search
Join or Log In

Offensive Security

Browse 79 cybersecurity tools tagged with "Offensive Security"

Damn Vulnerable iOS App (DVIA)

Damn Vulnerable iOS

language

Penetration Testing

Damn Vulnerable iOS App (DVIA) on SecurityListing: iOS application for testing iOS penetration testing skills in a legal environment.

4.8(3)
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite

Cobalt Strike HTTP

language

Offensive Security

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

4.7(2)
Brute Ratel C4

Brute Ratel C4

language

Offensive Security

Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

4.7(2)
DorkSearch

DorkSearch

language

Offensive Security

DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

4.7(2)
Kali

Kali

language

Vulnerability Assessment

Kali on SecurityListing: Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

4.7(2)
CBRX AI Red Teaming

CBRX AI Red

language

Offensive Security

CBRX AI Red Teaming on SecurityListing: Offensive security testing service for LLM applications and AI systems

4.7(2)
PentesterLab PRO

PentesterLab PRO

language

Penetration Testing

PentesterLab PRO on SecurityListing: Online platform offering 700+ hands-on web security exercises and training

4.7(2)
xargs

xargs

language

Offensive Security

xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

4.7(2)
ParrotSec

ParrotSec

language

Offensive Security

ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

4.5(3)
PoshC2

PoshC2

language

Penetration Testing

PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

4.5(3)
Combatting Incident Responders with Apache mod_rewrite

Combatting Incident Responders

language

Offensive Security

Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

4.5(3)
BeEF

BeEF

language

Penetration Testing

BeEF on SecurityListing: BeEF is a specialized penetration testing tool for exploiting web browser vulnerabilities to assess security.

4.5(3)
Lab of a Penetration Tester: Week of Evading Microsoft ATA

Lab of a

language

Offensive Security

Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

4.5(3)
TechTarget

TechTarget

language

Offensive Security

TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.

4.5(1)
GNU Netcat

GNU Netcat

language

Offensive Security

GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.

4.5(1)
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

Abusing the COM

language

Offensive Security

Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32

4.5(1)
DNS Tunnelling

DNS Tunnelling

language

Offensive Security

DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

4.5(1)
Proxmark III

Proxmark III

language

Offensive Security

Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.

4.5(1)
Aircrack-ng

Aircrack-ng

language

Offensive Security

Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.

4.5(1)
Covert Red Team Attack Infrastructure

Covert Red Team

language

Offensive Security

Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

4.5(1)
Daniel Miessler/Unsupervised Learning

Daniel Miessler/Unsupervised Learning

language

Offensive Security

Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.

4.5(1)
DVWA - Brute Force (High Level) - Anti-CSRF Tokens

DVWA - Brute

language

Offensive Security

DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

4.5(1)
How to Write Malleable C2 Profiles for Cobalt Strike

How to Write

language

Offensive Security

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

4.5(1)
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts

Executing Commands and

language

Offensive Security

Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts

4.5(1)
Threatpost

Threatpost

language

Offensive Security

Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.

4.5(1)
Cobalt Strike's ExternalC2 framework

Cobalt Strike's ExternalC2

language

Penetration Testing

Cobalt Strike's ExternalC2 framework on SecurityListing: A specification/framework for extending default C2 communication channels in Cobalt Strike

4.5(1)
Ophcrack

Ophcrack

language

Offensive Security

Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.

4.5(1)
ExploitDB

ExploitDB

language

Penetration Testing

ExploitDB on SecurityListing: A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.

4.5(1)
DiskShadow

DiskShadow

language

Offensive Security

DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

4.5(1)
Reversing and Exploiting ARM Binaries: rwthCTF Trafman

Reversing and Exploiting

language

Offensive Security

Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

4.5(1)
State of Security

State of Security

language

Offensive Security

State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

4.5(1)
Abusing DCOM For Yet Another Lateral Movement Technique

Abusing DCOM For

language

Offensive Security

Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

4.5(1)
Caldera

Caldera

language

Offensive Security

Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.

4.3(2)
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence

bohops Leveraging INF-SCT

language

Offensive Security

bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

4.3(2)
Empire Communication Profiles

Empire Communication Profiles

language

Offensive Security

Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.

4.3(2)
Operating System Based Redirection with Apache mod_rewrite

Operating System Based

language

Offensive Security

Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.

4.3(2)
Java Decompiler Online

Java Decompiler Online

language

Offensive Security

Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.

4.3(2)
PTJunior

PTJunior

language

Offensive Security

PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.

4.3(2)
LockBoxx

LockBoxx

language

Offensive Security

LockBoxx on SecurityListing: Introduction to using GScript for Red Teams

3.8(1)
Randomized Malleable C2 Profiles Made Easy

Randomized Malleable C2

language

Penetration Testing

Randomized Malleable C2 Profiles Made Easy on SecurityListing: Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.

