Tools
Frameworks, debuggers, scanners, C2, post-ex utilities.
28 pages in this category.
- airsnitch.py — CLI Reference
- AirSnitch (macstealer)
- arpgtk — ARP-over-GTK Auditor — Diagnostic that checks whether an SSID is exposed to ARP-over-GTK without poisoning anything.
- BloodHound
- Burp Suite
- Burp Suite — The dominant web-app testing proxy. Repeater, Intruder, Scanner, BApp Store, Collaborator.
- Cobalt Strike
- Cobalt Strike — The dominant commercial adversary-emulation / C2 platform.
- Configuration Files (client.conf, eap.conf, multipsk.conf, saepk.conf)
- Debugging Tools for Windows Exploit Research
- Dynamic Analysis
- Evil Clippy
- Fuzzing Tools for Windows Kernel & User-Mode
- Ghidra — NSA-developed reverse-engineering suite. The free alternative to IDA Pro that’s actually competitive.
- Impacket
- Metasploit Framework
- Mimikatz
- Nmap
- nmap — The reference network scanner. Service discovery, version detection, scriptable probes.
- Nuclei
- OST — Outflank Security Tooling
- Outflank C2
- RedELK
- AirSnitch — Repository Layout
- Responder
- Reverse Engineering Tools
- Setup Scripts and the Simulated Testbed
- WMIC
