No tools found matching your search or filter.

🌐 Web Application Pentesting

Burp Suite Pro ⭐

Advanced web vulnerability scanning and manipulation.

Download/Documentation
Acunetix

Automated web security scanning for vulnerabilities.

Download/Documentation
HCL AppScan

Enterprise-grade web application security testing.

Download/Documentation
Invicti Netsparker

AI-powered web vulnerability assessment.

Download/Documentation
Fortify WebInspect

Static and dynamic web app security testing.

Download/Documentation
W3af

Open-source web application attack and audit framework.

Download/Documentation
Nikto

Web server scanner for vulnerabilities.

Download/Documentation
Nuclei

Fast and customizable vulnerability scanner.

Download/Documentation
SQLMap

Automated SQL injection and database takeover tool.

Download/Documentation
OWASP ZAP

Open-source web app security testing tool.

Download/Documentation

📱 Android Security

MobSF (Mobile Security Framework)

Static and dynamic analysis for mobile apps.

Download/Documentation
Frida

Dynamic instrumentation toolkit for apps.

Download/Documentation
APKTool

Reverse engineering tool for Android APKs.

Download/Documentation
JADX-gui

Decompiler for Android apps.

Download/Documentation
Android Studio/Genymotion

Development and emulation for Android testing.

Download/Documentation
Drozer

Security assessment tool for Android.

Download/Documentation
Magisk Root

Rooting and customization tool for Android.

Download/Documentation
mitmproxy

Intercept and manipulate HTTP/HTTPS traffic.

Download/Documentation
Objection

Runtime mobile exploration tool.

Download/Documentation
adb

Android Debug Bridge for device interaction.

Download/Documentation

🍎 iOS Security

MobSF

Static and dynamic analysis for iOS apps.

Download/Documentation
Frida

Dynamic instrumentation toolkit for iOS.

Download/Documentation
Objection

Runtime mobile exploration for iOS.

Download/Documentation
Cycript

iOS runtime inspection and manipulation.

Download/Documentation
iOS Hooking – Needle

iOS security assessment tool.

Download/Documentation
Class-dump

Tool to extract Objective-C runtime information.

Download/Documentation
SSL Kill Switch 2

Bypass SSL pinning on iOS.

Download/Documentation
iMazing

iOS device management and backup tool.

Download/Documentation
Passionfruit

iOS app analysis and exploitation tool.

Download/Documentation
LibertyLite

Tool for iOS jailbreak detection and testing.

Download/Documentation

🌍 API Pentesting

Postman

API development and testing platform.

Download/Documentation
Burp Suite Pro ⭐

API security testing and manipulation.

Download/Documentation
Swagger UI

Interactive API documentation tool.

Download/Documentation
Kite Runner

API endpoint enumeration tool.

Download/Documentation
Insomnia

REST API client for testing.

Download/Documentation
GraphQL Voyager

GraphQL schema visualization tool.

Download/Documentation
GraphQL Raider

GraphQL penetration testing tool.

Download/Documentation
APIsec

Automated API security testing platform.

Download/Documentation
OWASP API Fuzzer

Fuzzing tool for API vulnerability testing.

Documentation
42Crunch

API security auditing and monitoring.

Download/Documentation

🔍 Source Code Review

SonarQube

Static code analysis for vulnerabilities.

Download/Documentation
Snyk

Dependency and code security scanning.

Download/Documentation
Semgrep

Lightweight static analysis tool.

Download/Documentation
Fortify Workbench

Enterprise source code security analysis.

Download/Documentation
Checkmarx

Static application security testing (SAST).

Download/Documentation
Veracode

Cloud-based code security scanning.

Download/Documentation
CodeQL

Semantic code analysis for vulnerabilities.

Download/Documentation
Bandit

Python security linter.

Download/Documentation
FindSecBugs

Security audit tool for Java.

Download/Documentation
Retire.js

JavaScript library vulnerability scanner.

Download/Documentation

🖥️ Thick Client Pentesting

Fiddler

HTTP debugging proxy for thick clients.

Download/Documentation
Sysinternals Suite

Tools for Windows system debugging.

Download/Documentation
dnSpy

.NET debugger and decompiler.

