Loading...
Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.
Browse 246 offensive security tools
FourCore ATTACK is an adversary emulation platform to manage cyber risk with evidence
Syntax highlighting for Smali (Dalvik) Assembly language in Vim.
Alpha release of External C2 framework for Cobalt Strike with enhanced data channels.
A VMware image for penetration testing purposes
Altoro Mutual offers online banking, real estate financing, business credit cards, retirement solutions, and prioritizes privacy and security.
A powerful interactive packet manipulation program and library for network exploration and security testing.
Firefox browser extension for displaying and editing HTTP headers.
A tool that uses Apache mod_rewrite to redirect invalid URIs to a specified URL
Boutique security firm offering red team, OSINT, and adversary simulation services.
AI agent for in-depth binary analysis and reverse engineering assistance.
R&D firm providing cyber defense & operational tech for DoD and DHS.
Offensive security firm offering AI pentesting, credential monitoring & compliance.
AI-assisted vulnerability research and advanced offensive cyber tooling firm.
AI agent platform for automating offensive security operations and evals.
Bundled offensive security suites combining pen testing, red teaming, and VM.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
Post-exploitation threat emulation platform for red team operations.
Automated hardware reversing platform using robotics for embedded device analysis
Whole-system emulation environment for software dev, debugging, testing & security
DNS reconnaissance tool checking DNS records, subdomains, and third-party svcs
Private training course for IoT device pentesting and exploitation
Threat emulation tool for adversary simulations and red team operations
Common questions about Offensive Security tools including selection guides, pricing, and comparisons.
Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.
Get strategic cybersecurity insights in your inbox