<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://offsec.tools/tool/0d1n</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/0d1n-3915.png</image:loc><image:caption><![CDATA[Tool for automating customized attacks against web applications.]]></image:caption><image:title><![CDATA[0d1n]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/2tearsinabucket</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/2tearsinabucket-4534.png</image:loc><image:caption><![CDATA[Enumerate s3 buckets for a specific target.]]></image:caption><image:title><![CDATA[2tearsinabucket]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/4-zero-3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/4-zero-3-5074.png</image:loc><image:caption><![CDATA[403/401 Bypass Methods.]]></image:caption><image:title><![CDATA[4-ZERO-3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/403-bypasser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/403-bypasser-7363.png</image:loc><image:caption><![CDATA[A Burp Suite extension made to automate the process of bypassing 403 pages.]]></image:caption><image:title><![CDATA[403-bypasser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/403jump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/403jump-5937.png</image:loc><image:caption><![CDATA[HTTP 403 bypass tool.]]></image:caption><image:title><![CDATA[403JUMP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/a2sv</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/a2sv-9458.png</image:loc><image:caption><![CDATA[Auto Scanning to SSL Vulnerability.]]></image:caption><image:title><![CDATA[a2sv]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aclight</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aclight-5577.png</image:loc><image:caption><![CDATA[Advanced discovery of Privileged Accounts, includes Shadow Admins.]]></image:caption><image:title><![CDATA[ACLight]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/acra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/acra-6179.png</image:loc><image:caption><![CDATA[Database protection suite with field level encryption and intrusion detection.]]></image:caption><image:title><![CDATA[Acra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/active-scan-plus-plus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/active-scan-plus-plus-5668.png</image:loc><image:caption><![CDATA[Extends Burp Suite's active and passive scanning capabilities.]]></image:caption><image:title><![CDATA[ActiveScan++]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/acunetix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/acunetix-3482.png</image:loc><image:caption><![CDATA[Quickly find and fix the vulnerabilities that put your web applications at risk of attack.]]></image:caption><image:title><![CDATA[Acunetix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adape-script</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adape-script-6367.png</image:loc><image:caption><![CDATA[Active Directory assessment and privilege escalation script.]]></image:caption><image:title><![CDATA[ADAPE Script]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/additional-scanner-checks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/additional-scanner-checks-8374.png</image:loc><image:caption><![CDATA[Collection of scanner checks missing in Burp.]]></image:caption><image:title><![CDATA[additional-scanner-checks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adenum-4342.png</image:loc><image:caption><![CDATA[Find misconfiguration through LDAP to exploit weaknesses with Kerberos.]]></image:caption><image:title><![CDATA[ADenum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adpeas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adpeas-2086.png</image:loc><image:caption><![CDATA[Powershell tool to automate Active Directory enumeration.]]></image:caption><image:title><![CDATA[adPEAS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adreaper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adreaper-3621.png</image:loc><image:caption><![CDATA[Enumerate an Active Directory environment with LDAP queries.]]></image:caption><image:title><![CDATA[ADReaper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adrecon-9223.png</image:loc><image:caption><![CDATA[Gather information about the Active Directory and generates a report.]]></image:caption><image:title><![CDATA[ADRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/adrt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/adrt-5903.jpg</image:loc><image:caption><![CDATA[Active Directory Report Tool.]]></image:caption><image:title><![CDATA[ADRT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/advancedkeyhacks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/advancedkeyhacks-3565.png</image:loc><image:caption><![CDATA[API key/token exploitation made easy.]]></image:caption><image:title><![CDATA[AdvancedKeyHacks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aem-detector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aem-detector-2276.png</image:loc><image:caption><![CDATA[Discover Adobe Experience Manager (AEM) Content Management System (CMS) websites.]]></image:caption><image:title><![CDATA[aem-detector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/afrog</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/afrog-8794.png</image:loc><image:caption><![CDATA[A vulnerability scanning tools for penetration testing.]]></image:caption><image:title><![CDATA[afrog]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/agartha</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/agartha-8786.png</image:loc><image:caption><![CDATA[Burp Suite extension for dynamic payload generation to detect injection flaws.]]></image:caption><image:title><![CDATA[Agartha]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ahmyth-android-rat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ahmyth-android-rat-5044.png</image:loc><image:caption><![CDATA[Android remote administration tool.]]></image:caption><image:title><![CDATA[AhMyth Android RAT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/airbash</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/airbash-7921.png</image:loc><image:caption><![CDATA[Fully automated WPA PSK PMKID and handshake capture script.]]></image:caption><image:title><![CDATA[airbash]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aircrack-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aircrack-ng-1832.png</image:loc><image:caption><![CDATA[Complete suite of tools to assess WiFi network security.]]></image:caption><image:title><![CDATA[aircrack-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/airgeddon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/airgeddon-6125.png</image:loc><image:caption><![CDATA[This is a multi-use bash script for Linux systems to audit wireless networks.]]></image:caption><image:title><![CDATA[airgeddon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/al-khaser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/al-khaser-4342.png</image:loc><image:caption><![CDATA[Public malware techniques used in the wild: virtual machine, emulation, debuggers.]]></image:caption><image:title><![CDATA[al-khaser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/allaboutbugbounty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/allaboutbugbounty-5729.png</image:loc><image:caption><![CDATA[Bug Bounty notes gathered from various sources.]]></image:caption><image:title><![CDATA[AllAboutBugBounty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/altdns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/altdns-1599.png</image:loc><image:caption><![CDATA[Generates permutations, alterations and mutations of subdomains and then resolves them.]]></image:caption><image:title><![CDATA[Altdns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/alterx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/alterx-8368.png</image:loc><image:caption><![CDATA[Fast and customizable subdomain wordlist generator using DSL.]]></image:caption><image:title><![CDATA[alterx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/amap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/amap-2674.png</image:loc><image:caption><![CDATA[Identify applications even if they are running on a different port than normal.]]></image:caption><image:title><![CDATA[amap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/amass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/amass-6638.png</image:loc><image:caption><![CDATA[In-depth Attack Surface Mapping and Asset Discovery.]]></image:caption><image:title><![CDATA[Amass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/amnesiac</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/amnesiac-7511.png</image:loc><image:caption><![CDATA[Post-exploitation framework designed to assist with lateral movement within Active Directory.]]></image:caption><image:title><![CDATA[Amnesiac]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/andor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/andor-3467.png</image:loc><image:caption><![CDATA[Blind SQL Injection Tool with Golang.]]></image:caption><image:title><![CDATA[andor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/androguard</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/androguard-2861.png</image:loc><image:caption><![CDATA[Reverse engineering and pentesting for Android applications.]]></image:caption><image:title><![CDATA[androguard]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/androset</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/androset-5658.png</image:loc><image:caption><![CDATA[Manage Burp Suite certificate in Android to redirect all traffic to Burp Suite.]]></image:caption><image:title><![CDATA[AndroSet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/angr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/angr-9768.png</image:loc><image:caption><![CDATA[A powerful and user-friendly binary analysis platform.]]></image:caption><image:title><![CDATA[angr]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/angry-ip-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/angry-ip-scanner-9797.png</image:loc><image:caption><![CDATA[Fast and simple-to-use open-source/cross-platform network scanner.]]></image:caption><image:title><![CDATA[Angry IP Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/angularjs-csti-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/angularjs-csti-scanner-1493.png</image:loc><image:caption><![CDATA[Automated client-side template injection detection for AngularJS.]]></image:caption><image:title><![CDATA[angularjs-csti-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aort</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aort-8075.png</image:loc><image:caption><![CDATA[All in one recon tool for bug bounty.]]></image:caption><image:title><![CDATA[AORT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/api-fuzzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/api-fuzzer-5098.png</image:loc><image:caption><![CDATA[Fuzz request attributes using common pentesting techniques and lists vulnerabilities.]]></image:caption><image:title><![CDATA[API fuzzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apidor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apidor-1385.png</image:loc><image:caption><![CDATA[Tool for automating the search for IDOR vulnerabilities in web applications and APIs.]]></image:caption><image:title><![CDATA[Apidor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apk-mitm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apk-mitm-3596.png</image:loc><image:caption><![CDATA[A CLI application that automatically prepares Android APK files for HTTPS inspection.]]></image:caption><image:title><![CDATA[apk-mitm]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apkenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apkenum-9792.png</image:loc><image:caption><![CDATA[Passive enumeration utility For Android applications.]]></image:caption><image:title><![CDATA[APKEnum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apkid</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apkid-7453.png</image:loc><image:caption><![CDATA[Android application identifier for packers, protectors, obfuscators and oddities.]]></image:caption><image:title><![CDATA[APKiD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apkleaks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apkleaks-5344.png</image:loc><image:caption><![CDATA[Scanning APK file for URIs, endpoints & secrets.]]></image:caption><image:title><![CDATA[APKLeaks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apktool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apktool-7470.png</image:loc><image:caption><![CDATA[A tool for reverse engineering Android APK files.]]></image:caption><image:title><![CDATA[Apktool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/apkurlgrep</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/apkurlgrep-8204.png</image:loc><image:caption><![CDATA[Extract endpoints from APK files.]]></image:caption><image:title><![CDATA[apkurlgrep]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/appmon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/appmon-4276.png</image:loc><image:caption><![CDATA[Framework for monitoring and tampering system API calls of native macOS, iOS and android apps.]]></image:caption><image:title><![CDATA[appmon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aptrs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aptrs-8425.png</image:loc><image:caption><![CDATA[Automated penetration testing reporting system.]]></image:caption><image:title><![CDATA[APTRS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aquatone</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aquatone-8688.png</image:loc><image:caption><![CDATA[A Tool for Domain Flyovers.]]></image:caption><image:title><![CDATA[Aquatone]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/arachni</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/arachni-5308.png</image:loc><image:caption><![CDATA[Web Application Security Scanner Framework.]]></image:caption><image:title><![CDATA[Arachni]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aranea</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aranea-3704.png</image:loc><image:caption><![CDATA[OSINT tool used for web crawling or examining JavaScript files for likely useful data.]]></image:caption><image:title><![CDATA[Aranea]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/archaeologit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/archaeologit-5006.png</image:loc><image:caption><![CDATA[Scans the history of GitHub repositories to find sensitive things.]]></image:caption><image:title><![CDATA[archaeologit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/archerysec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/archerysec-7203.png</image:loc><image:caption><![CDATA[Automate your application security orchestration and correlation (ASOC).]]></image:caption><image:title><![CDATA[archerysec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/argus-saf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/argus-saf-7625.png</image:loc><image:caption><![CDATA[Static analysis framework built in house to do security vetting for Android applications.]]></image:caption><image:title><![CDATA[Argus-SAF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/arjun</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/arjun-5681.png</image:loc><image:caption><![CDATA[HTTP parameter discovery suite.]]></image:caption><image:title><![CDATA[Arjun]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/arsenal</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/arsenal-9347.png</image:loc><image:caption><![CDATA[Just a quick inventory, reminder and launcher for pentest commands.]]></image:caption><image:title><![CDATA[Arsenal]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/as3nt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/as3nt-8453.png</image:loc><image:caption><![CDATA[Another Subdomain ENumeration Tool.]]></image:caption><image:title><![CDATA[As3nt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/asnlookup</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/asnlookup-5912.png</image:loc><image:caption><![CDATA[Leverage ASN to look up IP addresses owned by a specific organization.]]></image:caption><image:title><![CDATA[ASNLookup]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/asnmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/asnmap-5874.png</image:loc><image:caption><![CDATA[Quickly maps organization network ranges using ASN information.]]></image:caption><image:title><![CDATA[ASNmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/assetfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/assetfinder-4585.png</image:loc><image:caption><![CDATA[Find domains and subdomains related to a given domain.]]></image:caption><image:title><![CDATA[assetfinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/astra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/astra-6270.png</image:loc><image:caption><![CDATA[Automated Security Testing For REST API's.]]></image:caption><image:title><![CDATA[Astra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/async-dns-brute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/async-dns-brute-9543.png</image:loc><image:caption><![CDATA[DNS asynchronous brute force utility.]]></image:caption><image:title><![CDATA[Async DNS Brute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/athena-os</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/athena-os-3331.png</image:loc><image:caption><![CDATA[Arch Linux-based distro focused on Cybersecurity. Learn, practice and enjoy with any hacking tool!]]></image:caption><image:title><![CDATA[Athena OS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/atomic-red-team</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/atomic-red-team-6990.png</image:loc><image:caption><![CDATA[Small and highly portable detection tests based on MITRE's ATT&CK.]]></image:caption><image:title><![CDATA[Atomic Red Team]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ator-6710.png</image:loc><image:caption><![CDATA[Authentication Token Obtain and Replace Extender.]]></image:caption><image:title><![CDATA[ATOR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/attack_range</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/attack_range-6520.png</image:loc><image:caption><![CDATA[Create vulnerable instrumented local or cloud environments to simulate attacks.]]></image:caption><image:title><![CDATA[attack_range]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/attackforge</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/attackforge-1922.png</image:loc><image:caption><![CDATA[A platform built for productivity, collaboration and visibility.]]></image:caption><image:title><![CDATA[AttackForge]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/attacksurfacemapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/attacksurfacemapper-4717.png</image:loc><image:caption><![CDATA[AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.]]></image:caption><image:title><![CDATA[AttackSurfaceMapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/attifyos</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/attifyos-5994.png</image:loc><image:caption><![CDATA[Distribution for pentesting IoT devices.]]></image:caption><image:title><![CDATA[AttifyOS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/auth-analyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/auth-analyzer-5150.png</image:loc><image:caption><![CDATA[The Burp extension helps you to find authorization bugs.]]></image:caption><image:title><![CDATA[Auth Analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/authmatrix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/authmatrix-5541.png</image:loc><image:caption><![CDATA[Provides a simple way to test authorization in web applications and web services.]]></image:caption><image:title><![CDATA[AuthMatrix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/authz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/authz-5212.png</image:loc><image:caption><![CDATA[Burp Suite plugin to test for authorization flaws.]]></image:caption><image:title><![CDATA[authz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autochrome</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autochrome-6498.png</image:loc><image:caption><![CDATA[A shiny new copy of Chromium that will bring colors in your hunt.]]></image:caption><image:title><![CDATA[autochrome]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autopwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autopwn-5618.png</image:loc><image:caption><![CDATA[Specify targets and run sets of tools against them.]]></image:caption><image:title><![CDATA[autopwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autorecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autorecon-8520.png</image:loc><image:caption><![CDATA[Multi-threaded network reconnaissance tool which performs automated enumeration of services.]]></image:caption><image:title><![CDATA[AutoRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autorepeater</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autorepeater-2987.png</image:loc><image:caption><![CDATA[Automated HTTP request repeating with Burp Suite.]]></image:caption><image:title><![CDATA[AutoRepeater]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autorize</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autorize-6553.png</image:loc><image:caption><![CDATA[Automatic authorization enforcement detection extension for Burp Suite.]]></image:caption><image:title><![CDATA[Autorize]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autosploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autosploit-2470.png</image:loc><image:caption><![CDATA[Automated Mass Exploiter.]]></image:caption><image:title><![CDATA[AutoSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autossrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autossrf-5433.png</image:loc><image:caption><![CDATA[Smart context-based SSRF vulnerability scanner.]]></image:caption><image:title><![CDATA[autoSSRF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autosubtakeover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autosubtakeover-2596.png</image:loc><image:caption><![CDATA[A tool used to check if a CNAME resolves to the scope address.]]></image:caption><image:title><![CDATA[autoSubTakeover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autowasp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autowasp-2534.png</image:loc><image:caption><![CDATA[A one-stop pentesting checklist and logger tool.]]></image:caption><image:title><![CDATA[Autowasp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/autowpscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/autowpscan-5293.png</image:loc><image:caption><![CDATA[An automated tool that automatically scanning a list of multiple websites with wordpress at once.]]></image:caption><image:title><![CDATA[autowpscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/avet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/avet-9552.png</image:loc><image:caption><![CDATA[AntiVirus Evasion Tool.]]></image:caption><image:title><![CDATA[avet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awesome-bug-bounty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awesome-bug-bounty-5138.png</image:loc><image:caption><![CDATA[A comprehensive curated list of available Bug Bounty & disclosure programs and writeups.]]></image:caption><image:title><![CDATA[Awesome Bug Bounty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awesome-bugbounty-writeups</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awesome-bugbounty-writeups-9672.png</image:loc><image:caption><![CDATA[A curated list of bugbounty writeups (Bug type wise).]]></image:caption><image:title><![CDATA[Awesome BugBounty Writeups]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awesome-cobaltstrike</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awesome-cobaltstrike-8547.png</image:loc><image:caption><![CDATA[List of awesome CobaltStrike resources.]]></image:caption><image:title><![CDATA[Awesome-CobaltStrike]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awesome-cve-poc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awesome-cve-poc-8194.png</image:loc><image:caption><![CDATA[A collection about Proof of Concepts of Common Vulnerabilities and Exposures.]]></image:caption><image:title><![CDATA[awesome-cve-poc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aws-extender-cli</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aws-extender-cli-5033.png</image:loc><image:caption><![CDATA[Command-line script to test cloud storage for common misconfiguration issues.]]></image:caption><image:title><![CDATA[AWS Extender CLI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aws-security-checks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aws-security-checks-2574.png</image:loc><image:caption><![CDATA[This Burp Suite provides additional Scanner checks for AWS security issues.]]></image:caption><image:title><![CDATA[AWS security checks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/aws-sensitive-permissions</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/aws-sensitive-permissions-2431.png</image:loc><image:caption><![CDATA[This script enumerates the permissions of all the AWS principals of an account.]]></image:caption><image:title><![CDATA[AWS Sensitive Permissions]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awsbucketdump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awsbucketdump-2230.png</image:loc><image:caption><![CDATA[Security Tool to Look For Interesting Files in S3 Buckets.]]></image:caption><image:title><![CDATA[AWSBucketDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awsgoat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awsgoat-6552.png</image:loc><image:caption><![CDATA[A damn vulnerable AWS infrastructure.]]></image:caption><image:title><![CDATA[AWSGoat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/awsloot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/awsloot-3139.png</image:loc><image:caption><![CDATA[Pull secrets from an AWS environment.]]></image:caption><image:title><![CDATA[AWSloot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/axiom</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/axiom-8828.png</image:loc><image:caption><![CDATA[Distribute the workload of many different scanning tools with ease.]]></image:caption><image:title><![CDATA[axiom]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/azureadlateralmovement</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/azureadlateralmovement-2099.png</image:loc><image:caption><![CDATA[Lateral movement graph for Azure Active Directory.]]></image:caption><image:title><![CDATA[AzureADLateralMovement]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/azuregoat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/azuregoat-9808.png</image:loc><image:caption><![CDATA[A damn vulnerable Azure infrastructure.]]></image:caption><image:title><![CDATA[AzureGoat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/b-xssrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/b-xssrf-1047.png</image:loc><image:caption><![CDATA[Toolkit to detect and keep track on Blind XSS, XXE & SSRF.]]></image:caption><image:title><![CDATA[B-XSSRF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/b374k</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/b374k-7505.png</image:loc><image:caption><![CDATA[PHP Webshell with handy features.]]></image:caption><image:title><![CDATA[b374k]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/backslash-powered-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/backslash-powered-scanner-5170.png</image:loc><image:caption><![CDATA[Finds unknown classes of injection vulnerabilities.]]></image:caption><image:title><![CDATA[backslash-powered-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/backupkiller</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/backupkiller-1493.jpg</image:loc><image:caption><![CDATA[Generate wordlist based on the URLs to check for backup, installation, etc files.]]></image:caption><image:title><![CDATA[BackupKiller]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/badsecrets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/badsecrets-9933.png</image:loc><image:caption><![CDATA[A library for detecting known secrets across many web frameworks.]]></image:caption><image:title><![CDATA[badsecrets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/barmie</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/barmie-5067.png</image:loc><image:caption><![CDATA[Enumerating and attacking Java Remote Method Invocation services.]]></image:caption><image:title><![CDATA[BaRMIe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/barq</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/barq-2159.png</image:loc><image:caption><![CDATA[The AWS Cloud Post Exploitation framework!]]></image:caption><image:title><![CDATA[barq]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bbot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bbot-2106.png</image:loc><image:caption><![CDATA[OSINT automation for hackers.]]></image:caption><image:title><![CDATA[bbot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bbradar.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bbradar.io-4754.png</image:loc><image:caption><![CDATA[Fetches latest bug bounty programs from many platforms and consolidates them in one place.]]></image:caption><image:title><![CDATA[bbradar.io]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bbrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bbrf-4892.png</image:loc><image:caption><![CDATA[Help you coordinate your reconnaissance workflows across multiple devices.]]></image:caption><image:title><![CDATA[bbrf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bbscope</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bbscope-9601.png</image:loc><image:caption><![CDATA[Scope gathering tool for multiple Bug Bounty platforms.]]></image:caption><image:title><![CDATA[bbscope]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bbstats</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bbstats-2739.png</image:loc><image:caption><![CDATA[Displays stats and graphs about your Bug Bounty activity.]]></image:caption><image:title><![CDATA[BBstats]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bearer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bearer-8044.png</image:loc><image:caption><![CDATA[Scan your source code against top security and privacy risks.]]></image:caption><image:title><![CDATA[bearer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/beef</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/beef-5711.png</image:loc><image:caption><![CDATA[The Browser Exploitation Framework is a penetration testing tool that focuses on the web browser.]]></image:caption><image:title><![CDATA[BeEF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/beroot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/beroot-5144.jpg</image:loc><image:caption><![CDATA[Multiplaform privilege escalation project.]]></image:caption><image:title><![CDATA[BeRoot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/betterbackdoor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/betterbackdoor-3222.png</image:loc><image:caption><![CDATA[A backdoor with a multitude of features.]]></image:caption><image:title><![CDATA[BetterBackdoor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bettercap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bettercap-1215.png</image:loc><image:caption><![CDATA[The Swiss Army knife for WiFi, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.]]></image:caption><image:title><![CDATA[bettercap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/betterscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/betterscan-5624.png</image:loc><image:caption><![CDATA[Code Scanning/SAST/static analysis/linting using many tools/scanners with one report.]]></image:caption><image:title><![CDATA[Betterscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bfac</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bfac-4612.png</image:loc><image:caption><![CDATA[Check for backup artifacts that may disclose the web-application's source code.]]></image:caption><image:title><![CDATA[BFAC]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/big-list-of-naughty-strings</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/big-list-of-naughty-strings-6733.png</image:loc><image:caption><![CDATA[A list of strings which have a high probability of causing issues when used as user-input data.]]></image:caption><image:title><![CDATA[big-list-of-naughty-strings]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bindiff</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bindiff-9745.png</image:loc><image:caption><![CDATA[Quickly find differences and similarities in disassembled code.]]></image:caption><image:title><![CDATA[BinDiff]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/binwalk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/binwalk-1560.png</image:loc><image:caption><![CDATA[Fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.]]></image:caption><image:title><![CDATA[binwalk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bitblinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bitblinder-1507.png</image:loc><image:caption><![CDATA[Injects custom XSS payloads on every form/request submitted to detect blind XSS.]]></image:caption><image:title><![CDATA[BitBlinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/blacklist3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/blacklist3r-8695.png</image:loc><image:caption><![CDATA[Identify usage of pre-shared Machine Keys in a application for encryption and decryption.]]></image:caption><image:title><![CDATA[Blacklist3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/blackwidow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/blackwidow-8339.png</image:loc><image:caption><![CDATA[Web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.]]></image:caption><image:title><![CDATA[BlackWidow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bloodhound</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bloodhound-6875.png</image:loc><image:caption><![CDATA[Six Degrees of Domain Admin.]]></image:caption><image:title><![CDATA[BloodHound]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bluehound</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bluehound-9850.png</image:loc><image:caption><![CDATA[Pinpoint the security issues that actually matter.]]></image:caption><image:title><![CDATA[BlueHound]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/boofuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/boofuzz-6775.png</image:loc><image:caption><![CDATA[Network protocol fuzzing for humans.]]></image:caption><image:title><![CDATA[boofuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bore</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bore-5720.png</image:loc><image:caption><![CDATA[A simple CLI tool for making tunnels to localhost.]]></image:caption><image:title><![CDATA[bore]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bounceback</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bounceback-3551.png</image:loc><image:caption><![CDATA[Stealth redirector for your red team operation security.]]></image:caption><image:title><![CDATA[BounceBack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bounty-targets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bounty-targets-1744.png</image:loc><image:caption><![CDATA[Crawls bug bounty platform scopes.]]></image:caption><image:title><![CDATA[bounty-targets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bounty-targets-data</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bounty-targets-data-9520.png</image:loc><image:caption><![CDATA[Hourly-updated data dumps of bug bounty platform scopes that are eligible for reports.]]></image:caption><image:title><![CDATA[bounty-targets-data]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bountydash</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bountydash-2081.png</image:loc><image:caption><![CDATA[Combine your rewards from platforms giving you insights about your bug hunting progress.]]></image:caption><image:title><![CDATA[BountyDash]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bountyplz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bountyplz-3293.png</image:loc><image:caption><![CDATA[Automated security reporting from markdown templates.]]></image:caption><image:title><![CDATA[bountyplz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brakeman</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brakeman-9905.png</image:loc><image:caption><![CDATA[Static analysis security vulnerability scanner for Ruby on Rails applications.]]></image:caption><image:title><![CDATA[brakeman]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/broken-link-checker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/broken-link-checker-5269.png</image:loc><image:caption><![CDATA[Find broken links, missing images, etc within your HTML.]]></image:caption><image:title><![CDATA[broken-link-checker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/broken-link-hijacking</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/broken-link-hijacking-7832.png</image:loc><image:caption><![CDATA[Broken Link Hijacking Burp Suite extension.]]></image:caption><image:title><![CDATA[broken-link-hijacking]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brutas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brutas-6992.png</image:loc><image:caption><![CDATA[Wordlists handcrafted and automated with <3]]></image:caption><image:title><![CDATA[brutas]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brute-hacking-framework</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brute-hacking-framework-1674.png</image:loc><image:caption><![CDATA[A framework including all the tools that work on Windows.]]></image:caption><image:title><![CDATA[Brute Hacking Framework]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brute-ratel</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brute-ratel-8356.png</image:loc><image:caption><![CDATA[A customized command and control center for red team and adversary simulation.]]></image:caption><image:title><![CDATA[brute ratel]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bruteshark</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bruteshark-4302.png</image:loc><image:caption><![CDATA[Network forensic analysis tool that performs deep processing and inspection of network traffic.]]></image:caption><image:title><![CDATA[BruteShark]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brutespray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brutespray-1436.png</image:loc><image:caption><![CDATA[Automatically attempts default creds on found services based on Nmap output.]]></image:caption><image:title><![CDATA[brutespray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brutesubs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brutesubs-4960.png</image:loc><image:caption><![CDATA[Automation framework for running multiple open sourced subdomain bruteforcing tools in parallel.]]></image:caption><image:title><![CDATA[brutesubs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brutex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brutex-9522.png</image:loc><image:caption><![CDATA[Automatically brute force all services running on a target.]]></image:caption><image:title><![CDATA[BruteX]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/brutexss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/brutexss-6584.png</image:loc><image:caption><![CDATA[Tool written in Python simply to find XSS vulnerabilities in web application.]]></image:caption><image:title><![CDATA[BruteXSS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bucket-stream</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bucket-stream-3811.jpeg</image:loc><image:caption><![CDATA[Find interesting Amazon S3 Buckets by watching certificate transparency logs.]]></image:caption><image:title><![CDATA[Bucket Stream]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bucket_finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bucket_finder-8640.png</image:loc><image:caption><![CDATA[DigiNinja's bucket_finder utility.]]></image:caption><image:title><![CDATA[bucket_finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bucketloot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bucketloot-2595.png</image:loc><image:caption><![CDATA[An automated S3-compatible bucket inspector.]]></image:caption><image:title><![CDATA[BucketLoot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bug-bounty-guide</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bug-bounty-guide-5092.png</image:loc><image:caption><![CDATA[Launchpad for bug bounty programs and bug bounty hunters.]]></image:caption><image:title><![CDATA[Bug Bounty Guide]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bug-bounty-reference</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bug-bounty-reference-3182.png</image:loc><image:caption><![CDATA[A list of Bug Bounty writeups that is categorized by the bug nature.]]></image:caption><image:title><![CDATA[Bug Bounty Reference]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bug-bounty-reports-explained</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bug-bounty-reports-explained-2762.png</image:loc><image:caption><![CDATA[Bug Bounty Reports Explained channel.]]></image:caption><image:title><![CDATA[Bug Bounty Reports Explained]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bugbountyhunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bugbountyhunter-8033.png</image:loc><image:caption><![CDATA[Helping you become a BugBountyHunter.]]></image:caption><image:title><![CDATA[BugBountyHunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bugbountyhunting</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bugbountyhunting-9602.png</image:loc><image:caption><![CDATA[Search Bug Bounty writeups easily.]]></image:caption><image:title><![CDATA[BugBountyHunting]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bugbountyscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bugbountyscanner-4752.png</image:loc><image:caption><![CDATA[A Bash script and Docker image for Bug Bounty reconnaissance, intended for headless use.]]></image:caption><image:title><![CDATA[BugBountyScanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bugcrowd-vrt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bugcrowd-vrt-4311.png</image:loc><image:caption><![CDATA[Bugcrowd’s baseline priority ratings for common security vulnerabilities.]]></image:caption><image:title><![CDATA[Bugcrowd VRT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bugprove</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bugprove-9885.png</image:loc><image:caption><![CDATA[Automated firmware analysis tool for composition analysis and vulnerability scanning.]]></image:caption><image:title><![CDATA[BugProve]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/built-with</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/built-with-4066.png</image:loc><image:caption><![CDATA[Find out what websites are Built With.]]></image:caption><image:title><![CDATA[Built With]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bundler-audit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bundler-audit-5846.png</image:loc><image:caption><![CDATA[Patch-level verification for Bundler.]]></image:caption><image:title><![CDATA[bundler-audit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-extender-api</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-extender-api-7957.png</image:loc><image:caption><![CDATA[Burp Extender API.]]></image:caption><image:title><![CDATA[Burp Extender API]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-ntlm-challenge-decoder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-ntlm-challenge-decoder-3975.jpg</image:loc><image:caption><![CDATA[Burp extension to decode NTLM SSP headers and extract domain/host information.]]></image:caption><image:title><![CDATA[Burp NTLM Challenge Decoder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-suite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-suite-1925.png</image:loc><image:caption><![CDATA[The class-leading vulnerability scanning, penetration testing, and web app security platform.]]></image:caption><image:title><![CDATA[Burp Suite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-wp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-wp-9128.png</image:loc><image:caption><![CDATA[Find known vulnerabilities in WordPress plugins and themes, WPScan like plugin for Burp.]]></image:caption><image:title><![CDATA[Burp WP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-anonymouscloud</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-anonymouscloud-4960.png</image:loc><image:caption><![CDATA[Performs passive scan to identify buckets and test them for publicly accessible vulnerabilities.]]></image:caption><image:title><![CDATA[Burp-AnonymousCloud]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-encode-ip</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-encode-ip-1057.png</image:loc><image:caption><![CDATA[Burp Suite extension to encode an IP address focused to bypass application IP/domain blacklist.]]></image:caption><image:title><![CDATA[Burp-Encode-IP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-exporter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-exporter-5212.jpeg</image:loc><image:caption><![CDATA[Copy a Burp Suite request to a file or the clipboard as multiple programming languages functions.]]></image:caption><image:title><![CDATA[burp-exporter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-to-sqlmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-to-sqlmap-3921.png</image:loc><image:caption><![CDATA[Performing SQLInjection test on Burp Suite Bulk Requests using SQLMap.]]></image:caption><image:title><![CDATA[Burp-to-SQLMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-vulners-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-vulners-scanner-5169.png</image:loc><image:caption><![CDATA[Vulnerability scanner based on vulners.com search API.]]></image:caption><image:title><![CDATA[burp-vulners-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burp-wordlist-generator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burp-wordlist-generator-3121.png</image:loc><image:caption><![CDATA[Generates wordlists from the Burp sitemap.]]></image:caption><image:title><![CDATA[Burp-Wordlist-Generator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpbeautifier</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpbeautifier-4890.png</image:loc><image:caption><![CDATA[Burpsuite extension for beautifying request/response body.]]></image:caption><image:title><![CDATA[BurpBeautifier]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpbounty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpbounty-4446.png</image:loc><image:caption><![CDATA[Improve the active and passive Burp Suite scanner by means of custom rules through GUI.]]></image:caption><image:title><![CDATA[BurpBounty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpgpt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpgpt-4048.png</image:loc><image:caption><![CDATA[A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan.]]></image:caption><image:title><![CDATA[BurpGPT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpjslinkfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpjslinkfinder-8237.png</image:loc><image:caption><![CDATA[Burp Extension for a passive scanning JS files for endpoint links.]]></image:caption><image:title><![CDATA[BurpJSLinkFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpsentinel</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpsentinel-4429.png</image:loc><image:caption><![CDATA[GUI Burp Plugin to ease discovering of security holes in web applications.]]></image:caption><image:title><![CDATA[BurpSentinel]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpsmartbuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpsmartbuster-7026.png</image:loc><image:caption><![CDATA[A Burp Suite content discovery plugin that add the smart into the Buster.]]></image:caption><image:title><![CDATA[BurpSmartBuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/burpsuitehttpsmuggler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/burpsuitehttpsmuggler-4564.jpeg</image:loc><image:caption><![CDATA[A Burp Suite extension to bypass WAFs or test their effectiveness using a number of techniques.]]></image:caption><image:title><![CDATA[BurpSuiteHTTPSmuggler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bwapp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bwapp-2262.png</image:loc><image:caption><![CDATA[An extremely buggy web application!.]]></image:caption><image:title><![CDATA[bWAPP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bxss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bxss-3551.png</image:loc><image:caption><![CDATA[bXSS is a utility which can be used identify Blind Cross-Site Scripting.]]></image:caption><image:title><![CDATA[bXSS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bxss.net</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bxss.net-1381.png</image:loc><image:caption><![CDATA[Web service that allows for detection Blind XSS vulnerabilities within web applications.]]></image:caption><image:title><![CDATA[bxss.net]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bypass-url-parser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bypass-url-parser-5832.png</image:loc><image:caption><![CDATA[Tool that tests MANY url bypasses to reach a 40X protected page.]]></image:caption><image:title><![CDATA[Bypass URL Parser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bypass-403</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bypass-403-8559.jpg</image:loc><image:caption><![CDATA[A simple script just made for self use for bypassing 403.]]></image:caption><image:title><![CDATA[Bypass-403]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/bypasswaf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/bypasswaf-8542.png</image:loc><image:caption><![CDATA[Add headers to all Burp requests to bypass some WAF products.]]></image:caption><image:title><![CDATA[bypasswaf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/capital</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/capital-6056.png</image:loc><image:caption><![CDATA[A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities.]]></image:caption><image:title><![CDATA[c{api}tal]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cadaver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cadaver-9879.png</image:loc><image:caption><![CDATA[Command-line WebDAV client.]]></image:caption><image:title><![CDATA[cadaver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/caido</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/caido-9234.png</image:loc><image:caption><![CDATA[A lightweight web security auditing toolkit.]]></image:caption><image:title><![CDATA[caido]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cain-and-abel</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cain-and-abel-7661.png</image:loc><image:caption><![CDATA[Password recovery tool for Microsoft Operating Systems.]]></image:caption><image:title><![CDATA[Cain and Abel]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cake-fuzzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cake-fuzzer-5693.png</image:loc><image:caption><![CDATA[Cutting-edge project designed to automate the continuous discovery of vulnerabilities in webapps.]]></image:caption><image:title><![CDATA[Cake Fuzzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/caldera</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/caldera-7957.png</image:loc><image:caption><![CDATA[Automated adversary emulation platform.]]></image:caption><image:title><![CDATA[Caldera]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cameradar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cameradar-9729.png</image:loc><image:caption><![CDATA[Hacks its way into RTSP videosurveillance cameras.]]></image:caption><image:title><![CDATA[cameradar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/can-i-take-over-dns-</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/can-i-take-over-dns--7111.png</image:loc><image:caption><![CDATA[A list of DNS providers and how to claim (sub)domains via missing hosted zones.]]></image:caption><image:title><![CDATA[Can I Take Over DNS?]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/can-i-take-over-xyz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/can-i-take-over-xyz-2185.png</image:loc><image:caption><![CDATA[A list of services and how to claim (sub)domains with dangling DNS records.]]></image:caption><image:title><![CDATA[Can I take over XYZ?]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/canarytokens</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/canarytokens-8088.png</image:loc><image:caption><![CDATA[Track activity and actions on your network.]]></image:caption><image:title><![CDATA[Canarytokens]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/canvas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/canvas-4472.png</image:loc><image:caption><![CDATA[Assessment tool that allows penetration testing and hostile attack simulations.]]></image:caption><image:title><![CDATA[Canvas]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/capa</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tool-capa-4173.png</image:loc><image:caption><![CDATA[The FLARE team's open-source tool to identify capabilities in executable files.]]></image:caption><image:title><![CDATA[capa]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/carboncopy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/carboncopy-7919.jpeg</image:loc><image:caption><![CDATA[Creates a spoofed certificate of any online website and signs an executable for AV evasion.]]></image:caption><image:title><![CDATA[CarbonCopy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cariddi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cariddi-5678.png</image:loc><image:caption><![CDATA[Crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more.]]></image:caption><image:title><![CDATA[cariddi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/catphish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/catphish-2914.png</image:loc><image:caption><![CDATA[Generate similar-looking domains for phishing attacks.]]></image:caption><image:title><![CDATA[catphish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cc.py</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cc.py-3592.png</image:loc><image:caption><![CDATA[Extracting URLs of a specific target based on the results of commoncrawl.org.]]></image:caption><image:title><![CDATA[cc.py]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cdk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cdk-6523.png</image:loc><image:caption><![CDATA[Make security testing of K8s, Docker, and Containerd easier.]]></image:caption><image:title><![CDATA[CDK]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cdn-proxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cdn-proxy-7899.png</image:loc><image:caption><![CDATA[Create a copy of a targeted website with CDN and WAF restrictions disabled.]]></image:caption><image:title><![CDATA[CDN Proxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/celerystalk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/celerystalk-6830.png</image:loc><image:caption><![CDATA[An asynchronous enumeration & vulnerability scanner.]]></image:caption><image:title><![CDATA[celerystalk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/censys-enumeration</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/censys-enumeration-6989.jpg</image:loc><image:caption><![CDATA[Extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys.]]></image:caption><image:title><![CDATA[Censys Enumeration]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/censys-subdomain-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/censys-subdomain-finder-4639.png</image:loc><image:caption><![CDATA[Perform subdomain enumeration using the certificate transparency logs from Censys.]]></image:caption><image:title><![CDATA[Censys subdomain finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cerbrutus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cerbrutus-7843.png</image:loc><image:caption><![CDATA[Network brute force tool, faster than other existing solutions.]]></image:caption><image:title><![CDATA[cerbrutus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cero</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cero-8481.png</image:loc><image:caption><![CDATA[Scrape domain names from SSL certificates of arbitrary hosts.]]></image:caption><image:title><![CDATA[cero]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certcrunchy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certcrunchy-2605.jpg</image:loc><image:caption><![CDATA[Uses data from SSL Certificates to find potential host names.]]></image:caption><image:title><![CDATA[CertCrunchy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certificate-ripper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certificate-ripper-8126.png</image:loc><image:caption><![CDATA[A CLI tool to extract server certificates.]]></image:caption><image:title><![CDATA[Certificate Ripper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certificate-search</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certificate-search-8126.png</image:loc><image:caption><![CDATA[Get informations about SSL certificates.]]></image:caption><image:title><![CDATA[Certificate Search]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certify-5883.png</image:loc><image:caption><![CDATA[Active Directory certificate abuse.]]></image:caption><image:title><![CDATA[Certify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certipy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certipy-8187.png</image:loc><image:caption><![CDATA[Active Directory Certificate Services enumeration and abuse.]]></image:caption><image:title><![CDATA[Certipy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certmitm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certmitm-8502.png</image:loc><image:caption><![CDATA[A tool for testing for certificate validation vulnerabilities of TLS connections.]]></image:caption><image:title><![CDATA[certmitm]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certmon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certmon-2181.png</image:loc><image:caption><![CDATA[A simple certificate expiration monitor script.]]></image:caption><image:title><![CDATA[certmon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certs.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certs.io-3330.png</image:loc><image:caption><![CDATA[Search the entire internet by data in TLS certificates.]]