Cybersecurity & Pentesting
AI Tools & Resources
Browser Extensions
Downloads
Desktop Customization
Lite OS & Custom Builds
Wallpapers
Free & Cheap Games
Domain Tools & Resources
Learning & Courses
Privacy & Security
Apple & iOS
Android & Custom ROMs
Retro Gaming & Emulation
Smart Home
Self-Hosting & Homelab
Developer Tools & Environments
Ultimate Privacy & De-Google
CLI & Terminal Tools
Cybersecurity & Pentesting
Security distros, reconnaissance tools, exploit frameworks, CTF platforms, OSINT, certifications, and everything for offensive and defensive security.
Security Distributions
(8)
The industry-standard penetration testing distro from Offensive Security — 600+ pre-installed tools, Debian-based, ARM support
Arch-based distro with 2,800+ security tools — use as a standalone OS or add the BlackArch repo to existing Arch installs
Reconnaissance & Scanning
Gather emails, subdomains, hosts, employee names, open ports from different public sources for OSINT
Fast, simple, recursive content discovery tool written in Rust — like gobuster but with recursion, filters, and resume support
Web Application Security
The standard web application security testing platform — intercepting proxy, scanner, repeater, intruder, and extensions
Free interactive labs covering all OWASP Top 10 — SQL injection, XSS, SSRF, CSRF, and more with hands-on practice
The definitive awareness document for web application security — 10 most critical security risks updated periodically
Exploit Frameworks & Post-Exploitation
The world's most used penetration testing framework — exploit modules, payloads, post-exploitation, and auxiliary scanners
Uses graph theory to reveal hidden attack paths in Active Directory — map domain trusts, GPO abuse, Kerberos delegation
Swiss army knife for pentesting Windows/AD environments — spray credentials, execute commands, dump secrets across the network
Ultimate Windows Remote Management shell — upload/download files, load PowerShell scripts, pass the hash, log bypasses
OSINT & Intelligence Gathering
Automated OSINT collection tool with 200+ modules — scans IPs, domains, emails, names, and correlates findings
Check if your email or password has been exposed in data breaches — free API, domain monitoring, breach notifications
Comprehensive collection of OSINT tools organized by category — the go-to starting point for any intelligence gathering
Michael Bazzell's OSINT tools and training — custom search tools, books, podcast, and professional investigation resources
Network Security & Packet Analysis
Network forensic analysis tool — extract files, images, and credentials from packet captures without deep protocol knowledge
Password & Credential Tools
Classic password cracker supporting hundreds of hash and cipher types — CPU-based, jumbo community edition adds even more
Wireless Security
Complete suite for WiFi security assessment — packet capture, WEP/WPA cracking, replay attacks, and deauthentication
Hak5's portable wireless auditing platform — rogue AP, MITM, recon, and reporting in a pocket-sized device
Tool to capture PMKID and handshakes from WiFi networks for offline cracking — works without deauth attacks on modern WPA
Vulnerability Scanners
Cloud-based vulnerability management with up to 16 IPs free — asset discovery, prioritization, and compliance checks
Digital Forensics & Incident Response
The gold standard for memory forensics — extract running processes, network connections, loaded DLLs, and artifacts from RAM dumps
Advanced endpoint visibility and forensics — hunt across thousands of endpoints, collect artifacts, live response at scale
Automated malware analysis system — submit suspicious files and get detailed reports on behavior, API calls, and network traffic
CTF Platforms & Practice Labs
Gamified cybersecurity platform with vulnerable machines, challenges, and pro labs — the proving ground for pentesting skills
War games to learn security concepts through SSH challenges — Bandit (Linux basics) to Vortex (advanced exploitation)
Structured cybersecurity courses with hands-on labs — from fundamentals to advanced AD attacks, CPTS certification path
Intentionally vulnerable PHP/MySQL web app for security testing practice — SQL injection, XSS, CSRF, file inclusion, and more
Intentionally insecure web app covering the entire OWASP Top 10 — hacking challenges with a scoreboard and tutorials
System exploitation war game — binary exploitation challenges from toddler's bottle to advanced kernel exploits
Certifications & Training
Offensive Security Certified Professional — the most respected hands-on pentesting certification with a 24-hour practical exam
Industry baseline certification for cybersecurity — covers network security, threats, cryptography, identity management, and compliance
Practical Network Penetration Tester — 5-day practical exam covering OSINT, external/internal pentesting, AD attacks, and reporting
Affordable hands-on hacking courses by Heath Adams — ethical hacking, AD pentesting, OSINT, web app pentesting, and more
Entry-level penetration testing certification — practical exam covering networking, web app, and host-based pentesting
Premium cybersecurity training and certifications — GCIH, GPEN, GCIA, GSEC, and dozens more for every security domain
Free CompTIA certification training videos — Security+, Network+, A+ courses with study groups and practice exams
Bug Bounty & Responsible Disclosure
Methodology-focused training platform — learn recon, exploitation, and reporting specifically for bug bounty hunting
Hacking Hardware & Gadgets
Portable multi-tool for pentesters — RFID, NFC, Sub-GHz, IR, GPIO, BadUSB, and iButton all in a Tamagotchi-sized device
Open-source software-defined radio platform — transmit and receive 1 MHz to 6 GHz for wireless protocol analysis and replay
Cable that looks normal but hides a WiFi-enabled implant — keystroke injection, payload deployment, and geofencing for red teams
Communities & News
Leading cybersecurity news publication — zero-days, data breaches, vulnerability disclosures, and malware analysis
Brian Krebs' investigative cybersecurity journalism — in-depth reporting on cybercrime, data breaches, and threat actors
Podcast telling true stories from the dark side of the internet — pentesting stories, hackers, cybercrime, and social engineering
Curated collection of hacking tools, resources, and references — one of the most comprehensive security resource lists on GitHub
Knowledge base of adversary tactics and techniques based on real-world observations — the language of threat intelligence
Archive of public exploits and vulnerable software — maintained by OffSec, searchable by CVE, platform, type, and author
Cybersecurity YouTuber with CTF walkthroughs, malware analysis, hacking tutorials, and tool demonstrations
No items found matching your filters.