
Offensive Security
Best Sn1per Enterprise alternatives & competitors
67 active tools in the same primary category—including CBRX AI Red Teaming, DorkSearch, xargs, and 64 more. Open any row for the full SecurityListing profile, pricing context, and reviews.
All 67 alternatives
chevron_rightCBRX AI Red Teaming
CBRX AI Red Teaming on SecurityListing: Offensive security testing service for LLM applications and AI systems
Offensive Security4.7★(2 reviews)
chevron_rightDorkSearch
DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.
Offensive Security4.7★(2 reviews)
chevron_rightxargs
xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Offensive Security4.7★(2 reviews)
chevron_rightBrute Ratel C4
Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.
Offensive Security4.7★(2 reviews)
chevron_rightCobalt Strike HTTP C2 Redirectors with Apache mod_rewrite
Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.
Offensive Security4.7★(2 reviews)
chevron_rightParrotSec
ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
Offensive Security4.5★(3 reviews)
chevron_rightLab of a Penetration Tester: Week of Evading Microsoft ATA
Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection
Offensive Security4.5★(3 reviews)
chevron_rightCombatting Incident Responders with Apache mod_rewrite
Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.
Offensive Security4.5★(3 reviews)
chevron_rightCovert Red Team Attack Infrastructure
Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.
Offensive Security4.5★(1 reviews)
chevron_rightHow to Write Malleable C2 Profiles for Cobalt Strike
How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset
Offensive Security4.5★(1 reviews)
chevron_rightDaniel Miessler/Unsupervised Learning
Daniel Miessler/Unsupervised Learning on SecurityListing: Sysreptor offers a customizable reporting solution for offensive security assessments.
Offensive Security4.5★(1 reviews)
chevron_rightDiskShadow
DiskShadow on SecurityListing: A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
Offensive Security4.5★(1 reviews)
chevron_rightGuide to Ethical Hacking
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Offensive Security4.5★(1 reviews)
chevron_rightTechTarget
TechTarget on SecurityListing: Sysreptor provides a customizable security reporting solution for penetration testers and red teamers.
Offensive Security4.5★(1 reviews)
chevron_rightOphcrack
Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.
Offensive Security4.5★(1 reviews)
chevron_rightDVWA - Brute Force (High Level) - Anti-CSRF Tokens
DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens
Offensive Security4.5★(1 reviews)
chevron_rightAbusing DCOM For Yet Another Lateral Movement Technique
Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.
Offensive Security4.5★(1 reviews)
chevron_rightAircrack-ng
Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.
Offensive Security4.5★(1 reviews)
chevron_rightDNS Tunnelling
DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.
Offensive Security4.5★(1 reviews)
chevron_rightExecuting Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts
Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts on SecurityListing: A blog post about bypassing AppLocker using PowerShell diagnostic scripts
Offensive Security4.5★(1 reviews)
chevron_rightReversing and Exploiting ARM Binaries: rwthCTF Trafman
Reversing and Exploiting ARM Binaries: rwthCTF Trafman on SecurityListing: A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
Offensive Security4.5★(1 reviews)
chevron_rightAbusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32 on SecurityListing: Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Offensive Security4.5★(1 reviews)
chevron_rightGNU Netcat
GNU Netcat on SecurityListing: A featured networking utility for reading and writing data across network connections with advanced capabilities.
Offensive Security4.5★(1 reviews)
chevron_rightThreatpost
Threatpost on SecurityListing: Sysreptor offers a customizable reporting solution for penetration testing and red teaming.
Offensive Security4.5★(1 reviews)
chevron_rightProxmark III
Proxmark III on SecurityListing: A tool for testing and analyzing RFID and NFC tags, allowing users to read and write data, and perform various attacks and tests.
Offensive Security4.5★(1 reviews)
chevron_rightState of Security
State of Security on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security4.5★(1 reviews)
chevron_rightEmpire Communication Profiles
Empire Communication Profiles on SecurityListing: Customize Empire's GET request URIs, user agent, and headers for evading detection and masquerading as other applications.
Offensive Security4.3★(2 reviews)
chevron_rightCaldera
Caldera on SecurityListing: Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.
Offensive Security4.3★(2 reviews)
chevron_rightbohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
bohops Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Offensive Security4.3★(2 reviews)
chevron_rightJava Decompiler Online
Java Decompiler Online on SecurityListing: Online Java decompiler tool with support for modern Java features.
Offensive Security4.3★(2 reviews)
chevron_rightOperating System Based Redirection with Apache mod_rewrite
Operating System Based Redirection with Apache mod_rewrite on SecurityListing: Detect users' operating systems and perform redirection with Apache mod_rewrite.
Offensive Security4.3★(2 reviews)
chevron_rightPTJunior
PTJunior on SecurityListing: AI agent that autonomously discovers, exploits, and documents vulnerabilities.