></image:caption><image:title><![CDATA[certs.io]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certsniff</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certsniff-1090.jpg</image:loc><image:caption><![CDATA[A certificate transparency log keyword sniffer written in Python.]]></image:caption><image:title><![CDATA[certSniff]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/certstealer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/certstealer-4616.png</image:loc><image:caption><![CDATA[A .NET tool for exporting and importing certificates without touching disk.]]></image:caption><image:title><![CDATA[CertStealer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cewl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cewl-9406.png</image:loc><image:caption><![CDATA[Custom Word List Generator.]]></image:caption><image:title><![CDATA[CeWL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cewler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cewler-7385.png</image:loc><image:caption><![CDATA[Custom word list generator redefined, based on the Scrapy framework.]]></image:caption><image:title><![CDATA[CeWLeR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chainsaw</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chainsaw-7070.png</image:loc><image:caption><![CDATA[Rapidly search and hunt through windows forensic artefacts.]]></image:caption><image:title><![CDATA[chainsaw]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/changedetection.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/changedetection.io-8465.png</image:loc><image:caption><![CDATA[Page change monitoring with alerts a breezem, the best way to monitor website changes.]]></image:caption><image:title><![CDATA[changedetection.io]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/changeme</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/changeme-7298.png</image:loc><image:caption><![CDATA[A default credential scanner.]]></image:caption><image:title><![CDATA[changeme]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chaos</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chaos-4389.png</image:loc><image:caption><![CDATA[Collect and maintain internet-wide assets data for public Bug Bounty programs.]]></image:caption><image:title><![CDATA[Chaos]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/charles</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/charles-3315.png</image:loc><image:caption><![CDATA[HTTP proxy / monitor / reverse proxy that allows to view all of the HTTP(S) traffic.]]></image:caption><image:title><![CDATA[Charles]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cheat.sh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cheat.sh-5508.png</image:loc><image:caption><![CDATA[The only cheat sheet you need.]]></image:caption><image:title><![CDATA[cheat.sh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/checkov</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/checkov-5358.png</image:loc><image:caption><![CDATA[Prevent cloud misconfigurations and find vulnerabilities during build-time.]]></image:caption><image:title><![CDATA[checkov]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chimera</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chimera-3115.png</image:loc><image:caption><![CDATA[Obfuscation script designed to bypass AMSI and commercial antivirus solution.]]></image:caption><image:title><![CDATA[Chimera]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chipsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chipsec-6275.png</image:loc><image:caption><![CDATA[Platform security assessment framework.]]></image:caption><image:title><![CDATA[chipsec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chkrootkit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chkrootkit-5278.png</image:loc><image:caption><![CDATA[Locally checks for signs of a rootkit.]]></image:caption><image:title><![CDATA[chkrootkit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/chopchop</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/chopchop-6390.png</image:loc><image:caption><![CDATA[Scan endpoints and identify exposition of sensitive services/files/folders.]]></image:caption><image:title><![CDATA[ChopChop]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cilium</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cilium-5535.png</image:loc><image:caption><![CDATA[eBPF-based networking, security, and observability.]]></image:caption><image:title><![CDATA[cilium]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ciphey</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ciphey-1500.png</image:loc><image:caption><![CDATA[Automates decryptions & decodings with encodings, classical ciphers, hashes, or more.]]></image:caption><image:title><![CDATA[Ciphey]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/clair</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/clair-9648.png</image:loc><image:caption><![CDATA[Vulnerability static analysis for containers.]]></image:caption><image:title><![CDATA[clair]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/clairvoyance</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/clairvoyance-1455.png</image:loc><image:caption><![CDATA[Obtain GraphQL API Schema even if the introspection is not enabled.]]></image:caption><image:title><![CDATA[clairvoyance]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/classyshark</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/classyshark-2139.png</image:loc><image:caption><![CDATA[Android and Java bytecode viewer.]]></image:caption><image:title><![CDATA[ClassyShark]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloakquest3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloakquest3r-6483.png</image:loc><image:caption><![CDATA[Uncover the true IP address of websites safeguarded by Cloudflare & others.]]></image:caption><image:title><![CDATA[CloakQuest3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloud_enum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloud_enum-8417.png</image:loc><image:caption><![CDATA[Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.]]></image:caption><image:title><![CDATA[cloud_enum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudbrute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudbrute-6823.png</image:loc><image:caption><![CDATA[Awesome cloud enumerator.]]></image:caption><image:title><![CDATA[CloudBrute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudfail</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudfail-2537.png</image:loc><image:caption><![CDATA[Utilize misconfigured DNS and old database records to find hidden IPs behind CloudFlare network.]]></image:caption><image:title><![CDATA[CloudFail]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudflair</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudflair-4227.png</image:loc><image:caption><![CDATA[Find origin servers of websites behind Cloudflare by using Internet-wide scan data from Censys.]]></image:caption><image:title><![CDATA[CloudFlair]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudflare-origin-ip</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudflare-origin-ip-7985.png</image:loc><image:caption><![CDATA[Try to find the origin IP of a webapp protected by Cloudflare.]]></image:caption><image:title><![CDATA[cloudflare-origin-ip]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudfox</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudfox-9992.png</image:loc><image:caption><![CDATA[Automating situational awareness for cloud penetration tests.]]></image:caption><image:title><![CDATA[Cloudfox]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudfrunt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudfrunt-4828.png</image:loc><image:caption><![CDATA[A tool for identifying misconfigured CloudFront domains.]]></image:caption><image:title><![CDATA[CloudFrunt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudgoat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudgoat-3006.png</image:loc><image:caption><![CDATA[Vulnerable by design AWS deployment tool.]]></image:caption><image:title><![CDATA[CloudGoat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudjack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudjack-5858.png</image:loc><image:caption><![CDATA[Route53/CloudFront Vulnerability assessment utility.]]></image:caption><image:title><![CDATA[CloudJack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudlist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudlist-8170.png</image:loc><image:caption><![CDATA[Cloudlist is a tool for listing Assets from multiple Cloud Providers.]]></image:caption><image:title><![CDATA[cloudlist]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudmapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudmapper-9354.png</image:loc><image:caption><![CDATA[CloudMapper helps you analyze your Amazon Web Services environments.]]></image:caption><image:title><![CDATA[CloudMapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudrecon-6520.png</image:loc><image:caption><![CDATA[Finding assets and subdomains from certificates! Scan the web!]]></image:caption><image:title><![CDATA[CloudRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudscraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudscraper-5430.png</image:loc><image:caption><![CDATA[Tool to enumerate targets in search of cloud resources.]]></image:caption><image:title><![CDATA[CloudScraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cloudsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cloudsploit-9326.png</image:loc><image:caption><![CDATA[Cloud Security Posture Management (CSPM).]]></image:caption><image:title><![CDATA[cloudsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/clzero</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/clzero-5497.png</image:loc><image:caption><![CDATA[A project for fuzzing HTTP/1.1 CL.0 Request Smuggling attack vectors.]]></image:caption><image:title><![CDATA[CLZero]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cmseek</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cmseek-1754.png</image:loc><image:caption><![CDATA[CMS Detection and Exploitation suite that supports over 180 other CMSs.]]></image:caption><image:title><![CDATA[CMSeek]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cmsmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cmsmap-5106.png</image:loc><image:caption><![CDATA[CMS scanner that automates the process of detecting security flaws of the most popular CMSs.]]></image:caption><image:title><![CDATA[CMSmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cmsscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cmsscan-7229.png</image:loc><image:caption><![CDATA[Scan Wordpress, Drupal, Joomla, vBulletin websites for security issues.]]></image:caption><image:title><![CDATA[CMSScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cnames</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cnames-3393.png</image:loc><image:caption><![CDATA[Take a list of resolved subdomains and output any corresponding CNAMES en masse.]]></image:caption><image:title><![CDATA[cnames]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/co2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/co2-9338.png</image:loc><image:caption><![CDATA[A collection of enhancements for Portswigger's popular Burp Suite web penetration testing tool.]]></image:caption><image:title><![CDATA[co2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/codeql</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/codeql-3496.png</image:loc><image:caption><![CDATA[Power security researchers around the world as well as code scanning.]]></image:caption><image:title><![CDATA[codeql]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/coerced-potato</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/coerced-potato-3043.png</image:loc><image:caption><![CDATA[A Windows potato to privesc.]]></image:caption><image:title><![CDATA[Coerced potato]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/coercer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/coercer-5489.png</image:loc><image:caption><![CDATA[Automatically coerce a Windows server to authenticate on an arbitrary machine.]]></image:caption><image:title><![CDATA[Coercer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/collaborator-everywhere</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/collaborator-everywhere-3957.png</image:loc><image:caption><![CDATA[Burp Suite extension which injects non-invasive headers to reveal backend systems.]]></image:caption><image:title><![CDATA[Collaborator Everywhere]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/commando-vm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/commando-vm-3848.png</image:loc><image:caption><![CDATA[Fully customizable Windows-based pentesting virtual machine distribution.]]></image:caption><image:title><![CDATA[Commando VM]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/commit-stream</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/commit-stream-9991.png</image:loc><image:caption><![CDATA[OSINT tool for finding Github repositories by extracting commit logs in real time.]]></image:caption><image:title><![CDATA[commit-stream]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/commix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/commix-1903.png</image:loc><image:caption><![CDATA[Automated All-in-One OS Command Injection Exploitation Tool.]]></image:caption><image:title><![CDATA[Commix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/comperio</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/comperio-3623.png</image:loc><image:caption><![CDATA[OSINT tool to find usernames across 80+ social media and social networking sites.]]></image:caption><image:title><![CDATA[Comperio]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/confuserex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/confuserex-8345.png</image:loc><image:caption><![CDATA[An open-source, free protector for .NET applications.]]></image:caption><image:title><![CDATA[ConfuserEx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cook</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cook-6138.png</image:loc><image:caption><![CDATA[Overpower wordlist generator, words permutation and combinations, encoding/decoding...]]></image:caption><image:title><![CDATA[cook]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cookie_crimes</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cookie_crimes-1249.png</image:loc><image:caption><![CDATA[Read local Chrome cookies without root or decrypting.]]></image:caption><image:title><![CDATA[cookie_crimes]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/core-impact</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/core-impact-8162.png</image:loc><image:caption><![CDATA[Designed to enable security teams to conduct advanced penetration tests with ease.]]></image:caption><image:title><![CDATA[Core Impact]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cors-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cors-scanner-1676.png</image:loc><image:caption><![CDATA[A multi-threaded scanner that helps identify CORS flaws/misconfigurations.]]></image:caption><image:title><![CDATA[CORS Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/corsme</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/corsme-8374.png</image:loc><image:caption><![CDATA[CORS misconfiguration scanner tool with speed and precision in mind!]]></image:caption><image:title><![CDATA[CorsMe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/corstest</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/corstest-1751.png</image:loc><image:caption><![CDATA[A simple CORS misconfiguration scanner.]]></image:caption><image:title><![CDATA[CORStest]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/corsy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/corsy-4394.png</image:loc><image:caption><![CDATA[CORS Misconfiguration Scanner.]]></image:caption><image:title><![CDATA[Corsy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/covenant</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/covenant-4356.png</image:loc><image:caption><![CDATA[Collaborative C2 framework for red teamers.]]></image:caption><image:title><![CDATA[Covenant]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cr3dov3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cr3dov3r-9004.png</image:loc><image:caption><![CDATA[Know the dangers of credential reuse attacks.]]></image:caption><image:title><![CDATA[Cr3dOv3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crackerjack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crackerjack-6384.png</image:loc><image:caption><![CDATA[Hashcat Web Interface.]]></image:caption><image:title><![CDATA[crackerjack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crackmapexec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crackmapexec-1957.jpg</image:loc><image:caption><![CDATA[A swiss army knife for pentesting networks.]]></image:caption><image:title><![CDATA[CrackMapExec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crawlergo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crawlergo-6699.png</image:loc><image:caption><![CDATA[A powerful browser crawler for web vulnerability scanners]]></image:caption><image:title><![CDATA[Crawlergo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crawley</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crawley-9641.png</image:loc><image:caption><![CDATA[The unix-way web crawler.]]></image:caption><image:title><![CDATA[crawley]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/creepycrawler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/creepycrawler-5061.png</image:loc><image:caption><![CDATA[Crawl a site and extract useful informations for recon.]]></image:caption><image:title><![CDATA[creepyCrawler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crithit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crithit-2926.png</image:loc><image:caption><![CDATA[Takes a single wordlist item and tests it one by one over a large collection of websites.]]></image:caption><image:title><![CDATA[crithit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crlf-injection-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crlf-injection-scanner-1022.png</image:loc><image:caption><![CDATA[Command line tool for testing CRLF injection on a list of domains.]]></image:caption><image:title><![CDATA[CRLF-Injection-Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crlfi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crlfi-5772.jpg</image:loc><image:caption><![CDATA[CRLF bug scanner for WebPentesters and Bugbounty Hunters.]]></image:caption><image:title><![CDATA[Crlfi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crlfmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crlfmap-4028.png</image:loc><image:caption><![CDATA[CRLFMap is a tool to find HTTP Splitting vulnerabilities.]]></image:caption><image:title><![CDATA[CRLFMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crlfsuite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crlfsuite-5611.png</image:loc><image:caption><![CDATA[The most powerful CRLF injection scanner.]]></image:caption><image:title><![CDATA[CRLFsuite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crlfuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crlfuzz-2104.png</image:loc><image:caption><![CDATA[A fast tool to scan CRLF vulnerability written in Go.]]></image:caption><image:title><![CDATA[CRLFuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cross-site-scripting-cheat-sheet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cross-site-scripting-cheat-sheet-1579.png</image:loc><image:caption><![CDATA[PortSwigger XSS cheat sheet that contains many vectors that can help you bypass WAFs and filters.]]></image:caption><image:title><![CDATA[Cross-site scripting cheat sheet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crossc2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crossc2-3333.jpg</image:loc><image:caption><![CDATA[Generate CobaltStrike's cross-platform payload.]]></image:caption><image:title><![CDATA[CrossC2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crosslinked</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crosslinked-3369.png</image:loc><image:caption><![CDATA[LinkedIn enumeration tool to get employee names from an organization using scraping.]]></image:caption><image:title><![CDATA[CrossLinked]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crowbar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crowbar-4833.png</image:loc><image:caption><![CDATA[Brute forcing tool that support several uncommon protocols.]]></image:caption><image:title><![CDATA[crowbar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crowdsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crowdsec-1803.png</image:loc><image:caption><![CDATA[Offers crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.]]></image:caption><image:title><![CDATA[crowdsec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crtndtry</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crtndtry-1525.png</image:loc><image:caption><![CDATA[Yet another subdomain finder.]]></image:caption><image:title><![CDATA[crtndtry]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/crunch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/crunch-5534.jpg</image:loc><image:caption><![CDATA[Wordlist generator where you can specify a character set or any set of characters to be used.]]></image:caption><image:title><![CDATA[crunch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cryptohack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cryptohack-3095.png</image:loc><image:caption><![CDATA[A fun, free platform for learning modern cryptography.]]></image:caption><image:title><![CDATA[CRYPTOHACK]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csp-evaluator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csp-evaluator-4503.png</image:loc><image:caption><![CDATA[Check CSP serves as a strong mitigation against cross-site scripting attacks.]]></image:caption><image:title><![CDATA[CSP Evaluator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csp-analyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csp-analyzer-8640.png</image:loc><image:caption><![CDATA[Analyze Content-Security-Policy header of a given URL.]]></image:caption><image:title><![CDATA[csp-analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csper-7205.png</image:loc><image:caption><![CDATA[The most advance set of Content Security Policy tools.]]></image:caption><image:title><![CDATA[Csper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csprecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csprecon-1578.jpg</image:loc><image:caption><![CDATA[Discover new target domains using Content Security Policy.]]></image:caption><image:title><![CDATA[csprecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csrf-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csrf-scanner-3945.png</image:loc><image:caption><![CDATA[CSRF Scanner Extension for Burp Suite Pro.]]></image:caption><image:title><![CDATA[csrf-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/csrft</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/csrft-3043.png</image:loc><image:caption><![CDATA[A lightweight CSRF Toolkit for easy Proof of Concept.]]></image:caption><image:title><![CDATA[CSRFT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cstc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cstc-2752.png</image:loc><image:caption><![CDATA[Burp Suite extension that allows request/response modification using a GUI.]]></image:caption><image:title><![CDATA[cstc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ctf-tools</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ctf-tools-3423.png</image:loc><image:caption><![CDATA[Some setup scripts for security research tools.]]></image:caption><image:title><![CDATA[ctf-tools]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ctfd</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ctfd-9229.png</image:loc><image:caption><![CDATA[A Capture The Flag framework focusing on ease of use and customizability.]]></image:caption><image:title><![CDATA[CTFd]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ctfr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ctfr-9466.png</image:loc><image:caption><![CDATA[Abusing Certificate Transparency logs for getting HTTPS websites subdomains.]]></image:caption><image:title><![CDATA[CTFR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ctftool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ctftool-4502.png</image:loc><image:caption><![CDATA[Interactive CTF exploration tool.]]></image:caption><image:title><![CDATA[ctftool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cuckoo-sandbox</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cuckoo-sandbox-9912.png</image:loc><image:caption><![CDATA[An automated dynamic malware analysis system.]]></image:caption><image:title><![CDATA[Cuckoo Sandbox]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cupp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cupp-2795.jpg</image:loc><image:caption><![CDATA[Common User Passwords Profiler.]]></image:caption><image:title><![CDATA[CUPP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/curate</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/curate-1630.png</image:loc><image:caption><![CDATA[A tool for fetching archived URLs.]]></image:caption><image:title><![CDATA[curate]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cve</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cve-9193.png</image:loc><image:caption><![CDATA[Gather and update all available and newest CVEs with their PoC.]]></image:caption><image:title><![CDATA[cve]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cve-collector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cve-collector-3639.png</image:loc><image:caption><![CDATA[Simple latest CVE collector written in Python.]]></image:caption><image:title><![CDATA[cve-collector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cve-maker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cve-maker-7353.png</image:loc><image:caption><![CDATA[A hub for finding CVEs and exploits based on the official NIST, ExploitDB and Github databases.]]></image:caption><image:title><![CDATA[CVE-MAKER]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cve-search</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cve-search-7906.png</image:loc><image:caption><![CDATA[A tool to perform local searches for known vulnerabilities.]]></image:caption><image:title><![CDATA[cve-search]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cvecrowd.com</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cvecrowd.com-7162.png</image:loc><image:caption><![CDATA[Lists CVEs that are currently being discussed on the social network Mastodon.]]></image:caption><image:title><![CDATA[cvecrowd.com]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cvemap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cvemap-7512.png</image:loc><image:caption><![CDATA[Navigate the CVE jungle with ease using CLI tool designed to provide a structured interface.]]></image:caption><image:title><![CDATA[CVEMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cyberchef</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cyberchef-8739.png</image:loc><image:caption><![CDATA[A web app for encryption, encoding, compression and data analysis.]]></image:caption><image:title><![CDATA[CyberChef]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cybersec-quizzes</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cybersec-quizzes-1832.png</image:loc><image:caption><![CDATA[Test your knowledge on cyber security and practice for industry recognised certifications.]]></image:caption><image:title><![CDATA[CyberSec Quizzes]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/cypherdog</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/cypherdog-6092.png</image:loc><image:caption><![CDATA[PowerShell Cmdlets to interact with BloodHound Data via Neo4j HTTP API.]]></image:caption><image:title><![CDATA[CypherDog]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/d3m0n1z3dshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/d3m0n1z3dshell-5926.png</image:loc><image:caption><![CDATA[An advanced tool for persistence in Linux.]]></image:caption><image:title><![CDATA[D3m0n1z3dShell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dalfox</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dalfox.png</image:loc><image:caption><![CDATA[Powerful open source XSS scanning tool and parameter analyzer.]]></image:caption><image:title><![CDATA[DalFox]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/damn-vulnerable-bank</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/damn-vulnerable-bank-1438.png</image:loc><image:caption><![CDATA[A vulnerable Android application with an interface to test your mobile hacking skills.]]></image:caption><image:title><![CDATA[Damn Vulnerable Bank]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/damn-vulnerable-restaurant</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/damn-vulnerable-restaurant-3950.png</image:loc><image:caption><![CDATA[An intentionally vulnerable web API game for learning and training purposes.]]></image:caption><image:title><![CDATA[Damn Vulnerable RESTaurant]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dangerous-methods</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dangerous-methods-6917.png</image:loc><image:caption><![CDATA[A Burp Suite extension for finding the use of potentially dangerous methods/functions.]]></image:caption><image:title><![CDATA[Dangerous Methods]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dastardly-scan-action</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dastardly-scan-action-2325.png</image:loc><image:caption><![CDATA[Runs a scan using Dastardly by Burp Suite against a target site and generates a report.]]></image:caption><image:title><![CDATA[Dastardly Scan Action]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dataextractor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dataextractor-8733.png</image:loc><image:caption><![CDATA[A Burp Suite extension to extract data from source code while browsing.]]></image:caption><image:title><![CDATA[DataExtractor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dbmonster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dbmonster-1596.png</image:loc><image:caption><![CDATA[A multitool for tracking and locating nearby devices via their RF activities.]]></image:caption><image:title><![CDATA[dBmonster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/de4py</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/de4py-6819.png</image:loc><image:caption><![CDATA[toolkit for python reverse engineering.]]></image:caption><image:title><![CDATA[De4py]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dead-link-checker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dead-link-checker-8926.png</image:loc><image:caption><![CDATA[A dead-simple way to recursively look for broken links on a web page.]]></image:caption><image:title><![CDATA[dead-link-checker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/decompilers-online</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/decompilers-online-4313.png</image:loc><image:caption><![CDATA[Free, accessible, and platform-independent decompilation service.]]></image:caption><image:title><![CDATA[Decompilers online]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/deepsecrets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/deepsecrets-8503.png</image:loc><image:caption><![CDATA[Secrets scanner that understands code.]]></image:caption><image:title><![CDATA[DeepSecrets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/default-credentials-cheat-sheet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/default-credentials-cheat-sheet-6444.jpeg</image:loc><image:caption><![CDATA[One place for all the default credentials to assist on finding devices with default password.]]></image:caption><image:title><![CDATA[Default Credentials Cheat Sheet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/default-http-login-hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/default-http-login-hunter-5343.png</image:loc><image:caption><![CDATA[Login hunter of default credentials for administrative web interfaces.]]></image:caption><image:title><![CDATA[default-http-login-hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/defaultpassword</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/defaultpassword-5771.png</image:loc><image:caption><![CDATA[Default passwords database sorted by manufacturers.]]></image:caption><image:title><![CDATA[DefaultPassword]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/defcon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/defcon-6681.png</image:loc><image:caption><![CDATA[The world’s most prominent and well-known computer security conferences.]]></image:caption><image:title><![CDATA[DEFCON]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dehashed</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dehashed-8115.png</image:loc><image:caption><![CDATA[DeHashed provides free deep-web scans and protection against credential leaks.]]></image:caption><image:title><![CDATA[DeHashed]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/demiguise</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/demiguise-5141.png</image:loc><image:caption><![CDATA[HTA encryption tool for Red Teams.]]></image:caption><image:title><![CDATA[Demiguise]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/demovfuscator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/demovfuscator-1354.png</image:loc><image:caption><![CDATA[A work-in-progress deobfuscator for movfuscated binaries.]]></image:caption><image:title><![CDATA[demovfuscator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dependencycheck</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dependencycheck-2084.png</image:loc><image:caption><![CDATA[Utility that detects publicly disclosed vulnerabilities in application dependencies.]]></image:caption><image:title><![CDATA[DependencyCheck]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/depix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/depix-9979.png</image:loc><image:caption><![CDATA[Recovers passwords from pixelized screenshots.]]></image:caption><image:title><![CDATA[Depix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/deps.dev</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/deps.dev-7123.png</image:loc><image:caption><![CDATA[Better understand the structure, construction, and security of open source software packages.]]></image:caption><image:title><![CDATA[deps.dev]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/depsdev</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/depsdev-1866.jpg</image:loc><image:caption><![CDATA[CLI client for deps.dev API.]]></image:caption><image:title><![CDATA[depsdev]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/deser-node</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/deser-node-8722.png</image:loc><image:caption><![CDATA[NodeJS deserialization payload generator.]]></image:caption><image:title><![CDATA[deser-node]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/detect-secrets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/detect-secrets-5789.png</image:loc><image:caption><![CDATA[An enterprise friendly way of detecting and preventing secrets in code.]]></image:caption><image:title><![CDATA[detect-secrets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/detectify-cves</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/detectify-cves-7836.png</image:loc><image:caption><![CDATA[Find CVEs that don't have a Detectify modules.]]></image:caption><image:title><![CDATA[detectify-cves]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dex2jar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dex2jar-8394.png</image:loc><image:caption><![CDATA[Tools to work with android .dex and java .class files.]]></image:caption><image:title><![CDATA[dex2jar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/differer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/differer-9814.png</image:loc><image:caption><![CDATA[differer finds how URLs are parsed by different languages in order to help bug hunters break filters.]]></image:caption><image:title><![CDATA[differer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirb-7825.png</image:loc><image:caption><![CDATA[Web Fuzzer.]]></image:caption><image:title><![CDATA[Dirb]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirbuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirbuster-3433.png</image:loc><image:caption><![CDATA[Multi threaded application to brute force directories and files names on web/application servers.]]></image:caption><image:title><![CDATA[DirBuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirhunt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirhunt-7654.png</image:loc><image:caption><![CDATA[Find web directories without bruteforce.]]></image:caption><image:title><![CDATA[dirhunt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirlstr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirlstr-7788.png</image:loc><image:caption><![CDATA[Finds Directory Listings or open S3 buckets from a list of URLs.]]></image:caption><image:title><![CDATA[dirlstr]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirsearch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirsearch-3702.png</image:loc><image:caption><![CDATA[Web path scanner.]]></image:caption><image:title><![CDATA[dirsearch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/godirsearch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/godirsearch-5665.png</image:loc><image:caption><![CDATA[A Go implementation of dirsearch.]]></image:caption><image:title><![CDATA[DirSearch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dirstalk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dirstalk-8636.png</image:loc><image:caption><![CDATA[Multi threaded application designed to brute force paths on web servers.]]></image:caption><image:title><![CDATA[Dirstalk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/discover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/discover-5340.png</image:loc><image:caption><![CDATA[Custom bash scripts used to automate various penetration testing tasks.]]></image:caption><image:title><![CDATA[discover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dismap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dismap-3259.png</image:loc><image:caption><![CDATA[Asset discovery and identification tool.]]></image:caption><image:title><![CDATA[Dismap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dispatch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dispatch-5756.png</image:loc><image:caption><![CDATA[All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!.]]></image:caption><image:title><![CDATA[Dispatch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/disposable-email-domains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/disposable-email-domains-5441.png</image:loc><image:caption><![CDATA[A list of disposable and temporary email address domains.]]></image:caption><image:title><![CDATA[disposable-email-domains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/distribute-damage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/distribute-damage-6302.png</image:loc><image:caption><![CDATA[Evenly distributes scanner load across targets.]]></image:caption><image:title><![CDATA[Distribute Damage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/divideandscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/divideandscan-7954.png</image:loc><image:caption><![CDATA[Divide full port scan results and use it for targeted Nmap runs.]]></image:caption><image:title><![CDATA[DivideAndScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/django-defectdojo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/django-defectdojo-7839.png</image:loc><image:caption><![CDATA[DevSecOps, ASPM, Vulnerability Management.]]></image:caption><image:title><![CDATA[django-DefectDojo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dmut</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dmut-4364.png</image:loc><image:caption><![CDATA[Perform permutations, mutations and alteration of subdomains.]]></image:caption><image:title><![CDATA[dmut]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnscan-2130.png</image:loc><image:caption><![CDATA[Python wordlist-based DNS subdomain scanner.]]></image:caption><image:title><![CDATA[dnscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnscat2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnscat2-8274.png</image:loc><image:caption><![CDATA[Create an encrypted command-and-control (C&C) channel over the DNS protocol.]]></image:caption><image:title><![CDATA[dnscat2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnscewl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnscewl-9776.png</image:loc><image:caption><![CDATA[A DNS bruteforcing wordlist generator.]]></image:caption><image:title><![CDATA[DNSCewl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsenum-5641.png</image:loc><image:caption><![CDATA[Enumerates DNS information of a domain and to discover non-contiguous ip blocks.]]></image:caption><image:title><![CDATA[dnsenum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsexfiltrator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsexfiltrator-5791.png</image:loc><image:caption><![CDATA[Data exfiltration over DNS request covert channel.]]></image:caption><image:title><![CDATA[DNSExfiltrator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsgen-5613.png</image:loc><image:caption><![CDATA[Generates combination of domain names from the provided input.]]></image:caption><image:title><![CDATA[dnsgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsmorph</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsmorph-2982.jpg</image:loc><image:caption><![CDATA[Domain name permutation engine written in Go.]]></image:caption><image:title><![CDATA[DNSMORPH]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsprobe-6226.png</image:loc><image:caption><![CDATA[Allows you to perform multiple dns queries of your choice with a list of user supplied resolvers.]]></image:caption><image:title><![CDATA[DNSProbe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsreaper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsreaper-4246.png</image:loc><image:caption><![CDATA[Subdomain takeover tool for attackers, bug bounty hunters and the blue team!]]></image:caption><image:title><![CDATA[dnsReaper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsrecon-3536.png</image:loc><image:caption><![CDATA[DNS Enumeration Script.]]></image:caption><image:title><![CDATA[DNSRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnstake</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnstake-9121.png</image:loc><image:caption><![CDATA[A fast tool to check missing hosted DNS zones that can lead to subdomain takeover.]]></image:caption><image:title><![CDATA[DNSTake]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnstracer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnstracer-3738.png</image:loc><image:caption><![CDATA[Trace the path of a DNS query.]]></image:caption><image:title><![CDATA[DNSTracer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnstwist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnstwist-8104.png</image:loc><image:caption><![CDATA[Domain name permutation engine for detecting several types of attacks.]]></image:caption><image:title><![CDATA[dnstwist]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnstwist_</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnstwist_-6952.png</image:loc><image:caption><![CDATA[A tool to monitor for potential spear phishing domains and send to Slack.]]></image:caption><image:title><![CDATA[dnstwist_]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnswalk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnswalk-5655.png</image:loc><image:caption><![CDATA[A DNS database debugger.]]></image:caption><image:title><![CDATA[dnswalk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnswatch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnswatch-5194.png</image:loc><image:caption><![CDATA[DNS traffic sniffer and analyzer.]]></image:caption><image:title><![CDATA[DNSWatch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dnsx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dnsx-9258.png</image:loc><image:caption><![CDATA[Fast and multi-purpose DNS toolkit designed for running DNS queries.]]></image:caption><image:title><![CDATA[dnsX]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/docem</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/docem-8094.png</image:loc><image:caption><![CDATA[Utility to embed XXE and XSS payloads in docx, odt, pptx...]]></image:caption><image:title><![CDATA[docem]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/docker-bench-security</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/docker-bench-security-2804.png</image:loc><image:caption><![CDATA[Check for dozens of common best-practices around deploying Docker containers in production.]]></image:caption><image:title><![CDATA[docker-bench-security]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dom-based-xss-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dom-based-xss-finder-6013.png</image:loc><image:caption><![CDATA[Chrome extension that finds DOM based XSS vulnerabilities.]]></image:caption><image:title><![CDATA[DOM based XSS finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dom-xss-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dom-xss-scanner-2245.jpg</image:loc><image:caption><![CDATA[A tool to scan source code for DOM based XSS vulnerabilities.]]></image:caption><image:title><![CDATA[DOM XSS Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dom-red</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dom-red-4136.png</image:loc><image:caption><![CDATA[Small script to check a list of domains against open redirect vulnerability.]]></image:caption><image:title><![CDATA[dom-red]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domain-analyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domain-analyzer-2369.png</image:loc><image:caption><![CDATA[Analyze the security of any domain by finding all the information possible. Made in python.]]></image:caption><image:title><![CDATA[Domain Analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domain-hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domain-hunter-4254.png</image:loc><image:caption><![CDATA[Checks expired domains to determine good candidates for phishing and C2 domain names.]]></image:caption><image:title><![CDATA[Domain Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domain_hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domain_hunter-4188.png</image:loc><image:caption><![CDATA[Try to find all subdomains, similar-domains and related-domains of an organization.]]></image:caption><image:title><![CDATA[domain_hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domained</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domained-8501.png</image:loc><image:caption><![CDATA[Multi Tool Subdomain Enumeration.]]></image:caption><image:title><![CDATA[domained]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domdig</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domdig-7574.png</image:loc><image:caption><![CDATA[DOM XSS scanner for Single Page Applications.]]></image:caption><image:title><![CDATA[DOMDig]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dome</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dome-7448.png</image:loc><image:caption><![CDATA[Script that makes active and/or passive scan to obtain subdomains and search for open ports.]]></image:caption><image:title><![CDATA[Dome]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domlink</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domlink-8252.jpg</image:loc><image:caption><![CDATA[Link a domain with registered organisation names and emails, to other domains.]]></image:caption><image:title><![CDATA[DomLink]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dompurify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dompurify-1632.png</image:loc><image:caption><![CDATA[A DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG.]]></image:caption><image:title><![CDATA[DOMPurify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dontgo403</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dontgo403-1936.png</image:loc><image:caption><![CDATA[Tool to bypass 40X response codes.]]></image:caption><image:title><![CDATA[dontgo403]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/donut</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/donut-6397.jpg</image:loc><image:caption><![CDATA[Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files.]]></image:caption><image:title><![CDATA[Donut]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dork-search-files</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dork-search-files-6588.png</image:loc><image:caption><![CDATA[Advanced Google searches using dorks to locate specific files on the internet.]]></image:caption><image:title><![CDATA[Dork Search Files]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dorkgpt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dorkgpt-2780.png</image:loc><image:caption><![CDATA[Generate Google dorks with AI.]]></image:caption><image:title><![CDATA[DorkGPT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dorky</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dorky-5862.png</image:loc><image:caption><![CDATA[Quickly do keyword searches over GitLab and GitHub for OSINT & bug bounty recon.]]></image:caption><image:title><![CDATA[dorky]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dot-1539.jpg</image:loc><image:caption><![CDATA[The Deepfake Offensive Toolkit.]]></image:caption><image:title><![CDATA[dot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dotdotpwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dotdotpwn-3853.png</image:loc><image:caption><![CDATA[The Directory Traversal Fuzzer.]]></image:caption><image:title><![CDATA[DotDotPwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dotgit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dotgit-9661.png</image:loc><image:caption><![CDATA[An extension for checking if .git is exposed in visited websites.]]></image:caption><image:title><![CDATA[DotGit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dradis</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dradis-2777.png</image:loc><image:caption><![CDATA[Collaboration and reporting for infosec teams made simple.]]></image:caption><image:title><![CDATA[Dradis]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/drek</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/drek-6095.png</image:loc><image:caption><![CDATA[A static-code-analysis tool for performing security-focused code reviews.]]></image:caption><image:title><![CDATA[drek]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/driftctl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/driftctl-7884.png</image:loc><image:caption><![CDATA[Detect, track and alert on infrastructure drift.]]></image:caption><image:title><![CDATA[driftctl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/driploader</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/driploader-6043.png</image:loc><image:caption><![CDATA[Evasive shellcode loader for bypassing injection detection.]]></image:caption><image:title><![CDATA[DripLoader]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dronesploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dronesploit-2113.png</image:loc><image:caption><![CDATA[Drone pentesting framework console.]]></image:caption><image:title><![CDATA[DroneSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/droopescan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/droopescan-6123.png</image:loc><image:caption><![CDATA[A plugin-based scanner that aids security researchers in identifying issues with several CMSs.]]></image:caption><image:title><![CDATA[droopescan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/drozer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/drozer-1253.png</image:loc><image:caption><![CDATA[The leading security assessment framework for Android.]]></image:caption><image:title><![CDATA[drozer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/drupwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/drupwn-6292.png</image:loc><image:caption><![CDATA[Drupal enumeration & exploitation tool.]]></image:caption><image:title><![CDATA[Drupwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dshell-9489.png</image:loc><image:caption><![CDATA[A network forensic analysis framework.]]></image:caption><image:title><![CDATA[Dshell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dsieve</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dsieve-2576.png</image:loc><image:caption><![CDATA[Filter and enrich a list of subdomains by level.]]></image:caption><image:title><![CDATA[dsieve]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dsniff</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dsniff-6085.png</image:loc><image:caption><![CDATA[Collection of tools for network auditing and penetration testing.]]></image:caption><image:title><![CDATA[dsniff]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dsstoreview</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dsstoreview-4316.png</image:loc><image:caption><![CDATA[DS_Store file parser/viewer.]]></image:caption><image:title><![CDATA[DSStoreView]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dtd-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dtd-finder-3788.png</image:loc><image:caption><![CDATA[List DTDs and generate XXE payloads using those local DTDs.]]></image:caption><image:title><![CDATA[DTD Finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dufflebag</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dufflebag-4110.png</image:loc><image:caption><![CDATA[Search exposed EBS volumes for secrets.]]></image:caption><image:title><![CDATA[dufflebag]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dumpcreds</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dumpcreds-9890.png</image:loc><image:caption><![CDATA[May be used to extract various credentials from running processes.]]></image:caption><image:title><![CDATA[dumpcreds]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dumpert</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dumpert-8777.png</image:loc><image:caption><![CDATA[LSASS memory dumper using direct system calls and API unhooking.]]></image:caption><image:title><![CDATA[Dumpert]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dumpsterdiver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dumpsterdiver-5442.png</image:loc><image:caption><![CDATA[Tool to search secrets in various filetypes.]]></image:caption><image:title><![CDATA[DumpsterDiver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvca</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvca-1222.png</image:loc><image:caption><![CDATA[Damn vulnerable cloud application.]]></image:caption><image:title><![CDATA[DVCA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvcs-ripper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvcs-ripper-8274.png</image:loc><image:caption><![CDATA[Rip web accessible version control systems: svn, git...]]></image:caption><image:title><![CDATA[dvcs-ripper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvenom</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvenom-6470.png</image:loc><image:caption><![CDATA[Helps to bypass antiviruses by providing an encryption wrapper and loader for your shellcode.]]></image:caption><image:title><![CDATA[DVenom]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvrf-6618.png</image:loc><image:caption><![CDATA[The Damn Vulnerable Router Firmware project.]]></image:caption><image:title><![CDATA[DVRF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvwa</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvwa-1266.png</image:loc><image:caption><![CDATA[Damn Vulnerable Web Application.]]></image:caption><image:title><![CDATA[DVWA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/dvws</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/dvws-3398.png</image:loc><image:caption><![CDATA[Vulnerable application with a web service and an API.]]></image:caption><image:title><![CDATA[DVWS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eagle</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eagle-1504.png</image:loc><image:caption><![CDATA[Vulnerability scanner for mass detection of web-based applications vulnerabilities.]]></image:caption><image:title><![CDATA[Eagle]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eagleeye</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eagleeye-7473.png</image:loc><image:caption><![CDATA[Stalk your friends on social media using image recognition and reverse image search.]]></image:caption><image:title><![CDATA[EagleEye]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eaphammer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eaphammer-3667.png</image:loc><image:caption><![CDATA[Targeted attacks against WPA2-Enterprise networks, wireless pivots using hostile portal attacks.]]></image:caption><image:title><![CDATA[EAPHammer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/earlybird</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/earlybird-4773.png</image:loc><image:caption><![CDATA[Sensitive data detection tool capable of scanning source code repositories.]]></image:caption><image:title><![CDATA[EarlyBird]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/edd</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/edd-3429.png</image:loc><image:caption><![CDATA[Ultimate domain enumeration tool.]]></image:caption><image:title><![CDATA[EDD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/egressbuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/egressbuster-4618.png</image:loc><image:caption><![CDATA[Check egress filtering and identify if ports are allowed to automatically spawn a shell.]]></image:caption><image:title><![CDATA[egressbuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eldap-ldap-search-and-filter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eldap-ldap-search-and-filter-3144.png</image:loc><image:caption><![CDATA[A tool that helps users searching and filtering queries in Ldap environment.]]></image:caption><image:title><![CDATA[eLdap-Ldap-Search-and-Filter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/emba</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/emba-2002.png</image:loc><image:caption><![CDATA[The security analyzer for firmware of embedded devices.]]></image:caption><image:title><![CDATA[EMBA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/empire</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/empire-9158.jpeg</image:loc><image:caption><![CDATA[Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.]]