Download/Documentation
de4dot

.NET deobfuscator.

Download/Documentation
IDA Pro

Disassembler and debugger for thick clients.

Download/Documentation
Process Explorer

Advanced process monitoring tool.

Download/Documentation
CF Explorer

PE file analyzer for Windows.

Download/Documentation
OllyDbg

x86 debugger for reverse engineering.

Download/Documentation
x64dbg

x64/x86 debugger for Windows.

Download/Documentation
Ghidra

Open-source reverse engineering tool.

Download/Documentation

🌐 Network Pentesting

Nmap

Network scanning and enumeration.

Download/Documentation
Wireshark

Network packet analysis tool.

Download/Documentation
Metasploit Framework

Penetration testing and exploit framework.

Download/Documentation
Nessus

Vulnerability scanner for networks.

Download/Documentation
OpenVAS

Open-source vulnerability scanner.

Download/Documentation
Responder

LLMNR, NBT-NS, and MDNS poisoner.

Download/Documentation
tcpdump

Command-line packet analyzer for networks.

Download/Documentation
Masscan

Fast network port scanner.

Download/Documentation
Snort

Open-source network intrusion detection system.

Download/Documentation
Netcat

Versatile networking tool for auditing.

Download/Documentation

🗂️ Active Directory Pentesting

Bloodhound

Active Directory attack path mapping.

Download/Documentation
Mimikatz

Credential extraction tool.

Download/Documentation
CrackMapExec

Active Directory enumeration and attack tool.

Download/Documentation
Impacket

Collection of Python scripts for AD attacks.

Download/Documentation
Kerbrute

Kerberos brute-forcing tool.

Download/Documentation
Rubeus

Kerberos ticket manipulation tool.

Download/Documentation
LDAPDomainDump

LDAP enumeration tool for AD.

Download/Documentation
SharpHound

Data collection tool for Bloodhound.

Download/Documentation
PowerView

PowerShell tool for AD reconnaissance.

Download/Documentation
ADRecon

Active Directory reconnaissance tool.

Download/Documentation

☁️ Cloud Security

Prowler

AWS security assessment tool.

Download/Documentation
ScoutSuite

Multi-cloud security auditing tool.

Download/Documentation
Cloudsploit

Cloud security scanning for AWS, Azure, GCP.

Download/Documentation
Pacu

AWS penetration testing framework.

Download/Documentation
Steampipe

Query and monitor cloud resources.

Download/Documentation
CloudMapper

Visualize cloud infrastructure security.

Download/Documentation
NCC Group Scout

Cloud security assessment tool.

Download/Documentation
kube-bench

Kubernetes security benchmarking.

Download/Documentation
Azucar

Azure cloud security auditing tool.

Download/Documentation
GCPAudit

Google Cloud Platform security assessment.

Download/Documentation

🛢️ Container Security

Trivy

Vulnerability scanner for containers and images.

Download/Documentation
Aqua Microscanner

Lightweight container security scanner.

Download/Documentation
Sysdig

Container runtime security and monitoring.

Download/Documentation
Clair

Static analysis for container vulnerabilities.

Download/Documentation
Anchore

Container image security scanning.

Download/Documentation
Docker Bench

Security benchmarking for Docker.

Download/Documentation
kube-hunter

Kubernetes penetration testing tool.

Download/Documentation
Twistlock

Container runtime security and policy enforcement.

Download/Documentation
Dagda

Container image security analysis.

Download/Documentation
OpenSCAP

Security compliance tool for containers.

Download/Documentation

🔥 Firewall Pentesting

hping3

Network packet crafting tool.

Download/Documentation
NPing

Network packet generation tool.

Download/Documentation
Scapy

Packet manipulation and analysis tool.

Download/Documentation
Zmap

Network scanner for Internet-wide surveys.

Download/Documentation
firewalk

Firewall rule mapping tool.

Download/Documentation
Ftester

Firewall and IDS testing tool.

Download/Documentation
Nmap (Firewall)

Firewall and service detection.

Download/Documentation
bypass

Firewall bypass testing tool.

Download/Documentation
Packet Sender

Network packet sender for testing.

Download/Documentation
hping2

Legacy packet crafting tool for stress testing.

