reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site reflector - Burp plugin able to find reflected XSS on page in real-time while browsing on site Reviewed by Lydecker Black on 10:23 AM Rating: 5
Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Cloud Security Suite - One stop tool for auditing the security posture of AWS infrastructure Reviewed by Lydecker Black on 6:12 AM Rating: 5
ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls ShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently Bypass Firewalls Reviewed by Lydecker Black on 6:13 PM Rating: 5
MIDA-Multitool - Bash Script Purposed For System Enumeration, Vulnerability Identification And Privilege Escalation MIDA-Multitool - Bash Script Purposed For System Enumeration, Vulnerability Identification And Privilege Escalation Reviewed by Lydecker Black on 10:58 AM Rating: 5
Seccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis Seccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis Reviewed by Lydecker Black on 6:26 PM Rating: 5
objection - Runtime Mobile Exploration objection - Runtime Mobile Exploration Reviewed by Lydecker Black on 10:11 AM Rating: 5
BaRMIe - Java RMI Enumeration And Attack Tool BaRMIe - Java RMI Enumeration And Attack Tool Reviewed by Lydecker Black on 6:02 PM Rating: 5
Blazy - Modern Login Bruteforcer Which Also Tests For CSRF, Clickjacking, Cloudflare and WAF Blazy - Modern Login Bruteforcer Which Also Tests For CSRF, Clickjacking, Cloudflare and WAF Reviewed by Lydecker Black on 10:30 AM Rating: 5
EllaScanner - Passive Web Scanner EllaScanner - Passive Web Scanner Reviewed by Lydecker Black on 6:00 PM Rating: 5
DorkNet - Selenium Powered Python Script To Automate Searching For Vulnerable Web Apps DorkNet - Selenium Powered Python Script To Automate Searching For Vulnerable Web Apps Reviewed by Lydecker Black on 10:30 AM Rating: 5
IntRec-Pack - Intelligence and Reconnaissance Package/Bundle installer IntRec-Pack - Intelligence and Reconnaissance Package/Bundle installer Reviewed by Lydecker Black on 6:30 PM Rating: 5
cve-search - A Tool To Perform Local Searches For Known Vulnerabilities cve-search - A Tool To Perform Local Searches For Known Vulnerabilities Reviewed by Lydecker Black on 10:30 AM Rating: 5
CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation Reviewed by Lydecker Black on 6:00 PM Rating: 5
changeme - A Default Credential Scanner changeme - A Default Credential Scanner Reviewed by Lydecker Black on 10:30 AM Rating: 5
PowerSAP - Powershell SAP Assessment Tool PowerSAP - Powershell SAP Assessment Tool Reviewed by Lydecker Black on 6:00 PM Rating: 5
ACLight - PowerShell Script for Advanced Discovery of Privileged Accounts (includes Shadow Admins) ACLight - PowerShell Script for Advanced Discovery of Privileged Accounts (includes Shadow Admins) Reviewed by Lydecker Black on 10:30 AM Rating: 5
Anti-DDOS - Anti DDOS Bash Script Anti-DDOS - Anti DDOS Bash Script Reviewed by Lydecker Black on 7:00 PM Rating: 5
DET - (extensible) Data Exfiltration Toolkit DET - (extensible) Data Exfiltration Toolkit Reviewed by Lydecker Black on 10:30 AM Rating: 5
drinkme - Shellcode Testing Harness drinkme -  Shellcode Testing Harness Reviewed by Lydecker Black on 6:30 PM Rating: 5
VHostScan - Virtual Host Scanner VHostScan - Virtual Host Scanner Reviewed by Lydecker Black on 10:33 AM Rating: 5
Cameradar v2.0 - Hack into RTSP CCTV cameras Cameradar v2.0 - Hack into RTSP CCTV cameras Reviewed by Lydecker Black on 6:27 PM Rating: 5
FLOSS - FireEye Labs Obfuscated String Solver (Automatically extract obfuscated strings from malware) FLOSS - FireEye Labs Obfuscated String Solver (Automatically extract obfuscated strings from malware) Reviewed by Lydecker Black on 10:14 AM Rating: 5
