Prithvi - A Report Generation Tool For Security Assessment Prithvi - A Report Generation Tool For Security Assessment Reviewed by Lydecker Black on 6:21 PM Rating: 5
Ninja Shell - Port Knocking Technique With AES256-GCM Ninja Shell - Port Knocking Technique With AES256-GCM Reviewed by Lydecker Black on 10:17 AM Rating: 5
Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Protobuf-Inspector - Tool To Reverse-Engineer Protocol Buffers With Unknown Definition Reviewed by Lydecker Black on 6:04 PM Rating: 5
WAScan - Web Application Scanner WAScan - Web Application Scanner Reviewed by Lydecker Black on 10:12 AM Rating: 5
Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Shellen - Interactive Shellcoding Environment, In Which You Can Easily Craft Your Shellcodes Reviewed by Lydecker Black on 6:02 PM Rating: 5
PoT - Phishing On Twitter PoT - Phishing On Twitter Reviewed by Lydecker Black on 10:16 AM Rating: 5
icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network icebreaker - Gets Plaintext Active Directory Credentials If You'Re On The Internal Network Reviewed by Lydecker Black on 6:24 PM Rating: 5
contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities Reviewed by Lydecker Black on 10:12 AM Rating: 5
meg+ - Automated Reconnaissance Wrapper meg+ - Automated Reconnaissance Wrapper Reviewed by Lydecker Black on 6:12 PM Rating: 5
meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) meg - Fetch Many Paths For Many Hosts (Without Killing The Hosts) Reviewed by Lydecker Black on 10:06 AM Rating: 5
Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Revoke-Obfuscation - PowerShell Obfuscation Detection Framework Reviewed by Lydecker Black on 5:29 PM Rating: 5
Invoke-Obfuscation - PowerShell Obfuscator Invoke-Obfuscation - PowerShell Obfuscator Reviewed by Lydecker Black on 10:00 AM Rating: 5
Mitm6 - Pwning IPv4 Via IPv6 Mitm6 - Pwning IPv4 Via IPv6 Reviewed by Lydecker Black on 5:04 PM Rating: 5
OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies OWASP DependencyCheck - A Software Composition Analysis Utility That Detects Publicly Disclosed Vulnerabilities In Application Dependencies Reviewed by Lydecker Black on 10:12 AM Rating: 5
BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website BlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz For OWASP Vulnerabilities On A Target Website Reviewed by Lydecker Black on 5:33 PM Rating: 5
Findsploit - Find Exploits In Local And Online Databases Instantly Findsploit - Find Exploits In Local And Online Databases Instantly Reviewed by Lydecker Black on 10:30 AM Rating: 5
MADLIRA - Malware detection using learning and information retrieval for Android MADLIRA - Malware detection using learning and information retrieval for Android Reviewed by Lydecker Black on 5:53 PM Rating: 5
DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities DVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally Contains Vulnerabilities Reviewed by Lydecker Black on 9:41 AM Rating: 5
Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Dr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking Reviewed by Lydecker Black on 6:39 PM Rating: 5
Gobuster - Directory/File & DNS Busting Tool Written In Go Gobuster - Directory/File & DNS Busting Tool Written In Go Reviewed by Lydecker Black on 9:34 AM Rating: 5
Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Tunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP Reviewed by Lydecker Black on 6:12 PM Rating: 5
PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram PcapXray - A Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram Reviewed by Lydecker Black on 10:22 AM Rating: 5
sshLooter - Script To Steal Passwords From SSH sshLooter - Script To Steal Passwords From SSH Reviewed by Lydecker Black on 5:58 PM Rating: 5
ezsploit - Linux Bash Script Automation For Metasploit ezsploit - Linux Bash Script Automation For Metasploit Reviewed by Lydecker Black on 10:30 AM Rating: 5
