38+AI38 appsTools and resources focused on artificial intelligence security, including LLM testing, prompt injection, model exploitation, AI threat modeling, and securing AI-powered applications.Open tag
45+API45 appsSecurity tools and references for testing REST, GraphQL, SOAP, and other APIs, covering authentication flaws, authorization bypass, rate limiting, and API-specific vulnerabilities.Open tag
11+Bruteforce11 appsUtilities and methodologies for password attacks, credential stuffing, hash cracking, and automated authentication attempts across web, network, and service-based targets.Open tag
46+Bug Bounty46 appsPlatforms, write-ups, tooling, and resources tailored for bug bounty hunters, including recon workflows, automation, and vulnerability research strategies.Open tag
22+C222 appsCommand-and-control frameworks used in red team operations for post-exploitation, lateral movement, persistence, and adversary simulation.Open tag
24+Certifications24 appsOffensive security certifications, exam prep materials, labs, and study resources for professional development in penetration testing and red teaming.Open tag
4+Classification4 appsResources related to vulnerability classification standards such as CVSS, CWE, OWASP, and risk rating methodologies.Open tag
22+Cloud22 appsSecurity tools and techniques for assessing AWS, Azure, GCP, and other cloud environments, including IAM abuse, misconfiguration discovery, and cloud-native exploitation.Open tag
3+DoS3 appsTools and research related to denial-of-service testing, resource exhaustion, rate limiting validation, and availability impact assessment.Open tag
71+External71 appsResources focused on external perimeter testing, including internet-facing infrastructure, exposed services, DNS, and attack surface discovery.Open tag
76+Internal76 appsTools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.Open tag
16+Mobile16 appsSecurity testing resources for iOS and Android applications, covering reverse engineering, runtime analysis, mobile API abuse, and client-side vulnerabilities.Open tag
33+OSINT33 appsOpen-source intelligence tools and techniques used for reconnaissance, data gathering, footprinting, and target profiling.Open tag
13+Phishing13 appsFrameworks and resources for phishing simulations, credential harvesting, email security testing, and social engineering campaigns.Open tag
13+Physical13 appsTools and methodologies related to physical security assessments, including badge cloning, hardware implants, lock bypass, and facility intrusion testing.Open tag
42+Report42 appsReporting templates, vulnerability write-up examples, executive summaries, and documentation best practices for professional pentest deliverables.Open tag
27+Services27 appsSecurity firms, managed offensive security providers, consulting organizations, and professional pentesting services.Open tag
28+Static Analysis28 appsStatic application security testing (SAST) tools and code analysis resources used to identify vulnerabilities without executing the application.Open tag
49+Training49 appsHands-on labs, courses, platforms, and educational resources designed to build offensive security skills.Open tag
23+Vulnerability Intelligence23 appsThreat intelligence feeds, CVE tracking platforms, exploit databases, and research sources focused on emerging vulnerabilities and exploitation trends.Open tag
68+Web68 appsTools and methodologies for web application security testing, including injection flaws, authentication issues, access control weaknesses, and client/server-side vulnerabilities.Open tag
31+Wireless31 appsResources for testing Wi-Fi, Bluetooth, RFID, and other wireless technologies, including packet analysis, rogue access points, and wireless exploitation techniques.Open tag