Home / Security Testing / Offensive Security

Offensive Security

Offensive security testing uncovers vulnerabilities through simulated attacks.

Try these 279 AI Offensive Security Tools

A practical guide to RFID badge copying
Free

A practical guide to RFID badge copying View A practical guide to RFID badge copying

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

Abusing DCOM For Yet Another Lateral Movement Technique
Free

Abusing DCOM For Yet Another Lateral Movement Technique View Abusing DCOM For Yet Another Lateral Movement Technique

MiniCPS is a framework for Cyber-Physical Systems real-time simulation with support for physical process and control devices simulation, and network emulation.

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
Free

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement View Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

aem-hacker
Free

aem-hacker View aem-hacker

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

AFE Android Framework for Exploitation
Free

AFE Android Framework for Exploitation View AFE Android Framework for Exploitation

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

aircrack-ng
Free

aircrack-ng View aircrack-ng

Automatic tool for DNS rebinding-based SSRF attacks

AggressiveProxy
Free

AggressiveProxy View AggressiveProxy

Repository of tools for testing iPhone messaging by Project Zero

Aircrack-ng
Free

Aircrack-ng View Aircrack-ng

A subdomain scan tool that helps you find subdomains of a given domain.

AndroFuzz
Free

AndroFuzz View AndroFuzz

Generate a variety of suspect actions detected by Falco rulesets.

Android greybox fuzzing with AFL++ Frida mode
Free

Android greybox fuzzing with AFL++ Frida mode View Android greybox fuzzing with AFL++ Frida mode

A penetration testing framework for identifying and exploiting vulnerabilities.

Any Run
Free

Any Run View Any Run

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

AppUse
Free

AppUse View AppUse

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

APT Simulator
Free

APT Simulator View APT Simulator

An interactive multi-user web JS shell

AWS pwn
Free

AWS pwn View AWS pwn

A practical guide on NTLM relaying for Active Directory attacks.

AzureC2Relay
Free

AzureC2Relay View AzureC2Relay

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

barq
Free

barq View barq

A lightweight, first-stage C2 implant written in Nim for remote access and control.

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives
Free

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives View Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives

Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.

Bento Toolkit
Free

Bento Toolkit View Bento Toolkit

An open source network penetration testing framework with automatic recon and scanning capabilities.

BeEF
Free

BeEF View BeEF

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

Binary Exploitation Tutorial
Free

Binary Exploitation Tutorial View Binary Exploitation Tutorial

Modular framework for web services penetration testing with support for various attacks.

Boofuzz
Free

Boofuzz View Boofuzz

A front-end JavaScript toolkit for creating DNS rebinding attacks

Browser Exploitation Framework (BeEF)
Free

Browser Exploitation Framework (BeEF) View Browser Exploitation Framework (BeEF)

A tool for detecting and taking over subdomains with dead DNS records

Brute Ratel C4
Free

Brute Ratel C4 View Brute Ratel C4

Full-featured C2 framework for stealthy communication and control on web servers.

BuckleGripper
Free

BuckleGripper View BuckleGripper

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.