psad - Intrusion Detection and Log Analysis with iptables psad - Intrusion Detection and Log Analysis with iptables Reviewed by Lydecker Black on 6:30 PM Rating: 5
Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites Reviewed by Lydecker Black on 9:56 AM Rating: 5
RHAPIS - Network Intrusion Detection Systems Simulator RHAPIS - Network Intrusion Detection Systems Simulator Reviewed by Lydecker Black on 6:36 PM Rating: 5
OSXAuditor - Free Mac OS X Computer Forensics Tool OSXAuditor - Free Mac OS X Computer Forensics Tool Reviewed by Lydecker Black on 11:13 AM Rating: 5
NIELD v0.6.1 - Network Interface Events Logging Daemon NIELD v0.6.1 - Network Interface Events Logging Daemon Reviewed by Lydecker Black on 6:18 PM Rating: 5
Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB) Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB) Reviewed by Lydecker Black on 10:21 AM Rating: 5
AWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets AWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets Reviewed by Lydecker Black on 5:52 PM Rating: 5
Wfuzz - Web Application Fuzzer Wfuzz - Web Application Fuzzer Reviewed by Lydecker Black on 11:09 AM Rating: 5
Vanquish - Kali Linux based Enumeration Orchestrator Vanquish - Kali Linux based Enumeration Orchestrator Reviewed by Lydecker Black on 6:10 PM Rating: 5
WebBreaker - Dynamic Application Security Test Orchestration (DASTO) WebBreaker - Dynamic Application Security Test Orchestration (DASTO) Reviewed by Lydecker Black on 10:54 AM Rating: 5
Nzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup For Wifi Ids, Monitoring, And Incident Response Nzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup For Wifi Ids, Monitoring, And Incident Response Reviewed by Lydecker Black on 6:30 PM Rating: 5
TorWall - Transparent Tor for Windows TorWall - Transparent Tor for Windows Reviewed by Lydecker Black on 10:30 AM Rating: 5
FruityC2 - Post-Exploitation Tool to Manage Compromised Machines from a Web Interface FruityC2 - Post-Exploitation Tool to Manage Compromised Machines  from a Web Interface Reviewed by Lydecker Black on 9:54 PM Rating: 5
Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool) Wifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool) Reviewed by Lydecker Black on 10:35 AM Rating: 5
Dradis Framework - Collaboration and reporting for IT Security teams Dradis Framework - Collaboration and reporting for IT Security teams Reviewed by Lydecker Black on 6:00 PM Rating: 5
parameth - Tool to brute discover GET and POST parameters parameth - Tool to brute discover GET and POST parameters Reviewed by Lydecker Black on 10:30 AM Rating: 5
XCat - Automate XPath Injection Attacks to Retrieve Documents XCat - Automate XPath Injection Attacks to Retrieve Documents Reviewed by Lydecker Black on 6:11 PM Rating: 5
habu - Network Hacking Toolkit habu - Network Hacking Toolkit Reviewed by Lydecker Black on 10:30 AM Rating: 5
TeleShadow - Telegram Desktop Session Stealer (Windows) TeleShadow - Telegram Desktop Session Stealer (Windows) Reviewed by Lydecker Black on 5:45 PM Rating: 5
SMBMap - Samba Share Enumeration Tool SMBMap - Samba Share Enumeration Tool Reviewed by Lydecker Black on 10:30 AM Rating: 5
Ironsquirrel - Encrypted Exploit Delivery for the Masses Ironsquirrel - Encrypted Exploit Delivery for the Masses Reviewed by Lydecker Black on 6:00 PM Rating: 5
BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool) BitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool) Reviewed by Lydecker Black on 11:35 AM Rating: 5