Home / Security Testing / Offensive Security

Offensive Security

Offensive security testing uncovers vulnerabilities through simulated attacks.

Try these 279 AI Offensive Security Tools

How to Write Malleable C2 Profiles for Cobalt Strike
Free

How to Write Malleable C2 Profiles for Cobalt Strike View How to Write Malleable C2 Profiles for Cobalt Strike

Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.

idb
Free

idb View idb

A guide to bypassing RFID card reader security mechanisms using specialized hardware

Inceptor
Free

Inceptor View Inceptor

Emulate operating systems behind SSH servers for testing automation.

Industrial Exploitation Framework (ISF)
Free

Industrial Exploitation Framework (ISF) View Industrial Exploitation Framework (ISF)

Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.

Industrial Security Exploitation Framework
Free

Industrial Security Exploitation Framework View Industrial Security Exploitation Framework

A tool that simplifies the installation of tools and configuration for Kali Linux

Injectus
Free

Injectus View Injectus

A structured approach for conducting penetration tests with seven main sections covering all aspects of the test.

InlineWhispers
Free

InlineWhispers View InlineWhispers

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.

Insomniac Security External C2 Framework for Cobalt Strike
Free

Insomniac Security External C2 Framework for Cobalt Strike View Insomniac Security External C2 Framework for Cobalt Strike

A tool that simplifies the installation of tools and configuration for Kali Linux

IntruderPayloads
Free

IntruderPayloads View IntruderPayloads

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

InvisibilityCloak
Free

InvisibilityCloak View InvisibilityCloak

A tool for Local File Inclusion (LFI) exploitation and scanning

Ivy
Free

Ivy View Ivy

Generate a variety of suspect actions detected by Falco rulesets.

Joi Security
Free

Joi Security View Joi Security

Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.

Kali
Free

Kali View Kali

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.

Kamerka
Free

Kamerka View Kamerka

Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

Kerberos Party Tricks
Free

Kerberos Party Tricks View Kerberos Party Tricks

Cutting-edge open-source security tools for adversary simulation and threat hunting.

Koadic
Free

Koadic View Koadic

Tool for attacking Active Directory environments through SQL Server access.

Kubesploit
Free

Kubesploit View Kubesploit

A comprehensive .NET post-exploitation library designed for advanced security testing.

Lab of a Penetration Tester: Week of Evading Microsoft ATA
Free

Lab of a Penetration Tester: Week of Evading Microsoft ATA View Lab of a Penetration Tester: Week of Evading Microsoft ATA

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

LaZagne Project
Free

LaZagne Project View LaZagne Project

Self-hosted Fuzzing-As-A-Service platform for continuous developer-driven fuzzing.

LazyKali
Free

LazyKali View LazyKali

A set of YARA rules for identifying files containing sensitive information

Legion
Free

Legion View Legion

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

LFISuite
Free

LFISuite View LFISuite

Interactive online malware sandbox for real-time analysis and threat intelligence

libformatstr.py
Free

libformatstr.py View libformatstr.py

The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.