A comprehensive reference hub for the most critical offensive security tools. Learn the capabilities, use-cases, and jump straight into interactive labs.
The industry standard for network discovery and security auditing. Features host discovery, port scanning, service version detection, and OS fingerprinting.
The world's foremost and widely-used network protocol analyzer. Captures and interactively browses the traffic running on a computer network.
Uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Identifies highly complex attack paths.
An LLMNR, NBT-NS and MDNS poisoner. It will answer to specific NBT-NS queries based on their name suffix and capture NTLMv1/v2 hashes.
A tool to extract plaintext passwords, hash, PIN code and kerberos tickets from memory. Essential for Golden Ticket and Pass-the-Hash attacks.
Automatic SQL injection and database takeover tool. Automates the process of detecting and exploiting SQL injection flaws and taking over database servers.
An integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process.
The world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms.
A fast password cracker, currently available for many flavors of Unix, Windows, DOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords.
A complete suite of tools to assess WiFi network security. Focuses on monitoring, attacking, testing, and cracking (WEP, WPA PSK).
A penetration testing framework that makes hacking simple. It's an essential tool in ethical hacking and helps verify vulnerabilities and manage security assessments.
A pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture.