发现各种软件替代方案,找到更适合您的选择

筛选条件

展开

排序方式

热度排序评价排序名称排序最新排序
Kali Linux
Kali Linux

,

4

Kali Linux 是一个基于 Debian 的 Linux 发行版,专为数字取证和渗透测试设计,最初由 Offensive Security 团队从 Backtrack Linux 分叉而来。

Parrot Security OS
Parrot Security OS

,

4.1

帕罗特(Parrot)是一个基于 Debian Testing 的 GNU/Linux 发行版,专为安全、开发和隐私而设计。

Metasploit
Metasploit

,

Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. This helps prioritize remediation and eliminate false positives, providing true...

OWASP Zed Attack Proxy (ZAP)
OWASP Zed Attack Proxy (ZAP)

,

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.

BlackArch
BlackArch

,

5

BlackArch Linux 是一个基于 Arch Linux 的小型发行版,专为渗透测试人员和安全研究人员设计。该软件仓库包含 2554 个工具。

BackBox Linux
BackBox Linux

,

BackBox 是一个基于 Ubuntu 的 Linux 发行版,旨在执行渗透测试和安全评估。它通过自有软件仓库,设计为快速、易于使用,并提供一个简洁 yet 完整的桌面环境……

Probely
Probely

,

5

Probely is a top-tier cloud-based DAST Scanner designed for DevOps, empowering Security and Development teams to work together to secure their web applications and APIs.

Intruder
Intruder

,

Intruder is a security monitoring platform for internet-facing systems. Intruder provides an easy to use security solution which continually scans your digital assets, highlighting vulnerabilities and outlining remediation advice in simple terms.

BreachDirectory
BreachDirectory

,

5

BreachDirectory 可帮助您搜索所有公开的数据泄露事件,以确保您的邮箱、用户名、密码和域名未被泄露。

Snusbase
Snusbase

,

行业领先的数据库查询。我们以比所有竞争对手更快的速度为傲,同时保持了非常丰富的私人数据库选择。

PhoneSploit Pro
PhoneSploit Pro

An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.

Cyborg Linux
Cyborg Linux

,

迄今为止最先进、最强大 yet 最美观的渗透测试发行版。配备最全面的工具集,专为专业渗透测试人员和网络安全专家打造。

Websecurify
Websecurify

Websecurify is a powerful web application security testing environment designed from the ground up to provide the best combination of automatic and manual vulnerability testing technologies.

Tamper Data
Tamper Data

5

Firefox add-on that lets you change headers and request parameters before they're sent to the server. Unlike proxy request modifiers, it's integrated into the browser, so it has no problem with HTTPS connections, client authentication certificates, or other features that...

Caido
Caido

,

Caido is a cutting-edge web application security tool that enables users to efficiently identify and assess potential vulnerabilities in their web applications. It can be easily integrated into both personal and enterprise environments, making it adaptable to a wide range of...

FOFA
FOFA

,

FOFA 是一个搜索引擎,可帮助您绘制全球网络空间的图谱。

Pentest-Tools.com
Pentest-Tools.com

,

We facilitate quick discovery and reporting of vulnerabilities in websites and network infrastructures, providing a set of powerful and tightly integrated pentesting tools that enable you to perform easier, faster, and more effective pentests.

HTTPCS Security
HTTPCS Security

Put yourself in the shoes of a hacker! Without technical expertise, launch an audit to detect security flaws on your website or web application. Online website vulnerability scanner. No installation required. ISO & RGPD compliant. How to avoid hackers?

SecApps
SecApps

,

直接在您的浏览器中发现安全漏洞。无需安装任何额外软件,即可体验下一代安全工具。

PENTESTON
PENTESTON

,

PENTESTON is a cloud-based Cybersecurity platform that allows you to oversee the complete secure development lifecycle of your application. It functions as a cyber security reporting and workflow management system, providing you with the necessary tools to manage the entire...

1-20 / 31