Ethical hacking tools and resources for penetration testing and red team operations.
Explore 274 curated tools and resources
A collection of scripts for Turbo Intruder, a penetration testing tool
A DNS rebinding attack framework for security researchers and penetration testers.
A tool for detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities
A Python library for exploiting race conditions in web apps
A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.
A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
A tool that scans for accessibility tools backdoors via RDP
Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.
Emulate offensive attack techniques in the cloud with a self-contained Go binary.
A subdomain enumeration tool for penetration testers and security researchers.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
A tool that finds more information about a given URL or domain by querying multiple data sources.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.