Security Tools
Built for the Field
Professional-grade utilities for penetration testing, network analysis, OSINT, forensics, and threat hunting — curated and tested by the community.
Network Analysis
The gold standard for network discovery and security auditing. Uses raw IP packets to determine hosts, services, OS versions, firewall configurations, and dozens of other characteristics. Essential for any penetration tester's toolkit.
Deep packet inspection and real-time network protocol analyzer. Capture and interactively browse traffic on a computer network with 3000+ protocol dissectors.
The "Swiss-army knife" of networking. Reads and writes data across network connections using TCP/UDP — ideal for port scanning, banner grabbing, and file transfer.
OSINT & Recon
Search engine for internet-connected devices. Discover exposed servers, webcams, routers, and ICS/SCADA systems indexed worldwide.
Visual link analysis tool for intelligence gathering. Map relationships between people, domains, IPs, and organizations with interactive graph views.
Gather emails, subdomains, hosts, employee names, and open ports from public sources for passive reconnaissance during engagements.
Web Application
The leading web application security testing platform. Intercept, analyze, and modify HTTP/HTTPS traffic between browser and server with powerful scanner and intruder modules.
Automated SQL injection and database takeover tool. Detects and exploits SQL injection flaws with a powerful detection engine and broad DBMS support.
Open-source web app scanner. Find security vulnerabilities during development — perfect for CI/CD pipeline integration and automated testing.
Forensics & Analysis
Digital forensics platform used by law enforcement globally. Analyze hard drives and smartphones, recover deleted files, and timeline browser activity.
Advanced memory forensics framework. Extract digital artifacts from volatile memory (RAM) dumps — essential for incident response and malware triage.
Cryptography
Web app for encryption, encoding, compression, and data analysis. Chain 300+ operations into "recipes" — XOR, Base64, AES, JWT decode, and more. A daily staple for CTF players and security researchers worldwide.
World's fastest password recovery tool. Supports 320+ hash types with GPU acceleration — essential for password auditing and CTF challenges.
Malware Analysis
Analyze suspicious files, URLs, IPs and domains to detect malware using 70+ antivirus engines and URL/domain blocklisting services simultaneously.
NSA's reverse engineering framework. Analyze compiled code across multiple platforms and processor architectures with a powerful disassembler and decompiler.
Password Utilities
Generate cryptographically strong passwords instantly. Customize length, character sets, and copy to clipboard with one click.
Try a different search term or filter category.
Missing a Tool?
Submit a request or contribute to our open-source arsenal. We review all submissions within 48 hours.