1
0
mirror of https://github.com/byReqz/blackmate.git synced 2024-11-23 11:44:56 +00:00
This commit is contained in:
anyon3 2016-07-11 12:35:08 +08:00
parent 03da25c26a
commit 119bb0860c
48 changed files with 0 additions and 1434 deletions

View File

@ -1,3 +0,0 @@
ropeadope|1.1|A linux log cleaner.|http://www.highhacksociety.com/
secure-delete|3.1|Secure file, disk, swap, memory erasure utilities.|http://www.thc.org/
steghide|0.5.1|Embeds a message in a file by replacing some of the least significant bits|http://steghide.sourceforge.net

View File

@ -1,44 +0,0 @@
autopwn|177.2f3f605|Specify targets and run sets of tools against them.|https://github.com/nccgroup/autopwn
blueranger|1.0|A simple Bash script which uses Link Quality to locate Bluetooth device radios.|http://www.hackfromacave.com/projects/blueranger.html
brutex|43.6c199b1|Automatically brute force all services running on a target.|https://github.com/1N3/BruteX
cewl|5.1|A custom word list generator|http://www.digininja.org/projects/cewl.php
checksec|1.5|Tool designed to test which standard Linux OS and PaX security features are being used|http://www.trapkit.de/tools/checksec.html
cisco-snmp-enumeration|10.ad06f57|Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.|https://github.com/nccgroup/cisco-snmp-enumeration
clusterd|143.d190b2c|Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.|https://github.com/hatRiot/clusterd
crunch|3.6|A wordlist generator for all combinations/permutations of a given character set.|http://sourceforge.net/projects/crunch-wordlist/
dumb0|19.1493e74|A simple tool to dump users in popular forums and CMS.|https://github.com/0verl0ad/Dumb0
easy-creds|3.9|A bash script that leverages ettercap and other tools to obtain credentials.|https://github.com/brav0hax/easy-creds
easyda|7.0867f9b|Easy Windows Domain Access Script.|https://github.com/nccgroup/easyda
fstealer|0.1|Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.|http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html
gooscan|1.0.9|A tool that automates queries against Google search appliances, but with a twist.|http://johnny.ihackstuff.com/downloads/task,doc_details&Itemid=/gid,28/
hackersh|0.2.0|A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.|http://www.hackersh.org/
intersect|2.5|Post-exploitation framework|https://github.com/ohdae/Intersect.5
linset|9.8746b1f|Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.|https://github.com/vk496/linset
maskprocessor|0.73|A High-Performance word generator with a per-position configurable charset.|http://hashcat.net/wiki/doku.php?id=maskprocessor
masscan-automation|24.2df3467|Masscan integrated with Shodan API.|https://github.com/trevordavenport/MasscanAutomation
mitmap|0.1|Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.|http://www.darkoperator.com/tools-and-scripts/
msf-mpc|19.b18f793|Msfvenom payload creator.|https://github.com/g0tmi1k/mpc
mutator|51.164132d|This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012|https://bitbucket.org/alone/mutator/
nfspy|1.0|A Python library for automating the falsification of NFS credentials when mounting an NFS share.|https://github.com/bonsaiviking/NfSpy
nfsshell|19980519|Userland NFS command tool.|http://www.paramecium.org/~leendert/
panoptic|182.b5eae6b|A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.|https://github.com/lightos/Panoptic
pasv-agrsv|54.97c3551|Passive recon / OSINT automation script.|https://github.com/isaudits/pasv-agrsv
regeorg|29.f4db171|The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.|https://github.com/sensepost/reGeorg
rsmangler|1.4|rsmangler takes a wordlist and mangle it|http://www.randomstorm.com/rsmangler-security-tool.php
sakis3g|0.2.0e|An all-in-one script for connecting with 3G|http://www.sakis3g.org/
search1337|12.0887770|1337Day Online Exploit Scanner.|https://github.com/b3mb4m/Search1337
shodan|1.5.2|Python library for Shodan (https://developer.shodan.io).|http://github.com/achillean/shodan-python
simple-ducky|1.1.1|A payload generator.|https://code.google.com/p/simple-ducky-payload-generator
sipvicious|0.2.8|Tools for auditing SIP devices|http://blog.sipvicious.org
sn00p|0.8|A modular tool written in bourne shell and designed to chain and automate security tools and tests.|http://www.nullsecurity.net/tools/automation.html
sploitctl|48.5e7e3d6|Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.|https://github.com/BlackArch/sploitctl
statsprocessor|0.11|A high-performance word-generator based on per-position Markov-attack.|http://hashcat.net/wiki/doku.php?id=statsprocessor
tiger|3.2.3|A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.|http://www.nongnu.org/tiger/
tlssled|1.3|A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.|http://blog.taddong.com/2011/05/tlssled-v10.html
unix-privesc-check|1.4|Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases)|http://pentestmonkey.net/tools/audit/unix-privesc-check
username-anarchy|0.2|Tools for generating usernames when penetration testing.|http://www.morningstarsecurity.com/research/username-anarchy
veil|571.54d1d0e|A tool designed to generate metasploit payloads that bypass common anti-virus solutions.|https://github.com/veil-evasion/Veil
vlan-hopping|21.a37ba4e|Easy 802.1Q VLAN Hopping|https://github.com/nccgroup/vlan-hopping
voiphopper|2.04|A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.|http://voiphopper.sourceforge.net/
wikigen|8.348aa99|A script to generate wordlists out of wikipedia pages.|https://github.com/zombiesam/wikigen
wnmap|0.1|A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.|http://nullsecurity.net/tools/automation.html

