Obfuscation Tool: Flareprox
FlareProx is a tool that deploys serverless HTTP proxy endpoints via Cloudflare Workers, enabling users to redirect web traffic to any destination URL while masking the true origin IP.
Offensive Security Tool: FormPoison
FormPoison is a form-focused testing framework designed to identify web application vulnerabilities, particularly Cross-Site Scripting (XSS) and SQL injection.
Offensive Security Tool: EvilWAF – Web Application Firewall Bypass Toolkit
EvilWAF is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).
Offensive Security Tool: FaceDancer
FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading.
Offensive Security Tool: smugglo
smugglo is an HTML smuggling tool that generates self-contained HTML payloads capable of embedding arbitrary files directly into a browser-renderable HTML document.
Offensive Security Tool: RingReaper
RingReaper is a stealth-focused post-exploitation agent built for Linux environments, designed to evade Endpoint Detection and Response (EDR) solutions.
Recon Tool: ZoomeyeSearch
ZoomeyeSearch is a recon tool that provides programmatic access to the ZoomEye cybersecurity search engine. It enables security professionals to search for exposed devices, services, and infrastructure across the internet.
Offensive Security Tool: APKScope
APKScope is a tool designed to simplify the security analysis of Android applications. It integrates with popular tools such as ADB, Frida, Drozer, Jadx, and Apktool.
Offensive Security Tool: Cybersecurity AI (CAI)
Cybersecurity AI (CAI) is an open-source, agent-based, and modular AI framework purpose-built to automate and augment cybersecurity testing workflows using Large Language Models (LLMs) and pluggable tools. It supports both offensive and defensive operations. It’s designed for ethical hackers, red teamers, CTF players, and security researchers aiming to integrate AI into bug bounty, penetration testing, exploit development, and reporting workflows.










