Top-rated tools trusted by the cybersecurity community
π Shell command obfuscation to avoid detection systems
Reverse shell listener and payload generator designed to work on most Linux targets
A tool to fetch information from shodan database without any API key required and helpfull for bug hunting, Reconnaissance and Pentesting.
Automated deployment of red team infrastructure through GitHub Actions. It supports configurable C2 frameworks and phishing.
Find tools organized by testing methodology and use case
Videos, podcasts, and articles about penetration testing