ENNAENNA
⚖️

Dual Use

24 tools indexed

Legitimate security and networking tools with well-known offensive applications. These dual-use tools serve both defensive and offensive purposes - useful for system administration, network diagnostics, and security testing.

ProxyChains-ng

C
Dual UseFeatured

Force any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.

proxysockspivotinganonymity
10.6k1.2k24d ago

Socat

C
Dual Use

Multipurpose relay tool. Bidirectional data transfer between two data channels - sockets, files, pipes, devices.

relaysockettunnelingssl
313456y ago

ngrok

Go
Dual UseFeatured

Expose local servers to the internet via secure tunnels. Instant public URLs for localhost services.

tunnelingreverse-proxynat-bypasswebhook
24.5k4.3k2y ago

Rclone

Go
Dual UseFeatured

rsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.

cloud-storagesyncexfiltrations3
56.9k5.1k23d ago

GTFOBins

Shell
Dual UseFeatured

Curated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.

lolbinsprivescshell-escapeliving-off-the-land
13.0k1.6k1mo ago

LOLBAS

Shell
Dual UseFeatured

Living Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.

lolbinswindowsevasionliving-off-the-land
8.5k1.1k2mo ago

Sysinternals Suite

C/C++
Dual UseFeatured

Microsoft's advanced system utilities. PsExec, Process Monitor, Autoruns, TCPView - essential for both ops and offense.

psexeclateral-movementprocess-monitorwindows
5572691mo ago

Empire

Python
Dual UseFeatured

Post-exploitation agent built on PowerShell and Python. Cryptologically-secure communications and flexible architecture.

c2post-exploitationpowershellpython-agent
5.1k6781mo ago

Tor

C
Dual UseFeatured

Anonymous communication network. Routes traffic through multiple relays to conceal location and usage.

anonymityonion-routingprivacydark-web
4.9k9592y ago

OpenSSH

C
Dual Use

The SSH protocol implementation. Remote access, tunneling, port forwarding, SOCKS proxying - everywhere.

sshtunnelingport-forwardingsocks-proxy
3.8k2.1k24d ago

NetExec

Python
Dual UseFeatured

Network execution tool - the maintained successor to CrackMapExec. SMB, LDAP, WinRM, SSH, MSSQL, and more.

smbldapwinrmcredential-spray
5.5k69723d ago

CobaltStrike Parser

Python
Dual Use

Parse and extract configs from Cobalt Strike beacons. Identify C2 servers, watermarks, and malleable C2 profiles.

cobalt-strikebeaconc2-detectionconfig-extraction
1.1k1942y ago

PowerSploit

PowerShell
Dual Use

Collection of PowerShell post-exploitation modules. Credential theft, privilege escalation, persistence, exfiltration.

powershellpost-exploitationactive-directorycredential-theft
13.0k4.7k5y ago

Nishang

PowerShell
Dual Use

PowerShell offensive security framework. Shells, backdoors, information gathering, and privilege escalation.

powershellshellsbackdoorprivilege-escalation
9.9k2.5k2y ago

dnscat2

Ruby
Dual UseFeatured

Create an encrypted C2 channel over DNS. Tunnel data through DNS queries when all other protocols are blocked.

dns-tunnelc2exfiltrationencrypted
3.9k6482y ago

Notify

Go
Dual Use

Stream tool output to messaging platforms. Pipe results from any CLI tool to Slack, Discord, Telegram, or email in real-time.

notificationslackdiscordtelegram
1.6k1581mo ago

PDTM

Go
Dual Use

ProjectDiscovery Tool Manager. Install, update, and manage all ProjectDiscovery tools from a single unified interface.

tool-managerprojectdiscoveryinstallerupdater
1.1k954mo ago

CyberChef

JavaScript
Dual Use

The Cyber Swiss Army Knife. Browser-based data transformation with 300+ operations for encoding, encryption, and analysis.

encodingdecodingencryptiondata-transformation
34.7k3.9k23d ago

yt-dlp

Python
Dual Use

Feature-rich command-line video downloader supporting 1000+ sites.

videodownloadscrapingarchival
158.9k13.2k1mo ago

OpenSnitch

Go
Dual Use

GNU/Linux interactive application firewall inspired by Little Snitch.

firewallapplicationmonitoring
13.5k6261mo ago

CTFd

Python
Dual Use

Capture The Flag competition platform for hosting jeopardy-style CTF events.

ctfplatformcompetition
6.6k2.7k26d ago

Vulhub

Dockerfile
Dual Use

Pre-built Docker-Compose vulnerable environments for security testing and CVE reproduction.

vulnerabledockerlabtraining
20.6k4.8k23d ago

Infisical

TypeScript
Dual Use

Open-source secrets management platform with certificate lifecycle, privileged access management, and multi-environment sync.

secrets-managementcertificatespamvault
26.7k1.4k14d ago

Tirith

Rust
Dual Use

Terminal security for developers and AI agents. Intercepts homograph URLs, pipe-to-shell attacks, ANSI injection, and obfuscated payloads.

terminal-securityai-agent-safetysupply-chaindeveloper-tools
2.3k18016d ago