View File

@ -1 +0,0 @@
cantoolz|275.ffc1761|Framework for black-box CAN network analysis https://asintsov.blogspot.de/.|https://github.com/eik00d/CANToolz

View File

@ -1,27 +0,0 @@
aesshell|0.7|A backconnect shell for Windows and Unix written in python and uses AES in CBC mode in conjunction with HMAC-SHA256 for secure transport.|https://packetstormsecurity.com/files/132438/AESshell.7.html
azazel|12.16ca8ac|A userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit.|https://github.com/chokepoint/azazel
backcookie|45.35fb0a3|Small backdoor using cookie.|https://github.com/mrjopino/backcookie
backdoor-factory|178.2d85ca4|Patch win32/64 binaries with shellcode.|https://github.com/secretsquirrel/the-backdoor-factory
backdoorme|193.1a31041|A powerful utility capable of backdooring Unix machines with a slew of backdoors.|https://github.com/Kkevsterrr/backdoorme
cymothoa|1|A stealth backdooring tool, that inject backdoor's shellcode into an existing process.|http://cymothoa.sourceforge.net/
dragon-backdoor|7.c7416b7|A sniffing, non binding, reverse down/exec, portknocking service Based on cd00r.c.|https://github.com/Shellntel/backdoors
enyelkm|1.2|Rootkit for Linux x86 kernels v2.6.|http://www.enye-sec.org/programas.html
gobd|81.e64b5a5|A Golang covert backdoor.|https://github.com/razc411/GoBD
hotpatch|0.2|Hot patches executables on Linux using .so file injection.|http://www.selectiveintellect.com/hotpatch.html
jynx2|2.0|An expansion of the original Jynx LD_PRELOAD rootkit|http://www.blackhatlibrary.net/Jynx2
meterssh|10.ebb6f4e|A way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection.|https://github.com/trustedsec/meterssh
ms-sys|2.5.3|A tool to write Win9x-.. master boot records (mbr) under linux - RTM!|http://ms-sys.sourceforge.net/
pyrasite|2.0|Code injection and introspection of running Python processes.|http://pyrasite.com/
rrs|1.70|A reverse (connecting) remote shell. Instead of listening for incoming connections it will connect out to a listener (rrs in listen mode). With tty support and more.|http://www.cycom.se/dl/rrs
rubilyn|0.0.1|64bit Mac OS-X kernel rootkit that uses no hardcoded address to hook the BSD subsystem in all OS-X Lion & below. It uses a combination of syscall hooking and DKOM to hide activity on a host.|http://nullsecurity.net/tools/backdoor.html
stegolego|8.85354f6|Simple program for using stegonography to hide data within BMP images.|https://github.com/razc411/StegoLeggo
syringe|1.9786f35|A General Purpose DLL & Code Injection Utility.|https://github.com/securestate/syringe
trixd00r|0.0.1|An advanced and invisible userland backdoor based on TCP/IP for UNIX systems.|http://nullsecurity.net/tools/backdoor.html
tsh|0.6|An open-source UNIX backdoor that compiles on all variants, has full pty support, and uses strong crypto for communication.|http://packetstormsecurity.com/search/?q=tsh
tsh-sctp|2.850a2da|An open-source UNIX backdoor.|https://github.com/infodox/tsh-sctp
u3-pwn|2.0|A tool designed to automate injecting executables to Sandisk smart usb devices with default U3 software install.|http://www.nullsecurity.net/tools/backdoor.html
unicorn|37.92ee45a|A simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory.|https://github.com/trustedsec/unicorn
webacoo|0.2.3|Web Backdoor Cookie Script-Kit.|https://bechtsoudis.com/webacoo/
webshells|14.112ea8c|Web Backdoors.|https://github.com/BlackArch/webshells
webspa|0.8|A web knocking tool, sending a single HTTP/S to run O/S commands.|http://sourceforge.net/projects/webspa/
weevely|688.10b3af9|Weaponized web shell.|http://epinna.github.io/Weevely/

