w3af - Web Application Attack and Audit Framework w3af - Web Application Attack and Audit Framework Reviewed by Lydecker Black on 10:11 AM Rating: 5
InSpy - A Linkedin Enumeration Tool InSpy - A Linkedin Enumeration Tool Reviewed by Lydecker Black on 6:09 PM Rating: 5
Sublist3r v1.0 - Fast subdomains enumeration tool for penetration testers Sublist3r v1.0 - Fast subdomains enumeration tool for penetration testers Reviewed by Lydecker Black on 10:30 AM Rating: 5
Syhunt ScanTools 6.0 - Console Web Vulnerability Scan Tools Syhunt ScanTools 6.0 - Console Web Vulnerability Scan Tools Reviewed by Lydecker Black on 6:34 PM Rating: 5
Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks Reviewed by Lydecker Black on 10:12 AM Rating: 5
CMSsc4n - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop CMSsc4n - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop Reviewed by Lydecker Black on 6:13 PM Rating: 5
WebDavC2 - A WebDAV C2 Tool WebDavC2 - A WebDAV C2 Tool Reviewed by Lydecker Black on 10:30 AM Rating: 5
Cr3dOv3r v0.2 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r v0.2 - Know The Dangers Of Credential Reuse Attacks Reviewed by Lydecker Black on 5:24 PM Rating: 5
Amber - POC Reflective PE Packer Amber - POC Reflective PE Packer Reviewed by Lydecker Black on 10:30 AM Rating: 5
TeleShadow v2 - Advanced Telegram Desktop Session Hijacker! TeleShadow v2 -  Advanced Telegram Desktop Session Hijacker! Reviewed by Lydecker Black on 6:03 PM Rating: 5
ysoserial.net - Deserialization payload generator for a variety of .NET formatters ysoserial.net - Deserialization payload generator for a variety of .NET formatters Reviewed by Lydecker Black on 10:14 AM Rating: 5
EmbedInHTML - Embed and hide any file in an HTML file EmbedInHTML - Embed and hide any file in an HTML file Reviewed by Lydecker Black on 5:36 PM Rating: 5
DBC2 (DropboxC2) - A Modular Post-Exploitation Tool, Composed Of An Agent Running On The Victim'S Machine DBC2 (DropboxC2) - A Modular Post-Exploitation Tool, Composed Of An Agent Running On The Victim'S Machine Reviewed by Lydecker Black on 10:12 AM Rating: 5
DDEtect - Simple DDE Object Detector DDEtect - Simple DDE  Object Detector Reviewed by Lydecker Black on 6:06 PM Rating: 5
sAINT - A Spyware Generator for Windows systems written in Java sAINT - A Spyware Generator for Windows systems written in Java Reviewed by Lydecker Black on 10:20 AM Rating: 5
PortEx - Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness PortEx - Java library to analyse Portable Executable files with a special focus on malware analysis and PE malformation robustness Reviewed by Lydecker Black on 10:25 AM Rating: 5
Skype Log Viewer - Download and View Skype History Without Skype Skype Log Viewer - Download and View Skype History Without Skype Reviewed by Lydecker Black on 6:17 PM Rating: 5
OnionShare - Securely and anonymously share a file of any size OnionShare - Securely and anonymously share a file of any size Reviewed by Lydecker Black on 10:30 AM Rating: 5
SimpleWall - Simple tool to configure Windows Filtering Platform (WFP) SimpleWall - Simple tool to configure Windows Filtering Platform (WFP) Reviewed by Lydecker Black on 6:56 PM Rating: 5
Fake Sandbox Processes (FSP) - Tool to simulate fake processes of analysis sandbox/VM software Fake Sandbox Processes (FSP) - Tool to simulate fake processes of analysis sandbox/VM software Reviewed by Lydecker Black on 6:30 PM Rating: 5