Leaked? 2.0 - A Checking Tool For Hash Codes, Passwords And Emails Leaked Leaked? 2.0 - A Checking Tool For Hash Codes, Passwords And Emails Leaked Reviewed by Lydecker Black on 6:03 PM Rating: 5
4Nonimizer - A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers 4Nonimizer - A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers Reviewed by Lydecker Black on 10:03 AM Rating: 5
CyberChef - The Cyber Swiss Army Knife [A Web App For Encryption, Encoding, Compression And Data Analysis] CyberChef - The Cyber Swiss Army Knife [A Web App For Encryption, Encoding, Compression And Data Analysis] Reviewed by Lydecker Black on 6:07 PM Rating: 5
pwned - A command-line tool for querying the 'Have I been pwned?' service pwned - A command-line tool for querying the 'Have I been pwned?' service Reviewed by Lydecker Black on 9:29 AM Rating: 5
Droidefense - Advance Android Malware Analysis Framework Droidefense - Advance Android Malware Analysis Framework Reviewed by Lydecker Black on 6:12 PM Rating: 5
Phishing-Frenzy - Ruby On Rails Phishing Framework Phishing-Frenzy - Ruby On Rails Phishing Framework Reviewed by Lydecker Black on 9:54 AM Rating: 5
Wildpwn - Unix Wildcard Attack Tool Wildpwn -  Unix Wildcard Attack Tool Reviewed by Lydecker Black on 6:07 PM Rating: 5
HashPump - A Tool To Exploit The Hash Length Extension Attack In Various Hashing Algorithms HashPump - A Tool To Exploit The Hash Length Extension Attack In Various Hashing Algorithms Reviewed by Lydecker Black on 9:53 AM Rating: 5
SVScanner - Scanner Vulnerability And Massive Exploit SVScanner - Scanner Vulnerability And Massive Exploit Reviewed by Lydecker Black on 6:59 PM Rating: 5
Telegram Vulners Bot - Exploit Search Engine And Security Feed In Your Pocket Telegram Vulners Bot - Exploit Search Engine And Security Feed In Your Pocket Reviewed by Lydecker Black on 9:14 AM Rating: 5
VBScan 0.1.8 - Black Box vBulletin Vulnerability Scanner VBScan 0.1.8 - Black Box vBulletin Vulnerability Scanner Reviewed by Lydecker Black on 5:47 PM Rating: 5
Hershell - Simple TCP reverse shell written in Go Hershell - Simple TCP reverse shell written in Go Reviewed by Lydecker Black on 9:23 AM Rating: 5
Parrot Security 4.2.2 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Parrot Security 4.2.2 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Reviewed by Lydecker Black on 5:35 PM Rating: 5
Ettercap - A Comprehensive Suite For Man In The Middle Attacks Ettercap - A Comprehensive Suite For Man In The Middle Attacks Reviewed by Lydecker Black on 9:48 AM Rating: 5
MobSF (Mobile Security Framework) v1.0 - Mobile (Android/iOS) Automated Pen-Testing Framework MobSF (Mobile Security Framework) v1.0 - Mobile (Android/iOS) Automated Pen-Testing Framework Reviewed by Lydecker Black on 6:34 PM Rating: 5
Firework - Leveraging Microsoft Workspaces in a Penetration Test Firework - Leveraging Microsoft Workspaces in a Penetration Test Reviewed by Lydecker Black on 9:23 AM Rating: 5
PacketWhisper - Stealthily Exfiltrate Data And Defeat Attribution Using DNS Queries And Text-Based Steganography PacketWhisper - Stealthily Exfiltrate Data And Defeat Attribution Using DNS Queries And Text-Based Steganography Reviewed by Lydecker Black on 6:13 PM Rating: 5
Web-Traffic-Generator - A Quick And Dirty HTTP/S "Organic" Traffic Generator Web-Traffic-Generator - A Quick And Dirty HTTP/S "Organic" Traffic Generator Reviewed by Lydecker Black on 9:36 AM Rating: 5
Scrounger - Mobile Application Testing Toolkit Scrounger - Mobile Application Testing Toolkit Reviewed by Lydecker Black on 6:12 PM Rating: 5
Java-Stager - A PoC Java Stager Which Can Download, Compile, And Execute A Java File In Memory Java-Stager - A PoC Java Stager Which Can Download, Compile, And Execute A Java File In Memory Reviewed by Lydecker Black on 10:28 AM Rating: 5