3.8(1)
Bastille-Linux

Bastille-Linux

language

Offensive Security

Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.

3.8(1)
LeakIX

LeakIX

language

Offensive Security

LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.

3.8(1)
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement

Abusing Exported Functions

language

Offensive Security

Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

3.8(1)
checkra1n

checkra1n

language

Offensive Security

checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.

3.8(1)
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker

Loading Alternate Data

language

Offensive Security

Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.

3.8(1)
ARM Assembly and Shellcode

ARM Assembly and

language

Offensive Security

ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.

3.8(1)
Proxmark 3

Proxmark 3

language

Offensive Security

Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.

3.8(1)
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)

Leveraging INF-SCT Fetch

language

Offensive Security

Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

Reverse Engineering HID iClass Master Keys

Reverse Engineering HID

language

Offensive Security

Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.

Bleeping Computer

Bleeping Computer

language

Offensive Security

Bleeping Computer on SecurityListing: A customizable offensive security reporting solution for pentesters and red teamers to generate detailed reports of their findings and vulnerabilities.

The Hacker News

The Hacker News

language

Offensive Security

The Hacker News on SecurityListing: The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection

Strengthen Your Phishing

language

Offensive Security

Strengthen Your Phishing with Apache mod_rewrite and Mobile User Redirection on SecurityListing: A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

WebDAV Covert Channel

WebDAV Covert Channel

language

Offensive Security

WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

The Security Ledger

The Security Ledger

language

Offensive Security

The Security Ledger on SecurityListing: Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.

Tao Security

Tao Security

language

Offensive Security

Tao Security on SecurityListing: Sysreptor provides a customizable reporting platform for pentesters and red teamers to efficiently document security assessments.

The State of Security by Tripwire

The State of

language

Offensive Security

The State of Security by Tripwire on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming activities.

Theos Red Teaming

Theos Red Teaming

language

Offensive Security

Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.

Vshadow

Vshadow

language

Offensive Security

Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.

Workshop Hacking Bluetooth Smart locks

Workshop Hacking Bluetooth

language

Offensive Security

Workshop Hacking Bluetooth Smart locks on SecurityListing: A workshop on hacking Bluetooth Smart locks, covering architecture, vulnerabilities, and exploitation techniques.

Yogosha Pentest as a Service

Yogosha Pentest as

language

Offensive Security

Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers

tcpkill

tcpkill

language

Penetration Testing

tcpkill on SecurityListing: A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.

Using a SCF file to Gather Hashes

Using a SCF

language

Offensive Security

Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.

OWASP Bricks

OWASP Bricks

language

Penetration Testing

OWASP Bricks on SecurityListing: Deliberately vulnerable web application for security professionals to practice attack techniques.

UPX

UPX

language

Offensive Security

UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.

Security Intelligence

Security Intelligence

language

Offensive Security

Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution

ClickOnce (Twice or

language

Penetration Testing

ClickOnce (Twice or Thrice): A Technique for Social Engineering and (Un)trusted Command Execution on SecurityListing: A technique for social engineering and untrusted command execution using ClickOnce technology

DDE attack with PowerShell Empire

DDE attack with

language

Offensive Security

DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

snmpcheck

snmpcheck

language

Offensive Security

snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory

Lab of a

language

Offensive Security

Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory on SecurityListing: Abusing DNSAdmins privilege for escalation in Active Directory

Windows 7 UAC Whitelist Code-Injection Issue

Windows 7 UAC

language

API Security

Windows 7 UAC Whitelist Code-Injection Issue on SecurityListing: Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

Troy Hunt

Troy Hunt

language

Offensive Security

Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.

Serving Random Payloads with Apache mod_rewrite

Serving Random Payloads

language

Penetration Testing

Serving Random Payloads with Apache mod_rewrite on SecurityListing: A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

PowerUpSQL

PowerUpSQL

language

Penetration Testing

PowerUpSQL on SecurityListing: Tool for attacking Active Directory environments through SQL Server access.

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation

Trust Direction: An

language

Offensive Security

Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation

Wifislax

Wifislax

language

Penetration Testing

Wifislax on SecurityListing: GNU/Linux Wireless distribution for security testing with XFCE desktop environment.

Windows Oneliners for Remote Code Execution

Windows Oneliners for

language

Offensive Security

Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

XSS'OR

XSS'OR

language

Offensive Security

XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.

tcpreplay

tcpreplay

language

Offensive Security

tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.

Preparing for Red Team at PRCCDC 2015

Preparing for Red

language

Penetration Testing

Preparing for Red Team at PRCCDC 2015 on SecurityListing: Preparation process for participating in the Pacific Rim CCDC 2015.