Xerosploit - Efficient And Advanced Man In The Middle Framework Xerosploit - Efficient And Advanced Man In The Middle Framework Reviewed by Lydecker Black on 11:30 AM Rating: 5
TheFatRat - Easy Tool For Generate Backdoor with Msfvenom TheFatRat - Easy Tool For Generate Backdoor with Msfvenom Reviewed by Lydecker Black on 11:38 AM Rating: 5
LionSec Linux 5.0 - Penetration Testing Operating system based on Ubuntu LionSec Linux 5.0 - Penetration Testing Operating system based on Ubuntu Reviewed by Lydecker Black on 6:12 PM Rating: 5
Limon - Sandbox for Analyzing Linux Malwares Limon - Sandbox for Analyzing Linux Malwares Reviewed by Lydecker Black on 6:37 PM Rating: 5
Parrot OS 3.1 (Defcon) - Friendly OS designed for Pentesting, Computer Forensic, Hacking, Cloud pentesting, Privacy/Anonimity and Cryptography Parrot OS 3.1 (Defcon) - Friendly OS designed for Pentesting, Computer Forensic, Hacking,  Cloud pentesting, Privacy/Anonimity and Cryptography Reviewed by Lydecker Black on 6:39 PM Rating: 5
Rekall - Rekall Memory Forensic Framework Rekall -  Rekall Memory Forensic Framework Reviewed by Lydecker Black on 7:07 PM Rating: 5
OWASP Mth3l3m3nt Framework - Penetration Testing Aiding Tool And Exploitation Framework OWASP Mth3l3m3nt Framework - Penetration Testing Aiding Tool And Exploitation Framework Reviewed by Lydecker Black on 4:33 PM Rating: 5
TLS-Attacker - A Java-based Framework for Analyzing TLS Libraries TLS-Attacker - A Java-based Framework for Analyzing TLS Libraries Reviewed by Lydecker Black on 7:47 PM Rating: 5
nightHawkResponse - Incident Response Forensic Framework nightHawkResponse - Incident Response Forensic Framework Reviewed by Lydecker Black on 7:12 PM Rating: 5
shadow - Firefox/Jemalloc Heap Exploitation Swiss Army Knife shadow - Firefox/Jemalloc Heap Exploitation Swiss Army Knife Reviewed by Lydecker Black on 6:58 PM Rating: 5
tomcatWarDeployer - Apache Tomcat auto WAR Deployment & Pwning Penetration Testing Tool tomcatWarDeployer - Apache Tomcat auto WAR Deployment & Pwning Penetration Testing Tool Reviewed by Lydecker Black on 5:35 PM Rating: 5
WhoDat - Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT) WhoDat - Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT) Reviewed by Lydecker Black on 7:48 PM Rating: 5
shard - A Command Line Tool To Detect Shared Passwords shard - A Command Line Tool To Detect Shared Passwords Reviewed by Lydecker Black on 7:11 PM Rating: 5
Lynis 2.3.0 - Security Auditing Tool for Unix/Linux Systems Lynis 2.3.0 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 3:32 PM Rating: 5
Wildpwn - Unix Wildcard Attack Tool Wildpwn -  Unix Wildcard Attack Tool Reviewed by Lydecker Black on 7:28 PM Rating: 5
T50 - The Fastest Packet Injector T50 - The Fastest Packet Injector Reviewed by Lydecker Black on 7:38 PM Rating: 5
MARA Framework - Mobile Application Reverse engineering and Analysis Framework MARA Framework - Mobile Application Reverse engineering and Analysis Framework Reviewed by Lydecker Black on 3:31 PM Rating: 5
AntiRansom - Fighting against Ransomware using Honeypots AntiRansom - Fighting against Ransomware using Honeypots Reviewed by Lydecker Black on 6:13 PM Rating: 5
Mimikittenz - Post-Exploitation Powershell Tool for Extracting Juicy info from Memory Mimikittenz - Post-Exploitation Powershell Tool for Extracting Juicy info from Memory Reviewed by Lydecker Black on 7:26 PM Rating: 5
Androguard - Reverse engineering, Malware and goodware analysis of Android applications Androguard - Reverse engineering, Malware and goodware analysis of Android applications Reviewed by Lydecker Black on 7:45 PM Rating: 5
Fierce - A DNS Reconnaissance Tool for Locating Non-Contiguous IP Space Fierce - A DNS Reconnaissance Tool for Locating Non-Contiguous IP Space Reviewed by Lydecker Black on 7:44 PM Rating: 5
NetBox - IP Address Management (IPAM) and Data Center Infrastructure Management (DCIM) Tool NetBox - IP Address Management (IPAM) and Data Center Infrastructure Management (DCIM) Tool Reviewed by Lydecker Black on 7:30 PM Rating: 5
Peach Fuzz - Vulnerability Scanning Framework Peach Fuzz - Vulnerability Scanning Framework Reviewed by Lydecker Black on 7:57 PM Rating: 5