Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[Tor-ramdisk] Micro Linux distribution whose sole purpose is to securely host...

Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to...

View Article


Image may be NSFW.
Clik here to view.

[Rhino] Java Script Deobfuscate Tool

Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide scripting to end users. It is embedded in J2SE 6 as the default...

View Article


Image may be NSFW.
Clik here to view.

[Suricata 1.4.7] Open Source Next Generation Intrusion Detection and...

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will...

View Article

Image may be NSFW.
Clik here to view.

Tor Browser Bundle 3.5

The 2.x stable series of the Tor Browser Bundle has officially been deprecated, and all users are encouraged to upgrade to the 3.5 series.Packages are now available from the Tor download page as wellas...

View Article

Image may be NSFW.
Clik here to view.

[VirusTotal] Online Malware Analysis Tool

VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by...

View Article


Image may be NSFW.
Clik here to view.

[Wifitap] WLAN Traffic Injection Tool

Wifitap is a proof of concept for communication over WLAN networks using traffic injection. Wifitap allows direct communication with an associated station to a given access point directly, whilst not...

View Article

Image may be NSFW.
Clik here to view.

[Malware Classifier] Malware Analysis Tool

Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easily determine if a binary file contains malware, so they can...

View Article

Image may be NSFW.
Clik here to view.

[Bugtroid] Pentesting for Android

Bugtroid is an innovative tool developed by the team of Bugtraq-Team.The main features of this apk, is that it has more than 200 Android and Linux tools (PRO) for pentesting and forensics through its...

View Article


Image may be NSFW.
Clik here to view.

[Ardamax Keylogger 4.0.6] Invisible Keylogger with Remote Installation Feature

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is...

View Article


Image may be NSFW.
Clik here to view.

[Websecurify] Web Security Testing Runtime

A Complete Suite Of Web Security ToolsThe Suite provides a complete and functional marketplace of highly integrated web application security tools. You will find that different areas are covered by...

View Article

Image may be NSFW.
Clik here to view.

[Anubis] Online Analyzing Unknown Binaries

Anubis is a service for analyzing malware.Submit your Windows executable or Android APK and receive an analysis report telling you what it does. Alternatively, submit a suspicious URL and receive a...

View Article

Image may be NSFW.
Clik here to view.

[BTS PenTesting Lab] A vulnerable web application to learn common...

The most common question from students who is learning website hacking techniques is "how to test my skills legally without getting into troubles?".  So, i always suggest them to use some vulnerable...

View Article

Image may be NSFW.
Clik here to view.

[Comodo Instant Malware Analysis] Online Automated Analysis System

If you have a suspicious file, please submit it online by using the form below. Once the file is submitted, COMODO Automated Analysis System will scan it and report back its findings.Comodo Instant...

View Article


Image may be NSFW.
Clik here to view.

[Avivore] The Twitter-searching Data Miner

Avivore is a Python-based tool that searches Twitter for keywords and then parses any tweets that are found. When parsing, it looks for the following sort of data:Phone numbers in NPA-NXX format (ex:...

View Article

Image may be NSFW.
Clik here to view.

[WinDbg v6.12.2.633] Debugging Tools for Windows

WinDbg is a graphical debugger from Microsoft. It is actually just one component of the Debugging Tools for Windows package, which also includes the KD, CDB, and NTSD debuggers. Its claim to fame is...

View Article


Image may be NSFW.
Clik here to view.

[RemotePasswordWiFi] Script in Ruby, for search passwords WiFi of remote routers

Script in Ruby, for search passwords WiFi of remote routers. Support Routers: *] Thomson *] Thechnicolor in next days: *] bee *] ciscoDownload RemotePasswordWiFi

View Article

Image may be NSFW.
Clik here to view.

[Twitter Password Dump] Command-line Tool to Recover Twitter Password from...

Twitter Password Dump is the command-line tool to instantly recover your lost Twitter password from all the popular web browsers.Currently it can recover your Twitter password from following...

View Article


Image may be NSFW.
Clik here to view.

[RHEL 7] Red Hat Enterprise Linux 7 Beta

Red Hat Enterprise Linux 7 Beta showcases hundreds of new features and enhancements, including: Linux Containers - Enabling applications to be created and deployed in isolated environments with...

View Article

Image may be NSFW.
Clik here to view.

[flunym0us] Vulnerability Scanner for Wordpress and Moodle

Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flunym0us performs dictionary attacks against Web sites. By default,...

View Article

Image may be NSFW.
Clik here to view.

[Watcher] passive Web-security scanner

Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>