[wEAPe] Weape-Wireless-EAP-Extractor Script
Auto extracts EAP 802.1x user namesFeatures Sets up wireless card into monitor modeLists all APsAssociates with AP's you wishExtracts domain user names from any connects using EAPRequirements airodump...
View Article[Facebook Password Dump] Tool to instantly recover your lost Facebook password
Facebook Password Dump is the command-line tool to instantly recover your lost Facebook password from popular web browsers and messengers. It automatically discovers installed applications on your...
View Article[Kautilya v0.4.4] Pwnage with Human Interface Devices
Kautilya is a toolkit which provides various payloads for Teensy device which may help in breaking in a computer. The toolkit is written in Ruby.The Windows payloads and modules are written mostly in...
View Article[OWASP Broken Web Applications Project VM v1.1] Collection of vulnerable web...
The Broken Web Applications (BWA) Project is a collection of vulnerable web applications that is distributed on a Virtual Machine. The Broken Web Applications (BWA) Project produces a Virtual Machine...
View Article[SecureCheq v1.0] The Security Configuration Management made easy!
SecureCheq is a fast, simple utility for Windows servers and desktops that answers these questions while it tests for common configuration risks. This free utility:Tests for a subset of typical (and...
View Article[OWASP ZAP] Herramienta de Pentest para encontrar vulnerabilidades en...
OWASP ZAP, una de las herramientas absolutamente indispensable en el arsenal de cualquier pentester, acaba de liberar su versión 2.2.0 Esta fabulosa herramienta, que además es gratuita, no para de...
View Article[SpearPhisher] A Simple Phishing Email Generation Tool
SpearPhisher is a simple point and click Windows GUI tool designed for (mostly) non-technical people who would like to supplement the education and awareness aspect of their information security...
View Article[OS X Auditor] free Mac OS X computer forensics tool
OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:the kernel extensionsthe system agents and daemonsthe third party's agents and...
View Article[sslnuke] SSL without verification isn't secure!
We have all heard over and over that SSL without verification is not secure. If an SSL connection is not verified with a cached certificate, it can easily be hijacked by any attacker. So in 2013, one...
View Article[SuperPutty Password Decryptor] SuperPutty Session Login Password Recovery...
SuperPutty Password Decryptor is the Free desktop tool to instantly recover all the login passswords from SuperPutty session history.SuperPutty is a Windows GUI Application that allows PuTTY SSH Client...
View Article[Capture the flag] Remaster Linux Live CD images for wargames
Remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabilities to exploit.Requirements You will need the following in order to build the...
View ArticleForensics Tools
ADQUISICIÓN Y ANÁLISIS DE LA MEMORIA Set de utilidades que permite la adquisición de la memoria ram para posteriormente hacer un análisis con ella.pd Proccess Dumper - Convierte un proceso de la...
View Article[Binrev] Automate Reversing Windows Binaries for Pentesters
What you can do with this?Static analysis: you can do a basic manual code review for decompiled sources to discover hidden communication channels, search for hard-coded passwords, or SQL injection...
View Article[OWASP Zed Attack Proxy 2.2.1] Tool for finding vulnerabilities in web...
OWASP Zed Attack Proxy (ZAP) An easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security...
View Article[Arachni v0.4.5.1-0.4.2] Open Source Web Application Security Scanner Framework
Arachni is a Free/Open Source project, the code is released under the Apache License Version 2.0 and you are free to use it as you see fit. Initially started as an educational exercise, it has since...
View Article[ollydbg-binary-execution-visualizer] New Tool for Visualizing Binaries With...
Sometimes crackme’s or something you might be reversing will constantly bug you due to the excessive usage of f7 & f8. It will be quiet neat if you can see how the application is executing...
View Article[JBrute v0.9.4] Open Source Security tool to audit hashed passwords
JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and...
View Article[Laudanum] Collection of injectable files
Laudanum is a collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.They provide functionality...
View Article[FoxOne] Free OSINT Tool - Server Reconnaissance Scanner
FoxOne is a free OSINT tool, described by the author (th3j35t3r) as a Non-Invasive and Non-Detectable Server Reconnaissance Scanner.Bypassing API limitations and currently detecting 6500+ vulnerable...
View Article[Instant PDF Password Remover] Free PDF Password & Restrictions Removal Tool
Instant PDF Password Remover is the FREE tool to instantly remove Password of protected PDF document. It can remove both User & Owner password along with all PDF file restrictions such as Copy,...
View Article