![](https://assets.offsec.tools/tools/sulley-3382.png) |
sulley |
A pure-python fully automated and unattended fuzzing framework. |
|
|
![](https://assets.offsec.tools/tools/boofuzz-6775.png) |
boofuzz |
Network protocol fuzzing for humans. |
|
|
![](https://assets.offsec.tools/tools/redeye-8341.png) |
RedEye |
RedEye is a visual analytic tool supporting Red & Blue Team operations. |
|
|
![](https://assets.offsec.tools/tools/threatmapper-6003.png) |
ThreatMapper |
Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more. |
|
|
|
|
![](https://assets.offsec.tools/tools/atomic-red-team-6990.png) |
atomic-red-team |
Small and highly portable detection tests based on MITRE's ATT&CK. |
|
|
![](https://assets.offsec.tools/tools/mitre-att-ck-3866.png) |
MITRE ATT&CK |
Knowledge base of adversary tactics and techniques based on real-world observations. |
|
|
![](https://assets.offsec.tools/tools/kerbrute-6375.png) |
kerbrute |
Bruteforce and enumerate Active Directory accounts through Kerberos pre-authentication. |
|
|
![](https://assets.offsec.tools/tools/redelk-5396.jpg) |
RedELK |
Tool for Red Teams used for tracking and alarming about Blue Team activities. |
|
|
|
|