imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware imaginaryC2 - Tool Which Aims To Help In The Behavioral (Network) Analysis Of Malware Reviewed by Lydecker Black on 9:08 AM Rating: 5
Aircrack-ng 1.5 - Complete Suite Of Tools To Assess WiFi Network Security Aircrack-ng 1.5 - Complete Suite Of Tools To Assess WiFi Network Security Reviewed by Lydecker Black on 6:09 PM Rating: 5
Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Lydecker Black on 5:57 PM Rating: 5
Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner Reviewed by Lydecker Black on 8:37 AM Rating: 5
DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool Reviewed by Lydecker Black on 8:39 AM Rating: 5
theHarvester v3.0.3 - E-mails, Subdomains And Names Harvester (OSINT) theHarvester v3.0.3 - E-mails, Subdomains And Names Harvester (OSINT) Reviewed by Lydecker Black on 8:45 AM Rating: 5
Cameradar v2.1.0 - Hacks Its Way Into RTSP Videosurveillance Cameras Cameradar v2.1.0 - Hacks Its Way Into RTSP Videosurveillance Cameras Reviewed by Lydecker Black on 6:14 PM Rating: 5
Malcom - Malware Communications Analyzer Malcom - Malware Communications Analyzer Reviewed by Lydecker Black on 5:55 PM Rating: 5
Tcpreplay - Pcap Editing And Replay Tools For *NIX And Windows Tcpreplay - Pcap Editing And Replay Tools For *NIX And Windows Reviewed by Lydecker Black on 9:32 AM Rating: 5
Osweep - Don't Just Search OSINT, Sweep It Osweep - Don't Just Search OSINT, Sweep It Reviewed by Lydecker Black on 5:49 PM Rating: 5
Evilginx2 v2.2.0 - Standalone Man-In-The-Middle Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-Factor Authentication Evilginx2 v2.2.0 - Standalone Man-In-The-Middle Attack Framework Used For Phishing Login Credentials Along With Session Cookies, Allowing For The Bypass Of 2-Factor Authentication Reviewed by Lydecker Black on 8:49 AM Rating: 5
MEC v1.4.0 - Mass Exploit Console MEC v1.4.0 - Mass Exploit Console Reviewed by Lydecker Black on 5:47 PM Rating: 5
CRS - OWASP ModSecurity Core Rule Set CRS - OWASP ModSecurity Core Rule Set Reviewed by Lydecker Black on 9:05 AM Rating: 5
Hayat - Auditing & Hardening Script For Google Cloud Platform Hayat - Auditing & Hardening Script For Google Cloud Platform Reviewed by Lydecker Black on 5:33 PM Rating: 5
Veil - Tool To Generate Metasploit Payloads That Bypass Common Anti-virus Solutions Veil - Tool To Generate Metasploit Payloads That Bypass Common Anti-virus Solutions Reviewed by Lydecker Black on 8:37 AM Rating: 5
LightBulb Framework - Tools For Auditing WAFS LightBulb Framework - Tools For Auditing WAFS Reviewed by Lydecker Black on 8:45 AM Rating: 5
GTRS - Google Translator Reverse Shell GTRS - Google Translator Reverse Shell Reviewed by Lydecker Black on 6:37 PM Rating: 5
Digger - Tool Which Can Do A Lot Of Basic Tasks Related To Information Gathering Digger - Tool Which Can Do A Lot Of Basic Tasks Related To Information Gathering Reviewed by Lydecker Black on 5:25 PM Rating: 5
PyCPU - Central Processing Unit Information Gathering Tool PyCPU - Central Processing Unit Information Gathering Tool Reviewed by Lydecker Black on 9:21 AM Rating: 5
Kbd-Audio - Tools For Capturing And Analysing Keyboard Input Paired With Microphone Capture Kbd-Audio - Tools For Capturing And Analysing Keyboard Input Paired With Microphone Capture Reviewed by Lydecker Black on 8:43 AM Rating: 5