[Tor-ramdisk] Micro Linux distribution whose sole purpose is to securely host...
Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to...
View Article[Rhino] Java Script Deobfuscate Tool
Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide scripting to end users. It is embedded in J2SE 6 as the default...
View Article[Suricata 1.4.7] Open Source Next Generation Intrusion Detection and...
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will...
View ArticleTor Browser Bundle 3.5
The 2.x stable series of the Tor Browser Bundle has officially been deprecated, and all users are encouraged to upgrade to the 3.5 series.Packages are now available from the Tor download page as wellas...
View Article[VirusTotal] Online Malware Analysis Tool
VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses, worms, trojans and other kinds of malicious content detected by...
View Article[Wifitap] WLAN Traffic Injection Tool
Wifitap is a proof of concept for communication over WLAN networks using traffic injection. Wifitap allows direct communication with an associated station to a given access point directly, whilst not...
View Article[Malware Classifier] Malware Analysis Tool
Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easily determine if a binary file contains malware, so they can...
View Article[Bugtroid] Pentesting for Android
Bugtroid is an innovative tool developed by the team of Bugtraq-Team.The main features of this apk, is that it has more than 200 Android and Linux tools (PRO) for pentesting and forensics through its...
View Article[Ardamax Keylogger 4.0.6] Invisible Keylogger with Remote Installation Feature
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is...
View Article[Websecurify] Web Security Testing Runtime
A Complete Suite Of Web Security ToolsThe Suite provides a complete and functional marketplace of highly integrated web application security tools. You will find that different areas are covered by...
View Article[Anubis] Online Analyzing Unknown Binaries
Anubis is a service for analyzing malware.Submit your Windows executable or Android APK and receive an analysis report telling you what it does. Alternatively, submit a suspicious URL and receive a...
View Article[BTS PenTesting Lab] A vulnerable web application to learn common...
The most common question from students who is learning website hacking techniques is "how to test my skills legally without getting into troubles?". So, i always suggest them to use some vulnerable...
View Article[Comodo Instant Malware Analysis] Online Automated Analysis System
If you have a suspicious file, please submit it online by using the form below. Once the file is submitted, COMODO Automated Analysis System will scan it and report back its findings.Comodo Instant...
View Article[Avivore] The Twitter-searching Data Miner
Avivore is a Python-based tool that searches Twitter for keywords and then parses any tweets that are found. When parsing, it looks for the following sort of data:Phone numbers in NPA-NXX format (ex:...
View Article[WinDbg v6.12.2.633] Debugging Tools for Windows
WinDbg is a graphical debugger from Microsoft. It is actually just one component of the Debugging Tools for Windows package, which also includes the KD, CDB, and NTSD debuggers. Its claim to fame is...
View Article[RemotePasswordWiFi] Script in Ruby, for search passwords WiFi of remote routers
Script in Ruby, for search passwords WiFi of remote routers. Support Routers: *] Thomson *] Thechnicolor in next days: *] bee *] ciscoDownload RemotePasswordWiFi
View Article[Twitter Password Dump] Command-line Tool to Recover Twitter Password from...
Twitter Password Dump is the command-line tool to instantly recover your lost Twitter password from all the popular web browsers.Currently it can recover your Twitter password from following...
View Article[RHEL 7] Red Hat Enterprise Linux 7 Beta
Red Hat Enterprise Linux 7 Beta showcases hundreds of new features and enhancements, including: Linux Containers - Enabling applications to be created and deployed in isolated environments with...
View Article[flunym0us] Vulnerability Scanner for Wordpress and Moodle
Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flunym0us performs dictionary attacks against Web sites. By default,...
View Article[Watcher] passive Web-security scanner
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and...
View Article