Top-rated tools trusted by the cybersecurity community
Generates millions of keyword-based password mutations in seconds.
A file transfer / data exfiltration web application used to bypass web proxies by using Cloudflared
A tech enumeration toolkit focused on 404 Not found pages
Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing