PatrowlHears (Vulnerability Intelligence Center) :: Tools
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
PatrowlHears (Vulnerability Intelligence Center) :: Tools
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
WebReaver (Advanced Web Security Scanner) :: Framework
WebReaver is an elegant, easy to use and fully-automated, web application security security testing tool for Mac, Windows and Linux, sui...
Creepy (A Geolocation OSINT Tool) :: Tools
Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking ...
SubBrute (Subdomain Bruteforcer) :: Tools
SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of th...
WebSlayer (Brute Forcing Web Applications) :: Tools
WebSlayer is a tool designed for brute forcing Web Applications, it can be used for finding resources not linked (directories, servl...
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and p...
FireEye Commando VM : Distribution
CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Penetration testers comm...
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collec...
Raptor (Web Application Firewall) :: Tools
Raptor is an Open Source Tool, your focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’...
Katana (Penetration Testing) :: Framework
Katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to us...
Echo Mirage 3.1 :: Tools
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Mobile Security Framework (MobSF) : Framework
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing fram...
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
SpiderFoot (Open Source Footprinting) :: Tools
SpiderFoot is a free, open-source footprinting tool , enabling you to perform various scans against a given domain name in order to obta...
Suricata (IDS/IPS Engine) :: Tools
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just re...
EtherApe (Graphical Network Monitor) :: Tools
EtherApe is a graphical network monitor for Unix modeled after etherman . Featuring link layer, IP and TCP modes, it displays network ...
XSSYA v2.0 (Cross Site Scripting Vulnerability Confirmation) :: Tools
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation) written in python scripting language confirm the XSS Vulnerabili...
Distributed Network Attack (DNA) :: Framework
Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...
FoxAnalysis :: Tools
FoxAnalysis Plus is a software tool for extracting, viewing and analysing internet history from the Mozilla Firefox web browser...
Juli (MITM) :: Tools
A simple automated perl script for MiTM ( man-in-the-middle ) attacks. Requirements: Linux ( I tested it on Ubuntu 14.04 LTS ) Per...
Orbot (Tor for Android Devices) :: Tools
Orbot is a free proxy app that empowers other apps to use the internet more securely . Orbot uses Tor to encrypt your Internet traff...
Capstone (Disassembly Framework) :: Framework
Capstone is a lightweight multi-platform, multi-architecture disassembly framework . Our target is to make Capstone the ultimate disass...
Mandiant Redline (Memory and File Analysis) :: Tools
Redline, Mandiant’s premier free tool, provides host investigative capabilities to users to find signs of malicious activity throug...
Microsoft's Network Monitor (Capturing and Protocol Analysis of Network Traffic) :: Tools
Microsoft's Network Monitor is a tools that allow capturing and protocol analysis of network traffic . Network Monitor 3 is a proto...
WAIDPS (Wireless Auditing and IDS/IPS) :: Tools
WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and wo...
Detekt :: Malware Detection Tool against Government Surveillance
Detekt is a free tool that scans your Windows computer for traces of known surveillance spyware used to target and monitor human righ...