The software is designed for recovering passwords to hashes, and it features the following: Supports over 330 hashing algorithms. Contains o...
Isowall - A mini-firewall that completely isolates a target device from the local network
This is a mini-firewall that completely isolates a target device from the local network. This is for allowing infected machines Internet acc...
CuckooAutoInstall - Auto Installer Script for Cuckoo Sandbox
What is Cuckoo Sandbox? In three words, Cuckoo Sandbox is a malware analysis system. What does that mean? It simply means that you can throw...
LinEnum - Local Linux Enumeration & Privilege Escalation Checks
LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet . It’s...
Crunch - Password Cracking Wordlist Generator
Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all poss...
Detekt - scans your Windows computer for traces of known surveillance spyware
Detekt is a free tool that scans your Windows computer for traces of FinFisher and Hacking Team RCS, commercial surveillance spyware that ha...
Lynis 1.6.4 - Security auditing tool for Unix/Linux systems
Lynis is an open source security auditing tool . Primary goal is to help users with auditing and hardening of Unix and Linux based systems...
DAMM - Differential Analysis of Malware in Memory
An open source memory analysis tool built on top of Volatility. It is meant as a proving ground for interesting new techniques to be made ...
Sparty - MS Sharepoint and Frontpage Auditing Tool
Sparty is an open source tool written in python to audit web applications using sharepoint and frontpage architecture. The motivation behind...