Bashark - Bash Post Exploitation Toolkit Bashark - Bash Post Exploitation Toolkit Reviewed by Lydecker Black on 9:47 AM Rating: 5
WinSpy - A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener WinSpy - A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener Reviewed by Lydecker Black on 6:07 PM Rating: 5
PatrOwl - Open Source, Free And Scalable Security Operations Orchestration Platform PatrOwl - Open Source, Free And Scalable Security Operations Orchestration Platform Reviewed by Lydecker Black on 9:53 AM Rating: 5
CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs Reviewed by Lydecker Black on 6:02 PM Rating: 5
BetterCap v2.10 - The Swiss Army Knife For 802.11, BLE And Ethernet Networks Reconnaissance And MITM Attacks BetterCap v2.10 - The Swiss Army Knife For 802.11, BLE And Ethernet Networks Reconnaissance And MITM Attacks Reviewed by Lydecker Black on 9:48 AM Rating: 5
WPScan v3.3.1 - Black Box WordPress Vulnerability Scanner WPScan v3.3.1 - Black Box WordPress Vulnerability Scanner Reviewed by Lydecker Black on 5:12 PM Rating: 5
Munin - Online Hash Checker For Virustotal And Other Services Munin - Online Hash Checker For Virustotal And Other Services Reviewed by Lydecker Black on 9:25 AM Rating: 5
RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices Reviewed by Lydecker Black on 5:39 PM Rating: 5
LibSSH Scanner - Script To Identify Hosts Vulnerable To CVE-2018-10933 LibSSH Scanner - Script To Identify Hosts Vulnerable To CVE-2018-10933 Reviewed by Lydecker Black on 9:51 AM Rating: 5
SILENTTRINITY - A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET SILENTTRINITY - A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET Reviewed by Lydecker Black on 6:29 PM Rating: 5
Evilginx v2.0 - Standalone Man-In-The-Middle Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-Factor Authentication Evilginx v2.0 - Standalone Man-In-The-Middle Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-Factor Authentication Reviewed by Lydecker Black on 9:42 AM Rating: 5
Infog - Information Gathering Tool Infog - Information Gathering Tool Reviewed by Lydecker Black on 6:46 PM Rating: 5
imR0T - Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13) imR0T - Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13) Reviewed by Lydecker Black on 9:46 AM Rating: 5
RemoteRecon - Remote Recon And Collection RemoteRecon - Remote Recon And Collection Reviewed by Lydecker Black on 6:04 PM Rating: 5
SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool Reviewed by Lydecker Black on 9:43 AM Rating: 5
Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Reviewed by Lydecker Black on 6:07 PM Rating: 5
ReconDog v2.0 - Reconnaissance Swiss Army Knife ReconDog v2.0 - Reconnaissance Swiss Army Knife Reviewed by Lydecker Black on 9:02 AM Rating: 5
Auto-Root-Exploit - Auto Root Exploit Tool Auto-Root-Exploit - Auto Root Exploit Tool Reviewed by Lydecker Black on 6:56 PM Rating: 5
Quasar - An Information Gathering Framework For Lazy Penetration Testers Quasar - An Information Gathering Framework For Lazy Penetration Testers Reviewed by Lydecker Black on 9:33 AM Rating: 5
Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Reviewed by Lydecker Black on 6:58 PM Rating: 5
Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Reviewed by Lydecker Black on 10:12 AM Rating: 5
AutoRDPwn - The Shadow Attack Framework AutoRDPwn - The Shadow Attack Framework Reviewed by Lydecker Black on 5:46 PM Rating: 5
Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Reviewed by Lydecker Black on 9:32 AM Rating: 5
Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File Pentest-Machine - Automates Some Pentest Jobs Via Nmap Xml File Reviewed by Lydecker Black on 6:22 PM Rating: 5
XXRF Shots - Tool to Test SSRF Vulnerabilities XXRF Shots - Tool to Test SSRF Vulnerabilities Reviewed by Lydecker Black on 9:12 AM Rating: 5
DigiDuck Framework - Framework For Digiduck Development Boards Running ATTiny85 Processors And Micronucleus Bootloader DigiDuck Framework - Framework For Digiduck Development Boards Running ATTiny85 Processors And Micronucleus Bootloader Reviewed by Lydecker Black on 6:12 PM Rating: 5
EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General Reviewed by Lydecker Black on 9:11 AM Rating: 5
Clrinject - Injects C# EXE Or DLL Assembly Into Every CLR Runtime And AppDomain Of Another Process Clrinject - Injects C# EXE Or DLL Assembly Into Every CLR Runtime And AppDomain Of Another Process Reviewed by Lydecker Black on 6:48 PM Rating: 5