Altdns - Generates permutations, alterations and mutations of subdomains and then resolves them Altdns - Generates permutations, alterations and mutations of subdomains and then resolves them Reviewed by Lydecker Black on 6:14 PM Rating: 5
IntruderPayloads - A Collection Of Burpsuite Intruder Payloads, Fuzz Lists And File Uploads IntruderPayloads - A Collection Of Burpsuite Intruder Payloads, Fuzz Lists And File Uploads Reviewed by Lydecker Black on 10:23 AM Rating: 5
APTSimulator - A toolset to make a system look as if it was the victim of an APT attack APTSimulator - A toolset to make a system look as if it was the victim of an APT attack Reviewed by Lydecker Black on 5:49 PM Rating: 5
Parat - Python Based Remote Administration Tool (RAT) Parat - Python Based Remote Administration Tool (RAT) Reviewed by Lydecker Black on 9:48 AM Rating: 5
Whapa - WhatsApp DataBase Parser Tool Whapa - WhatsApp DataBase Parser Tool Reviewed by Lydecker Black on 6:10 PM Rating: 5
Lynis 2.6.2 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.2 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 10:23 AM Rating: 5
Pymap-Scanner - Python Scanner with GUI Pymap-Scanner - Python Scanner with GUI Reviewed by Lydecker Black on 6:12 PM Rating: 5
ReelPhish - A Real-Time Two-Factor Phishing Tool ReelPhish - A Real-Time Two-Factor Phishing Tool Reviewed by Lydecker Black on 9:38 AM Rating: 5
DNSspider - Very Fast, Async Mulithreaded Subdomain Scanner DNSspider - Very Fast, Async Mulithreaded Subdomain Scanner Reviewed by Lydecker Black on 6:12 PM Rating: 5
Hate_Crack - Automated Hash Cracking Techniques with HashCat Hate_Crack - Automated Hash Cracking Techniques with HashCat Reviewed by Lydecker Black on 9:53 AM Rating: 5
TopHat - Fully undetected backdoor with RSA Encrypted shell TopHat - Fully undetected backdoor with RSA Encrypted shell Reviewed by Lydecker Black on 6:13 PM Rating: 5
ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) ID-entify - Search for information related to a domain (Emails, Domains, Information on WEB technology, Type of Firewall, NS and MX records) Reviewed by Lydecker Black on 10:12 AM Rating: 5
VENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener VENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener Reviewed by Lydecker Black on 6:09 PM Rating: 5
LuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic LuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic Reviewed by Lydecker Black on 10:17 AM Rating: 5
roxysploit - Penetration Testing Suite roxysploit - Penetration Testing Suite Reviewed by Lydecker Black on 5:23 PM Rating: 5
Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections Reviewed by Lydecker Black on 10:10 AM Rating: 5
BLEAH - A BLE Scanner For "Smart" Devices Hacking BLEAH - A BLE Scanner For "Smart" Devices Hacking Reviewed by Lydecker Black on 5:41 PM Rating: 5
GasMask - Information Gathering Tool (OSINT) GasMask - Information Gathering Tool (OSINT) Reviewed by Lydecker Black on 9:54 AM Rating: 5
Kali Linux 2018.1 Release - The Best Penetration Testing Distribution Kali Linux 2018.1 Release - The Best Penetration Testing Distribution Reviewed by Lydecker Black on 2:58 PM Rating: 5
Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy Grouper - A PowerShell script for helping to find vulnerable settings in AD Group Policy Reviewed by Lydecker Black on 10:00 AM Rating: 5
LaZagneForensic - Decrypt Windows Credentials From Another Host LaZagneForensic - Decrypt Windows Credentials From Another Host Reviewed by Lydecker Black on 6:09 PM Rating: 5
AutoSploit - Automated Mass Exploiter AutoSploit - Automated Mass Exploiter Reviewed by Lydecker Black on 10:00 AM Rating: 5
CFC - Linux Centralized Firewall Control CFC - Linux Centralized Firewall Control Reviewed by Lydecker Black on 5:39 PM Rating: 5
Stacer - Linux System Optimizer and Monitoring Stacer - Linux System Optimizer and Monitoring Reviewed by Lydecker Black on 9:38 AM Rating: 5
DVWA - Damn Vulnerable Web Application DVWA - Damn Vulnerable Web Application Reviewed by Lydecker Black on 6:29 PM Rating: 5