Dual Use
15 tools indexed
Legitimate security and networking tools with well-known offensive applications. These dual-use tools serve both defensive and offensive purposes — useful for system administration, network diagnostics, and security testing.
ProxyChains-ng
Force any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.
Socat
Multipurpose relay tool. Bidirectional data transfer between two data channels — sockets, files, pipes, devices.
ngrok
Expose local servers to the internet via secure tunnels. Instant public URLs for localhost services.
Rclone
rsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.
GTFOBins
Curated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.
LOLBAS
Living Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.
Sysinternals Suite
Microsoft's advanced system utilities. PsExec, Process Monitor, Autoruns, TCPView — essential for both ops and offense.
Empire
Post-exploitation agent built on PowerShell and Python. Cryptologically-secure communications and flexible architecture.
Tor
Anonymous communication network. Routes traffic through multiple relays to conceal location and usage.
OpenSSH
The SSH protocol implementation. Remote access, tunneling, port forwarding, SOCKS proxying — everywhere.
NetExec
Network execution tool — the maintained successor to CrackMapExec. SMB, LDAP, WinRM, SSH, MSSQL, and more.
CobaltStrike Parser
Parse and extract configs from Cobalt Strike beacons. Identify C2 servers, watermarks, and malleable C2 profiles.
PowerSploit
Collection of PowerShell post-exploitation modules. Credential theft, privilege escalation, persistence, exfiltration.
Nishang
PowerShell offensive security framework. Shells, backdoors, information gathering, and privilege escalation.
dnscat2
Create an encrypted C2 channel over DNS. Tunnel data through DNS queries when all other protocols are blocked.