Zer0 - Secured file deletion made easy
Zer0 is a user friendly file deletion tool with a high level of security.With Zer0, you'll be able to delete files and to prevent file recovery by a 3rd person. So far, no user reported an efficient...
View ArticleMaligno v2.0 - Metasploit Payload Server
Maligno is an open source penetration testing tool written in Python that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is...
View ArticleRAWR - Rapid Assessment of Web Resources
Features A customizable CSV containing ordered information gathered for each host, with a field for making notes/etc. An elegant, searchable, JQuery-driven HTML report that shows screenshots,...
View ArticleXSSYA v2.0 - Cross Site Scripting Scanner & Vulnerability Confirmation
XSSYA Cross Site Scripting Scanner & Vulnerability Confirmation written in python scripting language confirm the XSS Vulnerability in two method first work by execute the payload encoded to bypass...
View ArticleCookies Manager - Simple Cookie Stealer
A simple program in PHP to help with XSS vulnerability in this program are the following:[+] Cookie Stealer with TinyURL Generator[+] Can you see the cookies that brings back a page[+] Can create...
View ArticleTcpdump - Dump Traffic on a Network
Tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to...
View Articlenetool.sh - MitM Pentesting Opensource T00lkit
netool.sh toolkit provides a fast and easy way For new arrivals to IT security pentesting and also to experience users to use allmost all features that the Man-In-The-Middle can provide under local...
View ArticleAVCaesar - Malware Analysis Engine and Repository
AVCaesar is a malware analysis engine and repository, developed by malware.lu within the FP7 project CockpitCI.Functionalities AVCaesar can be used to:Perform an efficient malware analysis of...
View ArticleBlueScreenView - Blue Screen of Death (STOP error) information in dump files
BlueScreenView scans all your minidump files created during 'blue screen of death' crashes, and displays the information about all crashes in one table. For each crash, BlueScreenView displays the...
View ArticleProxyDroid - Set Proxys (Http / Socks4 / Socks5) on your Android devices
ProxyDroid is an app that can help you to set the proxy (http / socks4 / socks5) on your android devices.FEATURESSupport HTTP / HTTPS / SOCKS4 / SOCKS5 proxySupport basic / NTLM / NTLMv2 authentication...
View ArticleProject Artillery - Full Suite for Protection against Attack on Linux and...
Project Artillery is an open source project aimed at the detection of early warning indicators and attacks. The concept is that Artillery will spawn multiple ports on a system giving the attacker the...
View Article3vilTwinAttacker - Create Rogue Wi-Fi Access Point and Snooping on the Traffic
This tool create an rogue Wi-Fi access point , purporting to provide wireless Internet services, but snooping on the traffic.Software dependencies:Recommended to use Kali...
View ArticleKadimus - LFI Scan & Exploit Tool
Kadimus is a tool to check sites to lfi vulnerability , and also exploit itFeatures: Check all url parameters /var/log/auth.log RCE /proc/self/environ RCE php://input RCE data://text RCE Source code...
View ArticleNetsparker 4 - Easier to Use, More Automation and Much More Web Security Checks
Netsparker Web Application Security Scanner version 4. The main highlight of this new version is the new fully automated Form Authentication mechanism; it does not require you to record anything,...
View ArticleCommix - Automated All-in-One OS Command Injection and Exploitation Tool
Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the...
View ArticleWoodpecker hash Bruteforce - Multithreaded program to perform a brute-force...
Woodpecker hash Bruteforce is a fast and easy-to-use multithreaded program to perform a brute-force attack against a hash. It supports many common hashing algorithms such as md5, sha1, etc. It runs on...
View ArticleForpix - Software for detecting affine image files
forpix is a forensic program for identifying similar images that are no longer identical due to image manipulation. Hereinafter I will describe the technical background for the basic understanding of...
View ArticleAircrack-ng 1.2 RC 2 - WEP and WPA-PSK keys cracking program
Here is the second release candidate. Along with a LOT of fixes, it improves the support for the Airodump-ng scan visualizer. Airmon-zc is mature and is now renamed to Airmon-ng. Also, Airtun-ng is now...
View ArticleOWASP ZAP 2.4.0 - Penetration Testing Tool for Testing Web Applications
ZAP is an OWASP Flagship project, and is currently the most active open source web application security tool.For a quick introduction to the new release see this video:Some of the most significant...
View ArticleWatcher v1.5.8 - Web Security Testing Tool and Passive Vulnerability Scanner
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, it's completely safe to use in Cloud computing, shared hosting, and...
View Article