[ advertisement ]728×90
151 tools
Aircrack-ng
Aircrack-ng
Open Source Kali Password Attacks Wireless

Complete suite of tools for 802.11 WEP and WPA/WPA2 cracking. Includes monitoring (airodump-ng), attacking (aireplay-ng), testing (airmon-ng…

airgeddon
airgeddon
Open Source Wireless

Multi-use bash script for Linux systems for auditing wireless networks. Automates various wireless attacks including handshake capture, evil…

Amass
Amass
Open Source Kali Reconnaissance

OWASP tool for in-depth DNS enumeration, network mapping, and attack surface discovery. Uses both passive and active techniques to find subd…

AMSI Bypass Techniques
AMSI Bypass Techniques
Open Source Evasion

Collection of PowerShell AMSI (Antimalware Scan Interface) bypass techniques. Patches AMSI in-memory to prevent PowerShell scripts from bein…

Angr
Angr
Open Source Reverse Engineering

Python binary analysis framework supporting both static and dynamic symbolic execution (concolic execution). Used for automatic exploit gene…

[ ad ]300×250
APKTool
APKTool
Open Source Kali Reverse Engineering

Tool for reverse engineering Android APK files. Decodes resources to their original form, rebuilds decoded resources back to APK. Supports s…

Aquatone
Aquatone
Open Source Reconnaissance Web Application

Tool for visual inspection of websites across large numbers of hosts. Takes screenshots of web pages, performs basic HTTP probing, and gener…

Arjun
Arjun
Open Source Web Application

HTTP parameter discovery suite. Finds hidden HTTP parameters in web applications by checking 25,000+ parameter names. Supports GET, POST, JS…

AttackForge
AttackForge
Paid Reporting

Enterprise penetration testing management platform. Manages projects, schedules, findings, evidence, and generates branded reports. Includes…

Autopsy
Autopsy
Open Source Forensics

Digital forensics platform and graphical interface to The Sleuth Kit. Features timeline analysis, keyword search, web artifact extraction, f…

[ ad ]300×250
BeEF
BeEF
Open Source Kali Exploitation Social Engineering

Browser Exploitation Framework. Hooks web browsers via JavaScript and provides extensive command modules for session hijacking, social engin…

Bettercap
Bettercap
Open Source Kali Exploitation Wireless

Swiss army knife for network attacks and monitoring. Supports ARP spoofing, DNS spoofing, SSL stripping, WiFi attacks, Bluetooth LE, BLE sca…

Binary Ninja
Binary Ninja
Paid Reverse Engineering

Commercial reverse engineering platform with an excellent intermediate language (BNIL), Python/C++ API, and collaborative analysis features.…

Binwalk
Binwalk
Open Source Kali Forensics Reverse Engineering

Firmware analysis tool for searching, extracting, and analyzing binary images. Identifies embedded files and code (file signatures, magic by…

BloodHound
BloodHound
Open Source Kali Exploitation Reconnaissance

Uses graph theory to reveal hidden and often unintended relationships within Active Directory environments. Attackers use it to find attack …

[ ad ]300×250
Bulk Extractor
Bulk Extractor
Open Source Kali Forensics

Scans a disk image, file, or directory and extracts features such as email addresses, URLs, credit card numbers, phone numbers, and other fo…

Burp Suite
Burp Suite
Freemium Kali Web Application

Leading platform for web application security testing. The Community Edition includes an intercepting proxy, repeater, intruder, and decoder…

Burp Suite Extensions (BApp Store)
Burp Suite Extensions (BApp Store)
Freemium Web Application

Marketplace of extensions for Burp Suite covering active/passive scanning, custom insertion points, logging, authentication testing, and int…

Caido
Caido
Freemium Web Application

Modern web security auditing tool built as a Rust-based alternative to Burp Suite. Features a clean UI, workflow automation, HTTPQL query la…

Censys
Censys
Freemium Reconnaissance

Internet-wide scanning platform that indexes the full certificate and banner data for every publicly reachable IP address. Useful for attack…

