Vegile - Tool for Post exploitation Techniques in Linux Vegile - Tool for Post exploitation Techniques in Linux Reviewed by Lydecker Black on 6:25 PM Rating: 5
EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack Reviewed by Lydecker Black on 10:04 AM Rating: 5
gOSINT - Open Source Intelligence Framework gOSINT - Open Source Intelligence Framework Reviewed by Lydecker Black on 5:16 PM Rating: 5
One-Lin3r - Gives you one-liners that aids in penetration testing operations One-Lin3r - Gives you one-liners that aids in penetration testing operations Reviewed by Lydecker Black on 9:55 AM Rating: 5
GTScan - The Nmap Scanner for Telco GTScan - The Nmap Scanner for Telco Reviewed by Lydecker Black on 6:30 PM Rating: 5
Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Reviewed by Lydecker Black on 10:00 AM Rating: 5
Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 6:02 PM Rating: 5
OWASP-Nettacker - Automated Penetration Testing Framework OWASP-Nettacker - Automated Penetration Testing Framework Reviewed by Lydecker Black on 9:44 AM Rating: 5
RFCrack - A Software Defined Radio Attack Tool RFCrack - A Software Defined Radio Attack Tool Reviewed by Lydecker Black on 5:30 PM Rating: 5
DNSExfiltrator - Data exfiltration over DNS request covert channel DNSExfiltrator - Data exfiltration over DNS request covert channel Reviewed by Lydecker Black on 9:41 AM Rating: 5
sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) Reviewed by Lydecker Black on 5:38 PM Rating: 5
cSploit Android - The most complete and advanced IT security professional toolkit on Android cSploit Android - The most complete and advanced IT security professional toolkit on Android Reviewed by Lydecker Black on 10:34 AM Rating: 5
ACE - Automated, Collection, and Enrichment Platform ACE - Automated, Collection, and Enrichment Platform Reviewed by Lydecker Black on 5:30 PM Rating: 5
Salamandra - Spy Microphone Detection Tool Salamandra - Spy Microphone Detection Tool Reviewed by Lydecker Black on 10:01 AM Rating: 5
Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Reviewed by Lydecker Black on 5:30 PM Rating: 5
Recon-ng - Full-Featured Web Reconnaissance Framework Recon-ng - Full-Featured Web Reconnaissance Framework Reviewed by Lydecker Black on 10:07 AM Rating: 5
truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History Reviewed by Lydecker Black on 5:12 PM Rating: 5
SNMPwn - An SNMPv3 User Enumerator and Attack tool SNMPwn - An SNMPv3 User Enumerator and Attack tool Reviewed by Lydecker Black on 10:11 AM Rating: 5
Anubis - Subdomain Enumeration And Information Gathering Tool Anubis - Subdomain Enumeration And Information Gathering Tool Reviewed by Lydecker Black on 6:03 PM Rating: 5
CoffeeMiner - Collaborative (MITM) Cryptocurrency Mining Pool In Wifi Networks CoffeeMiner - Collaborative (MITM) Cryptocurrency Mining Pool In Wifi Networks Reviewed by Lydecker Black on 10:05 AM Rating: 5
Wapiti 3.0.0 - The Web-Application Vulnerability Scanner Wapiti 3.0.0 - The Web-Application Vulnerability Scanner Reviewed by Lydecker Black on 5:32 PM Rating: 5
Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux Reviewed by Lydecker Black on 9:43 AM Rating: 5
Meltdown Exploit PoC Meltdown Exploit PoC Reviewed by Lydecker Black on 10:16 PM Rating: 5
In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors Reviewed by Lydecker Black on 5:04 PM Rating: 5
fuxploider - File Upload Vulnerability Scanner And Exploitation Tool fuxploider - File Upload Vulnerability Scanner And Exploitation Tool Reviewed by Lydecker Black on 10:13 AM Rating: 5
shimit - A tool that implements the Golden SAML attack shimit - A tool that implements the Golden SAML attack Reviewed by Lydecker Black on 5:45 PM Rating: 5
RetDec - A Retargetable Machine-Code Decompiler RetDec - A Retargetable Machine-Code Decompiler Reviewed by Lydecker Black on 10:18 AM Rating: 5
Reposcanner - Python Script To Scan Git Repos For Interesting Strings Reposcanner - Python Script To Scan Git Repos For Interesting Strings Reviewed by Lydecker Black on 6:04 PM Rating: 5
Instagram-Py - Simple Instagram Brute Force Script Instagram-Py - Simple Instagram Brute Force Script Reviewed by Lydecker Black on 10:09 AM Rating: 5
Decodify - Detect And Decode Encoded Strings Recursively Decodify -  Detect And Decode Encoded Strings Recursively Reviewed by Lydecker Black on 6:12 PM Rating: 5
CMSsc4n v2.0 - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop CMSsc4n v2.0 - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop Reviewed by Lydecker Black on 10:21 AM Rating: 5
iOSRestrictionBruteForce - Crack iOS Restriction Passcodes with Python iOSRestrictionBruteForce - Crack iOS Restriction Passcodes with Python Reviewed by Lydecker Black on 6:00 PM Rating: 5
uncaptcha - Defeating Google's audio reCaptcha with 85% accuracy uncaptcha - Defeating Google's audio reCaptcha with 85% accuracy Reviewed by Lydecker Black on 10:01 AM Rating: 5
ADRecon - Tool Which Gathers Information About The Active Directory ADRecon - Tool Which Gathers Information About The Active Directory Reviewed by Lydecker Black on 6:07 PM Rating: 5
LaZagne v2.3 - Credentials Recovery Project LaZagne v2.3 - Credentials Recovery Project Reviewed by Lydecker Black on 10:09 AM Rating: 5
WordPress Exploit Framework v1.8 - A Ruby Framework For Developing And Using Modules Which Aid In The Penetration Testing Of Wordpress WordPress Exploit Framework v1.8 - A Ruby Framework For Developing And Using Modules Which Aid In The Penetration Testing Of Wordpress Reviewed by Lydecker Black on 6:12 PM Rating: 5
Cloak - Backdoor In Any Python Script With Some Tricks Cloak - Backdoor In Any Python Script With Some Tricks Reviewed by Lydecker Black on 10:10 AM Rating: 5