Home / Security Testing / Offensive Security

Offensive Security

Offensive security testing uncovers vulnerabilities through simulated attacks.

Try these 279 AI Offensive Security Tools

A practical guide to RFID badge copying
Free

A practical guide to RFID badge copying

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

Abusing DCOM For Yet Another Lateral Movement Technique
Free

Abusing DCOM For Yet Another Lateral Movement Technique

MiniCPS is a framework for Cyber-Physical Systems real-time simulation with support for physical process and control devices simulation, and network emulation.

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
Free

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

aem-hacker
Free

aem-hacker

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

AFE Android Framework for Exploitation
Free

AFE Android Framework for Exploitation

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

AggressiveProxy
Free

AggressiveProxy

Repository of tools for testing iPhone messaging by Project Zero

Aircrack-ng
Free

Aircrack-ng

A subdomain scan tool that helps you find subdomains of a given domain.

AndroFuzz
Free

AndroFuzz

Generate a variety of suspect actions detected by Falco rulesets.

Android greybox fuzzing with AFL++ Frida mode
Free

Android greybox fuzzing with AFL++ Frida mode

A penetration testing framework for identifying and exploiting vulnerabilities.

Any Run
Free

Any Run

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

AppUse
Free

AppUse

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

AWS pwn
Free

AWS pwn

A practical guide on NTLM relaying for Active Directory attacks.

AzureC2Relay
Free

AzureC2Relay

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

barq
Free

barq

A lightweight, first-stage C2 implant written in Nim for remote access and control.

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives
Free

Basic Linux Privilege Escalation - g0tmi1k RSS BlogArchives

Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.

Bento Toolkit
Free

Bento Toolkit

An open source network penetration testing framework with automatic recon and scanning capabilities.

BeEF
Free

BeEF

A credit card/magstripe spoofer that can emulate any magnetic stripe or credit card wirelessly.

Binary Exploitation Tutorial
Free

Binary Exploitation Tutorial

Modular framework for web services penetration testing with support for various attacks.

Boofuzz
Free

Boofuzz

A front-end JavaScript toolkit for creating DNS rebinding attacks

Browser Exploitation Framework (BeEF)
Free

Browser Exploitation Framework (BeEF)

A tool for detecting and taking over subdomains with dead DNS records

Brute Ratel C4
Free

Brute Ratel C4

Full-featured C2 framework for stealthy communication and control on web servers.

BuckleGripper
Free

BuckleGripper

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.