[ ad ]300×250
Certipy
Certipy
Open Source Exploitation Reconnaissance

Offensive tool for Active Directory Certificate Services (AD CS) enumeration and abuse. Finds and exploits ESC1-ESC13 misconfigurations in c…

CeWL
CeWL
Open Source Kali Password Attacks Reconnaissance

Custom Word List generator that spiders a target website to build a wordlist based on the site's content. Useful for targeted password attac…

Chisel
Chisel
Open Source Kali Exploitation Post-Exploitation

Fast TCP/UDP tunnel transported over HTTP and secured via SSH. Used for port forwarding and pivoting through restrictive firewalls. Single b…

Commix
Commix
Open Source Kali Web Application

Automated all-in-one OS command injection and exploitation tool. Detects and exploits command injection vulnerabilities in web applications …

Corsy
Corsy
Open Source Web Application

Lightweight program to find all known misconfigurations in CORS (Cross-Origin Resource Sharing) implementations. Tests for null origin, pre-…

[ ad ]300×250
Covenant
Covenant
Open Source Exploitation Post-Exploitation

.NET-based C2 framework with a collaborative web interface. Uses .NET Grunts as implants, supports a rich task library, and integrates with …

CrackMapExec (CME / NetExec)
CrackMapExec (CME / NetExec)
Open Source Kali Exploitation Post-Exploitation

Swiss army knife for pentesting Windows/Active Directory environments. Tests credentials at scale, executes commands, dumps credentials, and…

CredSniper
CredSniper
Open Source Social Engineering

Phishing framework written in Python using Flask and Jinja2 templates. Supports 2FA capture (TOTP/HOTP) and has pre-built modules for Gmail,…

Crunch
Crunch
Open Source Kali Password Attacks

Wordlist generator that creates wordlists based on specified criteria including character sets, patterns, minimum and maximum length. Can ge…

Dalfox
Dalfox
Open Source Web Application

Fast parameter analysis and XSS scanner. Features DOM-based XSS detection, built-in BAC (Blind XSS), custom payloads, headless Chrome suppor…

[ ad ]300×250
DNSrecon
DNSrecon
Open Source Kali Reconnaissance

DNS enumeration script supporting zone transfers, reverse lookups, SRV record enumeration, top-level domain expansion, and brute-force subdo…

dnsx
dnsx
Open Source Reconnaissance Scanning & Enumeration

Fast and multi-purpose DNS toolkit from ProjectDiscovery. Resolves domains, performs wildcard filtering, brute-forces subdomains, and extrac…

Donut
Donut
Open Source Evasion Exploitation

Generates position-independent shellcode from .NET assemblies, PE files, scripts (VBScript, JScript), and XSL that runs in memory. Used to e…

Dradis Framework
Dradis Framework
Freemium Kali Reporting

Collaboration and reporting platform for security assessments. Centralizes findings, enables team collaboration, imports results from Nmap, …

Droopescan
Droopescan
Open Source Web Application

Plugin-based scanner that aids security researchers in identifying issues with Drupal, SilverStripe, and WordPress sites. Detects plugins, t…

[ ad ]300×250
enum4linux
enum4linux
Open Source Kali Scanning & Enumeration

Linux alternative to enum.exe for enumerating data from Windows and Samba systems. Extracts usernames, shares, workgroup info, password poli…

enum4linux-ng
enum4linux-ng
Open Source Kali Scanning & Enumeration

Next-generation rewrite of enum4linux with YAML/JSON output, improved reliability, and additional checks for modern Windows environments.

