Bohatei - Flexible and Elastic DDoS Defense Bohatei - Flexible and Elastic DDoS Defense Reviewed by Lydecker Black on 6:45 PM Rating: 5
BlackArch Linux v2015.11.24 - Penetration Testing Distribution BlackArch Linux v2015.11.24 - Penetration Testing Distribution Reviewed by Lydecker Black on 12:56 PM Rating: 5
REXT - Router Exploitation Toolkit REXT - Router Exploitation Toolkit Reviewed by Lydecker Black on 7:27 PM Rating: 5
Sniffly - Sniffing Browser History Using HSTS + CSP. Sniffly - Sniffing Browser History Using HSTS + CSP. Reviewed by Lydecker Black on 6:29 PM Rating: 5
UserProfilesView - View User Profiles Information On Your Windows UserProfilesView - View User Profiles Information On Your Windows Reviewed by Lydecker Black on 7:12 PM Rating: 5
Aircrack-ng 1.2 RC 3 - WEP and WPA-PSK Keys Cracking Program Aircrack-ng 1.2 RC 3 - WEP and WPA-PSK Keys Cracking Program Reviewed by Lydecker Black on 7:34 PM Rating: 5
Hsecscan - A Security Scanner For HTTP Response Headers Hsecscan - A Security Scanner For HTTP Response Headers Reviewed by Lydecker Black on 3:33 PM Rating: 5
Nmap 7 - Security Scanner For Network Exploration & Security Audits Nmap 7 - Security Scanner For Network Exploration & Security Audits Reviewed by Lydecker Black on 10:38 PM Rating: 5
HTTPNetworkSniffer v1.50 - Packet Sniffer Tool That Captures All HTTP Requests/Responses HTTPNetworkSniffer v1.50 - Packet Sniffer Tool That Captures All HTTP Requests/Responses Reviewed by Lydecker Black on 6:12 PM Rating: 5
GetHead - HTTP Header Analysis Vulnerability Tool GetHead - HTTP Header Analysis Vulnerability Tool Reviewed by Lydecker Black on 6:37 PM Rating: 5
PowerTools - Collection Of PowerShell Projects With A Focus On Offensive Operations PowerTools - Collection Of PowerShell Projects With A Focus On Offensive Operations Reviewed by Lydecker Black on 6:36 AM Rating: 5
Pemcracker - Tool To Crack Encrypted PEM Files Pemcracker - Tool To Crack Encrypted PEM Files Reviewed by Lydecker Black on 4:13 PM Rating: 5
Beurk - Experimental Unix Rootkit Beurk - Experimental Unix Rootkit Reviewed by Lydecker Black on 5:23 PM Rating: 5
Codetainer - A Docker Container In Your Browser Codetainer - A Docker Container In Your Browser Reviewed by Lydecker Black on 5:12 PM Rating: 5
LiME - Linux Memory Extractor LiME - Linux Memory Extractor Reviewed by Lydecker Black on 6:30 PM Rating: 5
WAP - Web Application Protection WAP - Web Application Protection Reviewed by Lydecker Black on 7:32 AM Rating: 5
Bluto - DNS Recon, DNS Zone Transfer, and Email Enumeration Bluto - DNS Recon, DNS Zone Transfer, and Email Enumeration Reviewed by Lydecker Black on 7:02 PM Rating: 5
Wireshark v2.0 - The World’s Foremost Network Protocol Analyzer Wireshark v2.0 - The World’s Foremost Network Protocol Analyzer Reviewed by Lydecker Black on 9:42 PM Rating: 5
Toxy - Hackable Http Proxy To Simulate Server Failure Scenarios And Network Conditions Toxy - Hackable Http Proxy To Simulate Server Failure Scenarios And Network Conditions Reviewed by Lydecker Black on 7:12 PM Rating: 5
Tails 1.7 - The Amnesic Incognito Live System Tails 1.7 - The Amnesic Incognito Live System Reviewed by Lydecker Black on 1:39 PM Rating: 5
Security Onion - Linux Distro For Intrusion Detection, Network Security Monitoring, And Log Management Security Onion - Linux Distro For Intrusion Detection, Network Security Monitoring, And Log Management Reviewed by Lydecker Black on 6:52 PM Rating: 5
KeeFarce - Extracts Passwords From A Keepass 2.X Database, Directly From Memory KeeFarce - Extracts Passwords From A Keepass 2.X Database, Directly From Memory Reviewed by Lydecker Black on 7:31 AM Rating: 5
ARDT - Akamai Reflective DDoS Tool ARDT - Akamai Reflective DDoS Tool Reviewed by Lydecker Black on 7:40 PM Rating: 5