ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages ReverseAPK - Quickly Analyze And Reverse Engineer Android Packages Reviewed by Lydecker Black on 6:39 PM Rating: 5
Sharesniffer - Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems Sharesniffer - Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems Reviewed by Lydecker Black on 9:44 AM Rating: 5
Prowler - Distributed Network Vulnerability Scanner Prowler - Distributed Network Vulnerability Scanner Reviewed by Lydecker Black on 6:11 PM Rating: 5
Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups Attackintel - Tool To Query The MITRE ATT&CK API For Tactics, Techniques, Mitigations, & Detection Methods For Specific Threat Groups Reviewed by Lydecker Black on 10:25 AM Rating: 5
Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch Diskover - File System Crawler, Storage Search Engine And Analytics Powered By Elasticsearch Reviewed by Lydecker Black on 6:38 PM Rating: 5
Lama - Tool To Obtain A Custom Password Dictionary To A Particular Target Lama - Tool To Obtain A Custom Password Dictionary To A Particular Target Reviewed by Lydecker Black on 10:21 AM Rating: 5
pwnedOrNot - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API pwnedOrNot - Tool To Find Passwords For Compromised Email Accounts Using HaveIBeenPwned API Reviewed by Lydecker Black on 6:19 PM Rating: 5
GyoiThon - A Growing Penetration Test Tool Using Machine Learning GyoiThon - A Growing Penetration Test Tool Using Machine Learning Reviewed by Lydecker Black on 10:00 AM Rating: 5
Terminator - Metasploit Payload Generator Terminator - Metasploit Payload Generator Reviewed by Lydecker Black on 6:27 PM Rating: 5
iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python iOSRestrictionBruteForce v2.1.0 - Crack iOS Restriction Passcodes With Python Reviewed by Lydecker Black on 10:30 AM Rating: 5
Burpa - A Burp Suite Automation Tool Burpa - A Burp Suite Automation Tool Reviewed by Lydecker Black on 7:09 PM Rating: 5
HTTPoxyScan - HTTPoxy Exploit Scanner HTTPoxyScan - HTTPoxy Exploit Scanner Reviewed by Lydecker Black on 10:30 AM Rating: 5
Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API Salt-Scanner - Linux Vulnerability Scanner Based On Salt Open And Vulners Audit API Reviewed by Lydecker Black on 6:57 PM Rating: 5
Sn1per v4.4 - Automated Pentest Recon Scanner Sn1per v4.4 - Automated Pentest Recon Scanner Reviewed by Lydecker Black on 10:12 AM Rating: 5
Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Archerysec - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Reviewed by Lydecker Black on 6:22 PM Rating: 5
Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing Reviewed by Lydecker Black on 10:30 AM Rating: 5
Galileo - Web Application Audit Framework Galileo - Web Application Audit Framework Reviewed by Lydecker Black on 6:10 PM Rating: 5
Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers Dumpzilla - Extract All Forensic Interesting Information Of Firefox, Iceweasel And Seamonkey Browsers Reviewed by Lydecker Black on 10:12 AM Rating: 5
Acunetix v12 - More Comprehensive, More Accurate and now 2X Faster Acunetix v12 - More Comprehensive, More Accurate and now 2X Faster Reviewed by Lydecker Black on 6:00 PM Rating: 5
Parrot Security 4.0 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Parrot Security 4.0 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Reviewed by Lydecker Black on 10:07 AM Rating: 5
Airpydump - Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth) Airpydump - Analyze Wireless Packets On The Fly. Currently Supporting Three Working Modes (Reader, Live, Stealth) Reviewed by Lydecker Black on 9:30 AM Rating: 5
Dnsmorph - Domain Name Permutation Engine Written In Go Dnsmorph - Domain Name Permutation Engine Written In Go Reviewed by Lydecker Black on 6:45 PM Rating: 5
AggressorScripts - Collection Of Aggressor Scripts For Cobalt Strike 3.0+ Pulled From Multiple Sources AggressorScripts - Collection Of Aggressor Scripts For Cobalt Strike 3.0+ Pulled From Multiple Sources Reviewed by Lydecker Black on 6:38 PM Rating: 5
Heap Viewer - An IDA Pro Plugin To Examine The Glibc Heap, Focused On Exploit Development Heap Viewer - An IDA Pro Plugin To Examine The Glibc Heap, Focused On Exploit Development Reviewed by Lydecker Black on 10:01 AM Rating: 5
FireShodanMap - A Realtime Map That Integrates Firebase, Google Maps And Shodan FireShodanMap - A Realtime Map That Integrates Firebase, Google Maps And Shodan Reviewed by Lydecker Black on 6:52 PM Rating: 5
GitBackdorizer - Is A Proof Of Concept That Uses The Lack Of User Attention To Steal Git Access Credentials GitBackdorizer - Is A Proof Of Concept That Uses The Lack Of User Attention To Steal Git Access Credentials Reviewed by Lydecker Black on 9:36 AM Rating: 5
Whoisleak - This Tool Queries The Emails That Registered The Domain And Verifies If They Were Leaked In Some Data Leak Whoisleak - This Tool Queries The Emails That Registered The Domain And Verifies If They Were Leaked In Some Data Leak Reviewed by Lydecker Black on 6:41 PM Rating: 5
