Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
TikiTorch Logo

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

0
UPX Logo

UPX is a high-performance executable packer for various executable formats.

0
xargs Logo

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

0
PHPGGC Logo

A library of PHP unserialize() payloads and a tool to generate them.

0
Scapy Logo

A powerful interactive packet manipulation program and library for network exploration and security testing.

0
HTTP Header Live Logo

Firefox browser extension for displaying and editing HTTP headers.

0
iRET Logo

iOS Reverse Engineering Toolkit for automating common tasks in iOS penetration testing.

0
PwnAuth Logo

PwnAuth is an open-source tool for generating and managing authentication tokens across multiple protocols, designed for penetration testing and red team exercises.

0
Damn Vulnerable GraphQL Application Logo

A deliberately vulnerable GraphQL application designed for security testing and educational purposes, containing multiple intentional flaws for learning GraphQL attack and defense techniques.

0
LeakIX Logo

LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

0
XlsGen Logo

A proof-of-concept tool that generates Excel BIFF8 files with embedded 4.0 macros programmatically without requiring Microsoft Excel installation.

0
CrackMapExec (CME) Logo

CrackMapExec (CME) - A tool for querying internal database for host and credential information in cybersecurity.

0
Android-OpenDebug Logo

Make any application debuggable on a device.

0
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts Logo

A blog post about bypassing AppLocker using PowerShell diagnostic scripts

0
mach_inject Logo

A Mac OS X code injection library that enables copying code into target processes and remotely executing it through new thread creation.

0
RedELK Logo

RedELK is a SIEM tool designed for red teams to monitor and receive alerts about blue team detection activities during penetration testing engagements.

0
Practical Guide to NTLM Relaying in 2017 Logo

A practical guide on NTLM relaying for Active Directory attacks.

0
Krakatau Logo

A Java bytecode assembler and disassembler toolkit that converts classfiles to human-readable format and provides decompilation capabilities for reverse engineering Java applications.

0
Mod_Rewrite for Red Team Infrastructure Logo

A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.

0
Invalid URI Redirection with Apache mod_rewrite Logo

A tool that uses Apache mod_rewrite to redirect invalid URIs to a specified URL

0
Red Teaming Toolkit Logo

A comprehensive repository of open-source security tools organized by attack phases for red team operations, adversary simulation, and threat hunting purposes.

0
CrackMapExec Logo

A post-exploitation tool for pentesting Active Directory

0
AWS pwn Logo

A collection of Python scripts for conducting penetration testing activities against Amazon Web Services (AWS) environments.

0
JD-GUI Logo

JD-GUI is a graphical Java decompiler that reconstructs and displays source code from compiled ".class" files for reverse engineering and code analysis purposes.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.