Buster - Find Emails Of A Person And Return Info Associated With Them Buster - Find Emails Of A Person And Return Info Associated With Them Reviewed by Zion3R on 5:37 PM Rating: 5
WDExtract - Extract Windows Defender Database From Vdm Files And Unpack It WDExtract - Extract Windows Defender Database From Vdm Files And Unpack It Reviewed by Zion3R on 6:00 PM Rating: 5
WeebDNS - DNS Enumeration With Asynchronicity WeebDNS - DNS Enumeration With Asynchronicity Reviewed by Zion3R on 9:00 AM Rating: 5
RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace Reviewed by Zion3R on 5:15 PM Rating: 5
Recon-ng v5.0.0 - Open Source Intelligence Gathering Tool Aimed At Reducing The Time Spent Harvesting Information From Open Sources Recon-ng v5.0.0 - Open Source Intelligence Gathering Tool Aimed At Reducing The Time Spent Harvesting Information From Open Sources Reviewed by Zion3R on 8:47 AM Rating: 5
Uncompyle6 - A Cross-Version Python Bytecode Decompiler Uncompyle6 - A Cross-Version Python Bytecode Decompiler Reviewed by Zion3R on 6:14 PM Rating: 5
OSXCollector - A Forensic Evidence Collection & Analysis Toolkit For OS X OSXCollector - A Forensic Evidence Collection & Analysis Toolkit For OS X Reviewed by Zion3R on 9:07 AM Rating: 5
Vulnado - Purposely Vulnerable Java Application To Help Lead Secure Coding Workshops Vulnado - Purposely Vulnerable Java Application To Help Lead Secure Coding Workshops Reviewed by Zion3R on 6:27 PM Rating: 5
Orbit v2.0 - Blockchain Transactions Investigation Tool Orbit v2.0 - Blockchain Transactions Investigation Tool Reviewed by Zion3R on 9:07 AM Rating: 5
Cloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail Cloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail Reviewed by Zion3R on 6:10 PM Rating: 5
grapheneX - Automated System Hardening Framework grapheneX - Automated System Hardening Framework Reviewed by Zion3R on 8:49 AM Rating: 5
O365-Attack-Toolkit - A Toolkit To Attack Office365 O365-Attack-Toolkit - A Toolkit To Attack Office365 Reviewed by Zion3R on 5:31 PM Rating: 5
Pyattck - A Python Module To Interact With The Mitre ATT&CK Framework Pyattck - A Python Module To Interact With The Mitre ATT&CK Framework Reviewed by Zion3R on 8:49 AM Rating: 5
Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting Reviewed by Zion3R on 5:39 PM Rating: 5
Airopy - Get Clients And Access Points Airopy - Get Clients And Access Points Reviewed by Zion3R on 9:12 AM Rating: 5
AMIRA - Automated Malware Incident Response & Analysis AMIRA - Automated Malware Incident Response & Analysis Reviewed by Zion3R on 5:54 PM Rating: 5
VulnWhisperer - Create Actionable Data From Your Vulnerability Scans VulnWhisperer - Create Actionable Data From Your Vulnerability Scans Reviewed by Zion3R on 9:09 AM Rating: 5
Dockernymous - A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers Dockernymous - A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers Reviewed by Zion3R on 5:42 PM Rating: 5
HiddenEye - Modern Phishing Tool With Advanced Functionality (Android-Support-Available) HiddenEye - Modern Phishing Tool With Advanced Functionality (Android-Support-Available) Reviewed by Zion3R on 9:10 AM Rating: 5
SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules Misconfigurations And Vulnerabilities Within Sudo SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules Misconfigurations And Vulnerabilities Within Sudo Reviewed by Zion3R on 5:55 PM Rating: 5
Hvazard - Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists! Hvazard - Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists! Reviewed by Zion3R on 9:30 AM Rating: 5
GitGot - Semi-automated, Feedback-Driven Tool To Rapidly Search Through Troves Of Public Data On GitHub For Sensitive Secrets GitGot - Semi-automated, Feedback-Driven Tool To Rapidly Search Through Troves Of Public Data On GitHub For Sensitive Secrets Reviewed by Zion3R on 6:00 PM Rating: 5
Git-Hound - Find Exposed Keys Across GitHub Using Code Search Keywords Git-Hound - Find Exposed Keys Across GitHub Using Code Search Keywords Reviewed by Zion3R on 5:49 PM Rating: 5
Parrot Security 4.7 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Parrot Security 4.7 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind Reviewed by Zion3R on 9:01 AM Rating: 5