View File

@ -1,27 +0,0 @@
androguard|796.bf653d6|Reverse engineering, Malware and goodware analysis of Android applications and more.|https://github.com/androguard/androguard
angr|3081.7289895|The next-generation binary analysis platform from UC Santa Barbara's Seclab.|https://github.com/angr/angr
binaryninja-python|13.83f59f7|Binary Ninja prototype written in Python.|https://github.com/Vector35/binaryninja-python
bindead|4504.67019b9|A static analysis tool for binaries|https://bitbucket.org/mihaila/bindead
bindiff|4.2.0|A comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.|http://www.zynamics.com/bindiff.html
binflow|4.c4140d7|POSIX function tracing. Much better and faster than ftrace.|https://github.com/elfmaster/binflow
binwally|4.0aabd8b|Binary and Directory tree comparison tool using the Fuzzy Hashing concept (ssdeep).|https://github.com/bmaia/binwally
bvi|1.4.0|A display-oriented editor for binary files operate like "vi" editor.|http://bvi.sourceforge.net/
bytecode-viewer|220.bca0f59|A Java 8/Android APK Reverse Engineering Suite.|https://github.com/Konloch/bytecode-viewer
detect-it-easy|50.6ae37ad|A program for determining types of files.|https://github.com/horsicq/Detect-It-Easy
dissector|1|This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux.|http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
ecfs|229.faf2fc2|Extended core file snapshot format.|https://github.com/elfmaster/ecfs
elfkickers|3.0a|Collection of ELF utilities (includes sstrip)|http://www.muppetlabs.com/~breadbox/software/elfkickers.html
elfparser|7.39d21ca|Cross Platform ELF analysis.|https://github.com/jacob-baines/elfparser
eresi|1263.c2b0bb6|The ERESI Reverse Engineering Software Interface.|https://github.com/thorkill/eresi
expimp-lookup|4.79a96c7|Looks for all export and import names that contain a specified string in all Portable Executable in a directory tree.|https://github.com/tr3w/ExpImp-Lookup
haystack|1756.61954a1|A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics.|https://github.com/trolldbois/python-haystack
hex2bin|2.1|Converts Motorola and Intel hex files to binary.|http://hex2bin.sourceforge.net/
imagejs|48.1faf262|Small tool to package javascript into a valid image file.|https://github.com/jklmnn/imagejs
oledump|0.0.22|Analyze OLE files (Compound File Binary Format). These files contain streams of data. This tool allows you to analyze these streams.|http://blog.didierstevens.com/programs/oledump-py/
oletools|0.44|Tools to analyze Microsoft OLE2 files.|http://www.decalage.info/python/oletools
packerid|1.4|Script which uses a PEiD database to identify which packer (if any) is being used by a binary.|http://handlers.sans.org/jclausing/
saruman|1.1a8e77d|ELF anti-forensics exec, for injecting full dynamic executables into process image (With thread injection).|https://github.com/elfmaster/saruman
soot|2.5.0|A Java Bytecode Analysis and Transformation Framework.|http://www.sable.mcgill.ca/soot
swftools|0.9.2|A collection of SWF manipulation and creation utilities|http://www.swftools.org/
upx|3.91|Ultimate executable compressor.|http://upx.sourceforge.net/
valgrind|3.11.0|A tool to help find memory-management problems in programs|http://valgrind.org/

