Ghost Phisher is an application of security which comes built-in with a fake DNS server , DHCP server fake, fake HTTP Server a...
[Kacak] Enumerate Users in Subnets
Kacak is a tool that can enumerate users specified in the configuration file for windows based networks. It uses metasploit smb_enumusers_d...
[Pengowin] Repositorio de herramientas de seguridad para Windows
Un repositorio de mas de 200 herramientas relacionadas con todas las áreas de seguridad informática, actualizadas hasta la ultima versión di...
[Lynis v1.3.8] The Unix/Linux Hardening tool
Lynis is a security tool to audit and harden Unix and Linux based systems. It scans the system by performing many security control checks, ...
[XSSless] An automated XSS payload generator written in python
An automated XSS payload generator written in python. Usage Record request(s) with Burp proxy Select request(s) you want to generate, then ...
[GDB] GNU Project Debugger
GDB, the GNU Project debugger, allows you to see what is going on `inside' another program while it executes - or what another program w...
[Capstone] Ultimate Disassembly Framework
Capstone is a lightweight multi-platform, multi-architecture disassembly framework. Our target is to make Capstone the ultimate disassembly...
[Beast-Check] SSL/TLS BEAST Vulnerability Check
A small perl script that checks a target server whether it is prone to BEAST vulnerability via target preferred cipher. It assumes no work...
[Watcher] passive Web-security scanner
Watcher is a runtime passive-analysis tool for HTTP-based Web applications. Being passive means it won't damage production systems, i...