Evil-WinRM
Evil-WinRM
Open Source Kali Exploitation Post-Exploitation

Full-featured WinRM shell for hacking and penetration testing. Supports pass-the-hash, file upload/download, in-memory script loading, and P…

Evilginx2
Evilginx2
Open Source Social Engineering Web Application

Standalone man-in-the-middle attack framework that bypasses 2FA by proxying authentication sessions and capturing session cookies. Uses phis…

ExifTool
ExifTool
Open Source Kali Forensics Reconnaissance

Platform-independent Perl library and command-line tool for reading, writing, and editing metadata in a wide variety of files including phot…

[ ad ]300×250
ExploitDB / SearchSploit
ExploitDB / SearchSploit
Open Source Kali Exploitation

Archive of public exploits and vulnerable software maintained by Offensive Security. SearchSploit provides offline command-line search of th…

EyeWitness
EyeWitness
Open Source Kali Reconnaissance Web Application

Takes screenshots of web pages, RDP, and VNC services. Reports on default credentials and interesting headers. Useful for rapidly assessing …

Faraday
Faraday
Freemium Kali Reporting

Integrated multi-user pentest environment for collaborative penetration testing. Aggregates tool output in real-time, manages vulnerabilitie…

Feroxbuster
Feroxbuster
Open Source Kali Scanning & Enumeration Web Application

Fast, recursive content discovery tool written in Rust. Performs automatic recursive scanning and handles redirects, filters, and parallel s…

ffuf
ffuf
Open Source Kali Scanning & Enumeration Web Application

Fast web fuzzer written in Go. Supports directory discovery, parameter fuzzing, virtual host discovery, POST data fuzzing, and custom header…

[ ad ]300×250
Fierce
Fierce
Open Source Kali Reconnaissance

DNS reconnaissance tool for locating non-contiguous IP space and hostnames against specified domains. Performs zone transfers, brute-force, …

Flipper Zero
Flipper Zero
Open Source Reconnaissance Wireless

Portable multi-tool for hardware hacking. Supports Sub-GHz radio, 125kHz RFID, NFC, Infrared, iButton, Bluetooth, GPIO, and USB. Runs open-s…

Foremost
Foremost
Open Source Kali Forensics

Console program to recover files based on their headers, footers, and internal data structures. Useful for recovering deleted images, PDFs, …

Frida
Frida
Open Source Kali Reverse Engineering

Dynamic instrumentation toolkit for developers, reverse engineers, and security researchers. Injects JavaScript or Python into native apps (…

GDB with pwndbg
GDB with pwndbg
Open Source Kali Exploitation Reverse Engineering

GDB (GNU Debugger) enhanced with pwndbg plugin for exploit development and reverse engineering. Adds heap visualization, stack inspection, R…

[ ad ]300×250
Ghidra
Ghidra
Open Source Kali Reverse Engineering

NSA-developed software reverse engineering suite. Features a disassembler, decompiler, scripting (Java/Python), graphing, and collaborative …

Ghostwriter
Ghostwriter
Open Source Reporting

Django-based engagement management and reporting platform. Tracks infrastructure, manages findings, stores evidence, and generates professio…

GitLeaks
GitLeaks
Open Source Reconnaissance

SAST tool for detecting hardcoded secrets like passwords, API keys, and tokens in git repositories. Scans commits, branches, and git history…

GitTools
GitTools
Open Source Reconnaissance Web Application

Tools to download and reconstruct exposed .git repositories from web servers. Includes Gitdumper (download), Extractor (extract commits), an…

Gobuster
Gobuster
Open Source Kali Scanning & Enumeration Web Application

Directory/file and DNS busting tool written in Go. Extremely fast. Modes include directory brute-force, DNS subdomain enumeration, virtual h…

[ ad ]300×250
Gophish
Gophish
Open Source Social Engineering

Open-source phishing framework designed for business security awareness campaigns. Features a rich web UI, email templates, landing page tem…

GraphQL Voyager / InQL
GraphQL Voyager / InQL
Open Source Web Application

InQL is a Burp Suite and standalone GraphQL security scanner. Analyzes introspection queries, generates operations, detects batch query atta…

GTFOBins
GTFOBins
Open Source Post-Exploitation

Curated list of Unix binaries that can be used to bypass local security restrictions. Shows how to abuse sudo, SUID, capabilities, and file …

