Top-rated tools trusted by the cybersecurity community
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.
A toolset to make a system look as if it was the victim of an APT attack
UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It automates the collection of artifacts from a wide range of Unix-like systems, including AIX, ESXi, FreeBSD, Linux, macOS, NetBSD, NetScaler, OpenBSD and Solaris.
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing