Open AI51+AI51 appsTools and resources for AI security, including LLM testing, prompt injection, model exploitation, threat modeling, and securing AI-powered applications.Open tag
Open API47+API47 appsSecurity tools for testing REST, GraphQL, and SOAP APIs, covering authentication flaws, authorization bypasses, and various API-specific vulnerabilities.Open tag
Open Bruteforce11+Bruteforce11 appsUtilities and methodologies for password attacks, credential stuffing, hash cracking, and automated auth attempts across web, network, and service targets.Open tag
Open Bug Bounty48+Bug Bounty48 appsPlatforms, write-ups, tooling, and resources tailored for bug bounty hunters, including recon workflows, automation, and vulnerability research strategies.Open tag
Open C222+C222 appsCommand-and-control frameworks used in red team operations for post-exploitation, lateral movement, persistence, and adversary simulation.Open tag
Open Certifications24+Certifications24 appsOffensive security certifications, exam prep materials, labs, and study resources for professional development in penetration testing and red teaming.Open tag
Open Classification4+Classification4 appsResources related to vulnerability classification standards such as CVSS, CWE, OWASP, and specialized risk rating methodologies for security assessments.Open tag
Open Cloud24+Cloud24 appsSecurity tools for assessing AWS, Azure, and GCP environments, including IAM abuse, misconfiguration discovery, and cloud-native exploitation techniques.Open tag
Open DoS8+DoS8 appsTools and research related to denial-of-service testing, resource exhaustion, rate limiting validation, and availability impact assessment.Open tag
Open External74+External74 appsResources focused on external perimeter testing, including internet-facing infrastructure, exposed services, DNS, and attack surface discovery.Open tag
Open Internal87+Internal87 appsTools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.Open tag
Open Mobile16+Mobile16 appsSecurity testing resources for iOS and Android apps, covering reverse engineering, runtime analysis, mobile API abuse, and client-side vulnerabilities.Open tag
Open OSINT38+OSINT38 appsOpen-source intelligence tools and techniques used for reconnaissance, data gathering, footprinting, and target profiling across digital environments.Open tag
Open Phishing15+Phishing15 appsFrameworks and resources for phishing simulations, credential harvesting, email security testing, and advanced social engineering campaign strategies.Open tag
Open Physical14+Physical14 appsTools and methodologies related to physical security assessments, including badge cloning, hardware implants, lock bypass, and facility intrusion testing.Open tag
Open Report44+Report44 appsReporting templates, vulnerability write-up examples, executive summaries, and documentation best practices for professional pentest deliverable reports.Open tag
Open Services27+Services27 appsSecurity firms, managed offensive security providers, consulting organizations, and professional pentesting services offering expert security assessments.Open tag
Open Static Analysis33+Static Analysis33 appsStatic application security testing (SAST) tools and code analysis resources used to identify vulnerabilities without executing the targeted application.Open tag
Open Training53+Training53 appsHands-on labs, courses, platforms, and educational resources to build practical offensive security skills for red teamers, pentesters, and ethical hackers.Open tag
Open Vulnerability Intelligence24+Vulnerability Intelligence24 appsThreat intelligence feeds, CVE tracking platforms, exploit databases, and research sources focused on emerging vulnerabilities and exploitation trends.Open tag
Open Web71+Web71 appsTools and methodologies for web application security testing, covering injection, authentication, access control, and client/server-side vulnerabilities.Open tag
Open Wireless34+Wireless34 appsResources for testing Wi-Fi, Bluetooth, RFID, and other wireless technologies, including packet analysis, rogue access points, and wireless exploitation.Open tag