Kali NetHunter App Store - The New Android Store Dedicated to Free Security Apps Kali NetHunter App Store - The New Android Store Dedicated to Free Security Apps Reviewed by Zion3R on 5:25 PM Rating: 5
Userrecon v1.1.0 - Recognition Usernames In 187 Social Networks Userrecon v1.1.0 - Recognition Usernames In 187 Social Networks Reviewed by Zion3R on 8:15 AM Rating: 5
Brute_Force - BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix Brute_Force - BruteForce Gmail, Hotmail, Twitter, Facebook & Netflix Reviewed by Zion3R on 6:15 PM Rating: 5
Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS Reviewed by Zion3R on 9:09 AM Rating: 5
Shellsum - A Defense Tool - Detect Web Shells In Local Directories Via Md5Sum Shellsum - A Defense Tool - Detect Web Shells In Local Directories Via Md5Sum Reviewed by Zion3R on 5:42 PM Rating: 5
RedGhost v2.0 - Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance And Leaving No Trace RedGhost v2.0 - Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance And Leaving No Trace Reviewed by Zion3R on 9:11 AM Rating: 5
UACME - Defeating Windows User Account Control UACME - Defeating Windows User Account Control Reviewed by Zion3R on 6:08 PM Rating: 5
JShielder v2.4 - Hardening Script For Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G JShielder v2.4 - Hardening Script For Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G Reviewed by Zion3R on 9:54 AM Rating: 5
Project iKy v2.0.0 - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface Project iKy v2.0.0 - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface Reviewed by Zion3R on 5:39 PM Rating: 5
Passpie - Multiplatform Command-Line Password Manager Passpie - Multiplatform Command-Line Password Manager Reviewed by Zion3R on 9:30 AM Rating: 5
PasteHunter - Scanning Pastebin With Yara Rules PasteHunter - Scanning Pastebin With Yara Rules Reviewed by Zion3R on 6:11 PM Rating: 5
Pown-Duct - Essential Tool For Finding Blind Injection Attacks Pown-Duct - Essential Tool For Finding Blind Injection Attacks Reviewed by Zion3R on 9:09 AM Rating: 5
Dwarf - Full Featured Multi Arch/Os Debugger Built On Top Of PyQt5 And Frida Dwarf - Full Featured Multi Arch/Os Debugger Built On Top Of PyQt5 And Frida Reviewed by Zion3R on 6:20 PM Rating: 5
Ghostfuscator - The Python Password-Protected Obfuscator Using AES Encryption Ghostfuscator - The Python Password-Protected Obfuscator Using AES Encryption Reviewed by Zion3R on 9:12 AM Rating: 5
Objection v1.6.6 - Runtime Mobile Exploration Objection v1.6.6 - Runtime Mobile Exploration Reviewed by Zion3R on 6:13 PM Rating: 5
Commando VM v1.3 - The First Full Windows-based Penetration Testing Virtual Machine Distribution Commando VM v1.3 - The First Full Windows-based Penetration Testing Virtual Machine Distribution Reviewed by Zion3R on 8:45 AM Rating: 5
Findomain - A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains Findomain - A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains Reviewed by Zion3R on 6:05 PM Rating: 5
Echidna - Ethereum Fuzz Testing Framework Echidna - Ethereum Fuzz Testing Framework Reviewed by Zion3R on 9:14 AM Rating: 5
Cloud Security Audit - A Command Line Security Audit Tool For Amazon Web Services Cloud Security Audit - A Command Line Security Audit Tool For Amazon Web Services Reviewed by Zion3R on 6:15 PM Rating: 5
WinObjEx64 - Windows Object Explorer 64-Bit WinObjEx64 - Windows Object Explorer 64-Bit Reviewed by Zion3R on 9:09 AM Rating: 5
Regipy - An OS Independent Python Library For Parsing Offline Registry Hives Regipy - An OS Independent Python Library For Parsing Offline Registry Hives Reviewed by Zion3R on 6:11 PM Rating: 5
Rifiuti2 - Windows Recycle Bin Analyser Rifiuti2 - Windows Recycle Bin Analyser Reviewed by Zion3R on 9:07 AM Rating: 5
Linux-Smart-Enumeration - Linux Enumeration Tool For Pentesting And CTFs With Verbosity Levels Linux-Smart-Enumeration - Linux Enumeration Tool For Pentesting And CTFs With Verbosity Levels Reviewed by Zion3R on 5:57 PM Rating: 5
Whonix v15 - Anonymous Operating System Whonix v15 - Anonymous Operating System Reviewed by Zion3R on 8:52 AM Rating: 5
SneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload SneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload Reviewed by Zion3R on 6:23 PM Rating: 5