Hashcat
Hashcat
Open Source Kali Password Attacks

World's fastest password recovery utility supporting 300+ hash types. Uses GPU acceleration and advanced attack modes including dictionary, …

Hashid
Hashid
Open Source Kali Password Attacks

Identifies different types of hashes used to encrypt data. Supports over 220 hash types and provides the corresponding Hashcat mode ID for d…

[ ad ]300×250
Havoc C2
Havoc C2
Open Source Exploitation Post-Exploitation

Modern C2 framework designed for red teams. Features a sleek GUI, Demon agent with evasion techniques, team server for collaboration, and ex…

Hcxdumptool
Hcxdumptool
Open Source Kali Wireless

Small tool to capture packets from WLAN devices. Captures PMKID and EAPOL handshakes directly without requiring deauthentication. Outputs ca…

httpx
httpx
Open Source Kali Reconnaissance Scanning & Enumeration

Fast and multi-purpose HTTP toolkit from ProjectDiscovery. Probes hosts for live web services, extracts title, status code, content length, …

Hydra
Hydra
Open Source Kali Password Attacks

Fast and flexible online password brute-forcing tool supporting 50+ protocols including FTP, SSH, Telnet, HTTP, SMB, LDAP, MySQL, RDP, IMAP,…

IDA Pro
IDA Pro
Paid Reverse Engineering

The industry-standard disassembler and decompiler (with Hex-Rays decompiler). Supports the widest range of processor architectures and binar…

[ ad ]300×250
Impacket
Impacket
Open Source Kali Exploitation Post-Exploitation

Collection of Python classes for working with network protocols. Includes tools for SMB, MSRPC, LDAP, Kerberos, and more. Used for Pass-the-…

Impacket-secretsdump
Impacket-secretsdump
Open Source Kali Password Attacks Post-Exploitation

Dumps secrets remotely using a variety of techniques including DCSync (without running code on DC), VSS, and SAM dump. Part of the Impacket …

Interactsh
Interactsh
Open Source Scanning & Enumeration Web Application

Out-of-band interaction gathering server. Generates unique collaboration URLs for detecting blind vulnerabilities like SSRF, XXE, SSTI, blin…

JADX
JADX
Open Source Kali Reverse Engineering

Dex to Java decompiler. Produces Java source code from Android APK/DEX/AAR/AAB files. Features a GUI with search, deobfuscation, and resourc…

John the Ripper
John the Ripper
Open Source Kali Password Attacks

Fast password cracker available for many operating systems. Auto-detects hash types, supports dictionary and incremental attacks, and includ…

[ ad ]300×250
Joomscan
Joomscan
Open Source Kali Web Application

OWASP Joomla vulnerability scanner. Detects Joomla version, components, modules, and templates with known vulnerabilities. Checks for common…

JWT_Tool
JWT_Tool
Open Source Web Application

Toolkit for testing, tampering, and forging JSON Web Tokens. Tests common JWT vulnerabilities including algorithm confusion (alg:none, RS256…

Kerbrute
Kerbrute
Open Source Kali Password Attacks Reconnaissance

Kerberos brute-forcing tool for performing user enumeration and password spraying against Active Directory. Does not trigger account lockout…

Kerbrute
Kerbrute
Open Source Kali Password Attacks Reconnaissance

Fast Kerberos brute-forcing tool written in Go. Performs user enumeration and password spraying against Kerberos pre-authentication. Does no…

King Phisher
King Phisher
Open Source Social Engineering

Phishing campaign toolkit with client-server architecture. Features rich email templates with Jinja2, credential tracking, geo-location mapp…

[ ad ]300×250
Kismet
Kismet
Open Source Kali Reconnaissance Wireless

Wireless network detector, sniffer, wardriver, and WIDS (Wireless Intrusion Detection System). Supports Wi-Fi, Bluetooth, Zigbee, and other …

