Featured Post

Vegile - Tool for Post exploitation Techniques in Linux Vegile - Tool for Post exploitation Techniques in Linux Reviewed by Lydecker Black on 6:25 PM Rating: 5
EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack Reviewed by Lydecker Black on 10:04 AM Rating: 5
gOSINT - Open Source Intelligence Framework gOSINT - Open Source Intelligence Framework Reviewed by Lydecker Black on 5:16 PM Rating: 5
One-Lin3r - Gives you one-liners that aids in penetration testing operations One-Lin3r - Gives you one-liners that aids in penetration testing operations Reviewed by Lydecker Black on 9:55 AM Rating: 5
GTScan - The Nmap Scanner for Telco GTScan - The Nmap Scanner for Telco Reviewed by Lydecker Black on 6:30 PM Rating: 5
Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Reviewed by Lydecker Black on 10:00 AM Rating: 5
Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 6:02 PM Rating: 5
OWASP-Nettacker - Automated Penetration Testing Framework OWASP-Nettacker - Automated Penetration Testing Framework Reviewed by Lydecker Black on 9:44 AM Rating: 5
RFCrack - A Software Defined Radio Attack Tool RFCrack - A Software Defined Radio Attack Tool Reviewed by Lydecker Black on 5:30 PM Rating: 5