dockerscan - Docker Security Analysis and Hacking Tools dockerscan - Docker Security Analysis and Hacking Tools Reviewed by Lydecker Black on 10:57 AM Rating: 5
Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls]   Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls] Reviewed by Lydecker Black on 7:30 PM Rating: 5
faker.js - Generate Massive Amounts of Fake Data faker.js - Generate Massive Amounts of Fake Data Reviewed by Lydecker Black on 10:16 AM Rating: 5
SJET - JMX Exploitation Toolkit SJET - JMX Exploitation Toolkit Reviewed by Lydecker Black on 6:13 PM Rating: 5
Plecost v1.1.1 - Wordpress Finger Printer Tool Plecost v1.1.1 - Wordpress Finger Printer Tool Reviewed by Lydecker Black on 11:12 AM Rating: 5
Algo VPN - Set up a personal IPSEC VPN in the cloud Algo VPN - Set up a personal IPSEC VPN in the cloud Reviewed by Lydecker Black on 7:10 PM Rating: 5
Koadic - COM Command & Control Framework (JScript RAT) Koadic - COM Command & Control Framework (JScript RAT) Reviewed by Lydecker Black on 11:12 AM Rating: 5
SweetSecurity - Network Security Monitoring on Raspberry Pi type devices SweetSecurity - Network Security Monitoring on Raspberry Pi type devices Reviewed by Lydecker Black on 7:12 PM Rating: 5
PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) Reviewed by Lydecker Black on 11:24 AM Rating: 5
PyStat - Advanced Netstat Using Python For Windows PyStat - Advanced Netstat Using Python For Windows Reviewed by Lydecker Black on 7:11 PM Rating: 5
MeterSSH v2.0 - Take Shellcode and Inject It Into Memory Over SSH MeterSSH v2.0 - Take Shellcode and Inject It Into Memory Over SSH Reviewed by Lydecker Black on 11:47 AM Rating: 5
JWT cracker - JWT Brute Force Cracker Written in C JWT cracker - JWT Brute Force Cracker Written in C Reviewed by Lydecker Black on 6:56 PM Rating: 5
RED HAWK v2.0.0 - All in one tool for Information Gathering, Vulnerability Scanning and Crawling RED HAWK v2.0.0 - All in one tool for Information Gathering, Vulnerability Scanning and Crawling Reviewed by Lydecker Black on 10:48 AM Rating: 5
Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector Reviewed by Lydecker Black on 6:24 PM Rating: 5
Spaghetti - Web Application Security Scanner Spaghetti - Web Application Security Scanner Reviewed by Lydecker Black on 10:34 AM Rating: 5
PyREBox - Python scriptable Reverse Engineering Sandbox PyREBox - Python scriptable Reverse Engineering Sandbox Reviewed by Lydecker Black on 6:44 PM Rating: 5
jadx - Dex to Java Decompiler jadx - Dex to Java Decompiler Reviewed by Lydecker Black on 10:26 AM Rating: 5
APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities Reviewed by Lydecker Black on 6:33 PM Rating: 5
LinEnum v0.6 - Scripted Local Linux Enumeration and Privilege Escalation Checks LinEnum v0.6 - Scripted Local Linux Enumeration and Privilege Escalation Checks Reviewed by Lydecker Black on 11:08 AM Rating: 5
Pafish - Tool to Detect Sandboxes and Analysis Environments in the Same Way as Malware Families Do Pafish - Tool to Detect Sandboxes and Analysis Environments in the Same Way as Malware Families Do Reviewed by Lydecker Black on 6:43 PM Rating: 5
Vulscan - Advanced vulnerability scanning with Nmap NSE Vulscan - Advanced vulnerability scanning with Nmap NSE Reviewed by Lydecker Black on 11:27 AM Rating: 5
Plasma - An Interactive Disassembler for x86/ARM/MIPS Plasma - An Interactive Disassembler for x86/ARM/MIPS Reviewed by Lydecker Black on 7:12 PM Rating: 5
Invoke-CradleCrafter - PowerShell Remote Download Cradle Generator and Obfuscator Invoke-CradleCrafter - PowerShell Remote Download Cradle Generator and Obfuscator Reviewed by Lydecker Black on 11:11 AM Rating: 5
BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite Reviewed by Lydecker Black on 6:48 PM Rating: 5
BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing Reviewed by Lydecker Black on 11:12 AM Rating: 5
pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack Reviewed by Lydecker Black on 7:39 PM Rating: 5
PcapViz - Visualize Network Topologies and Collect Graph Statistics Based on PCAP Files PcapViz - Visualize Network Topologies and Collect Graph Statistics Based on PCAP Files Reviewed by Lydecker Black on 11:16 AM Rating: 5
WS-Attacker v1.8 - Modular Framework For Web Services Penetration Testing WS-Attacker v1.8 - Modular Framework For Web Services Penetration Testing Reviewed by Lydecker Black on 7:35 PM Rating: 5
jwt-cracker - Simple HS256 JWT Token Brute Force Cracker jwt-cracker - Simple HS256 JWT Token Brute Force Cracker Reviewed by Lydecker Black on 12:08 PM Rating: 5
CyberChef - The Cyber Swiss Army Knife [A Web App For Encryption, Encoding, Compression And Data Analysis] CyberChef - The Cyber Swiss Army Knife [A Web App For Encryption, Encoding, Compression And Data Analysis] Reviewed by Lydecker Black on 6:30 PM Rating: 5
lscript - This script will make your life easier, and of course faster lscript - This script will make your life easier, and of course faster Reviewed by Lydecker Black on 11:14 AM Rating: 5
WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required) WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required) Reviewed by Lydecker Black on 6:12 PM Rating: 5
Universal Radio Hacker - Investigate Wireless Protocols Like A Boss Universal Radio Hacker - Investigate Wireless Protocols Like A Boss Reviewed by Lydecker Black on 10:11 AM Rating: 5
Mercure - A Tool For Security Managers Who Want To Train Their Colleague To Phishing Mercure - A Tool For Security Managers Who Want To Train Their Colleague To Phishing Reviewed by Lydecker Black on 6:49 PM Rating: 5
BAF - Blind Attacking Framework BAF - Blind Attacking Framework Reviewed by Lydecker Black on 11:07 AM Rating: 5
Faraday v2.6 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v2.6 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Lydecker Black on 6:47 PM Rating: 5
Nmap 7.60 - Free Security Scanner For Network Exploration & Security Audits Nmap 7.60 - Free Security Scanner For Network Exploration & Security Audits Reviewed by Lydecker Black on 11:09 AM Rating: 5
XSStrike v1.2 - Fuzz, Crawl and Bruteforce Parameters for XSS XSStrike v1.2 - Fuzz, Crawl and Bruteforce Parameters for XSS Reviewed by Lydecker Black on 6:15 PM Rating: 5
Arachni v1.5.1 - Web Application Security Scanner Framework Arachni v1.5.1 - Web Application Security Scanner Framework Reviewed by Lydecker Black on 10:32 AM Rating: 5