DracOS - Lightweight and Powerful Penetration Testing OS DracOS - Lightweight and Powerful Penetration Testing OS Reviewed by Zion3R on 11:30 AM Rating: 5
yawast - The YAWAST Antecedent Web Application Security Toolkit yawast - The YAWAST Antecedent Web Application Security Toolkit Reviewed by Zion3R on 11:12 AM Rating: 5
arch-audit - An utility like pkg-audit for Arch Linux arch-audit - An utility like pkg-audit for Arch Linux Reviewed by Zion3R on 11:30 AM Rating: 5
Advertisement
Dracnmap - Exploit Network and Gathering Information with Nmap Dracnmap - Exploit Network and Gathering Information with Nmap Reviewed by Zion3R on 11:00 AM Rating: 5
sudo-snooper - Python script to fool sudo users sudo-snooper - Python script to fool sudo users Reviewed by Zion3R on 11:30 AM Rating: 5
Sandcat Browser 5.3 - PenTest Oriented Web Browser Sandcat Browser 5.3 - PenTest Oriented Web Browser Reviewed by Zion3R on 11:12 AM Rating: 5
Advertisement
Fluxion - WPA/WPA2 Security Hacked Without Brute Force Fluxion -  WPA/WPA2 Security Hacked Without Brute Force Reviewed by Zion3R on 11:30 AM Rating: 5
osquery - SQL powered operating system instrumentation, monitoring, and analytics osquery - SQL powered operating system instrumentation, monitoring, and analytics Reviewed by Zion3R on 11:12 AM Rating: 5
QrlJacker - QrlJacking Exploitation Framework QrlJacker - QrlJacking Exploitation Framework Reviewed by Zion3R on 11:46 AM Rating: 5
Lynis 2.3.4 - Security Auditing Tool for Unix/Linux Systems Lynis 2.3.4 - Security Auditing Tool for Unix/Linux Systems Reviewed by Zion3R on 11:30 AM Rating: 5
Droid-Hunter - Android Application Vulnerability Analysis And Android Pentest Tool Droid-Hunter - Android Application Vulnerability Analysis And Android Pentest Tool Reviewed by Zion3R on 11:26 AM Rating: 5
BLACKBOx - A Penetration Testing Framework BLACKBOx - A Penetration Testing Framework Reviewed by Zion3R on 5:47 PM Rating: 5
Faraday v2.1 - Collaborative Penetration Test and Vulnerability Management Platform Faraday v2.1 - Collaborative Penetration Test and Vulnerability Management Platform Reviewed by Zion3R on 11:36 AM Rating: 5
SSH-Weak-DH - SSH Weak Diffie-Hellman Group Identification Tool SSH-Weak-DH - SSH Weak Diffie-Hellman Group Identification Tool Reviewed by Zion3R on 11:11 AM Rating: 5
WinPirate - Automated Sticky Keys Hack. Post Exploitation It Grabs Browser Passwords, History, And Network Passwords WinPirate - Automated Sticky Keys Hack. Post Exploitation It Grabs Browser Passwords, History, And Network Passwords Reviewed by Zion3R on 10:52 AM Rating: 5
MorphAES - IDPS & SandBox & AntiVirus STEALTH KILLER MorphAES - IDPS & SandBox & AntiVirus STEALTH KILLER Reviewed by Zion3R on 6:42 PM Rating: 5
Matroschka - Python Steganography Tool To Hide Images Or Text In Images Matroschka - Python Steganography Tool To Hide Images Or Text In Images Reviewed by Zion3R on 1:02 PM Rating: 5
Cloakify - Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection Cloakify - Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Evade AV Detection Reviewed by Zion3R on 1:37 PM Rating: 5
PassTrust - A Ruby-Based Tool That Converts A Simple Passphrase Into A Secure Password  PassTrust - A Ruby-Based Tool That Converts A Simple Passphrase Into A Secure Password Reviewed by Zion3R on 11:12 AM Rating: 5
Choronzon - An Evolutionary Knowledge-Based Fuzzer Choronzon - An Evolutionary Knowledge-Based Fuzzer Reviewed by Zion3R on 11:30 AM Rating: 5