Ligolo-ng
Ligolo-ng
Open Source Exploitation Post-Exploitation

Advanced tunneling/pivoting tool that creates a VPN-like tunnel from the agent to the operator without SOCKS proxies. Enables direct routing…

LinEnum
LinEnum
Open Source Post-Exploitation

Scripted local Linux enumeration and privilege escalation checks. Collects system information, user data, SUID/SGID binaries, sudo configura…

LOLBAS
LOLBAS
Open Source Evasion Post-Exploitation

Living Off The Land Binaries And Scripts — documents Windows native binaries that can be abused for execution, download, bypass, and persist…

MagicTree
MagicTree
Free Kali Reporting

Penetration tester productivity tool designed to allow easy data consolidation and report generation. Stores test results in a tree structur…

[ ad ]300×250
Maltego
Maltego
Freemium Kali Reconnaissance

Interactive data mining tool that renders graphical link charts of relationships between domains, people, companies, IPs, and social media a…

Masscan
Masscan
Open Source Kali Reconnaissance Scanning & Enumeration

The fastest Internet port scanner. Can scan the entire IPv4 address space in under 6 minutes. Produces output compatible with Nmap.

Medusa
Medusa
Open Source Kali Password Attacks

Speedy, massively parallel, modular login brute-forcer. Supports AFP, CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP, NNTP, PcAnywhere, POP3, REXE…

Metagoofil
Metagoofil
Open Source Kali Reconnaissance

Information gathering tool that downloads and extracts metadata from public documents (PDF, Word, Excel, PowerPoint) found via Google dork s…

Metasploit Framework
Metasploit Framework
Open Source Kali Exploitation Post-Exploitation

The world's most widely used penetration testing framework. Provides hundreds of exploit modules, payloads, encoders, and post-exploitation …

[ ad ]300×250
Meterpreter
Meterpreter
Open Source Kali Post-Exploitation

Metasploit's advanced, dynamically extensible payload. Runs entirely in memory, supports migration, keylogging, screenshot capture, pivoting…

Mimikatz
Mimikatz
Open Source Kali Password Attacks Post-Exploitation

Post-exploitation tool to extract plaintexts passwords, hashes, PIN codes, and Kerberos tickets from memory. Also performs Pass-the-Hash, Pa…

Modlishka
Modlishka
Open Source Social Engineering

Flexible and powerful reverse HTTP proxy for phishing. Captures credentials and bypasses 2FA by acting as a transparent proxy between the vi…

msfvenom
msfvenom
Open Source Kali Evasion Exploitation

Metasploit standalone payload generator and encoder. Creates payloads for all platforms with customizable encoders, iterations, and formats …

Ncat
Ncat
Open Source Kali Post-Exploitation Scanning & Enumeration

Feature-packed reimplementation of Netcat from the Nmap project. Adds SSL/TLS support, connection brokering, and scripting capabilities.

[ ad ]300×250
Nessus
Nessus
Freemium Scanning & Enumeration

Industry-leading vulnerability scanner with 170,000+ plugins. Identifies vulnerabilities, misconfigurations, default passwords, and complian…

Netcat (nc)
Netcat (nc)
Open Source Kali Post-Exploitation Scanning & Enumeration

The "Swiss army knife" of networking. Reads and writes data across network connections using TCP/UDP. Used for port scanning, banner grabbin…

Netexec (nxc)
Netexec (nxc)
Open Source Kali Exploitation Post-Exploitation

The maintained fork and successor to CrackMapExec. Network service exploitation Swiss army knife for Active Directory pentesting. Supports S…

NetworkMiner
NetworkMiner
Freemium Forensics

Network forensics analysis tool (NFAT) that captures packets and parses them to reconstruct transmitted files, certificates, images, and cre…

Nikto
Nikto
Open Source Kali Scanning & Enumeration Web Application

Open-source web server scanner that checks for over 6,700 potentially dangerous files, outdated server software, version-specific problems, …

