Firecall - Automate SSH Communication With Firewalls, Switches, Etc. Firecall - Automate SSH Communication With Firewalls, Switches, Etc. Reviewed by Lydecker Black on 5:50 PM Rating: 5
Aker - SSH Bastion/Jump Host/Jumpserver Aker - SSH Bastion/Jump Host/Jumpserver Reviewed by Lydecker Black on 10:07 AM Rating: 5
Log Killer - Clear All Your Logs In (Linux/Windows) Servers Log Killer - Clear All Your Logs In (Linux/Windows) Servers Reviewed by Lydecker Black on 5:52 PM Rating: 5
Ikeext-Privesc - Windows IKEEXT DLL Hijacking Exploit Tool Ikeext-Privesc - Windows IKEEXT DLL Hijacking Exploit Tool Reviewed by Lydecker Black on 9:38 AM Rating: 5
The Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration Testers An Easy-To-Use Platform To Deploy Access Points The Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration Testers An Easy-To-Use Platform To Deploy Access Points Reviewed by Lydecker Black on 6:12 PM Rating: 5
SubFinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites SubFinder - A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites Reviewed by Lydecker Black on 9:30 AM Rating: 5
Idisagree - Control Remote Computers Using Discord Bot Idisagree - Control Remote Computers Using Discord Bot Reviewed by Lydecker Black on 8:50 PM Rating: 5
Lynis 2.6.5 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.5 - Security Auditing Tool for Unix/Linux Systems Reviewed by Lydecker Black on 9:33 AM Rating: 5
Pspy - Monitor Linux Processes Without Root Permissions Pspy - Monitor Linux Processes Without Root Permissions Reviewed by Lydecker Black on 6:12 PM Rating: 5
Stego-Toolkit - Collection Of Steganography Tools (Helps With CTF Challenges) Stego-Toolkit - Collection Of Steganography Tools (Helps With CTF Challenges) Reviewed by Lydecker Black on 10:10 AM Rating: 5
Optiva Framework - Web Application Scanner Optiva Framework - Web Application Scanner Reviewed by Lydecker Black on 6:27 PM Rating: 5
Amass - In-depth Subdomain Enumeration Amass - In-depth Subdomain Enumeration Reviewed by Lydecker Black on 10:09 AM Rating: 5
MalwLess - Test Blue Team Detections Without Running Any Attack MalwLess - Test Blue Team Detections Without Running Any Attack Reviewed by Lydecker Black on 6:33 PM Rating: 5
Mquery - YARA Malware Query Accelerator (Web Frontend) Mquery - YARA Malware Query Accelerator (Web Frontend) Reviewed by Lydecker Black on 10:17 AM Rating: 5
BeRoot For Linux - Privilege Escalation Project BeRoot For Linux - Privilege Escalation Project Reviewed by Lydecker Black on 6:12 PM Rating: 5
BeRoot For Windows - Privilege Escalation Project BeRoot For Windows - Privilege Escalation Project Reviewed by Lydecker Black on 10:12 AM Rating: 5
CHIPSEC - Platform Security Assessment Framework CHIPSEC - Platform Security Assessment Framework Reviewed by Lydecker Black on 6:33 PM Rating: 5
Fuxi Scanner - Network Security Vulnerability Scanner Fuxi Scanner - Network Security Vulnerability Scanner Reviewed by Lydecker Black on 10:12 AM Rating: 5
LNK-Kisser - PowerShell Link Payload Generator LNK-Kisser - PowerShell Link Payload Generator Reviewed by Lydecker Black on 6:23 PM Rating: 5
LeakScraper - An Efficient Set Of Tools To Process And Visualize Huge Text Files Containing Credentials LeakScraper - An Efficient Set Of Tools To Process And Visualize Huge Text Files Containing Credentials Reviewed by Lydecker Black on 9:43 AM Rating: 5
Crypto Identifier - Tool To Uncipher Data Using Multiple Algorithms And Block Chaining Modes Crypto Identifier - Tool To Uncipher Data Using Multiple Algorithms And Block Chaining Modes Reviewed by Lydecker Black on 6:39 PM Rating: 5
Operative Framework HD - The Digital Investigation Framework, You Can Interact With Websites, Email Address, Company, People, Ip Address, And More Operative Framework HD - The Digital Investigation Framework, You Can Interact With Websites, Email Address, Company, People, Ip Address, And More Reviewed by Lydecker Black on 10:06 AM Rating: 5
CMSeeK - CMS Detection And Exploitation Suite CMSeeK - CMS Detection And Exploitation Suite Reviewed by Lydecker Black on 5:35 PM Rating: 5
Impacket - Collection Of Python Classes For Working With Network Protocols Impacket - Collection Of Python Classes For Working With Network Protocols Reviewed by Lydecker Black on 9:30 AM Rating: 5
SubOver v1.1.1 - A Powerful Subdomain Takeover Tool SubOver v1.1.1 - A Powerful Subdomain Takeover Tool Reviewed by Lydecker Black on 6:23 PM Rating: 5
VOOKI - Web Application Vulnerability Scanner VOOKI - Web Application Vulnerability Scanner Reviewed by Lydecker Black on 10:09 AM Rating: 5
