How it works Scan the networks. Select network. Capture handshake (can be used without handshake) We choose one of several web interfaces ta...

How it works Scan the networks. Select network. Capture handshake (can be used without handshake) We choose one of several web interfaces ta...
Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and ...
SniffPass is small password monitoring software that listens to your network, capture the passwords that pass through your network adapter, ...
NetHunter is a Android penetration testing platform for Nexus and OnePlus devices built on top of Kali Linux, which includes some special an...
Acunetix Online Vulnerability Scanner acts as a virtual security officer for your company, scanning your websites, including integrated we...
La Primera herramienta de escáner de vulnerabilidades WEB, En entorno Android (Versión para iOS en desarrollo), este escáner de vulnerabili...
Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution,...
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the sca...
A bash script to automate the most basic usage of LUKS volumes in Linux. Like: Creating a virtual disk volume with LUKS format. Mounting an ...
Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out ...
Blue Maho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py...