Loading...
Browse 164 ethical hacking tools
IT infrastructure penetration testing service with continuous attack simulation
Continuous ethical hacking service simulating real-world cyber attacks
Continuous breach and attack simulation services by ethical hackers
Penetration testing as a service with continuous assessments by pentesters
Professional penetration testing services with manual testing and remediation
Online cybersecurity training platform with 150+ courses and hands-on labs
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
A framework for testing and exploiting race condition vulnerabilities through concurrent request analysis and timing attack automation.
A command line utility for searching and downloading exploits from multiple exploit databases including Exploit-DB and Packet Storm.
An educational cybersecurity knowledge repository that compiles and presents hacking and cybersecurity information in an accessible format for learning purposes.
Collection of cybersecurity conference videos recorded by Cooper (@Ministraitor)
A specification/framework for extending default C2 communication channels in Cobalt Strike
A lightweight CTF platform with simple setup and difficulty-based scoring that removes timezone advantages from competitions.
echoCTF is a cybersecurity framework for running Capture the Flag competitions and training exercises on real IT infrastructure.
A free, safe, and legal training ground for ethical hackers to test and expand their skills
An educational cheatsheet that provides privilege escalation fundamentals and examples for CTF players and cybersecurity beginners.
A comprehensive collection of free online laboratories and platforms for practicing penetration testing, CTF challenges, and cybersecurity skills development.
LaBrea is a 'sticky' honeypot and IDS tool that traps malicious actors by creating virtual servers on unused IP addresses.
A utility that attempts to decrypt data from weak RSA public keys and recover private keys using multiple integer factorization algorithms.
A collection of CTF writeups from various competitions including picoCTF, GLUG, TUCTF, and HackTheBox challenges, providing detailed solutions and explanations for cybersecurity competition problems.
SecGen is an open-source framework that automatically generates vulnerable virtual machines and hacking challenges for cybersecurity education and penetration testing training.
Get strategic cybersecurity insights in your inbox