Offensive Security Tools
Offensive Security tools and solutions.
68 products available
RedForce

Application Security
RedForce is an information security consultancy specializing in offensive security. The firm offers services such as red team operations, infrastructure and web application penetration.
AMSAT

Application Security
AMSAT is a premier managed cybersecurity provider with operations in the United States, United Arab Emirates, and the United Kingdom. The company offers a range of security services including infrastr
Cyber 50 Defense

GRC
Cyber 50 Defense is an UAE-based cybersecurity company offering governance, risk and compliance (GRC) solutions, 24/7 managed protection, security assessments, incident response, and compliance servic
Cobalt Strike HTTP
Offensive Security
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
xargs
Offensive Security
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
CBRX AI Red
Offensive Security
CBRX AI Red Teaming on SecurityListing: Offensive security testing service for LLM applications and AI systems
Brute Ratel C4
Offensive Security
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
DorkSearch
Offensive Security
DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
eShield IT Services

Cloud Security
eShield IT Services is a cybersecurity company based in the United Arab Emirates that provides security, privacy, and regulatory compliance services. It specializes in data protection law, PCI DSS and
Combatting Incident Responders
Offensive Security
Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
Lab of a
Offensive Security
Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
ParrotSec
Offensive Security
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
SSD TECH

AI Security
SSD TECH is a cybersecurity firm specializing in risk assessment, security architecture, audits, compliance, and governance across enterprises. The company emphasizes reducing risk for organizations b
Black Cell

Cloud Security
Black Cell is a cybersecurity firm focused on protecting critical infrastructures in the Middle East, offering offensive security, cloud security, compliance, and integrated security services. The com
Rewterz

Application Security
Rewterz is a cybersecurity company that provides advanced defense and threat protection services to organizations worldwide. The company offers capabilities including XDR, threat intelligence, managed
MCS

GRC
MCS is a leading value-added distributor in Egypt and the broader MENA region, specializing in cybersecurity defense, datacenter infrastructure, IT service operation management, network infrastructure
GNU Netcat
Offensive Security
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.
DiskShadow
Offensive Security
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Proxmark III
Offensive Security
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
Aircrack-ng
Offensive Security
Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
Reversing and Exploiting
Offensive Security
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
CYGEN

Cloud Security
CYGEN is a cybersecurity company offering data-driven, customized security solutions to protect digital assets and ensure business continuity. With five years in operation, they serve clients across E
Ophcrack
Offensive Security
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
SecurityScope

Application Security
SecurityScope offers hands-on cybersecurity training and penetration testing labs, providing immersive environments to practice real-world scenarios. The organization focuses on ethical hacking, vulne