PE Linux - Linux Privilege Escalation Tool PE Linux - Linux Privilege Escalation Tool Reviewed by Lydecker Black on 6:12 PM Rating: 5
Probequest - Toolkit For Playing With Wi-Fi Probe Requests Probequest - Toolkit For Playing With Wi-Fi Probe Requests Reviewed by Lydecker Black on 10:54 AM Rating: 5
Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate Reviewed by Lydecker Black on 5:54 PM Rating: 5
PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks Reviewed by Lydecker Black on 10:00 AM Rating: 5
wpCrack - Wordpress Hash Cracker wpCrack - Wordpress Hash Cracker Reviewed by Lydecker Black on 6:23 PM Rating: 5
RiskySPN - Detect And Abuse Risky SPNs RiskySPN - Detect And Abuse Risky SPNs Reviewed by Lydecker Black on 9:55 AM Rating: 5
One-Lin3r v1.1 - Gives You One-Liners That Aids In Penetration Testing Operations One-Lin3r v1.1 - Gives You One-Liners That Aids In Penetration Testing Operations Reviewed by Lydecker Black on 5:56 PM Rating: 5
M4Ngl3M3 - Common Password Pattern Generator Using Strings List M4Ngl3M3 - Common Password Pattern Generator Using Strings List Reviewed by Lydecker Black on 9:40 AM Rating: 5
Takeover - SubDomain TakeOver Vulnerability Scanner Takeover - SubDomain TakeOver Vulnerability Scanner Reviewed by Lydecker Black on 6:43 PM Rating: 5
Metateta - Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit Metateta - Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit Reviewed by Lydecker Black on 10:30 AM Rating: 5
Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing Airba.sh - A POSIX-compliant, Fully Automated WPA PSK Handshake Capture Script Aimed At Penetration Testing Reviewed by Lydecker Black on 6:04 PM Rating: 5
Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style Rastrea2R - Collecting & Hunting For IOCs With Gusto And Style Reviewed by Lydecker Black on 10:10 AM Rating: 5
Nipe - A Script To Make TOR Network Your Default Gateway Nipe - A Script To Make TOR Network Your Default Gateway Reviewed by Lydecker Black on 6:20 PM Rating: 5
Omnibus - Open Source Intelligence Collection, Research, And Artifact Management Omnibus - Open Source Intelligence Collection, Research, And Artifact Management Reviewed by Lydecker Black on 10:10 AM Rating: 5
Gpredict - Satellite Tracking Application Gpredict - Satellite Tracking Application Reviewed by Lydecker Black on 6:53 PM Rating: 5
BadMod v2.0 - Detect Website CMS, Website Scanner & Auto Exploiter BadMod v2.0 - Detect Website CMS, Website Scanner & Auto Exploiter Reviewed by Lydecker Black on 10:12 AM Rating: 5
Hash-Buster v2.0 - Tool Which Uses Several APIs To Perform Hash Lookups Hash-Buster v2.0 - Tool Which Uses Several APIs To Perform Hash Lookups Reviewed by Lydecker Black on 6:30 PM Rating: 5
Msploitego - Pentesting Suite For Maltego Based On Data In A Metasploit Database Msploitego - Pentesting Suite For Maltego Based On Data In A Metasploit Database Reviewed by Lydecker Black on 10:12 AM Rating: 5
Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks Namechk - Osint Tool Based On Namechk.Com For Checking Usernames On More Than 100 Websites, Forums And Social Networks Reviewed by Lydecker Black on 6:49 PM Rating: 5
SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Points SleuthQL - Burp History Parsing Tool To Discover Potential SQL Injection Points Reviewed by Lydecker Black on 10:09 AM Rating: 5
AutoSQLi - An Automatic SQL Injection Tool Which Takes Advantage Of Googler, Ddgr, WhatWaf And SQLMap AutoSQLi - An Automatic SQL Injection Tool Which Takes Advantage Of Googler, Ddgr, WhatWaf And SQLMap Reviewed by Lydecker Black on 6:10 PM Rating: 5
Wifite 2.1.0 - Automated Wireless Attack Tool Wifite 2.1.0 - Automated Wireless Attack Tool Reviewed by Lydecker Black on 10:10 AM Rating: 5
PhpSploit - Stealth Post-Exploitation Framework PhpSploit - Stealth Post-Exploitation Framework Reviewed by Lydecker Black on 6:17 PM Rating: 5
DumpsterDiver - Tool To Search Secrets In Various Filetypes DumpsterDiver - Tool To Search Secrets In Various Filetypes Reviewed by Lydecker Black on 10:07 AM Rating: 5
DejaVU - Open Source Deception Framework DejaVU - Open Source Deception Framework Reviewed by Lydecker Black on 6:33 PM Rating: 5
DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital Forensics, Malware Analysis, And Network Defense Reviewed by Lydecker Black on 10:11 AM Rating: 5
CSS Keylogger - Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS CSS Keylogger - Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS Reviewed by Lydecker Black on 6:23 PM Rating: 5