></image:caption><image:title><![CDATA[Empire]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/endext</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/endext-9417.png</image:loc><image:caption><![CDATA[A tool for extracting all the possible endpoints from the JS files.]]></image:caption><image:title><![CDATA[endext]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/endoflife.date</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/endoflife.date-6078.png</image:loc><image:caption><![CDATA[Informative site with EoL dates of everything.]]></image:caption><image:title><![CDATA[endoflife.date]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/endpointer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tool-endpointer-9042.png</image:loc><image:caption><![CDATA[An extension that auto extracts URLs from the current webpage and JS files.]]></image:caption><image:title><![CDATA[EndPointer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/enlightn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/enlightn-6768.png</image:loc><image:caption><![CDATA[Your performance & security consultant, an artisan command away.]]></image:caption><image:title><![CDATA[Enlightn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/enum4linux</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/enum4linux-2478.png</image:loc><image:caption><![CDATA[Enumerate data from Windows and Samba hosts.]]></image:caption><image:title><![CDATA[enum4Linux]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/enum4linux-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/enum4linux-ng-1279.png</image:loc><image:caption><![CDATA[A Windows/Samba enumeration tool with additional features like JSON/YAML export.]]></image:caption><image:title><![CDATA[enum4linux-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eos</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eos-6114.png</image:loc><image:caption><![CDATA[Enemies Of Symfony - debug mode Symfony looter.]]></image:caption><image:title><![CDATA[eos]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/espionage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/espionage-8736.png</image:loc><image:caption><![CDATA[Collects informations related to domains whois, history, dns records and more.]]></image:caption><image:title><![CDATA[espionage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ettercap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ettercap-3110.png</image:loc><image:caption><![CDATA[Free and open source network security tool for man-in-the-middle attacks on a LAN.]]></image:caption><image:title><![CDATA[Ettercap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evil-sql-client</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evil-sql-client-9981.png</image:loc><image:caption><![CDATA[Interactive .NET SQL console client with enhanced SQL Server discovery/access/exfiltration features.]]></image:caption><image:title><![CDATA[Evil SQL Client]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evil-ssdp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evil-ssdp-4082.png</image:loc><image:caption><![CDATA[Spoof SSDP replies to phish for credentials and NetNTLM challenge/response.]]></image:caption><image:title><![CDATA[evil SSDP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evil-winrm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evil-winrm-3631.png</image:loc><image:caption><![CDATA[The ultimate WinRM shell for hacking/pentesting.]]></image:caption><image:title><![CDATA[evil-winrm]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evilclippy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evilclippy-9768.png</image:loc><image:caption><![CDATA[Create malicious MS Office documents to hide VBA macros, stomp VBA code.]]></image:caption><image:title><![CDATA[EvilClippy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evilginx3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evilginx3-8535.png</image:loc><image:caption><![CDATA[Standalone MITM attack framework allowing for the bypass of 2-factor authentication.]]></image:caption><image:title><![CDATA[Evilginx3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/evilgophish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/evilgophish-8031.png</image:loc><image:caption><![CDATA[Combination of evilginx3 and GoPhish.]]></image:caption><image:title><![CDATA[evilgophish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/exfilkit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/exfilkit-4184.png</image:loc><image:caption><![CDATA[Data exfiltration utility for testing detection capabilities.]]></image:caption><image:title><![CDATA[exfilkit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/exiftool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/exiftool-5242.png</image:loc><image:caption><![CDATA[ExifTool meta information reader/writer.]]></image:caption><image:title><![CDATA[ExifTool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/exiv2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/exiv2-4574.png</image:loc><image:caption><![CDATA[Image metadata library and tools.]]></image:caption><image:title><![CDATA[exiv2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/exploitalert</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/exploitalert-9998.png</image:loc><image:caption><![CDATA[Exploits found on the INTERNET.]]></image:caption><image:title><![CDATA[Exploitalert]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/extended-ssrf-search</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/extended-ssrf-search-9539.png</image:loc><image:caption><![CDATA[Smart SSRF scanner using different methods like parameter brute forcing in POST and GET.]]></image:caption><image:title><![CDATA[Extended SSRF search]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/extended-xss-searcher-and-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/extended-xss-searcher-and-finder-8940.png</image:loc><image:caption><![CDATA[Scans for different types of XSS on a list of urls.]]></image:caption><image:title><![CDATA[Extended XSS Searcher and Finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/extract-endpoints</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/extract-endpoints-1940.png</image:loc><image:caption><![CDATA[Extract endpoints from source files.]]></image:caption><image:title><![CDATA[extract-endpoints]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eyeballer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eyeballer-9512.png</image:loc><image:caption><![CDATA[Convolutional neural network for analyzing pentest screenshots.]]></image:caption><image:title><![CDATA[Eyeballer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eyespy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eyespy-6811.png</image:loc><image:caption><![CDATA[Designed to enumerate and gain access to IP cameras via RTSP.]]></image:caption><image:title><![CDATA[EyeSpy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/eyewitness</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/eyewitness-4776.png</image:loc><image:caption><![CDATA[Take screenshots of websites, provide server header info and identify default credentials.]]></image:caption><image:title><![CDATA[EyeWitness]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ezxss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ezxss-6519.png</image:loc><image:caption><![CDATA[An easy way for penetration testers and bug bounty hunters to test (blind) XSS.]]></image:caption><image:title><![CDATA[ezXSS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fakeimageexploiter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fakeimageexploiter-4023.png</image:loc><image:caption><![CDATA[Use a Fake image.jpg to exploit targets (hide known file extensions).]]></image:caption><image:title><![CDATA[FakeImageExploiter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/falco</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/falco-2726.png</image:loc><image:caption><![CDATA[Cloud native runtime security.]]></image:caption><image:title><![CDATA[falco]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/faraday-security</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/faraday-security-1516.png</image:loc><image:caption><![CDATA[Open source sulnerability management and orchestration platform.]]></image:caption><image:title><![CDATA[Faraday security]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fastfuzz-chrome-extension</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fastfuzz-chrome-extension-1146.jpeg</image:loc><image:caption><![CDATA[Site fast fuzzing with chorme extension.]]></image:caption><image:title><![CDATA[FastFuzz Chrome Extension]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fastsub</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fastsub-4648.png</image:loc><image:caption><![CDATA[A DNS bruteforcer with multi-threading, and handling of bad resolvers.]]></image:caption><image:title><![CDATA[fastsub]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/favfreak</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/favfreak-1843.png</image:loc><image:caption><![CDATA[Making favicon.ico based recon great again.]]></image:caption><image:title><![CDATA[FavFreak]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/favicon-hashtrick</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/favicon-hashtrick-2077.png</image:loc><image:caption><![CDATA[Python script implementing the favicon hash trick to find subdomains.]]></image:caption><image:title><![CDATA[favicon-hashtrick]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/favirecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/favirecon-3931.png</image:loc><image:caption><![CDATA[Use favicon.ico to improve your target recon phase.]]></image:caption><image:title><![CDATA[favirecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fcrackzip</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fcrackzip-9492.png</image:loc><image:caption><![CDATA[Zip password cracker.]]></image:caption><image:title><![CDATA[fcrackzip]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fdsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fdsploit-6588.png</image:loc><image:caption><![CDATA[File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.]]></image:caption><image:title><![CDATA[FDsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/femida</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/femida-2824.png</image:loc><image:caption><![CDATA[Automated blind-xss search for Burp Suite.]]></image:caption><image:title><![CDATA[Femida]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/feroxbuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/feroxbuster-5187.png</image:loc><image:caption><![CDATA[A fast, simple, recursive content discovery tool written in Rust.]]></image:caption><image:title><![CDATA[Feroxbuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/festin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/festin-1559.png</image:loc><image:caption><![CDATA[The powered S3 bucket finder and content discover.]]></image:caption><image:title><![CDATA[FestIN]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ffuf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ffuf-2986.png</image:loc><image:caption><![CDATA[Fast web fuzzer written in Go.]]></image:caption><image:title><![CDATA[ffuf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ffufpostprocessing</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ffufpostprocessing-3709.png</image:loc><image:caption><![CDATA[Golang tool which helps dropping the irrelevant entries from your ffuf result file.]]></image:caption><image:title><![CDATA[ffufPostprocessing]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fibratus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fibratus-2676.png</image:loc><image:caption><![CDATA[Modern tool for Windows kernel exploration and tracing with a focus on security.]]></image:caption><image:title><![CDATA[fibratus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fiddler-everywhere</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fiddler-everywhere-1560.png</image:loc><image:caption><![CDATA[Web debugging proxy for MacOS, Windows, and Linux.]]></image:caption><image:title><![CDATA[Fiddler Everywhere]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fierce</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fierce-6844.png</image:loc><image:caption><![CDATA[A DNS reconnaissance tool for locating non-contiguous IP space.]]></image:caption><image:title><![CDATA[Fierce]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fiercephish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fiercephish-6608.png</image:loc><image:caption><![CDATA[Full-fledged phishing framework to manage all phishing engagements.]]></image:caption><image:title><![CDATA[FiercePhish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/filebuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/filebuster-1764.png</image:loc><image:caption><![CDATA[An extremely fast and flexible web fuzzer.]]></image:caption><image:title><![CDATA[Filebuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/finalrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/finalrecon-8464.jpg</image:loc><image:caption><![CDATA[All In One Web Recon.]]></image:caption><image:title><![CDATA[FinalRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/findom-xss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/findom-xss-4670.png</image:loc><image:caption><![CDATA[A fast DOM based XSS vulnerability scanner with simplicity.]]></image:caption><image:title><![CDATA[FinDOM-XSS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/findomain</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/findomain-1213.png</image:loc><image:caption><![CDATA[The complete solution for domain recognition.]]></image:caption><image:title><![CDATA[Findomain]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/findsecuritycontacts.com</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/findsecuritycontacts.com-7522.png</image:loc><image:caption><![CDATA[Scans the top 500 sites daily for their security.txt file or DNS records.]]></image:caption><image:title><![CDATA[findsecuritycontacts.com]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/findsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/findsploit-9801.png</image:loc><image:caption><![CDATA[Find exploits in local and online databases instantly.]]></image:caption><image:title><![CDATA[Findsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/finduncommonshares</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/finduncommonshares-5073.png</image:loc><image:caption><![CDATA[Quickly find uncommon shares in vast Windows domains.]]></image:caption><image:title><![CDATA[FindUncommonShares]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fingerprinter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fingerprinter-3307.png</image:loc><image:caption><![CDATA[CMS/LMS/Library etc Versions Fingerprinter.]]></image:caption><image:title><![CDATA[Fingerprinter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fingerprintjs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fingerprintjs-5640.png</image:loc><image:caption><![CDATA[Browser fingerprinting library.]]></image:caption><image:title><![CDATA[fingerprintjs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fingerprintx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fingerprintx-7109.png</image:loc><image:caption><![CDATA[Standalone utility for service discovery on open ports!]]></image:caption><image:title><![CDATA[fingerprintx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/firebase-extractor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/firebase-extractor-4350.png</image:loc><image:caption><![CDATA[A tool written in python for scraping firebase data.]]></image:caption><image:title><![CDATA[Firebase-Extractor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/firebounty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/firebounty-8457.png</image:loc><image:caption><![CDATA[The ultimate Vulnerability Disclosure Policy and Bug Bounty list!]]></image:caption><image:title><![CDATA[FireBounty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/firefly</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/firefly-8590.png</image:loc><image:caption><![CDATA[Black box fuzzer for web applications.]]></image:caption><image:title><![CDATA[Firefly]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fireshodanmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fireshodanmap-6357.png</image:loc><image:caption><![CDATA[Realtime map that integrates Firebase, Google Maps and Shodan.]]></image:caption><image:title><![CDATA[FireShodanMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/flan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/flan-8518.png</image:loc><image:caption><![CDATA[A pretty sweet vulnerability scanner.]]></image:caption><image:title><![CDATA[flan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/floss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/floss-6237.png</image:loc><image:caption><![CDATA[Automatically extract obfuscated strings from malware.]]></image:caption><image:title><![CDATA[Floss]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/flow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/flow-4042.png</image:loc><image:caption><![CDATA[Provides view with filtering capabilities for all requests from all Burp Suite tools.]]></image:caption><image:title><![CDATA[Flow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/flowmate</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/flowmate-1144.png</image:loc><image:caption><![CDATA[A Burp Suite extension that brings taint analysis to web applications, by tracking all parameters.]]></image:caption><image:title><![CDATA[FlowMate]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fluxion</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fluxion-1365.jpeg</image:loc><image:caption><![CDATA[Fluxion is the future of MITM WPA attacks.]]></image:caption><image:title><![CDATA[Fluxion]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/foca</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/foca-3155.png</image:loc><image:caption><![CDATA[Tool to find metadata and hidden information in the documents.]]></image:caption><image:title><![CDATA[FOCA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fprobe-1943.png</image:loc><image:caption><![CDATA[Take a list of domains/subdomains and probe for working http/https server.]]></image:caption><image:title><![CDATA[fprobe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/freddy-deserialization-bug-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/freddy-deserialization-bug-finder-7020.png</image:loc><image:caption><![CDATA[A Burp Suite extension to aid in detecting and exploiting serialisation libraries/APIs.]]></image:caption><image:title><![CDATA[Freddy Deserialization Bug Finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/free-certifications</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/free-certifications-1337.png</image:loc><image:caption><![CDATA[A curated list of free courses & certifications.]]></image:caption><image:title><![CDATA[Free Certifications]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/freeze-rs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/freeze-rs-4698.png</image:loc><image:caption><![CDATA[Payload toolkit for bypassing EDRs using suspended processes, direct syscalls written.]]></image:caption><image:title><![CDATA[Freeze-rs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fresh-resolvers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fresh-resolvers-7052.png</image:loc><image:caption><![CDATA[List of fresh DNS resolvers updated every 12h.]]></image:caption><image:title><![CDATA[Fresh Resolvers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/frida</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/frida-6894.png</image:loc><image:caption><![CDATA[Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers.]]></image:caption><image:title><![CDATA[Frida]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fridaandroidtracer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fridaandroidtracer-4206.png</image:loc><image:caption><![CDATA[Android application tracer powered by Frida.]]></image:caption><image:title><![CDATA[FridaAndroidTracer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fruitywifi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fruitywifi-9072.png</image:loc><image:caption><![CDATA[Wireless network auditing tool.]]></image:caption><image:title><![CDATA[FruityWifi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fscan-7560.png</image:loc><image:caption><![CDATA[Kscan is an asset mapping tool.]]></image:caption><image:title><![CDATA[fscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuxploider</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuxploider-1204.png</image:loc><image:caption><![CDATA[File upload vulnerability scanner and exploitation tool.]]></image:caption><image:title><![CDATA[fuxploider]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuzzagotchi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuzzagotchi-7574.png</image:loc><image:caption><![CDATA[A fuzzing tool written in Go. It helps your pentesting journey.]]></image:caption><image:title><![CDATA[fuzzagotchi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuzzapi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuzzapi-1725.png</image:loc><image:caption><![CDATA[Used for REST API pentesting and provide UI solution for gem.]]></image:caption><image:title><![CDATA[Fuzzapi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuzzdb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuzzdb-7141.png</image:loc><image:caption><![CDATA[Attack patterns and primitives for black-box application fault injection and resource discovery.]]></image:caption><image:title><![CDATA[FuzzDB]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuzzilli</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuzzilli-5908.png</image:loc><image:caption><![CDATA[A JavaScript Engine Fuzzer.]]></image:caption><image:title><![CDATA[Fuzzilli]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/fuzzuli</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/fuzzuli-8742.png</image:loc><image:caption><![CDATA[Find critical backup files by creating a dynamic wordlist based on the domain.]]></image:caption><image:title><![CDATA[fuzzuli]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gadgetprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gadgetprobe-7538.png</image:loc><image:caption><![CDATA[Probe endpoints consuming Java serialized objects for fingerprinting.]]></image:caption><image:title><![CDATA[GadgetProbe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gap-1827.png</image:loc><image:caption><![CDATA[A Burp Suite extension to find potential endpoints and parameters.]]></image:caption><image:title><![CDATA[GAP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gatekeeper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gatekeeper-6888.png</image:loc><image:caption><![CDATA[Policy controller for Kubernetes.]]></image:caption><image:title><![CDATA[Gatekeeper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gateway-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gateway-finder-1961.png</image:loc><image:caption><![CDATA[Identify routers on the local LAN and paths to the Internet.]]></image:caption><image:title><![CDATA[gateway-finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gateway-finder-imp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gateway-finder-imp-2471.png</image:loc><image:caption><![CDATA[Identify routers on the local LAN and paths to the Internet.]]></image:caption><image:title><![CDATA[gateway-finder-imp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gathercontacts</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gathercontacts-6168.png</image:loc><image:caption><![CDATA[Burp Suite extension to pull employee names from Google and Bing LinkedIn search results.]]></image:caption><image:title><![CDATA[GatherContacts]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gau</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gau-3760.png</image:loc><image:caption><![CDATA[Fetch known URLs from several sources.]]></image:caption><image:title><![CDATA[gau]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gaussrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gaussrf-5037.png</image:loc><image:caption><![CDATA[Fetch known URLs from several sources and Filter Urls With OpenRedirection or SSRF Parameters.]]></image:caption><image:title><![CDATA[gaussrf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gcp_scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gcp_scanner-7075.png</image:loc><image:caption><![CDATA[A comprehensive scanner for Google Cloud.]]></image:caption><image:title><![CDATA[gcp_scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gcpbucketbrute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gcpbucketbrute-7076.png</image:loc><image:caption><![CDATA[Enumerate Google Storage buckets, check the access and if they can be privilege escalated.]]></image:caption><image:title><![CDATA[GCPBucketBrute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gd-thief</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gd-thief-3768.png</image:loc><image:caption><![CDATA[Exfiltrate files from a target's Google Drive that you have access to, via Google's API.]]></image:caption><image:title><![CDATA[GD-Thief]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gef</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gef-6807.png</image:loc><image:caption><![CDATA[A modern experience for GDB with advanced debugging capabilities.]]></image:caption><image:title><![CDATA[gef]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/genzai</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/genzai-4462.png</image:loc><image:caption><![CDATA[Helps to identify IoT related dashboards and scan them for default passwords.]]></image:caption><image:title><![CDATA[Genzai]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/geowordlists</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/geowordlists-3648.png</image:loc><image:caption><![CDATA[Generate wordlists of passwords containing cities at a defined distance around the client city.]]></image:caption><image:title><![CDATA[GeoWordlists]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/get-acq</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/get-acq-2989.png</image:loc><image:caption><![CDATA[Gather all companies acquired by a given company domain name.]]></image:caption><image:title><![CDATA[GET-ACQ]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/getjs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/getjs-5300.png</image:loc><image:caption><![CDATA[A tool to fastly get all javascript sources/files.]]></image:caption><image:title><![CDATA[getJS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/getsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/getsploit-3156.png</image:loc><image:caption><![CDATA[Command line utility for searching and downloading exploits.]]></image:caption><image:title><![CDATA[getsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gf-5706.png</image:loc><image:caption><![CDATA[A wrapper around grep to avoid typing common patterns.]]></image:caption><image:title><![CDATA[gf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ggshield</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ggshield-9577.jpeg</image:loc><image:caption><![CDATA[Find multiple types of hardcoded secrets & types of infrastructure-as-code misconfigurations.]]></image:caption><image:title><![CDATA[ggshield]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ghauri</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ghauri-5743.png</image:loc><image:caption><![CDATA[Automates the process of detecting and exploiting SQL injection security flaws.]]></image:caption><image:title><![CDATA[Ghauri]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ghidra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ghidra-7231.png</image:loc><image:caption><![CDATA[Software reverse engineering (SRE) framework.]]></image:caption><image:title><![CDATA[ghidra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ghostbuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ghostbuster-6417.png</image:loc><image:caption><![CDATA[Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.]]></image:caption><image:title><![CDATA[Ghostbuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ghosttrack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ghosttrack-3704.png</image:loc><image:caption><![CDATA[Useful tool to track location or mobile number.]]></image:caption><image:title><![CDATA[GhostTrack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ghunt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ghunt-8430.png</image:loc><image:caption><![CDATA[Offensive Google framework.]]></image:caption><image:title><![CDATA[GHunt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/git-all-secrets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/git-all-secrets-9959.png</image:loc><image:caption><![CDATA[Capture all the git secrets by leveraging multiple open source git searching tools.]]></image:caption><image:title><![CDATA[git-all-secrets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/git-dumper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/git-dumper-3327.png</image:loc><image:caption><![CDATA[A tool to dump a git repository from a website.]]></image:caption><image:title><![CDATA[git-dumper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/git-secrets</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/git-secrets-5802.png</image:loc><image:caption><![CDATA[Prevents you from committing secrets and credentials into git repositories.]]></image:caption><image:title><![CDATA[git-secrets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/git-vuln-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/git-vuln-finder-1050.png</image:loc><image:caption><![CDATA[Find potential software vulnerabilities from git commit messages.]]></image:caption><image:title><![CDATA[git-vuln-finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/git-wild-hunt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/git-wild-hunt-3563.jpeg</image:loc><image:caption><![CDATA[A tool to hunt for credentials in GitHub wild AKA git*hunt.]]></image:caption><image:title><![CDATA[git-wild-hunt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitfive</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitfive-4301.png</image:loc><image:caption><![CDATA[An OSINT tool to investigate GitHub profiles.]]></image:caption><image:title><![CDATA[GitFive]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitgot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitgot-7800.png</image:loc><image:caption><![CDATA[Rapidly search through troves of public data on GitHub for sensitive secrets.]]></image:caption><image:title><![CDATA[GitGot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitgraber</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitgraber-2511.png</image:loc><image:caption><![CDATA[Monitor GitHub to search and find sensitive data in real time.]]></image:caption><image:title><![CDATA[gitGraber]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/githacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/githacker-3829.jpg</image:loc><image:caption><![CDATA[A Git source leak exploit tool that restores the entire Git repository, including data from stash.]]></image:caption><image:title><![CDATA[GitHacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/githarvester</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/githarvester-3857.png</image:loc><image:caption><![CDATA[Tool used for harvesting information from GitHub.]]></image:caption><image:title><![CDATA[GitHarvester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/github-endpoints</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/github-endpoints-2455.png</image:loc><image:caption><![CDATA[Find endpoints on GitHub.]]></image:caption><image:title><![CDATA[github-endpoints]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/github-regexp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/github-regexp-5175.png</image:loc><image:caption><![CDATA[Basically a regexp over a GitHub search.]]></image:caption><image:title><![CDATA[github-regexp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/github-subdomains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/github-subdomains-7267.png</image:loc><image:caption><![CDATA[Find subdomains on GitHub.]]></image:caption><image:title><![CDATA[github-subdomains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/githunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/githunter-5124.png</image:loc><image:caption><![CDATA[A tool for searching a Git repository for interesting content.]]></image:caption><image:title><![CDATA[GitHunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitjacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitjacker-7716.jpg</image:loc><image:caption><![CDATA[Leak git repositories from misconfigured websites.]]></image:caption><image:title><![CDATA[gitjacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitlab-subdomains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitlab-subdomains-6221.png</image:loc><image:caption><![CDATA[Find subdomains on GitLab.]]></image:caption><image:title><![CDATA[gitlab-subdomains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitleaks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitleaks-9208.png</image:loc><image:caption><![CDATA[Protect and discover secrets using Gitleaks.]]></image:caption><image:title><![CDATA[gitleaks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitminer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitminer-3816.png</image:loc><image:caption><![CDATA[Tool for advanced mining for content on Github.]]></image:caption><image:title><![CDATA[GitMiner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitpillage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitpillage-3564.png</image:loc><image:caption><![CDATA[Extract data from a .git directory.]]></image:caption><image:title><![CDATA[gitpillage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitrob</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitrob-4612.png</image:loc><image:caption><![CDATA[Reconnaissance tool for GitHub organizations.]]></image:caption><image:title><![CDATA[Gitrob]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gitscraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gitscraper-7999.png</image:loc><image:caption><![CDATA[Scrapes public GitHub repositories for common naming conventions in variables, folders and files.]]></image:caption><image:title><![CDATA[gitscraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gittools</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gittools-4214.png</image:loc><image:caption><![CDATA[A repository with 3 tools for pwn'ing websites with .git repositories available.]]></image:caption><image:title><![CDATA[GitTools]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gittyleaks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gittyleaks-2981.png</image:loc><image:caption><![CDATA[Find sensitive information for a git repo.]]></image:caption><image:title><![CDATA[gittyleaks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/go-dork</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/go-dork-8166.png</image:loc><image:caption><![CDATA[The fastest dork scanner written in Go.]]></image:caption><image:title><![CDATA[go-dork]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/go-secdump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/go-secdump-6402.png</image:loc><image:caption><![CDATA[Tool to remotely dump secrets from the Windows registry.]]></image:caption><image:title><![CDATA[go-secdump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/go-stare</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/go-stare-7953.png</image:loc><image:caption><![CDATA[A fast & light web screenshot without headless browser but Chrome DevTools protocol.]]></image:caption><image:title><![CDATA[go-stare]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/go365</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/go365-5581.png</image:loc><image:caption><![CDATA[Go365 performs user enumeration and password guessing attacks on organizations that use Office365.]]></image:caption><image:title><![CDATA[Go365]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/goad</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/goad-1980.png</image:loc><image:caption><![CDATA[Game of Active Directory.]]></image:caption><image:title><![CDATA[GOAD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/goaltdns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/goaltdns-4163.png</image:loc><image:caption><![CDATA[A permutation generation tool written in golang.]]></image:caption><image:title><![CDATA[GoAltdns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gobuster,endpoints</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gobuster,endpoints-1372.png</image:loc><image:caption><![CDATA[Directory/File, DNS and VHost busting tool written in Go.]]></image:caption><image:title><![CDATA[Gobuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/goby</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/goby-5182.png</image:loc><image:caption><![CDATA[Network security technology that achieves rapid security emergency.]]></image:caption><image:title><![CDATA[Goby]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gocloud</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gocloud-8137.png</image:loc><image:caption><![CDATA[Checks whether a domain is hosted on a cloud service.]]></image:caption><image:title><![CDATA[GoCloud]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/godap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/godap-4751.png</image:loc><image:caption><![CDATA[A complete TUI for LDAP.]]></image:caption><image:title><![CDATA[godap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/godpotato</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/godpotato-8074.png</image:loc><image:caption><![CDATA[Privilege escalation tool for Windows.]]></image:caption><image:title><![CDATA[GodPotato]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/golinkfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/golinkfinder-6364.png</image:loc><image:caption><![CDATA[A fast and minimal JS endpoint extractor.]]></image:caption><image:title><![CDATA[GoLinkFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/google-recaptcha-solver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/google-recaptcha-solver-8864.jpg</image:loc><image:caption><![CDATA[Solve Google reCAPTCHA in less than 5 seconds!]]></image:caption><image:title><![CDATA[Google Recaptcha Solver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/google-authenticator-exporter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/google-authenticator-exporter-2283.png</image:loc><image:caption><![CDATA[Get the TOTP secrets exported by Google Authenticator.]]></image:caption><image:title><![CDATA[google-authenticator-exporter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gopherus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gopherus-9687.png</image:loc><image:caption><![CDATA[Generates gopher link for exploiting SSRF and gaining RCE in various servers.]]></image:caption><image:title><![CDATA[Gopherus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gophish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gophish-7691.png</image:loc><image:caption><![CDATA[Open-source phishing toolkit.]]></image:caption><image:title><![CDATA[GoPhish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/goreplay</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/goreplay-9465.png</image:loc><image:caption><![CDATA[Capture and replay live HTTP traffic in order to continuously test your system with real data.]]></image:caption><image:title><![CDATA[goreplay]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gorgo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gorgo-4468.png</image:loc><image:caption><![CDATA[The vertasile multi-threaded password sprayer built on the shoulders of giants.]]></image:caption><image:title><![CDATA[gorgo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gorsair</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gorsair-4267.jpg</image:loc><image:caption><![CDATA[Gives root access on remote docker containers that expose their APIs.]]></image:caption><image:title><![CDATA[Gorsair]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gospider</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gospider-4056.png</image:loc><image:caption><![CDATA[Fast web spider written in Go.]]></image:caption><image:title><![CDATA[gospider]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gotator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gotator-9478.png</image:loc><image:caption><![CDATA[Generates DNS wordlists through permutations.]]></image:caption><image:title><![CDATA[gotator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gowhois</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gowhois-9525.png</image:loc><image:caption><![CDATA[Whois command implemented by golang with awesome whois servers list.]]></image:caption><image:title><![CDATA[Gowhois]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gowitness</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gowitness-5531.png</image:loc><image:caption><![CDATA[A golang, web screenshot utility using Chrome Headless.]]></image:caption><image:title><![CDATA[gowitness]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gpt_vuln-analyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gpt_vuln-analyzer-1620.png</image:loc><image:caption><![CDATA[A powerful network scanner, DNS recon, subdomain enumeration and IP Geolocator tool powered by GPT.]]></image:caption><image:title><![CDATA[GPT_Vuln-Analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grafana-ssrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grafana-ssrf-2218.png</image:loc><image:caption><![CDATA[Authenticated SSRF in Grafana.]]></image:caption><image:title><![CDATA[grafana-ssrf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graftcp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graftcp-7590.png</image:loc><image:caption><![CDATA[A flexible tool for redirecting a given program's TCP traffic to SOCKS5 or HTTP proxy.]]></image:caption><image:title><![CDATA[graftcp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphicator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphicator-1426.png</image:loc><image:caption><![CDATA[Enumerate and extract GraphQL APIs.]]></image:caption><image:title><![CDATA[Graphicator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphpython</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphpython-3717.png</image:loc><image:caption><![CDATA[Modular cross-platform Microsoft Graph API enumeration and exploitation toolkit.]]></image:caption><image:title><![CDATA[Graphpython]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-beautifier</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-beautifier-5573.png</image:loc><image:caption><![CDATA[Burp Suite extension to help make Graphql request more readable.]]></image:caption><image:title><![CDATA[GraphQL Beautifier]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-threat-matrix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-threat-matrix-8966.png</image:loc><image:caption><![CDATA[Threat framework to research security gaps in GraphQL implementations.]]></image:caption><image:title><![CDATA[GraphQL Threat Matrix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-armor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-armor-1643.png</image:loc><image:caption><![CDATA[The missing GraphQL security security layer.]]></image:caption><image:title><![CDATA[graphql-armor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-introspection-analyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-introspection-analyzer-1321.png</image:loc><image:caption><![CDATA[Graphql introspection query analyzer.]]></image:caption><image:title><![CDATA[graphql-introspection-analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-path-enum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-path-enum-7717.png</image:loc><image:caption><![CDATA[Lists the different ways of reaching a given type in a GraphQL schema.]]></image:caption><image:title><![CDATA[graphql-path-enum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphql-voyager</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphql-voyager-1993.png</image:loc><image:caption><![CDATA[Represent any GraphQL API as an interactive graph.]]></image:caption><image:title><![CDATA[graphql-voyager]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphqlmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphqlmap-1323.png</image:loc><image:caption><![CDATA[Scripting engine to interact with a graphql endpoint for pentesting purposes.]]></image:caption><image:title><![CDATA[GraphQLmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/graphw00f</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/graphw00f-7293.png</image:loc><image:caption><![CDATA[GraphQL Server Engine Fingerprinting utility for software security professionals.]]></image:caption><image:title><![CDATA[graphw00f]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grayhatwarfare</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grayhatwarfare-4182.png</image:loc><image:caption><![CDATA[Search for buckets and URL shorteners.]]></image:caption><image:title><![CDATA[GrayhatWarfare]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grecon-1015.png</image:loc><image:caption><![CDATA[Run a Google based passive recon against your scope.]]></image:caption><image:title><![CDATA[GRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grendel-scan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grendel-scan-3269.png</image:loc><image:caption><![CDATA[A tool for automated security scanning of web applications.]]></image:caption><image:title><![CDATA[Grendel-Scan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grep.app</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grep.app-2383.png</image:loc><image:caption><![CDATA[Searches code from over a half million public repositories on GitHub.]]></image:caption><image:title><![CDATA[grep.app]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ground-control</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ground-control-6781.png</image:loc><image:caption><![CDATA[A collection of scripts mainly for debugging SSRF, blind XSS, and XXE vulnerabilities.]]></image:caption><image:title><![CDATA[Ground control]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/grr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/grr-8155.png</image:loc><image:caption><![CDATA[An incident response framework focused on remote live forensics.]]></image:caption><image:title><![CDATA[grr]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gsan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gsan-3663.png</image:loc><image:caption><![CDATA[Extract subdomains from SSL certificates in HTTPS sites.]]></image:caption><image:title><![CDATA[GSAN]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gsec-2774.png</image:loc><image:caption><![CDATA[Web security scanner.]]></image:caption><image:title><![CDATA[Gsec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gsil</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gsil-7627.png</image:loc><image:caption><![CDATA[GitHub Sensitive Information Leakage.]]></image:caption><image:title><![CDATA[GSIL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gtfoargs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gtfoargs-3978.png</image:loc><image:caption><![CDATA[Unix binaries that can be manipulated for argument injection.]]></image:caption><image:title><![CDATA[GTFOArgs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gtfobins.github.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gtfobins.github.io-2726.png</image:loc><image:caption><![CDATA[Unix binaries that can be used to bypass local security restrictions in misconfigured systems.]]></image:caption><image:title><![CDATA[GTFOBins]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gtfonow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gtfonow-1697.png</image:loc><image:caption><![CDATA[Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.]]></image:caption><image:title><![CDATA[GTFONow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gwdomains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gwdomains-5973.png</image:loc><image:caption><![CDATA[Sub domain wild card filtering tool.]]></image:caption><image:title><![CDATA[gwdomains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/gyoithon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/gyoithon-7833.png</image:loc><image:caption><![CDATA[Growing penetration test tool using Machine Learning.]]></image:caption><image:title><![CDATA[GyoiThon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/h1-report-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/h1-report-finder-5563.png</image:loc><image:caption><![CDATA[A burpsuite extension to find security reports published on HackerOne based on the selected host.]]></image:caption><image:title><![CDATA[H1 Report Finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/h1-search</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/h1-search-9041.png</image:loc><image:caption><![CDATA[Request the public disclosures on a specific HackerOne program.]]></image:caption><image:title><![CDATA[h1-search]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/h2csmuggler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/h2csmuggler-1291.png</image:loc><image:caption><![CDATA[HTTP Request Smuggling over HTTP/2 Cleartext.]]></image:caption><image:title><![CDATA[h2cSmuggler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/h8mail</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/h8mail-5585.png</image:loc><image:caption><![CDATA[Powerful and user-friendly password hunting tool.]]></image:caption><image:title><![CDATA[h8mail]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hack-the-box</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hack-the-box-4800.png</image:loc><image:caption><![CDATA[Massive hacking playground, and infosec community.]]></image:caption><image:title><![CDATA[Hack The Box]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackability</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackability-4257.png</image:loc><image:caption><![CDATA[Probe a rendering engine for vulnerabilities and other features.]]></image:caption><image:title><![CDATA[Hackability]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackbrowserdata</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackbrowserdata-2333.png</image:loc><image:caption><![CDATA[Decrypt passwords/cookies/history/bookmarks from the browser.]]></image:caption><image:title><![CDATA[HackBrowserData]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hacker101</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hacker101-4099.png</image:loc><image:caption><![CDATA[A free class for web security.]]></image:caption><image:title><![CDATA[Hacker101]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackersploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackersploit-8533.png</image:loc><image:caption><![CDATA[HackerSploit YouTube channel.]]></image:caption><image:title><![CDATA[HackerSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackinghub</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackinghub-2082.png</image:loc><image:caption><![CDATA[Join the front line of the internet, learn applicable cyber security skills.]]></image:caption><image:title><![CDATA[HackingHub]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackingtool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackingtool-7468.png</image:loc><image:caption><![CDATA[ALL IN ONE Hacking Tool For Hackers.]]></image:caption><image:title><![CDATA[Hackingtool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hacktools</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hacktools-5315.png</image:loc><image:caption><![CDATA[The all-in-one browser extension for offensive security professionals.]]></image:caption><image:title><![CDATA[HackTools]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hacktricks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hacktricks-9796.png</image:loc><image:caption><![CDATA[Find trick/technique/whatever learnt from CTFs, real life apps, reading researches, and news.]]></image:caption><image:title><![CDATA[HackTricks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hackvertor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hackvertor-1042.png</image:loc><image:caption><![CDATA[Tag based conversion tool written in Java implemented as a Burp Suite extension.]]></image:caption><image:title><![CDATA[Hackvertor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hades</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hades-4785.png</image:loc><image:caption><![CDATA[Go shellcode loader that combines multiple evasion techniques.]]></image:caption><image:title><![CDATA[Hades]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/haiti</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/haiti-4328.png</image:loc><image:caption><![CDATA[Hash type identifier.]]></image:caption><image:title><![CDATA[HAITI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hakfindinternaldomains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hakfindinternaldomains-8655.png</image:loc><image:caption><![CDATA[Feed it a list of subdomains, it will resolve them and tell you which ones are internal.]]></image:caption><image:title><![CDATA[hakfindinternaldomains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hakip2host</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hakip2host-4614.png</image:loc><image:caption><![CDATA[Takes a list of IP addresses then does a series of checks to return associated domain names.]]></image:caption><image:title><![CDATA[hakip2host]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/haklistgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/haklistgen-1904.png</image:loc><image:caption><![CDATA[Turns any junk text into a usable wordlist for brute-forcing.]]></image:caption><image:title><![CDATA[haklistgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hakoriginfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hakoriginfinder-2675.png</image:loc><image:caption><![CDATA[Discover the origin host behind a reverse proxy, useful for bypassing cloud WAFs!.]]></image:caption><image:title><![CDATA[hakoriginfinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hakrawler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hakrawler-7650.png</image:loc><image:caption><![CDATA[Simple, fast web crawler designed for discovery of endpoints and assets within a web application.]]></image:caption><image:title><![CDATA[hakrawler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hakrevdns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hakrevdns-2833.png</image:loc><image:caption><![CDATA[Small, fast tool for performing reverse DNS lookups en masse.]]></image:caption><image:title><![CDATA[hakrevdns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/haktldextract</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/haktldextract-8286.png</image:loc><image:caption><![CDATA[Extract domains/subdomains from URLs en masse.]]></image:caption><image:title><![CDATA[haktldextract]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/haktrails</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/haktrails-3047.png</image:loc><image:caption><![CDATA[Golang client for querying SecurityTrails API data.]]></image:caption><image:title><![CDATA[haktrails]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hamburglar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hamburglar-4121.png</image:loc><image:caption><![CDATA[Collect useful information from urls, directories, and files.]]></image:caption><image:title><![CDATA[Hamburglar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hardcidr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hardcidr-3744.png</image:loc><image:caption><![CDATA[Discover the netblocks or ranges (in CIDR notation) owned by the target organization.]]></image:caption><image:title><![CDATA[hardCIDR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hardeningkitty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hardeningkitty-5768.png</image:loc><image:caption><![CDATA[Checks and hardens your Windows configuration.]]></image:caption><image:title><![CDATA[HardeningKitty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hardhat-c2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hardhat-c2-5629.png</image:loc><image:caption><![CDATA[A cross-platform, collaborative, Command & Control framework.]]></image:caption><image:title><![CDATA[HardHat C2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/harpoon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/harpoon-8955.png</image:loc><image:caption><![CDATA[CLI tool for open source and threat intelligence.]]></image:caption><image:title><![CDATA[harpoon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/harpwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/harpwn-6866.png</image:loc><image:caption><![CDATA[Designed to streamline the extraction and sanitization of HARTokens from HTTP archives.]]></image:caption><image:title><![CDATA[HARpwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hash-buster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hash-buster-2285.png</image:loc><image:caption><![CDATA[Crack hashes in seconds.]]></image:caption><image:title><![CDATA[Hash Buster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hash-muncher</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hash-muncher-5854.png</image:loc><image:caption><![CDATA[Grab NetNTLMv2 hashes using ETW with administrative rights on Windows.]]></image:caption><image:title><![CDATA[Hash Muncher]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hashcat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hashcat-6420.png</image:loc><image:caption><![CDATA[World's fastest and most advanced password recovery utility]]></image:caption><image:title><![CDATA[Hashcat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hasmysecretleaked</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hasmysecretleaked-2028.png</image:loc><image:caption><![CDATA[Search across 20 million exposed secrets in public GitHub repositories, gists, issues and comments.]]