Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
stegify Logo

A command line steganography tool that uses LSB technique to hide files within images without visible alteration.

0
Randomized Malleable C2 Profiles Made Easy Logo

Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

0
MITM SOCKS Proxy for Java Logo

Intercepts and examines mobile app connections by stripping SSL/TLS layer.

0
OWASP Bricks Logo

Deliberately vulnerable web application for security professionals to practice attack techniques.

0
xocopy Logo

Copy executables with execute, but no read permission on Unix systems.

0
ParamSpider Logo

A Python tool that mines URLs from web archives to assist security researchers in discovering potential attack surfaces for bug hunting and vulnerability assessment.

1
LFI-Enum Logo

Scripts to automate the process of enumerating a Linux system through a Local File Inclusion (LFI) vulnerability.

0
Arya - The Reverse YARA Logo

A tool that generates pseudo-malicious files to trigger YARA rules.

0
Damn Vulnerable Web Services Logo

An intentionally vulnerable web application containing multiple web service security flaws designed for educational purposes and security testing practice.

1
xsshunter Logo

A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.

0
OneFuzz Logo

OneFuzz is a self-hosted Fuzzing-As-A-Service platform developed by Microsoft that enables continuous developer-driven security testing through automated fuzzing capabilities.

0
Gato Logo

A tool for enumerating and attacking GitHub Actions pipelines

0
SecLists Logo

SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.

1
PETEP (PEnetration TEsting Proxy) Logo

Open-source Java application for creating proxies for traffic analysis & modification.

0
ExploitDB Logo

A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

1
XSS'OR Logo

Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

0
Cobalt Strike's ExternalC2 framework Logo

A specification/framework for extending default C2 communication channels in Cobalt Strike

1
Workshop Hacking Bluetooth Smart locks Logo

A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

0
LockBoxx Logo

Introduction to using GScript for Red Teams

0
State of Security Logo

Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

0
Linux Soft Exploit Suggester Logo

Script to find exploits for vulnerable software packages on Linux systems using an exploit database.

0
pybof Logo

PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.

0
x8 Logo

x8 is a hidden parameters discovery suite that automatically identifies undocumented parameters in web applications and APIs for security testing purposes.

1
Packet Storm Exploits for April 2024 Logo

A collection of 132 exploits added to Packet Storm in April 2024

0

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

7
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

5
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.