Loading...
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Browse 272 penetration testing tools
BloodHound is a Javascript web application that uses graph theory to analyze Active Directory and Azure environments, revealing hidden relationships and potential attack paths through visual mapping.
A penetration testing framework for identifying and exploiting vulnerabilities.
A login cracker that can be used to crack many types of authentication protocols.
SSTImap is an automated detection tool that identifies Server-Side Template Injection vulnerabilities in web applications through systematic testing and analysis.
A correlated injection proxy tool that integrates with XSS Hunter for automated cross-site scripting vulnerability testing and payload tracking.
x8 is a hidden parameters discovery suite that automatically identifies undocumented parameters in web applications and APIs for security testing purposes.
A Python tool that mines URLs from web archives to assist security researchers in discovering potential attack surfaces for bug hunting and vulnerability assessment.
A fast web crawler for discovering endpoints and assets within web applications during security reconnaissance.
A Python-based network hacking toolkit that implements various attack and reconnaissance techniques for educational purposes and network security learning.
SecLists is a comprehensive repository of security testing lists including usernames, passwords, URLs, fuzzing payloads, and web shells used during penetration testing and security assessments.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
A command-line tool that replaces all query string parameter values in URLs with a user-supplied value for security testing purposes.
A command line utility for searching and downloading exploits from multiple exploit databases including Exploit-DB and Packet Storm.
A powerful penetration testing platform for identifying vulnerabilities and weaknesses in computer systems.
An open-source attack surface management platform for identifying and managing vulnerabilities
A Python utility that identifies and exploits domains vulnerable to AWS name server takeover attacks by detecting misconfigured DNS settings.
A powerful tool for finding and exploiting subdomain takeover vulnerabilities
Common questions about Penetration Testing tools, selection guides, pricing, and comparisons.
A pen tester toolkit typically includes: reconnaissance tools (subdomain enumeration, port scanning, OSINT), vulnerability scanners (web, network, cloud), exploitation frameworks (for validating vulnerabilities), post-exploitation tools (privilege escalation, lateral movement), password cracking and credential testing tools, and reporting tools to document findings with remediation guidance.
Based on user ratings and community engagement on CybersecTools, the top-rated Penetration Testing tools are: