
Offensive Security
Best Caldera alternatives & competitors
67 active tools in the same primary category—including CBRX AI Red Teaming, DorkSearch, Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite, and 64 more. Open any row for the full SecurityListing profile, pricing context, and reviews.
All 67 alternatives
chevron_rightCBRX AI Red Teaming
CBRX AI Red Teaming on SecurityListing: Offensive security testing service for LLM applications and AI systems
Offensive Security4.7★(2 reviews)
chevron_rightDorkSearch
DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
Offensive Security4.7★(2 reviews)
chevron_rightCobalt Strike HTTP C2 Redirectors with Apache mod_rewrite
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
Offensive Security4.7★(2 reviews)
chevron_rightBrute Ratel C4
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Offensive Security4.7★(2 reviews)
chevron_rightxargs
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Offensive Security4.7★(2 reviews)
chevron_rightCombatting Incident Responders with Apache mod_rewrite
Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
Offensive Security4.5★(3 reviews)
chevron_rightParrotSec
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
Offensive Security4.5★(3 reviews)
chevron_rightLab of a Penetration Tester: Week of Evading Microsoft ATA
Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Offensive Security4.5★(3 reviews)
chevron_rightExecuting Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts
Offensive Security4.5★(1 reviews)
chevron_rightCovert Red Team Attack Infrastructure
Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.
Offensive Security4.5★(1 reviews)
chevron_rightHow to Write Malleable C2 Profiles for Cobalt Strike
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Offensive Security4.5★(1 reviews)
chevron_rightDiskShadow
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Offensive Security4.5★(1 reviews)
chevron_rightDaniel Miessler/Unsupervised Learning
Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.
Offensive Security4.5★(1 reviews)
chevron_rightTechTarget
TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.
Offensive Security4.5★(1 reviews)
chevron_rightGuide to Ethical Hacking
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Offensive Security4.5★(1 reviews)
chevron_rightOphcrack
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Offensive Security4.5★(1 reviews)
chevron_rightDVWA - Brute Force (High Level) - Anti-CSRF Tokens
DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens
Offensive Security4.5★(1 reviews)
chevron_rightAbusing DCOM For Yet Another Lateral Movement Technique
Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
Offensive Security4.5★(1 reviews)
chevron_rightAircrack-ng
Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
Offensive Security4.5★(1 reviews)
chevron_rightDNS Tunnelling
DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.
Offensive Security4.5★(1 reviews)
chevron_rightReversing and Exploiting ARM Binaries: rwthCTF Trafman
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Offensive Security4.5★(1 reviews)
chevron_rightAbusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Offensive Security4.5★(1 reviews)
chevron_rightThreatpost
Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
Offensive Security4.5★(1 reviews)
chevron_rightState of Security
State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security4.5★(1 reviews)
chevron_rightProxmark III
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
Offensive Security4.5★(1 reviews)
chevron_rightGNU Netcat
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.
Offensive Security4.5★(1 reviews)
chevron_rightEmpire Communication Profiles
Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.
Offensive Security4.3★(2 reviews)
chevron_rightbohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Offensive Security4.3★(2 reviews)
chevron_rightPTJunior
PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.
Offensive Security4.3★(2 reviews)
chevron_rightOperating System Based Redirection with Apache mod_rewrite
Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.
Offensive Security4.3★(2 reviews)
chevron_rightJava Decompiler Online
Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.
Offensive Security4.3★(2 reviews)
chevron_rightLockBoxx
LockBoxx on SecurityListing: Introduction to using GScript for Red Teams
Offensive Security3.8★(1 reviews)
chevron_rightARM Assembly and Shellcode
ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.
Offensive Security3.8★(1 reviews)
chevron_rightProxmark 3
Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.
Offensive Security3.8★(1 reviews)
chevron_rightLoading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.
Offensive Security3.8★(1 reviews)
chevron_rightcheckra1n
checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Offensive Security3.8★(1 reviews)
chevron_rightLeakIX
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Offensive Security3.8★(1 reviews)
chevron_rightBastille-Linux
Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.
Offensive Security3.8★(1 reviews)
chevron_rightAbusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
Offensive Security3.8★(1 reviews)
chevron_rightThe Hacker News
The Hacker News on SecurityListing: The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.
Offensive Security
chevron_rightUPX
UPX on SecurityListing: UPX is a high-performance executable packer for various executable formats.
Offensive Security
chevron_rightUsing a SCF file to Gather Hashes
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.
Offensive Security
chevron_rightDDE attack with PowerShell Empire
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Offensive Security
chevron_rightsnmpcheck
snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.
Offensive Security
chevron_rightTroy Hunt
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security
chevron_rightTrust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
Offensive Security
chevron_rightReverse Engineering HID iClass Master Keys
Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
Offensive Security
chevron_rightXSS'OR
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
Offensive Security
chevron_rightPentesting Payloads
Pentesting Payloads on SecurityListing: A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.
Offensive Security
chevron_righttcpreplay
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
Offensive Security
chevron_rightSn1per Professional
Sn1per Professional on SecurityListing: Offensive security platform for attack surface discovery and risk management
Offensive Security
chevron_rightPaving The Way to DA - Complete Post (Pt 1,2 & 3)
Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.
Offensive Security
chevron_rightWindows Oneliners for Remote Code Execution
Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
Offensive Security
chevron_rightYogosha Pentest as a Service
Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers
Offensive Security
chevron_rightSecurity Intelligence
Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security
chevron_rightTheos Red Teaming
Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.
Offensive Security
chevron_rightWebDAV Covert Channel
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Offensive Security
chevron_rightLeveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Offensive Security
chevron_rightLab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory
Lab of a Penetration Tester: Abusing DNSAdmins privilege for escalation in Active Directory on SecurityListing: Abusing DNSAdmins privilege for escalation in Active Directory
Offensive Security
chevron_rightVshadow
Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
Offensive Security
FAQ
- Are these “official” vendor pairings?
- No—alternatives are category peers for discovery, not paid placements. Vendors can still claim profiles and respond to reviews on their product pages.
- Why is my favorite tool missing?
- Only ACTIVE listings in the same primary category appear. Multi-category products may move when their primary category is updated.