Open API Security32+API Security32 appsAPI security covers attacking and securing modern REST, GraphQL, and gRPC endpoints via IDOR, BOLA, JWT flaws, and rate-limiting bypass techniques.Open category
Open Application Security79+Application Security79 appsApplication security focuses on identifying and mitigating vulnerabilities in software, including input validation, authentication, and access control.Open category
Open Bug Bounty27+Bug Bounty27 appsBug bounty focuses on platforms, writeups, and tools for ethical hackers participating in vulnerability disclosure programs via recon and reporting tasks.Open category
Open Certifications21+Certifications21 appsThis category covers professional cybersecurity certifications that validate offensive security skills, red teaming, and practical penetration testing.Open category
Open Cloud Security24+Cloud Security24 appsCloud security focuses on identifying misconfigurations and vulnerabilities within platforms like AWS, Azure, and GCP via IAM abuse and enumeration tools.Open category
Open Exploit Development26+Exploit Development26 appsExploit development covers crafting custom exploits for vulnerabilities in software, including shellcode, fuzzing, ROP chains, and memory corruption.Open category
Open Infrastructure Security85+Infrastructure Security85 appsInfrastructure security covers internal and external network assessments, including port scanning, service enumeration, and Active Directory attacks.Open category
Open Physical Security15+Physical Security15 appsPhysical security addresses real-world attack vectors like badge cloning, RFID attacks, keyloggers, and lockpicking for onsite security assessments.Open category
Open Reconnaissance80+Reconnaissance80 appsReconnaissance covers gathering information through passive and active techniques like subdomain enumeration, asset discovery, and ASN/IP lookup tools.Open category
Open Red Team Operations78+Red Team Operations78 appsRed team operations simulate real-world adversaries using C2 frameworks, OPSEC-aware tooling, payload generation, and stealthy post-exploitation methods.Open category
Open Reporting31+Reporting31 appsReporting includes tools and templates for professional documentation of findings, including PDF generators, Markdown builders, and pentest frameworks.Open category
Open Reverse Engineering24+Reverse Engineering24 appsReverse engineering focuses on analyzing binaries and software to discover vulnerabilities or dissect malware via disassembly and debugging environments.Open category
Open Security Firms14+Security Firms14 appsSecurity firms list companies offering offensive services like pentesting, red teaming, and social engineering to simulate real-world security attacks.Open category
Open Social Engineering22+Social Engineering22 appsSocial engineering covers tactics used to manipulate individuals into revealing info. Includes phishing, pretexting, vishing, and human target testing.Open category
Open Training37+Training37 appsTraining features hands-on labs, self-paced platforms, and structured paths for learning exploit techniques, tool usage, and offensive methodology.Open category
Open Vulnerability Intelligence21+Vulnerability Intelligence21 appsCurated databases, exploit indexes, and analytical resources for tracking vulnerabilities. Includes CVE feeds, PoC repositories, and prioritization tools.Open category
Open Wireless Security29+Wireless Security29 appsWireless security covers attacks against Wi-Fi, Bluetooth, and RF protocols. This includes sniffing, injection, rogue AP setups, and WPA cracking tools.Open category