Open AI Security46+AI Security46 appsAI security focuses on attacking LLMs and agents via prompt injection, model extraction, RAG poisoning, tool abuse, and breaking trust boundaries.Open category
Open API Security35+API Security35 appsAPI security covers attacking and securing modern REST, GraphQL, and gRPC endpoints via IDOR, BOLA, JWT flaws, and rate-limiting bypass techniques.Open category
Open Application Security82+Application Security82 appsApplication security focuses on identifying and mitigating vulnerabilities in software, including input validation, authentication, and access control.Open category
Open Bug Bounty29+Bug Bounty29 appsBug bounty focuses on platforms, writeups, and tools for ethical hackers participating in vulnerability disclosure programs via recon and reporting tasks.Open category
Open Certifications21+Certifications21 appsThis category covers professional cybersecurity certifications that validate offensive security skills, red teaming, and practical penetration testing.Open category
Open Cloud Security25+Cloud Security25 appsCloud security focuses on identifying misconfigurations and vulnerabilities within platforms like AWS, Azure, and GCP via IAM abuse and enumeration tools.Open category
Open Exploit Development27+Exploit Development27 appsExploit development covers crafting custom exploits for vulnerabilities in software, including shellcode, fuzzing, ROP chains, and memory corruption.Open category
Open Infrastructure Security87+Infrastructure Security87 appsInfrastructure security covers internal and external network assessments, including port scanning, service enumeration, and Active Directory attacks.Open category
Open Physical Security15+Physical Security15 appsPhysical security addresses real-world attack vectors like badge cloning, RFID attacks, keyloggers, and lockpicking for onsite security assessments.Open category
Open Reconnaissance81+Reconnaissance81 appsReconnaissance covers gathering information through passive and active techniques like subdomain enumeration, asset discovery, and ASN/IP lookup tools.Open category
Open Red Team Operations78+Red Team Operations78 appsRed team operations simulate real-world adversaries using C2 frameworks, OPSEC-aware tooling, payload generation, and stealthy post-exploitation methods.Open category
Open Reporting32+Reporting32 appsReporting includes tools and templates for professional documentation of findings, including PDF generators, Markdown builders, and pentest frameworks.Open category
Open Reverse Engineering25+Reverse Engineering25 appsReverse engineering focuses on analyzing binaries and software to discover vulnerabilities or dissect malware via disassembly and debugging environments.Open category
Open Security Firms14+Security Firms14 appsSecurity firms list companies offering offensive services like pentesting, red teaming, and social engineering to simulate real-world security attacks.Open category
Open Social Engineering23+Social Engineering23 appsSocial engineering covers tactics used to manipulate individuals into revealing info. Includes phishing, pretexting, vishing, and human target testing.Open category
Open Training38+Training38 appsTraining features hands-on labs, self-paced platforms, and structured paths for learning exploit techniques, tool usage, and offensive methodology.Open category
Open Vulnerability Intelligence21+Vulnerability Intelligence21 appsCurated databases, exploit indexes, and analytical resources for tracking vulnerabilities. Includes CVE feeds, PoC repositories, and prioritization tools.Open category
Open Wireless Security31+Wireless Security31 appsWireless security covers attacks against Wi-Fi, Bluetooth, and RF protocols. This includes sniffing, injection, rogue AP setups, and WPA cracking tools.Open category