ENNA
Discover, compare, and deploy the best open-source OSINT and reconnaissance tools. Curated. Categorized. Live stats.
en-na.com
Aircrack-ng
Complete suite for WiFi network security assessment. Monitoring, attacking, testing, and cracking.
Amass
In-depth attack surface mapping and asset discovery. DNS enumeration, network mapping, OSINT data sources.
Arkham Intelligence
Entity-based blockchain analytics. Ultra system maps on-chain activity to real-world entities across chains.
BeEF
Browser Exploitation Framework. Hook browsers via XSS, then pivot into the network using browser-based attacks.
Bettercap
Swiss army knife for WiFi, Bluetooth, and ethernet network recon and MITM. Scriptable with JS.
Bitcoin Core CLI
Official Bitcoin node with full RPC interface. Query the blockchain directly — raw transactions, mempool, UTXO lookups.
BlockScout
Open-source blockchain explorer for Ethereum and EVM chains. Full-featured with smart contract verification.
BloodHound
Active Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Breadcrumbs
Blockchain analytics and investigation tool. Trace Bitcoin and Ethereum transactions through multiple hops.
Burp Suite Community
Web vulnerability scanner and proxy. Intercept, modify, and replay HTTP/S traffic for web app testing.
Cast (Foundry)
Swiss army knife for Ethereum. Send transactions, query chain data, decode calldata, compute hashes — all from CLI.
Certipy
Active Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
CrackMapExec
Swiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Cryo
Extract blockchain data into Parquet or CSV. High-performance bulk exporter for blocks, transactions, logs, and traces.
dnscat2
Create an encrypted C2 channel over DNS. Tunnel data through DNS queries when all other protocols are blocked.
Donut
Generates position-independent shellcode from .NET assemblies, PE files, and DLLs. Load anything in memory.
Dune Analytics CLI
Query blockchain data with SQL. Ethereum, Polygon, Optimism, Arbitrum, Solana, and more. Community dashboards.
Empire
Post-exploitation agent built on PowerShell and Python. Cryptologically-secure communications and flexible architecture.
Evilginx2
Man-in-the-middle attack framework for phishing credentials and session cookies, bypassing 2FA.
Feroxbuster
Fast, recursive content discovery tool written in Rust. Like gobuster on steroids with auto-recursion.
ffuf
Fast web fuzzer written in Go. Fuzz anything — URLs, headers, POST data — with blazing speed.
Flipper Zero Firmware
Custom firmware for Flipper Zero. Sub-GHz, RFID, NFC, infrared, and GPIO hacking multi-tool.
Forta
Real-time threat detection for blockchain. Community-built detection bots monitoring for exploits, scams, and anomalies.
Frida
Dynamic instrumentation toolkit for developers and security researchers to inject scripts into native apps.
Geth (Go Ethereum)
Official Go implementation of Ethereum. Full node, archive node, and light client with rich JSON-RPC API.
Ghidra
NSA's reverse engineering framework. Disassembly, decompilation, graphing, and scripting for binary analysis.
GoPhish
Open-source phishing framework. Create campaigns, track results, and train users with realistic simulations.
GraphSense
Cryptoasset analytics platform. Address clustering, entity mapping, and flow analysis for Bitcoin and Ethereum.
GTFOBins
Curated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.
HackRF One
Open-source software-defined radio platform. Transmit and receive 1 MHz to 6 GHz. The hardware hacker's SDR.
Hashcat
World's fastest password recovery tool. GPU-accelerated with support for 300+ hash types.
Havoc
Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
LinPEAS
Linux privilege escalation enumeration script. Finds misconfigs, SUID bins, creds, and escalation paths.
LOLBAS
Living Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.
Metasploit Framework
The world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
mev-inspect-py
Detect and analyze MEV (Maximal Extractable Value) on Ethereum. Finds arbitrage, liquidations, and sandwiches.
Mimikatz
Extract plaintext passwords, hashes, PIN codes, and Kerberos tickets from Windows memory.
MistTrack
SlowMist's crypto tracking platform. Cross-chain fund tracing, address labeling, and risk scoring for AML.
MobSF
Automated mobile security framework for static and dynamic analysis of Android, iOS, and Windows apps.
Mythic
Collaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Mythril
Security analysis tool for EVM bytecode. Detects reentrancy, integer overflow, and access control vulnerabilities.
NetExec
Network execution tool — the maintained successor to CrackMapExec. SMB, LDAP, WinRM, SSH, MSSQL, and more.
ngrok
Expose local servers to the internet via secure tunnels. Instant public URLs for localhost services.
