IntRec-Pack - Intelligence and Reconnaissance Package/Bundle installer IntRec-Pack - Intelligence and Reconnaissance Package/Bundle installer Reviewed by Lydecker Black on 6:30 PM Rating: 5
cve-search - A Tool To Perform Local Searches For Known Vulnerabilities cve-search - A Tool To Perform Local Searches For Known Vulnerabilities Reviewed by Lydecker Black on 10:30 AM Rating: 5
CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation Reviewed by Lydecker Black on 6:00 PM Rating: 5
changeme - A Default Credential Scanner changeme - A Default Credential Scanner Reviewed by Lydecker Black on 10:30 AM Rating: 5
DET - (extensible) Data Exfiltration Toolkit DET - (extensible) Data Exfiltration Toolkit Reviewed by Lydecker Black on 10:30 AM Rating: 5
drinkme - Shellcode Testing Harness drinkme -  Shellcode Testing Harness Reviewed by Lydecker Black on 6:30 PM Rating: 5
Cameradar v2.0 - Hack into RTSP CCTV cameras Cameradar v2.0 - Hack into RTSP CCTV cameras Reviewed by Lydecker Black on 6:27 PM Rating: 5
psad - Intrusion Detection and Log Analysis with iptables psad - Intrusion Detection and Log Analysis with iptables Reviewed by Lydecker Black on 6:30 PM Rating: 5
NIELD v0.6.1 - Network Interface Events Logging Daemon NIELD v0.6.1 - Network Interface Events Logging Daemon Reviewed by Lydecker Black on 6:18 PM Rating: 5
Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB) Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB) Reviewed by Lydecker Black on 10:21 AM Rating: 5
Wfuzz - Web Application Fuzzer Wfuzz - Web Application Fuzzer Reviewed by Lydecker Black on 11:09 AM Rating: 5
Vanquish - Kali Linux based Enumeration Orchestrator Vanquish - Kali Linux based Enumeration Orchestrator Reviewed by Lydecker Black on 6:10 PM Rating: 5
WebBreaker - Dynamic Application Security Test Orchestration (DASTO) WebBreaker - Dynamic Application Security Test Orchestration (DASTO) Reviewed by Lydecker Black on 10:54 AM Rating: 5
Nzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup For Wifi Ids, Monitoring, And Incident Response Nzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup For Wifi Ids, Monitoring, And Incident Response Reviewed by Lydecker Black on 6:30 PM Rating: 5
FruityC2 - Post-Exploitation Tool to Manage Compromised Machines from a Web Interface FruityC2 - Post-Exploitation Tool to Manage Compromised Machines  from a Web Interface Reviewed by Lydecker Black on 9:54 PM Rating: 5
Dradis Framework - Collaboration and reporting for IT Security teams Dradis Framework - Collaboration and reporting for IT Security teams Reviewed by Lydecker Black on 6:00 PM Rating: 5
XCat - Automate XPath Injection Attacks to Retrieve Documents XCat - Automate XPath Injection Attacks to Retrieve Documents Reviewed by Lydecker Black on 6:11 PM Rating: 5
CipherScan - Find out which SSL ciphersuites are supported by a target CipherScan - Find out which SSL ciphersuites are supported by a target Reviewed by Lydecker Black on 6:00 PM Rating: 5
Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Tails 3.2 - Live System to Preserve Your Privacy and Anonymity Reviewed by Lydecker Black on 6:00 PM Rating: 5
BloodHound - Six Degrees of Domain Admin BloodHound - Six Degrees of Domain Admin Reviewed by Lydecker Black on 11:18 AM Rating: 5