View File

@ -1 +0,0 @@
truecrypt|7.1a|Free open-source cross-platform disk encryption software|http://www.truecrypt.org/

View File

@ -1,20 +0,0 @@
bluebugger|0.1|An implementation of the bluebug technique which was discovered by Martin Herfurt.|http://packetstormsecurity.com/files/54024/bluebugger.1.tar.gz.html
bluediving|0.9|A Bluetooth penetration testing suite.|http://bluediving.sourceforge.net/
bluelog|1.1.2|A Bluetooth scanner and sniffer written to do a single task, log devices that are in discoverable mode.|http://www.digifail.com/software/bluelog.shtml
bluepot|0.1|A Bluetooth Honeypot written in Java, it runs on Linux|https://code.google.com/p/bluepot/
blueprint|0.1_3|A perl tool to identify Bluetooth devices.|http://trifinite.org/trifinite_stuff_blueprinting.html
bluescan|1.0.6|A Bluetooth Device Scanner.|http://www.darknet.org.uk/2015/01/bluescan-bluetooth-device-scanner/
bluesnarfer|0.1|A bluetooth attacking tool|http://www.alighieri.org/project.html
braces|0.4|A Bluetooth Tracking Utility.|http://braces.shmoo.com/
bss|0.8|Bluetooth stack smasher / fuzzer|http://www.secuobs.com/news/15022006-bss_0_8.shtml
bt_audit|0.1.1|Bluetooth audit|http://www.betaversion.net/btdsd/download/
btcrack|1.1|The world's first Bluetooth Pass phrase (PIN) bruteforce tool. Bruteforces the Passkey and the Link key from captured Pairing exchanges.|http://www.nruns.com/_en/security_tools_btcrack.php
btscanner|2.1|Bluetooth device scanner.|http://www.pentest.co.uk
carwhisperer|0.2|Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys.|http://trifinite.org/trifinite_stuff_carwhisperer.html
ghettotooth|1.0|Ghettodriving for bluetooth|http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
hidattack|0.1|HID Attack (attacking HID host implementations)|http://mulliner.org/bluetooth/hidattack.php
obexstress|0.1|Script for testing remote OBEX service for some potential vulnerabilities.|http://bluetooth-pentest.narod.ru/
redfang|2.5|Finds non-discoverable Bluetooth devices by brute-forcing the last six bytes of the devices' Bluetooth addresses and calling read_remote_name().|http://packetstormsecurity.com/files/31864/redfang.2.5.tar.gz.html
spooftooph|0.5.2|Designed to automate spoofing or cloning Bluetooth device Name, Class, and Address. Cloning this information effectively allows Bluetooth device to hide in plain sight|http://www.hackfromacave.com/projects/spooftooph.html
tbear|1.5|Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.|http://freshmeat.net/projects/t-bear
ubertooth|2015.10.R1|A 2.4 GHz wireless development board suitable for Bluetooth experimentation. Open source hardware and software. Tools only.|https://github.com/greatscottgadgets/ubertooth/releases

View File

@ -1,10 +0,0 @@
cflow|1.4|A C program flow analyzer.|http://www.gnu.org/software/cflow/
cppcheck|1.74|A tool for static C/C++ code analysis|http://cppcheck.sourceforge.net/
cpptest|1.1.2|A portable and powerful, yet simple, unit testing framework for handling automated tests in C++.|http://cpptest.sourceforge.net/
dscanner|768.c5392e7|Swiss-army knife for D source code.|https://github.com/Hackerpilot/Dscanner
flawfinder|1.31|Searches through source code for potential security flaws.|http://www.dwheeler.com/flawfinder
mosca|89.954b309|Static analysis tool to find bugs like a grep unix command.|https://github.com/CoolerVoid/Mosca
pfff|0.29|Tools and APIs for code analysis, visualization and transformation|https://github.com/facebook/pfff
pscan|1.3|A limited problem scanner for C source files|http://deployingradius.com/pscan/
splint|3.1.2|A tool for statically checking C programs for security vulnerabilities and coding mistakes|http://www.splint.org/
yasca|2.1|Multi-Language Static Analysis Toolset.|http://www.scovetta.com/yasca.html

