![](https://assets.offsec.tools/tools/cdk-6523.png) |
CDK |
Make security testing of K8s, Docker, and Containerd easier. |
|
|
![](https://assets.offsec.tools/tools/jsfinder-5409.jpg) |
jsfinder |
Fetches JavaScript files quickly and comprehensively from a defined list of URLs or domains. |
|
|
![](https://assets.offsec.tools/tools/eaphammer-3667.png) |
EAPHammer |
Targeted attacks against WPA2-Enterprise networks, wireless pivots using hostile portal attacks. |
|
|
![](https://assets.offsec.tools/tools/katoolin3-8008.png) |
katoolin3 |
Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint. |
|
|
![](https://assets.offsec.tools/tools/phishery-1546.jpeg) |
Phishery |
An SSL enabled basic auth credential harvester with a Word document template URL injector. |
|
|
![](https://assets.offsec.tools/tools/cdn-proxy-7899.png) |
CDN Proxy |
Create a copy of a targeted website with CDN and WAF restrictions disabled. |
|
|
![](https://assets.offsec.tools/tools/winpwnage-3202.png) |
WinPwnage |
UAC bypass, Elevate, Persistence methods. |
|
|
![](https://assets.offsec.tools/tools/catphish-2914.png) |
catphish |
Generate similar-looking domains for phishing attacks. |
|
|
![](https://assets.offsec.tools/tools/gcpbucketbrute-7076.png) |
GCPBucketBrute |
Enumerate Google Storage buckets, check the access and if they can be privilege escalated. |
|
|
![](https://assets.offsec.tools/tools/redhunt-os-7840.jpeg) |
RedHunt-OS |
Virtual machine for adversary emulation and threat hunting. |
|
|
![](https://assets.offsec.tools/tools/securityonion-4198.png) |
securityonion |
Free and open platform for threat hunting, enterprise security monitoring, and log management. |
|
|
![](https://assets.offsec.tools/tools/litefuzz-7873.png) |
litefuzz |
A multi-platform fuzzer for poking at userland binaries and servers. |
|
|
![](https://assets.offsec.tools/tools/vegile-4717.png) |
Vegile |
Post exploitation tool to maintain some level of acces. |
|
|
![](https://assets.offsec.tools/tools/microsploit-2612.png) |
Microsploit |
Quickly and easily create backdoor Office exploitation using module Metasploit packet. |
|
|
![](https://assets.offsec.tools/tools/fiercephish-6608.png) |
FiercePhish |
Full-fledged phishing framework to manage all phishing engagements. |
|
|
![](https://assets.offsec.tools/tools/radare2-3945.png) |
radare2 |
UNIX-like reverse engineering framework and command-line toolset. |
|
|
|
|
![](https://assets.offsec.tools/tools/smbetray-2857.png) |
SMBetray |
Attack clients through file content swapping and compromise any data passed in cleartext. |
|
|