[ ad ]300×250
Nishang
Nishang
Open Source Kali Exploitation Post-Exploitation

Framework and collection of PowerShell scripts and payloads for offensive security and post-exploitation. Includes reverse shells, privilege…

Nmap
Nmap
Open Source Kali Reconnaissance Scanning & Enumeration

The industry-standard network scanner. Discovers hosts, open ports, services, OS versions, and runs scriptable vulnerability checks via the …

NoSQLMap
NoSQLMap
Open Source Exploitation Web Application

Automated NoSQL injection and database exploitation tool. Targets MongoDB, CouchDB, Redis, and Cassandra for injection attacks and retrieves…

ntlm_theft
ntlm_theft
Open Source Exploitation

Creates malicious files (LNK, SCF, PDF, DOCX, etc.) that force a Windows system to authenticate to an attacker's server when the file is acc…

Nuclei
Nuclei
Open Source Kali Scanning & Enumeration Web Application

Fast, template-based vulnerability scanner. Thousands of community-maintained YAML templates cover CVEs, misconfigurations, exposed panels, …

[ ad ]300×250
OpenVAS / Greenbone
OpenVAS / Greenbone
Open Source Kali Scanning & Enumeration

Open-source vulnerability assessment framework. Full-featured scanner with a web interface, regularly updated Network Vulnerability Tests (N…

Osmedeus
Osmedeus
Open Source Reconnaissance Scanning & Enumeration

Workflow engine for offensive security reconnaissance. Orchestrates multiple tools (amass, subfinder, nuclei, etc.) in automated pipelines f…

OWASP Favicon Database
OWASP Favicon Database
Open Source Reconnaissance

Uses favicon hashes to identify services and technologies on web servers. By comparing favicon hashes with known databases, it can fingerpri…

OWASP ZAP
OWASP ZAP
Open Source Kali Scanning & Enumeration Web Application

OWASP's Zed Attack Proxy — one of the world's most popular free web application security scanners. Features active/passive scanning, spideri…

PEASS-ng (WinPEAS / LinPEAS)
PEASS-ng (WinPEAS / LinPEAS)
Open Source Kali Post-Exploitation

Privilege Escalation Awesome Scripts Suite. Automatically enumerates Windows (WinPEAS) and Linux/Mac (LinPEAS) systems for privilege escalat…

[ ad ]300×250
PetitPotam
PetitPotam
Open Source Exploitation

PoC tool to coerce Windows hosts to authenticate to an attacker-controlled machine using MS-EFSRPC (EFS). Used in NTLM relay attacks against…

Photon
Photon
Open Source Reconnaissance Web Application

Fast web crawler designed for OSINT. Extracts URLs, emails, social media accounts, Amazon S3 buckets, Bitcoin wallets, and files from a targ…

Plaso (log2timeline)
Plaso (log2timeline)
Open Source Kali Forensics

Timeline creation and analysis tool. Extracts timestamps from hundreds of artifact types across Windows, Linux, and macOS to create a super-…

PlexTrac
PlexTrac
Paid Reporting

Cloud-based pentest management and reporting platform. Features report automation, finding templates, client portal, analytics, and integrat…

PowerSploit
PowerSploit
Open Source Kali Post-Exploitation

Collection of PowerShell modules for post-exploitation. Includes PowerView for AD recon, PowerUp for privilege escalation, Invoke-Mimikatz, …

[ ad ]300×250
ProtectMyTooling
ProtectMyTooling
Open Source Evasion

Wrapper for multiple packers, protectors, obfuscators, and artifact-modifying tools. Automates multi-stage tooling protection pipelines to m…

Proxmark3
Proxmark3
Open Source Reconnaissance

Swiss army knife for RFID security research. Reads, writes, emulates, sniffs, and brute-forces RFID/NFC tags including HID, EM4100, Mifare C…

Proxychains
Proxychains
Open Source Kali Post-Exploitation

Forces any TCP connection made by a given application through proxy servers like SOCKS4, SOCKS5, or HTTP. Essential for pivoting through com…

pwntools
pwntools
Open Source Kali Exploitation Reverse Engineering

CTF framework and exploit development library for Python. Simplifies binary exploitation with process/socket interaction, shellcode generati…