></image:caption><image:title><![CDATA[HasMySecretLeaked]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hauditor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hauditor-1419.png</image:loc><image:caption><![CDATA[Analyze the security headers returned by a web page and report dangerous configurations.]]></image:caption><image:title><![CDATA[hauditor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/have-i-been-pwned</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/have-i-been-pwned-4120.png</image:loc><image:caption><![CDATA[Check if your email or phone is in a data breach.]]></image:caption><image:title><![CDATA[Have i been pwned?]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/havoc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/havoc-5671.jpg</image:loc><image:caption><![CDATA[Modern and malleable post-exploitation command and control framework.]]></image:caption><image:title><![CDATA[Havoc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hawk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hawk-8870.png</image:loc><image:caption><![CDATA[Network, recon and offensive-security tool for Linux.]]></image:caption><image:title><![CDATA[Hawk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hawkeye</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hawkeye-9512.png</image:loc><image:caption><![CDATA[Filesystem analysis tool/directory looking for interesting stuff.]]></image:caption><image:title><![CDATA[Hawkeye]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/haylxon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/haylxon-1540.png</image:loc><image:caption><![CDATA[Blazing-fast tool to grab screenshots of your domain list right from terminal.]]></image:caption><image:title><![CDATA[Haylxon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hbsqli</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hbsqli-1445.png</image:loc><image:caption><![CDATA[Automated tool for testing header based blind SQL injection.]]></image:caption><image:title><![CDATA[HBSQLI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hcxdumptool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hcxdumptool-8452.png</image:loc><image:caption><![CDATA[Small tool to capture packets from wlan devices.]]></image:caption><image:title><![CDATA[hcxdumptool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/headi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/headi-5234.png</image:loc><image:caption><![CDATA[Customisable and automated HTTP header injection.]]></image:caption><image:title><![CDATA[headi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/headless-burp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/headless-burp-4334.png</image:loc><image:caption><![CDATA[Provides a suite of extensions and a maven plugin to automate security tests using Burp Suite.]]></image:caption><image:title><![CDATA[Headless Burp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hekatomb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hekatomb-5777.png</image:loc><image:caption><![CDATA[Connects to LDAP directory to retrieve all computers and users informations.]]></image:caption><image:title><![CDATA[HEKATOMB]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hetty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hetty-1397.png</image:loc><image:caption><![CDATA[An HTTP toolkit for security research.]]></image:caption><image:title><![CDATA[hetty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/highlighter-and-extractor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/highlighter-and-extractor-1355.png</image:loc><image:caption><![CDATA[Collect, categorize and highlight requests and/or responses according to their content.]]></image:caption><image:title><![CDATA[Highlighter and Extractor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hijacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hijacker-2329.png</image:loc><image:caption><![CDATA[GUI for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver.]]></image:caption><image:title><![CDATA[Hijacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hoaxshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hoaxshell-5819.png</image:loc><image:caption><![CDATA[Windows reverse shell payload generator and handler that abuses the http(s) protocol.]]></image:caption><image:title><![CDATA[hoaxshell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/holehe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/holehe-7979.png</image:loc><image:caption><![CDATA[Check if the mail is used on different sites and retrieve informations on sites.]]></image:caption><image:title><![CDATA[holehe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hollows_hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hollows_hunter-6948.png</image:loc><image:caption><![CDATA[Scans processes to detect and dump potentially malicious implants.]]></image:caption><image:title><![CDATA[Hollows Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/honggfuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/honggfuzz-9977.png</image:loc><image:caption><![CDATA[A security oriented software fuzzer.]]></image:caption><image:title><![CDATA[honggfuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hostilesubbruteforcer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hostilesubbruteforcer-7353.png</image:loc><image:caption><![CDATA[Bruteforce existing subdomains and provide informations about them.]]></image:caption><image:title><![CDATA[HostileSubBruteforcer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/house</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/house-5762.jpg</image:loc><image:caption><![CDATA[A runtime mobile application analysis toolkit with a Web GUI.]]></image:caption><image:title><![CDATA[House]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hping</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hping-7350.png</image:loc><image:caption><![CDATA[Network tool able to send custom TCP/IP packets.]]></image:caption><image:title><![CDATA[hping]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hrekt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hrekt-1429.png</image:loc><image:caption><![CDATA[A really fast HTTP prober.]]></image:caption><image:title><![CDATA[hrekt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/htshells</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/htshells-4262.png</image:loc><image:caption><![CDATA[Self contained web shells and other attacks via .htaccess files.]]></image:caption><image:title><![CDATA[HTSHELLS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/http-request-smuggler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/http-request-smuggler-4255.png</image:loc><image:caption><![CDATA[Extension for Burp Suite designed to help you launch HTTP Request Smuggling attacks.]]></image:caption><image:title><![CDATA[HTTP Request Smuggler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/http-request-smuggling</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/http-request-smuggling-5333.png</image:loc><image:caption><![CDATA[HTTP Request Smuggling Detection Tool.]]></image:caption><image:title><![CDATA[http-request-smuggling]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/http-revshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/http-revshell-2980.png</image:loc><image:caption><![CDATA[Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware.]]></image:caption><image:title><![CDATA[HTTP-revshell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/http-traceroute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/http-traceroute-7333.png</image:loc><image:caption><![CDATA[HTTP-traceroute in Go.]]></image:caption><image:title><![CDATA[HTTP-traceroute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/httpoxy-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/httpoxy-scanner-3237.png</image:loc><image:caption><![CDATA[A Burp Suite extension that checks for the HTTPoxy vulnerability.]]></image:caption><image:title><![CDATA[HTTPoxy Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/httprebind</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/httprebind-2234.png</image:loc><image:caption><![CDATA[Automatic tool for DNS rebinding-based SSRF attacks.]]></image:caption><image:title><![CDATA[httprebind]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/httprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/httprobe-6900.png</image:loc><image:caption><![CDATA[Take a list of domains and probe for working HTTP and HTTPS servers.]]></image:caption><image:title><![CDATA[httprobe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/httpscreenshot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/httpscreenshot-7434.png</image:loc><image:caption><![CDATA[Grabs screenshots and HTML of large numbers of websites.]]></image:caption><image:title><![CDATA[httpscreenshot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/httpx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/httpx-1097.png</image:loc><image:caption><![CDATA[HTTP toolkit that allows running multiple probes using the retryablehttp library.]]></image:caption><image:title><![CDATA[httpx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hunter.how</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hunter.how-9821.png</image:loc><image:caption><![CDATA[Internet search engines for security researchers.]]></image:caption><image:title><![CDATA[hunter.how]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/hydra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/hydra-1633.png</image:loc><image:caption><![CDATA[Very fast password cracking tool.]]></image:caption><image:title><![CDATA[Hydra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/iamagic</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/iamagic-3619.png</image:loc><image:caption><![CDATA[Advanced AWS access credentials scanner.]]></image:caption><image:title><![CDATA[IAMagic]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/icmpdoor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/icmpdoor-5844.png</image:loc><image:caption><![CDATA[An ICMP reverse shell written in Python3 and scapy.]]></image:caption><image:title><![CDATA[icmpdoor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/idontspeakssl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/idontspeakssl-7400.png</image:loc><image:caption><![CDATA[Simple tool to scan large scope and provide SSL/TLS vulnerabilities.]]></image:caption><image:title><![CDATA[IDontSpeakSSL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ike-scan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ike-scan-5501.png</image:loc><image:caption><![CDATA[Discover and fingerprint IKE hosts.]]></image:caption><image:title><![CDATA[ike-scan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ikeforce</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ikeforce-7759.png</image:loc><image:caption><![CDATA[Command line IPSEC VPN brute forcing tool for Linux.]]></image:caption><image:title><![CDATA[ikeforce]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ilspy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ilspy-3884.png</image:loc><image:caption><![CDATA[NET Decompiler with support for PDB generation, ReadyToRun, Metadata (&more) - cross-platform!.]]></image:caption><image:title><![CDATA[ILSpy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/imhex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/imhex-7662.png</image:loc><image:caption><![CDATA[Hex editor for reverse engineers, programmers and people who value their retinas when working at 3am.]]></image:caption><image:title><![CDATA[ImHex]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/impacket</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/impacket-1687.png</image:loc><image:caption><![CDATA[Collection of Python classes for working with network protocols.]]></image:caption><image:title><![CDATA[impacket]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/infection-monkey</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/infection-monkey-6196.png</image:loc><image:caption><![CDATA[Test a data center's resiliency to perimeter breaches and internal server infection.]]></image:caption><image:title><![CDATA[Infection Monkey]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/infer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/infer-6421.png</image:loc><image:caption><![CDATA[A static analyzer for Java, C, C++, and Objective-C.]]></image:caption><image:title><![CDATA[infer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/infoga</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/infoga-4488.png</image:loc><image:caption><![CDATA[Email OSINT.]]></image:caption><image:title><![CDATA[Infoga]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/infoooze</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/infoooze-3146.png</image:loc><image:caption><![CDATA[User-friendly OSINT tool that allows you to quickly and easily gather informations.]]></image:caption><image:title><![CDATA[infoooze]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/injectify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/injectify-5340.png</image:loc><image:caption><![CDATA[Perform advanced MiTM attacks on websites with ease.]]></image:caption><image:title><![CDATA[Injectify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/injectus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/injectus-6112.png</image:loc><image:caption><![CDATA[CRLF and open redirect fuzzer.]]></image:caption><image:title><![CDATA[Injectus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/inql</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/inql-4154.png</image:loc><image:caption><![CDATA[Burp Extension for GraphQL Security Testing.]]></image:caption><image:title><![CDATA[InQL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/insiderphd</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/insiderphd-9696.png</image:loc><image:caption><![CDATA[InsiderPhD Youtube channel.]]></image:caption><image:title><![CDATA[InsiderPhD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/inspeckage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/inspeckage-6024.png</image:loc><image:caption><![CDATA[Android package inspector.]]></image:caption><image:title><![CDATA[Inspeckage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/intelowl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/intelowl-3232.png</image:loc><image:caption><![CDATA[Manage your threat intelligence at scale.]]></image:caption><image:title><![CDATA[IntelOwl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/intelspy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/intelspy-4216.png</image:loc><image:caption><![CDATA[Perform automated network reconnaissance scans to gather network intelligence.]]></image:caption><image:title><![CDATA[IntelSpy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/interactsh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/interactsh-3909.png</image:loc><image:caption><![CDATA[An OOB interaction gathering server and client library]]></image:caption><image:title><![CDATA[interactsh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/interlace</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/interlace-6365.png</image:loc><image:caption><![CDATA[Turn single threaded command line applications into a fast, multi-threaded application.]]></image:caption><image:title><![CDATA[Interlace]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/intruderpayloads</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/intruderpayloads-7465.png</image:loc><image:caption><![CDATA[Payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.]]></image:caption><image:title><![CDATA[IntruderPayloads]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invicti</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invicti-5752.png</image:loc><image:caption><![CDATA[Web Application Security For Enterprise.]]></image:caption><image:title><![CDATA[Invicti]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-aclpwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-aclpwn-9483.png</image:loc><image:caption><![CDATA[Automates the discovery and pwnage of ACLs in Active Directory that are unsafe configure.]]></image:caption><image:title><![CDATA[Invoke-ACLPwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-adenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-adenum-2833.png</image:loc><image:caption><![CDATA[Automate Active Directory Enumeration using PowerView.]]></image:caption><image:title><![CDATA[Invoke-ADEnum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-bsod</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-bsod-2759.png</image:loc><image:caption><![CDATA[For when you want a computer to be done - without admin!.]]></image:caption><image:title><![CDATA[Invoke-BSOD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-powerthief</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-powerthief-6741.jpg</image:loc><image:caption><![CDATA[An Internet Explorer post exploitation library.]]></image:caption><image:title><![CDATA[Invoke-PowerThIEf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-psimage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-psimage-8970.png</image:loc><image:caption><![CDATA[Encodes a PowerShell script in the pixels of a PNG file and generates a oneliner to execute.]]></image:caption><image:title><![CDATA[Invoke-PSImage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-socksproxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-socksproxy-4199.png</image:loc><image:caption><![CDATA[Socks proxy, and reverse socks server using powershell.]]></image:caption><image:title><![CDATA[Invoke-SocksProxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-tmpdavfs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-tmpdavfs-6835.png</image:loc><image:caption><![CDATA[Memory Backed Powershell WebDav Server.]]></image:caption><image:title><![CDATA[Invoke-TmpDavFS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/invoke-wcmdump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/invoke-wcmdump-3373.png</image:loc><image:caption><![CDATA[PowerShell script to dump Windows credentials from the Credential Manager.]]></image:caption><image:title><![CDATA[Invoke-WCMDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ipfuscator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ipfuscator-1111.png</image:loc><image:caption><![CDATA[A tool to automatically generate alternative IP representations.]]></image:caption><image:title><![CDATA[IPFuscator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/iprotate</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/iprotate-2278.png</image:loc><image:caption><![CDATA[Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.]]></image:caption><image:title><![CDATA[IPRotate]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ipsourcebypass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ipsourcebypass-6468.png</image:loc><image:caption><![CDATA[Bypass IP source restrictions using HTTP headers.]]></image:caption><image:title><![CDATA[ipsourcebypass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/is-website-vulnerable</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/is-website-vulnerable-7134.png</image:loc><image:caption><![CDATA[Finds publicly known security vulnerabilities in a website's frontend JavaScript libraries.]]></image:caption><image:title><![CDATA[is-website-vulnerable]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ivre</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ivre-5827.png</image:loc><image:caption><![CDATA[Network recon framework.]]></image:caption><image:title><![CDATA[IVRE]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/j2eescan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/j2eescan-1981.png</image:loc><image:caption><![CDATA[Improve the test coverage during web application penetration tests on J2EE applications.]]></image:caption><image:title><![CDATA[J2EEScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ja3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ja3-1194.png</image:loc><image:caption><![CDATA[Create SSL client fingerprints in an easy to produce and shareable way.]]></image:caption><image:title><![CDATA[ja3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jackdaw</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jackdaw-1454.jpeg</image:loc><image:caption><![CDATA[Gather gather gather.]]></image:caption><image:title><![CDATA[jackdaw]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jadx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jadx-2258.png</image:loc><image:caption><![CDATA[Dex to Java decompiler.]]></image:caption><image:title><![CDATA[jadx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jaeles</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jaeles-4533.png</image:loc><image:caption><![CDATA[The Swiss Army knife for automated Web Application Testing]]></image:caption><image:title><![CDATA[Jaeles]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/java-deserialization-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/java-deserialization-scanner-8243.png</image:loc><image:caption><![CDATA[All-in-one plugin for the detection and exploitation of Java deserialization vulnerabilities.]]></image:caption><image:title><![CDATA[Java Deserialization Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jd-gui</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jd-gui-3993.png</image:loc><image:caption><![CDATA[A standalone Java decompiler GUI.]]></image:caption><image:title><![CDATA[JD-GUI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jeb-decompiler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jeb-decompiler-6619.png</image:loc><image:caption><![CDATA[Decompile and debug binary code and obfuscated apps, break down and analyze document files.]]></image:caption><image:title><![CDATA[JEB Decompiler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jira-lens</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jira-lens-3943.png</image:loc><image:caption><![CDATA[Fast and customizable vulnerability scanner for Jira.]]></image:caption><image:title><![CDATA[Jira-Lens]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jndi-injection-exploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jndi-injection-exploit-2092.png</image:loc><image:caption><![CDATA[Generates JNDI links can start several servers to exploit JNDI Injection vulnerabilities.]]></image:caption><image:title><![CDATA[JNDI-Injection-Exploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/john-hammond</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/john-hammond-1594.png</image:loc><image:caption><![CDATA[John Hammond YouTube channel.]]></image:caption><image:title><![CDATA[John Hammond]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/john-the-ripper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/john-the-ripper-3631.png</image:loc><image:caption><![CDATA[Password cracker tool.]]></image:caption><image:title><![CDATA[John The Ripper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jok3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jok3r-3399.png</image:loc><image:caption><![CDATA[Network and Web Pentest Automation Framework.]]></image:caption><image:title><![CDATA[jok3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/joomscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/joomscan-5461.png</image:loc><image:caption><![CDATA[OWASP Joomla Vulnerability Scanner Project.]]></image:caption><image:title><![CDATA[JoomScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/joseph</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/joseph-7779.png</image:loc><image:caption><![CDATA[JavaScript Object Signing and Encryption Pentesting Helper.]]></image:caption><image:title><![CDATA[JOSEPH]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jpexs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jpexs-8121.png</image:loc><image:caption><![CDATA[Free Flash decompiler.]]></image:caption><image:title><![CDATA[JPEXS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/js-beautify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/js-beautify-5275.png</image:loc><image:caption><![CDATA[Beautifier for JavaScript.]]></image:caption><image:title><![CDATA[js-beautify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/js-scan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/js-scan-3301.png</image:loc><image:caption><![CDATA[A .js scanner, built in PHP, designed to scrape urls and other info.]]></image:caption><image:title><![CDATA[JS-Scan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/js-tap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/js-tap-6121.png</image:loc><image:caption><![CDATA[JavaScript payload and supporting software to be used as XSS payload or post exploitation implant.]]></image:caption><image:title><![CDATA[JS-Tap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsfinder-5409.jpg</image:loc><image:caption><![CDATA[Fetches JavaScript files quickly and comprehensively from a defined list of URLs or domains.]]></image:caption><image:title><![CDATA[jsfinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsgen-8094.png</image:loc><image:caption><![CDATA[Generate javascript code to be injected in case you find a Server Side Javascript Injection.]]></image:caption><image:title><![CDATA[JSgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsleak</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsleak-8990.png</image:loc><image:caption><![CDATA[Find secrets, paths or links in the source code.]]></image:caption><image:title><![CDATA[jsleak]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsluice</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsluice-7757.png</image:loc><image:caption><![CDATA[Extract URLs, paths, secrets, and other interesting bits from JavaScript.]]></image:caption><image:title><![CDATA[jsluice]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/json-web-tokens</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/json-web-tokens-9559.png</image:loc><image:caption><![CDATA[JSON Web Tokens Support for Burp Suite.]]></image:caption><image:title><![CDATA[json-web-tokens]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsonbeautifier</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsonbeautifier-1355.png</image:loc><image:caption><![CDATA[JSON Beautifier for Burp written in Java.]]></image:caption><image:title><![CDATA[JSONBeautifier]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsonbee</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsonbee-9189.png</image:loc><image:caption><![CDATA[A ready to use JSONP endpoints/payloads to help bypass Content Security Policy.]]></image:caption><image:title><![CDATA[JSONBee]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsparser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsparser-1720.png</image:loc><image:caption><![CDATA[Python script to parse relative URLs from JavaScript files.]]></image:caption><image:title><![CDATA[JSParser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jspector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jspector-3684.png</image:loc><image:caption><![CDATA[Burp Suite extension to crawl JS files in passive mode and display the results on the issues.]]></image:caption><image:title><![CDATA[JSpector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsql-injection</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsql-injection-6281.png</image:loc><image:caption><![CDATA[Java application for automatic SQL database injection.]]></image:caption><image:title><![CDATA[jSQL Injection]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jsshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jsshell-5832.png</image:loc><image:caption><![CDATA[An interactive multi-user web JS shell.]]></image:caption><image:title><![CDATA[JSShell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jswzl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jswzl-5762.png</image:loc><image:caption><![CDATA[Improve your web application aecurity testing with rich data from static analysis.]]></image:caption><image:title><![CDATA[jswzl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/juumla</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/juumla-8027.png</image:loc><image:caption><![CDATA[Identify Joomla version, scan for vulnerabilities and sensitive files.]]></image:caption><image:title><![CDATA[Juumla]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/c-jwt-cracker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-cracker-6875.png</image:loc><image:caption><![CDATA[JWT brute force cracker written in C.]]></image:caption><image:title><![CDATA[JWT cracker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt-key-id-injector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-key-id-injector-6176.png</image:loc><image:caption><![CDATA[Simple python script to check against hypothetical JWT vulnerability.]]></image:caption><image:title><![CDATA[JWT Key ID Injector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt-tool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-tool-4742.png</image:loc><image:caption><![CDATA[A toolkit for testing, tweaking and cracking JSON Web Tokens.]]></image:caption><image:title><![CDATA[JWT Tool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt-cracker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-cracker-4147.png</image:loc><image:caption><![CDATA[Simple JWT token brute force cracker.]]></image:caption><image:title><![CDATA[jwt-cracker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt-hack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-hack-2487.png</image:loc><image:caption><![CDATA[JWT encoding/decoding, generates payloads for JWT attack and very fast cracking.]]></image:caption><image:title><![CDATA[jwt-hack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt-heartbreaker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt-heartbreaker-7316.png</image:loc><image:caption><![CDATA[Burp Suite extension to check JWT for using keys from known from public sources.]]></image:caption><image:title><![CDATA[jwt-heartbreaker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwt4b</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwt4b-6732.png</image:loc><image:caption><![CDATA[JWT Support for Burp Suite.]]></image:caption><image:title><![CDATA[JWT4B]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwtear</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwtear-2650.png</image:loc><image:caption><![CDATA[Modular command-line tool to parse, create and manipulate JWT tokens.]]></image:caption><image:title><![CDATA[jwtear]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/jwtweak</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/jwtweak-7153.png</image:loc><image:caption><![CDATA[Detects JWT algorithm and provides options to generate a new JWT based on another algorithm.]]></image:caption><image:title><![CDATA[JWTweak]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kadimus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kadimus-1835.png</image:loc><image:caption><![CDATA[Check for and exploit LFI vulnerabilities with a focus on PHP systems.]]></image:caption><image:title><![CDATA[Kadimus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kaeferjaeger</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kaeferjaeger-6058.png</image:loc><image:caption><![CDATA[Lists of resources: cdn ranges, ips ranges, sni ip ranges...]]></image:caption><image:title><![CDATA[Kaeferjaeger]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kage-1042.png</image:loc><image:caption><![CDATA[Graphical user interface for Metasploit Meterpreter and session handler.]]></image:caption><image:title><![CDATA[Kage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kali-linux</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kali-linux-1058.png</image:loc><image:caption><![CDATA[The most advanced penetration testing distribution.]]></image:caption><image:title><![CDATA[Kali Linux]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/karma-v2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/karma-v2-1376.png</image:loc><image:caption><![CDATA[Passive open source intelligence automated reconnaissance.]]></image:caption><image:title><![CDATA[karma v2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/katana</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/katana-6416.png</image:loc><image:caption><![CDATA[A next-generation crawling and spidering framework.]]></image:caption><image:title><![CDATA[katana]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/katoolin3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/katoolin3-8008.png</image:loc><image:caption><![CDATA[Get your favourite Kali Linux tools on Debian/Ubuntu/Linux Mint.]]></image:caption><image:title><![CDATA[katoolin3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/keepwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/keepwn-5212.png</image:loc><image:caption><![CDATA[A python script to help red teamers discover KeePass instances and extract secrets.]]></image:caption><image:title><![CDATA[KeePwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kekeo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kekeo-8213.png</image:loc><image:caption><![CDATA[A little toolbox to play with Microsoft Kerberos in C.]]></image:caption><image:title><![CDATA[Kekeo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kerberoast</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kerberoast-6676.png</image:loc><image:caption><![CDATA[Series of tools for attacking MS Kerberos implementations.]]></image:caption><image:title><![CDATA[kerberoast]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kerbeus-bof</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kerbeus-bof-6716.png</image:loc><image:caption><![CDATA[Beacon Object Files for Kerberos abuse.]]></image:caption><image:title><![CDATA[Kerbeus-BOF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kerbrute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kerbrute-6375.png</image:loc><image:caption><![CDATA[Bruteforce and enumerate Active Directory accounts through Kerberos pre-authentication.]]></image:caption><image:title><![CDATA[kerbrute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kernel-exploit-factory</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kernel-exploit-factory-7099.png</image:loc><image:caption><![CDATA[Linux kernel CVE exploit analysis report and relative debug environment.]]></image:caption><image:title><![CDATA[kernel-exploit-factory]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/keyfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/keyfinder-7602.png</image:loc><image:caption><![CDATA[Find and analyze private/public key files and Android APK files.]]></image:caption><image:title><![CDATA[Keyfinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/keyhacks.sh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/keyhacks.sh-3894.png</image:loc><image:caption><![CDATA[Automation of tokens/api keys testing.]]></image:caption><image:title><![CDATA[keyhacks.sh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/keytabextract</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/keytabextract-2674.png</image:loc><image:caption><![CDATA[Extracts Key Values from .keytab files.]]></image:caption><image:title><![CDATA[KeyTabExtract]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kicks3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kicks3-1466.png</image:loc><image:caption><![CDATA[S3 bucket finder from html,js and bucket misconfiguration testing tool.]]></image:caption><image:title><![CDATA[kicks3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kics</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kics-3881.png</image:loc><image:caption><![CDATA[Find vulnerabilities, compliance issues and infrastructure misconfigurations in your IAC.]]></image:caption><image:title><![CDATA[KICS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/king-phisher</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/king-phisher-9453.png</image:loc><image:caption><![CDATA[Phishing Campaign Toolkit.]]></image:caption><image:title><![CDATA[king-phisher]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kismac</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kismac-9160.png</image:loc><image:caption><![CDATA[A free, open source wireless stumbling and security tool for Mac OS X.]]></image:caption><image:title><![CDATA[KisMac]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kismet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kismet-6185.png</image:loc><image:caption><![CDATA[Remote capture for all capture types over TCP sockets or websockets.]]></image:caption><image:title><![CDATA[Kismet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kiterunner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kiterunner-6260.png</image:loc><image:caption><![CDATA[Contextual content discovery tool.]]></image:caption><image:title><![CDATA[kiterunner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/klyda</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/klyda-5560.png</image:loc><image:caption><![CDATA[Highly configurable script for dictionary/spray attacks against online web applications.]]></image:caption><image:title><![CDATA[Klyda]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/knockpy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/knockpy-8801.png</image:loc><image:caption><![CDATA[Knock Subdomain Scan.]]></image:caption><image:title><![CDATA[Knockpy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/knoxnl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/knoxnl-1259.png</image:loc><image:caption><![CDATA[This is a python wrapper around the amazing KNOXSS.]]></image:caption><image:title><![CDATA[Knoxnl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/knoxss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/knoxss-3185.png</image:loc><image:caption><![CDATA[Online XSS tool with demonstration of vulnerability.]]></image:caption><image:title><![CDATA[KNOXSS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/komiser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/komiser-8014.png</image:loc><image:caption><![CDATA[Cloud resources manager designed to analyze and manage cloud cost, usage, security, and more!.]]></image:caption><image:title><![CDATA[komiser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/krakatau</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/krakatau-6568.png</image:loc><image:caption><![CDATA[Java decompiler, assembler, and disassembler.]]></image:caption><image:title><![CDATA[Krakatau]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kraken</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kraken-9246.png</image:loc><image:caption><![CDATA[A modular multi-language webshell.]]></image:caption><image:title><![CDATA[Kraken]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kscan-2040.png</image:loc><image:caption><![CDATA[Kscan is an all-round scanner developed purely in Go, with functions such as port scanning, protocol.]]></image:caption><image:title><![CDATA[Kscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kube-bench</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kube-bench-7783.png</image:loc><image:caption><![CDATA[Checks whether Kubernetes is deployed according to security best practices.]]></image:caption><image:title><![CDATA[kube-bench]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kubernetes-goat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kubernetes-goat-5410.png</image:loc><image:caption><![CDATA[Vulnerable by design cluster environment to learn and practice Kubernetes security.]]></image:caption><image:title><![CDATA[Kubernetes Goat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kubesploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kubesploit-6663.png</image:loc><image:caption><![CDATA[Cross-platform command & control server and agent focused on containerized environments.]]></image:caption><image:title><![CDATA[Kubesploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kubestroyer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kubestroyer-8061.png</image:loc><image:caption><![CDATA[Exploit Kubernetes clusters misconfigurations and be the swiss army knife of your pentests.]]></image:caption><image:title><![CDATA[Kubestroyer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kwetza</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kwetza-3681.png</image:loc><image:caption><![CDATA[Infect an existing Android application with a Meterpreter payload.]]></image:caption><image:title><![CDATA[Kwetza]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/kxss</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/kxss-7401.png</image:loc><image:caption><![CDATA[Adaption of tomnomnom's kxss tool with a different output format.]]></image:caption><image:title><![CDATA[kxss]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/l0phtcrack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/l0phtcrack-4989.png</image:loc><image:caption><![CDATA[Crack Windows passwords from hashes.]]></image:caption><image:title><![CDATA[l0phtcrack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/languard</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/languard-8952.png</image:loc><image:caption><![CDATA[Patch management, vulnerability scanning, and network auditing.]]></image:caption><image:title><![CDATA[LanGuard]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lazagne</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lazagne-7900.png</image:loc><image:caption><![CDATA[Credentials recovery project.]]></image:caption><image:title><![CDATA[LaZagne]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lazyegg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lazyegg-2790.png</image:loc><image:caption><![CDATA[Powerful tool for extracting various types of data from a target URL.]]></image:caption><image:title><![CDATA[lazyegg]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lazyhunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lazyhunter-9210.png</image:loc><image:caption><![CDATA[A framework that provides a web UI to commonly used Bug Hunting/Pentesting tools.]]></image:caption><image:title><![CDATA[LazyHunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lazypariah</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lazypariah-8435.png</image:loc><image:caption><![CDATA[Generate reverse shell payloads on the fly.]]></image:caption><image:title><![CDATA[LAZYPARIAH]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lazys3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lazys3-4166.png</image:loc><image:caption><![CDATA[Ruby script to bruteforce for AWS s3 buckets using different permutations.]]></image:caption><image:title><![CDATA[lazys3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ldap-password-hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ldap-password-hunter-1008.png</image:loc><image:caption><![CDATA[Password Hunter in active directory.]]></image:caption><image:title><![CDATA[LDAP Password Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ldap-relay-scan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ldap-relay-scan-8672.png</image:loc><image:caption><![CDATA[Check for LDAP protections regarding the relay of NTLM authentication.]]></image:caption><image:title><![CDATA[LDAP Relay Scan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ldapnomnom</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ldapnomnom-6124.png</image:loc><image:caption><![CDATA[Anonymously bruteforce Active Directory usernames by abusing LDAP Ping requests.]]></image:caption><image:title><![CDATA[LDAPNomNom]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/leakey</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/leakey-1954.png</image:loc><image:caption><![CDATA[Bash script which checks and validates for leaked credentials.]]></image:caption><image:title><![CDATA[LEAKEY]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/leaklooker-x</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/leaklooker-x-6851.jpeg</image:loc><image:caption><![CDATA[Discover, browse and monitor database/source code leaks.]]></image:caption><image:title><![CDATA[LeakLooker-X]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/leakscraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/leakscraper-8084.png</image:loc><image:caption><![CDATA[Set of tools to process and visualize huge text files containing credentials.]]></image:caption><image:title><![CDATA[leakScraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/legion</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/legion-6532.png</image:loc><image:caption><![CDATA[Aids in discovery, reconnaissance and exploitation of information systems.]]></image:caption><image:title><![CDATA[Legion]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/legitify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/legitify-6471.png</image:loc><image:caption><![CDATA[Detect misconfigurations and security risks across GitHub and GitLab assets.]]></image:caption><image:title><![CDATA[Legitify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/leonidas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/leonidas-1172.png</image:loc><image:caption><![CDATA[Automated attack simulation in the cloud, complete with detection use cases.]]></image:caption><image:title><![CDATA[Leonidas]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lfi-suite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lfi-suite-2487.png</image:loc><image:caption><![CDATA[Totally Automatic LFI Exploiter and Scanner.]]></image:caption><image:title><![CDATA[LFI Suite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lfi-enum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lfi-enum-2973.png</image:loc><image:caption><![CDATA[Scripts to execute enumeration via LFI]]></image:caption><image:title><![CDATA[LFI-Enum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lfidump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lfidump-2841.jpg</image:loc><image:caption><![CDATA[Dump remote files through a local file read or Local File Inclusion web vulnerability.]]></image:caption><image:title><![CDATA[LFIDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/libafl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/libafl-9844.png</image:loc><image:caption><![CDATA[Advanced fuzzing librar. Slot your fuzzers together and extend their features using Rust.]]></image:caption><image:title><![CDATA[LibAFL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/liffy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/liffy-3353.png</image:loc><image:caption><![CDATA[Local file inclusion exploitation tool.]]></image:caption><image:title><![CDATA[Liffy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ligolo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ligolo-3802.jpg</image:loc><image:caption><![CDATA[Reverse tunneling made easy for pentesters.]]></image:caption><image:title><![CDATA[ligolo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ligolo-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ligolo-ng-6485.png</image:loc><image:caption><![CDATA[An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.]]></image:caption><image:title><![CDATA[Ligolo-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linenum-4548.png</image:loc><image:caption><![CDATA[Scripted Local Linux Enumeration & Privilege Escalation Checks.]]></image:caption><image:title><![CDATA[LinEnum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linkedindumper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linkedindumper-4587.png</image:loc><image:caption><![CDATA[Script that dumps employee data from the LinkedIn social networking platform.]]></image:caption><image:title><![CDATA[LinkedInDumper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linkfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linkfinder-5106.png</image:loc><image:caption><![CDATA[A python script that finds endpoints in JavaScript files.]]></image:caption><image:title><![CDATA[LinkFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linpmem</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linpmem-5343.png</image:loc><image:caption><![CDATA[The Linux memory acquisition tool.]]></image:caption><image:title><![CDATA[Linpmem]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linux-exploit-suggester</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linux-exploit-suggester-3354.png</image:loc><image:caption><![CDATA[Based on operating system release number.]]></image:caption><image:title><![CDATA[Linux Exploit Suggester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/les</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linux-exploit-suggester2-6066.png</image:loc><image:caption><![CDATA[Linux privilege escalation auditing tool.]]></image:caption><image:title><![CDATA[linux-exploit-suggester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linux-smart-enumeration</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linux-smart-enumeration-3850.png</image:loc><image:caption><![CDATA[Linux enumeration tool for pentesting and CTFs with verbosity levels.]]></image:caption><image:title><![CDATA[linux-smart-enumeration]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linuxprivchecker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linuxprivchecker-4384.png</image:loc><image:caption><![CDATA[A Linux privilege escalation check script.]]></image:caption><image:title><![CDATA[linuxprivchecker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linwinpwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linwinpwn-6063.png</image:loc><image:caption><![CDATA[Automates a number of Active Directory enumeration and vulnerability.]]></image:caption><image:title><![CDATA[linWinPwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/linx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/linx-9748.png</image:loc><image:caption><![CDATA[Reveals invisible links within JavaScript files.]]></image:caption><image:title><![CDATA[linx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/litefuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/litefuzz-7873.png</image:loc><image:caption><![CDATA[A multi-platform fuzzer for poking at userland binaries and servers.]]></image:caption><image:title><![CDATA[litefuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/liveoverflow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/liveoverflow-8574.png</image:loc><image:caption><![CDATA[LiveOverflow YouTube channel.]]></image:caption><image:title><![CDATA[LiveOverflow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/livetargetsfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/livetargetsfinder-8554.png</image:loc><image:caption><![CDATA[Generates lists of live hosts and URLs.]]></image:caption><image:title><![CDATA[LiveTargetsFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lk_scraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lk_scraper-5075.png</image:loc><image:caption><![CDATA[A fully configurable LinkedIn scraper: scrape anything within LinkedIn.]]></image:caption><image:title><![CDATA[lk_scraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lnkbomb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lnkbomb-5016.png</image:loc><image:caption><![CDATA[Malicious shortcut generator for collecting NTLM hashes from insecure file shares.]]></image:caption><image:title><![CDATA[lnkbomb]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/localdatahog</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/localdatahog-7113.png</image:loc><image:caption><![CDATA[String-based secret-searching tool, high entropy and regexes.]]></image:caption><image:title><![CDATA[localdataHog]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/localpotato</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/localpotato-8523.png</image:loc><image:caption><![CDATA[Another local Windows privilege escalation using a new potato technique.]]></image:caption><image:title><![CDATA[LocalPotato]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/locksmith</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/locksmith-1752.png</image:loc><image:caption><![CDATA[Detect and fix common misconfigurations in Active Directory Certificate Services.]]></image:caption><image:title><![CDATA[Locksmith]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/logger-plus-plus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/logger-plus-plus-3408.png</image:loc><image:caption><![CDATA[Log activities of all the tools in Burp Suite.]]></image:caption><image:title><![CDATA[Logger++]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/logontracer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/logontracer-1486.png</image:loc><image:caption><![CDATA[Investigate malicious Windows logon by visualizing and analyzing Windows event log.]]></image:caption><image:title><![CDATA[LogonTracer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lolbas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lolbas-7084.png</image:loc><image:caption><![CDATA[Living Off The Land Binaries, Scripts and Libraries.]]></image:caption><image:title><![CDATA[LOLBAS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/loobins</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/loobins-2329.png</image:loc><image:caption><![CDATA[Living Off the Orchard: macOS Binaries.]]></image:caption><image:title><![CDATA[LOOBins]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lookyloo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lookyloo-5654.jpg</image:loc><image:caption><![CDATA[Allows users to capture a website page and then display a tree of domains that call each other.]]></image:caption><image:title><![CDATA[Lookyloo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lorsrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lorsrf-1450.png</image:loc><image:caption><![CDATA[Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load.]]></image:caption><image:title><![CDATA[lorsrf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lsassy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lsassy-5141.png</image:loc><image:caption><![CDATA[Python tool to remotely extract credentials on a set of hosts.]]></image:caption><image:title><![CDATA[lsassy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/luyten</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/luyten-5064.png</image:loc><image:caption><![CDATA[An Open Source Java Decompiler GUI for Procyon.]]></image:caption><image:title><![CDATA[Luyten]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lyncsmash</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lyncsmash-7192.png</image:loc><image:caption><![CDATA[Locate and attack Lync and Skype for Business.]]></image:caption><image:title><![CDATA[lyncsmash]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/lynis</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/lynis-5910.png</image:loc><image:caption><![CDATA[Security auditing tool for Linux, macOS, and UNIX-based systems.]]></image:caption><image:title><![CDATA[lynis]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/movfuscator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/movfuscator-5390.png</image:loc><image:caption><![CDATA[The single instruction C compiler.]]></image:caption><image:title><![CDATA[M/o/Vfuscator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/macchanger</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/macchanger-5804.png</image:loc><image:caption><![CDATA[Makes the maniputation of MAC addresses of network interfaces easier.]]></image:caption><image:title><![CDATA[macchanger]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/magicrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/magicrecon-1555.png</image:loc><image:caption><![CDATA[A powerful shell script to maximize the recon and data collection process.]]></image:caption><image:title><![CDATA[MagicRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/magspoof</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/magspoof-3962.jpg</image:loc><image:caption><![CDATA[A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card wirelessly.]]></image:caption><image:title><![CDATA[magspoof]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/maigret</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/maigret-3012.png</image:loc><image:caption><![CDATA[Collect a dossier on a person by username from thousands of sites.]]></image:caption><image:title><![CDATA[Maigret]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/malbuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/malbuzz-3468.png</image:loc><image:caption><![CDATA[It's a handy tool to help you analyze malware.]]></image:caption><image:title><![CDATA[MalBuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/malicious-pdf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/malicious-pdf-8661.png</image:loc><image:caption><![CDATA[Generates a bunch of malicious pdf files with phone-home functionality.]]></image:caption><image:title><![CDATA[malicious-pdf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/maltego</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/maltego-7501.png</image:loc><image:caption><![CDATA[Open source intelligence and forensics application.]]></image:caption><image:title><![CDATA[Maltego]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/maltrail</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/maltrail-3709.png</image:loc><image:caption><![CDATA[Malicious traffic detection system.]]></image:caption><image:title><![CDATA[maltrail]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/malwarebazaar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/malwarebazaar-2464.png</image:loc><image:caption><![CDATA[Malware sample database.]]></image:caption><image:title><![CDATA[MalwareBazaar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/malwaresourcecode</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/malwaresourcecode-3251.png</image:loc><image:caption><![CDATA[Collection of malware source code for a variety of platforms in an array of different programming la.]]></image:caption><image:title><![CDATA[MalwareSourceCode]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mana</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mana-8434.png</image:loc><image:caption><![CDATA[Wifi rogue AP attacks and MitM.]]></image:caption><image:title><![CDATA[mana]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/manspider</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/manspider-9679.png</image:loc><image:caption><![CDATA[Spider entire networks for juicy files sitting on SMB shares.]]></image:caption><image:title><![CDATA[MANSPIDER]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mapcidr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mapcidr-5802.png</image:loc><image:caption><![CDATA[Small utility program to perform multiple operations for a given subnet/CIDR ranges.]]></image:caption><image:title><![CDATA[mapcidr]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mapperplus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mapperplus-7112.png</image:loc><image:caption><![CDATA[An advanced source map extractor based on headless browser.]]