Pompem - Exploit Finder Script & Web Version
Pompem is an open source tool, which is designed to automate the search for exploits in major databases. Developed in Python, has a system of advanced search, thus facilitating the work of pentesters...
View ArticleParrot Security OS - Friendly OS designed for Pentesting, Computer Forensic,...
Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian...
View ArticleMeterSSH - Meterpreter over SSH
As penetration testers, it’s crucial to identify what types of attacks are detected and what’s not. After running into a recent penetration test with a next generation firewall, most analysis has...
View ArticleWhoisCL - Get WHOIS records from command-line
WhoisCL is a simple command-line utility that allows you to easily get information about a registered domain. It automatically connect to the right WHOIS server, according to the top-level domain name,...
View ArticleSparty - MS Sharepoint and Frontpage Auditing Tool
Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind this tool is to provide an easy and robust way to scrutinize...
View ArticleDAMM - Differential Analysis of Malware in Memory
An open source memory analysis tool built on top of Volatility. It is meant as a proving ground for interesting new techniques to be made available to the community. These techniques are an attempt to...
View ArticleLynis 1.6.4 - Security auditing tool for Unix/Linux systems
Lynis is an open sourcesecurity auditing tool. Primary goal is to help users with auditing and hardening of Unix and Linux based systems. The software is very flexible and runs on almost every Unix...
View ArticleDetekt - scans your Windows computer for traces of known surveillance spyware
Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that has been identified to be also used to target and monitor human...
View ArticleCrunch - Password Cracking Wordlist Generator
Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.Featurescrunch generates...
View ArticleLinEnum - Local Linux Enumeration & Privilege Escalation Checks
LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet. It’s a very basic shell script that performs over 65 checks, getting...
View ArticleCuckooAutoInstall - Auto Installer Script for Cuckoo Sandbox
What is Cuckoo Sandbox?In three words, Cuckoo Sandbox is a malware analysis system.What does that mean?It simply means that you can throw any suspicious file at it and in a matter of seconds Cuckoo...
View ArticleIsowall - A mini-firewall that completely isolates a target device from the...
This is a mini-firewall that completely isolates a target device from the local network. This is for allowing infected machines Internet access, but without endangering the local network.Building This...
View ArticleHash Manager - Recovering passwords to hashes
The software is designed for recovering passwords to hashes, and it features the following:Supports over 330 hashing algorithms.Contains over 50 additional utilities for handling hashes, passwords, and...
View ArticleSamurai Web Testing Framework 3.0 - LiveCD Web Pen-testing Environment
The Samurai project team is happy to announce the release of a development version of the Samurai Web Testing Framework. This release is currently a fully functional linux environment that has a number...
View ArticlezANTI 2.0 - Android Network Toolkit
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security...
View ArticleTHC-Hydra 8.1 - Network Logon Cracker
A very fast network logon cracker which support many different services.See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa.Number one of the biggest...
View ArticleAutoScan-Network - Automatically scan your network
AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network. The main goal is to print the list of connected equipments in your...
View ArticleTHC-SmartBrute - Finds undocumented and secret commands implemented in a...
This tool finds undocumented and secret commands implemented in a smartcard. An instruction is divided into Class (CLA), Instruction-Number (INS) and the parameters or arguments P1, P2, P3....
View ArticleAndroid Studio - The official Android IDE
Android Studio is the official IDE for Android application development, based on IntelliJ IDEA. On top of the capabilities you expect from IntelliJ, Android Studio offers:Flexible Gradle-based build...
View ArticleLOIC 1.0.8 (Low Orbit Ion Cannon) - A network stress testing application
Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later...
View Article