logo

Home

Tools

Content

Wordlists

Leaderboard

Sign in
logo
Blue Wave

Top Tools This Month

|


proxyblob

SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication

πŸŸ₯ Red Team

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

Secrets Ninja

Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.

πŸ•ΈοΈ Web / API

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

SockTail

Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Zero config, no daemon, no persistence - just a fast way in.

πŸŸ₯ Red Team

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

InterceptSuite

A cross platform SOCKS5 MITM proxy based network traffic interception tool that enables TLS/SSL inspection, analysis, and manipulation at the network level.

πŸ“‘ Compiled Application

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

wstunnel

Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI

πŸŸ₯ Red Team

πŸ–₯️ Infrastructure

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

monkey365

a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft Entra ID security configuration reviews.

☁️ Cloud

-

πŸͺŸ Windows

-

πŸ€‘ Free

0

Delegations

A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active Directory

πŸŸ₯ Red Team

πŸ–₯️ Infrastructure

-

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

-

πŸ€‘ Free

0

See all of last month's tools

Tools by category

View categoriesΒ 

πŸ•ΈοΈ Web / API

🟦 Blue Team

πŸŸ₯ Red Team

πŸŸͺ Purple Team

☁️ Cloud

πŸ“± Mobile

πŸ“‘ Compiled Application

πŸ§‘β€πŸ’» Code Review

πŸ”οΈ OSINT

πŸ–₯️ Infrastructure

πŸ€” Other

Upvote to start earning kudos!

indiedex-logo

Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.

Links

Wiki

Blog

Liftoff MVPs

2024 Pentest List, All Rights Reserved.