RedLogin - SSH Brute-force Tools RedLogin - SSH Brute-force Tools Reviewed by Lydecker Black on 5:54 PM Rating: 5
Lynis 2.5.8 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.8 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 10:12 AM Rating: 5
Crips - IP Tools To quickly get information about IP Address's, Web Pages and DNS records Crips - IP Tools To quickly get information about IP Address's, Web Pages and DNS records Reviewed by Lydecker Black on 6:00 PM Rating: 5
BlueMaho v090417 - Bluetooth Security Testing Suite BlueMaho v090417 - Bluetooth Security Testing Suite Reviewed by Lydecker Black on 10:12 AM Rating: 5
Fsociety Hacking Tools Pack - A Penetration Testing Framework Fsociety Hacking Tools Pack - A Penetration Testing Framework Reviewed by Lydecker Black on 6:33 PM Rating: 5
Merlin - A cross-platform post-exploitation HTTP/2 Command & Control server and agent Merlin - A cross-platform post-exploitation HTTP/2 Command & Control server and agent Reviewed by Lydecker Black on 10:05 AM Rating: 5
WPHardening v1.6 - Fortify the security of any WordPress installation WPHardening v1.6 - Fortify the security of any WordPress installation Reviewed by Lydecker Black on 6:15 PM Rating: 5
PiKarma - Detects Wireless Network Attacks PiKarma - Detects Wireless Network Attacks Reviewed by Lydecker Black on 10:30 AM Rating: 5
Relayer - SMB Relay Attack Script Relayer - SMB Relay Attack Script Reviewed by Lydecker Black on 6:12 PM Rating: 5
Qubes OS - A Security-Oriented Operating System Qubes OS - A Security-Oriented Operating System Reviewed by Lydecker Black on 10:18 AM Rating: 5
Username Anarchy - Username Tools For Penetration Testing Username Anarchy - Username Tools For Penetration Testing Reviewed by Lydecker Black on 6:10 PM Rating: 5
BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) BruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts default creds on found services) Reviewed by Lydecker Black on 10:30 AM Rating: 5
GOSINT - Open Source Threat Intelligence Gathering and Processing Framework GOSINT - Open Source Threat Intelligence Gathering and Processing Framework Reviewed by Lydecker Black on 6:12 PM Rating: 5
BtleJuice Framework - Bluetooth Smart (LE) Man-in-the-Middle Framework BtleJuice Framework - Bluetooth Smart (LE) Man-in-the-Middle Framework Reviewed by Lydecker Black on 10:12 AM Rating: 5
Bluepot - Bluetooth Honeypot Bluepot - Bluetooth Honeypot Reviewed by Lydecker Black on 6:11 PM Rating: 5
Invoke-PSImage - Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute Invoke-PSImage - Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute Reviewed by Lydecker Black on 10:23 AM Rating: 5
certstreamcatcher - Catching phishing by observing certificate transparency logs certstreamcatcher - Catching phishing by observing certificate transparency logs Reviewed by Lydecker Black on 6:07 PM Rating: 5
dnscrypt-autoinstall - Automatic installation and configuration of DNSCrypt dnscrypt-autoinstall - Automatic installation and configuration of DNSCrypt Reviewed by Lydecker Black on 10:20 AM Rating: 5
ReverShellGenerator - A Tool to Generate Various Ways to Do a Reverse Shell ReverShellGenerator - A Tool to Generate Various Ways to Do a Reverse Shell Reviewed by Lydecker Black on 6:56 PM Rating: 5
XAttacker - Website Vulnerability Scanner & Auto Exploiter XAttacker - Website Vulnerability Scanner & Auto Exploiter Reviewed by Lydecker Black on 10:36 AM Rating: 5
GhostInTheNet - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan GhostInTheNet - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan Reviewed by Lydecker Black on 5:26 PM Rating: 5
NoSQL Exploitation Framework 2.0 - A Framework For NoSQL Scanning and Exploitation NoSQL Exploitation Framework 2.0 - A Framework For NoSQL Scanning and Exploitation Reviewed by Lydecker Black on 10:10 AM Rating: 5
WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems Reviewed by Lydecker Black on 6:03 PM Rating: 5
mimikatz 2.1.1 - A Post-Exploitation Tool to Extract Plaintexts Passwords, Hash, PIN Code from Memory mimikatz 2.1.1 - A Post-Exploitation Tool to Extract Plaintexts Passwords, Hash, PIN Code from Memory Reviewed by Lydecker Black on 10:09 AM Rating: 5
Makin - Reveal Anti-Debugging Tricks Makin - Reveal Anti-Debugging Tricks Reviewed by Lydecker Black on 6:10 PM Rating: 5
GOWPT - Go Web Application Penetration Test GOWPT - Go Web Application Penetration Test Reviewed by Lydecker Black on 10:22 AM Rating: 5
JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool Reviewed by Lydecker Black on 6:12 PM Rating: 5
