After ~2 months I am proud to announce that Bozok reached version 1.5. In this version i tried to fix all reported bugs and implement audi...

After ~2 months I am proud to announce that Bozok reached version 1.5. In this version i tried to fix all reported bugs and implement audi...
Malheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox envi...
The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources ...
Hashcat is the world’s fastest CPU-based password recovery tool. While it’s not as fast as its GPU counterparts oclHashcat-plus and oclHash...
Ghost Phisher is an application of security which comes built-in with a fake DNS server , DHCP server fake, fake HTTP Server a...
Kacak is a tool that can enumerate users specified in the configuration file for windows based networks. It uses metasploit smb_enumusers_d...
Un repositorio de mas de 200 herramientas relacionadas con todas las áreas de seguridad informática, actualizadas hasta la ultima versión di...
Lynis is a security tool to audit and harden Unix and Linux based systems. It scans the system by performing many security control checks, ...
An automated XSS payload generator written in python. Usage Record request(s) with Burp proxy Select request(s) you want to generate, then ...
GDB, the GNU Project debugger, allows you to see what is going on `inside' another program while it executes - or what another program w...
Capstone is a lightweight multi-platform, multi-architecture disassembly framework. Our target is to make Capstone the ultimate disassembly...
A small perl script that checks a target server whether it is prone to BEAST vulnerability via target preferred cipher. It assumes no work...
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, i...
Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flunym0...
Red Hat Enterprise Linux 7 Beta showcases hundreds of new features and enhancements, including: Linux Containers - Enabling applications...
Twitter Password Dump is the command-line tool to instantly recover your lost Twitter password from all the popular web browsers. Currentl...
Script in Ruby, for search passwords WiFi of remote routers. Support Routers: *] Thomson *] Thechnicolor in next days: *] bee *] ...
WinDbg is a graphical debugger from Microsoft. It is actually just one component of the Debugging Tools for Windows package, which also incl...
Avivore is a Python-based tool that searches Twitter for keywords and then parses any tweets that are found. When parsing, it looks for the...
If you have a suspicious file, please submit it online by using the form below. Once the file is submitted, COMODO Automated Analysis Syste...
The most common question from students who is learning website hacking techniques is "how to test my skills legally without getting i...
Anubis is a service for analyzing malware. Submit your Windows executable or Android APK and receive an analysis report telling you what ...
A Complete Suite Of Web Security Tools The Suite provides a complete and functional marketplace of highly integrated web application securi...
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be vie...
Bugtroid is an innovative tool developed by the team of Bugtraq-Team. The main features of this apk, is that it has more than 200 Android ...
Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easi...
Wifitap is a proof of concept for communication over WLAN networks using traffic injection. Wifitap allows direct communication with an ass...
VirusTotal, a subsidiary of Google, is a free online service that analyzes files and URLs enabling the identification of viruses,...
The 2.x stable series of the Tor Browser Bundle has officially been deprecated, and all users are encouraged to upgrade to the 3.5 series. P...
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine . This engine is not intended to just repla...
Rhino is an open-source implementation of JavaScript written entirely in Java. It is typically embedded into Java applications to provide ...
Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not f...
PDFMiner is a tool for extracting information from PDF documents. Unlike other PDF-related tools, it focuses entirely on getting and analyz...
GnuPG is the GNU project 's complete and free implementation of the OpenPGP standard as defined by RFC4880 . GnuPG allows to encrypt and...
Evasi0n Jailbreaking tools available for Apple iOS 7 users. This jailbreak utility/tool made by Evad3rs team after 3 months of iOS 7 launch...
The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. It uses ctypes ...