Open-source tools
TrustedSec open-source tools are available to anyone so we can do our part to educate others in the community and move the industry ahead. See what we’ve created and learn how our tools can help you. Get started today.

Browse our tools
PIVOTER
Pivoter is a proxy tool for pentesters to have easier lateral movement.
PHYSICAL SECURITY ASSESSMENT DOCUMENTATION
This is a collection of legal wording and documentation created to be a template for others to use and to protect themselves when conducting physical security…
PENTESTERS FRAMEWORK (PTF)
The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for…
The Social Engineering Toolkit (SET)
SET is a powerful tool for social-engineering.
NPS PAYLOAD
NPS Payload will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources.
METERSSH
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH…
HONEYBADGER
HoneyBadger is a collection of Metasploit modules with a plugin to help automate Post-Exploitation actions on target systems using the Metasploit Framework.
HATE_CRACK
hate_crack is a tool for automating cracking methodologies through Hashcat developed by the TrustedSec team.
HASH_PARSER
hash_parser is a tool that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want to see if any of the…
HARDCIDR
hardcidr is a Linux Bash script, but also functions under macOS.
EGRESSBUSTER
Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.
CVE-2019-19781
This tool exploits a directory traversal bug within Citrix ADC (NetScalers) which calls a perl script that is used to append files in an XML format to the…
Loading...
Learn how our solutions enable business.
Let our experts tailor solutions to your security challenges.
