Overview: VMInjector is a tool designed to bypass OS login authentication screens of major operating systems running on VMware Workstatio...
[VMInjector] DLL Injection tool to unlock guest VMs
Overview: VMInjector is a tool designed to bypass OS login authentication screens of major operating systems running on VMware Works...
[PwnStar] Version with new Exploits
A bash script to launch a Soft AP, configurable with a wide variety of attack options. Includes a number of index.html and server php scrip...
[PwnStar] Version with new Exploits
A bash script to launch a Soft AP, configurable with a wide variety of attack options. Includes a number of index.html and server php sc...
[PwnPi v2.0] A Pen Test Drop Box distro for the Raspberry Pi
PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 114 network security tools pre-insta...
[PwnPi v2.0] A Pen Test Drop Box distro for the Raspberry Pi
PwnPi is a Linux-based penetration testing dropbox distribution for the Raspberry Pi. It currently has 114 network security tools pre-ins...
[NetSleuth] Open source Network Forensics And Analysis Tools
NetSleuth identifies and fingerprints network devices by silent network monitoring or by processing data from PCAP files. NetSleuth is an op...
[NetSleuth] Open source Network Forensics And Analysis Tools
NetSleuth identifies and fingerprints network devices by silent network monitoring or by processing data from PCAP files. NetSleuth i...
[TXDNS v 2.2.1] Aggressive multithreaded DNS digger
TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goa...
[TXDNS v 2.2.1] Aggressive multithreaded DNS digger
TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main ...
[SSLsplit 0.4.5] Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted t...
[SSLsplit 0.4.5] Tool for man-in-the-middle attacks against SSL/TLS encrypted network connections
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepte...
[Network Database Scanner v1.0] Software to remotely detect the type of Database services running on the network system
Network Database Scanner is the free software to remotely detect the type of Database services running on the network system. It can help y...
[Network Database Scanner v1.0] Software to remotely detect the type of Database services running on the network system
Network Database Scanner is the free software to remotely detect the type of Database services running on the network system. It can he...
[FTP Password Kracker] Crack FTP password
FTP Password Kracker is a free software to recover your lost FTP password directly from server. It uses brute-force password cracking method...
[FTP Password Kracker] Crack FTP password
FTP Password Kracker is a free software to recover your lost FTP password directly from server. It uses brute-force password cracking met...
[ShowWindows v1.0] Command-line Tool to Manage Open Windows
Show Windows is the command-line tool to manage Windows opened by all running Processes on your system. In addition to showing open Windows...
[ShowWindows v1.0] Command-line Tool to Manage Open Windows
Show Windows is the command-line tool to manage Windows opened by all running Processes on your system. In addition to showing open Wi...
[Dissy] Graphical frontend to the objdump disassembler
Dissy is a graphical frontend to the objdump disassembler. Dissy can be used for debugging and browsing compiler-generated code. Download ...
[Dissy] Graphical frontend to the objdump disassembler
Dissy is a graphical frontend to the objdump disassembler. Dissy can be used for debugging and browsing compiler-generated code.
[Diviner] OWASP Zed Attack Proxy Extension
Diviner is a unique platform that attempts to predict the structure of the server-side memory, source code and processes,by executing sc...
[Diviner] OWASP Zed Attack Proxy Extension
Diviner is a unique platform that attempts to predict the structure of the server-side memory, source code and processes,by executin...
[Patator Brute Forcer] v 0.4
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Currently it supports the following modules: * ftp_log...
[Patator Brute Forcer] v 0.4
Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage. Currently it supports the following modules: * ftp_log...
[360-FAAR] Firewall Analysis Audit And Repair 0.3.6
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to log...
[360-FAAR] Firewall Analysis Audit And Repair 0.3.6
360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, Perl firewall policy manipulation tool to filter, compare to ...
[GNUnet P2P Framework] v 0.9.4
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service ...
[GNUnet P2P Framework] v 0.9.4
GNUnet is a framework for secure peer-to-peer networking that does not use any centralized or otherwise trusted services. A first service ...
[Subterfuge] Beta Version 4.2
Automated Man-in-the-Middle Attack Framework Abstract: Enter Subterfuge , a Framework to t...
[Subterfuge] Beta Version 4.2
Automated Man-in-the-Middle Attack Framework Abstract: Enter Subterfuge , a Frame...
[Cookie Cadger] v.0.9
An auditing tool for Wi-Fi or wired Ethernet connections Cookie Cadger helps identify information leakage from applications that utilize...
[Cookie Cadger] v.0.9
An auditing tool for Wi-Fi or wired Ethernet connections Cookie Cadger helps identify information leakage from applications that ut...
[PySQLi] Python SQL injection framework
PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to bu...
[PySQLi] Python SQL injection framework
PySQLi is a python framework designed to exploit complex SQL injection vulnerabilities. It provides dedicated bricks that can be used to...
[ExploitShield Browser Edition] Forget about browser vulnerabilities
ExploitShield Browser Edition protects against all known and unknown 0-day day vulnerability exploits, protecting users where traditional...
[ExploitShield Browser Edition] Forget about browser vulnerabilities
ExploitShield Browser Edition protects against all known and unknown 0-day day vulnerability exploits, protecting users where tra...
[Spooftooph 0.5.2] Automated spoofing or cloning Bluetooth device
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allo...
[Spooftooph 0.5.2] Automated spoofing or cloning Bluetooth device
Spooftooph is designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively ...
[BeEF 0.4.3.8] Browser Exploitation Framework
The Browser Exploitation Framework (BeEF) is a powerful professional security tool. It is a penetration testing tool that focuses on the we...
[BeEF 0.4.3.8] Browser Exploitation Framework
The Browser Exploitation Framework (BeEF) is a powerful professional security tool. It is a penetration testing tool that focuses on the ...
[Joomscan] Now can identify 673 joomla vulnerabilities
Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have 673 joomla vulnerabilities Joomla...
[Joomscan] Now can identify 673 joomla vulnerabilities
Security Team Web-Center just released an updated for Joomscan Security Scanner. The new database Have 673 joomla vulnerabilities ...
[Wifi Honey] Creates fake APs using all encryption
This is a script, attack can use to creates fake APs using all encryption and monitors with Airodump. It automate the setup process, it cr...
[Wifi Honey] Creates fake APs using all encryption
This is a script, attack can use to creates fake APs using all encryption and monitors with Airodump. It automate the setup process, it ...
[JBoss Autopwn] JSP Hacking Tool For JBoss AS Server
This JBoss script deploys a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capab...
[JBoss Autopwn] JSP Hacking Tool For JBoss AS Server
This JBoss script deploys a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capa...
[Burp Suite] Free Edition v1.5
Burp Suite helps you secure your web applications by finding the vulnerabilities they contain. Burp Suite is an integrated platform for a...