Nmap
The gold standard network scanner. Host discovery, port scanning, service/version detection, OS fingerprinting.
Nuclei
Fast vulnerability scanner driven by YAML templates. Thousands of community-contributed detection templates.
OpenVAS
Full-featured vulnerability scanner. 50,000+ NVTs, credentialed scanning, compliance checks.
Pacu
AWS exploitation framework. Enumerate, escalate, and exfiltrate across AWS services. The Metasploit of cloud.
ProxyChains-ng
Force any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.
pwncat
Post-exploitation platform and target management. Automatic privesc, persistence, file transfer — the smart reverse shell.
Rclone
rsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.
Rubeus
C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
ScareCrow
Payload creation framework for EDR bypass. Generates loaders using WinAPI syscalls to evade userland hooks.
SecLists
The security tester's companion. Huge collection of wordlists — usernames, passwords, URLs, fuzzing payloads, shells.
Sherlock
Hunt down social media accounts by username across 400+ social networks simultaneously.
Slither
Solidity static analysis framework. Detects vulnerabilities, prints contract info, and suggests optimizations.
Sliver
Open-source C2 framework by BishopFox. mTLS, HTTP(S), DNS, WireGuard implants with multi-operator support.
Social-Engineer Toolkit
Open-source social engineering framework. Spear-phishing, web attacks, USB/HID attacks, and credential harvesting.
SpiderFoot
Automated OSINT with 200+ modules. Web UI for scanning IPs, domains, emails, names, and more.
Subfinder
Fast passive subdomain enumeration tool. Uses multiple sources including certificate transparency logs.
Sysinternals Suite
Microsoft's advanced system utilities. PsExec, Process Monitor, Autoruns, TCPView — essential for both ops and offense.
THC Hydra
Fast online password brute-forcer. Supports 50+ protocols including SSH, FTP, HTTP, SMB, MySQL.
Tor
Anonymous communication network. Routes traffic through multiple relays to conceal location and usage.
TrueBlocks
Local-first Ethereum indexer. Decentralized, censorship-resistant access to blockchain data with rich APIs.
TruffleHog
Find leaked credentials in Git repos, S3 buckets, and filesystems. Regex and entropy-based detection.
Velociraptor
Endpoint visibility and collection tool. Hunt for artifacts across thousands of endpoints simultaneously.
Volatility 3
Advanced memory forensics framework. Extracts artifacts from RAM dumps — processes, network connections, registry.
Web3.py
Python library for interacting with Ethereum. Query blocks, decode transactions, call contracts, trace calls.
Wireshark
The world's foremost network protocol analyzer. Deep packet inspection for hundreds of protocols.
YARA
Pattern matching swiss knife for malware researchers. Create rules to identify and classify malware samples.
Alchemy SDK
Enhanced blockchain API. NFT metadata, token balances, transaction receipts, and webhook notifications.
Altdns
Subdomain discovery through alterations and permutations. Generates mutated wordlists from known subdomains.
APKTool
Reverse engineer Android APK files — decode resources, rebuild, and step-through debug smali code.
Arjun
HTTP parameter discovery suite. Finds hidden query parameters in web applications using smart heuristics.
arp-scan
Send ARP requests to discover and fingerprint hosts on the local network segment.
Assetfinder
Find domains and subdomains potentially related to a given domain. Pulls from multiple passive sources.
Autopsy
Digital forensics platform with GUI. Disk image analysis, timeline analysis, keyword search, hash filtering.
Binwalk
Firmware analysis tool. Searches binary images for embedded files, executables, and file systems.
Bitcoin-Abe
Block chain browser for Bitcoin and similar currencies. Self-hosted explorer with search and API.
BitcoinLib
Python Bitcoin library. Create wallets, parse transactions, interact with nodes, and analyze the UTXO set.
Blackbird
OSINT tool to search for user accounts across 500+ social networks and websites.
cdncheck
Detect whether an IP belongs to a CDN, cloud provider, or WAF to identify origin servers.
Censys CLI
Search engine for internet-connected devices. Alternative to Shodan with certificate and host search.
CeWL
Custom wordlist generator. Spiders a target site and builds password lists from scraped words.
Chainalysis Reactor (Free)
Blockchain investigation tool. Transaction graph visualization, wallet clustering, and entity identification.
ChainSight
Real-time monitoring of DEX trades, bridge transfers, and large movements. Custom alerts via webhook or Telegram.
Chisel
Fast TCP/UDP tunnel over HTTP secured via SSH. Single binary, works behind firewalls and NAT.
