EvilAbigail - Automated Linux Evil Maid Attack EvilAbigail - Automated Linux Evil Maid Attack Reviewed by Lydecker Black on 6:30 PM Rating: 5
RedSnarf - A Pen-Testing / Red-Teaming Tool For Windows Environments RedSnarf - A Pen-Testing / Red-Teaming Tool For Windows Environments Reviewed by Lydecker Black on 11:30 AM Rating: 5
Wordpresscan - WPScan rewritten in Python + some WPSeku ideas Wordpresscan - WPScan rewritten in Python + some WPSeku ideas Reviewed by Lydecker Black on 6:30 PM Rating: 5
DSSS - Damn Small SQLi Scanner DSSS - Damn Small SQLi Scanner Reviewed by Lydecker Black on 11:30 AM Rating: 5
Comission - WhiteBox CMS Analysis Comission - WhiteBox CMS Analysis Reviewed by Lydecker Black on 6:30 PM Rating: 5
Sobelow - Security-Focused Static Analysis for the Phoenix Framework Sobelow - Security-Focused Static Analysis for the Phoenix Framework Reviewed by Lydecker Black on 11:30 AM Rating: 5
SQLMap v1.1.8 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.1.8 - Automatic SQL Injection And Database Takeover Tool Reviewed by Lydecker Black on 6:13 PM Rating: 5
Nili - Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing Nili - Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing Reviewed by Lydecker Black on 11:11 AM Rating: 5
DELTA - SDN Security Evaluation Framework DELTA - SDN Security Evaluation Framework Reviewed by Lydecker Black on 6:30 PM Rating: 5
WINspect - Powershell-based Windows Security Auditing Toolbox WINspect - Powershell-based Windows Security Auditing Toolbox Reviewed by Lydecker Black on 1:48 PM Rating: 5
AVPASS - Tool For Leaking And Bypassing Android Malware Detection System AVPASS - Tool For Leaking And Bypassing Android Malware Detection System Reviewed by Lydecker Black on 7:26 PM Rating: 5
BinaryAlert - Serverless, Real-time & Retroactive Malware Detection BinaryAlert - Serverless, Real-time & Retroactive Malware Detection Reviewed by Lydecker Black on 11:30 AM Rating: 5
LANs.py - Inject Code, Jam Wifi, And Spy on Wifi Users LANs.py - Inject Code, Jam Wifi, And Spy on Wifi Users Reviewed by Lydecker Black on 6:17 PM Rating: 5
ike-scan - Discover and fingerprint IKE hosts (IPsec VPN Servers) ike-scan - Discover and fingerprint IKE hosts (IPsec VPN Servers) Reviewed by Lydecker Black on 11:30 AM Rating: 5
Knockpy - Enumerate Subdomain Scanner Knockpy - Enumerate Subdomain Scanner Reviewed by Lydecker Black on 6:59 PM Rating: 5
iWant - CLI Based Decentralized Peer To Peer File Sharing iWant - CLI Based Decentralized Peer To Peer File Sharing Reviewed by Lydecker Black on 11:09 AM Rating: 5
Posh-SSH - PowerShell Module for automating tasks on remote systems using SSH Posh-SSH - PowerShell Module for automating tasks on remote systems using SSH Reviewed by Lydecker Black on 6:41 PM Rating: 5
WPScan v2.9.4 - Black Box WordPress Vulnerability Scanner WPScan v2.9.4 - Black Box WordPress Vulnerability Scanner Reviewed by Lydecker Black on 12:18 PM Rating: 5
mitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container mitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container Reviewed by Lydecker Black on 7:08 PM Rating: 5
Portia - Automate Techniques Commonly Performed On Internal Network Penetration Tests Portia - Automate Techniques Commonly Performed On Internal Network Penetration Tests Reviewed by Lydecker Black on 11:00 AM Rating: 5
Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More) Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite (Decompiler, Editor, Debugger & More) Reviewed by Lydecker Black on 7:23 PM Rating: 5
EggShell - iOS/macOS Remote Administration Tool EggShell - iOS/macOS Remote Administration Tool Reviewed by Lydecker Black on 11:10 AM Rating: 5
Cansina - Web Content Discovery Tool Cansina - Web Content Discovery Tool Reviewed by Lydecker Black on 7:03 PM Rating: 5
dockerscan - Docker Security Analysis and Hacking Tools dockerscan - Docker Security Analysis and Hacking Tools Reviewed by Lydecker Black on 10:57 AM Rating: 5
Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls]   Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls] Reviewed by Lydecker Black on 7:30 PM Rating: 5
faker.js - Generate Massive Amounts of Fake Data faker.js - Generate Massive Amounts of Fake Data Reviewed by Lydecker Black on 10:16 AM Rating: 5
SJET - JMX Exploitation Toolkit SJET - JMX Exploitation Toolkit Reviewed by Lydecker Black on 6:13 PM Rating: 5
Plecost v1.1.1 - Wordpress Finger Printer Tool Plecost v1.1.1 - Wordpress Finger Printer Tool Reviewed by Lydecker Black on 11:12 AM Rating: 5
Algo VPN - Set up a personal IPSEC VPN in the cloud Algo VPN - Set up a personal IPSEC VPN in the cloud Reviewed by Lydecker Black on 7:10 PM Rating: 5
Koadic - COM Command & Control Framework (JScript RAT) Koadic - COM Command & Control Framework (JScript RAT) Reviewed by Lydecker Black on 11:12 AM Rating: 5
SweetSecurity - Network Security Monitoring on Raspberry Pi type devices SweetSecurity - Network Security Monitoring on Raspberry Pi type devices Reviewed by Lydecker Black on 7:12 PM Rating: 5
PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) Reviewed by Lydecker Black on 11:24 AM Rating: 5
PyStat - Advanced Netstat Using Python For Windows PyStat - Advanced Netstat Using Python For Windows Reviewed by Lydecker Black on 7:11 PM Rating: 5
MeterSSH v2.0 - Take Shellcode and Inject It Into Memory Over SSH MeterSSH v2.0 - Take Shellcode and Inject It Into Memory Over SSH Reviewed by Lydecker Black on 11:47 AM Rating: 5
JWT cracker - JWT Brute Force Cracker Written in C JWT cracker - JWT Brute Force Cracker Written in C Reviewed by Lydecker Black on 6:56 PM Rating: 5
RED HAWK v2.0.0 - All in one tool for Information Gathering, Vulnerability Scanning and Crawling RED HAWK v2.0.0 - All in one tool for Information Gathering, Vulnerability Scanning and Crawling Reviewed by Lydecker Black on 10:48 AM Rating: 5
Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector Reviewed by Lydecker Black on 6:24 PM Rating: 5
Spaghetti - Web Application Security Scanner Spaghetti - Web Application Security Scanner Reviewed by Lydecker Black on 10:34 AM Rating: 5
PyREBox - Python scriptable Reverse Engineering Sandbox PyREBox - Python scriptable Reverse Engineering Sandbox Reviewed by Lydecker Black on 6:44 PM Rating: 5
jadx - Dex to Java Decompiler jadx - Dex to Java Decompiler Reviewed by Lydecker Black on 10:26 AM Rating: 5
APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities APKiD - Android Application Identifier for Packers, Protectors, Obfuscators and Oddities Reviewed by Lydecker Black on 6:33 PM Rating: 5
LinEnum v0.6 - Scripted Local Linux Enumeration and Privilege Escalation Checks LinEnum v0.6 - Scripted Local Linux Enumeration and Privilege Escalation Checks Reviewed by Lydecker Black on 11:08 AM Rating: 5
Pafish - Tool to Detect Sandboxes and Analysis Environments in the Same Way as Malware Families Do Pafish - Tool to Detect Sandboxes and Analysis Environments in the Same Way as Malware Families Do Reviewed by Lydecker Black on 6:43 PM Rating: 5
Vulscan - Advanced vulnerability scanning with Nmap NSE Vulscan - Advanced vulnerability scanning with Nmap NSE Reviewed by Lydecker Black on 11:27 AM Rating: 5
Plasma - An Interactive Disassembler for x86/ARM/MIPS Plasma - An Interactive Disassembler for x86/ARM/MIPS Reviewed by Lydecker Black on 7:12 PM Rating: 5
Invoke-CradleCrafter - PowerShell Remote Download Cradle Generator and Obfuscator Invoke-CradleCrafter - PowerShell Remote Download Cradle Generator and Obfuscator Reviewed by Lydecker Black on 11:11 AM Rating: 5
BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite Reviewed by Lydecker Black on 6:48 PM Rating: 5
BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing Reviewed by Lydecker Black on 11:12 AM Rating: 5
pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack Reviewed by Lydecker Black on 7:39 PM Rating: 5