></image:caption><image:title><![CDATA[MapperPlus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/maryam</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/maryam-2735.png</image:loc><image:caption><![CDATA[Open-source Intelligence Framework.]]></image:caption><image:title><![CDATA[Maryam]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mass-s3-bucket-tester</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mass-s3-bucket-tester-7218.png</image:loc><image:caption><![CDATA[Tests a list of s3 buckets to see if they have dir listings enabled or if they are uploadable.]]></image:caption><image:title><![CDATA[mass-s3-bucket-tester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mass3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mass3-5035.png</image:loc><image:caption><![CDATA[Enumerate through a pre-compiled list of AWS S3 buckets using DNS instead of HTTP.]]></image:caption><image:title><![CDATA[Mass3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/masscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/masscan-1147.png</image:loc><image:caption><![CDATA[TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.]]></image:caption><image:title><![CDATA[Masscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/massdns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/massdns-7056.png</image:loc><image:caption><![CDATA[A high-performance DNS stub resolver for bulk lookups and reconnaissance.]]></image:caption><image:title><![CDATA[MassDNS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/medusa</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/medusa-8276.png</image:loc><image:caption><![CDATA[Medusa is a speedy, parallel, and modular, login brute-forcer.]]></image:caption><image:title><![CDATA[Medusa]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/meg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/meg-5432.png</image:loc><image:caption><![CDATA[Fetch many paths for many hosts, without killing the hosts.]]></image:caption><image:title><![CDATA[meg]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mentalist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mentalist-5892.png</image:loc><image:caption><![CDATA[Graphical tool for custom wordlist generation.]]></image:caption><image:title><![CDATA[mentalist]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/merlin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/merlin-3310.png</image:loc><image:caption><![CDATA[Cross-platform post-exploitation HTTP/2 Command & Control server and agent.]]></image:caption><image:title><![CDATA[merlin]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metabigor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metabigor-4399.png</image:loc><image:caption><![CDATA[Intelligence tool to do OSINT tasks and more but without any API key.]]></image:caption><image:title><![CDATA[Metabigor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metadetective</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metadetective-9608.png</image:loc><image:caption><![CDATA[Unleash metadata intelligence, bridging the chasm in metadata extraction and analysis.]]></image:caption><image:title><![CDATA[MetaDetective]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metagoofil</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metagoofil-2449.png</image:loc><image:caption><![CDATA[Search Google and download specific file types.]]></image:caption><image:title><![CDATA[Metagoofil]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metahttp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metahttp-1443.jpg</image:loc><image:caption><![CDATA[Script that automates the scanning of a target network for HTTP resources through XXE.]]></image:caption><image:title><![CDATA[metahttp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metasploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metasploit-4373.png</image:loc><image:caption><![CDATA[The world’s most used penetration testing framework.]]></image:caption><image:title><![CDATA[Metasploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/metasploitable</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/metasploitable-3466.png</image:loc><image:caption><![CDATA[VM that is built from the ground up with a large amount of security vulnerabilities.]]></image:caption><image:title><![CDATA[metasploitable]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mfoc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mfoc-7141.png</image:loc><image:caption><![CDATA[Mifare classic offline cracker.]]></image:caption><image:title><![CDATA[mfoc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/microburst</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/microburst-9888.png</image:loc><image:caption><![CDATA[A collection of scripts for assessing Microsoft Azure security.]]></image:caption><image:title><![CDATA[MicroBurst]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/microsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/microsploit-2612.png</image:loc><image:caption><![CDATA[Quickly and easily create backdoor Office exploitation using module Metasploit packet.]]></image:caption><image:title><![CDATA[Microsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mimicry</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mimicry-8980.png</image:loc><image:caption><![CDATA[A dynamic deception tool that actively deceives an attacker.]]></image:caption><image:title><![CDATA[Mimicry]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mimikatz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mimikatz-7872.png</image:loc><image:caption><![CDATA[A little tool to play with Windows security.]]></image:caption><image:title><![CDATA[mimikatz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mimikittenz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mimikittenz-9237.png</image:loc><image:caption><![CDATA[A post-exploitation powershell tool for extracting juicy info from memory.]]></image:caption><image:title><![CDATA[mimikittenz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mitm6</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mitm6-7658.png</image:loc><image:caption><![CDATA[pwning IPv4 via IPv6.]]></image:caption><image:title><![CDATA[mitm6]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mitmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mitmap-2375.png</image:loc><image:caption><![CDATA[A python program to create a fake AP and sniff data.]]></image:caption><image:title><![CDATA[mitmAP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mitmproxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mitmproxy-4829.png</image:loc><image:caption><![CDATA[An interactive TLS-capable intercepting HTTP proxy.]]></image:caption><image:title><![CDATA[mitmproxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mitre-att-ck</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mitre-att-ck-3866.png</image:loc><image:caption><![CDATA[Knowledge base of adversary tactics and techniques based on real-world observations.]]></image:caption><image:title><![CDATA[MITRE ATT&CK]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mksub</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mksub-8767.png</image:loc><image:caption><![CDATA[Generate tens of thousands of subdomain combinations in a matter of seconds.]]></image:caption><image:title><![CDATA[mksub]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mobsf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mobsf-7181.png</image:loc><image:caption><![CDATA[All-in-one mobile application pentesting, malware analysis and security assessment framework.]]></image:caption><image:title><![CDATA[MobSF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/modlishka</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/modlishka-1976.png</image:loc><image:caption><![CDATA[A powerful and flexible HTTP reverse proxy.]]></image:caption><image:title><![CDATA[Modlishka]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/moniorg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/moniorg-9855.png</image:loc><image:caption><![CDATA[Leverage crt.sh website to monitor domains of a target.]]></image:caption><image:title><![CDATA[moniorg]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/moonwalk-back</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/moonwalk-back-2923.png</image:loc><image:caption><![CDATA[Cover your tracks during Linux exploitation by leaving zero traces on the exploited system.]]></image:caption><image:title><![CDATA[moonwalk-back]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/moriarty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/moriarty-4792.png</image:loc><image:caption><![CDATA[Designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential.]]></image:caption><image:title><![CDATA[Moriarty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/morphhta</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/morphhta-7824.png</image:loc><image:caption><![CDATA[Morphing Cobalt Strike's evil.HTA.]]></image:caption><image:title><![CDATA[morphHTA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mosca</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mosca-2857.png</image:loc><image:caption><![CDATA[Manual search tool to find bugs like a grep unix command.]]></image:caption><image:title><![CDATA[Mosca]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mosint</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mosint-7925.png</image:loc><image:caption><![CDATA[An automated e-mail OSINT tool.]]></image:caption><image:title><![CDATA[Mosint]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mr.sip</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mr.sip-4038.png</image:loc><image:caption><![CDATA[SIP-based audit and attack tool.]]></image:caption><image:title><![CDATA[Mr.SIP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msdat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msdat-2150.png</image:loc><image:caption><![CDATA[Microsoft SQL database attacking tool.]]></image:caption><image:title><![CDATA[MSDAT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msdnsscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msdnsscan-4485.png</image:loc><image:caption><![CDATA[Identify DNS records, check for zone transfers and conduct subdomain enumeration.]]></image:caption><image:title><![CDATA[MSDNSScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msdorkdump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msdorkdump-1104.png</image:loc><image:caption><![CDATA[Google Dork File Finder.]]></image:caption><image:title><![CDATA[MSDorkDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msfpc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msfpc-2123.png</image:loc><image:caption><![CDATA[A quick way to generate various basic Meterpreter payloads via MSFvenom.]]></image:caption><image:title><![CDATA[msfpc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msldap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msldap-3755.jpg</image:loc><image:caption><![CDATA[LDAP library for auditing Microsoft Active Directory.]]></image:caption><image:title><![CDATA[msldap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msldapdump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msldapdump-3072.png</image:loc><image:caption><![CDATA[LDAP enumeration tool implemented in Python3.]]></image:caption><image:title><![CDATA[msLDAPDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/msolspray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/msolspray-6530.png</image:loc><image:caption><![CDATA[A password spraying tool for Microsoft Online accounts (Azure/O365).]]></image:caption><image:title><![CDATA[MSOLSpray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mssqli-duet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mssqli-duet-6612.png</image:loc><image:caption><![CDATA[SQL injection script for Microsoft SQL Server.]]></image:caption><image:title><![CDATA[MSSQLi-DUET]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mssqlproxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mssqlproxy-6206.png</image:loc><image:caption><![CDATA[Perform lateral movement in restricted environments through a compromised MSSQL Server.]]></image:caption><image:title><![CDATA[mssqlproxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/multidump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/multidump-1435.png</image:loc><image:caption><![CDATA[Post-exploitation tool for dumping and extracting LSASS memory discreetly.]]></image:caption><image:title><![CDATA[MultiDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/murphysec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/murphysec-2798.png</image:loc><image:caption><![CDATA[An open source tool focused on software supply chain security.]]></image:caption><image:title><![CDATA[murphysec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mvt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mvt-2808.png</image:loc><image:caption><![CDATA[Helps with conducting forensics of mobile devices in order to find signs of a potential compromise.]]></image:caption><image:title><![CDATA[mvt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mx-takeover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mx-takeover-1598.png</image:loc><image:caption><![CDATA[Focuses DNS MX records and detects misconfigured MX records.]]></image:caption><image:title><![CDATA[mx-takeover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mythic</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mythic-5724.png</image:loc><image:caption><![CDATA[A collaborative, multi-platform, red teaming framework.]]></image:caption><image:title><![CDATA[Mythic]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/mythril</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/mythril-5022.png</image:loc><image:caption><![CDATA[Security analysis tool for EVM bytecode that supports smart contracts builds.]]></image:caption><image:title><![CDATA[mythril]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/naabu</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/naabu-9814.png</image:loc><image:caption><![CDATA[A fast port scanner written in go with a focus on reliability and simplicity.]]></image:caption><image:title><![CDATA[Naabu]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nagios</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nagios-9709.png</image:loc><image:caption><![CDATA[The industry standard in IT infrastructure monitoring.]]></image:caption><image:title><![CDATA[Nagios]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nahamsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nahamsec-1352.png</image:loc><image:caption><![CDATA[NahamSec Twitch channel.]]></image:caption><image:title><![CDATA[NahamSec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/namechk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/namechk-9460.png</image:loc><image:caption><![CDATA[Check usernames on more than 100 websites, forums and social networks.]]></image:caption><image:title><![CDATA[Namechk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nanodump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nanodump-9230.png</image:loc><image:caption><![CDATA[A flexible tool that creates a minidump of the LSASS process.]]></image:caption><image:title><![CDATA[NanoDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nasm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nasm-9605.png</image:loc><image:caption><![CDATA[A cross-platform x86 assembler with an Intel-like syntax.]]></image:caption><image:title><![CDATA[nasm]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nbtscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nbtscan-3484.png</image:loc><image:caption><![CDATA[Scan networks searching for NetBIOS information.]]></image:caption><image:title><![CDATA[nbtscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ncrack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ncrack-5350.png</image:loc><image:caption><![CDATA[Open source tool for network authentication cracking.]]></image:caption><image:title><![CDATA[ncrack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nessus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nessus-2486.png</image:loc><image:caption><![CDATA[The global gold standard in vulnerability assessment built for the modern attack surface.]]></image:caption><image:title><![CDATA[Nessus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nessus-database-export</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nessus-database-export-1444.png</image:loc><image:caption><![CDATA[Export Nessus results to a relational database for use in reports, analysis, or whatever else.]]></image:caption><image:title><![CDATA[Nessus database export]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netcap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netcap-8613.png</image:loc><image:caption><![CDATA[A framework for secure and scalable network traffic analysis.]]></image:caption><image:title><![CDATA[netcap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netdiscover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netdiscover-3350.png</image:loc><image:caption><![CDATA[Network address discovering tool.]]></image:caption><image:title><![CDATA[netdiscover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netexec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netexec-1154.png</image:loc><image:caption><![CDATA[Network service exploitation tool that helps automate assessing the security of large networks.]]></image:caption><image:title><![CDATA[NetExec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netlas.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netlas.io-4313.png</image:loc><image:caption><![CDATA[Netlas.io is the network atlas of Internet. IP, DNS, Web, IoT devices, and etc.]]></image:caption><image:title><![CDATA[Netlas.io]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netprobe-5006.png</image:loc><image:caption><![CDATA[A tool you can use to scan for devices on your network.]]></image:caption><image:title><![CDATA[NetProbe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/netwitness</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/netwitness-6761.png</image:loc><image:caption><![CDATA[Rapidly detect and respond to any threat, anywhere. See Everything. Fear Nothing.]]></image:caption><image:title><![CDATA[NetWitness]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/networkchuck</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/networkchuck-7955.png</image:loc><image:caption><![CDATA[Network Chuck YouTube channel.]]></image:caption><image:title><![CDATA[NetworkChuck]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/networkminer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/networkminer-5354.png</image:loc><image:caption><![CDATA[Network forensic analysis tool for Windows.]]></image:caption><image:title><![CDATA[NetworkMiner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nexfil</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nexfil-7208.jpg</image:loc><image:caption><![CDATA[OSINT tool for finding profiles by username.]]></image:caption><image:title><![CDATA[nexfil]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nexpose</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nexpose-3976.png</image:loc><image:caption><![CDATA[Vulnerability scanner which aims to support the entire vulnerability management lifecycle.]]></image:caption><image:title><![CDATA[Nexpose]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nginxpwner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nginxpwner-8470.png</image:loc><image:caption><![CDATA[Simple tool to look for common Nginx misconfigurations and vulnerabilities.]]></image:caption><image:title><![CDATA[Nginxpwner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nikto</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nikto-6102.png</image:loc><image:caption><![CDATA[Nikto web server scanner.]]></image:caption><image:title><![CDATA[Nikto]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nimbo-c2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nimbo-c2-8244.png</image:loc><image:caption><![CDATA[Yet another (simple and lightweight) C2 framework.]]></image:caption><image:title><![CDATA[Nimbo-C2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nimbostratus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nimbostratus-5774.png</image:loc><image:caption><![CDATA[Tool for fingerprinting and exploiting Amazon cloud infrastructures.]]></image:caption><image:title><![CDATA[Nimbostratus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nimplant</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nimplant-6541.png</image:loc><image:caption><![CDATA[A light-weight first-stage C2 implant written in Nim.]]></image:caption><image:title><![CDATA[NimPlant]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nipejs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nipejs-1466.png</image:loc><image:caption><![CDATA[Simplify your life with leak detection in JavaScript, NipeJS streamlines the use of regex, making it.]]></image:caption><image:title><![CDATA[NipeJS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nipper-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nipper-ng-6065.png</image:loc><image:caption><![CDATA[Network infrastructure configuration parser.]]></image:caption><image:title><![CDATA[nipper-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nishang</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nishang-3959.png</image:loc><image:caption><![CDATA[Offensive PowerShell for red team, penetration testing and offensive security.]]></image:caption><image:title><![CDATA[Nishang]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nmap-7913.png</image:loc><image:caption><![CDATA[The network mapper.]]></image:caption><image:title><![CDATA[Nmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nmap-api</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nmap-api-1377.png</image:loc><image:caption><![CDATA[Create a Nmap API that can do scans with a good speed online and is easy to deploy.]]></image:caption><image:title><![CDATA[Nmap-API]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nmap-query-xml</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nmap-query-xml-6467.png</image:loc><image:caption><![CDATA[A simple program to query nmap XML files in the terminal.]]></image:caption><image:title><![CDATA[nmap-query-xml]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nmapautomater</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nmapautomater-6364.png</image:loc><image:caption><![CDATA[Automate the process of enumeration & recon that is run every time.]]></image:caption><image:title><![CDATA[nmapAutomater]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nmapify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nmapify-9290.png</image:loc><image:caption><![CDATA[Quickly and accurately create a visual representation of their Nmap output.]]></image:caption><image:title><![CDATA[NMapify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nodegoat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nodegoat-8396.png</image:loc><image:caption><![CDATA[Learn how OWASP Top 10 security risks apply to web applications developed using Node.js.]]></image:caption><image:title><![CDATA[NodeGoat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nodejsscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nodejsscan-6542.png</image:loc><image:caption><![CDATA[A static security code scanner for Node.js applications.]]></image:caption><image:title><![CDATA[nodejsscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nosey-parker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nosey-parker-7345.png</image:loc><image:caption><![CDATA[Command-line tool that finds secrets and sensitive information in textual data and Git history.]]></image:caption><image:title><![CDATA[Nosey Parker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nosql-injector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nosql-injector-3807.png</image:loc><image:caption><![CDATA[NoSql Injection CLI tool for finding vulnerable websites using MongoDB.]]></image:caption><image:title><![CDATA[NoSQL Injector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nosql-exploitation-framework</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nosql-exploitation-framework-2714.png</image:loc><image:caption><![CDATA[A Python Framework For NoSQL Scanning and Exploitation.]]></image:caption><image:title><![CDATA[Nosql-Exploitation-Framework]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nosqlmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nosqlmap-6543.jpg</image:loc><image:caption><![CDATA[Automated NoSQL database enumeration and web application exploitation tool.]]></image:caption><image:title><![CDATA[NoSQLMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nozaki</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nozaki-9102.png</image:loc><image:caption><![CDATA[HTTP fuzzer engine security oriented.]]></image:caption><image:title><![CDATA[Nozaki]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nsbrute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nsbrute-6108.png</image:loc><image:caption><![CDATA[Python utility to takeover domains vulnerable to AWS NS Takeover.]]></image:caption><image:title><![CDATA[NSBrute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nsdetect</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nsdetect-8634.png</image:loc><image:caption><![CDATA[Utility to detect AWS NS Takeover.]]></image:caption><image:title><![CDATA[NSDetect]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ntlmrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ntlmrecon-1795.png</image:loc><image:caption><![CDATA[Enumerate information from NTLM authentication enabled web endpoints.]]></image:caption><image:title><![CDATA[NTLMRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nuclei</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nuclei-1682.png</image:loc><image:caption><![CDATA[Fast and customizable vulnerability scanner based on simple YAML based DSL.]]></image:caption><image:title><![CDATA[Nuclei]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nuclei-templates</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nuclei-templates-9267.png</image:loc><image:caption><![CDATA[Community curated list of templates for the Nuclei engine to find security vulnerabilities.]]></image:caption><image:title><![CDATA[Nuclei templates]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nuclei-burp-plugin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nuclei-burp-plugin-8768.png</image:loc><image:caption><![CDATA[A Burp Suite plugin intended to help with Nuclei template generation.]]></image:caption><image:title><![CDATA[nuclei-burp-plugin]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/nuclei-wordfence-cve</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/nuclei-wordfence-cve-2152.jpg</image:loc><image:caption><![CDATA[Collection of Nuclei templates dedicated to WordPress core, plugins and themes vulnerabilities.]]></image:caption><image:title><![CDATA[nuclei-wordfence-cve]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/o365recon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/o365recon-8989.png</image:loc><image:caption><![CDATA[Retrieve information via O365 and AzureAD with valid credentials.]]></image:caption><image:title><![CDATA[o365recon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oauthscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oauthscan-1190.png</image:loc><image:caption><![CDATA[Burp Suite Extension useful to verify OAUTHv2 and OpenID security.]]></image:caption><image:title><![CDATA[OAUTHScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/objection</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/objection-9715.png</image:loc><image:caption><![CDATA[Runtime mobile exploration.]]></image:caption><image:title><![CDATA[objection]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/octosql</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/octosql-9409.png</image:loc><image:caption><![CDATA[CLI tool which lets you query a plethora of databases and file formats.]]></image:caption><image:title><![CDATA[octosql]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/octosuite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/octosuite-2322.png</image:loc><image:caption><![CDATA[An all-in-one GitHub open-source intelligence framework.]]></image:caption><image:title><![CDATA[octosuite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oculus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oculus-3254.png</image:loc><image:caption><![CDATA[OSINT tool used to discover environments, directories, and subdomains of a particular domain.]]></image:caption><image:title><![CDATA[Oculus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/off-by-slash</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/off-by-slash-3049.png</image:loc><image:caption><![CDATA[Burp extension to detect alias traversal via NGINX misconfiguration at scale.]]></image:caption><image:title><![CDATA[off-by-slash]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/offat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owasp-offat-9477.png</image:loc><image:caption><![CDATA[Autonomously assesses your API for prevalent vulnerabilities.]]></image:caption><image:title><![CDATA[OFFAT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/offensive-security</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/offensive-security-4755.png</image:loc><image:caption><![CDATA[Offensive Security Youtube channel.]]></image:caption><image:title><![CDATA[Offensive Security]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/offensive-azure</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/offensive-azure-9186.png</image:loc><image:caption><![CDATA[Collection of offensive tools targeting Microsoft Azure written in Python to be platform agnostic.]]></image:caption><image:title><![CDATA[Offensive-Azure]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oh365userfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oh365userfinder-6411.jpg</image:loc><image:caption><![CDATA[O365 user enumeration and password spraying tool.]]></image:caption><image:title><![CDATA[Oh365UserFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ominis-osint</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ominis-osint-1323.png</image:loc><image:caption><![CDATA[Perform information gathering from Google for search results related to a user query.]]></image:caption><image:title><![CDATA[Ominis OSINT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/onedrive_user_enum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/onedrive_user_enum-7233.png</image:loc><image:caption><![CDATA[Enumerate valid o365 users.]]></image:caption><image:title><![CDATA[onedrive_user_enum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oneforall</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oneforall-6957.png</image:loc><image:caption><![CDATA[A powerful subdomain integration tool.]]></image:caption><image:title><![CDATA[OneForAll]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/onefuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/onefuzz-6818.png</image:loc><image:caption><![CDATA[A self-hosted fuzzing-as-a-service platform.]]></image:caption><image:title><![CDATA[OneFuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/onex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/onex-7685.png</image:loc><image:caption><![CDATA[Hacking tools installer and package manager for hackers.]]></image:caption><image:title><![CDATA[Onex]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/open-sesame</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/open-sesame-1264.jpeg</image:loc><image:caption><![CDATA[Contains HackerOne disclosed reports and other bug bounty writeups.]]></image:caption><image:title><![CDATA[open-sesame]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/openapi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/openapi-1061.png</image:loc><image:caption><![CDATA[Parse OpenAPI specifications into the BurpSuite for automating RESTful API testing.]]></image:caption><image:title><![CDATA[OpenAPI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/openbuckets.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/openbuckets.io-6122.png</image:loc><image:caption><![CDATA[Online platform for finding open buckets in cloud storage systems effortlessly.]]></image:caption><image:title><![CDATA[OpenBuckets]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/opencanary</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/opencanary-5219.png</image:loc><image:caption><![CDATA[Modular and decentralised honeypot.]]></image:caption><image:title><![CDATA[OpenCanary]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/opencti</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/opencti-3548.png</image:loc><image:caption><![CDATA[Open Cyber Threat Intelligence Platform.]]></image:caption><image:title><![CDATA[OpenCTI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/openredirex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/openredirex-7436.png</image:loc><image:caption><![CDATA[A Fuzzer for OpenRedirect issues.]]></image:caption><image:title><![CDATA[OpenRedireX]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/openvas</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/openvas-2776.png</image:loc><image:caption><![CDATA[This repository contains the scanner component for Greenbone Community Edition.]]></image:caption><image:title><![CDATA[OpenVAS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ophcrack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ophcrack-1027.png</image:loc><image:caption><![CDATA[Windows password cracker based on rainbow tables.]]></image:caption><image:title><![CDATA[Ophcrack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oralyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oralyzer-1102.png</image:loc><image:caption><![CDATA[Open Redirection Analyzer.]]></image:caption><image:title><![CDATA[Oralyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/orbitaldump</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/orbitaldump-6045.png</image:loc><image:caption><![CDATA[A simple multi-threaded distributed SSH brute-forcing tool.]]></image:caption><image:title><![CDATA[OrbitalDump]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/orpheus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/orpheus-8812.png</image:loc><image:caption><![CDATA[Bypass Kerberoast detections with modified KDC options and encryption types.]]></image:caption><image:title><![CDATA[orpheus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osint-framework</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osint-framework-3110.png</image:loc><image:caption><![CDATA[OSINT Framework.]]></image:caption><image:title><![CDATA[OSINT-Framework]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osint-spy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osint-spy-7811.png</image:loc><image:caption><![CDATA[Perform OSINT scan on email/domain/ip address/organization.]]></image:caption><image:title><![CDATA[OSINT-SPY]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osintgram</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osintgram-5944.png</image:loc><image:caption><![CDATA[An interactive shell to perform analysis on Instagram account of any users by its nickname.]]></image:caption><image:title><![CDATA[Osintgram]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osintname</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osintname-6504.png</image:loc><image:caption><![CDATA[Generate emails and usernames.]]></image:caption><image:title><![CDATA[osintname]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osintui</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osintui-3449.png</image:loc><image:caption><![CDATA[OSINT from your favorite services in a friendly terminal user interface.]]></image:caption><image:title><![CDATA[OSINTui]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osmedeus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osmedeus-9771.png</image:loc><image:caption><![CDATA[A Workflow Engine for Offensive Security]]></image:caption><image:title><![CDATA[Osmedeus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oss-fuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oss-fuzz-3287.png</image:loc><image:caption><![CDATA[Continuous Fuzzing for Open Source Software.]]></image:caption><image:title><![CDATA[OSS-Fuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osv</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osv-3665.png</image:loc><image:caption><![CDATA[A distributed vulnerability database for Open Source.]]></image:caption><image:title><![CDATA[OSV]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osx-password-dumper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osx-password-dumper-script-3291.png</image:loc><image:caption><![CDATA[Dump users's .plist on a Mac OS system and to convert them into a crackable hash.]]></image:caption><image:title><![CDATA[OSX Password Dumper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/osxauditor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/osxauditor-4299.png</image:loc><image:caption><![CDATA[Free Mac OS X computer forensics tool.]]></image:caption><image:title><![CDATA[OSXAuditor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/owasp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owasp-9356.png</image:loc><image:caption><![CDATA[A nonprofit foundation that works to improve the security of software.]]></image:caption><image:title><![CDATA[OWASP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/owasp-juice-shop</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owasp-juice-shop-2621.png</image:loc><image:caption><![CDATA[Probably the most modern and sophisticated insecure web application.]]></image:caption><image:title><![CDATA[OWASP Juice Shop]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/owasp-mastg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owasp-mastg-5978.png</image:loc><image:caption><![CDATA[Comprehensive manual for mobile application security testing and reverse engineering.]]></image:caption><image:title><![CDATA[owasp MASTG]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/owasp-masvs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owasp-masvs-1097.png</image:loc><image:caption><![CDATA[The industry standard for mobile application security.]]></image:caption><image:title><![CDATA[owasp MASVS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/owtf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/owtf-1379.png</image:loc><image:caption><![CDATA[A framework which tries to unite great tools and make pentesting more efficient.]]></image:caption><image:title><![CDATA[OWTF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oxml_xxe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oxml_xxe-1133.png</image:loc><image:caption><![CDATA[Embeds XXE/XML exploits into different filetypes.]]></image:caption><image:title><![CDATA[oxml_xxe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/oyente</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/oyente-9756.png</image:loc><image:caption><![CDATA[An analysis tool for smart contracts.]]></image:caption><image:title><![CDATA[oyente]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/p0f</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/p0f-5854.png</image:loc><image:caption><![CDATA[Identify the operating system of a target host simply by examining captured packets.]]></image:caption><image:title><![CDATA[p0f]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/p4wnp1-aloa</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/p4wnp1-aloa-1800.png</image:loc><image:caption><![CDATA[Turn a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming or PE.]]></image:caption><image:title><![CDATA[P4wnP1 A.L.O.A.]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pacu</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pacu-7835.png</image:loc><image:caption><![CDATA[The exploitation framework designed for testing the security of AWS environments.]]></image:caption><image:title><![CDATA[Pacu]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/padding-oracle-attacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/padding-oracle-attacker-3117.png</image:loc><image:caption><![CDATA[Execute padding oracle attacks with support for concurrent network requests and an elegant UI.]]></image:caption><image:title><![CDATA[padding-oracle-attacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pagodo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pagodo-1078.png</image:loc><image:caption><![CDATA[Automate google hacking database scraping and searching.]]></image:caption><image:title><![CDATA[pagodo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/param-miner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/param-miner-9938.png</image:loc><image:caption><![CDATA[Identifies hidden, unlinked parameters, useful for finding web cache poisoning vulnerabilities.]]></image:caption><image:title><![CDATA[param-miner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/parameth</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/parameth-2534.png</image:loc><image:caption><![CDATA[Brute discover GET and POST parameters.]]></image:caption><image:title><![CDATA[parameth]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/parampampam</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/parampampam-5019.png</image:loc><image:caption><![CDATA[This tool for brute discover GET and POST parameters.]]></image:caption><image:title><![CDATA[ParamPamPam]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/paramspider</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/paramspider-6624.PNG</image:loc><image:caption><![CDATA[Mining parameters from dark corners of Web Archives.]]></image:caption><image:title><![CDATA[ParamSpider]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/paros-proxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/paros-proxy-7090.png</image:loc><image:caption><![CDATA[HTTP(S) proxy for assessing web application vulnerability.]]></image:caption><image:title><![CDATA[Paros Proxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/parrotsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/parrotsec-6488.png</image:loc><image:caption><![CDATA[The ultimate framework for your cyber security operations.]]></image:caption><image:title><![CDATA[ParrotSec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/parsero</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/parsero-7496.png</image:loc><image:caption><![CDATA[Robots.txt audit tool.]]></image:caption><image:title><![CDATA[Parsero]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pass-station</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pass-station-4508.png</image:loc><image:caption><![CDATA[CLI & library to search for default credentials among thousands of products/vendors.]]></image:caption><image:title><![CDATA[pass-station]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/passivedns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/passivedns-7088.png</image:loc><image:caption><![CDATA[A network sniffer that logs all DNS server replies for use in a passive DNS setup.]]></image:caption><image:title><![CDATA[passiveDNS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/patator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/patator-3398.png</image:loc><image:caption><![CDATA[Multi-purpose brute-forcer, with a modular design and a flexible usage.]]></image:caption><image:title><![CDATA[Patator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/paygen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/paygen-5482.png</image:loc><image:caption><![CDATA[Tool to generate stable undetected payload.]]></image:caption><image:title><![CDATA[PayGen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/payloads-all-the-things</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/payloads-all-the-things-7200.png</image:loc><image:caption><![CDATA[A list of useful payloads and bypass for Web Application Security.]]></image:caption><image:title><![CDATA[Payloads All The Things]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pcapdroid</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pcapdroid-1142.png</image:loc><image:caption><![CDATA[No-root network monitor, firewall and PCAP dumper for Android.]]></image:caption><image:title><![CDATA[PCAPdroid]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pcapxray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pcapxray-6165.png</image:loc><image:caption><![CDATA[Visualize a packet capture offline as a network diagram including device identification.]]></image:caption><image:title><![CDATA[PcapXray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pcredz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pcredz-2046.png</image:loc><image:caption><![CDATA[This tool extracts secrets from a pcap file or from a live interface.]]></image:caption><image:title><![CDATA[PCredz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/peass-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/peass-ng-5873.png</image:loc><image:caption><![CDATA[Privilege Escalation Awesome Scripts SUITE.]]></image:caption><image:title><![CDATA[PEASS-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/peda</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/peda-2336.png</image:loc><image:caption><![CDATA[Python Exploit Development Assistance for GDB.]]></image:caption><image:title><![CDATA[peda]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pentest-mapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pentest-mapper-1307.png</image:loc><image:caption><![CDATA[Burp Suite extension for application pentest to write test cases and map flows and vulnerabilities.]]></image:caption><image:title><![CDATA[Pentest Mapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pentesterlab</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pentesterlab-4972.png</image:loc><image:caption><![CDATA[Learn Web Penetration Testing: The Right Way.]]></image:caption><image:title><![CDATA[PentesterLab]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pentesterland</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pentesterland-1013.png</image:loc><image:caption><![CDATA[Sharing knowledge that makes your life as bug hunters and pentesters easier.]]></image:caption><image:title><![CDATA[PentesterLand]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/persistencesniper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/persistencesniper-4498.jpg</image:loc><image:caption><![CDATA[Hunt persistences implanted in Windows machines.]]></image:caption><image:title><![CDATA[PersistenceSniper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/personal-security-checklist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/personal-security-checklist-5468.png</image:loc><image:caption><![CDATA[A compiled checklist of 300+ tips for protecting digital security and privacy.]]></image:caption><image:title><![CDATA[personal-security-checklist]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phishery</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phishery-1546.jpeg</image:loc><image:caption><![CDATA[An SSL enabled basic auth credential harvester with a Word document template URL injector.]]></image:caption><image:title><![CDATA[Phishery]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phishing-catcher</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phishing-catcher-4448.jpg</image:loc><image:caption><![CDATA[Phishing catcher using Certstream.]]></image:caption><image:title><![CDATA[Phishing Catcher]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phoneinfoga</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phoneinfoga-5481.png</image:loc><image:caption><![CDATA[Information gathering framework for phone numbers.]]></image:caption><image:title><![CDATA[PhoneInfoga]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phonesploit-pro</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phonesploit-pro-4111.png</image:loc><image:caption><![CDATA[Remotely exploit Android devices using ADB and Metasploit.]]></image:caption><image:title><![CDATA[PhoneSploit-Pro]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/photon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/photon-9614.png</image:loc><image:caption><![CDATA[Incredibly fast crawler designed for OSINT.]]></image:caption><image:title><![CDATA[Photon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phpggc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phpggc-7761.png</image:loc><image:caption><![CDATA[PHP unserialize() payloads along with a tool to generate them.]]></image:caption><image:title><![CDATA[PHPGGC]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phpsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phpsploit-5534.png</image:loc><image:caption><![CDATA[Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor.]]></image:caption><image:title><![CDATA[phpsploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/phunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/phunter-7053.png</image:loc><image:caption><![CDATA[OSINT tool allowing you to find various information via a phone number.]]></image:caption><image:title><![CDATA[Phunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pince</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pince-8364.png</image:loc><image:caption><![CDATA[Reverse engineering tool for linux games.]]></image:caption><image:title><![CDATA[PINCE]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pingcastle</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pingcastle-3412.png</image:loc><image:caption><![CDATA[Get Active Directory security at 80% in 20% of the time.]]></image:caption><image:title><![CDATA[pingcastle]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pipedream</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pipedream-6348.png</image:loc><image:caption><![CDATA[Collect HTTP or webhook requests and inspect them in a human-friendly way.]]></image:caption><image:title><![CDATA[pipedream]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pipeviewer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pipeviewer-6073.png</image:loc><image:caption><![CDATA[A tool that shows detailed information about named pipes in Windows.]]></image:caption><image:title><![CDATA[PipeViewer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pivotnacci</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pivotnacci-7205.png</image:loc><image:caption><![CDATA[A tool to make socks connections through HTTP agents.]]></image:caption><image:title><![CDATA[pivotnacci]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/plasma</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/plasma-6644.png</image:loc><image:caption><![CDATA[Interactive disassembler that generates indented pseudo-code with colored syntax.]]></image:caption><image:title><![CDATA[plasma]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/plution</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/plution-1193.png</image:loc><image:caption><![CDATA[Prototype pollution scanner using headless chrome.]]></image:caption><image:title><![CDATA[plution]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pmd</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pmd-4448.jpg</image:loc><image:caption><![CDATA[An extensible multilanguage static code analyzer.]]></image:caption><image:title><![CDATA[pmd]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/poastal</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/poastal-9596.png</image:loc><image:caption><![CDATA[The Email OSINT tool.]]></image:caption><image:title><![CDATA[Poastal]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pop</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pop-5023.png</image:loc><image:caption><![CDATA[Send emails from your terminal.]]></image:caption><image:title><![CDATA[Pop]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/porch-pirate</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/porch-pirate-2088.png</image:loc><image:caption><![CDATA[The most comprehensive Postman recon / OSINT client and framework.]]></image:caption><image:title><![CDATA[Porch-Pirate]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/portbender</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/portbender-5907.png</image:loc><image:caption><![CDATA[A TCP port redirection utility that allows inbound traffic redirection.]]></image:caption><image:title><![CDATA[PortBender]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/portswigger-cross-site-scripting-cheatsheet-data</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/portswigger-cross-site-scripting-cheatsheet-data-7661.png</image:loc><image:caption><![CDATA[All the XSS cheatsheet data to allow contributions from the community.]]></image:caption><image:title><![CDATA[PortSwigger Cross-Site Scripting cheatsheet data]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/portswigger-websecurity-academy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/portswigger-websecurity-academy-6589.png</image:loc><image:caption><![CDATA[Free, online web security training from the creators of Burp Suite.]]></image:caption><image:title><![CDATA[PortSwigger WebSecurity Academy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/poshc2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/poshc2-8410.png</image:loc><image:caption><![CDATA[A proxy aware C2 framework used to aid with post-exploitation and lateral movement.]]></image:caption><image:title><![CDATA[PoshC2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/postleaks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/postleaks-7725.png</image:loc><image:caption><![CDATA[Search for sensitive data in Postman public library.]]></image:caption><image:title><![CDATA[postleaks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/postmaniac</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/postmaniac-6377.png</image:loc><image:caption><![CDATA[Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces.]]></image:caption><image:title><![CDATA[postmaniac]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/postmessage_fuzz_tool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/postmessage_fuzz_tool-9426.png</image:loc><image:caption><![CDATA[A PostMessage fuzzing extension for Chrome.]]></image:caption><image:title><![CDATA[PostMessage_Fuzz_Tool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/postmessage-tracker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/postmessage-tracker-6921.png</image:loc><image:caption><![CDATA[A Chrome Extension to track postMessage usage (url, domain and stack).]]></image:caption><image:title><![CDATA[postMessage-tracker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powermad</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powermad-8528.png</image:loc><image:caption><![CDATA[PowerShell MachineAccountQuota and DNS exploit tools.]]></image:caption><image:title><![CDATA[Powermad]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powermayhem</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powermayhem-5290.png</image:loc><image:caption><![CDATA[Powershell payload generator In Bash !]]></image:caption><image:title><![CDATA[PowerMayhem]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powermeta</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powermeta-5437.png</image:loc><image:caption><![CDATA[Searches for publicly available files hosted on various websites for a particular domain.]]></image:caption><image:title><![CDATA[PowerMeta]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powermeup</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powermeup-5318.png</image:loc><image:caption><![CDATA[A small library of powershell scripts for post exploitation that you may need or use!]]></image:caption><image:title><![CDATA[PowerMeUp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powershdll</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powershdll-7169.png</image:loc><image:caption><![CDATA[Run PowerShell with rundll32 in order to bypass software restrictions.]]></image:caption><image:title><![CDATA[PowerShdll]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powersploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powersploit-3462.png</image:loc><image:caption><![CDATA[A PowerShell Post-Exploitation Framework.]]></image:caption><image:title><![CDATA[PowerSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/powerupsql</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/powerupsql-6172.png</image:loc><image:caption><![CDATA[A PowerShell toolkit for attacking SQL Server.]]></image:caption><image:title><![CDATA[PowerUpSQL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pown.js</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pown.js-6181.png</image:loc><image:caption><![CDATA[Security testing and exploitation toolkit.]]></image:caption><image:title><![CDATA[pown.js]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ppfuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ppfuzz-5557.jpg</image:loc><image:caption><![CDATA[A fast tool to scan client-side prototype pollution vulnerability written in Rust.]]></image:caption><image:title><![CDATA[ppfuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pphack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pphack-2769.jpg</image:loc><image:caption><![CDATA[The most advanced client-side prototype pollution scanner.]]></image:caption><image:title><![CDATA[pphack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ppmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ppmap-5254.png</image:loc><image:caption><![CDATA[Exploitation tool which leverages client-side Prototype Pollution to XSS.]]></image:caption><image:title><![CDATA[ppmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/prenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/prenum-4037.png</image:loc><image:caption><![CDATA[The perils of the pre-Windows 2000 compatible access group in a Windows domain.]]></image:caption><image:title><![CDATA[Prenum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/print-my-shell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/print-my-shell-3087.jpg</image:loc><image:caption><![CDATA[Automate the process of generating various reverse shells.]]></image:caption><image:title><![CDATA[Print-My-Shell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/privacynet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/privacynet-1568.png</image:loc><image:caption><![CDATA[Allow users to route Internet traffic through Tor and hide their real IP address.]]></image:caption><image:title><![CDATA[PrivacyNet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/prototype-pollution-exploits</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/prototype-pollution-exploits-4574.png</image:loc><image:caption><![CDATA[Prototype Pollution exploits collection.]]