaknesses

0
The Security Ledger Logo

Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

0
mimikatz Logo

A powerful tool for extracting passwords and performing various Windows security operations.

0
PowerUp Logo

PowerUp aims to be a clearinghouse of common Windows privilege escalation vectors that rely on misconfigurations.

0
Lambda-Proxy Logo

Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.

0
Pwndrop Logo

Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.

0
Damn Vulnerable iOS App (DVIA) Logo

iOS application for testing iOS penetration testing skills in a legal environment.

0
tcpkill Logo

A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

0
ARM Exploitation: Return Oriented Programming (0x64 ∧ 0x6d) ∨ 0x69 Logo

Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.

0
EvilClippy Logo

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.

0
Help Net Security Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Using a SCF file to Gather Hashes Logo

Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

0
Empire Communication Profiles Logo

Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

0
Dendrobate Logo

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

0
CobaltBus Logo

CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

10
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

5
Fabric Platform by BlackStork Logo

Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.

5
Mandos Brief Newsletter Logo

A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

5
View Popular Tools →