Sandsifter - The X86 Processor Fuzzer Sandsifter - The X86 Processor Fuzzer Reviewed by Lydecker Black on 9:47 AM Rating: 5
Docker TOR Hidden Service - Easily Setup A Hidden Service Inside The Tor Network Docker TOR Hidden Service - Easily Setup A Hidden Service Inside The Tor Network Reviewed by Lydecker Black on 7:35 PM Rating: 5
ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones ANDRAX - The First And Unique Penetration Testing Platform For Android Smartphones Reviewed by Lydecker Black on 10:03 AM Rating: 5
DNSDiag - DNS Diagnostics And Performance Measurement Tools DNSDiag - DNS Diagnostics And Performance Measurement Tools Reviewed by Lydecker Black on 6:34 PM Rating: 5
Atlas - Quick SQLMap Tamper Suggester Atlas - Quick SQLMap Tamper Suggester Reviewed by Lydecker Black on 10:12 AM Rating: 5
TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once Reviewed by Lydecker Black on 6:42 PM Rating: 5
Dex2Jar - Tools To Work With Android .Dex And Java .Class Files Dex2Jar - Tools To Work With Android .Dex And Java .Class Files Reviewed by Lydecker Black on 9:12 AM Rating: 5
HeapHopper - A Bounded Model Checking Framework For Heap-implementations HeapHopper - A Bounded Model Checking Framework For Heap-implementations Reviewed by Lydecker Black on 6:06 PM Rating: 5
DbgShell - A PowerShell Front-End For The Windows Debugger Engine DbgShell - A PowerShell Front-End For The Windows Debugger Engine Reviewed by Lydecker Black on 9:03 AM Rating: 5
Malwoverview - Tool To Perform An Initial And Quick Triage On Either A Directory Containing Malware Samples Or A Specific Malware Sample Malwoverview - Tool To Perform An Initial And Quick Triage On Either A Directory Containing Malware Samples Or A Specific Malware Sample Reviewed by Lydecker Black on 5:58 PM Rating: 5
DarkSpiritz - A Penetration Testing Framework For UNIX Systems DarkSpiritz - A Penetration Testing Framework For UNIX Systems Reviewed by Lydecker Black on 9:45 AM Rating: 5
XenoScan - Open Source Memory Scanner Written In C++ XenoScan - Open Source Memory Scanner Written In C++ Reviewed by Lydecker Black on 6:19 PM Rating: 5
AES-Killer - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps AES-Killer - Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps Reviewed by Lydecker Black on 9:27 AM Rating: 5
pwnedOrNot v1.1.0 - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API pwnedOrNot v1.1.0 - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API Reviewed by Lydecker Black on 6:37 PM Rating: 5
Gurp - Golang command-line interface to Burp Suite's REST API Gurp - Golang command-line interface to Burp Suite's REST API Reviewed by Lydecker Black on 9:23 AM Rating: 5
SubScraper - External Pentest Tool That Performs Subdomain Enumeration Through Various Techniques SubScraper - External Pentest Tool That Performs Subdomain Enumeration Through Various Techniques Reviewed by Lydecker Black on 6:01 PM Rating: 5
NodeXP - Detection and Exploitation Tool for Node.js Services NodeXP - Detection and Exploitation Tool for Node.js Services Reviewed by Lydecker Black on 9:22 AM Rating: 5
Kemon - An Open-Source Pre And Post Callback-Based Framework For macOS Kernel Monitoring Kemon - An Open-Source Pre And Post Callback-Based Framework For macOS Kernel Monitoring Reviewed by Lydecker Black on 6:25 PM Rating: 5
BYOB - Build Your Own Botnet BYOB - Build Your Own Botnet Reviewed by Lydecker Black on 10:10 AM Rating: 5
Aircrack-ng 1.4 - Complete Suite Of Tools To Assess WiFi Network Security Aircrack-ng 1.4 - Complete Suite Of Tools To Assess WiFi Network Security Reviewed by Lydecker Black on 5:39 PM Rating: 5
JShell - Get A JavaScript Shell With XSS JShell - Get A JavaScript Shell With XSS Reviewed by Lydecker Black on 10:04 AM Rating: 5
Seeker v1.0.7 - Get Accurate Location using a Fake Website Seeker v1.0.7 - Get Accurate Location using a Fake Website Reviewed by Lydecker Black on 6:46 PM Rating: 5
Put2Win - Script To Automatize Shell Upload By PUT HTTP Method To Get Meterpreter Put2Win - Script To Automatize Shell Upload By PUT HTTP Method To Get Meterpreter Reviewed by Lydecker Black on 9:12 AM Rating: 5
Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls] Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket [Bypass UDP FireWalls] Reviewed by Lydecker Black on 6:04 PM Rating: 5
Drozer v2.4.4 - The Leading Security Assessment Framework For Android Drozer v2.4.4 - The Leading Security Assessment Framework For Android Reviewed by Lydecker Black on 10:13 AM Rating: 5