></image:caption><image:title><![CDATA[prototype-pollution-exploits]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/prowler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/prowler-7231.png</image:loc><image:caption><![CDATA[Open Source Security tool to perform Cloud Security best practices]]></image:caption><image:title><![CDATA[Prowler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/proxify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/proxify-2401.png</image:loc><image:caption><![CDATA[Swiss Army knife Proxy tool for HTTP(S) traffic capture, manipulation, and replay on the go.]]></image:caption><image:title><![CDATA[proxify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/proxmark3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/proxmark3-4493.png</image:loc><image:caption><![CDATA[RFID tool designed to snoop, listen and emulate everything from Low to High Frequency tags.]]></image:caption><image:title><![CDATA[proxmark3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/proxychains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/proxychains-6871.png</image:loc><image:caption><![CDATA[Force any TCP connection made by any given application to follow through proxy.]]></image:caption><image:title><![CDATA[proxychains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/proxychains-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/proxychains-ng-1575.png</image:loc><image:caption><![CDATA[Continuation of the unmaintained proxychains project.]]></image:caption><image:title><![CDATA[proxychains-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ps2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ps2-6970.png</image:loc><image:caption><![CDATA[A port scanner written purely in PowerShell.]]></image:caption><image:title><![CDATA[PS2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/psbypassclm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/psbypassclm-6073.jpeg</image:loc><image:caption><![CDATA[Bypass for PowerShell Constrained Language Mode.]]></image:caption><image:title><![CDATA[PSByPassCLM]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/psmapexec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/psmapexec-9971.png</image:loc><image:caption><![CDATA[A PowerShell tool heavily inspired by the popular tool CrackMapExec/NetExec.]]></image:caption><image:title><![CDATA[PsMapExec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pspy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pspy-8411.png</image:loc><image:caption><![CDATA[Unprivileged Linux process snooping.]]></image:caption><image:title><![CDATA[Pspy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/psudohash</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/psudohash-8079.png</image:loc><image:caption><![CDATA[Password list generator for orchestrating brute force attacks.]]></image:caption><image:title><![CDATA[psudohash]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/puncia</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/puncia-2955.png</image:loc><image:caption><![CDATA[Official CLI utility for Subdomain Center & Exploit Observer.]]></image:caption><image:title><![CDATA[Puncia]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pupy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pupy-1848.png</image:loc><image:caption><![CDATA[Opensource, cross-platform C2 and post-exploitation framework written in python and C.]]></image:caption><image:title><![CDATA[pupy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/puredns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/puredns-9922.png</image:loc><image:caption><![CDATA[Puredns is a fast domain resolver & subdomain bruteforcing tool.]]></image:caption><image:title><![CDATA[puredns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/purpleops</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/purpleops-2689.png</image:loc><image:caption><![CDATA[An open-source self-hosted purple team management web application.]]></image:caption><image:title><![CDATA[PurpleOps]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwnagotchi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwnagotchi-3718.png</image:loc><image:caption><![CDATA[Deep reinforcement learning instrumenting bettercap for WiFi pwning.]]></image:caption><image:title><![CDATA[pwnagotchi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwnat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwnat-7968.png</image:loc><image:caption><![CDATA[Punch holes through firewalls/NATs where both clients and servers can be behind separate NATs.]]></image:caption><image:title><![CDATA[pwnat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwncat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwncat-9057.png</image:loc><image:caption><![CDATA[Netcat on steroids with many extra features.]]></image:caption><image:title><![CDATA[pwncat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwndoc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwndoc-7010.jpg</image:loc><image:caption><![CDATA[Pentest report generator.]]></image:caption><image:title><![CDATA[PwnDoc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwndrop</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwndrop-8699.jpg</image:loc><image:caption><![CDATA[Self-deployable file hosting service allowing to easily upload and share payloads over HTTP and WebD.]]></image:caption><image:title><![CDATA[pwndrop]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwnfox</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwnfox-8797.png</image:loc><image:caption><![CDATA[A Firefox/Burp Suite extension that provide usefull tools for your security audit.]]></image:caption><image:title><![CDATA[PwnFox]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwnshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwnshell-8335.png</image:loc><image:caption><![CDATA[Command execution exploiter with an auto connection handling.]]></image:caption><image:title><![CDATA[PwnShell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pwntools</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pwntools-7596.png</image:loc><image:caption><![CDATA[CTF framework and exploit development library.]]></image:caption><image:title><![CDATA[pwntools]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pybuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pybuster-2525.png</image:loc><image:caption><![CDATA[A multi-target URL bruteforcer.]]></image:caption><image:title><![CDATA[pyBuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pycript</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pycript-2875.png</image:loc><image:caption><![CDATA[Bypass client-side encryption using custom logic for testing with Python and NodeJS.]]></image:caption><image:title><![CDATA[PyCript]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pydictor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pydictor-5971.png</image:loc><image:caption><![CDATA[A powerful and useful hacker dictionary builder for a brute-force attack.]]></image:caption><image:title><![CDATA[pydictor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pyexfil</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pyexfil-2594.png</image:loc><image:caption><![CDATA[Set as many exfiltration, techniques that CAN be used to bypass various.]]></image:caption><image:title><![CDATA[PyExfil]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pyfiscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pyfiscan-3833.png</image:loc><image:caption><![CDATA[Free web-application vulnerability and version scanner.]]></image:caption><image:title><![CDATA[pyfiscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pymeta</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pymeta-4757.png</image:loc><image:caption><![CDATA[Search the web for files on a domain to download and extract metadata.]]></image:caption><image:title><![CDATA[Pymeta]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pypykatz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pypykatz-6350.png</image:loc><image:caption><![CDATA[Mimikatz implementation in pure Python.]]></image:caption><image:title><![CDATA[pypykatz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pyrit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pyrit-8599.png</image:loc><image:caption><![CDATA[The famous WPA precomputed cracker.]]></image:caption><image:title><![CDATA[Pyrit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pyscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pyscan-5516.png</image:loc><image:caption><![CDATA[A dependency vulnerability scanner for your python projects, straight from the terminal.]]></image:caption><image:title><![CDATA[Pyscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pyshell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pyshell-4129.png</image:loc><image:caption><![CDATA[Multiplatform Python webshell.]]></image:caption><image:title><![CDATA[PyShell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/pywerview</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/pywerview-9176.png</image:loc><image:caption><![CDATA[A (partial) Python rewriting of PowerSploit's PowerView.]]></image:caption><image:title><![CDATA[pywerview]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qark</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qark-1489.png</image:loc><image:caption><![CDATA[Look for several security related Android application vulnerabilities.]]></image:caption><image:title><![CDATA[qark]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qbindiff</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qbindiff-3814.png</image:loc><image:caption><![CDATA[Experimental binary diffing tool addressing the diffing as a aetwork alignement quadratic problem.]]></image:caption><image:title><![CDATA[QBinDiff]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qemu</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qemu-4098.png</image:loc><image:caption><![CDATA[A generic and open source machine emulator and virtualizer.]]></image:caption><image:title><![CDATA[qemu]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qira</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qira-4831.png</image:loc><image:caption><![CDATA[QEMU Interactive Runtime Analyser.]]></image:caption><image:title><![CDATA[qira]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qscan-4321.png</image:loc><image:caption><![CDATA[Quick network scanner library.]]></image:caption><image:title><![CDATA[qscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qsfuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qsfuzz-7771.png</image:loc><image:caption><![CDATA[qsfuzz is a tool that allows to write simple rules in YAML that define what value to inject]]></image:caption><image:title><![CDATA[qsfuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qsinject</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qsinject-8124.png</image:loc><image:caption><![CDATA[Allows you to quickly substitute query string values with regex matches, one-at-a-time.]]></image:caption><image:title><![CDATA[qsinject]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qsreplace</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qsreplace-3312.png</image:loc><image:caption><![CDATA[Accept URLs on stdin, replace all query string values with a user-supplied value.]]></image:caption><image:title><![CDATA[qsreplace]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/quadrainspect</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/quadrainspect-7469.png</image:loc><image:caption><![CDATA[A comprehensive approach to the vulnerability analysis of Android application.]]></image:caption><image:title><![CDATA[QuadraInspect]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/qualys-cloud-platform</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/qualys-cloud-platform-2809.jpeg</image:loc><image:caption><![CDATA[The revolutionary architecture that powers Qualys' IT, security, and compliance cloud apps.]]></image:caption><image:title><![CDATA[Qualys Cloud Platform]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/quasar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/quasar-4683.png</image:loc><image:caption><![CDATA[Remote administration tool for Windows.]]></image:caption><image:title><![CDATA[Quasar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/quickjack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/quickjack-8972.png</image:loc><image:caption><![CDATA[Point-and-click tool for producing advanced clickjacking and frame-slicing attacks.]]></image:caption><image:title><![CDATA[Quickjack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/r3c0nizer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/r3c0nizer-2515.png</image:loc><image:caption><![CDATA[The first ever CLI based menu-driven web application B-Tier recon framework.]]></image:caption><image:title><![CDATA[R3C0Nizer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/raccoon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/raccoon-6242.png</image:loc><image:caption><![CDATA[A high performance offensive security tool for reconnaissance and vulnerability scanning.]]></image:caption><image:title><![CDATA[Raccoon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/race-the-web</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/race-the-web-2787.png</image:loc><image:caption><![CDATA[Tests for race conditions in web applications.]]></image:caption><image:title><![CDATA[Race The Web]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/racepwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/racepwn-5461.png</image:loc><image:caption><![CDATA[Race Condition framework.]]></image:caption><image:title><![CDATA[RacePWN]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/radar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/radar-6474.png</image:loc><image:caption><![CDATA[Identify technologies and services used by domains through their DNS footprints.]]></image:caption><image:title><![CDATA[RADAR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/radare2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/radare2-3945.png</image:loc><image:caption><![CDATA[UNIX-like reverse engineering framework and command-line toolset.]]></image:caption><image:title><![CDATA[radare2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/radareeye</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/radareeye-9446.png</image:loc><image:caption><![CDATA[Scan nearby devices and execute command when the target device comes in between range.]]></image:caption><image:title><![CDATA[RadareEye]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rainbowcrack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rainbowcrack-3789.png</image:loc><image:caption><![CDATA[It crack hashes with rainbow tables.]]></image:caption><image:title><![CDATA[RainbowCrack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rapidscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rapidscan-2192.png</image:loc><image:caption><![CDATA[The multi tool web vulnerability scanner.]]></image:caption><image:title><![CDATA[Rapidscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rate-limit-checker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rate-limit-checker-8745.png</image:loc><image:caption><![CDATA[Check whether the domain has a rate limit enabled.]]></image:caption><image:title><![CDATA[rate-limit-checker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ratproxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ratproxy-3213.png</image:loc><image:caption><![CDATA[A semi-automated largely passive web application security audit tool.]]></image:caption><image:title><![CDATA[ratproxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rdp-scraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rdp-scraper-8421.png</image:loc><image:caption><![CDATA[Enumerates users based off RDP Screenshots.]]></image:caption><image:title><![CDATA[RDP Scraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rdpy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rdpy-2717.png</image:loc><image:caption><![CDATA[Remote Desktop Protocol in twisted Python.]]></image:caption><image:title><![CDATA[rdpy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reapoc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reapoc-7757.png</image:loc><image:caption><![CDATA[OpenSource Poc && Vulnerable-Target Storage Box.]]></image:caption><image:title><![CDATA[reapoc]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reaver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reaver-4783.png</image:loc><image:caption><![CDATA[Implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs.]]></image:caption><image:title><![CDATA[Reaver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rebind</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rebind-3006.png</image:loc><image:caption><![CDATA[Implement the multiple A record DNS rebinding attack.]]></image:caption><image:title><![CDATA[Rebind]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/recollapse</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/recollapse-3663.png</image:loc><image:caption><![CDATA[Helper tool for black-box regex fuzzing to bypass validations.]]></image:caption><image:title><![CDATA[recollapse]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/recon-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/recon-ng-3519.png</image:loc><image:caption><![CDATA[OSINT tool aimed at reducing the time spent harvesting information from open sources.]]></image:caption><image:title><![CDATA[Recon-ng]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reconftw</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reconftw-9381.png</image:loc><image:caption><![CDATA[Runs the best set of tools to perform scanning and finding out vulnerabilities on a target domain.]]></image:caption><image:title><![CDATA[reconFTW]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reconness</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reconness-9049.png</image:loc><image:caption><![CDATA[Continuous recon and pipeline tools setup.]]></image:caption><image:title><![CDATA[ReconNess]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/recursebuster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/recursebuster-7998.jpg</image:loc><image:caption><![CDATA[Rapid content discovery tool for recursively querying webservers.]]></image:caption><image:title><![CDATA[RecurseBuster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/red-hawk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/red-hawk-8666.png</image:loc><image:caption><![CDATA[All in one tool for information gathering, vulnerability scanning and crawling.]]></image:caption><image:title><![CDATA[RED HAWK]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/redacted-request</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/redacted-request-7369.png</image:loc><image:caption><![CDATA[Enhance the security and confidentiality of HTTP request handling within the Burp Suite.]]></image:caption><image:title><![CDATA[Redacted Request]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/redelk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/redelk-5396.jpg</image:loc><image:caption><![CDATA[Tool for Red Teams used for tracking and alarming about Blue Team activities.]]></image:caption><image:title><![CDATA[RedELK]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/redeye</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/redeye-8341.png</image:loc><image:caption><![CDATA[RedEye is a visual analytic tool supporting Red & Blue Team operations.]]></image:caption><image:title><![CDATA[RedEye]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/redhunt-os</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/redhunt-os-7840.jpeg</image:loc><image:caption><![CDATA[Virtual machine for adversary emulation and threat hunting.]]></image:caption><image:title><![CDATA[RedHunt-OS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/redteam_toolkit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/redteam_toolkit-5412.png</image:loc><image:caption><![CDATA[Open source Django offensive webapp which is keeping the best tools used in the redteaming.]]></image:caption><image:title><![CDATA[RedTeam_toolkit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reduh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reduh-8608.png</image:loc><image:caption><![CDATA[Create a TCP circuit through validly formed HTTP requests.]]></image:caption><image:title><![CDATA[reDuh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/regeorg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/regeorg-3340.png</image:loc><image:caption><![CDATA[Pwn a bastion webserver and create SOCKS proxies through the DMZ.]]></image:caption><image:title><![CDATA[reGeorg]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/regstrike</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/regstrike-9019.png</image:loc><image:caption><![CDATA[RegStrike is a .reg payload generator.]]></image:caption><image:title><![CDATA[RegStrike]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/regulator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/regulator-1012.png</image:loc><image:caption><![CDATA[Automated learning of regexes for DNS discovery.]]></image:caption><image:title><![CDATA[regulator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rekall</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rekall-8432.png</image:loc><image:caption><![CDATA[Rekall Memory Forensic Framework.]]></image:caption><image:title><![CDATA[rekall]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rekono</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rekono-5160.png</image:loc><image:caption><![CDATA[Execute full pentesting processes combining multiple hacking tools automatically.]]></image:caption><image:title><![CDATA[Rekono]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/related-domains</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/related-domains-7813.png</image:loc><image:caption><![CDATA[Find related domains of a given domain.]]></image:caption><image:title><![CDATA[related-domains]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rengine</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rengine-1266.png</image:loc><image:caption><![CDATA[Automated reconnaissance framework for webapps, highly configurable streamlined recon process.]]></image:caption><image:title><![CDATA[Rengine]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/replicator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/replicator-4603.png</image:loc><image:caption><![CDATA[Burp Suite extension to help developers replicate findings from pentests.]]></image:caption><image:title><![CDATA[Replicator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/repo-supervisor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/repo-supervisor-3521.png</image:loc><image:caption><![CDATA[Scan your code for security misconfiguration, search for passwords and secrets.]]></image:caption><image:title><![CDATA[repo-supervisor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/request-highlighter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/request-highlighter-1754.png</image:loc><image:caption><![CDATA[Burp Suite extension that automatically highlights different HTTP requests.]]></image:caption><image:title><![CDATA[Request Highlighter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/requests-racer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/requests-racer-7654.png</image:loc><image:caption><![CDATA[Exploit race conditions in web apps with Requests.]]></image:caption><image:title><![CDATA[Requests-Racer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/resolvers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/resolvers-5324.png</image:loc><image:caption><![CDATA[The most exhaustive list of reliable DNS resolvers.]]></image:caption><image:title><![CDATA[resolvers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/responder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/responder-8805.png</image:loc><image:caption><![CDATA[Responder is a LLMNR, NBT-NS and MDNS poisoner.]]></image:caption><image:title><![CDATA[Responder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/restler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/restler-1482.png</image:loc><image:caption><![CDATA[A stateful fuzzing tool for automatically testing cloud services through their REST APIs.]]></image:caption><image:title><![CDATA[RESTler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/retire.js</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/retire.js-8084.png</image:loc><image:caption><![CDATA[Detects the use of JavaScript libraries with known vulnerabilities.]]></image:caption><image:title><![CDATA[Retire.js]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rsg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reverse-shell-generator-7987.png</image:loc><image:caption><![CDATA[A tool to generate various ways to do a reverse shell.]]></image:caption><image:title><![CDATA[Reverse Shell Generator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reverse-shell-generator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reverse-shell-generator-7205.png</image:loc><image:caption><![CDATA[Hosted Reverse Shell generator with a ton of functionality.]]></image:caption><image:title><![CDATA[reverse-shell-generator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/reversekit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/reversekit-6784.png</image:loc><image:caption><![CDATA[A dynamic reverse engineering toolkit.]]></image:caption><image:title><![CDATA[ReverseKit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/revshells</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/revshells-8116.png</image:loc><image:caption><![CDATA[Hosted Reverse Shell generator with a ton of functionality.]]></image:caption><image:title><![CDATA[RevShells]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rexsser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rexsser-9816.jpeg</image:loc><image:caption><![CDATA[Burp Suite plugin that extracts keywords from response using and test for reflected XSS.]]></image:caption><image:title><![CDATA[rexsser]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ridrelay</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ridrelay-3637.png</image:loc><image:caption><![CDATA[Enumerate usernames on a domain where you have no creds by using SMB relay.]]></image:caption><image:title><![CDATA[RidRelay]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ripgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ripgen-3516.png</image:loc><image:caption><![CDATA[Rust-based high performance domain permutation generator.]]></image:caption><image:title><![CDATA[ripgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rock-on</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rock-on-4547.png</image:loc><image:caption><![CDATA[All in one recon tool that just get a single domain name and do all of the work alone.]]></image:caption><image:title><![CDATA[Rock-ON]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ronin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ronin-1217.png</image:loc><image:caption><![CDATA[A free and open source Ruby toolkit for security research and development.]]></image:caption><image:title><![CDATA[Ronin]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rootkit-hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rootkit-hunter-6421.png</image:loc><image:caption><![CDATA[Scans for rootkits, backdoors and possible local exploits.]]></image:caption><image:title><![CDATA[Rootkit Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/routersploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/routersploit-6848.png</image:loc><image:caption><![CDATA[Exploitation framework for embedded devices.]]></image:caption><image:title><![CDATA[RouterSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rsactftool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rsactftool-4168.jpg</image:loc><image:caption><![CDATA[RSA multi-attacks tool: uncypher data from a weak public key and try to recover a private key.]]></image:caption><image:title><![CDATA[RsaCtfTool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rubeus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rubeus-3607.png</image:loc><image:caption><![CDATA[Rubeus is a toolkit for Kerberos interaction and abuses.]]></image:caption><image:title><![CDATA[Rubeus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ruler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ruler-7423.png</image:loc><image:caption><![CDATA[A tool to abuse Exchange services.]]></image:caption><image:title><![CDATA[ruler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/runtime-mobile-security</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/runtime-mobile-security-6838.png</image:loc><image:caption><![CDATA[A powerful web interface that helps you to manipulate Android and iOS Apps at Runtime.]]></image:caption><image:title><![CDATA[Runtime Mobile Security]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rush</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rush-2222.png</image:loc><image:caption><![CDATA[A cross-platform command-line tool for executing jobs in parallel.]]></image:caption><image:title><![CDATA[rush]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rusthound</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rusthound-8851.png</image:loc><image:caption><![CDATA[Active Directory data collector for BloodHound written in Rust.]]></image:caption><image:title><![CDATA[RustHound]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rustscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rustscan-4840.png</image:loc><image:caption><![CDATA[The Modern Port Scanner. Fast, smart, effective.]]></image:caption><image:title><![CDATA[RustScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/rusty-hog</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/rusty-hog-3082.png</image:loc><image:caption><![CDATA[A suite of secret scanners built in Rust for performance.]]></image:caption><image:title><![CDATA[Rusty Hog]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3-objects-check</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3-objects-check-6073.png</image:loc><image:caption><![CDATA[Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.]]></image:caption><image:title><![CDATA[S3 Objects Check]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3-buckets-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3-buckets-finder-4453.png</image:loc><image:caption><![CDATA[Find AWS S3 buckets and test their permissions.]]></image:caption><image:title><![CDATA[s3-buckets-finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3bucketlist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3bucketlist-2889.png</image:loc><image:caption><![CDATA[Firefox plugin that lists Amazon S3 Buckets found in requests.]]></image:caption><image:title><![CDATA[S3BucketList]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3cario</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3cario-2515.png</image:loc><image:caption><![CDATA[Performs buckets checks from a given list of subdomains.]]></image:caption><image:title><![CDATA[s3cario]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3cruze</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3cruze-5278.png</image:loc><image:caption><![CDATA[All-in-one AWS S3 bucket tool.]]></image:caption><image:title><![CDATA[S3Cruze]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3cxsser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3cxsser-3022.png</image:loc><image:caption><![CDATA[This extension will help you to detect GET/POST based XSS vulnerability in any website easily.]]></image:caption><image:title><![CDATA[s3cXSSer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3recon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3recon-8061.png</image:loc><image:caption><![CDATA[Amazon S3 bucket finder and crawler.]]></image:caption><image:title><![CDATA[s3recon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3reverse</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3reverse-2862.png</image:loc><image:caption><![CDATA[The format of various S3 buckets is convert in one format.]]></image:caption><image:title><![CDATA[s3reverse]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3scanner-5780.png</image:loc><image:caption><![CDATA[Scan for open S3 buckets and dump the contents.]]></image:caption><image:title><![CDATA[S3Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3tk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3tk-4908.png</image:loc><image:caption><![CDATA[A security toolkit for Amazon S3.]]></image:caption><image:title><![CDATA[s3tk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/s3viewer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/s3viewer-5826.jpg</image:loc><image:caption><![CDATA[Publicly open storage viewer.]]></image:caption><image:title><![CDATA[S3Viewer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/saas-sentinel</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/saas-sentinel-2598.png</image:loc><image:caption><![CDATA[Be notified when your favorite tool may be at risk.]]></image:caption><image:title><![CDATA[SaaS Sentinel]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/safecopy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/safecopy-2103.png</image:loc><image:caption><![CDATA[Burp Extension for copying requests safely.]]></image:caption><image:title><![CDATA[safecopy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/safeline</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/safeline-6738.png</image:loc><image:caption><![CDATA[A self-hosted WAF to protect web applications from cyber attacks.]]></image:caption><image:title><![CDATA[SafeLine]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/samurai-wtf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/samurai-wtf-4492.png</image:loc><image:caption><![CDATA[The best security training environment for developers and AppSec professionals.]]></image:caption><image:title><![CDATA[Samurai WTF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sandcastle</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sandcastle-1954.png</image:loc><image:caption><![CDATA[A Python script for AWS S3 bucket enumeration.]]></image:caption><image:title><![CDATA[Sandcastle]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sandsifter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sandsifter-8774.png</image:loc><image:caption><![CDATA[The x86 processor fuzzer.]]></image:caption><image:title><![CDATA[sandsifter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/saycheese</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/saycheese-4132.png</image:loc><image:caption><![CDATA[Grab target's webcam shots by link.]]></image:caption><image:title><![CDATA[SayCheese]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sayhello</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sayhello-9335.png</image:loc><image:caption><![CDATA[Improved version of SayCheese, designed to capture images via social engineering.]]></image:caption><image:title><![CDATA[SayHello]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sbomb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sbomb-2150.png</image:loc><image:caption><![CDATA[SBOM parser that performs cursory vulnerability assessment.]]></image:caption><image:title><![CDATA[SBOMb]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scan-check-builder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scan-check-builder-8599.png</image:loc><image:caption><![CDATA[Burp Suite extension which helps to improve the active and passive scanner by yourself.]]></image:caption><image:title><![CDATA[scan-check-builder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scancannon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scancannon-6789.jpeg</image:loc><image:caption><![CDATA[Combines the speed of masscan with the reliability and detailed enumeration of nmap.]]></image:caption><image:title><![CDATA[ScanCannon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scanless</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scanless-3637.png</image:loc><image:caption><![CDATA[Online port scan scraper.]]></image:caption><image:title><![CDATA[scanless]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scapy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scapy-1311.png</image:loc><image:caption><![CDATA[Powerful and interactive packet manipulation program and library.]]></image:caption><image:title><![CDATA[Scapy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scarecrow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scarecrow-6854.png</image:loc><image:caption><![CDATA[Payload creation framework designed around EDR bypass.]]></image:caption><image:title><![CDATA[ScareCrow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scavenger</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scavenger-3755.png</image:loc><image:caption><![CDATA[Burp Suite extension to create target specific and tailored wordlist from burp history.]]></image:caption><image:title><![CDATA[Scavenger]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scilla</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scilla-3022.png</image:loc><image:caption><![CDATA[Information Gathering tool - DNS / Subdomains / Ports / Directories enumeration.]]></image:caption><image:title><![CDATA[Scilla]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scopehunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scopehunter-4131.png</image:loc><image:caption><![CDATA[Command-line tool for finding in-scope targets for bug bounty programs.]]></image:caption><image:title><![CDATA[ScopeHunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scopein</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scopein-5443.png</image:loc><image:caption><![CDATA[A Go tool for scope management.]]></image:caption><image:title><![CDATA[Scopein]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scopify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scopify-6980.png</image:loc><image:caption><![CDATA[Netify.ai reconnaissance tool.]]></image:caption><image:title><![CDATA[Scopify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scout</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scout-6446.png</image:loc><image:caption><![CDATA[Discover a web server's undisclosed files, directories and VHOSTs.]]></image:caption><image:title><![CDATA[Scout]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scoutsuite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scoutsuite-1531.png</image:loc><image:caption><![CDATA[Multi-cloud security auditing tool.]]></image:caption><image:title><![CDATA[ScoutSuite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scrapedin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scrapedin-6528.png</image:loc><image:caption><![CDATA[Scrape LinkedIn without API restrictions for data reconnaissance.]]></image:caption><image:title><![CDATA[ScrapedIn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scrapein</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scrapein-4321.png</image:loc><image:caption><![CDATA[Harvest employee email addresses from a specific company through LinkedIn.]]></image:caption><image:title><![CDATA[ScrapeIn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/screenshooter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/screenshooter-6047.png</image:loc><image:caption><![CDATA[Convert your masscan/subdomain-scan results into screenshots for better analysis.]]></image:caption><image:title><![CDATA[ScreenShooter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/screenshoteer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/screenshoteer-7507.png</image:loc><image:caption><![CDATA[Makes web screenshots and mobile emulations from the command line.]]></image:caption><image:title><![CDATA[Screenshoteer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scriptsentry</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scriptsentry-7170.png</image:loc><image:caption><![CDATA[ScriptSentry finds misconfigured and dangerous logon scripts.]]></image:caption><image:title><![CDATA[ScriptSentry]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scrying</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scrying-1185.png</image:loc><image:caption><![CDATA[Collects RDP, web and VNC screenshots all in one place.]]></image:caption><image:title><![CDATA[Scrying]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/scumblr</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/scumblr-1784.png</image:loc><image:caption><![CDATA[Perform periodic syncs of data sources and performing analysis on the identified results.]]></image:caption><image:title><![CDATA[Scumblr]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sdbf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sdbf-1882.png</image:loc><image:caption><![CDATA[Smart DNS Brute Forcer.]]></image:caption><image:title><![CDATA[SDBF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/searchsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/searchsploit-5661.png</image:loc><image:caption><![CDATA[Cli tool for Exploit-DB that also allows you to take a copy of Exploit Database with you.]]></image:caption><image:title><![CDATA[SearchSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/seatbelt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/seatbelt-5828.png</image:loc><image:caption><![CDATA[Performs security oriented safety checks relevant from offensive/defensive security perspectives.]]></image:caption><image:title><![CDATA[Seatbelt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secbutler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secbutler-2392.png</image:loc><image:caption><![CDATA[The perfect butler for pentesters, bug-bounty hunters and security researchers.]]></image:caption><image:title><![CDATA[secbutler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secgen-1372.png</image:loc><image:caption><![CDATA[Create randomly insecure VMs.]]></image:caption><image:title><![CDATA[SecGen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/seclists</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/seclists-4043.png</image:loc><image:caption><![CDATA[Collection of multiple types of lists used during security assessments, collected in one place.]]></image:caption><image:title><![CDATA[SecLists]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/second-order</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/second-order-5879.png</image:loc><image:caption><![CDATA[Second-order subdomain takeover scanner.]]></image:caption><image:title><![CDATA[Second Order]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secret-bridge</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secret-bridge-7818.png</image:loc><image:caption><![CDATA[Monitors Github for leaked secrets.]]></image:caption><image:title><![CDATA[secret-bridge]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secretfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secretfinder-3963.png</image:loc><image:caption><![CDATA[SecretFinder is a script based on LinkFinder, written to find sensitive data in JavaScript files.]]></image:caption><image:title><![CDATA[SecretFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secretmagpie</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secretmagpie-9362.png</image:loc><image:caption><![CDATA[Secret Detection Tool.]]></image:caption><image:title><![CDATA[SecretMagpie]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/secretscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/secretscanner-1556.png</image:loc><image:caption><![CDATA[Find secrets and passwords in container images and file systems.]]></image:caption><image:title><![CDATA[SecretScanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/security_monkey</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/security_monkey-5844.png</image:loc><image:caption><![CDATA[Monitor AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.]]></image:caption><image:title><![CDATA[Security Monkey]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/securityonion</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/securityonion-4198.png</image:loc><image:caption><![CDATA[Free and open platform for threat hunting, enterprise security monitoring, and log management.]]></image:caption><image:title><![CDATA[securityonion]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/securitytrails</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/securitytrails-6437.png</image:loc><image:caption><![CDATA[Data for Security companies, researchers and teams.]]></image:caption><image:title><![CDATA[SecurityTrails]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/see-surf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/see-surf-5101.png</image:loc><image:caption><![CDATA[Detect Vulnerable SSRF parameters.]]></image:caption><image:title><![CDATA[See-SURF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/seela</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/seela-7302.jpg</image:loc><image:caption><![CDATA[Boost the cybersecurity skills of your teams with the cyber knowledge library.]]></image:caption><image:title><![CDATA[Seela]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/semgrep</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/semgrep-2992.png</image:loc><image:caption><![CDATA[Lightweight static analysis for many languages.]]></image:caption><image:title><![CDATA[Semgrep]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sentryssrf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sentryssrf-4866.png</image:loc><image:caption><![CDATA[Searching for Sentry config on page or in Javascript files and check blind SSRF.]]></image:caption><image:title><![CDATA[sentrySSRF]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/server-side-prototype-pollution</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/server-side-prototype-pollution-1468.png</image:loc><image:caption><![CDATA[Identifies server-side prototype pollution vulnerabilities.]]></image:caption><image:title><![CDATA[server-side-prototype-pollution]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sessionprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sessionprobe-7141.png</image:loc><image:caption><![CDATA[Evaluate user privileges in web applications across a list of URLs.]]></image:caption><image:title><![CDATA[SessionProbe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sguil</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sguil-2087.png</image:loc><image:caption><![CDATA[The analyst console for network security monitoring.]]></image:caption><image:title><![CDATA[Sguil]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shad0w</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shad0w-5426.png</image:loc><image:caption><![CDATA[A post exploitation framework designed to operate covertly on heavily monitored environments.]]></image:caption><image:title><![CDATA[shad0w]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shadow-workers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shadow-workers-3840.png</image:loc><image:caption><![CDATA[C2 and proxy designed to help in the exploitation of XSS and malicious Service Workers.]]></image:caption><image:title><![CDATA[Shadow Workers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shadowspray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shadowspray-8151.png</image:loc><image:caption><![CDATA[Spray shadow credentials across an entire domain.]]></image:caption><image:title><![CDATA[ShadowSpray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shapeshifter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shapeshifter-8800.png</image:loc><image:caption><![CDATA[GraphQL security testing tool.]]></image:caption><image:title><![CDATA[ShapeShifter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharpc2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharpc2-2062.png</image:loc><image:caption><![CDATA[Command and Control Framework written in C#.]]></image:caption><image:title><![CDATA[SharpC2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharpcookiemonster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharpcookiemonster-4118.png</image:loc><image:caption><![CDATA[Extracts cookies from Chrome.]]></image:caption><image:title><![CDATA[SharpCookieMonster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharpersist</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharpersist-6709.png</image:loc><image:caption><![CDATA[Windows persistence toolkit written in C#.]]></image:caption><image:title><![CDATA[SharPersist]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharphose</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharphose-3353.png</image:loc><image:caption><![CDATA[Asynchronous password spraying tool for Windows environments.]]></image:caption><image:title><![CDATA[SharpHose]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharpimpersonation</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharpimpersonation-9846.png</image:loc><image:caption><![CDATA[A User Impersonation tool - via Token or Shellcode injection.]]></image:caption><image:title><![CDATA[SharpImpersonation]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sharpsccm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sharpsccm-3768.png</image:loc><image:caption><![CDATA[A post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager.]]></image:caption><image:title><![CDATA[SharpSCCM]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shazzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shazzer-9228.png</image:loc><image:caption><![CDATA[Automatically create cheat sheets from all relevant vectors on the system.]]></image:caption><image:title><![CDATA[Shazzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shellcrypt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shellcrypt-9027.png</image:loc><image:caption><![CDATA[A QoL tool to obfuscate shellcode.]]></image:caption><image:title><![CDATA[Shellcrypt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shelling</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shelling-2428.png</image:loc><image:caption><![CDATA[A comprehensive OS command injection payload generator.]]></image:caption><image:title><![CDATA[Shelling]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shellpop</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shellpop-7589.jpeg</image:loc><image:caption><![CDATA[Pop shells like a master.]]></image:caption><image:title><![CDATA[ShellPop]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shells</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shells-9827.png</image:loc><image:caption><![CDATA[A script for generating common revshells fast and easily.]]></image:caption><image:title><![CDATA[Shells]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sherlock</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sherlock-6478.png</image:loc><image:caption><![CDATA[Hunt down social media accounts by username across social networks.]]></image:caption><image:title><![CDATA[Sherlock]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shhgit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shhgit-6349.jpg</image:loc><image:caption><![CDATA[Secrets detection for your GitHub, GitLab and Bitbucket repositories.]]></image:caption><image:title><![CDATA[shhgit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shodan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shodan-9997.png</image:loc><image:caption><![CDATA[Search engine for Internet-connected devices.]]></image:caption><image:title><![CDATA[Shodan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shosubgo</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shosubgo-4423.png</image:loc><image:caption><![CDATA[Small tool to grab subdomains using Shodan API.]]></image:caption><image:title><![CDATA[shosubgo]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shotlooter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shotlooter-1133.png</image:loc><image:caption><![CDATA[Find sensitive data inside the screenshots uploaded to prnt.sc.]]></image:caption><image:title><![CDATA[Shotlooter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shucknt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shucknt-6615.png</image:loc><image:caption><![CDATA[Dowgrade, convert, dissect and shuck authentication token based on Data Encryption Standard.]]></image:caption><image:title><![CDATA[ShuckNT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/shuffledns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/shuffledns-9927.png</image:loc><image:caption><![CDATA[Enumerate valid subdomains using active bruteforce and DNS resolution.]]></image:caption><image:title><![CDATA[shuffleDNS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sicat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sicat-1173.png</image:loc><image:caption><![CDATA[Advanced exploit search tool designed to identify and gather information about exploits.]]></image:caption><image:title><![CDATA[SiCat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/simple-basic-malware-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/simple-basic-malware-scanner-1747.jpg</image:loc><image:caption><![CDATA[Simple Malware Scanner based on file hash scan.]]></image:caption><image:title><![CDATA[Simple Basic Malware Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/simplyemail</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/simplyemail-5967.png</image:loc><image:caption><![CDATA[Email recon made fast and easy, with a framework to build on.]]></image:caption><image:title><![CDATA[SimplyEmail]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sirius</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sirius-8433.png</image:loc><image:caption><![CDATA[Truly open-source general purpose vulnerability scanner.]]></image:caption><image:title><![CDATA[Sirius]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sitebroker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sitebroker-5723.png</image:loc><image:caption><![CDATA[Utility for information gathering and penetration testing automation.]]></image:caption><image:title><![CDATA[SiteBroker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/skanuvaty</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/skanuvaty-2392.jpg</image:loc><image:caption><![CDATA[Dangerously fast DNS/network/port scanner.]]></image:caption><image:title><![CDATA[Skanuvaty]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/skipfish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/skipfish-9305.png</image:loc><image:caption><![CDATA[Active web application security reconnaissance tool.]]></image:caption><image:title><![CDATA[skipfish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/slack-watchman</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/slack-watchman-4498.png</image:loc><image:caption><![CDATA[Monitoring your Slack workspaces for sensitive informations.]]></image:caption><image:title><![CDATA[Slack Watchman]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sleepy-puppy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sleepy-puppy-4411.png</image:loc><image:caption><![CDATA[Sleepy Puppy XSS Payload Management Framework.]]></image:caption><image:title><![CDATA[Sleepy Puppy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sleuthql</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sleuthql-6746.png</image:loc><image:caption><![CDATA[Burp History parsing tool to discover potential SQL injection points.]]></image:caption><image:title><![CDATA[SleuthQL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/slither</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/slither-7251.png</image:loc><image:caption><![CDATA[Static analyzer for Solidity.]]></image:caption><image:title><![CDATA[slither]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sliver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sliver-1149.png</image:loc><image:caption><![CDATA[Adversary emulation framework.]]></image:caption><image:title><![CDATA[sliver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/slurp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/slurp-3786.png</image:loc><image:caption><![CDATA[A blazing fast & feature rich Amazon S3 bucket enumerator.]]></image:caption><image:title><![CDATA[Slurp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smap-7189.png</image:loc><image:caption><![CDATA[A drop-in replacement for Nmap powered by shodan.io.]]></image:caption><image:title><![CDATA[smap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smb-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smb-scanner-4694.png</image:loc><image:caption><![CDATA[Samba scanning tool.]]></image:caption><image:title><![CDATA[smb-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbat-8977.png</image:loc><image:caption><![CDATA[Find secrets in file and secret files among the SMB target shares.]]></image:caption><image:title><![CDATA[SMBAT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbcrawler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbcrawler-5100.png</image:loc><image:caption><![CDATA[No-nonsense tool that takes credentials and a list of hosts and crawls through those shares.]]></image:caption><image:title><![CDATA[smbcrawler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbeagle</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbeagle-9695.png</image:loc><image:caption><![CDATA[Fileshare auditing tool.]]></image:caption><image:title><![CDATA[SMBeagle]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbetray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbetray-2857.png</image:loc><image:caption><![CDATA[Attack clients through file content swapping and compromise any data passed in cleartext.]]></image:caption><image:title><![CDATA[SMBetray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbmap-8969.png</image:loc><image:caption><![CDATA[A handy SMB enumeration tool.]]></image:caption><image:title><![CDATA[smbmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smbploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smbploit-7626.png</image:loc><image:caption><![CDATA[Offensive tool to scan & exploit vulnerabilities in Windows over SMB using Metasploit.]]></image:caption><image:title><![CDATA[SMBploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smogcloud</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smogcloud-2801.png</image:loc><image:caption><![CDATA[Find cloud assets that no one wants exposed.]]></image:caption><image:title><![CDATA[Smogcloud]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smugglefuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smugglefuzz-4739.png</image:loc><image:caption><![CDATA[A rapid HTTP downgrade smuggling scanner written in Go.]]></image:caption><image:title><![CDATA[SmuggleFuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/smuggler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/smuggler-3124.png</image:loc><image:caption><![CDATA[An HTTP Request Smuggling / Desync testing tool.]]