View File

@ -1,134 +0,0 @@
acccheck|0.2.1|A password dictionary attack tool that targets windows authentication via the SMB protocol.|http://labs.portcullis.co.uk/tools/acccheck/
against|0.2|A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.|http://nullsecurity.net/tools/cracker.html
asleap|2.2|Actively recover LEAP/PPTP passwords.|http://www.willhackforsushi.com/Asleap.html
beleth|36.0963699|A Multi-threaded Dictionary based SSH cracker.|https://github.com/chokepoint/Beleth
bgp-md5crack|0.1|RFC2385 password cracker|http://www.c0decafe.de/
bios_memimage|1.2|A tool to dump RAM contents to disk (aka cold boot attack).|http://citp.princeton.edu/memory/code/
bkhive|1.1.1|Program for dumping the syskey bootkey from a Windows NT/2K/XP system hive.|http://sourceforge.net/projects/ophcrack
blackhash|0.2|Creates a filter from system hashes|http://16s.us/blackhash/
bob-the-butcher|0.7.1|A distributed password cracker package.|http://btb.banquise.net/
bruteforce-wallet|19.62572dd|Try to find the password of an encrypted Peercoin (or Bitcoin,Litecoin, etc...) wallet file.|https://github.com/glv2/bruteforce-wallet
brutessh|0.6|A simple sshd password bruteforcer using a wordlist, it's very fast for internal networks. It's multithreads.|http://www.edge-security.com/edge-soft.php
bully|21.388df45|A wifi-protected-setup (WPS) brute force attack tool.|http://code.google.com/p/bully/
chapcrack|17.ae2827f|A tool for parsing and decrypting MS-CHAPv2 network handshakes.|https://github.com/moxie0/chapcrack
checkpwd|1.23|Oracle Password Checker (Cracker).|http://www.red-database-security.com/software/checkpwd.html
cintruder|0.2.0|An automatic pentesting tool to bypass captchas.|http://cintruder.sourceforge.net/
cisco-auditing-tool|1|Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts.|http://www.scrypt.net
cisco-ocs|0.2|Cisco Router Default Password Scanner.|http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner
cisco-scanner|0.2|Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris.|http://wayreth.eu.org/old_page/
cisco5crack|2.c4b228c|Crypt and decrypt the cisco enable 5 passwords.|https://github.com/madrisan/cisco7crack
cisco7crack|2.f1c21dd|Crypt and decrypt the cisco enable 7 passwords.|https://github.com/madrisan/cisco7crack
cmospwd|5.0|Decrypts password stored in CMOS used to access BIOS setup.|http://www.cgsecurity.org/wiki/CmosPwd
crackhor|2.ae7d83f|A Password cracking utility.|https://github.com/CoalfireLabs/crackHOR
crackle|71.20215f8|Crack and decrypt BLE encryption|https://github.com/mikeryan/crackle/
crackq|48.89b7318|Hashcrack.org GPU-accelerated password cracker.|https://github.com/vnik5287/Crackq
crackserver|33.e5763ab|An XMLRPC server for password cracking.|https://github.com/averagesecurityguy/crack
creddump|0.3|A python tool to extract various credentials and secrets from Windows registry hives.|https://code.google.com/p/creddump/
crowbar|77.67293cc|A brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supported by thc-hydra and other popular brute forcing tools.|https://github.com/galkan/crowbar
cupp|3.0|Common User Password Profiler|http://www.remote-exploit.org/?page_id=418
dbpwaudit|0.8|A Java tool that allows you to perform online audits of password quality for several database engines|http://www.cqure.net/wp/dbpwaudit/
depant|0.3a|Check network for services with default passwords.|http://midnightresearch.com/projects/depant/
device-pharmer|37.e0e6281|Opens 1K+ IPs or Shodan search results and attempts to login.|https://github.com/DanMcInerney/device-pharmer
