[Retire.js] Command line Scanner and Chrome plugin
Retire.js is a command line scanner that helps you identify dependencies with known vulnerabilites in your application. Using the provided Grunt plugin you can easily include Retire.js into your build...
View Article[JBrute] Open Source Security tool to audit hashed passwords
JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and...
View Article[Umap] The USB host security assessment tool
umap is a tool which allows you to test the security of USB host implementations i.e. something you plug a USB device into, like a PC or a tablet. Its primary function at the moment is a fuzzer with...
View Article[sniffMyPackets v1.0] A Maltego Set of Transforms for pcap analysis
sniffMyPackets is a set of Maltego transforms written using the Canari framework that allow for the analysis of pcap files.Currently there are over 60 transforms that cover things such as:extracting...
View Article[Bluelog v1.1.2] Linux Bluetooth scanner
Bluelog is a Linux Bluetooth scanner with optional daemon mode and web front-end, designed for site surveys and traffic monitoring. It's intended to be run for long periods of time in a static location...
View Article[SET v5.4] The Social-Engineer Toolkit "Walkers"
TrustedSec is proud to announce the release of The Social-Engineer Toolkit (SET) v5.4 codename “Walkers”. This version has a significant amount of changes, performance upgrades, bug fixes, and...
View Article[FS-NyarL] A network takeover & forensic analysis tool
NyarL it's Nyarlathotep, a mitological chaotic deity of the writer HP. Lovecraft's cosmogony.It's represent Crawling Chaos and FS-NyarL it's The Crawling Chaos of Cyber Security :-)A network takeover...
View Article[Volatility v2.3] The advanced memory forensics framework (Support of OSX)
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM)...
View Article[aidSQL] PHP Application For SQL Injection Detection & Exploitation
aidSQL a PHP application provided for detecting security holes in your website/s. It’s a modular application, meaning that you can develop your very own plugins for SQL injection detection &...
View Article[SX Password Dump Suite] Complete Set of Command-line Password Recovery Tools...
SX Password Dump Suite is the complete collection of all the FREE command-line based password recovery tools from SecurityXploded. It contains the latest version of all the password dump tools which...
View ArticlePython tools for Pentesters
If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This...
View Article[Wifislax 4.7 Final] Livecd de Auditorías Wireless
Una vez más nos satisface entregar una nueva versión del livecd de auditorías wireless wifislax. En esta versión 4.7 , el sistema esta construido con paquetes slackware-14.1 que por fin ha visto la luz...
View Article[WhiteHat Aviator] The Web’s most secure and private browser
A few weeks have passed and we’ve had an overwhelmingly positive response from the community for the Aviator Beta. As you can probably expect, the vast majority of comments we received were around...
View Article[Firefox Password Remover] Firefox Website Login Password Removal Tool
Firefox Password Remover is the free tool to quickly remove the stored website login passwords from Firefox.You can either remove selected ones or all of the stored passwords from the Firefox sign-on...
View Article[LANs.py] Capture and inject traffic on LAN
Multithreaded asynchronous packet parsing/injecting arp spoofer. Individually arpspoofs the target box, router and DNS server if necessary. Does not poison anyone else on the network. Displays all most...
View Article[WiFi Password Decryptor] Wireless Password Recovery Software
WiFi Password Decryptor is the FREE software to instantly recover Wireless account passwords stored on your system.It automatically recovers all type of Wireless Keys/Passwords (WEP/WPA/WPA2 etc)...
View Article[autosploit] Scripts that combine Nmap and Metasploit
Scripts that will combine Metasploit and Nmap without using Lua.Download autosploit
View Article[WebSurgery] Web application security testing suite
WebSurgery is a suite of tools for security testing of web applications. It was designed for security auditors to help them with web application planning and exploitation. Suite currently contains a...
View Article[Beleth] Multi-threaded SSH Password Auditor
Dictionary based SSH crackerUsage: ./beleth [OPTIONS] -c [payload] Execute payload on remote server once logged in -h Display this help -l [threads] Limit threads to given number. Default: 4 -p [port]...
View Article[MailPasswordDecryptor] All-in-one Mail Password Recovery Software
Mail Password Decryptor is the FREE software to instantly recover Mail Account passwords from popular email clients and other desktop applications.You can recover your lost password for email accounts...
View Article