![](https://assets.offsec.tools/tools/seela-7302.jpg) |
|
Seela |
|
Boost the cybersecurity skills of your teams with the cyber knowledge library. |
|
|
![](https://assets.offsec.tools/tools/kerberoast-6676.png) |
|
kerberoast |
|
Series of tools for attacking MS Kerberos implementations. |
|
|
|
|
![](https://assets.offsec.tools/tools/oss-fuzz-3287.png) |
|
OSS-Fuzz |
|
Continuous Fuzzing for Open Source Software. |
|
|
|
|
![](https://assets.offsec.tools/tools/mvt-2808.png) |
|
mvt |
|
Helps with conducting forensics of mobile devices in order to find signs of a potential compromise. |
|
|
![](https://assets.offsec.tools/tools/mosint-7925.png) |
|
Mosint |
|
An automated e-mail OSINT tool. |
|
|
![](https://assets.offsec.tools/tools/amass-6638.png) |
|
Amass |
|
In-depth Attack Surface Mapping and Asset Discovery. |
|
|
![](https://assets.offsec.tools/tools/empire-9158.jpeg) |
|
Empire |
|
Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters. |
|
|
![](https://assets.offsec.tools/tools/scout-6446.png) |
|
Scout |
|
Discover a web server's undisclosed files, directories and VHOSTs. |
|
|