dislocker|0.3|A tool to exploit the hash length extension attack in various hashing algorithms. With FUSE capabilities built in.|http://www.hsc.fr/ressources/outils/dislocker/
doozer|9.5cfc8f8|A Password cracking utility.|https://github.com/CoalfireLabs/crackHOR
dpeparser|beta002|Default password enumeration project|http://www.toolswatch.org/dpe/
eapmd5pass|1.4|An implementation of an offline dictionary attack against the EAP-MD5 protocol|http://www.willhackforsushi.com/?page_id=67
enabler|1|Attempts to find the enable password on a cisco system via brute force.|http://packetstormsecurity.org/cisco/enabler.c
evilize|0.2|Tool to create MD5 colliding binaries.|http://www.mathstat.dal.ca/~selinger/md5collision/
evilmaid|1.01|TrueCrypt loader backdoor to sniff volume password|http://theinvisiblethings.blogspot.com
facebrute|7.ece355b|This script tries to guess passwords for a given facebook account using a list of passwords (dictionary).|https://github.com/emerinohdz/FaceBrute
fang|20.4b176f3|A multi service threaded MD5 cracker.|https://github.com/evilsocket/fang
fcrackzip|1.0|Zip file password cracker|http://oldhome.schmorp.de/marc/fcrackzip.html
fern-wifi-cracker|222|WEP, WPA wifi cracker for wireless penetration testing|http://code.google.com/p/fern-wifi-cracker/
ftp-scanner|0.2.5|Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris.|http://wayreth.eu.org/old_page/
hashcat|3.00|A multithreaded cross platform hash cracker.|http://hashcat.net/hashcat/
hashcat-utils|1.2|Utilites for Hashcat|http://hashcat.net/wiki/doku.php?id=hashcat_utils
hasher|48.40173c5|A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally.|https://github.com/ChrisTruncer/Hasher
hashtag|0.41|A python script written to parse and identify password hashes.|https://github.com/SmeegeSec/HashTag
hostbox-ssh|0.1.1|A ssh password/account scanner.|http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/
htpwdscan|16.99697fc|A python HTTP weak pass scanner.|https://github.com/lijiejie/htpwdScan
hydra|8.2|A very fast network logon cracker which support many different services|https://www.thc.org/thc-hydra/
ibrute|12.3a6a11e|An AppleID password bruteforce tool. It uses Find My Iphone service API, where bruteforce protection was not implemented.|https://github.com/hackappcom/ibrute/
iheartxor|0.01|A tool for bruteforcing encoded strings within a boundary defined by a regular expression. It will bruteforce the key value range of 0x1 through 0x255.|http://hooked-on-mnemonics.blogspot.com.es/p/iheartxor.html
iisbruteforcer|15|HTTP authentication cracker. It's a tool that launchs an online dictionary attack to test for weak or simple passwords against protected areas on an IIS Web server.|http://www.open-labs.org/
ikecrack|1.00|An IKE/IPSec crack tool designed to perform Pre-Shared-Key analysis of RFC compliant aggressive mode authentication|http://sourceforge.net/projects/ikecrack/
inguma|0.1.1|A free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.|http://inguma.sourceforge.net
ipmipwn|6.74a08a8|IPMI cipher 0 attack tool.|https://github.com/AnarchyAngel/IPMIPWN
jbrute|0.99|Open Source Security tool to audit hashed passwords.|http://sourceforge.net/projects/jbrute/
john|1.8.0.jumbo1|John the Ripper password cracker|http://www.openwall.com/john
johnny|20120424|GUI for John the Ripper.|http://openwall.info/wiki/john/johnny
keimpx|165.aab7213|Tool to verify the usefulness of credentials across a network over SMB.|http://code.google.com/p/keimpx/
khc|0.2|A small tool designed to recover hashed known_hosts fiels back to their plain-text equivalents.|http://packetstormsecurity.com/files/87003/Known-Host-Cracker.2.html