htrace.sh - Simple Shell Script To Debugging HTTP/HTTPS Traffic Tracing, Response Headers And Mixed-Content htrace.sh - Simple Shell Script To Debugging HTTP/HTTPS Traffic Tracing, Response Headers And Mixed-Content Reviewed by Lydecker Black on 6:09 PM Rating: 5
PEDA - Python Exploit Development Assistance For GDB PEDA - Python Exploit Development Assistance For GDB Reviewed by Lydecker Black on 10:20 AM Rating: 5
Tor Browser 8.0 - Everything you Need to Safely Browse the Internet Tor Browser 8.0 - Everything you Need to Safely Browse the Internet Reviewed by Lydecker Black on 6:07 PM Rating: 5
SQLMap v1.2.9 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.2.9 - Automatic SQL Injection And Database Takeover Tool Reviewed by Lydecker Black on 9:57 AM Rating: 5
Drltrace - A Library Calls Tracer For Windows And Linux Applications Drltrace - A Library Calls Tracer For Windows And Linux Applications Reviewed by Lydecker Black on 5:47 PM Rating: 5
ExchangeRelayX - An NTLM Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An OWA For Hackers) ExchangeRelayX - An NTLM Relay Tool To The EWS Endpoint For On-Premise Exchange Servers (Provides An OWA For Hackers) Reviewed by Lydecker Black on 9:53 AM Rating: 5
KisMac - Open Source Wireless Stumbling And Security Tool For Mac OS X KisMac - Open Source Wireless Stumbling And Security Tool For Mac OS X Reviewed by Lydecker Black on 5:27 PM Rating: 5
Vulners Scanner - Vulnerability Scanner Based On Vulners.Com Audit API Vulners Scanner - Vulnerability Scanner Based On Vulners.Com Audit API Reviewed by Lydecker Black on 10:07 AM Rating: 5
R0Ak (The Ring 0 Army Knife) - A Command Line Utility To Read/Write/Execute Ring Zero On For Windows 10 Systems R0Ak (The Ring 0 Army Knife) - A Command Line Utility To Read/Write/Execute Ring Zero On For Windows 10 Systems Reviewed by Lydecker Black on 6:05 PM Rating: 5
Datasploit - An OSINT Framework To Perform Various Recon Techniques On Companies, People, Phone Number, Bitcoin Addresses, Etc., Aggregate All The Raw Data, And Give Data In Multiple Formats Datasploit - An OSINT Framework To Perform Various Recon Techniques On Companies, People, Phone Number, Bitcoin Addresses, Etc., Aggregate All The Raw Data, And Give Data In Multiple Formats Reviewed by Lydecker Black on 10:07 AM Rating: 5
Leaked? - A Checking Tool For Hash Codes And Passwords Leaked Leaked? - A Checking Tool For Hash Codes And Passwords Leaked Reviewed by Lydecker Black on 6:20 PM Rating: 5
SMBetray - SMB MiTM Tool With A Focus On Attacking Clients Through File Content Swapping, Lnk Swapping, As Well As Compromising Any Data Passed Over The Wire In Cleartext SMBetray - SMB MiTM Tool With A Focus On Attacking Clients Through File Content Swapping, Lnk Swapping, As Well As Compromising Any Data Passed Over The Wire In Cleartext Reviewed by Lydecker Black on 12:53 PM Rating: 5
Spykeyboard - Keylogger Which Sends Us The Data To Our Gmail Spykeyboard - Keylogger Which Sends Us The Data To Our Gmail Reviewed by Lydecker Black on 6:33 PM Rating: 5
GhostTunnel - A Covert Backdoor Transmission Method That Can Be Used In An Isolated Environment GhostTunnel - A Covert Backdoor Transmission Method That Can Be Used In An Isolated Environment Reviewed by Lydecker Black on 10:21 AM Rating: 5
Getsploit v0.2.2 - Command Line Utility For Searching And Downloading Exploits Getsploit v0.2.2 - Command Line Utility For Searching And Downloading Exploits Reviewed by Lydecker Black on 6:15 PM Rating: 5
Zabbix Threat Control - Zabbix Vulnerability Assessment Plugin Zabbix Threat Control - Zabbix Vulnerability Assessment Plugin Reviewed by Lydecker Black on 10:32 AM Rating: 5