ReconDog - An All In One Tool For All Your Basic Information Gathering Needs ReconDog - An All In One Tool For All Your Basic Information Gathering Needs Reviewed by Lydecker Black on 5:20 PM Rating: 5
maltran - Tool To Download Malware Exercises From MALware-TRaffic-ANalysis.net maltran - Tool To Download Malware Exercises From MALware-TRaffic-ANalysis.net Reviewed by Lydecker Black on 11:00 AM Rating: 5
Eternal - An internet scanner for Eternal Blue [exploit CVE-2017-0144] Eternal - An internet scanner for Eternal Blue [exploit CVE-2017-0144] Reviewed by Lydecker Black on 4:30 PM Rating: 5
Hash Buster - A Script Which Scraps Online Hash Crackers to Find Cleartext of a Hash (MD5, SHA1, SHA2) Hash Buster - A Script Which Scraps Online Hash Crackers to Find Cleartext of a Hash (MD5, SHA1, SHA2) Reviewed by Lydecker Black on 11:01 AM Rating: 5
Samplicator - Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing Samplicator - Send copies of (UDP) datagrams to multiple receivers, with optional sampling and spoofing Reviewed by Lydecker Black on 5:30 PM Rating: 5
Prowler - Tool for AWS Security Assessment, Auditing And Hardening Prowler - Tool for AWS Security Assessment, Auditing And Hardening Reviewed by Lydecker Black on 10:30 AM Rating: 5
Hardentools - Utility that disables a number of risky Windows features Hardentools - Utility that disables a number of risky Windows features Reviewed by Lydecker Black on 7:46 PM Rating: 5
NagaScan - Distributed Passive Scanner for Web Application NagaScan - Distributed Passive Scanner for Web Application Reviewed by Lydecker Black on 10:49 AM Rating: 5
DropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations DropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations Reviewed by Lydecker Black on 6:35 PM Rating: 5
GPS-SDR-SIM - Software-Defined GPS Signal Simulator GPS-SDR-SIM - Software-Defined GPS Signal Simulator Reviewed by Lydecker Black on 10:30 AM Rating: 5
SET v7.7 - The Social-Engineer Toolkit “Blackout” SET v7.7 - The Social-Engineer Toolkit “Blackout” Reviewed by Lydecker Black on 10:30 AM Rating: 5
nWatch - Tool for Host Discovery, PortScanning and Operating System Fingerprinting nWatch - Tool for Host Discovery, PortScanning and Operating System Fingerprinting Reviewed by Lydecker Black on 7:12 PM Rating: 5
Volatility 2.6 - Advanced Memory Forensics Framework Volatility 2.6 - Advanced Memory Forensics Framework Reviewed by Lydecker Black on 11:09 AM Rating: 5
CloudFail - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network CloudFail - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network Reviewed by Lydecker Black on 10:12 AM Rating: 5
AhMyth Android RAT - Android Remote Administration Tool AhMyth Android RAT - Android Remote Administration Tool Reviewed by Lydecker Black on 10:30 AM Rating: 5
CHAOS Framework - Generate Payloads and Control Remote Machines CHAOS Framework - Generate Payloads and Control Remote Machines Reviewed by Lydecker Black on 11:30 AM Rating: 5
smap - Shellcode Mapper smap - Shellcode Mapper Reviewed by Lydecker Black on 7:30 PM Rating: 5
Burp Vulners Scanner - Vulnerability scanner based on vulners.com search API Burp Vulners Scanner - Vulnerability scanner based on vulners.com search API Reviewed by Lydecker Black on 11:09 AM Rating: 5
TorStat - Tor Statistics TorStat - Tor Statistics Reviewed by Lydecker Black on 6:45 PM Rating: 5
Shodanwave - Explore & Obtain Information from Netwave IP Camera Shodanwave - Explore & Obtain Information from Netwave IP Camera Reviewed by Lydecker Black on 11:12 AM Rating: 5
Lynis 2.5.2 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.2 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 8:12 PM Rating: 5
Winpayloads - Undetectable Windows Payload Generation Winpayloads - Undetectable Windows Payload Generation Reviewed by Lydecker Black on 11:00 AM Rating: 5
LFISuite - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner LFISuite - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner Reviewed by Lydecker Black on 10:30 AM Rating: 5
Magic Wormhole - Get Things From One Computer To Another, Safely Magic Wormhole - Get Things From One Computer To Another, Safely Reviewed by Lydecker Black on 11:02 AM Rating: 5
Inspector - Privilege Escalation Unix Helper Inspector - Privilege Escalation Unix Helper Reviewed by Lydecker Black on 11:30 AM Rating: 5
Exif-Remove - Command Line Tool- Remove Exif Data from all Digital Pictures Exif-Remove - Command Line Tool- Remove Exif Data from all Digital Pictures Reviewed by Lydecker Black on 6:30 PM Rating: 5
Steamer - Import, Search, and Manage Public Password Breach Data Steamer - Import, Search, and Manage Public Password Breach Data Reviewed by Lydecker Black on 11:12 AM Rating: 5
GShark Framework - Check all your backdoors with only one telegram account GShark Framework - Check all your backdoors with only one telegram account Reviewed by Lydecker Black on 6:30 PM Rating: 5
Dr0p1t Framework 1.3 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Dr0p1t Framework 1.3 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Reviewed by Lydecker Black on 10:00 AM Rating: 5
Debinject - Inject malicious code into *.debs Debinject - Inject malicious code into *.debs Reviewed by Lydecker Black on 5:30 PM Rating: 5
Zeus - AWS EC2 / S3 Auditing & Hardening Tool Zeus - AWS EC2 / S3 Auditing & Hardening Tool Reviewed by Lydecker Black on 10:13 AM Rating: 5
PPEE (Puppy) - Professional PE file Explorer for reversers and malware researchers PPEE (Puppy) - Professional PE file Explorer for reversers and malware researchers Reviewed by Lydecker Black on 10:10 AM Rating: 5
AQUATONE - A Tool for Domain Flyovers AQUATONE - A Tool for Domain Flyovers Reviewed by Lydecker Black on 11:30 AM Rating: 5
pyrasite - Inject code into running Python processes pyrasite - Inject code into running Python processes Reviewed by Lydecker Black on 11:12 AM Rating: 5
sylkie - IPv6 address spoofing with the Neighbor Discovery Protocol sylkie - IPv6 address spoofing with the Neighbor Discovery Protocol Reviewed by Lydecker Black on 10:45 AM Rating: 5