ldap-brute|21.acc06e3|A semi fast tool to bruteforce values of LDAP injections over HTTP.|https://github.com/droope/ldap-brute
levye|84.5406303|A brute force tool which is support sshkey, vnckey, rdp, openvpn.|https://github.com/galkan/levye
lodowep|1.2.1|Lodowep is a tool for analyzing password strength of accounts on a Lotus Domino webserver system.|http://www.cqure.net/wp/lodowep/
mdcrack|1.2|MD4/MD5/NTLM1 hash cracker|http://c3rb3r.openwall.net/mdcrack/
medusa|2.2|Speedy, massively parallel and modular login brute-forcer for network|http://www.foofus.net/jmk/medusa/medusa.html
mfoc|0.10.7|Mifare Classic Offline Cracker|http://code.google.com/p/mfoc/
mkbrutus|1.0.2|Password bruteforcer for MikroTik devices or boxes running RouterOS.|http://mkbrutusproject.github.io/MKBRUTUS/
morxbook|1.0|A password cracking tool written in perl to perform a dictionary-based attack on a specific Facebook user through HTTPS.|http://www.morxploit.com/
morxbrute|1.01|A customizable HTTP dictionary-based password cracking tool written in Perl|http://www.morxploit.com/morxbrute/
morxbtcrack|1.0|Single Bitcoin private key cracking tool released.|http://www.morxploit.com/tools/
morxcoinpwn|1.0|Mass Bitcoin private keys brute forcing/Take over tool released.|http://www.morxploit.com/tools/
morxcrack|1.2|A cracking tool written in Perl to perform a dictionary-based attack on various hashing algorithm and CMS salted-passwords.|http://www.morxploit.com/morxcrack/
ncrack|0.4a|A high-speed network authentication cracking tool|http://nmap.org/ncrack/
oclhashcat|2.01|Worlds fastest WPA cracker with dictionary mutation engine.|http://hashcat.net/oclhashcat/
onesixtyone|0.7|An SNMP scanner that sends multiple SNMP requests to multiple IP addresses|http://labs.portcullis.co.uk/application/onesixtyone/
ophcrack|3.6.0|A free Windows password cracker based on rainbow tables|http://ophcrack.sourceforge.net
outlook-webapp-brute|1.61d7177|Microsoft Outlook WebAPP Brute.|https://github.com/lijiejie/OutLook_WebAPP_Brute
owabf|1.3|Outlook Web Access bruteforcer tool.|http://netsec.rs/70/tools.html
pack|0.0.4|Password Analysis and Cracking Kit|http://thesprawl.org/projects/pack/
passcracking|20131214|A little python script for sending hashes to passcracking.com and milw0rm|http://github.com/jensp/passcracking
passe-partout|0.1|Tool to extract RSA and DSA private keys from any process linked with OpenSSL. The target memory is scanned to lookup specific OpenSSL patterns.|http://www.hsc.fr/ressources/outils/passe-partout/index.html.en
patator|122.96eb9f9|A multi-purpose bruteforcer.|https://github.com/lanjelot/patator
pdfcrack|0.15|Password recovery tool for PDF-files.|http://pdfcrack.sourceforge.net/
pdgmail|1.0|A password dictionary attack tool that targets windows authentication via the SMB protocol|http://www.jeffbryner.com/code/pdgmail
pemcrack|11.a0fecd7|Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks.|https://github.com/robertdavidgraham/pemcrack
pemcracker|9.a741c93|Tool to crack encrypted PEM files.|https://github.com/bwall/pemcracker.git
phoss|0.1.13|Sniffer designed to find HTTP, FTP, LDAP, Telnet, IMAP4, VNC and POP3 logins.|http://www.phenoelit.org/fr/tools.html
php-mt-seed|3.2|PHP mt_rand() seed cracker|http://www.openwall.com/php_mt_seed/
php-rfi-payload-decoder|30.bd42caa|Decode and analyze RFI payloads developed in PHP.|https://github.com/bwall/PHP-RFI-Payload-Decoder
phrasendrescher|1.2.2|A modular and multi processing pass phrase cracking tool|http://www.leidecker.info/projects/phrasendrescher/
