Gobuster - Directory/File & DNS Busting Tool Written In Go Gobuster - Directory/File & DNS Busting Tool Written In Go Reviewed by Lydecker Black on 9:34 AM Rating: 5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Reviewed by Lydecker Black on 6:12 PM Rating: 5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram Reviewed by Lydecker Black on 10:22 AM Rating: 5
sshLooter - Script To Steal Passwords From SSH sshLooter - Script To Steal Passwords From SSH Reviewed by Lydecker Black on 5:58 PM Rating: 5
ezsploit - Linux Bash Script Automation For Metasploit ezsploit - Linux Bash Script Automation For Metasploit Reviewed by Lydecker Black on 10:30 AM Rating: 5
Altdns - Generates permutations, alterations and mutations of subdomains and then resolves them Altdns - Generates permutations, alterations and mutations of subdomains and then resolves them Reviewed by Lydecker Black on 6:14 PM Rating: 5
IntruderPayloads - A Collection Of Burpsuite Intruder Payloads, Fuzz Lists And File Uploads IntruderPayloads - A Collection Of Burpsuite Intruder Payloads, Fuzz Lists And File Uploads Reviewed by Lydecker Black on 10:23 AM Rating: 5
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack APTSimulator - A toolset to make a system look as if it was the victim of an APT attack Reviewed by Lydecker Black on 5:49 PM Rating: 5
Parat - Python Based Remote Administration Tool (RAT) Parat - Python Based Remote Administration Tool (RAT) Reviewed by Lydecker Black on 9:48 AM Rating: 5
Whapa - WhatsApp DataBase Parser Tool Whapa - WhatsApp DataBase Parser Tool Reviewed by Lydecker Black on 6:10 PM Rating: 5
Lynis 2.6.2 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.2 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 10:23 AM Rating: 5
Pymap-Scanner - Python Scanner with GUI Pymap-Scanner - Python Scanner with GUI Reviewed by Lydecker Black on 6:12 PM Rating: 5
ReelPhish - A Real-Time Two-Factor Phishing Tool ReelPhish - A Real-Time Two-Factor Phishing Tool Reviewed by Lydecker Black on 9:38 AM Rating: 5
DNSspider - Very Fast, Async Mulithreaded Subdomain Scanner DNSspider - Very Fast, Async Mulithreaded Subdomain Scanner Reviewed by Lydecker Black on 6:12 PM Rating: 5
Hate_Crack - Automated Hash Cracking Techniques with HashCat Hate_Crack - Automated Hash Cracking Techniques with HashCat Reviewed by Lydecker Black on 9:53 AM Rating: 5
TopHat - Fully undetected backdoor with RSA Encrypted shell TopHat - Fully undetected backdoor with RSA Encrypted shell Reviewed by Lydecker Black on 6:13 PM Rating: 5
ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) Reviewed by Lydecker Black on 10:12 AM Rating: 5
VENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener VENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener Reviewed by Lydecker Black on 6:09 PM Rating: 5
LuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic LuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic Reviewed by Lydecker Black on 10:17 AM Rating: 5
roxysploit - Penetration Testing Suite roxysploit - Penetration Testing Suite Reviewed by Lydecker Black on 5:23 PM Rating: 5
Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections Reviewed by Lydecker Black on 10:10 AM Rating: 5
BLEAH - A BLE Scanner For "Smart" Devices Hacking BLEAH - A BLE Scanner For "Smart" Devices Hacking Reviewed by Lydecker Black on 5:41 PM Rating: 5
GasMask - Information Gathering Tool (OSINT) GasMask - Information Gathering Tool (OSINT) Reviewed by Lydecker Black on 9:54 AM Rating: 5
Kali Linux 2018.1 Release - The Best Penetration Testing Distribution Kali Linux 2018.1 Release - The Best Penetration Testing Distribution Reviewed by Lydecker Black on 2:58 PM Rating: 5
Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy Reviewed by Lydecker Black on 10:00 AM Rating: 5
LaZagneForensic - Decrypt Windows Credentials From Another Host LaZagneForensic - Decrypt Windows Credentials From Another Host Reviewed by Lydecker Black on 6:09 PM Rating: 5
AutoSploit - Automated Mass Exploiter AutoSploit - Automated Mass Exploiter Reviewed by Lydecker Black on 10:00 AM Rating: 5
CFC - Linux Centralized Firewall Control CFC - Linux Centralized Firewall Control Reviewed by Lydecker Black on 5:39 PM Rating: 5
Stacer - Linux System Optimizer and Monitoring Stacer - Linux System Optimizer and Monitoring Reviewed by Lydecker Black on 9:38 AM Rating: 5
DVWA - Damn Vulnerable Web Application DVWA - Damn Vulnerable Web Application Reviewed by Lydecker Black on 6:29 PM Rating: 5
IDAsec - IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform IDAsec - IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform Reviewed by Lydecker Black on 10:30 AM Rating: 5
LSB-Steganography - Python program to steganography files into images using the Least Significant Bit LSB-Steganography - Python program to steganography files into images using the Least Significant Bit Reviewed by Lydecker Black on 6:07 PM Rating: 5
ICMPExfil - Exfiltrate data with ICMP ICMPExfil - Exfiltrate data with ICMP Reviewed by Lydecker Black on 10:00 AM Rating: 5
Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of cryptocurrency mining domains (cryptojacking) Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of cryptocurrency mining domains (cryptojacking) Reviewed by Lydecker Black on 6:15 PM Rating: 5
Evilgrade - Modular Framework To Take Advantage Of Poor Upgrade Implementations By Injecting Fake Updates Evilgrade - Modular Framework To Take Advantage Of Poor Upgrade Implementations By Injecting Fake Updates Reviewed by Lydecker Black on 1:07 PM Rating: 5
RDPY - Remote Desktop Protocol in Twisted Python RDPY - Remote Desktop Protocol in Twisted Python Reviewed by Lydecker Black on 5:52 PM Rating: 5
PiDense - Monitor Illegal Wireless Network Activities (Fake Access Points) PiDense - Monitor Illegal Wireless Network Activities (Fake Access Points) Reviewed by Lydecker Black on 9:47 AM Rating: 5