EN
ENNA
⚖️

Dual Use

15 tools indexed

Legitimate security and networking tools with well-known offensive applications. These dual-use tools serve both defensive and offensive purposes — useful for system administration, network diagnostics, and security testing.

ProxyChains-ng

C
Dual UseFeatured

Force any TCP connection through SOCKS4/5 or HTTP proxies. Chain multiple proxies for anonymity.

proxysockspivotinganonymity
10.5k1.2k2mo ago

Socat

C
Dual Use

Multipurpose relay tool. Bidirectional data transfer between two data channels — sockets, files, pipes, devices.

relaysockettunnelingssl
313456y ago

ngrok

Go
Dual UseFeatured

Expose local servers to the internet via secure tunnels. Instant public URLs for localhost services.

tunnelingreverse-proxynat-bypasswebhook
24.5k4.3k1y ago

Rclone

Go
Dual UseFeatured

rsync for cloud storage. Sync, copy, and mount 70+ cloud providers. Command-line Swiss army knife for cloud data.

cloud-storagesyncexfiltrations3
56.5k5.0k1d ago

GTFOBins

Shell
Dual UseFeatured

Curated list of Unix binaries that can be used to bypass security restrictions. Living off the land, documented.

lolbinsprivescshell-escapeliving-off-the-land
12.9k1.6k6d ago

LOLBAS

Shell
Dual UseFeatured

Living Off The Land Binaries, Scripts and Libraries for Windows. Documenting every Windows binary with offensive potential.

lolbinswindowsevasionliving-off-the-land
8.4k1.1k20d ago

Sysinternals Suite

C/C++
Dual UseFeatured

Microsoft's advanced system utilities. PsExec, Process Monitor, Autoruns, TCPView — essential for both ops and offense.

psexeclateral-movementprocess-monitorwindows
5492684d ago

Empire

Python
Dual UseFeatured

Post-exploitation agent built on PowerShell and Python. Cryptologically-secure communications and flexible architecture.

c2post-exploitationpowershellpython-agent
5.1k6781mo ago

Tor

C
Dual UseFeatured

Anonymous communication network. Routes traffic through multiple relays to conceal location and usage.

anonymityonion-routingprivacydark-web
4.9k9582y ago

OpenSSH

C
Dual Use

The SSH protocol implementation. Remote access, tunneling, port forwarding, SOCKS proxying — everywhere.

sshtunnelingport-forwardingsocks-proxy
3.8k2.1k3d ago

NetExec

Python
Dual UseFeatured

Network execution tool — the maintained successor to CrackMapExec. SMB, LDAP, WinRM, SSH, MSSQL, and more.

smbldapwinrmcredential-spray
5.4k6852d ago

CobaltStrike Parser

Python
Dual Use

Parse and extract configs from Cobalt Strike beacons. Identify C2 servers, watermarks, and malleable C2 profiles.

cobalt-strikebeaconc2-detectionconfig-extraction
1.1k1942y ago

PowerSploit

PowerShell
Dual Use

Collection of PowerShell post-exploitation modules. Credential theft, privilege escalation, persistence, exfiltration.

powershellpost-exploitationactive-directorycredential-theft
12.9k4.7k5y ago

Nishang

PowerShell
Dual Use

PowerShell offensive security framework. Shells, backdoors, information gathering, and privilege escalation.

powershellshellsbackdoorprivilege-escalation
9.8k2.5k1y ago

dnscat2

Ruby
Dual UseFeatured

Create an encrypted C2 channel over DNS. Tunnel data through DNS queries when all other protocols are blocked.

dns-tunnelc2exfiltrationencrypted
3.9k6452y ago