SEE - Sandboxed Execution Environment SEE - Sandboxed Execution Environment Reviewed by Lydecker Black on 2:39 PM Rating: 5
GDB-Dashboard - Modular Visual Interface For Gdb In Python GDB-Dashboard - Modular Visual Interface For Gdb In Python Reviewed by Lydecker Black on 4:30 PM Rating: 5
FastIR Collector - Windows Incident Response Tool FastIR Collector - Windows Incident Response Tool Reviewed by Lydecker Black on 5:30 PM Rating: 5
XXEinjector - Tool For Automatic Exploitation Of XXE Vulnerability XXEinjector - Tool For Automatic Exploitation Of XXE Vulnerability Reviewed by Lydecker Black on 7:19 PM Rating: 5
Viper - Cracking Unix Passwords Brute Force Viper - Cracking Unix Passwords Brute Force Reviewed by Lydecker Black on 7:49 PM Rating: 5
Metabrik - Perl Brik Platform Metabrik - Perl Brik Platform Reviewed by Lydecker Black on 7:03 PM Rating: 5
V3n0M-Scanner - Popular SQLi and Pentesting Scanner V3n0M-Scanner - Popular SQLi and Pentesting Scanner Reviewed by Lydecker Black on 7:13 PM Rating: 5
Windows-Exploit-Suggester - Tool To Compares A Targets Patch Levels Against The Microsoft Vulnerability Database Windows-Exploit-Suggester - Tool To Compares A Targets Patch Levels Against The Microsoft Vulnerability Database Reviewed by Lydecker Black on 5:43 PM Rating: 5
p0wnedShell - PowerShell Runspace Post Exploitation Toolkit p0wnedShell - PowerShell Runspace Post Exploitation Toolkit Reviewed by Lydecker Black on 5:24 PM Rating: 5
Dnstwist - Domain Name Permutation Engine For Detecting Typo Squatting, Phishing And Corporate Espionage Dnstwist - Domain Name Permutation Engine For Detecting Typo Squatting, Phishing And Corporate Espionage Reviewed by Lydecker Black on 7:30 PM Rating: 5
Zizzania - Automated DeAuth Attack Zizzania - Automated DeAuth Attack Reviewed by Lydecker Black on 7:37 PM Rating: 5
WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack WiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack Reviewed by Lydecker Black on 7:11 PM Rating: 5
JShielder - LAMP/LEMP Secure Deployment JShielder - LAMP/LEMP Secure Deployment Reviewed by Lydecker Black on 6:33 PM Rating: 5
Project Arsenal X - As HackTheGame But Real Project Arsenal X - As HackTheGame But Real Reviewed by Lydecker Black on 3:50 PM Rating: 5
SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On SimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On Reviewed by Lydecker Black on 6:30 PM Rating: 5
RootHelper - A Bash Script That Downloads And Unzips Scripts That Will Aid With Privilege Escalation On A Linux System RootHelper - A Bash Script That Downloads And Unzips Scripts That Will Aid With Privilege Escalation On A Linux System Reviewed by Lydecker Black on 7:30 PM Rating: 5
Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Killchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks Reviewed by Lydecker Black on 7:21 PM Rating: 5
BSQLinjector - Blind SQL Injection Exploitation Tool BSQLinjector - Blind SQL Injection Exploitation Tool Reviewed by Lydecker Black on 7:02 PM Rating: 5
BackdoorMe - Powerful Auto-Backdooring Utility BackdoorMe - Powerful Auto-Backdooring Utility Reviewed by Lydecker Black on 7:33 PM Rating: 5
Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo Reviewed by Lydecker Black on 4:30 PM Rating: 5
Hackazon - A Modern Vulnerable Web App Hackazon - A Modern Vulnerable Web App Reviewed by Lydecker Black on 5:30 PM Rating: 5
SAML Raider - SAML2 Burp Extension SAML Raider - SAML2 Burp Extension Reviewed by Lydecker Black on 2:35 PM Rating: 5
Maltrail - Malicious Traffic Detection System Maltrail - Malicious Traffic Detection System Reviewed by Lydecker Black on 7:12 PM Rating: 5
Winpayloads - Undetectable Windows Payload Generation Winpayloads - Undetectable Windows Payload Generation Reviewed by Lydecker Black on 8:21 PM Rating: 5
Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Kali NetHunter 3.0 - Android Mobile Penetration Testing Platform Reviewed by Lydecker Black on 7:25 PM Rating: 5
ParanoicScan - Vulnerability Scanner ParanoicScan - Vulnerability Scanner Reviewed by Lydecker Black on 6:59 PM Rating: 5
IPTV Brute-Force - Search And Brute Force Illegal IPTV Server IPTV Brute-Force - Search And Brute Force Illegal IPTV Server Reviewed by Lydecker Black on 7:39 PM Rating: 5
Sawef - Send Attack Web Forms Sawef - Send Attack Web Forms Reviewed by Lydecker Black on 7:00 PM Rating: 5
Vuvuzela - Private Messaging System That Hides Metadata Vuvuzela - Private Messaging System That Hides Metadata Reviewed by Lydecker Black on 7:50 PM Rating: 5
Phpsploit - Stealth Post-Exploitation Framework Phpsploit - Stealth Post-Exploitation Framework Reviewed by Lydecker Black on 7:44 PM Rating: 5
Blade - A Webshell Connection Tool With Customized WAF Bypass Payloads Blade - A Webshell Connection Tool With Customized WAF Bypass Payloads Reviewed by Lydecker Black on 2:44 PM Rating: 5
Sublist3R - Fast Subdomains Enumeration Tool For Penetration Testers Sublist3R - Fast Subdomains Enumeration Tool For Penetration Testers Reviewed by Lydecker Black on 7:32 PM Rating: 5