Ghostfuscator - The Python Password-Protected Obfuscator Using AES Encryption Ghostfuscator - The Python Password-Protected Obfuscator Using AES Encryption Reviewed by Zion3R on 9:12 AM Rating: 5
Commando VM v1.3 - The First Full Windows-based Penetration Testing Virtual Machine Distribution Commando VM v1.3 - The First Full Windows-based Penetration Testing Virtual Machine Distribution Reviewed by Zion3R on 8:45 AM Rating: 5
Findomain - A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains Findomain - A Cross-Platform Tool That Use Certificate Transparency Logs To Find Subdomains Reviewed by Zion3R on 6:05 PM Rating: 5
Advertisement
WinObjEx64 - Windows Object Explorer 64-Bit WinObjEx64 - Windows Object Explorer 64-Bit Reviewed by Zion3R on 9:09 AM Rating: 5
Regipy - An OS Independent Python Library For Parsing Offline Registry Hives Regipy - An OS Independent Python Library For Parsing Offline Registry Hives Reviewed by Zion3R on 6:11 PM Rating: 5
Rifiuti2 - Windows Recycle Bin Analyser Rifiuti2 - Windows Recycle Bin Analyser Reviewed by Zion3R on 9:07 AM Rating: 5
Advertisement
SneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload SneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload Reviewed by Zion3R on 6:23 PM Rating: 5
Wesng - Windows Exploit Suggester Wesng - Windows Exploit Suggester Reviewed by Zion3R on 9:12 AM Rating: 5
Slackor - A Golang Implant That Uses Slack As A Command And Control Server Slackor - A Golang Implant That Uses Slack As A Command And Control Server Reviewed by Zion3R on 9:30 AM Rating: 5
Hash-Identifier - Software To Identify The Different Types Of Hashes Used To Encrypt Data And Especially Passwords Hash-Identifier - Software To Identify The Different Types Of Hashes Used To Encrypt Data And Especially Passwords Reviewed by Zion3R on 6:22 PM Rating: 5
Icebox - Virtual Machine Introspection, Tracing & Debugging Icebox - Virtual Machine Introspection, Tracing & Debugging Reviewed by Zion3R on 5:56 PM Rating: 5
SQLMap v1.3.7 - Automatic SQL Injection And Database Takeover Tool SQLMap v1.3.7 - Automatic SQL Injection And Database Takeover Tool Reviewed by Zion3R on 9:30 AM Rating: 5
Sherlock - Find Usernames Across Social Networks Sherlock - Find Usernames Across Social Networks Reviewed by Zion3R on 6:12 PM Rating: 5
Lst2X64Dbg - Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database Lst2X64Dbg - Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database Reviewed by Zion3R on 6:08 PM Rating: 5
Spyse.Py - Python API Wrapper And Command-Line Client For The Tools Hosted On Spyse.Com Spyse.Py - Python API Wrapper And Command-Line Client For The Tools Hosted On Spyse.Com Reviewed by Zion3R on 9:38 AM Rating: 5
PivotSuite - A Network Pivoting Toolkit PivotSuite - A Network Pivoting Toolkit Reviewed by Zion3R on 9:05 AM Rating: 5
Project iKy - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface Project iKy - Tool That Collects Information From An Email And Shows Results In A Nice Visual Interface Reviewed by Zion3R on 9:18 AM Rating: 5
One-Lin3r v2.0 - Gives You One-Liners That Aids In Penetration Testing Operations, Privilege Escalation And More One-Lin3r v2.0 - Gives You One-Liners That Aids In Penetration Testing Operations, Privilege Escalation And More Reviewed by Zion3R on 9:11 AM Rating: 5
BoomER - Framework For Exploiting Local Vulnerabilities BoomER - Framework For Exploiting Local Vulnerabilities Reviewed by Zion3R on 6:10 PM Rating: 5
GhostSquadHackers - Encrypt/Encode Your Javascript Code GhostSquadHackers - Encrypt/Encode Your Javascript Code Reviewed by Zion3R on 3:32 AM Rating: 5