Welcome to Trickest Library

End-to-end solutions for seamless security automation.

Explore Modules

Attack Surface Management

Monitor and manage your digital assets.

Cloud Storage

Securely store and manage data in the cloud.

Containers

Manage and secure containerized applications.

Content Discovery

Discover hidden content and directories.

Discovery

Identify assets and gather intelligence.

Fuzzing

Detect vulnerabilities through random testing.

Machine Learning

Leverage AI to enhance security.

Misconfiguration

Identify and fix configuration errors.

Network

Analyze and secure network infrastructure.

OSINT

Gather intelligence from public sources.

Passwords

Manage and secure user credentials.

Recon

Perform reconnaissance to gather data.

Scanners

Utilize tools to detect vulnerabilities.

Secret Discovery

Find and secure exposed secrets.

Social Engineering

Learn techniques for human-based hacking.

Static Code Analysis

Analyze code for potential vulnerabilities.

Threat Intelligence

Gather data on potential threats.

Utilities

Explore helpful tools for security tasks.

Vulnerability Scanning

Track and manage security flaws.

Need new category?

Contact Us

Learn more about Trickest Nodes

Workflows

Workflows

Explore how workflows can automate your offensive security tasks, saving time and boosting efficiency.


Explore Workflows →

Modules

Modules

See how tailored modules for offensive security can help you get faster results by simplifying your tasks.


Explore Modules →

Tools

Tools

Find out how tools can help you create custom automation for offensive security.


Explore Tools →

Scripts

Scripts

Discover how scripts can help you extract, transform, and integrate your security data effectively.


Explore Scripts →