A database for red teaming, penetration testing, and ethical hacking resources
Subscribe to our newsletter for the latest news and updates
Chisel: A fast TCP/UDP tunnel over HTTP, secured via SSH. Useful for firewalls, providing secure network endpoints.
ChromeAlone transforms Chromium browsers into C2 implants, enabling covert operations with session stealing, credential capture, and remote execution.
Ciphey is an automated decryption, decoding, and cracking tool that uses NLP and AI to decipher encryptions without knowing the key or cipher.
CloudFox helps penetration testers find exploitable attack paths in cloud infrastructure, currently supporting AWS with more on the way.
CloudGoat is a "Vulnerable by Design" AWS deployment tool for honing cloud cybersecurity skills through CTF-style scenarios.
CloudQuery provides a developer-first cloud governance platform for security, compliance, and cost visibility across multi-cloud environments.
CloudSploit by Aqua scans cloud infrastructure for security risks, supporting AWS, Azure, GCP, OCI, and GitHub.
Cobalt provides offensive security services with a SaaS platform, offering pentesting and vulnerability management for modern security needs.
Cobalt Strike: adversary simulation tool emulating advanced threat actors in IT networks using Beacon, a post-exploitation agent.
Commix is an open-source penetration testing tool for detecting and exploiting command injection vulnerabilities in web applications.
Corellium provides virtualized iOS, Android, and Arm devices for accelerated security testing, research, and DevSecOps.
Covert Instruments offers best-in-class lock picks & entry tools for locksmiths, hobbyists, and security professionals to elevate skills.