Explore our curated list of tools.
259 listed tools Last update on 2025-04-28
Recon: Information gathering stage, where attackers gather as much information as possible about the target.
Weaponization: Crafting of tools or payloads to exploit vulnerabilities.
Delivery: The transmission of the weaponized payload to the target.
Exploitation: Exploiting a vulnerability to gain access to the target system.
Installation: Establishing a foothold on the target system.
Command & Control (C2): Setting up channels for communication with the compromised system.
Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.
Commercial Open-source
Post-exploitation pentest tools to verify vulnerabilities, manage assessments, and more.
Open-source
USB or network program for printer security mapping & exploitation
Free
A Debian-based distro, boot from CD/USB, filters traffic through TOR and attempts trace cleanup after use
Open-source
Distro is organized around Penetration Testing Execution Standard (PTES)
Open-source
Perl script with DNS enumeration, zone transfer, dictionary attack, and reverse lookup functionality
Commercial
Open-source intelligence and graphical link analysis tool for gathering and connecting information for intelligence and forensics. (€ 999 per year)
Commercial
Multiuser pentesting environment for red teams performing coop tests, security audits, and risk assessments.
Open-source
Reveal the specific modules, plugins, components, and themes run by CMS websites + associated vulnerabilities
Open-source
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery
Free
Service to check if your email or phone number has been compromised in a data breach
Commercial
OSINT search engine and data archive for email, domain, IP, Bitcoin address, and more
Commercial
Adversary simulator with red-team, breach simulation, and purple team capabilities.
Open-source
Menu-driven tool for building distributed security events for red/blue/purple team drills
Commercial
A multi-processor disassembler and debugger with free/premium versions
Open-source
Toolchain for forensics, software reverse engineering, exploiting, debugging, etc.
Open-source
MITM attack framework used for phishing credentials and session cookies with 2-factor bypass
Open-source
Powerful, open-source phishing framework to simulate and manage phishing campaigns
Open-source
Create and manage simultaneous phishing attacks with server and content tools
Open-source
Automated phishing attacks against WiFi networks for red teaming or WiFi investigations
Open-source
Getallurls (gau) fetches known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl
Open-source
A subdomain discovery tool that discovers valid subdomains for websites by using passive online sources
Open-source
Analyze URLs and estimate entropies to find URLs that might be vulnerable to attack
Open-source
Accept line-delimited domains on stdin, fetch URLs from the Wayback Machine for *.domain and output them on stdout
Open-source
Command and control server for delivering exploits
Commercial
An integrated platform for web-application pentesting (Free edition available)
Open-source
Brute-force over directories and web application server tool with hidden directory search
Open-source
Audit for and automate injection attacks, exploit configuration weaknesses, and clone data
Open-source
Scriptable HTTP intercepting proxy and fuzzer for web applications