Skip to content

nemocyberworld/Offsec-Tools

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ› οΈ Offensive Security Tools & Techniques

Whether you're a student, a CTF player, or a working security professional β€” this project is designed to help you discover, understand, and organize the landscape of offensive tools effectively.


πŸ”§ Purpose

This repository is NOT a collection of walkthroughs or cheatsheets.Instead, it is a structured catalog that:

  • Groups hacking tools by functional categories
  • Highlights usage contexts and links to external resources/labs
  • Serves as a starting point for learning and using each class of tools
  • Helps with training, teaching, and internal knowledge sharing

πŸ“‚ Categories Covered

Each entry is grouped into a functional category of offensive security:

Tool Category Description
πŸ” Recon Tools Tools used for gathering information before active engagement (e.g., Nmap, Amass, Subfinder)
πŸ“‘ Enumeration Tools Tools for discovering network services, users, shares, etc. (e.g., Enum4linux, SMBMap)
🌐 OSINT Tools Open-source intelligence tools for footprinting (e.g., theHarvester, Maltego)
πŸ”“ Vulnerability Scanners Tools to detect known vulnerabilities (e.g., Nuclei, Nikto, OpenVAS)
πŸ› οΈ Exploitation Frameworks Tools for delivering exploits (e.g., Metasploit, ExploitDB, Searchsploit)
🏴 Red Team Frameworks Offensive infrastructure and attack simulation (e.g., Cobalt Strike, Sliver, Mythic)
πŸš€ Privilege Escalation Techniques and automation tools for privesc (e.g., LinPEAS, WinPEAS)
🐚 Post-Exploitation Credential dumping, pivoting, persistence (e.g., Mimikatz, LaZagne)
πŸ‘£ Evasion Techniques Obfuscation, LOLBins, and AV/EDR evasion (e.g., Invoke-Obfuscation, SharpHound)
βš™οΈ Binary Exploitation Stack/heap exploitation tools (e.g., GDB, pwndbg, ROPgadget)
πŸ§ͺ Fuzzers Vulnerability discovery via fuzzing (e.g., AFL++, libFuzzer, Peach)
πŸ” Reverse Engineering Tools to analyze and reverse binaries (e.g., Ghidra, IDA Pro, radare2)
πŸ“Ά Wireless Hacking WiFi and Bluetooth attack tools (e.g., Aircrack-ng, Bettercap)
πŸ›°οΈ C2 Frameworks Command-and-Control frameworks (e.g., Covenant, Empire, Merlin)
πŸ§ͺ Web Exploitation Tools XSS, SQLi, SSRF tools (e.g., XSStrike, sqlmap, Burp Suite)
πŸ›‘οΈ Active Directory Attacks Kerberoasting, AS-REP Roasting (e.g., Rubeus, BloodHound)
☁️ Cloud Security Tools Enumeration & exploitation of AWS, Azure, GCP (e.g., ScoutSuite, Pacu)
🐳 Container & K8s Docker & Kubernetes attack tools (e.g., kube-hunter, dockerscan)
πŸ”Œ IoT & Hardware UART, JTAG, firmware reverse tools (e.g., JTAGulator, Binwalk)
πŸ€– ML & AI in Security Tools for adversarial evasion and malware generation (e.g., ART, SecML)

About

Well documented about all types of offensive security tools.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published