></image:caption><image:title><![CDATA[Smuggler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sn1per</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sn1per-6715.png</image:loc><image:caption><![CDATA[Attack Surface Management Platform.]]></image:caption><image:title><![CDATA[Sn1per]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/snaffler</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/snaffler-2882.png</image:loc><image:caption><![CDATA[A tool to help at finding delicious candy needles in a bunch of horrible boring haystacks.]]></image:caption><image:title><![CDATA[Snaffler]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/snallygaster</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/snallygaster-7334.png</image:loc><image:caption><![CDATA[Tool to scan for secret files on HTTP servers.]]></image:caption><image:title><![CDATA[snallygaster]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sniff-paste</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sniff-paste-4326.png</image:loc><image:caption><![CDATA[Pastebin OSINT harvester.]]></image:caption><image:title><![CDATA[Sniff-Paste]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sniffair</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sniffair-1465.png</image:loc><image:caption><![CDATA[A framework for wireless pentesting.]]></image:caption><image:title><![CDATA[SniffAir]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sns-6830.png</image:loc><image:caption><![CDATA[IIS shortname scanner written in Go.]]></image:caption><image:title><![CDATA[sns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/soaphound</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/soaphound-2591.png</image:loc><image:caption><![CDATA[Enumerate Active Directory environments via the Active Directory Web Services (ADWS) protocol.]]></image:caption><image:title><![CDATA[SOAPHound]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/social-mapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/social-mapper-3882.png</image:loc><image:caption><![CDATA[A social media enumeration & correlation tool.]]></image:caption><image:title><![CDATA[Social Mapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/socialfish</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/socialfish-4480.png</image:loc><image:caption><![CDATA[Phishing tool & information collector.]]></image:caption><image:title><![CDATA[SocialFish]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/socialhunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/socialhunter-2887.png</image:loc><image:caption><![CDATA[Crawls the website and finds broken social media links that can be hijacked]]></image:caption><image:title><![CDATA[socialhunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/socialpwned</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/socialpwned-9503.png</image:loc><image:caption><![CDATA[Allows to get the emails from a target published in social networks to find possible credentials.]]></image:caption><image:title><![CDATA[SocialPwned]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sonarqube</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sonarqube-8833.png</image:loc><image:caption><![CDATA[Continuous inspection.]]></image:caption><image:title><![CDATA[sonarqube]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sonarsearch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sonarsearch-1434.png</image:loc><image:caption><![CDATA[A rapid API for the project Sonar dataset.]]></image:caption><image:title><![CDATA[SonarSearch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sops</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sops-8905.jpg</image:loc><image:caption><![CDATA[Simple and flexible tool for managing secrets.]]></image:caption><image:title><![CDATA[sops]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sort</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sort-6264.png</image:loc><image:caption><![CDATA[The next generation Snort Intrusion Prevention System.]]></image:caption><image:title><![CDATA[Sort++]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sourcegraph</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sourcegraph-3204.png</image:loc><image:caption><![CDATA[Search millions of open source repositories.]]></image:caption><image:title><![CDATA[Sourcegraph]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sourcemapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sourcemapper-2368.png</image:loc><image:caption><![CDATA[Extract JavaScript source trees from source map files.]]></image:caption><image:title><![CDATA[sourcemapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spaces-finder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spaces-finder-5614.png</image:loc><image:caption><![CDATA[A tool to hunt for publicly accessible DigitalOcean Spaces.]]></image:caption><image:title><![CDATA[spaces-finder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spamscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spamscanner-4986.png</image:loc><image:caption><![CDATA[Node.js anti-spam, email filtering, and phishing prevention tool and service.]]></image:caption><image:title><![CDATA[spamscanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spiderfoot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spiderfoot-1555.png</image:loc><image:caption><![CDATA[Automates OSINT for threat intelligence and mapping your attack surface.]]></image:caption><image:title><![CDATA[SpiderFoot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spidersuite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spidersuite-9088.jpg</image:loc><image:caption><![CDATA[Advanced web spider/crawler for cyber security professionals.]]></image:caption><image:title><![CDATA[SpiderSuite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sploitus</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sploitus-8813.png</image:loc><image:caption><![CDATA[Exploits & tools search engine.]]></image:caption><image:title><![CDATA[Sploitus]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/splunk</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/splunk-4143.png</image:loc><image:caption><![CDATA[The unified security and observability platform.]]></image:caption><image:title><![CDATA[Splunk]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spoofcheck</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spoofcheck-2858.png</image:loc><image:caption><![CDATA[Simple script that checks a domain for email protection.]]></image:caption><image:title><![CDATA[spoofcheck]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spoofy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spoofy-3647.png</image:loc><image:caption><![CDATA[Checks if a list of domains can be spoofed based on SPF and DMARC records.]]></image:caption><image:title><![CDATA[Spoofy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spoolsploit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spoolsploit-3342.png</image:loc><image:caption><![CDATA[Collection of Windows print spooler exploits and other utilities for practical exploitation.]]></image:caption><image:title><![CDATA[SpoolSploit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spraycannon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spraycannon-7674.png</image:loc><image:caption><![CDATA[Fast multithreaded password spraying tool with backend database.]]></image:caption><image:title><![CDATA[SprayCannon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spraykatz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spraykatz-5617.png</image:loc><image:caption><![CDATA[Credentials gathering tool automating remote procdump and parse of lsass process.]]></image:caption><image:title><![CDATA[spraykatz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/spy-extension</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/spy-extension-3126.png</image:loc><image:caption><![CDATA[This Chrome extension will read literally everything it can.]]></image:caption><image:title><![CDATA[Spy Extension]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqli-hunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqli-hunter-2195.png</image:loc><image:caption><![CDATA[Simple HTTP(S) proxy server and a SQLMAP API wrapper that makes digging SQLi easy.]]></image:caption><image:title><![CDATA[SQLi-Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqli-labs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqli-labs-3322.png</image:loc><image:caption><![CDATA[SQLI labs to test error based, blind boolean based, time based.]]></image:caption><image:title><![CDATA[sqli-labs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlidetector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlidetector-6396.png</image:loc><image:caption><![CDATA[Helps you to detect SQL injection "Error based" by sending multiple requests.]]></image:caption><image:title><![CDATA[SQLiDetector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlipy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlipy-5227.png</image:loc><image:caption><![CDATA[Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.]]></image:caption><image:title><![CDATA[sqlipy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqliscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqliscanner-4398.png</image:loc><image:caption><![CDATA[Automatic SQL injection with Charles and sqlmap API.]]></image:caption><image:title><![CDATA[SQLiScanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqliv</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqliv-3176.png</image:loc><image:caption><![CDATA[Massive SQL injection vulnerability scanner.]]></image:caption><image:title><![CDATA[SQLiv]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlmap-2011.png</image:loc><image:caption><![CDATA[Automatic SQL injection and database takeover tool.]]></image:caption><image:title><![CDATA[sqlmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlmapdnscollaborator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlmapdnscollaborator-1488.png</image:loc><image:caption><![CDATA[Lets you use Burp Collaborator as a DNS server for exfiltrating data via Sqlmap.]]></image:caption><image:title><![CDATA[SqlmapDnsCollaborator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlmate</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlmate-2699.png</image:loc><image:caption><![CDATA[A friend of SQLmap which will do what you always expected from SQLmap.]]></image:caption><image:title><![CDATA[sqlmate]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlmutant</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlmutant-1272.png</image:loc><image:caption><![CDATA[Searches for automated subdomain enumeration and runs SQLi tests.]]></image:caption><image:title><![CDATA[SQLMutant]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlninja</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlninja-5176.png</image:loc><image:caption><![CDATA[Exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server.]]></image:caption><image:title><![CDATA[SQLninja]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqlrecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqlrecon-4591.png</image:loc><image:caption><![CDATA[A C# MS-SQL toolkit designed for offensive reconnaissance and post-exploitation.]]></image:caption><image:title><![CDATA[SQLRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sqltruncsanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sqltruncsanner-1253.png</image:loc><image:caption><![CDATA[Messy BurpSuite plugin for SQL Truncation vulnerabilities.]]></image:caption><image:title><![CDATA[SQLTruncSanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssh-putty-login-bruteforcer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssh-putty-login-bruteforcer-1243.png</image:loc><image:caption><![CDATA[A wrapper script which uses PuTTY to perform SSH login bruteforce attacks.]]></image:caption><image:title><![CDATA[SSH PuTTY login bruteforcer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssh-audit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssh-audit-3603.png</image:loc><image:caption><![CDATA[SSH server auditing: banner, key exchange, encryption, compatibility, security...]]></image:caption><image:title><![CDATA[ssh-audit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssh-auditor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssh-auditor-2041.png</image:loc><image:caption><![CDATA[The best way to scan for weak ssh passwords on your network.]]></image:caption><image:title><![CDATA[ssh-auditor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sshimpanzee</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sshimpanzee-2795.png</image:loc><image:caption><![CDATA[Reverse shell based on sshd supporting DNS and ICMP tunnelling as well as HTTP and Socks proxies.]]></image:caption><image:title><![CDATA[Sshimpanzee]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sshlooter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sshlooter-3275.png</image:loc><image:caption><![CDATA[Script to steal passwords from ssh.]]></image:caption><image:title><![CDATA[sshLooter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sshlooterc</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sshlooterc-8839.png</image:loc><image:caption><![CDATA[It's the C version of sshLooter.]]></image:caption><image:title><![CDATA[sshLooterC]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sslscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sslscan-1888.png</image:loc><image:caption><![CDATA[Tests SSL/TLS enabled services to discover supported cipher suites.]]></image:caption><image:title><![CDATA[sslscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sslstrip</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sslstrip-2622.png</image:loc><image:caption><![CDATA[A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.]]></image:caption><image:title><![CDATA[sslstrip]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sslyze</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sslyze-5270.png</image:loc><image:caption><![CDATA[Fast and powerful SSL/TLS scanning library.]]></image:caption><image:title><![CDATA[SSLyze]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrf-detector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrf-detector-3830.png</image:loc><image:caption><![CDATA[Server-side request forgery detector.]]></image:caption><image:title><![CDATA[SSRF Detector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrf-sheriff</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrf-sheriff-8168.png</image:loc><image:caption><![CDATA[A simple SSRF-testing sheriff written in Go.]]></image:caption><image:title><![CDATA[SSRF Sheriff]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrfire</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrfire-8105.png</image:loc><image:caption><![CDATA[An automated SSRF finder. Just give the domain name and your server and chill!]]></image:caption><image:title><![CDATA[SSRFire]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrfmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrfmap-9808.png</image:loc><image:caption><![CDATA[Automatic SSRF fuzzer and exploitation tool.]]></image:caption><image:title><![CDATA[SSRFmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrfpwned</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrfpwned-3274.png</image:loc><image:caption><![CDATA[Checks for SSRF using custom payloads after fetching URLs from sources & applying complex patterns.]]></image:caption><image:title><![CDATA[SSRFPwned]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ssrftest</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ssrftest-1118.png</image:loc><image:caption><![CDATA[SSRF testing tool.]]></image:caption><image:title><![CDATA[SSRFTest]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sstimap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sstimap-4477.png</image:loc><image:caption><![CDATA[Automatic SSTI detection tool with interactive interface.]]></image:caption><image:title><![CDATA[SSTImap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/stacoan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/stacoan-7088.png</image:loc><image:caption><![CDATA[Crossplatform tool which help to perform static code analysis on mobile applications.]]></image:caption><image:title><![CDATA[StaCoAn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/starkiller</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/starkiller-5410.jpg</image:loc><image:caption><![CDATA[Starkiller is a frontend for Empire.]]></image:caption><image:title><![CDATA[Starkiller]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/steghide</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/steghide-3879.png</image:loc><image:caption><![CDATA[Steganography program that hides secrets in the least significant bits of a file.]]></image:caption><image:title><![CDATA[steghide]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/stepper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/stepper-5999.png</image:loc><image:caption><![CDATA[A natural evolution of Burp Suite's Repeater tool.]]></image:caption><image:title><![CDATA[Stepper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/stok-fredrik</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/stok-fredrik-2784.png</image:loc><image:caption><![CDATA[STÖK Fredrik YouTube channel.]]></image:caption><image:title><![CDATA[STÖK Fredrik]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/storm-breaker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/storm-breaker-7022.jpeg</image:loc><image:caption><![CDATA[Social engineering tool, access eebcam & microphone & location finder.]]></image:caption><image:title><![CDATA[Storm breaker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/stratus-red-team</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/stratus-red-team-9786.jpg</image:loc><image:caption><![CDATA[Granular, actionable adversary emulation for the cloud.]]></image:caption><image:title><![CDATA[Stratus Red Team]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/striker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/striker-1997.png</image:loc><image:caption><![CDATA[Offensive information and vulnerability scanner.]]></image:caption><image:title><![CDATA[Striker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sub-domain-enumeration-techniques</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sub-domain-enumeration-techniques-8161.png</image:loc><image:caption><![CDATA[Esoteric sub-domain enumeration techniques - Bugcrowd LevelUp]]></image:caption><image:title><![CDATA[sub-domain enumeration techniques]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sub-drill</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sub-drill-5500.png</image:loc><image:caption><![CDATA[A very (very) FAST and simple subdomain finder based on online & free services.]]></image:caption><image:title><![CDATA[Sub-Drill]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sub3-suite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sub3-suite-5197.jpg</image:loc><image:caption><![CDATA[A free, open source, cross platform Intelligence gathering tool.]]></image:caption><image:title><![CDATA[Sub3 Suite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sub404</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sub404-3022.png</image:loc><image:caption><![CDATA[A fast tool to check subdomain takeover vulnerability.]]></image:caption><image:title><![CDATA[sub404]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subbrute</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subbrute-1531.jpeg</image:loc><image:caption><![CDATA[A DNS meta-query spider that enumerates DNS records, and subdomains.]]></image:caption><image:title><![CDATA[SubBrute]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subdomainfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subdomainfinder-4954.png</image:loc><image:caption><![CDATA[Find subdomains by searching public certificate records.]]></image:caption><image:title><![CDATA[SubdomainFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subdomainizer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subdomainizer-4867.png</image:loc><image:caption><![CDATA[A tool to find subdomains and interesting things hidden inside.]]></image:caption><image:title><![CDATA[SubDomainizer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subfinder-3131.png</image:loc><image:caption><![CDATA[Discovery tool that discovers valid subdomains for websites.]]></image:caption><image:title><![CDATA[Subfinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subgpt</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subgpt-2250.png</image:loc><image:caption><![CDATA[Find subdomains with GPT, for free.]]></image:caption><image:title><![CDATA[SubGPT]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subhijack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subhijack-5223.png</image:loc><image:caption><![CDATA[Hijacking forgotten & misconfigured subdomains.]]></image:caption><image:title><![CDATA[subHijack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subjack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subjack-3678.png</image:loc><image:caption><![CDATA[Subdomain Takeover tool written in Go.]]></image:caption><image:title><![CDATA[Subjack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subjs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subjs-8943.png</image:loc><image:caption><![CDATA[Fetches javascript file from a list of URLS or subdomains.]]></image:caption><image:title><![CDATA[subjs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sublert</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sublert-9094.png</image:loc><image:caption><![CDATA[Monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.]]></image:caption><image:title><![CDATA[Sublert]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sublist3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sublist3r-3527.png</image:loc><image:caption><![CDATA[Fast subdomains enumeration tool for penetration testers.]]></image:caption><image:title><![CDATA[Sublist3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subnerium</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subnerium-5482.png</image:loc><image:caption><![CDATA[A fast passive subdomain enumeration tool that uses various sources to gather data.]]></image:caption><image:title><![CDATA[subnerium]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subover-3077.png</image:loc><image:caption><![CDATA[A Powerful Subdomain Takeover Tool.]]></image:caption><image:title><![CDATA[SubOver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subra-3557.png</image:loc><image:caption><![CDATA[A Web-UI for subdomain enumeration.]]></image:caption><image:title><![CDATA[Subra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subscraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subscraper-8266.png</image:loc><image:caption><![CDATA[Perform subdomain enumeration through various techniques and retrieve detailed output.]]></image:caption><image:title><![CDATA[SubScraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/substr3am</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/substr3am-9613.png</image:loc><image:caption><![CDATA[Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates.]]></image:caption><image:title><![CDATA[Substr3am]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subtake</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subtake-5719.png</image:loc><image:caption><![CDATA[Extension of sublister tool to check for subdomain takeovers.]]></image:caption><image:title><![CDATA[subtake]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subzuf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subzuf-9812.jpg</image:loc><image:caption><![CDATA[A smart DNS response-guided subdomain fuzzer.]]></image:caption><image:title><![CDATA[subzuf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/subzy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/subzy-3611.png</image:loc><image:caption><![CDATA[Subdomain takeover vulnerability checker.]]></image:caption><image:title><![CDATA[subzy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sudo_killer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sudo_killer-7826.png</image:loc><image:caption><![CDATA[A tool to identify and exploit sudo rules misconfigurations and vulnerabilities.]]></image:caption><image:title><![CDATA[SUDO_KILLER]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sudomy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sudomy-3762.png</image:loc><image:caption><![CDATA[Collects subdomains and analyzes domains performing automated reconnaissance.]]></image:caption><image:title><![CDATA[Sudomy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/suid3num</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/suid3num-7385.png</image:loc><image:caption><![CDATA[Standalone script to enumerate SUID binaries, separate default binaries from customs.]]></image:caption><image:title><![CDATA[SUID3NUM]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sulley</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sulley-3382.png</image:loc><image:caption><![CDATA[A pure-python fully automated and unattended fuzzing framework.]]></image:caption><image:title><![CDATA[sulley]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/supernova</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/supernova-1379.png</image:loc><image:caption><![CDATA[Real fucking shellcode encryptor & obfuscator tool.]]></image:caption><image:title><![CDATA[Supernova]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/svn-extractor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/svn-extractor-9796.png</image:loc><image:caption><![CDATA[Simple script to extract all web resources by means of .SVN folder exposed over network.]]></image:caption><image:title><![CDATA[svn-extractor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/swagger-jacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/swagger-jacker-8374.jpg</image:loc><image:caption><![CDATA[Designed to assist with auditing of exposed Swagger/OpenAPI) definition files.]]></image:caption><image:title><![CDATA[Swagger Jacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/swagroutes</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/swagroutes-5451.png</image:loc><image:caption><![CDATA[Extract and list API routes from Swagger files in YAML/JSON format.]]></image:caption><image:title><![CDATA[swagroutes]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sweetpotato</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sweetpotato-2495.png</image:loc><image:caption><![CDATA[A collection of various Windows privilege escalation techniques from service accounts to SYSTEM.]]></image:caption><image:title><![CDATA[SweetPotato]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/synapsint</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/synapsint-2289.png</image:loc><image:caption><![CDATA[Consulting different intelligence services, search engines and datasets for OSINT.]]></image:caption><image:title><![CDATA[SynapsInt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/synergy-httpx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/synergy-httpx-7347.png</image:loc><image:caption><![CDATA[Http(s) server designed to host resources dynamically or act as a receiver for POST data intercepts.]]></image:caption><image:title><![CDATA[Synergy-httpx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/sysreptor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/sysreptor-6861.png</image:loc><image:caption><![CDATA[Easy and customisable pentest report creator based on simple web technologies.]]></image:caption><image:title><![CDATA[SysReptor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/syswhispers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/syswhispers-4498.png</image:loc><image:caption><![CDATA[AV/EDR evasion via direct system calls.]]></image:caption><image:title><![CDATA[SysWhispers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/t-pot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/t-pot-2382.png</image:loc><image:caption><![CDATA[The all in one multi honeypot platform.]]></image:caption><image:title><![CDATA[T-Pot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/t14m4t</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/t14m4t-1087.png</image:loc><image:caption><![CDATA[Automated brute-forcing attack tool.]]></image:caption><image:title><![CDATA[t14m4t]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/takeover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/takeover-2143.png</image:loc><image:caption><![CDATA[A tool for testing subdomain takeover possibilities at a mass scale.]]></image:caption><image:title><![CDATA[takeover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/talisman</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/talisman-1373.png</image:loc><image:caption><![CDATA[Validate the outgoing changeset for things that look suspicious such as tokens, passwords and keys.]]></image:caption><image:title><![CDATA[talisman]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tamper-data</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tamper-data-8098.png</image:loc><image:caption><![CDATA[View and modify HTTP requests before they are sent.]]></image:caption><image:title><![CDATA[Tamper Data]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tamper-dev</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tamper-dev-7229.png</image:loc><image:caption><![CDATA[Allows you to intercept and edit HTTP/HTTPS requests and responses.]]></image:caption><image:title><![CDATA[Tamper Dev]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/teh-s3-bucketeers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/teh-s3-bucketeers-6836.png</image:loc><image:caption><![CDATA[Security tool to discover S3 buckets on Amazon's AWS platform.]]></image:caption><image:title><![CDATA[Teh S3 Bucketeers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tinja</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tinja-7456.png</image:loc><image:caption><![CDATA[CLI tool for testing web pages for template injection vulnerabilities.]]></image:caption><image:title><![CDATA[Template INJection Analyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/terminatorz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/terminatorz-5341.png</image:loc><image:caption><![CDATA[Scan for top potential vulnerabilities with known CVEs in your web applications.]]></image:caption><image:title><![CDATA[TerminatorZ]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/terraform</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/terraform-5449.png</image:loc><image:caption><![CDATA[Enables you to safely and predictably create, change, and improve infrastructure.]]></image:caption><image:title><![CDATA[terraform]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/testssl.sh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/testssl.sh-3414.png</image:loc><image:caption><![CDATA[Testing TLS/SSL encryption anywhere on any port.]]></image:caption><image:title><![CDATA[testssl.sh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tex</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tex-4475.png</image:loc><image:caption><![CDATA[Telegram Explorer created to help researchers, investigators and law enforcement agent.]]></image:caption><image:title><![CDATA[TEx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tfsec</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tfsec-3946.png</image:loc><image:caption><![CDATA[Security scanner for your Terraform code.]]></image:caption><image:title><![CDATA[tfsec]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/th3inspector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/th3inspector-2883.png</image:loc><image:caption><![CDATA[All in one tool for Information Gathering.]]></image:caption><image:title><![CDATA[Th3inspector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-art-of-command-line</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-art-of-command-line-6815.png</image:loc><image:caption><![CDATA[Master the command line, in one page.]]></image:caption><image:title><![CDATA[The art of command line]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-exploit-database</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-exploit-database-3821.png</image:loc><image:caption><![CDATA[Archive of public exploits and corresponding vulnerable software.]]></image:caption><image:title><![CDATA[The Exploit Database]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-http-garden</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-http-garden-4199.png</image:loc><image:caption><![CDATA[Differential testing and fuzzing of HTTP servers and proxies.]]></image:caption><image:title><![CDATA[The HTTP Garden]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ptf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ptf-3355.png</image:loc><image:caption><![CDATA[The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.]]></image:caption><image:title><![CDATA[The PenTesters Framework]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-social-engineer-toolkit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-social-engineer-toolkit-5478.png</image:loc><image:caption><![CDATA[Open-source penetration testing framework designed for social engineering.]]></image:caption><image:title><![CDATA[The Social-Engineer Toolkit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-time-machine</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-time-machine-3014.png</image:loc><image:caption><![CDATA[Weaponizing WaybackUrls for recon, bug bounties, OSINT, sensitive endpoints and what not.]]></image:caption><image:title><![CDATA[The Time Machine]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-wordlists</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-wordlists-1258.png</image:loc><image:caption><![CDATA[A collection of wordlists for many different usages.]]></image:caption><image:title><![CDATA[The Wordlists]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/the-xss-rat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/the-xss-rat-8528.png</image:loc><image:caption><![CDATA[The XSS rat YouTube channel.]]></image:caption><image:title><![CDATA[The XSS rat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/theftfuzzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/theftfuzzer-3532.png</image:loc><image:caption><![CDATA[Fuzz Cross-Origin Resource Sharing implementations for common misconfigurations.]]></image:caption><image:title><![CDATA[TheftFuzzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/theharvester</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/theharvester-4957.png</image:loc><image:caption><![CDATA[E-mails, subdomains and names Harvester.]]></image:caption><image:title><![CDATA[theHarvester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/thievingfox</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/thievingfox-7156.png</image:loc><image:caption><![CDATA[Post-exploitation tools to gather credentials from various password managers and Windows utilities.]]></image:caption><image:title><![CDATA[ThievingFox]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/threatmapper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/threatmapper-6003.png</image:loc><image:caption><![CDATA[Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.]]></image:caption><image:title><![CDATA[ThreatMapper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tidos</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tidos-8059.png</image:loc><image:caption><![CDATA[The offensive manual web application penetration testing framework.]]></image:caption><image:title><![CDATA[TIDoS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/timesketch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/timesketch-9713.png</image:loc><image:caption><![CDATA[Collaborative forensic timeline analysis.]]></image:caption><image:title><![CDATA[timesketch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tinfoleak</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tinfoleak-7441.png</image:loc><image:caption><![CDATA[The most complete open-source tool for Twitter intelligence analysis.]]></image:caption><image:title><![CDATA[tinfoleak]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tko-subs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tko-subs-4158.png</image:loc><image:caption><![CDATA[A tool that can help detect and takeover subdomains with dead DNS records.]]></image:caption><image:title><![CDATA[tko-subs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tld-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tld-scanner-6819.png</image:loc><image:caption><![CDATA[Scan all possible TLD's for a given domain name.]]></image:caption><image:title><![CDATA[TLD Scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/domains,tld,recon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/domains,tld,recon-4130.png</image:loc><image:caption><![CDATA[Domain availability checker.]]></image:caption><image:title><![CDATA[TLDHunt]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tlsx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tlsx-9404.png</image:loc><image:caption><![CDATA[Fast and configurable TLS grabber focused on TLS based data collection.]]></image:caption><image:title><![CDATA[tlsx]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tokentactics</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tokentactics-8985.png</image:loc><image:caption><![CDATA[Azure JWT token manipulation toolset.]]></image:caption><image:title><![CDATA[TokenTactics]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tool-wpxstrike</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tool-wpxstrike-8150.png</image:loc><image:caption><![CDATA[Escalate a Cross-Site Scripting vulnerability to Remote Code Execution in WordPress.]]></image:caption><image:title><![CDATA[Tool WPXStrike]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/toxssin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/toxssin-9931.png</image:loc><image:caption><![CDATA[Open-source penetration testing tool that automates the process of exploiting XSS.]]></image:caption><image:title><![CDATA[toxssin]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tplmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tplmap-8854.png</image:loc><image:caption><![CDATA[Server-Side Template Injection and Code Injection Detection and Exploitation Tool.]]></image:caption><image:title><![CDATA[tplmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trackerjacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trackerjacker-6251.png</image:loc><image:caption><![CDATA[Like nmap for mapping wifi networks you're not connected to, plus device tracking.]]></image:caption><image:title><![CDATA[trackerjacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tracy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tracy-4391.png</image:loc><image:caption><![CDATA[Assists with finding all sinks and sources of a webapp and display the results in a nice way.]]></image:caption><image:title><![CDATA[Tracy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trafficwatch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trafficwatch-1574.png</image:loc><image:caption><![CDATA[A packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files.]]></image:caption><image:title><![CDATA[TrafficWatch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/traitor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/traitor-4156.png</image:loc><image:caption><![CDATA[Automatic Linux privilege escalation via exploitation of low-hanging fruit.]]></image:caption><image:title><![CDATA[traitor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/transformations</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/transformations-9237.jpeg</image:loc><image:caption><![CDATA[Understand how input is transformed on a system, which can help to craft payloads.]]></image:caption><image:title><![CDATA[Transformations]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trape</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trape-3763.png</image:loc><image:caption><![CDATA[People tracker on the Internet: OSINT analysis and research tool.]]></image:caption><image:title><![CDATA[trape]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trevorc2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trevorc2-6150.png</image:loc><image:caption><![CDATA[A legitimate website that tunnels client/server communications for covert command execution.]]></image:caption><image:title><![CDATA[TrevorC2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trishul</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trishul-3633.png</image:loc><image:caption><![CDATA[Burp Suite Extension to hunt for common vulnerabilities found in websites.]]></image:caption><image:title><![CDATA[Trishul]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/triton</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/triton-6715.png</image:loc><image:caption><![CDATA[A dynamic binary analysis library.]]></image:caption><image:title><![CDATA[Triton]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trivy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trivy-1420.png</image:loc><image:caption><![CDATA[Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, repositories...]]></image:caption><image:title><![CDATA[Trivy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trufflehog</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trufflehog-9771.png</image:loc><image:caption><![CDATA[Find credentials all over the place.]]></image:caption><image:title><![CDATA[TruffleHog]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/trurl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/trurl-7177.png</image:loc><image:caption><![CDATA[Command line tool for URL parsing and manipulation.]]></image:caption><image:title><![CDATA[trurl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tryhackme</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tryhackme-1625.png</image:loc><image:caption><![CDATA[Hands-on cyber security training through real-world scenarios.]]></image:caption><image:title><![CDATA[TryHackMe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tsunami-security-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tsunami-security-scanner-3776.png</image:loc><image:caption><![CDATA[Network security scanner with an extensible plugin system.]]></image:caption><image:title><![CDATA[tsunami-security-scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tugarecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tugarecon-8893.png</image:loc><image:caption><![CDATA[Subdomains enumeration tool for penetration testers.]]></image:caption><image:title><![CDATA[TugaRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/tun2socks</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/tun2socks-5520.png</image:loc><image:caption><![CDATA[Handle all network traffic of any internet programs sent by the device through a proxy.]]></image:caption><image:title><![CDATA[tun2socks]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/turbo-intruder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/turbo-intruder-9803.png</image:loc><image:caption><![CDATA[Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.]]></image:caption><image:title><![CDATA[Turbo Intruder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/turbolist3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/turbolist3r-7762.png</image:loc><image:caption><![CDATA[Subdomain enumeration tool with analysis features for discovered domains.]]></image:caption><image:title><![CDATA[Turbolist3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/twint</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/twint-9252.png</image:loc><image:caption><![CDATA[Twitter scraping & OSINT tool allowing you to scrape a user's followers, following, tweets and more.]]></image:caption><image:title><![CDATA[twint]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/udpx</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/udpx-3734.png</image:loc><image:caption><![CDATA[Fast and lightweight UDP scanner that supports the discovery of many services.]]></image:caption><image:title><![CDATA[UDPX]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ufonet</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ufonet-1265.png</image:loc><image:caption><![CDATA[Denial of Service Toolkit.]]></image:caption><image:title><![CDATA[ufonet]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/uglifyjs</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/uglifyjs-3707.png</image:loc><image:caption><![CDATA[A JavaScript parser, minifier, compressor and beautifier toolkit.]]></image:caption><image:title><![CDATA[UglifyJS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/uncompyle6</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/uncompyle6-4608.png</image:loc><image:caption><![CDATA[A cross-version Python bytecode decompiler.]]></image:caption><image:title><![CDATA[uncompyle6]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/uncover</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/uncover-3028.png</image:loc><image:caption><![CDATA[Quickly discover exposed hosts on the internet using multiple search engines.]]></image:caption><image:title><![CDATA[uncover]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/undetected-chromedriver</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/undetected-chromedriver-6507.jpg</image:loc><image:caption><![CDATA[Optimized Selenium Chromedriver patch which does not trigger anti-bot services.]]></image:caption><image:title><![CDATA[undetected-chromedriver]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unforce</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unforce-4957.png</image:loc><image:caption><![CDATA[Salesforce lightning recon and exploitation tool.]]></image:caption><image:title><![CDATA[Unforce]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unfurl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unfurl-4155.png</image:loc><image:caption><![CDATA[An Entropy-Based Link Vulnerability Tool.]]></image:caption><image:title><![CDATA[unfurl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unicorn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unicorn-4202.png</image:loc><image:caption><![CDATA[Simple tool for using a PowerShell downgrade attack and inject shellcode into memory.]]></image:caption><image:title><![CDATA[unicorn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unicornscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unicornscan-4698.png</image:loc><image:caption><![CDATA[An asynchronous TCP and UDP port scanner.]]></image:caption><image:title><![CDATA[Unicornscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unix-privesc-check</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unix-privesc-check-5942.png</image:loc><image:caption><![CDATA[Shell script to check for simple privilege escalation vectors on Unix systems.]]></image:caption><image:title><![CDATA[unix-privesc-check]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unredacter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unredacter-8605.jpg</image:loc><image:caption><![CDATA[Never ever ever use pixelation as a redaction technique.]]></image:caption><image:title><![CDATA[Unredacter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/unshackle</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/unshackle-4456.png</image:loc><image:caption><![CDATA[Bypass Windows and Linux user passwords from a bootable USB based on Linux.]]></image:caption><image:title><![CDATA[Unshackle]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/up-http-server</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/up-http-server-9594.png</image:loc><image:caption><![CDATA[Simple HTTP listener for security testing.]]></image:caption><image:title><![CDATA[Up HTTP Server]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/upload_bypass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/upload_bypass-8337.png</image:loc><image:caption><![CDATA[File upload restrictions bypass by using different techniques!]]></image:caption><image:title><![CDATA[upload_bypass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/uploadscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/uploadscanner-2551.png</image:loc><image:caption><![CDATA[HTTP file upload scanner for Burp Proxy.]]></image:caption><image:title><![CDATA[UploadScanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/urless</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/urless-6316.png</image:loc><image:caption><![CDATA[De-clutter a list of URLs.]]></image:caption><image:title><![CDATA[urless]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/urlgrab</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/urlgrab-9612.png</image:loc><image:caption><![CDATA[A golang utility to spider through a website searching for additional links.]]></image:caption><image:title><![CDATA[urlgrab]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/urlhunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/urlhunter-3099.png</image:loc><image:caption><![CDATA[Allows searching on URLs that are exposed via shortener services.]]></image:caption><image:title><![CDATA[urlhunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/uro</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/uro-8893.png</image:loc><image:caption><![CDATA[Declutters url lists for crawling/pentesting.]]></image:caption><image:title><![CDATA[uro]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/userefuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/userefuzz-7282.png</image:loc><image:caption><![CDATA[User-Agent, X-Forwarded-For and Referer SQLI Fuzzer.]]></image:caption><image:title><![CDATA[userefuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/userenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/userenum-6179.png</image:loc><image:caption><![CDATA[Domain user enumeration tool.]]></image:caption><image:title><![CDATA[UserEnum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vaf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vaf-1130.png</image:loc><image:caption><![CDATA[Cross-platform very advanced and fast web fuzzer written in nim.]]></image:caption><image:title><![CDATA[vaf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vajra</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vajra-3068.png</image:loc><image:caption><![CDATA[UI-based tool with multiple techniques for attacking and enumerating Azure and AWS environment.]]></image:caption><image:title><![CDATA[Vajra]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/valid8proxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/valid8proxy-9345.png</image:loc><image:caption><![CDATA[Tool designed for fetching, validating, and storing working proxies.]]></image:caption><image:title><![CDATA[Valid8Proxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vampi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vampi-7488.jpg</image:loc><image:caption><![CDATA[Vulnerable REST API with OWASP top 10 vulnerabilities for security testing.]]></image:caption><image:title><![CDATA[Vampi]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/van-gonography</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/van-gonography-3686.png</image:loc><image:caption><![CDATA[Hide any type of files inside a image of your choice using steganography.]]></image:caption><image:title><![CDATA[van-gonography]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vaya-ciego-nen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vaya-ciego-nen-4599.png</image:loc><image:caption><![CDATA[Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.]]></image:caption><image:title><![CDATA[vaya-ciego-nen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vbad</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vbad-6833.png</image:loc><image:caption><![CDATA[VBA obfuscation tools combined with an MS Office document generator .]]></image:caption><image:title><![CDATA[VBad]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vbscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vbscan-9219.png</image:loc><image:caption><![CDATA[A black box vBulletin vulnerability scanner.]]></image:caption><image:title><![CDATA[vbscan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vcsmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vcsmap-5197.png</image:loc><image:caption><![CDATA[Plugin-based tool to scan public version control systems for sensitive information.]]></image:caption><image:title><![CDATA[vcsmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vegile</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vegile-4717.png</image:loc><image:caption><![CDATA[Post exploitation tool to maintain some level of acces.]]></image:caption><image:title><![CDATA[Vegile]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/velociraptor</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/velociraptor-7199.png</image:loc><image:caption><![CDATA[Endpoint visibility and collection tool.]]></image:caption><image:title><![CDATA[Velociraptor]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/venom</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/venom-9449.png</image:loc><image:caption><![CDATA[Popular Pentesting scanner for SQLi/XSS/LFI/RFI and other Vulns.]]></image:caption><image:title><![CDATA[Venom]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vhosts-sieve</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vhosts-sieve-8518.png</image:loc><image:caption><![CDATA[Searching for virtual hosts among non-resolvable domains.]]></image:caption><image:title><![CDATA[vhosts-sieve]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vhostscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vhostscan-9701.png</image:loc><image:caption><![CDATA[Virtual host scanner that performs reverse lookups.]]></image:caption><image:title><![CDATA[VHostScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/villain</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/villain-6527.png</image:loc><image:caption><![CDATA[Backdoor generator and multi-session handler for sessions sharing among connected sibling servers.]]></image:caption><image:title><![CDATA[Villain]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/virtual-host-scanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/virtual-host-scanner-8203.png</image:loc><image:caption><![CDATA[A script to enumerate virtual hosts on a server.]]></image:caption><image:title><![CDATA[Virtual host scanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/volatility</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/volatility-9929.png</image:loc><image:caption><![CDATA[The volatile memory extraction framework.]]></image:caption><image:title><![CDATA[volatility]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vulhub</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vulhub-4075.png</image:loc><image:caption><![CDATA[Pre-built vulnerable environments based on docker-compose.]]></image:caption><image:title><![CDATA[vulhub]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vulmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vulmap-1413.png</image:loc><image:caption><![CDATA[Online local vulnerability scanners project.]]></image:caption><image:title><![CDATA[Vulmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vulnerable-ad</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vulnerable-ad-2046.png</image:loc><image:caption><![CDATA[Create a vulnerable active directory to test most of the active directory attacks in a local lab.]]></image:caption><image:title><![CDATA[vulnerable-AD]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vulnhub</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vulnhub-8833.png</image:loc><image:caption><![CDATA[Provide materials that allows anyone to gain practical 'hands-on' experience in security.]]></image:caption><image:title><![CDATA[VulnHub]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vulnmachines</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vulnmachines-3599.png</image:loc><image:caption><![CDATA[A place to learn and improve penetration testing/ethical hacking skills for FREE.]]></image:caption><image:title><![CDATA[Vulnmachines]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/vuls</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/vuls-2601.png</image:loc><image:caption><![CDATA[Agent-less vulnerability scanner.]]></image:caption><image:title><![CDATA[Vuls]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/w3af</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/w3af-9318.png</image:loc><image:caption><![CDATA[Web Application Attack and Audit Framework.]]></image:caption><image:title><![CDATA[w3af]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wacker</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wacker-2706.png</image:loc><image:caption><![CDATA[A WPA3 dictionary cracker.]]></image:caption><image:title><![CDATA[wacker]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wadcoms</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wadcoms-9432.png</image:loc><image:caption><![CDATA[Interactive cheat sheet with a curated list of offensive security tools and their commands.]]></image:caption><image:title><![CDATA[WADComs]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/waf-bypass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/waf-bypass-6602.png</image:loc><image:caption><![CDATA[Check your WAF before an attacker does.]]></image:caption><image:title><![CDATA[waf-bypass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wafw00f</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wafw00f-2951.png</image:loc><image:caption><![CDATA[Identify and fingerprint Web Application Firewall products protecting a website.]]></image:caption><image:title><![CDATA[wafw00f]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wapiti</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wapiti-8717.png</image:loc><image:caption><![CDATA[The web-application vulnerability scanner.]]></image:caption><image:title><![CDATA[Wapiti]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wappalyzer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wappalyzer-3929.png</image:loc><image:caption><![CDATA[Identify technologies on websites.]]></image:caption><image:title><![CDATA[Wappalyzer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/watson</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/watson-4085.png</image:loc><image:caption><![CDATA[Enumerate missing KBs and suggest exploits for useful privilege escalation vulnerabilities.]]></image:caption><image:title><![CDATA[Watson]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wayback-machine</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wayback-machine-2435.png</image:loc><image:caption><![CDATA[Explore more than 778 billion web pages saved over time.]]