Radare2
Radare2
Open Source Kali Reverse Engineering

Portable reversing framework that includes a hex editor, disassembler, debugger, scripting engine (r2pipe), and graphing. Supports many arch…

[ ad ]300×250
Recon-ng
Recon-ng
Open Source Kali Reconnaissance

A full-featured web reconnaissance framework with a module system similar to Metasploit. Automates OSINT collection from dozens of data sour…

Responder
Responder
Open Source Kali Exploitation

LLMNR, NBT-NS, and mDNS poisoner that captures NTLMv1/v2 hashes. Also runs rogue SMB, HTTP, FTP, and other servers to capture credentials on…

Responder (NBT-NS Poisoner)
Responder (NBT-NS Poisoner)
Open Source Kali Exploitation

Rogue authentication server and LLMNR/NBT-NS/mDNS poisoner for Windows networks. Captures NTLM challenge-response hashes for offline crackin…

RetDec
RetDec
Open Source Reverse Engineering

Retargetable machine-code decompiler based on LLVM. Developed by Avast. Decompiles x86, ARM, MIPS, PIC32, and PowerPC binaries to C with met…

Retire.js
Retire.js
Open Source Scanning & Enumeration Web Application

Detects the use of JavaScript libraries with known vulnerabilities. Available as a CLI tool, browser extension, Grunt plugin, and Burp Suite…

[ ad ]300×250
Rubeus
Rubeus
Open Source Exploitation Post-Exploitation

C# toolset for raw Kerberos interaction and abuse. Performs Kerberoasting, AS-REP Roasting, Pass-the-Ticket, Golden/Silver Ticket attacks, t…

ScareCrow
ScareCrow
Open Source Evasion

Payload creation framework focused on EDR bypass. Creates loaders using a variety of techniques including side-loading, binary padding, expi…

Serpico
Serpico
Open Source Reporting

Penetration testing report generation tool built in Ruby. Stores findings and reusable recommendations, generates Word DOCX reports, and sup…

SharpHound
SharpHound
Open Source Post-Exploitation Reconnaissance

C# ingestor for BloodHound. Collects Active Directory data including group memberships, ACLs, trust relationships, sessions, and local admin…

Shellter
Shellter
Freemium Kali Evasion

Dynamic shellcode injection tool designed to inject shellcode into native Windows applications (PE files). Randomly modifies the PE file's e…

[ ad ]300×250
Shodan
Shodan
Freemium Reconnaissance

Search engine for internet-connected devices. Finds exposed servers, webcams, ICS/SCADA systems, databases, and more. Offers a CLI and REST …

Sleuth Kit
Sleuth Kit
Open Source Kali Forensics

Collection of command-line tools and C library for analyzing disk images. Supports NTFS, FAT, Ext2/3/4, HFS+, and more. Foundation for Autop…

Sliver
Sliver
Open Source Exploitation Post-Exploitation

Open-source C2 framework from BishopFox. Supports mTLS, WireGuard, HTTP/S, and DNS C2 channels. Features implant generation, pivoting, BOF s…

SMBMap
SMBMap
Open Source Kali Scanning & Enumeration

Allows users to enumerate SMB shares across a domain, list share permissions, check drive access, and execute remote commands via authentica…

Social-Engineer Toolkit (SET)
Social-Engineer Toolkit (SET)
Open Source Kali Social Engineering

Open-source penetration testing framework designed for social engineering attacks. Features phishing attacks, credential harvesting, spear-p…

[ ad ]300×250
SpeedPhish Framework (SPF)
SpeedPhish Framework (SPF)
Open Source Reconnaissance Social Engineering

Tool designed to allow quick and effective phishing exercises. Automates target gathering, email generation, website cloning, and credential…