Offensive Security4.3★(2 reviews)
chevron_rightLockBoxx
LockBoxx on SecurityListing: Introduction to using GScript for Red Teams
Offensive Security3.8★(1 reviews)
chevron_rightARM Assembly and Shellcode
ARM Assembly and Shellcode on SecurityListing: A comprehensive collection of resources for learning ARM assembly language and shellcode development.
Offensive Security3.8★(1 reviews)
chevron_rightProxmark 3
Proxmark 3 on SecurityListing: The Proxmark III is a versatile device for sniffing, reading, and cloning RFID tags with strong community support.
Offensive Security3.8★(1 reviews)
chevron_rightLoading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker
Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker on SecurityListing: Utilizing Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries.
Offensive Security3.8★(1 reviews)
chevron_rightcheckra1n
checkra1n on SecurityListing: Semi-tethered jailbreak for iPhone 5s to iPhone X, running iOS 12.0 and up, using the 'checkm8' bootrom exploit.
Offensive Security3.8★(1 reviews)
chevron_rightLeakIX
LeakIX on SecurityListing: LeakIX is a red-team search engine that indexes mis-configurations and vulnerabilities online.
Offensive Security3.8★(1 reviews)
chevron_rightBastille-Linux
Bastille-Linux on SecurityListing: Bastille-Linux is a system hardening program that proactively configures the system for increased security and educates users about security settings.
Offensive Security3.8★(1 reviews)
chevron_rightAbusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement
Abusing Exported Functions and Exposed DCOM Interfaces for Pass-Thru Command Execution and Lateral Movement on SecurityListing: A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement
Offensive Security3.8★(1 reviews)
chevron_rightUsing a SCF file to Gather Hashes
Using a SCF file to Gather Hashes on SecurityListing: Abusing SCF files to gather user hashes from an unauthenticated writable Windows-based file share.
Offensive Security
chevron_rightDDE attack with PowerShell Empire
DDE attack with PowerShell Empire on SecurityListing: Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.
Offensive Security
chevron_rightsnmpcheck
snmpcheck on SecurityListing: A tool for enumerating information via SNMP protocol.
Offensive Security
chevron_rightTroy Hunt
Troy Hunt on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security
chevron_rightTrust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation
Trust Direction: An Enabler for Active Directory Enumeration and Trust Exploitation on SecurityListing: A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
Offensive Security
chevron_rightThe Security Ledger
The Security Ledger on SecurityListing: Sysreptor offers a customizable reporting solution for pentesters and red teamers to enhance security documentation.
Offensive Security
chevron_rightXSS'OR
XSS'OR on SecurityListing: Hack with JavaScript XSS'OR tool for encoding/decoding and various XSS related functionalities.
Offensive Security
chevron_rightThe Hacker News
The Hacker News on SecurityListing: The Hacker News is a leading cybersecurity news platform providing updates, insights, and information to professionals and enthusiasts in the field.
Offensive Security
chevron_righttcpreplay
tcpreplay on SecurityListing: Tcpreplay is a suite of Open Source utilities for editing and replaying captured network traffic.
Offensive Security
chevron_rightSn1per Professional
Sn1per Professional on SecurityListing: Offensive security platform for attack surface discovery and risk management
Offensive Security
chevron_rightPaving The Way to DA - Complete Post (Pt 1,2 & 3)
Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.
Offensive Security
chevron_rightReverse Engineering HID iClass Master Keys
Reverse Engineering HID iClass Master Keys on SecurityListing: Exploiting a vulnerability in HID iClass system to retrieve master authentication key for cloning cards and changing reader settings.
Offensive Security
chevron_rightPentesting Payloads
Pentesting Payloads on SecurityListing: A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.
Offensive Security
chevron_rightSecurity Intelligence
Security Intelligence on SecurityListing: Sysreptor offers a customizable security reporting solution for penetration testers and red teamers.
Offensive Security
chevron_rightWindows Oneliners for Remote Code Execution
Windows Oneliners for Remote Code Execution on SecurityListing: Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.
Offensive Security
chevron_rightYogosha Pentest as a Service
Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers
Offensive Security
chevron_rightWebDAV Covert Channel
WebDAV Covert Channel on SecurityListing: A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
Offensive Security
chevron_rightTheos Red Teaming
Theos Red Teaming on SecurityListing: Red teaming service simulating real-world adversary attacks on organizations.
Offensive Security
chevron_rightLeveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2)
Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence (Part 2) on SecurityListing: A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence
Offensive Security
chevron_rightVshadow
Vshadow on SecurityListing: A command line utility for managing volume shadow copies with capabilities for evasion, persistence, and file extraction.
Offensive Security
FAQ
- Are these “official” vendor pairings?
- No—alternatives are category peers for discovery, not paid placements. Vendors can still claim profiles and respond to reviews on their product pages.
- Why is my favorite tool missing?
- Only ACTIVE listings in the same primary category appear. Multi-category products may move when their primary category is updated.