CloudBrute
Cloud infrastructure enumerator to find company assets across multiple cloud providers.
CloudMapper
Analyze AWS environments to create network diagrams and identify security risks.
CobaltStrike Parser
Parse and extract configs from Cobalt Strike beacons. Identify C2 servers, watermarks, and malleable C2 profiles.
Coercer
Automatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
Commix
Automated OS command injection exploitation tool. Tests web apps for command injection vulnerabilities.
Covenant
.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.
Creepy
Geolocation OSINT tool. Aggregates location data from social media, photos, and online services on a map.
Crystal Blockchain
Blockchain analytics platform for compliance and investigation with transaction flow visualization.
Cutter
GUI for Radare2. Makes reverse engineering accessible with graphs, decompiler, and hex editor built in.
CyLR
Live response collection tool for quickly gathering forensic artifacts from hosts during incident response.
DeBank API
Multi-chain DeFi portfolio tracker. Token holdings, protocol positions, NFTs, and approval management across 100+ chains.
DNSenum
Multithreaded DNS enumeration tool that discovers subdomains via dictionary brute-force, Google scraping, and zone transfers.
DNSRecon
DNS enumeration script. Zone transfers, reverse lookups, Google dorking, SRV records, and DNSSEC testing.
dnsx
Fast multi-purpose DNS toolkit. Retries, wildcard filtering, and multiple resolver support.
Drainer Detector
Detect wallet drainer contracts and phishing approval signatures. Scans for SetApprovalForAll and Permit2 abuse.
Drozer
Android security testing framework for identifying vulnerabilities in apps and devices.
EigenPhi Tools
DeFi attack and MEV analysis. Visualizes flash loan attacks, rug pulls, and arbitrage with transaction decoding.
Elliptic Lens
Crypto compliance and investigation tool. Cross-chain tracing, sanctions screening, and risk profiling.
EmailHarvester
Email harvesting from search engines. Supports Google, Bing, Yahoo, and ASK with proxy rotation.
enum4linux-ng
Windows/Samba enumeration tool. Extracts user lists, share info, group policies, and OS details via SMB.
Ethers.js
Complete Ethereum library for JavaScript. Wallet management, contract interaction, ENS resolution, and ABI encoding.
Etherscan API Tools
Python wrapper for Etherscan API. Query balances, transactions, token transfers, contract ABIs, and gas prices.
Ethtective
Ethereum transaction explorer and visualizer. Graph-based exploration of addresses and transaction flows.
Evil-WinRM
Ultimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
evm-trace
Python library for parsing and analyzing EVM call traces. Decode internal transactions and visualize call trees.
ExifTool
Read, write, and edit metadata in files. Supports EXIF, GPS, IPTC, XMP, and more across dozens of formats.
Fierce
DNS reconnaissance tool for locating non-contiguous IP space and hostnames against specified domains.
Fluxion
WPA security auditing tool that uses social engineering for handshake capture via evil twin attacks.
gau
Get All URLs. Fetches known URLs from AlienVault OTX, Wayback Machine, Common Crawl, and URLScan.
GHunt
Offensive Google framework to extract information from Google accounts using emails.
Gitleaks
Scan Git repos for hardcoded secrets like passwords, API keys, and tokens. CI/CD ready.
Gobuster
Directory/file, DNS, and vhost busting tool. Brute-forces URIs, DNS subdomains, virtual host names, and S3 buckets.
GoBuster DNS
DNS subdomain bruting using Go. Concurrent queries with wildcard detection and custom resolvers.
GoSpider
Fast web spider written in Go for crawling and collecting URLs, subdomains, and endpoints.
Hakrawler
Simple Go web crawler for quick discovery of endpoints and assets within a web application.
Holehe
Check if an email is registered on 120+ sites. Uses password recovery mechanisms to verify without logging in.
httpx
Fast multi-purpose HTTP toolkit. Probes for running HTTP servers with retries and fallbacks.
Impacket
Collection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
Instaloader
Download Instagram photos, videos, stories, and metadata. Profile archiving and OSINT data extraction.
JADX
DEX to Java decompiler producing readable Java source from Android APK and DEX files.
John the Ripper
Fast password cracker. Supports hundreds of hash types and ciphers. CPU and GPU modes.
JSFScan
Automation framework combining multiple JS analysis tools for comprehensive JavaScript recon.
Katana
Next-gen crawling and spidering framework. Headless browser and standard mode with automatic form fill.
King Phisher
Phishing campaign toolkit with web cloning, credential harvesting, and campaign analytics dashboard.
