Discovery, scanning and network analysis utilities.
Network exploration tool and security scanner for discovering hosts and services.
Learn More →Powerful reconnaissance tool for DNS enumeration and subdomain discovery.
Learn More →Capture and analyze network traffic with deep protocol inspection.
Learn More →LLMNR/NBT-NS/MDNS poisoner for capturing network credentials on Windows networks.
Learn More →Enumerate shares, users and policies from Windows and Samba hosts.
Learn More →Tools for web testing, scanning and application security.
Integrated platform for testing web applications with proxy, scanner and intruder.
Learn More →Open-source web application scanner for finding vulnerabilities.
Learn More →Performs comprehensive tests against web servers for vulnerabilities.
Learn More →Fast directory and DNS brute-forcing tool written in Go.
Learn More →Frameworks and tools for exploitation and post-exploitation.
Framework for developing and executing exploits against remote targets.
Learn More →Browser Exploitation Framework focusing on client-side vectors.
Learn More →Modular web reconnaissance framework for OSINT gathering.
Learn More →Tools focused on wireless network assessment and cracking.
Suite for assessing Wi‑Fi security: capture, injection and cracking.
Learn More →Tools for password recovery, hash cracking and brute force.
GPU-accelerated password recovery tool for many hash algorithms.
Learn More →Fast login cracker supporting many protocols for password auditing.
Learn More →Automated scanners and vulnerability assessment tools.
Comprehensive vulnerability scanner for identifying security issues and compliance gaps.
Learn More →Tools for intelligence gathering, reverse engineering and analysis.
Interactive data mining and link analysis tool for intelligence gathering.
Learn More →NSA open-source reverse engineering framework for static analysis.
Learn More →Lightweight reverse engineering toolkit and disassembler for binary analysis.
Learn More →Dynamic instrumentation toolkit for hooking and tampering with applications at runtime.
Learn More →Other useful security and forensic tools.
Post-exploitation tool for extracting credentials and Kerberos tickets from memory.
Learn More →Searches git repositories for high-entropy strings and secrets.
Learn More →Practice makes perfect. Start learning and experimenting with these powerful security tools.