Top-rated tools trusted by the cybersecurity community
A one-stop solution to find your permissions whenever you compromise a principal in a Red Team across major cloud platforms: Azure, GCP, and AWS.
Scan for misconfigured S3 buckets across S3-compatible APIs!
Hopper Disassembler, the reverse engineering tool that lets you disassemble, decompile and debug your applications.
Search for possible paths to escalate privileges on Linux/Unix*/MacOS hosts
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing