Loading...
Browse 168 remote access tools
Secure workspace for BYOD/unmanaged devices without VDI or device takeover
Secure workspace for BYOD/unmanaged devices without VDI or device takeover
Firmware-embedded endpoint resilience platform for device recovery & security
Firmware-embedded endpoint resilience platform for device recovery & security
Remote privileged access solution for OT/ICS and cyber-physical systems
Remote privileged access solution for OT/ICS and cyber-physical systems
Zero Trust platform combining access management and infrastructure for IT/OT
Zero Trust platform combining access management and infrastructure for IT/OT
Clientless secure remote access platform with Zero Trust architecture
Clientless secure remote access platform with Zero Trust architecture
ZTNA platform for secure remote access replacing VPNs with zero-trust controls
ZTNA platform for secure remote access replacing VPNs with zero-trust controls
Zero Trust Network Access platform for remote access and identity-based control
Zero Trust Network Access platform for remote access and identity-based control
Enterprise workspace platform providing secure access and DaaS solutions
Enterprise workspace platform providing secure access and DaaS solutions
Zero Trust access platform for secure remote access to applications and networks
Zero Trust access platform for secure remote access to applications and networks
SaaS platform providing zero trust network access for secure remote access
SaaS platform providing zero trust network access for secure remote access
IT infrastructure management & network security monitoring platform
IT infrastructure management & network security monitoring platform
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
NBD (Network Block Device) is a network protocol implementation that allows clients to access remote block devices over a network as if they were local storage.
A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.
A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.
Margarita Shotgun is a Python tool that enables remote memory acquisition from target systems through command line interface, supporting Linux distributions and other operating systems via Docker containers.
Margarita Shotgun is a Python tool that enables remote memory acquisition from target systems through command line interface, supporting Linux distributions and other operating systems via Docker containers.
A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.
A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
A COM Command & Control framework that uses JScript to provide fileless remote access capabilities on Windows systems through a modular plugin architecture.
An open source platform for secure remote access management with granular access control
SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.
SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.
Bitscout is a Bash-based live OS constructor tool for building customizable forensic environments used in remote system triage, malware hunting, and digital forensics investigations.
Bitscout is a Bash-based live OS constructor tool for building customizable forensic environments used in remote system triage, malware hunting, and digital forensics investigations.
Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.
Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.
Malware allows attackers to execute Windows commands from a remote environment
Malware allows attackers to execute Windows commands from a remote environment
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
Python tool for remotely or locally dumping RAM of a Linux client for digital forensics analysis.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance