Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Explore 44 curated cybersecurity tools, with 15,373 visitors searching for solutions
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Get Featured
Feature your product and reach thousands of professionals.
- Home
- Categories
- Vulnerability Management
- Penetration Testing
RELATED TASKS
PTaaS platform for web, mobile, cloud app pentesting by global researchers
PTaaS platform for web, mobile, cloud app pentesting by global researchers
Continuous pentesting service monitoring web apps & APIs for code changes
Continuous pentesting service monitoring web apps & APIs for code changes
Continuous penetration testing platform with managed security researchers
Continuous penetration testing platform with managed security researchers
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered autonomous penetration testing platform with multi-agent system
AI-powered PTaaS platform with continuous attack surface discovery and exploit validation
AI-powered PTaaS platform with continuous attack surface discovery and exploit validation
Vulnetic AI is the most capable autonomous hacking agent on the market.
Vulnetic AI is the most capable autonomous hacking agent on the market.
Automated penetration testing platform that validates internal network security
Automated penetration testing platform that validates internal network security
Open-source platform for pentest reporting and security team collaboration
Open-source platform for pentest reporting and security team collaboration
A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.
A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Automated pentesting for web apps & APIs with continuous vulnerability scanning
Pentest reporting & exposure mgmt platform for vulnerability remediation
Pentest reporting & exposure mgmt platform for vulnerability remediation
Pentest management platform for reporting, project mgmt & client collaboration
Pentest management platform for reporting, project mgmt & client collaboration
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
AI-powered automated penetration testing platform for web apps, APIs & GraphQL
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.
AI-powered automated penetration testing platform for vulnerability discovery
AI-powered automated penetration testing platform for vulnerability discovery
A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding
A tool to easily automate and multithread your pentesting and bug bounty workflow without any coding
A penetration testing framework for identifying and exploiting vulnerabilities.
A penetration testing framework for identifying and exploiting vulnerabilities.
A scripting engine for interacting with GraphQL endpoints for pentesting purposes.
A scripting engine for interacting with GraphQL endpoints for pentesting purposes.
SQLi-Hunter is an HTTP/HTTPS proxy server and SQLMAP API wrapper that simplifies the identification and exploitation of SQL injection vulnerabilities in web applications.
SQLi-Hunter is an HTTP/HTTPS proxy server and SQLMAP API wrapper that simplifies the identification and exploitation of SQL injection vulnerabilities in web applications.
A directory traversal fuzzer for finding and exploiting directory traversal vulnerabilities.
A directory traversal fuzzer for finding and exploiting directory traversal vulnerabilities.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
Educational repository containing materials on advanced subdomain enumeration techniques from Bugcrowd LevelUp 2017 conference.
Educational repository containing materials on advanced subdomain enumeration techniques from Bugcrowd LevelUp 2017 conference.
A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases through automated scanning and reporting.
A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases through automated scanning and reporting.
Penetration Testing Tools - FAQ
Common questions about Penetration Testing tools including selection guides, pricing, and comparisons.
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.