BeEF - The Browser Exploitation Framework Project BeEF - The Browser Exploitation Framework Project Reviewed by Lydecker Black on 9:39 AM Rating: 5
Eraser - Secure Erase Files from Hard Drives on Windows Eraser - Secure Erase Files from Hard Drives on Windows Reviewed by Lydecker Black on 5:27 PM Rating: 5
SecLists - A Collection Of Multiple Types Of Lists Used During Security Assessments, Collected In One Place (Usernames, Passwords, URLs, Sensitive Data Patterns, Fuzzing Payloads, Web Shells, And Many More) SecLists - A Collection Of Multiple Types Of Lists Used During Security Assessments, Collected In One Place (Usernames, Passwords, URLs, Sensitive Data Patterns, Fuzzing Payloads, Web Shells, And Many More) Reviewed by Lydecker Black on 9:37 AM Rating: 5
GameGuardian - Android Game Hack/Alteration Tool GameGuardian - Android Game Hack/Alteration Tool Reviewed by Lydecker Black on 5:43 PM Rating: 5
OSINT-SPY - Search using OSINT (Open Source Intelligence) OSINT-SPY - Search using OSINT (Open Source Intelligence) Reviewed by Lydecker Black on 9:30 AM Rating: 5
Maltego CE - An Interactive Data Mining Tool That Renders Directed Graphs For Link Analysis Maltego CE - An Interactive Data Mining Tool That Renders Directed Graphs For Link Analysis Reviewed by Lydecker Black on 5:49 PM Rating: 5
BoNeSi - The DDoS Botnet Simulator BoNeSi - The DDoS Botnet Simulator Reviewed by Lydecker Black on 9:45 AM Rating: 5
HoneyPy - A Low To Medium Interaction Honeypot HoneyPy - A Low To Medium Interaction Honeypot Reviewed by Lydecker Black on 5:51 PM Rating: 5
Egress-Assess - Tool Used To Test Egress Data Detection Capabilities Egress-Assess - Tool Used To Test Egress Data Detection Capabilities Reviewed by Lydecker Black on 9:48 AM Rating: 5
Fibratus - Tool For Exploration And Tracing Of The Windows Kernel Fibratus - Tool For Exploration And Tracing Of The Windows Kernel Reviewed by Lydecker Black on 5:49 PM Rating: 5
TROMMEL - Sift Through Embedded Device Files To Identify Potential Vulnerable Indicators TROMMEL - Sift Through Embedded Device Files To Identify Potential Vulnerable Indicators Reviewed by Lydecker Black on 9:45 AM Rating: 5
DCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications DCOMrade - Powershell Script For Enumerating Vulnerable DCOM Applications Reviewed by Lydecker Black on 5:41 PM Rating: 5
Ponce - IDA Plugin For Symbolic Execution Just One-Click Away! Ponce - IDA Plugin For Symbolic Execution Just One-Click Away! Reviewed by Lydecker Black on 9:32 AM Rating: 5
Kaboom - Automatic Pentest Kaboom - Automatic Pentest Reviewed by Lydecker Black on 5:27 PM Rating: 5
SSRFmap - Automatic SSRF Fuzzer And Exploitation Tool SSRFmap - Automatic SSRF Fuzzer And Exploitation Tool Reviewed by Lydecker Black on 9:39 AM Rating: 5
Pompem - Exploit and Vulnerability Finder Pompem - Exploit and Vulnerability Finder Reviewed by Lydecker Black on 5:22 PM Rating: 5
Lazygit - Simple Terminal UI For Git Commands Lazygit - Simple Terminal UI For Git Commands Reviewed by Lydecker Black on 10:33 AM Rating: 5
Up (Ultimate Plumber) - Tool For Writing Linux Pipes With Instant Live Preview Up (Ultimate Plumber) - Tool For Writing Linux Pipes With Instant Live Preview Reviewed by Lydecker Black on 6:12 PM Rating: 5
CDF - Crypto Differential Fuzzing CDF - Crypto Differential Fuzzing Reviewed by Lydecker Black on 9:53 AM Rating: 5
Justniffer - Network TCP Packet Sniffer Justniffer - Network TCP Packet Sniffer Reviewed by Lydecker Black on 5:13 PM Rating: 5
UEFI Firmware Parser - Parse BIOS/Intel ME/UEFI Firmware Related Structures: Volumes, FileSystems, Files, Etc UEFI Firmware Parser - Parse BIOS/Intel ME/UEFI Firmware Related Structures: Volumes, FileSystems, Files, Etc Reviewed by Lydecker Black on 9:39 AM Rating: 5
