Open API46+API46 appsSecurity tools for testing REST, GraphQL, and SOAP APIs, covering authentication flaws, authorization bypasses, and various API-specific vulnerabilities.Open tag
Open Bruteforce11+Bruteforce11 appsUtilities and methodologies for password attacks, credential stuffing, hash cracking, and automated auth attempts across web, network, and service targets.Open tag
Open Bug Bounty47+Bug Bounty47 appsPlatforms, write-ups, tooling, and resources tailored for bug bounty hunters, including recon workflows, automation, and vulnerability research strategies.Open tag
Open C222+C222 appsCommand-and-control frameworks used in red team operations for post-exploitation, lateral movement, persistence, and adversary simulation.Open tag
Open Certifications24+Certifications24 appsOffensive security certifications, exam prep materials, labs, and study resources for professional development in penetration testing and red teaming.Open tag
Open Classification3+Classification3 appsResources related to vulnerability classification standards such as CVSS, CWE, OWASP, and specialized risk rating methodologies for security assessments.Open tag
Open Cloud23+Cloud23 appsSecurity tools for assessing AWS, Azure, and GCP environments, including IAM abuse, misconfiguration discovery, and cloud-native exploitation techniques.Open tag
Open DoS8+DoS8 appsTools and research related to denial-of-service testing, resource exhaustion, rate limiting validation, and availability impact assessment.Open tag
Open External75+External75 appsResources focused on external perimeter testing, including internet-facing infrastructure, exposed services, DNS, and attack surface discovery.Open tag
Open Internal85+Internal85 appsTools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.Open tag
Open Mobile16+Mobile16 appsSecurity testing resources for iOS and Android apps, covering reverse engineering, runtime analysis, mobile API abuse, and client-side vulnerabilities.Open tag
Open OSINT37+OSINT37 appsOpen-source intelligence tools and techniques used for reconnaissance, data gathering, footprinting, and target profiling across digital environments.Open tag
Open Phishing14+Phishing14 appsFrameworks and resources for phishing simulations, credential harvesting, email security testing, and advanced social engineering campaign strategies.Open tag
Open Physical14+Physical14 appsTools and methodologies related to physical security assessments, including badge cloning, hardware implants, lock bypass, and facility intrusion testing.Open tag
Open Report43+Report43 appsReporting templates, vulnerability write-up examples, executive summaries, and documentation best practices for professional pentest deliverable reports.Open tag
Open Services27+Services27 appsSecurity firms, managed offensive security providers, consulting organizations, and professional pentesting services offering expert security assessments.Open tag
Open Static Analysis29+Static Analysis29 appsStatic application security testing (SAST) tools and code analysis resources used to identify vulnerabilities without executing the targeted application.Open tag
Open Training51+Training51 appsHands-on labs, courses, platforms, and educational resources to build practical offensive security skills for red teamers, pentesters, and ethical hackers.Open tag
Open Vulnerability Intelligence24+Vulnerability Intelligence24 appsThreat intelligence feeds, CVE tracking platforms, exploit databases, and research sources focused on emerging vulnerabilities and exploitation trends.Open tag
Open Web70+Web70 appsTools and methodologies for web application security testing, covering injection, authentication, access control, and client/server-side vulnerabilities.Open tag
Open Wireless32+Wireless32 appsResources for testing Wi-Fi, Bluetooth, RFID, and other wireless technologies, including packet analysis, rogue access points, and wireless exploitation.Open tag