Open-source adversary emulation platform.
Tools that exploit
Trigger known vulnerabilities or weaknesses to gain access.
76 tools indexed
Curated kernel privesc exploit database.
Automated adversary emulation.
Symbolic execution for binaries and smart contracts.
Exploit development and delivery platform.
Multi-platform C2 framework.
Network service exploitation.
Modular C2 framework.
Automated pentest + vuln scanner.
Runtime mobile exploration via Frida.
Open adversarial exposure validation.
Direct Memory Access attack toolkit.
PEDA
—Python Exploit Development Assistance for GDB.
Pacu
—Open-source AWS exploitation framework.
PowerShell post-exploitation framework.
MitM relay sidekick for AD.
PowerShell AD post-exploitation.
WPS pin brute-force attack.
Endgame's ATT&CK simulation framework.
LLMNR, NBT-NS and MDNS poisoner.
C# Kerberos abuse toolkit.
Abuse Exchange services from the outside.
Asynchronous C2 powered by DLR runtimes.
Automatic SSRF fuzzer.