logo

Home

Tools

Content

Wordlists

Leaderboard

Sign in
logo

B

BloodHound

πŸ€‘ Free

πŸ’°οΈ Paid

Attackers and Defenders can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify.

(4.9)

2 reviews

Visit tool
Visit tool
Blue Wave

Categories

πŸŸ₯ Red Team

🟦 Blue Team

Platforms compatible

πŸͺŸ Windows

🍎 MacOS

🐧 Linux

2 reviews

(4.9)

Usability

5.0

Effectiveness

5.0

Reliability

5.0

Documentation

4.5

Similar tools

nuclei

πŸ–₯️ Infrastructure

Fast and customizable vulnerability scanner based on simple YAML based DSL.

hashcat

πŸŸ₯ Red Team

World's fastest and most advanced password recovery utility

Nessus

πŸ–₯️ Infrastructure

Accurately identify, investigate and prioritize vulnerabilities.

MetaFinder

πŸ–₯️ Infrastructure

Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata

MobSF

πŸ“± Mobile

All-in-one mobile application pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

Browse tools

indiedex-logo

Pentest List is a curation of the latest top-rated tools and content in penetration testing and security defense. Discover cutting-edge tools, blogs, and more, covering port scanning, SQL injection, and a wide range of other vulnerability exploits.

Links

Wiki

Blog

Liftoff MVPs

2024 Pentest List, All Rights Reserved.