SpiderFoot
SpiderFoot
Open Source Kali Reconnaissance

Automated OSINT tool that queries 200+ data sources to gather intelligence on IP addresses, domain names, email addresses, and usernames. In…

Spray
Spray
Open Source Password Attacks

Password spraying tool for Active Directory environments. Designed to avoid account lockouts by spraying a single password across many accou…

SQLMap
SQLMap
Open Source Kali Exploitation Web Application

Automatic SQL injection and database takeover tool. Supports detection and exploitation of all major SQL injection types across MySQL, MSSQL…

SSRFmap
SSRFmap
Open Source Web Application

Automatic SSRF (Server-Side Request Forgery) fuzzer and exploitation tool. Tests for SSRF vulnerabilities and exploits them to reach interna…

[ ad ]300×250
Subfinder
Subfinder
Open Source Kali Reconnaissance

Fast passive subdomain enumeration tool from ProjectDiscovery. Uses passive online sources including certificate transparency logs, DNS data…

theHarvester
theHarvester
Open Source Kali Reconnaissance

Gathers emails, subdomains, hosts, employee names, open ports, and virtual hosts from public sources including Google, Bing, LinkedIn, Shoda…

Trivy
Trivy
Open Source Scanning & Enumeration

Comprehensive vulnerability and misconfiguration scanner for containers, Kubernetes, code repositories, and cloud infrastructure. Supports D…

truffleHog
truffleHog
Open Source Reconnaissance

Searches git repositories, S3 buckets, filesystems, and more for high-entropy strings and patterns that indicate secrets such as API keys an…

Unicorn
Unicorn
Open Source Evasion Exploitation

Simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Works with Metasploit payloads and custom she…

[ ad ]300×250
unix-privesc-check
unix-privesc-check
Open Source Kali Post-Exploitation

Shell script to check for simple privilege escalation vectors on Unix systems. Checks file permissions, sudo rights, SUID binaries, cron job…

Veil Framework
Veil Framework
Open Source Kali Evasion Exploitation

Tool designed to generate Metasploit payloads that bypass common antivirus solutions. Supports multiple programming languages for payload ge…

Volatility 3
Volatility 3
Open Source Kali Forensics

Framework for extracting digital artifacts from volatile memory (RAM) dumps. Supports Windows, Linux, and macOS memory images. Extracts proc…

Volatility Workbench
Volatility Workbench
Free Forensics

Free GUI front-end for Volatility 3 memory forensics framework on Windows. Simplifies memory analysis workflow with dropdown plugin selectio…

Wfuzz
Wfuzz
Open Source Kali Scanning & Enumeration Web Application

Web application fuzzer that replaces any reference to the FUZZ keyword with a payload value. Supports multiple encoders, filters, iterators,…

[ ad ]300×250
WhatWeb
WhatWeb
Open Source Kali Reconnaissance Web Application

Web scanner that identifies web technologies including CMS, blogging platforms, analytics packages, JavaScript libraries, server frameworks,…

Wifite
Wifite
Open Source Kali Wireless

Automated wireless attack tool that attacks multiple WEP/WPA/WPA2/WPS encrypted networks in sequence. Runs airodump-ng, aireplay-ng, and air…

Wireshark
Wireshark
Open Source Kali Forensics Scanning & Enumeration

World's foremost network protocol analyzer. Captures and interactively browses traffic on a computer network. Supports hundreds of protocols…

WPScan
WPScan
Freemium Kali Web Application

WordPress security scanner. Enumerates WordPress installations for vulnerable plugins, themes, and configurations. Checks usernames, timthum…

x64dbg
x64dbg
Open Source Reverse Engineering

Open-source x64/x32 debugger for Windows. Actively maintained with a plugin ecosystem, scriptable, and designed to replace OllyDbg. Excellen…

[ ad ]300×250
XSStrike
XSStrike
Open Source Web Application

Advanced XSS detection and exploitation suite. Features a crawler, fuzzer, a context-aware analysis engine, and a payload generator that cra…

[ advertisement ]728×90