Download/Documentation

📡 WiFi Pentesting

Aircrack-ng

WiFi network security auditing tool.

Download/Documentation
Kismet

Wireless network detector and analyzer.

Download/Documentation
Bettercap

Swiss army knife for WiFi and network attacks.

Download/Documentation
Reaver

WPS cracking tool for WiFi.

Download/Documentation
Fluxion

Evil Twin attack framework for WiFi.

Download/Documentation
Wireshark

WiFi packet analysis tool.

Download/Documentation
hcxdtools

WiFi packet capture and analysis.

Download/Documentation
Fern WiFi Cracker

WiFi security auditing tool.

Download/Documentation
Evil Twin Attack Tools

Tools for creating rogue WiFi access points.

Download/Documentation
MDK4

WiFi deauthentication and attack tool.

Download/Documentation

🛡️ DevSecOps

GitHub Advanced Security

Security features for GitHub repositories.

Documentation
Trivy

Vulnerability scanner for DevSecOps pipelines.

Download/Documentation
Snyk

Dependency and code security scanning.

Download/Documentation
Anchore

Container and image security for DevSecOps.

Download/Documentation
OWASP Dependency-Check

Open-source dependency vulnerability checker.

Download/Documentation
Jenkins + Bandit

CI/CD integration for Python security scanning.

Download/Documentation
Checkmarx

SAST for DevSecOps pipelines.

Download/Documentation
Veracode

Cloud-based code security for DevSecOps.

Download/Documentation
SonarQube

Continuous code quality and security.

Download/Documentation
Dagda

Container image security analysis.

Download/Documentation

🕵️‍♂️ OSINT (Open-Source Intelligence)

theHarvester

Email, subdomain, and IP gathering tool.

Download/Documentation
Maltego

Graphical link analysis tool for OSINT.

Download/Documentation
SpiderFoot

Automated OSINT collection and analysis.

Download/Documentation
Recon-ng

Web-based OSINT framework.

Download/Documentation
Amass

Subdomain enumeration and network mapping.

Download/Documentation
FOCA

Document metadata analysis tool.

Download/Documentation
Google Dorking

Advanced search techniques for OSINT.

Tutorials/Documentation
OSINT Framework

Collection of OSINT tools and resources.

Documentation
Metagoofil

Metadata extraction from public documents.

Download/Documentation
Sherlock

Username search across social platforms.

Download/Documentation

🤖 AI-Driven Pentesting

AI-Powered Nessus

AI-enhanced vulnerability scanning.

Download/Documentation
Darktrace Antigena

AI-driven network penetration testing.

Download/Documentation
AI-Burp Suite

AI-augmented web application testing.

Download/Documentation
CodeSecure AI

AI-based source code security analysis.

Download/Documentation
CrowdStrike Falcon

AI-powered threat detection and pentesting.

Download/Documentation
IBM QRadar AI

AI-driven cloud security assessment.

Download/Documentation
Proofpoint AI Simulator

AI-based phishing and pentesting simulation.

Download/Documentation
Cylance AI

AI-driven malware analysis and pentesting.

Download/Documentation
SentinelOne AI

AI-enhanced endpoint security testing.

Download/Documentation
Rapid7 InsightVM AI

AI-supported vulnerability management.

Download/Documentation

🔒 Zero Trust Assessment

Zscaler Zero Trust

Zero Trust Network Access (ZTNA) assessment.

Download/Documentation
Okta Zero Trust

Identity verification for Zero Trust.

Download/Documentation
BeyondTrust Zero Trust

Endpoint security for Zero Trust assessment.

Download/Documentation
Cloudflare Zero Trust

Cloud-based Zero Trust security testing.

Download/Documentation
Ping Identity Zero Trust

Access control for Zero Trust environments.

Download/Documentation
Illumio Zero Trust

Network segmentation for Zero Trust.

Download/Documentation
Tenable Zero Trust

Compliance auditing for Zero Trust.

Download/Documentation
Symantec Zero Trust

Data protection under Zero Trust principles.

Download/Documentation
F5 Zero Trust

Application security for Zero Trust.

Download/Documentation
Forrester Zero Trust

Posture assessment tool for Zero Trust.

Download/Documentation