Lynis 2.5.5 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.5 - Security Auditing Tool for Unix/Linux Systems Reviewed by Zion3R on 7:05 PM Rating: 5
idb - Tool to simplify some common tasks for iOS pentesting and research idb - Tool to simplify some common tasks for iOS pentesting and research Reviewed by Zion3R on 11:00 AM Rating: 5
Luckystrike - A PowerShell based utility for the creation of malicious Office macro documents Luckystrike - A PowerShell based utility for the creation of malicious Office macro documents Reviewed by Zion3R on 11:30 AM Rating: 5
Advertisement
D0xk1t - Web-based OSINT and Active Reconaissance Suite D0xk1t - Web-based OSINT and Active Reconaissance Suite Reviewed by Zion3R on 11:30 AM Rating: 5
sdnpwn - An SDN Penetration Testing Toolkit sdnpwn - An SDN Penetration Testing Toolkit Reviewed by Zion3R on 6:23 PM Rating: 5
WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa Reviewed by Zion3R on 11:30 AM Rating: 5
Advertisement
Sobelow - Security-Focused Static Analysis for the Phoenix Framework Sobelow - Security-Focused Static Analysis for the Phoenix Framework Reviewed by Zion3R on 11:30 AM Rating: 5
SQLMap v1.1.8 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.1.8 - Automatic SQL Injection And Database Takeover Tool Reviewed by Zion3R on 6:13 PM Rating: 5
LANs.py - Inject Code, Jam Wifi, And Spy on Wifi Users LANs.py - Inject Code, Jam Wifi, And Spy on Wifi Users Reviewed by Zion3R on 6:17 PM Rating: 5
WPScan v2.9.4 - Black Box WordPress Vulnerability Scanner WPScan v2.9.4 - Black Box WordPress Vulnerability Scanner Reviewed by Zion3R on 12:18 PM Rating: 5
mitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container mitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container Reviewed by Zion3R on 7:08 PM Rating: 5
Portia - Automate Techniques Commonly Performed On Internal Network Penetration Tests Portia - Automate Techniques Commonly Performed On Internal Network Penetration Tests Reviewed by Zion3R on 11:00 AM Rating: 5
faker.js - Generate Massive Amounts of Fake Data faker.js - Generate Massive Amounts of Fake Data Reviewed by Zion3R on 10:16 AM Rating: 5
SJET - JMX Exploitation Toolkit SJET - JMX Exploitation Toolkit Reviewed by Zion3R on 6:13 PM Rating: 5
PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) PiSavar - Detects PineAP Module and Starts Deauthentication Attack (for fake access points) Reviewed by Zion3R on 11:24 AM Rating: 5
Spaghetti - Web Application Security Scanner Spaghetti - Web Application Security Scanner Reviewed by Zion3R on 10:34 AM Rating: 5
jadx - Dex to Java Decompiler jadx - Dex to Java Decompiler Reviewed by Zion3R on 10:26 AM Rating: 5
Vulscan - Advanced vulnerability scanning with Nmap NSE Vulscan - Advanced vulnerability scanning with Nmap NSE Reviewed by Zion3R on 11:27 AM Rating: 5
BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite BadIntent - Intercept, Modify, Repeat and Attack Android's Binder Transactions Using Burp Suite Reviewed by Zion3R on 6:48 PM Rating: 5
BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing Reviewed by Zion3R on 11:12 AM Rating: 5