PF_RING - High-Speed Packet Capture, Filtering And Analysis PF_RING - High-Speed Packet Capture, Filtering And Analysis Reviewed by Lydecker Black on 5:28 PM Rating: 5
Pftriage - Python Tool And Library To Help Analyze Files During Malware Triage And Analysis Pftriage - Python Tool And Library To Help Analyze Files During Malware Triage And Analysis Reviewed by Lydecker Black on 9:56 AM Rating: 5
nDPI - Open Source Deep Packet Inspection Software Toolkit nDPI - Open Source Deep Packet Inspection Software Toolkit Reviewed by Lydecker Black on 5:55 PM Rating: 5
Hontel - Telnet Honeypot Hontel - Telnet Honeypot Reviewed by Lydecker Black on 10:13 AM Rating: 5
Volatility Workbench - A GUI For Volatility Memory Forensics Volatility Workbench - A GUI For Volatility Memory Forensics Reviewed by Lydecker Black on 5:47 PM Rating: 5
HTTrack Website Copier - Web Crawler And Offline Browser HTTrack Website Copier -  Web Crawler And Offline Browser Reviewed by Lydecker Black on 9:56 AM Rating: 5
OSFMount - Mount Disk Images & Create RAM Drives OSFMount - Mount Disk Images & Create RAM Drives Reviewed by Lydecker Black on 5:46 PM Rating: 5
Process Hacker - A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware Process Hacker - A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware Reviewed by Lydecker Black on 9:32 AM Rating: 5
CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols Reviewed by Lydecker Black on 5:39 PM Rating: 5
DFIRTrack - The Incident Response Tracking Application DFIRTrack - The Incident Response Tracking Application Reviewed by Lydecker Black on 9:37 AM Rating: 5
Goscan - Interactive Network Scanner Goscan - Interactive Network Scanner Reviewed by Lydecker Black on 5:31 PM Rating: 5
RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations Reviewed by Lydecker Black on 9:39 AM Rating: 5
Bscan - An Asynchronous Target Enumeration Tool Bscan - An Asynchronous Target Enumeration Tool Reviewed by Lydecker Black on 5:26 PM Rating: 5
Bincat - Binary Code Static Analyser, With IDA Integration Bincat - Binary Code Static Analyser, With IDA Integration Reviewed by Lydecker Black on 9:39 AM Rating: 5
Fnord - Pattern Extractor For Obfuscated Code Fnord - Pattern Extractor For Obfuscated Code Reviewed by Lydecker Black on 5:58 PM Rating: 5
Netsniff-Ng - A Swiss Army Knife For Your Daily Linux Network Plumbing Netsniff-Ng - A Swiss Army Knife For Your Daily Linux Network Plumbing Reviewed by Lydecker Black on 9:43 AM Rating: 5
Fwknop - Single Packet Authorization & Port Knocking Fwknop - Single Packet Authorization & Port Knocking Reviewed by Lydecker Black on 5:31 PM Rating: 5
Modlishka - An Open Source Phishing Tool With 2FA Authentication Modlishka - An Open Source Phishing Tool With 2FA Authentication Reviewed by Lydecker Black on 9:23 AM Rating: 5
Electronegativity - Tool To Identify Misconfigurations And Security Anti-Patterns In Electron Applications Electronegativity - Tool To Identify Misconfigurations And Security Anti-Patterns In Electron Applications Reviewed by Lydecker Black on 5:45 PM Rating: 5
LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) Reviewed by Lydecker Black on 9:38 AM Rating: 5
Stenographer - A Packet Capture Solution Which Aims To Quickly Spool All Packets To Disk, Then Provide Simple, Fast Access To Subsets Of Those Packets Stenographer - A Packet Capture Solution Which Aims To Quickly Spool All Packets To Disk, Then Provide Simple, Fast Access To Subsets Of Those Packets Reviewed by Lydecker Black on 9:39 AM Rating: 5
XIP - Tool To Generate A List Of IP Addresses By Applying A Set Of Transformations Used To Bypass Security Measures E.G. Blacklist Filtering, WAF, Etc. XIP - Tool To Generate A List Of IP Addresses By Applying A Set Of Transformations Used To Bypass Security Measures E.G. Blacklist Filtering, WAF, Etc. Reviewed by Lydecker Black on 9:35 AM Rating: 5