🤖 AI-Powered Hacking Tools 300+ Tools
AI Vulnerability Discovery
80 tools
▾
AI Social Engineering & Deepfakes
60 tools
▾
AI-Powered OSINT & Reconnaissance
80 tools
▾
AI Security & Defense
80 tools
▾
🧠 Machine Learning Security 200+ Tools
AI Social Engineering & Deepfakes
60 tools
▾
Privacy-Preserving ML
60 tools
▾
🎯 Reconnaissance & OSINT 150+ Tools
Information Gathering
50 tools
▾
Network Discovery
40 tools
▾
Social Engineering & OSINT
60 tools
▾
🌐 Web Application Security 200+ Tools
Web Vulnerability Scanners
50 tools
▾
Web Exploitation Frameworks
40 tools
▾
Authentication & Session Management
35 tools
▾
WAF Bypass & Evasion
35 tools
▾
API Security Testing
40 tools
▾
🔌 Network Security & Infrastructure 90+ Tools
Network Scanning & Enumeration
30 tools
▾
Network Exploitation & Post-Exploitation
25 tools
▾
Wireless Security
20 tools
▾
Network Traffic Analysis
15 tools
▾
📱 Mobile Security 70+ Tools
Android Security
30 tools
▾
iOS Security
25 tools
▾
Mobile Malware Analysis
15 tools
▾
🦠 Malware Analysis & Reverse Engineering 70+ Tools
Malware Analysis Frameworks
25 tools
▾
Malware Development & Research
20 tools
▾
Anti-Analysis & Evasion
25 tools
▾
☁ Cloud Security & Infrastructure 120+ Tools
CSPM & Cloud Pentesting
20 tools
▾
IaC, Scanning & DevSecOps
20 tools
▾
Container & Kubernetes Security
25 tools
▾
Forensics, Monitoring & Threat Hunting
25 tools
▾
Serverless & Function Security
10 tools
▾
Secrets Management & Key Stores
10 tools
▾
Observability & Telemetry
10 tools
▾
Identity & Access (IAM) Security
12 tools
▾
Supply Chain & SBOMs
10 tools
▾
Incident Response & Playbooks
10 tools
▾