Linux Screenshot XWindows - Volatility Plugin To Extract X Screenshots From A Memory Dump Linux Screenshot XWindows - Volatility Plugin To Extract X Screenshots From A Memory Dump Reviewed by Lydecker Black on 9:30 AM Rating: 5
OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS Reviewed by Lydecker Black on 6:30 PM Rating: 5
DNSBin - Tool To Test Data Exfiltration Through DNS (RCE and XXE) DNSBin - Tool To Test Data Exfiltration Through DNS (RCE and XXE) Reviewed by Lydecker Black on 10:37 AM Rating: 5
Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems Honeybits - A Simple Tool Designed To Enhance The Effectiveness Of Your Traps By Spreading Breadcrumbs & Honeytokens Across Your Systems Reviewed by Lydecker Black on 6:05 PM Rating: 5
OWASP Juice Shop - An Intentionally Insecure Webapp For Security Trainings Written Entirely In Javascript OWASP Juice Shop - An Intentionally Insecure Webapp For Security Trainings Written Entirely In Javascript Reviewed by Lydecker Black on 10:00 AM Rating: 5
CenoCipher - Easy-To-Use, End-To-End Crypto-Communication Tool CenoCipher - Easy-To-Use, End-To-End Crypto-Communication Tool Reviewed by Lydecker Black on 6:12 PM Rating: 5
Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine Sandmap - A Tool Supporting Network And System Reconnaissance Using The Massive Nmap Engine Reviewed by Lydecker Black on 9:46 AM Rating: 5
Netpwn - Tool Made To Automate Tasks Of Pentesting Netpwn - Tool Made To Automate Tasks Of Pentesting Reviewed by Lydecker Black on 6:50 PM Rating: 5
Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name Reviewed by Lydecker Black on 10:36 AM Rating: 5
TheDoc - Simple But Very Useful SQLMAP Automator With Built In Admin Finder, Hash Cracker (Using Hashcat) And More! TheDoc - Simple But Very Useful SQLMAP Automator With Built In Admin Finder, Hash Cracker (Using Hashcat) And More! Reviewed by Lydecker Black on 5:58 PM Rating: 5
Whonow - A "Malicious" DNS Server For Executing DNS Rebinding Attacks On The Fly (Public Instance Running On Rebind.Network:53) Whonow - A "Malicious" DNS Server For Executing DNS Rebinding Attacks On The Fly (Public Instance Running On Rebind.Network:53) Reviewed by Lydecker Black on 9:43 AM Rating: 5
Portspoof - Enhance Your Systems Security Through A Set Of New Camouflage Techniques Portspoof - Enhance Your Systems Security Through A Set Of New Camouflage Techniques Reviewed by Lydecker Black on 5:46 PM Rating: 5
ShellPop - Pop Shells Like A Master ShellPop - Pop Shells Like A Master Reviewed by Lydecker Black on 9:03 AM Rating: 5
FreeRADIUS Server Configuration Tool FreeRADIUS Server Configuration Tool Reviewed by Lydecker Black on 6:49 PM Rating: 5
PAVELOW - Exploit Toolbox PAVELOW - Exploit Toolbox Reviewed by Lydecker Black on 9:51 AM Rating: 5
GPON - Python Exploit For Remote Code Executuion On GPON Home Routers (CVE-2018-10562) GPON - Python Exploit For Remote Code Executuion On GPON Home Routers (CVE-2018-10562) Reviewed by Lydecker Black on 6:34 PM Rating: 5
Vayne-RaT - An Advanced C# .NET RAT Vayne-RaT - An Advanced C# .NET RAT Reviewed by Lydecker Black on 9:54 AM Rating: 5
AutoTTP - Automated Tactics Techniques & Procedures AutoTTP - Automated Tactics Techniques & Procedures Reviewed by Lydecker Black on 5:43 PM Rating: 5
Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner Zoom - Automatic & Lightning Fast Wordpress Vulnerability Scanner Reviewed by Lydecker Black on 9:23 AM Rating: 5
Wordpress Exploit Framework v1.9.2 - Framework For Developing And Using Modules Which Aid In The Penetration Testing Of WordPress Powered Websites And Systems Wordpress Exploit Framework v1.9.2 - Framework For Developing And Using Modules Which Aid In The Penetration Testing Of WordPress Powered Websites And Systems Reviewed by Lydecker Black on 6:50 PM Rating: 5
Drupwn - Drupal Enumeration & Exploitation Tool Drupwn - Drupal Enumeration & Exploitation Tool Reviewed by Lydecker Black on 9:30 AM Rating: 5
The Axer - Tool To Automate The Procedure Of Creating Your Payloads With Msfvenom The Axer - Tool To Automate The Procedure Of Creating Your Payloads With Msfvenom Reviewed by Lydecker Black on 6:29 PM Rating: 5
Kurukshetra - A Framework For Teaching Secure Coding By Means Of Interactive Problem Solving Kurukshetra - A Framework For Teaching Secure Coding By Means Of Interactive Problem Solving Reviewed by Lydecker Black on 10:36 AM Rating: 5
Huntpad - The Bug Hunter's Notepad  Huntpad - The Bug Hunter's Notepad Reviewed by Lydecker Black on 6:54 PM Rating: 5
SpookFlare v2.0 - Loader, Dropper Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures SpookFlare v2.0 - Loader, Dropper Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures Reviewed by Lydecker Black on 10:12 AM Rating: 5
XSS Payload List - Cross Site Scripting Vulnerability Payload List XSS Payload List - Cross Site Scripting Vulnerability Payload List Reviewed by Lydecker Black on 6:23 PM Rating: 5
Fi6S - IPv6 Network Scanner Designed To Be Fast Fi6S - IPv6 Network Scanner Designed To Be Fast Reviewed by Lydecker Black on 9:45 AM Rating: 5
hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains Reviewed by Lydecker Black on 6:10 PM Rating: 5