Universal Radio Hacker - Investigate Wireless Protocols Like A Boss Universal Radio Hacker - Investigate Wireless Protocols Like A Boss Reviewed by Zion3R on 10:11 AM Rating: 5
Faraday v2.6 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v2.6 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Zion3R on 6:47 PM Rating: 5
Nmap 7.60 - Free Security Scanner For Network Exploration & Security Audits Nmap 7.60 - Free Security Scanner For Network Exploration & Security Audits Reviewed by Zion3R on 11:09 AM Rating: 5
Advertisement
XSStrike v1.2 - Fuzz, Crawl and Bruteforce Parameters for XSS XSStrike v1.2 - Fuzz, Crawl and Bruteforce Parameters for XSS Reviewed by Zion3R on 6:15 PM Rating: 5
Arachni v1.5.1 - Web Application Security Scanner Framework Arachni v1.5.1 - Web Application Security Scanner Framework Reviewed by Zion3R on 10:32 AM Rating: 5
RastLeak - Tool To Automatic Leak Information Using Hacking With Engine Searches RastLeak - Tool To Automatic Leak Information Using Hacking With Engine Searches Reviewed by Zion3R on 5:34 PM Rating: 5
Advertisement
ASTo - An IoT Network Security Analysis Tool and Visualizer ASTo - An IoT Network Security Analysis Tool and Visualizer Reviewed by Zion3R on 5:37 PM Rating: 5
DAws - Advanced Web Shell DAws - Advanced Web Shell Reviewed by Zion3R on 10:45 AM Rating: 5
WSSAT - Web Service Security Assessment Tool WSSAT - Web Service Security Assessment Tool Reviewed by Zion3R on 7:30 PM Rating: 5
Hydra 8.6 - Fast and Flexible Network Login Hacker Hydra 8.6 - Fast and Flexible Network Login Hacker Reviewed by Zion3R on 10:29 AM Rating: 5
HoneypotBuster - Microsoft PowerShell Module to Find HoneyPots and HoneyTokens in the Network HoneypotBuster - Microsoft PowerShell Module to Find HoneyPots and HoneyTokens in the Network Reviewed by Zion3R on 7:31 PM Rating: 5
Hash Buster - A Script Which Scraps Online Hash Crackers to Find Cleartext of a Hash (MD5, SHA1, SHA2) Hash Buster - A Script Which Scraps Online Hash Crackers to Find Cleartext of a Hash (MD5, SHA1, SHA2) Reviewed by Zion3R on 11:01 AM Rating: 5
Hardentools - Utility that disables a number of risky Windows features Hardentools - Utility that disables a number of risky Windows features Reviewed by Zion3R on 7:46 PM Rating: 5
DropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations DropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations Reviewed by Zion3R on 6:35 PM Rating: 5
GPS-SDR-SIM - Software-Defined GPS Signal Simulator GPS-SDR-SIM - Software-Defined GPS Signal Simulator Reviewed by Zion3R on 10:30 AM Rating: 5
SET v7.7 - The Social-Engineer Toolkit “Blackout” SET v7.7 - The Social-Engineer Toolkit “Blackout” Reviewed by Zion3R on 10:30 AM Rating: 5
Volatility 2.6 - Advanced Memory Forensics Framework Volatility 2.6 - Advanced Memory Forensics Framework Reviewed by Zion3R on 11:09 AM Rating: 5
CloudFail - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network CloudFail - Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network Reviewed by Zion3R on 10:12 AM Rating: 5
Burp Vulners Scanner - Vulnerability scanner based on vulners.com search API Burp Vulners Scanner - Vulnerability scanner based on vulners.com search API Reviewed by Zion3R on 11:09 AM Rating: 5
Shodanwave - Explore & Obtain Information from Netwave IP Camera Shodanwave - Explore & Obtain Information from Netwave IP Camera Reviewed by Zion3R on 11:12 AM Rating: 5