Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 17,221+ visitors searching for solutions

CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Crashwalk Logo

A Go-based crash analysis tool that processes and reproduces crash files from fuzzing tools like AFL with multiple debugging engines and output formats.

0
Redboto Logo

A Python-based red team toolkit that leverages AWS boto3 SDK to perform offensive operations including credential extraction and file exfiltration from EC2 instances.

0
Git Scanner Framework Logo

A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.

0
MTKPI Logo

Docker image with essential tools for Kubernetes penetration testing.

0
tcpreplay Logo

Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

0
ROP Wargame Repository Logo

A collection of Return-Oriented Programming (ROP) challenges designed for practicing binary exploitation techniques and developing offensive security skills.

0
OVAA (Oversecured Vulnerable Android App) Logo

OVAA is an intentionally vulnerable Android application that aggregates common platform security vulnerabilities for educational and security testing purposes.

0
SigThief Logo

SigThief extracts digital signatures from signed PE files and appends them to other files to create invalid signatures for testing Anti-Virus detection mechanisms.

0
SQL Injection Labs Logo

A project developed for pentesters to practice SQL Injection concepts in a controlled environment.

1
Smali Syntax Highlighting for Vim Logo

Syntax highlighting for Smali (Dalvik) Assembly language in Vim.

0
AndroFuzz Logo

A simple file format fuzzer for Android that can fuzz multiple readers at once

0
SharpAppLocker Logo

SharpAppLocker is a C# tool that retrieves AppLocker application control policies from Windows systems, replicating the Get-AppLockerPolicy PowerShell cmdlet functionality.

0
Macro_Pack Logo

Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.

0
external_c2 framework Logo

A Python framework for building custom Command and Control interfaces that implements Cobalt Strike's External C2 specification for data transfer between frameworks.

0
Proxmark III Logo

A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

0
angr Logo

angr is a Python-based binary analysis framework that provides disassembly, symbolic execution, and program analysis capabilities for cross-platform binary examination.

0
Ophcrack Logo

Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

0
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) Logo

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

0
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0
Donut Logo

A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.

0
Reverse Shell Manager Logo

A tool for managing multiple reverse shell sessions/clients via terminal with a RESTful API.

0
Bastille-Linux Logo

Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

0
Fridump Logo

Fridump is an open source memory dumping tool that uses the Frida framework to extract accessible memory addresses from iOS, Android, and Windows applications for security testing and analysis.

0
Bleeping Computer Logo

A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.