Submit your favorite resources for free.
Tools and methodologies for internal network penetration testing, Active Directory exploitation, lateral movement, and privilege escalation.
Havoc is a modern, malleable post-exploitation C2 framework with sleep obfuscation, return address spoofing, and indirect syscalls.
Impacket is a collection of Python classes for working with network protocols, focused on low-level packet access and protocol implementation.
Impacket is a collection of Python classes for working with network protocols, providing low-level access to packets and protocol implementation.
Interactsh is a tool and service for capturing and handling out-of-band interactions during security testing.
Unified exposure management platform for automated vulnerability scanning, attack surface monitoring, and cloud security posture management.
A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to evade signature-based detection.
Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.
John the Ripper jumbo is an advanced password cracker supporting hundreds of hash types and running on various platforms.
Kali Linux is a Debian-based distribution for penetration testing, ethical hacking, and network security assessments, offering a vast array of tools.
Kerbrute is a tool for bruteforcing and enumerating valid Active Directory accounts via Kerberos pre-authentication.
A distributed password cracking system designed for security professionals and red teams to coordinate GPU/CPU resources for high-speed hash cracking.
LaZagne is an open-source password recovery tool designed to retrieve stored passwords from a local computer using various techniques.