Shodan
Search engine for Internet-connected devices
100 essentials across recon, web, network, AD, cloud, containers, DFIR, and C2
Search engine for Internet-connected devices
Internet-wide scan data and assets search
Exposure and threat surface intelligence
Global Internet assets search engine
In-depth attack surface mapping and asset discovery
Fast passively enumerating subdomains
E-mail, subdomain and names harvesting
Automated OSINT collection and analysis
Modular web reconnaissance framework
Graph-based link analysis for OSINT
Directory of OSINT resources and tools
Find usernames across social networks
Integrated platform for web application security testing
Open source web app scanner and proxy
Fast, template-based vulnerability scanner
Web server scanner for dangerous files and misconfigs
Automatic SQL injection and takeover tool
Fast web fuzzer for content discovery
Brute force directories and files on web servers
API discovery and enumeration toolkit
Advanced memory forensics framework
Pattern matching for malware research and hunting
Interactive HTTPS proxy for traffic inspection
Identify technologies used on websites
Fast and flexible HTTP toolkit
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl
Fetch archived URLs from the Wayback Machine
Network discovery and security auditing
Internet-scale port scanner
Fast port scanner
Internet-wide network scanner
Network protocol analyzer
Terminal network protocol analyzer (Wireshark CLI)
Powerful interactive packet manipulation
Swiss army knife for network attacks and monitoring
Packet capture and analysis CLI
Modern netcat from the Nmap project
Packet generator and analyzer
Wireless network detector and sniffer
WEP/WPA key cracking and wireless auditing
Digital forensics platform (GUI for Sleuth Kit)
LLMNR/NBT-NS/mDNS poisoner
Python collection for network protocols and attacks
Swiss army knife for pentesting networks
Fast network logon cracker
Network password brute forcing
High-speed network authentication cracking
Graph-based AD attack path analysis
Collector for BloodHound data
Credential dumping and manipulation
Kerberos abuse toolkit
PowerShell AD reconnaissance
Windows privilege escalation checks
Security oriented host survey
Windows privilege escalation checks
AD CS misconfiguration abuse
Coerce machines to authenticate (e.g., printer bug)
NTLM relay vector via EFSRPC
Dump gMSA passwords
Kerberos pre-auth bruteforcer
AD viewer and editor (Sysinternals)
Credentials recovery on Windows/Linux/macOS
Active Directory security health assessment
Exploit development and post-exploitation framework
Commercial adversary simulation platform
Open source adversary emulation framework
Plugin-based C2 framework
Modern C2 framework
Post-exploitation framework
.NET-based C2 framework
Cross-platform post-exploitation framework
WinRM shell for pentesting Windows
Offensive PowerShell scripts and payloads
Adversary-in-the-middle phishing framework
Open source phishing framework
Phishing campaign toolkit
Reverse proxy for phishing and bypassing 2FA
Password spraying for Microsoft 365/Azure AD
Multi-cloud security auditing
AWS/Azure/GCP security best practices auditing
AWS exploitation framework
Secrets scanning in code, configs, and logs
Protect and discover hardcoded secrets
Static analysis for IaC (Terraform/K8s/Cloud)
Static analysis for Terraform
Lightweight static analysis and code rules
Find security issues in IaC
SAST/Dependency scanning CLI
Detect compliance and security violations across IaC
AWS IAM risk assessment and least privilege
Attack surface mapping and asset graph for cloud
Comprehensive container and artifact scanner
Container image vulnerability scanner
Kubernetes security assessment
CIS Benchmark tests for Kubernetes
Endpoint visibility, DFIR collection and hunting
Network security monitoring (formerly Bro)
High-performance IDS/IPS and network security monitoring
Advanced password recovery and cracking
Fast password cracker with many formats