Parrot Security 3.10 - Security Oriented GNU/Linux Distribution Parrot Security 3.10 - Security Oriented GNU/Linux Distribution Reviewed by Lydecker Black on 10:10 AM Rating: 5
Invoke-Phant0m - Windows Event Log Killer Invoke-Phant0m - Windows Event Log Killer Reviewed by Lydecker Black on 6:23 PM Rating: 5
AndroTickler - Penetration Testing and Auditing Toolkit for Android Apps AndroTickler - Penetration Testing and Auditing Toolkit for Android Apps Reviewed by Lydecker Black on 10:33 AM Rating: 5
Wazuh - Open Source Host and Endpoint Security Wazuh - Open Source Host and Endpoint Security Reviewed by Lydecker Black on 5:35 PM Rating: 5
Hyperfox - HTTP/HTTPs MITM proxy and traffic recorder with on-the-fly TLS cert generation Hyperfox - HTTP/HTTPs MITM proxy and traffic recorder with on-the-fly TLS cert generation Reviewed by Lydecker Black on 10:01 AM Rating: 5
CALDERA - Automated Adversary Emulation System CALDERA - Automated Adversary Emulation System Reviewed by Lydecker Black on 5:47 PM Rating: 5
OWASP ZAP 2.7.0 - Penetration Testing Tool for Testing Web Applications OWASP ZAP 2.7.0 - Penetration Testing Tool for Testing Web Applications Reviewed by Lydecker Black on 10:20 AM Rating: 5
dirsearch v0.3.8 - Brute Force Directories and Files in Websites dirsearch v0.3.8 - Brute Force Directories and Files in Websites Reviewed by Lydecker Black on 10:13 AM Rating: 5
wildPwn - Brute forcer and shell deployer for WildFly (JBoss AS) wildPwn - Brute forcer and shell deployer for WildFly (JBoss AS) Reviewed by Lydecker Black on 5:19 PM Rating: 5
Tiredful API - An intentionally designed broken web application based on REST API Tiredful API - An intentionally designed broken web application based on REST API Reviewed by Lydecker Black on 10:10 AM Rating: 5
ProcDump for Linux - A Linux version of the ProcDump Sysinternals tool ProcDump for Linux - A Linux version of the ProcDump Sysinternals tool Reviewed by Lydecker Black on 5:42 PM Rating: 5
QuasarRAT - Remote Administration Tool for Windows QuasarRAT - Remote Administration Tool for Windows Reviewed by Lydecker Black on 10:17 AM Rating: 5
ShellcodeToAssembly - Transform your Shellcode to Assembly (ARM, ARM64, MIPS, PPC, X86) ShellcodeToAssembly - Transform your Shellcode to Assembly (ARM, ARM64, MIPS, PPC, X86) Reviewed by Lydecker Black on 6:47 PM Rating: 5
Linux Expl0rer - Easy-To-Use Live Forensics Toolbox For Linux Endpoints Linux Expl0rer - Easy-To-Use Live Forensics Toolbox For Linux Endpoints Reviewed by Lydecker Black on 9:51 AM Rating: 5
CryKeX - Linux Memory Cryptographic Keys Extractor CryKeX - Linux Memory Cryptographic Keys Extractor Reviewed by Lydecker Black on 6:09 PM Rating: 5
N4xD0rk - Listing Subdomains About A Main Domain N4xD0rk - Listing Subdomains About A Main Domain Reviewed by Lydecker Black on 10:21 AM Rating: 5
BootStomp - A Bootloader Vulnerability Finder BootStomp - A Bootloader Vulnerability Finder Reviewed by Lydecker Black on 6:11 PM Rating: 5
w3af - Web Application Attack and Audit Framework w3af - Web Application Attack and Audit Framework Reviewed by Lydecker Black on 10:11 AM Rating: 5
Needl - Take Back Your Privacy. Lose Yourself In The Haystack. Needl -  Take Back Your Privacy. Lose Yourself In The Haystack. Reviewed by Lydecker Black on 6:30 PM Rating: 5
V3n0M-Scanner - Popular Pentesting scanner for SQLi/XSS/LFI/RFI and other Vulns V3n0M-Scanner - Popular Pentesting scanner for SQLi/XSS/LFI/RFI and other Vulns Reviewed by Lydecker Black on 10:37 AM Rating: 5
InSpy - A Linkedin Enumeration Tool InSpy - A Linkedin Enumeration Tool Reviewed by Lydecker Black on 6:09 PM Rating: 5
Sublist3r v1.0 - Fast subdomains enumeration tool for penetration testers Sublist3r v1.0 - Fast subdomains enumeration tool for penetration testers Reviewed by Lydecker Black on 10:30 AM Rating: 5
Syhunt ScanTools 6.0 - Console Web Vulnerability Scan Tools Syhunt ScanTools 6.0 - Console Web Vulnerability Scan Tools Reviewed by Lydecker Black on 6:34 PM Rating: 5
Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Reviewed by Lydecker Black on 10:12 AM Rating: 5
CMSsc4n - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop CMSsc4n - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop Reviewed by Lydecker Black on 6:13 PM Rating: 5
Shodanwave - Exploring and Obtaining Information from Netwave IP Camera Shodanwave - Exploring and Obtaining Information from Netwave IP Camera Reviewed by Lydecker Black on 10:21 AM Rating: 5
0d1n v2.5 - Web Security Tool to Make Fuzzing at HTTP/S 0d1n v2.5 - Web Security Tool to Make Fuzzing at HTTP/S Reviewed by Lydecker Black on 6:11 PM Rating: 5