></image:caption><image:title><![CDATA[Wayback Machine]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/waybacksqliscanner</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/waybacksqliscanner-9042.png</image:loc><image:caption><![CDATA[Gather urls from wayback machine and test each GET parameter for SQL injection.]]></image:caption><image:title><![CDATA[waybackSqliScanner]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/waybackurls</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/waybackurls-2768.png</image:loc><image:caption><![CDATA[Fetch all the URLs that the Wayback Machine knows about for a domain.]]></image:caption><image:title><![CDATA[waybackurls]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/waymore</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/waymore-5653.png</image:loc><image:caption><![CDATA[Find way more from the Wayback Machine!]]></image:caption><image:title><![CDATA[Waymore]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wazuh</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wazuh-6294.png</image:loc><image:caption><![CDATA[The open source security platform.]]></image:caption><image:title><![CDATA[wazuh]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/weakestlink</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/weakestlink-2490.png</image:loc><image:caption><![CDATA[Browser extension that extracts users from LinkedIn company pages.]]></image:caption><image:title><![CDATA[WeakestLink]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/weakpass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/weakpass-1284.png</image:loc><image:caption><![CDATA[Database of wordlists for hash cracking and compilation of best wordlists.]]></image:caption><image:title><![CDATA[weakpass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/weaponised-xss-payloads</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/weaponised-xss-payloads-9395.png</image:loc><image:caption><![CDATA[XSS payloads designed to turn alert(1) into P1.]]></image:caption><image:title><![CDATA[Weaponised XSS Payloads]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/web-check</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/web-check-8273.png</image:loc><image:caption><![CDATA[All-in-one OSINT tool for analysing any website.]]></image:caption><image:title><![CDATA[Web Check]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/web-crawler-security-tool</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/web-crawler-security-tool-2089.png</image:loc><image:caption><![CDATA[A web crawler oriented to infosec.]]></image:caption><image:title><![CDATA[Web Crawler Security Tool]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/web-hacking-toolkit</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/web-hacking-toolkit-8969.png</image:loc><image:caption><![CDATA[A web hacking toolkit.]]></image:caption><image:title><![CDATA[web-hacking-toolkit]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/web2shell</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/web2shell-7316.png</image:loc><image:caption><![CDATA[Automate converting webshells into reverse shells.]]></image:caption><image:title><![CDATA[web2shell]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webanalyze</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webanalyze-8225.png</image:loc><image:caption><![CDATA[Uncovers technologies used on websites to automate mass scanning.]]></image:caption><image:title><![CDATA[webanalyze]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webcopilot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webcopilot-3958.png</image:loc><image:caption><![CDATA[Automation tool designed to enumerate subdomains and detect bugs using different open-source tools.]]></image:caption><image:title><![CDATA[WebCopilot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webgoat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webgoat-6388.png</image:loc><image:caption><![CDATA[Deliberately insecure application.]]></image:caption><image:title><![CDATA[WebGoat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webhook</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webhook-6965.png</image:loc><image:caption><![CDATA[A lightweight incoming webhook server to run shell commands.]]></image:caption><image:title><![CDATA[webhook]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webhook.site</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webhook.site-6009.png</image:loc><image:caption><![CDATA[Easily test HTTP webhooks with this handy tool that displays requests instantly.]]></image:caption><image:title><![CDATA[webhook.site]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webhookd</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webhookd-1030.png</image:loc><image:caption><![CDATA[A very simple webhook server launching shell scripts.]]></image:caption><image:title><![CDATA[webhookd]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webinspect</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webinspect-3549.png</image:loc><image:caption><![CDATA[An automated dynamic testing solution that provides comprehensive vulnerability detection.]]></image:caption><image:title><![CDATA[WebInspect]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webpalm</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webpalm-4724.png</image:loc><image:caption><![CDATA[A tool that traverses a website and generates a tree of all the webpages and their links.]]></image:caption><image:title><![CDATA[webpalm]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webscarab</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webscarab-8005.png</image:loc><image:caption><![CDATA[Framework for analysing applications that communicate using the HTTP and HTTPS protocols.]]></image:caption><image:title><![CDATA[WebScarab]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webscrape</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webscrape-2866.png</image:loc><image:caption><![CDATA[A web scraper to scrape email's and phone numbers from websites.]]></image:caption><image:title><![CDATA[WebScrape]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/webscreenshot</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/webscreenshot-6461.png</image:loc><image:caption><![CDATA[A simple script to screenshot a list of websites.]]></image:caption><image:title><![CDATA[webscreenshot]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/websy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/websy-4121.png</image:loc><image:caption><![CDATA[Keep an eye on your targets to get quickly notified for any change they push on their server.]]></image:caption><image:title><![CDATA[websy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/weevely3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/weevely3-3791.png</image:loc><image:caption><![CDATA[Weaponized web shell.]]></image:caption><image:title><![CDATA[weevely3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/weirdaal</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/weirdaal-1080.jpeg</image:loc><image:caption><![CDATA[AWS Attack Library.]]></image:caption><image:title><![CDATA[WeirdAAL]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wes-ng</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wes-ng-8727.jpg</image:loc><image:caption><![CDATA[Windows Exploit Suggester - Next Generation.]]></image:caption><image:title><![CDATA[WES-NG]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wfuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wfuzz-5312.png</image:loc><image:caption><![CDATA[Web application fuzzer.]]></image:caption><image:title><![CDATA[Wfuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wgen.io</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wgen.io-6008.png</image:loc><image:caption><![CDATA[Generate rich wordlists for targeted attacks online.]]></image:caption><image:title><![CDATA[wgen.io]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/what-cms</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/what-cms-6724.png</image:loc><image:caption><![CDATA[Detect which CMS a site is using.]]></image:caption><image:title><![CDATA[What CMS]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whatbreach</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whatbreach-6253.png</image:loc><image:caption><![CDATA[OSINT tool to find breached emails, databases, pastes, and relevant information.]]></image:caption><image:title><![CDATA[WhatBreach]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whatruns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whatruns-4180.png</image:loc><image:caption><![CDATA[Discover what runs a website.]]></image:caption><image:title><![CDATA[WhatRuns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whatsmyname</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whatsmyname-7350.png</image:loc><image:caption><![CDATA[Enumerate usernames across many websites.]]></image:caption><image:title><![CDATA[WhatsMyName]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whatwaf</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whatwaf-6175.png</image:loc><image:caption><![CDATA[Detect and bypass web application firewalls and protection systems.]]></image:caption><image:title><![CDATA[WhatWaf]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whatweb</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whatweb-5927.png</image:loc><image:caption><![CDATA[Next generation web scanner.]]></image:caption><image:title><![CDATA[WhatWeb]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whispers</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whispers-5364.png</image:loc><image:caption><![CDATA[Identify hardcoded secrets in static structured text.]]></image:caption><image:title><![CDATA[Whispers]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whoisxmlapi</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whoisxmlapi-6033.png</image:loc><image:caption><![CDATA[Domain & IP data intelligence for greater enterprise security.]]></image:caption><image:title><![CDATA[WhoisXMLAPI]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/whonow</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/whonow-4558.png</image:loc><image:caption><![CDATA[A malicious DNS server for executing DNS Rebinding attacks on the fly.]]></image:caption><image:title><![CDATA[whonow]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifi-exploitation-framework</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifi-exploitation-framework-9432.png</image:loc><image:caption><![CDATA[WiFi exploitation framework.]]></image:caption><image:title><![CDATA[WiFi Exploitation Framework]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifi-bruteforcer-fsecurify</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifi-bruteforcer-fsecurify-1896.jpeg</image:loc><image:caption><![CDATA[Android application to brute force WiFi passwords without requiring a rooted device.]]></image:caption><image:title><![CDATA[wifi-bruteforcer-fsecurify]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifi-pumpkin</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifi-pumpkin-1069.png</image:loc><image:caption><![CDATA[Framework for rogue Wi-Fi access point attack.]]></image:caption><image:title><![CDATA[WiFi-Pumpkin]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifijammer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifijammer-4403.png</image:loc><image:caption><![CDATA[Continuously jam all wifi clients/routers.]]></image:caption><image:title><![CDATA[wifijammer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifipass</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifipass-5620.png</image:loc><image:caption><![CDATA[A simple wireless networks penetration testing toolkit.]]></image:caption><image:title><![CDATA[WifiPass]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifiphisher</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifiphisher-8614.png</image:loc><image:caption><![CDATA[The rogue access point framework.]]></image:caption><image:title><![CDATA[wifiphisher]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifipumpkin3</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifipumpkin3-3033.png</image:loc><image:caption><![CDATA[Powerful framework for rogue access point attack.]]></image:caption><image:title><![CDATA[wifipumpkin3]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wifite</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wifite-9542.jpg</image:loc><image:caption><![CDATA[Runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches!]]></image:caption><image:title><![CDATA[wifite]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wikto</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wikto-5237.png</image:loc><image:caption><![CDATA[Nikto for Windows with some extra features.]]></image:caption><image:title><![CDATA[wikto]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wildcrawl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wildcrawl-2915.png</image:loc><image:caption><![CDATA[Crawls URL to get a better image of what is tied to a website.]]></image:caption><image:title><![CDATA[wildcrawl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/windapsearch</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/windapsearch-4090.png</image:loc><image:caption><![CDATA[Enumerate users, groups and computers from a Windows domain through LDAP queries.]]></image:caption><image:title><![CDATA[windapsearch]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/windows-exploit-suggester</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/windows-exploit-suggester-6596.png</image:loc><image:caption><![CDATA[Compares target patch levels against the Microsoft vulnerability DB to detect missing patches.]]></image:caption><image:title><![CDATA[Windows Exploit Suggester]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/windows-kernel-exploits</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/windows-kernel-exploits-3733.png</image:loc><image:caption><![CDATA[A list of Windows kernel exploits.]]></image:caption><image:title><![CDATA[windows-kernel-exploits]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/windows-privesc-check</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/windows-privesc-check-2462.png</image:loc><image:caption><![CDATA[Standalone executable to check for simple privilege escalation vectors.]]></image:caption><image:title><![CDATA[windows-privesc-check]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/winfihack</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/winfihack-6630.png</image:loc><image:caption><![CDATA[Windows WiFi brute forcing utility without the requirement of external dependencies.]]></image:caption><image:title><![CDATA[WinFiHack]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/winpmem</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/winpmem-5342.png</image:loc><image:caption><![CDATA[The Windows memory acquisition tool.]]></image:caption><image:title><![CDATA[WinPmem]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/winpwn</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/winpwn-2564.jpg</image:loc><image:caption><![CDATA[Automation for internal Windows pentest / AD-Security.]]></image:caption><image:title><![CDATA[WinPwn]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/winpwnage</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/winpwnage-3202.png</image:loc><image:caption><![CDATA[UAC bypass, Elevate, Persistence methods.]]></image:caption><image:title><![CDATA[WinPwnage]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/winspect</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/winspect-1569.png</image:loc><image:caption><![CDATA[Powershell-based Windows security auditing toolbox.]]></image:caption><image:title><![CDATA[WINspect]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wireshark</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wireshark-3634.png</image:loc><image:caption><![CDATA[Network sniffer that captures and analyzes packets off the wire.]]></image:caption><image:title><![CDATA[Wireshark]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/witnessme</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/witnessme-6710.png</image:loc><image:caption><![CDATA[Web Inventory tool, takes screenshots and provides some extra bells&whistles to make life easier.]]></image:caption><image:title><![CDATA[WitnessMe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wlgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wlgen-3895.png</image:loc><image:caption><![CDATA[Automate building wordlists for AppSec directory/resource bruting.]]></image:caption><image:title><![CDATA[wlgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wmeye</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wmeye-6042.jpg</image:loc><image:caption><![CDATA[Post exploitation tool that uses WMI event filter and MSBuild execution for lateral movement.]]></image:caption><image:title><![CDATA[WMEye]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wmiexec-pro</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wmiexec-pro-5459.png</image:loc><image:caption><![CDATA[The new generation of wmiexec.py with all operations performed on port 135 for antivirus evasion.]]></image:caption><image:title><![CDATA[wmiexec-Pro]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wmiexec-regout</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wmiexec-regout-8570.png</image:loc><image:caption><![CDATA[Modify version of impacket wmiexec.py, get output from registry.]]></image:caption><image:title><![CDATA[wmiexec-RegOut]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wordlistctl</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wordlistctl-4037.png</image:loc><image:caption><![CDATA[Fetch, install and search wordlist archives from websites and torrent peers.]]></image:caption><image:title><![CDATA[wordlistctl]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wordlistgen</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wordlistgen-3191.png</image:loc><image:caption><![CDATA[Quickly generate context-specific wordlists for content discovery from lists of URLs or paths.]]></image:caption><image:title><![CDATA[wordlistgen]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/words-scraper</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/words-scraper-3694.png</image:loc><image:caption><![CDATA[Selenium based web scraper to generate passwords list.]]></image:caption><image:title><![CDATA[Words Scraper]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wordsmith</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wordsmith-7402.png</image:loc><image:caption><![CDATA[Assist with creating tailored wordlists, mostly based on geolocation.]]></image:caption><image:title><![CDATA[Wordsmith]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wpfinger</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wpfinger-9891.png</image:loc><image:caption><![CDATA[wpfinger is a red-team WordPress scanning tool.]]></image:caption><image:title><![CDATA[wpfinger]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wprecon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wprecon-6839.png</image:loc><image:caption><![CDATA[Tool for the recognition of vulnerabilities and blackbox information for Wordpress.]]></image:caption><image:title><![CDATA[WPRecon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wpscan</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wpscan-1700.png</image:loc><image:caption><![CDATA[WPScan WordPress Security Scanner]]></image:caption><image:title><![CDATA[WPScan]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wpspider</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wpspider-3868.png</image:loc><image:caption><![CDATA[A centralized dashboard for running and scheduling WordPress scans powered by WPScan utility.]]></image:caption><image:title><![CDATA[WPSpider]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/writehat</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/writehat-4347.png</image:loc><image:caption><![CDATA[A pentest reporting tool.]]></image:caption><image:title><![CDATA[writehat]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wsdl-wizard</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wsdl-wizard-5347.png</image:loc><image:caption><![CDATA[Burp Suite plugin to detect current and discover new WSDL files.]]></image:caption><image:title><![CDATA[WSDL Wizard]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wstunnel</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wstunnel-1304.png</image:loc><image:caption><![CDATA[Tunneling over websocket protocol - Static binary available.]]></image:caption><image:title><![CDATA[wstunnel]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/wtfis</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/wtfis-2924.png</image:loc><image:caption><![CDATA[Passive hostname, domain and IP lookup tool for non-robots.]]></image:caption><image:title><![CDATA[wtfis]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/x64dbg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/x64dbg-2771.png</image:loc><image:caption><![CDATA[An open-source user mode debugger for Windows for reverse engineering and malware analysis.]]></image:caption><image:title><![CDATA[x64dbg]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/x8</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/x8-7592.png</image:loc><image:caption><![CDATA[Hidden parameters discovery suite.]]></image:caption><image:title><![CDATA[X8]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xenotix</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xenotix-3231.png</image:loc><image:caption><![CDATA[An advanced Cross Site Scripting vulnerability detection and exploitation framework.]]></image:caption><image:title><![CDATA[Xenotix]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xffenum</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xffenum-9633.png</image:loc><image:caption><![CDATA[X-Forwarded-For [403 forbidden] enumeration.]]></image:caption><image:title><![CDATA[XFFenum]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xnlinkfinder</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xnlinkfinder-7691.png</image:loc><image:caption><![CDATA[A python tool used to discover endpoints and potential parameters for a given target.]]></image:caption><image:title><![CDATA[xnLinkFinder]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xnlreveal</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xnlreveal-2109.png</image:loc><image:caption><![CDATA[A Chrome browser extension to show alerts for several hidden elements.]]></image:caption><image:title><![CDATA[XnlReveal]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xray</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xray-1030.png</image:loc><image:caption><![CDATA[Security assessment tool that supports common web security issue scanning and custom PoC.]]></image:caption><image:title><![CDATA[xray]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xspear</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xspear-7240.png</image:loc><image:caption><![CDATA[Powerfull XSS Scanning and Parameter analysis tool&gem.]]></image:caption><image:title><![CDATA[XSpear]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsrfprobe</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsrfprobe-2198.png</image:loc><image:caption><![CDATA[The Prime Cross Site Request Forgery Audit and Exploitation Toolkit.]]></image:caption><image:title><![CDATA[XSRFProbe]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsshunter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsshunter-9723.png</image:loc><image:caption><![CDATA[The fastest way to set up XSS Hunter to test and find blind cross-site scripting vulnerabilities.]]></image:caption><image:title><![CDATA[XSS Hunter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xss-hunter-express</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xss-hunter-express-1619.png</image:loc><image:caption><![CDATA[The fastest way to set up XSS Hunter to test and find blind XSS vulnerabilities.]]></image:caption><image:title><![CDATA[XSS Hunter Express]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xss-radar</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xss-radar-3489.png</image:loc><image:caption><![CDATA[A Chrome extension for fast and easy XSS fuzzing.]]></image:caption><image:title><![CDATA[XSS Radar]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xss-sql-fuzz</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xss-sql-fuzz-3914.jpeg</image:loc><image:caption><![CDATA[Burp Suite plugin for XSS and SQLi which add our payload to all parameters with one click.]]></image:caption><image:title><![CDATA[Xss-Sql-Fuzz]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xss-or</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xss-or-4262.png</image:loc><image:caption><![CDATA[Hack with JavaScript.]]></image:caption><image:title><![CDATA[XSS'OR]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xss2png</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xss2png-9789.png</image:loc><image:caption><![CDATA[PNG IDAT chunks XSS payload generator.]]></image:caption><image:title><![CDATA[xss2png]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsscon</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsscon-6757.png</image:loc><image:caption><![CDATA[Simple XSS Scanner tool.]]></image:caption><image:title><![CDATA[XSSCon]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsscrapy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsscrapy-1019.png</image:loc><image:caption><![CDATA[Fast, thorough, XSS/SQLi spider.]]></image:caption><image:title><![CDATA[xsscrapy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsser</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsser-9664.png</image:loc><image:caption><![CDATA[Automatic framework to detect, exploit and report XSS vulnerabilities in web-based applications.]]></image:caption><image:title><![CDATA[XSSer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xssmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xssmap-6203.png</image:loc><image:caption><![CDATA[Detect XSS vulnerability in Web Applications.]]></image:caption><image:title><![CDATA[XSSMap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xssor2</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xssor2-4374.png</image:loc><image:caption><![CDATA[Hack with JavaScript.]]></image:caption><image:title><![CDATA[xssor2]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xssrocket</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xssrocket-1130.png</image:loc><image:caption><![CDATA[Written by Black Hat Ethical Hacking and #ChatGPT for offensive security and XSS attacks.]]></image:caption><image:title><![CDATA[XSSRocket]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsstrike</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsstrike-8676.png</image:loc><image:caption><![CDATA[Most advanced XSS scanner.]]></image:caption><image:title><![CDATA[XSStrike]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xssvalidator</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xssvalidator-8199.png</image:loc><image:caption><![CDATA[A Burp Intruder extender designed for automation and validation of XSS vulnerabilities.]]></image:caption><image:title><![CDATA[xssValidator]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xsswagger</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xsswagger-1036.png</image:loc><image:caption><![CDATA[A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks.]]></image:caption><image:title><![CDATA[XSSwagger]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xurlfind3r</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xurlfind3r-4702.png</image:loc><image:caption><![CDATA[A cli utility to find domain's known URLs from curated passive online sources.]]></image:caption><image:title><![CDATA[xurlfind3r]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xvwa</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xvwa-5985.png</image:loc><image:caption><![CDATA[A badly coded web application that helps security enthusiasts to learn application security.]]></image:caption><image:title><![CDATA[XVWA]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xxe-ftp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xxe-ftp-4690.png</image:loc><image:caption><![CDATA[A mini webserver with FTP support for XXE payloads.]]></image:caption><image:title><![CDATA[XXE-FTP]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xxeinjector</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xxeinjector-4970.png</image:loc><image:caption><![CDATA[Exploitation of XXE vulnerability using direct and different out of band methods.]]></image:caption><image:title><![CDATA[XXEinjector]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xxelixir</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xxelixir-5456.png</image:loc><image:caption><![CDATA[This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.]]></image:caption><image:title><![CDATA[XXElixir]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xxeserv</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xxeserv-5493.png</image:loc><image:caption><![CDATA[A mini webserver with FTP support for XXE payloads.]]></image:caption><image:title><![CDATA[xxeserv]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/xxexploiter</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/xxexploiter-7429.png</image:loc><image:caption><![CDATA[Tool to help exploit XXE vulnerabilities.]]></image:caption><image:title><![CDATA[XXExploiter]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/yara</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/yara-2720.png</image:loc><image:caption><![CDATA[The pattern matching swiss knife for malware researchers.]]></image:caption><image:title><![CDATA[Yara]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/yersinia</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/yersinia-9428.png</image:loc><image:caption><![CDATA[A framework for layer 2 attacks.]]></image:caption><image:title><![CDATA[yersinia]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/yet-another-robber</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/yet-another-robber-2041.png</image:loc><image:caption><![CDATA[Yar is a tool for plunderin' organizations, users and/or repositories...]]></image:caption><image:title><![CDATA[Yet Another Robber]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/yet-another-sniffer</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/yet-another-sniffer-4771.png</image:loc><image:caption><![CDATA[A network analyzer that make easy to extract informations about network traffic.]]></image:caption><image:title><![CDATA[Yet Another Sniffer]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/yoga</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/yoga-1408.png</image:loc><image:caption><![CDATA[Your OSINT Graphical Analyzer.]]></image:caption><image:title><![CDATA[Yoga]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ysoserial</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ysoserial-7436.png</image:loc><image:caption><![CDATA[Generates payloads that exploit unsafe Java object deserialization.]]></image:caption><image:title><![CDATA[ysoserial]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/ysoserial.net</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/ysoserial.net-4799.png</image:loc><image:caption><![CDATA[Deserialization payload generator for a variety of .NET formatters.]]></image:caption><image:title><![CDATA[ysoserial.net]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zarp</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zarp-9880.png</image:loc><image:caption><![CDATA[Network attack tool.]]></image:caption><image:title><![CDATA[zarp]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zdns</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zdns-3783.png</image:loc><image:caption><![CDATA[Fast CLI DNS lookup tool.]]></image:caption><image:title><![CDATA[zdns]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zed-attack-proxy</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zed-attack-proxy-8900.png</image:loc><image:caption><![CDATA[The world's most widely used web app scanner.]]></image:caption><image:title><![CDATA[Zed Attack Proxy]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zgrab</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zgrab2-8238.png</image:loc><image:caption><![CDATA[Fast Go application scanner.]]></image:caption><image:title><![CDATA[zgrab]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zmap</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zmap-1282.png</image:loc><image:caption><![CDATA[Fast single packet network scanner designed for Internet-wide network surveys.]]></image:caption><image:title><![CDATA[zmap]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zphisher</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zphisher-5292.png</image:loc><image:caption><![CDATA[An automated phishing tool with 30+ templates.]]></image:caption><image:title><![CDATA[Zphisher]]></image:title></image:image></url><url><loc>https://offsec.tools/tool/zsteg</loc><priority>1.0</priority><image:image><image:loc>https://assets.offsec.tools/tools/zsteg-3100.png</image:loc><image:caption><![CDATA[Detect stegano-hidden data in PNG & BMP.]]></image:caption><image:title><![CDATA[zsteg]]></image:title></image:image></url><url><loc>https://offsec.tools/tag/2fa</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/activedirectory</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/adcs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/aem</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ai</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/alibaba</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/allineone</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/allinone</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/altdns</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/android</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/angular</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/apache</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/api</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/apk</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/archives</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/arm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/arp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/asn</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/asp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/assembler</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/authentication</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/authorization</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/automation</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/aws</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/azure</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/backdoor</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/backend</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/backups</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bash</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bazaar</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bing</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bios</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bitbucket</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bitly</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/blacklist</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/blh</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/blockchain</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bloodhound</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/blueteam</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bluetooth</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/boot</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/browser</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bruteforce</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/buckets</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bugcrowd</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/burpsuite</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/bypass</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/c2c</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cakephp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cameras</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/captcha</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cargo</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cdn</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/censys</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/certificates</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/certspotter</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/challenges</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cheatsheets</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/chrome</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/clickjacking</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cloner</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cloud</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cloudflare</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cloudfront</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/clusters</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cms</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cobalstrike</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cobaltstrike</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/codeanalysis</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/collaboration</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/commoncrawl</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/companies</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/compiler</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/composer</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/confluence</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/containers</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cookies</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cors</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/couchdb</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cracker</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/crawler</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/credentials</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/crlf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/crtsh</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cryptography</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/csp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/csrf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/css</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/csti</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ctf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cves</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/cvs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/decompiler</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/deepfake</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/defense</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/dependencies</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/deserialization</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/detectify</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/development</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/digitalocean</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/directories</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/directorylisting</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/disassembler</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/discovery</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/django</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/dns</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/docker</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/documents</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/dom</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/domains</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/dorks</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/dotnet</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/drupal</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/egress</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/emails</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/emulation</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/encoding</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/encryption</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/endpoints</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/enumeration</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ethereum</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/evasion</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/exchange</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/exercices</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/exfiltration</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/exploits</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/export</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/facebook</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/favicon</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/federacy</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/files</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/fileupload</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/fingerprint</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/firebase</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/firefox</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/firewall</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/flash</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/flask</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/forensic</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/framework</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/frida</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ftp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/fuzzing</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/geolocation</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/git</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/github</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/gitlab</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/golang</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/google</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/gpt</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/grafana</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/graphql</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hackenproof</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hackerone</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hackers</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/har</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hardware</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hash</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/headers</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/heroku</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/honeypot</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/hrs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/html</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/http</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/iam</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/icmp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/idor</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ids</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/iis</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/images</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/imap</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/immunefi</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/instagram</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/intigriti</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ios</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/iot</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ip</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ips</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ipsec</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/j2ee</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/java</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/javascript</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/jira</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/joomla</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/jquery</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/json</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/jsonp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/jwt</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/kerberos</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/kubernetes</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/lan</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/laravel</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ldap</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/leaks</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/learning</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/lfd</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/lfi</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/linkedin</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/linode</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/linux</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/logs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/lsass</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/lync</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/macos</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/malware</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mapping</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/markdown</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mastodon</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/maven</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/memory</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mercurial</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/metadata</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/metasploit</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/meterpreter</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mfa</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mifare</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mitm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mitre</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mobile</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mongodb</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/monitoring</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/moodle</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/mssql</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nat</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nessus</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/netbios</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/netify</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/network</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/networkd</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nfc</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nim</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nmap</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nodejs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nosql</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/nosqli</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/npm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ntlm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/o365</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/obfuscation</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/office</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/online</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/oob</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/openid</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/openredirect</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/oracle</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/orchestration</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/organizer</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/osint</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/overflow</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/owasp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/p2p</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/parameters</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/parser</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/passwords</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/pastebin</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/payloads</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/permissions</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/persistence</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/phishing</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/phones</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/php</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/pii</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/pip</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/pivot</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/platforms</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ports</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/postexploitation</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/postman</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/postmessage</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/powershell</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/privacy</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/privesc</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/probing</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/protocols</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/prototype-pollution</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/proxy</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/python</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/racecondition</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rails</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rat</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ratelimit</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rce</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rdp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/react</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/recon</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/redis</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/redteam</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/regexp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/reports</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/requests</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/resources</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rest</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/reverse-engineering</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rfi</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rfid</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/router</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rpc</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rsa</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/rtsp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ruby</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/saas</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/salesforce</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/samba</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/scaleway</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/scanner</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sccm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/scm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/scope</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/scraper</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/screenshots</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/second-order</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/secrets</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/securitytrails</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sentry</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/session</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/shares</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/shell</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/shodan</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/siem</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/silverstripe</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/skype</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/slack</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sniffer</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/social-engineering</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/socialnetworks</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/software-analysis</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/solidity</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/spf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/splunk</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/spoofing</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/spraying</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sql</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sqli</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sqlmap</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/sqlserver</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssdp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssh</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssji</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssl</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssrf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/ssti</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/steganography</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/stripping</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/subdomains</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/subto</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/svg</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/svn</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/swagger</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/symfony</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/synack</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tcp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/technologies</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/telegram</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/terminal</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/terraform</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tls</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/toolkit</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tor</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/totp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tracker</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/training</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tunnel</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/tunneling</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/twitter</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/uac</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/udp</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/usb</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/usernames</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/utils</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vbulletin</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vhosts</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/videos</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/virustotal</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/voip</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vpn</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vuejs</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vulnerabilities</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/vultr</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/waf</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/webarchives</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/webcam</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/webdav</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/webhooks</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/webservices</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/websocket</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wifi</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/windows</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/winrm</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wireless</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/word</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wordfence</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wordlists</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wordpress</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wpa</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/writeups</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/wsdl</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/x86</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/xml</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/xss</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/xxe</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/yahoo</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/yaml</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/tag/yeswehack</loc><priority>0.3</priority></url><url><loc>https://offsec.tools/about</loc></url><url><loc>https://offsec.tools/addtool</loc></url><url><loc>https://offsec.tools/advertise</loc></url><url><loc>https://offsec.tools/contributors</loc></url><url><loc>https://offsec.tools/index.bak</loc></url><url><loc>https://offsec.tools/last7days</loc></url><url><loc>https://offsec.tools/maintenance</loc></url><url><loc>https://offsec.tools/newsletter</loc></url><url><loc>https://offsec.tools/rejected</loc></url><url><loc>https://offsec.tools/surprise</loc></url><url><loc>https://offsec.tools/browse/alphabet</loc></url><url><loc>https://offsec.tools/browse/categories</loc></url><url><loc>https://offsec.tools/</loc></url></urlset>