Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
CobaltBus Logo

CobaltBus integrates Cobalt Strike with Azure Service Bus to create covert C2 communication channels for red team operations.

0
Aircrack-ng Logo

A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.

0
README SQLI-LABS Logo

A platform to learn SQL injection techniques and methods

0
ROPgadget Tool Logo

ROPgadget is a cross-platform command-line tool that searches for ROP gadgets in binary files across multiple architectures to facilitate exploit development and ROP chain construction.

0
Dwarf Debugger Logo

A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.

0
Modlishka Logo

Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.

0
shad0w Logo

A post-exploitation framework designed to operate covertly on heavily monitored environments.

0
Buster Logo

Advanced email reconnaissance tool leveraging public data.

0
Forensia Logo

Anti-forensics tool for Red Teamers to erase footprints and test incident response capabilities.

0
Image Steganography Tool Logo

Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.

0
Ebowla Logo

Ebowla is a tool for generating payloads in Python, GO, and PowerShell with support for Reflective DLLs.

0
AWS IAM Privilege Escalation Methods Logo

Documentation of an AWS IAM privilege escalation technique that exploits the iam:CreatePolicyVersion permission to gain elevated access through policy manipulation.

0
MITRE Caldera™ Logo

MITRE Caldera™ is an automated adversary emulation platform built on the MITRE ATT&CK framework that supports red team operations and incident response activities through a modular C2 server and plugin architecture.

0
Mortar Logo

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

0
Domain Hunter Logo

A reconnaissance tool that analyzes expired domains for categorization, reputation, and Archive.org history to identify candidates suitable for phishing and C2 operations.

0
RedGuard Logo

RedGuard is a C2 front flow control tool that helps evade detection by security systems through traffic filtering and redirection capabilities.

0
Masochist Logo

A framework for creating XNU based rootkits for OS X and iOS security research

0
SharpSploit Logo

A comprehensive .NET post-exploitation library designed for advanced security testing.

0
Falco Ruleset Bypass Techniques Research Project Logo

Research project on bypassing default Falco ruleset with Dockerfile for sshayb/fuber:latest image.

0
RedWarden Logo

RedWarden is a Cobalt Strike C2 reverse proxy that uses packet inspection and malleable profile correlation to evade detection by security controls during red team operations.

0
netripper Logo

Smart traffic sniffing tool for penetration testers

0
damnvulnerable.me Logo

A deliberately vulnerable web application containing DOM-based XSS, CSRF, and other web vulnerabilities for security testing and educational purposes.

0
o365-attack-toolkit Logo

A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.

0
Weakpass Logo

A comprehensive collection of wordlists for bruteforcing and password cracking, covering various hashing algorithms and sizes.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.