Kismet
Wireless network detector, sniffer, wardriving tool, and IDS. WiFi, Bluetooth, Zigbee, and more.
Knock
Subdomain enumeration tool using wordlist and DNS resolution. Supports VirusTotal and zone transfers.
LaZagne
Password recovery tool. Retrieves stored passwords from browsers, WiFi, databases, sysadmin tools, and more.
Ligolo-ng
Advanced tunneling/pivoting tool. Creates a TUN interface for transparent proxying through compromised hosts.
LinkFinder
Python script to discover endpoints and their parameters in JavaScript files.
Maigret
Sherlock fork on steroids. Collects detailed info from 2500+ sites, builds a report with extracted data.
Maltego CE
Visual link analysis tool for OSINT. Maps relationships between people, companies, domains, and infrastructure.
Masscan
Internet-scale port scanner. Transmits 10 million packets per second. Asynchronous, stateless scanning.
Medusa
Speedy, parallel, modular brute-forcer. Supports HTTP, MySQL, SMB, SSH, Telnet, and more.
MicroBurst
PowerShell toolkit for attacking Azure services including storage, key vaults, and automation.
Modlishka
Automated HTTP reverse proxy for 2FA phishing. Real-time credential and token harvesting.
Nansen Labels (Open)
Open-source wallet labeling database. Identify wallets belonging to exchanges, whales, MEV bots, and funds.
Ncat (Nmap)
Improved netcat with SSL support, IPv6, proxying, and connection brokering. The Swiss army knife of networking.
Netdiscover
Active/passive ARP reconnaissance tool for network discovery without DNS traffic.
Nikto
Classic web server scanner. Tests for dangerous files, outdated server software, and version-specific problems.
Nishang
PowerShell offensive security framework. Shells, backdoors, information gathering, and privilege escalation.
Objection
Runtime mobile exploration toolkit powered by Frida for iOS and Android security testing without jailbreak.
OpenSSH
The SSH protocol implementation. Remote access, tunneling, port forwarding, SOCKS proxying — everywhere.
Orbit
Blockchain transaction visualizer. Generates interactive force-directed graphs of Ethereum address relationships.
Osintgram
Instagram OSINT tool. Gathers emails, phone numbers, user info, followers, and location data from profiles.
ParamSpider
Mine parameters from web archives for any domain to find hidden attack surfaces.
Peirates
Kubernetes penetration testing tool. Exploit misconfigs, steal secrets, move laterally in K8s clusters.
PhoneInfoga
Advanced phone number OSINT. Scans phone numbers using free resources to gather standard and disposable info.
Photon
Incredibly fast crawler designed for OSINT. Extracts URLs, emails, files, JS, and secret keys from targets.
Plaso (log2timeline)
Super timeline creation engine. Extracts timestamps from multiple forensic artifact sources into a single timeline.
PowerSploit
Collection of PowerShell post-exploitation modules. Credential theft, privilege escalation, persistence, exfiltration.
Prowler
Cloud security assessment tool. 300+ checks for AWS, Azure, GCP, and Kubernetes against CIS benchmarks.
pspy
Monitor Linux processes without root. Detects cron jobs, user commands, and process events in real time.
pwndrop
Self-deployable file hosting for red teams. Upload payloads, host phishing files, serve implants — with HTTPS and Let's Encrypt.
Quasar RAT
Open-source remote administration tool for Windows. Full remote desktop, keylogger, file manager, and reverse proxy.
Radare2
Portable reversing framework. Disassembly, debugging, analysis, patching, and scripting in a single CLI.
Recon-ng
Full-featured reconnaissance framework. Modular design with a Metasploit-like interface for OSINT gathering.
Responder
LLMNR/NBT-NS/mDNS poisoner and rogue authentication server. Captures NTLMv1/v2 hashes on the network.
Reth
High-performance Ethereum execution client in Rust. Blazing fast sync, archive mode, and modular architecture.
ROADtools
Framework for Azure AD enumeration and exploitation via the internal ROADrecon and ROADlib modules.
RTL-SDR
Software-defined radio tools for RTL2832U-based DVB-T receivers, enabling wide-spectrum RF analysis.
RugDoc Scanner
Smart contract risk assessment. Reviews DeFi contracts for common rug pull patterns and backdoor functions.
RustScan
Blazing fast port scanner that pipes into Nmap. Scans all 65k ports in 3 seconds flat.
S3Scanner
Scan for misconfigured S3 buckets across AWS regions and dump accessible contents.
Scorechain Analytics
Blockchain analytics with risk scoring, transaction monitoring, and compliance reporting across 8000+ assets.
