Penetration Testing Tools Page 2 of 4

All apps in Penetration Testing Tools category. Use the filters below to narrow down your search. 

Popular filters:

Copy a direct link to this comment to your clipboard
  1. Gobuster icon
     2 likes

    Directory/File, DNS and VHost busting tool written in Go - GitHub - OJ/gobuster: Directory/File, DNS and VHost busting tool written in Go

    • FreeOpen Source
    • Linux
    DNS options
    4 alternatives
  2. Reconmap icon
     5 likes

    Reconmap is an open-source tool for InfoSec teams to collaborate on pentest and other security projects. They can create projects from templates, keep track of tasks, upload results and get automatic insights that are available on the browser and in customisable HTML and PDF...

    Reconmap screenshot 1
    3 alternatives
  3. Matriux icon
     7 likes

    Matriux is a fully featured security distribution consisting of a bunch of powerful, open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber forensics...

    Matriux screenshot 1
    33 alternatives
  4. Parrot CTFs  icon
     4 likes

    Elevate your hacking skills at Parrot CTFs! We provide premier ethical hacking training and labs, catering to beginners and pros. Join our global community and level up your cybersecurity skills with our realistic hacking labs and challenges.

    Parrot CTFs Labs
    8 alternatives
  5. SecApps icon
     4 likes

    Find security vulnerabilities right from your browser. Experience the next generation security tools without the need to install any additional software.

    SecApps screenshot 1
    20 alternatives
  6. DIRB icon
     2 likes

    DIRB is a Web Content Scanner. It looks for existing (and/or hidden) Web Objects. It basically works by launching a dictionary based attack against a web server and analyzing the response.

    • Discontinued
    • FreeOpen Source
    • Mac
    • Linux
    4 alternatives
  7. Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide.

    14 alternatives
  8. HackThisSite icon
     3 likes

    Hack This Site is a free training ground for users to test and expand their hacking skills. Our community is dedicated to facilitating an open learning environment by providing a series of hacking challenges, articles, resources, and discussion of the latest happenings in hacker...

    HackThisSite screenshot 1
    11 alternatives
  9. Barrion icon
     1 like

    Barrion helps developers and tech teams secure their web applications by automating security checks. It scans websites and web apps for common vulnerabilities, evaluates SSL/TLS and email security (SPF, DKIM, DMARC), and checks security headers and outdated software.

    Barrion screenshot 1
    19 alternatives
  10. Waircut icon
     3 likes

    Wireless Air Cut is a WPS wireless, portable and free network audit software for Ms Windows. It is used to check the security of our WPS wireless networks and to detect possible security breaches.

    Waircut screenshot 1
    3 alternatives
  11. Cyborg Linux icon
     8 likes

    The most advanced, powerful and yet beautiful penetration testing distribution ever created.Lined up with ultimate collection of tools for pro Ethical Hackers and Cyber Security Experts.

    INTERNET
    16 alternatives
  12. Pentester icon
     1 like

    In today's digital landscape, your online presence is constantly at risk. Cybercriminals are becoming increasingly sophisticated, and the stakes have never been higher. Your sensitive information, client data, and even your reputation are on the line.

    • FreemiumProprietary
    • Online
    Pentester screenshot 1
    28 alternatives
  13. DorkPlus icon
     1 like

    DorkPlus is a all in one solution with more than 10 modules including a Web Scraper (Google, Bing, Ask...), a Vulnerability Scanner (SQL, XSS, ENV..), a Database Dumper, and more unique built-in tools dedicated to pentesting.

    Task management
    3 alternatives
  14. PENTESTON icon
     3 likes

    PENTESTON is a cloud-based Cybersecurity platform that allows you to oversee the complete secure development lifecycle of your application. It functions as a cyber security reporting and workflow management system, providing you with the necessary tools to manage the entire...

    PENTESTON screenshot 1
  15. Echo Mirage icon
     2 likes

    Echo Mirage, a freeware tool that hooks into an application’s process and enables us to monitor the network interactions being done. This process can be done with a running process, or it can run the application on the user’s behalf.

    Echo Mirage screenshot 1
    2 alternatives
  16. WHID Injector was born from the need for cheap and dedicated hardware that could be remotely controlled in order to conduct HID attacks. WHID stands for WiFi HID Injector. It is a cheap but reliable piece of hardware designed to fulfill pentesters needs related to HID Attacks...

    WHID Mobile Connector screenshot 1
    WHID Mobile Connector screenshot 2
    WHID Mobile Connector screenshot 3
    4 alternatives