Ethical hacking tools and resources for penetration testing and red team operations.
Explore 274 curated tools and resources
The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.
A collection of resources for practicing penetration testing
A cheat sheet providing examples of creating reverse shells for penetration testing.
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
Emulates Docker HTTP API with event logging and AWS deployment script.
A tool for testing Cross Site Scripting vulnerabilities
Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.
An open-source shellcode and PE packer for creating and managing portable executable files.
APT Simulator is a tool for simulating a compromised system on Windows.
A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.
Full-featured C2 framework for stealthy communication and control on web servers.
Preparation process for participating in the Pacific Rim CCDC 2015.
CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.
GraphSpy is a token management tool that allows users to store and manage access and refresh tokens for multiple users and scopes in one location.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.