Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Libcrafter Logo

A high-level C++ library for creating and decoding network packets with a Scapy-like interface.

0
Reverse Shell Cheat Sheet Logo

A cheat sheet providing examples of creating reverse shells for penetration testing.

0
Commix Logo

Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.

0
mitmproxy Logo

mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

0
Libnet Logo

An API for constructing and injecting network packets with additional functionality.

0
ezXSS Logo

ezXSS is a testing framework that helps penetration testers and bug bounty hunters identify Cross Site Scripting vulnerabilities, especially blind XSS attacks.

0
WPSploit Logo

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

0
Hardware Security Validation Environment Logo

A hardware security validation toolkit for x86 platforms that provides bootable tools for checking platform configuration registers and managing SecureBoot keys.

0
PEzor Logo

An open-source shellcode and PE packer for creating and managing portable executable files.

0
Nozzlr v1.1 Logo

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

0
TechTarget Logo

Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

0
PHPsploit Logo

A PHP-based command and control framework that maintains persistent web server access through polymorphic backdoors and HTTP header communication tunneling.

0
Spanning Tree 1: DOS attack sending conf BPDUs Logo

DOS attack by sending fake BPDUs to disrupt switches' STP engines.

0
Preparing for Red Team at PRCCDC 2015 Logo

Preparation process for participating in the Pacific Rim CCDC 2015.

0
Security Magazine Logo

Sysreptor offers a customizable reporting solution for penetration testers and red teamers to streamline their security assessments.

0
rsatool Logo

A Python utility that calculates RSA cryptographic parameters and generates OpenSSL-compatible private keys from prime numbers or modulus/exponent pairs.

0
GraphSpy Logo

GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.

0
dnsspoof Logo

DNS spoofer tool for redirecting DNS lookup requests.

0
checkra1n Logo

Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

0
Red Team Planning Document Logo

A planning framework document that guides red team exercise preparation with focus on blue team development and constructive learning outcomes.

0
CrossC2 Logo

CrossC2 is a cross-platform payload generator that extends CobaltStrike's capabilities to Linux and macOS environments for red team operations.

0
KeeFarce Logo

KeeFarce extracts cleartext password database information from KeePass 2.x processes in memory using DLL injection and .NET runtime manipulation.

0
Serving Random Payloads with Apache mod_rewrite Logo

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

0
Luyten Logo

Java decompiler GUI tool for Procyon under Apache License.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.