Offensive Security

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Explore 455 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
AFE Android Framework for Exploitation Logo

AFE Android Framework for Exploitation is a framework that provides tools and techniques for exploiting vulnerabilities in Android devices and applications.

0
MagSpoof Logo

MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.

0
HackSys Extreme Vulnerable Driver (HEVD) Logo

A Windows kernel driver intentionally designed with various vulnerabilities to help security researchers practice kernel exploitation techniques.

0
Ropper Logo

Ropper is a multi-architecture binary analysis tool that searches for ROP gadgets and displays information about executable files for exploit development.

0
LaZagne Project Logo

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

0
Bad Pods Logo

Collection of Kubernetes manifests creating pods with elevated privileges for security testing.

0
aircrack-ng Logo

A suite of tools for Wi-Fi network security assessment and penetration testing.

0
libformatstr.py Logo

A Python library that simplifies format string vulnerability exploitation by providing tools for payload generation, memory manipulation, and automated parameter detection.

0
Java Decompiler Online Logo

Online Java decompiler tool with support for modern Java features.

0
Metta Logo

Metta is an information security preparedness tool for adversarial simulation.

0
CredMaster Logo

CredMaster enhances password spraying tactics with IP rotation to maintain anonymity and efficiency.

0
Mystikal Logo

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

0
Webshell-Sniper Logo

A webshell manager via terminal for controlling web servers running PHP or MySQL.

0
Tcpreplay Logo

Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.

0
DDE attack with PowerShell Empire Logo

Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

0
Merlin Logo

A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
InvalidSign Logo

InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.

0
o365recon Logo

A reconnaissance tool that retrieves information from Office 365 and Azure Active Directory using a valid credential.

0
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
Hackazon Logo

Hackazon is a vulnerable web application storefront designed for security professionals to practice testing modern web technologies and identifying common vulnerabilities.

0
Threatpost Logo

Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

0
GadgetProbe Logo

A tool for identifying and analyzing Java serialized objects in network traffic

0
Hash Extender Logo

Hash Extender is a command-line tool that automates length extension attacks against various hashing algorithms including MD5, SHA-1, SHA-256, and others.

0

Offensive Security Tools - FAQ

Common questions about Offensive Security tools including selection guides, pricing, and comparisons.

Offensive security tools for penetration testing, red team exercises, exploit development, and ethical hacking activities.

Have more questions? Browse our categories or search for specific tools.