ScoutSuite
Multi-cloud security auditing tool for AWS, Azure, GCP, Alibaba Cloud, and Oracle Cloud.
Seatbelt
C# safety checks for offensive operations. Enumerates host security config, credentials, and interesting data.
SecretFinder
Discover sensitive data like API keys, tokens, and credentials in JavaScript files.
SharpCollection
Nightly builds of common C# offensive tools. Pre-compiled Rubeus, Seatbelt, SharpUp, Certify, and 50+ more.
SharpHound
Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.
Shodan CLI
Command-line interface for Shodan, the search engine for internet-connected devices.
Socat
Multipurpose relay tool. Bidirectional data transfer between two data channels — sockets, files, pipes, devices.
Social Analyzer
API, CLI, and web app for analyzing and finding a person's profile across 1000+ social media sites.
Solana CLI
Solana blockchain tools. Query accounts, transactions, programs, and stake info. Built-in token management.
sqlmap
Automatic SQL injection and database takeover tool. Detects and exploits SQL injection flaws.
Stegseek
Lightning fast steganography brute-forcer. Cracks steghide passwords at 200+ GB/s using wordlists.
Subjack
Subdomain takeover tool. Checks if CNAME records point to deprovisioned cloud services.
tcpdump
Command-line packet analyzer. The lightweight, scriptable alternative to Wireshark for capture and analysis.
Tenderly CLI
Smart contract debugging and simulation. Transaction trace inspection, gas profiling, and fork testing.
testssl.sh
Command-line tool for checking TLS/SSL ciphers, protocols, and cryptographic flaws on any port.
The Sleuth Kit
Collection of command-line tools for forensic analysis of disk images and file systems.
TheFatRat
Exploit and payload generator. Creates backdoors with msfvenom, compiles with anti-AV evasion techniques.
theHarvester
Gathers emails, names, subdomains, IPs, and URLs from multiple public sources for passive recon.
tlsx
Fast TLS probe tool for grabbing TLS certificates, versions, and cipher information at scale.
Token Sniffer
Automated scam token detection. Analyzes contract code for honeypots, hidden mints, tax manipulation, and rug vectors.
Tornado Cash Tracker
Track deposits and withdrawals through Tornado Cash mixer. Probabilistic linking of mixed transactions.
Transpose
SQL-based blockchain data API. Query decoded transactions, token transfers, NFT sales, and DeFi events.
TweetFeed
Real-time feed of IOCs shared on Twitter by the infosec community. Domains, IPs, URLs, SHA256 hashes.
Twint
Advanced Twitter/X scraping tool. No API key needed. Scrapes tweets, followers, favorites, and more.
TxStreet
Real-time blockchain transaction visualizer. Animated street view of pending and confirmed transactions.
Uncover
Quickly discover exposed hosts on the internet using multiple search engines like Shodan, Censys, and Fofa.
Unicornscan
Asynchronous UDP/TCP port scanner with advanced stimulus-response analysis and OS fingerprinting.
URLScan.io CLI
Scan and analyze URLs for phishing indicators, malware, and suspicious behavior. Screenshot and DOM capture.
USB Rubber Ducky Payloads
Payload repository for USB Rubber Ducky and BadUSB devices. Keystroke injection scripts for every scenario.
Villain
Windows and Linux backdoor generator and handler. Auto-obfuscation, multi-session, and reverse shell management.
WalletExplorer
Bitcoin wallet clustering and labeling. Maps addresses to known entities — exchanges, mixers, markets, gambling.
waybackurls
Fetch all URLs that the Wayback Machine knows about for a domain. Gold mine for hidden endpoints.
Wfuzz
Web application fuzzer. Brute force parameters, directories, headers, and authentication credentials.
Whale Alert CLI
Track large cryptocurrency transactions in real time across all major blockchains. API and alerting.
WhatsMyName
Username enumeration across hundreds of websites with community-maintained JSON data.
WhatWeb
Web technology fingerprinter. Identifies CMS, frameworks, JS libraries, servers, and analytics from HTTP responses.
Wifite2
Automated wireless attack tool. Wraps aircrack-ng, reaver, and hashcat for streamlined WiFi auditing.
WPScan
WordPress security scanner. Enumerates plugins, themes, users, and checks for known vulnerabilities.
XSStrike
Advanced XSS detection suite. Fuzzing engine, context analysis, and WAF detection/bypass capabilities.
ZMap
Internet-wide single-packet scanner. Scans the entire IPv4 address space in under 5 minutes.