How it works Scan the networks. Select network. Capture handshake (can be used without handshake) We choose one of several web interfaces ta...
WiFiPhisher - Fast automated phishing attacks against WiFi networks
Wifiphisher is a security tool that mounts fast automated phishing attacks against WiFi networks in order to obtain secret passphrases and ...
Faraday v1.0.7 - Integrated Penetration-Test Environment a multiuser Penetration test IDE
Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution,...
SPARTA - Network Infrastructure Penetration Testing Tool
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the sca...
LUKS-OPs - Automate the usage of LUKS volumes in Linux
A bash script to automate the most basic usage of LUKS volumes in Linux. Like: Creating a virtual disk volume with LUKS format. Mounting an ...
Tcpcrypt - Encrypting the Internet
Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out ...
BlueMaho - Bluetooth Security Testing Suite
Blue Maho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on py...
RPEF - Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers
Router Post-Exploitation Framework Currently, the framework includes a number of firmware image modules: 'Verified' - This module ...
CeWL - Custom WordList Generator Tool for Password Cracking
CeWL is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words which ...
John the Ripper 1.8.0-jumbo-1 - Fast Password Cracker
John the Ripper is a free password cracking software tool. Initially developed for the Unix operating system, it now runs on fifteen differ...
PuttyRider - Hijack Putty sessions in order to sniff conversation and inject Linux commands
PuttyRider injects a DLL into a running putty.exe process in order to sniff all communication and inject Linux commands on the remote server...
Snort 3.0 - Network intrusion prevention and detection system (IDS/IPS)
Snort is the most powerful IPS in the world, setting the standard for intrusion detection. So when we started thinking about what the next g...
Android Studio - The official Android IDE
Android Studio is the official IDE for Android application development, based on IntelliJ IDEA . On top of the capabilities you expect from ...
THC-SmartBrute - Finds undocumented and secret commands implemented in a smartcard
This tool finds undocumented and secret commands implemented in a smartcard. An instruction is divided into Class (CLA), Instruction-Number ...
AutoScan-Network - Automatically scan your network
AutoScan-Network is a network scanner (discovering and managing application). No configuration is required to scan your network . The ...
THC-Hydra 8.1 - Network Logon Cracker
A very fast network logon cracker which support many different services. See feature sets and services coverage page - incl. a speed compa...
Samurai Web Testing Framework 3.0 - LiveCD Web Pen-testing Environment
The Samurai project team is happy to announce the release of a development version of the Samurai Web Testing Framework. Th...
Isowall - A mini-firewall that completely isolates a target device from the local network
This is a mini-firewall that completely isolates a target device from the local network. This is for allowing infected machines Internet acc...
CuckooAutoInstall - Auto Installer Script for Cuckoo Sandbox
What is Cuckoo Sandbox? In three words, Cuckoo Sandbox is a malware analysis system. What does that mean? It simply means that you can throw...
LinEnum - Local Linux Enumeration & Privilege Escalation Checks
LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet . It’s...