Top-rated tools trusted by the cybersecurity community
A next-generation HTTP stealth proxy which perfectly cloaks requests as the Chrome browser across all layers of the stack.
PowerShell script to quickly scan Event Log ID 5007 and 1121 for published Windows Defender Exclusions and Attack Surface Reduction (ASR) rule configuration.
Enumeration/exploit/analysis/download/etc pentesting framework for GCP
Reverse shell listener and payload generator designed to work on most Linux targets
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing