Bashark - Bash Post Exploitation Toolkit Bashark - Bash Post Exploitation Toolkit Reviewed by Lydecker Black on 9:47 AM Rating: 5
CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs CT-Exposer - An OSINT Tool That Discovers Sub-Domains By Searching Certificate Transparency Logs Reviewed by Lydecker Black on 6:02 PM Rating: 5
BetterCap v2.10 - The Swiss Army Knife For 802.11, BLE And Ethernet Networks Reconnaissance And MITM Attacks BetterCap v2.10 - The Swiss Army Knife For 802.11, BLE And Ethernet Networks Reconnaissance And MITM Attacks Reviewed by Lydecker Black on 9:48 AM Rating: 5
WPScan v3.3.1 - Black Box WordPress Vulnerability Scanner WPScan v3.3.1 - Black Box WordPress Vulnerability Scanner Reviewed by Lydecker Black on 5:12 PM Rating: 5
Munin - Online Hash Checker For Virustotal And Other Services Munin - Online Hash Checker For Virustotal And Other Services Reviewed by Lydecker Black on 9:25 AM Rating: 5
RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices Reviewed by Lydecker Black on 5:39 PM Rating: 5
LibSSH Scanner - Script To Identify Hosts Vulnerable To CVE-2018-10933 LibSSH Scanner - Script To Identify Hosts Vulnerable To CVE-2018-10933 Reviewed by Lydecker Black on 9:51 AM Rating: 5
Infog - Information Gathering Tool Infog - Information Gathering Tool Reviewed by Lydecker Black on 6:46 PM Rating: 5
imR0T - Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13) imR0T - Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13) Reviewed by Lydecker Black on 9:46 AM Rating: 5
SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.2.10 - Automatic SQL Injection And Database Takeover Tool Reviewed by Lydecker Black on 9:43 AM Rating: 5
Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Nameles - Open Source Entropy Based Invalid Traffic Detection And Pre-Bid Filtering Reviewed by Lydecker Black on 6:07 PM Rating: 5
Quasar - An Information Gathering Framework For Lazy Penetration Testers Quasar - An Information Gathering Framework For Lazy Penetration Testers Reviewed by Lydecker Black on 9:33 AM Rating: 5
Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Censys Subdomain Finder - Perform Subdomain Enumeration Using The Certificate Transparency Logs From Censys Reviewed by Lydecker Black on 6:58 PM Rating: 5
Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Metadata-Attacker - A Tool To Generate Media Files With Malicious Metadata Reviewed by Lydecker Black on 10:12 AM Rating: 5
Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Swap Digger - Tool That Automates Swap Extraction And Searches For Linux User Credentials, Web Forms Credentials, Web Forms Emails, Http Basic Authentication, Wifi SSID And Keys, Etc Reviewed by Lydecker Black on 9:32 AM Rating: 5
EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General EKFiddle v.0.8.2 - A Framework Based On The Fiddler Web Debugger To Study Exploit Kits, Malvertising And Malicious Traffic In General Reviewed by Lydecker Black on 9:11 AM Rating: 5
DNSDiag - DNS Diagnostics And Performance Measurement Tools DNSDiag - DNS Diagnostics And Performance Measurement Tools Reviewed by Lydecker Black on 6:34 PM Rating: 5
Atlas - Quick SQLMap Tamper Suggester Atlas - Quick SQLMap Tamper Suggester Reviewed by Lydecker Black on 10:12 AM Rating: 5
TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once TakeOver v1 - Extracts CNAME Record Of All Subdomains At Once Reviewed by Lydecker Black on 6:42 PM Rating: 5
HeapHopper - A Bounded Model Checking Framework For Heap-implementations HeapHopper - A Bounded Model Checking Framework For Heap-implementations Reviewed by Lydecker Black on 6:06 PM Rating: 5