pipal|1.1|A password analyser|http://www.digininja.org/projects/pipal.php
pipeline|18.d90fc65|Designed to aid in targeted brute force password cracking attacks.|https://github.com/hirnschallsebastian/Pipeline2
pkcrack|1.2.2|A PkZip encryption cracker.|https://www.unix-ag.uni-kl.de/~conrad/krypto/pkcrack/download1.html
pyrit|0.4.0|WPA/WPA2-PSK attacking with gpu and cluster|https://code.google.com/p/pyrit
rainbowcrack|1.6|Password cracker based on the faster time-memory trade-off. With MySQL and Cisco PIX Algorithm patches.|http://project-rainbowcrack.com/
rarcrack|0.2|This program uses bruteforce algorithm to find correct password (rar, 7z, zip).|http://rarcrack.sourceforge.net/
rcracki-mt|0.7.0|A tool to perform rainbow table attacks on password hashes. It is intended for indexed/perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com|http://rcracki.sourceforge.net/
rdesktop-brute|1.5.0|It connects to windows terminal servers - Bruteforce patch included.|http://www.rdesktop.org/
ridenum|51.dc23c91|A null session RID cycle attack for brute forcing domain controllers.|https://github.com/trustedsec/ridenum
rlogin-scanner|0.2|Multithreaded rlogin scanner. Tested on Linux, OpenBSD and Solaris.|http://wayreth.eu.org/old_page/
rootbrute|0.1|Local root account bruteforcer.|http://www.packetstormsecurity.org/
rpdscan|2.a71b0f3|Remmina Password Decoder and scanner.|https://github.com/freakyclown/RPDscan
rsakeyfind|1.0|A tool to find RSA key in RAM.|http://citp.princeton.edu/memory/code/
samdump2|3.0.0|Dump password hashes from a Windows NT/2k/XP installation|http://sourceforge.net/projects/ophcrack/files/samdump2/
samydeluxe|2.2ed1bac|Automatic samdump creation script.|http://github.com/jensp/samydeluxe
sidguesser|1.0.5|Guesses sids/instances against an Oracle database according to a predefined dictionary file.|http://www.cqure.net/wp/tools/database/sidguesser/
sipcrack|0.2|A SIP protocol login cracker.|http://www.remote-exploit.org/codes_sipcrack.html
skul|14.e2c33ef|A PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).|https://github.com/cryptcoffee/skul
smbbf|0.9.1|SMB password bruteforcer.|http://packetstormsecurity.com/files/25381/smbbf.9.1.tar.gz.html
snmp-brute|15.64ec0ce|SNMP brute force, enumeration, CISCO config downloader and password cracking script.|https://github.com/SECFORCE/SNMP-Brute
speedpwn|8.3dd2793|An active WPA/2 Bruteforcer, original created to prove weak standard key generation in different ISP labeled routers without a client is connected.|https://gitorious.org/speedpwn/
sqlpat|1.0.1|This tool should be used to audit the strength of Microsoft SQL Server passwords offline.|http://www.cqure.net/wp/sqlpat/
ssh-privkey-crack|0.4|A SSH private key cracker.|https://code.google.com/p/lusas/
sshatter|1.2|Password bruteforcer for SSH.|http://www.nth-dimension.org.uk/downloads.php?id=34
sshscan|1.0|A horizontal SSH scanner that scans large swaths of IPv4 space for a single SSH user and pass.|https://github.com/getdual/scripts-n-tools/blob/master/sshscan.py
sshtrix|0.0.2|A very fast multithreaded SSH login cracker.|http://nullsecurity.net/tools/cracker.html
sslnuke|5.c5faeaa|Transparent proxy that decrypts SSL traffic and prints out IRC messages.|https://github.com/jtripper/sslnuke
sucrack|1.2.3|A multi-threaded Linux/UNIX tool for brute-force cracking local user accounts via su|http://labs.portcullis.co.uk/application/sucrack
tckfc|21.a32167e|TrueCrypt key file cracker.|https://github.com/Octosec/tckfc
tftp-bruteforce|0.1|TFTP-bruteforcer is a fast TFTP filename bruteforcer written in perl.|http://www.hackingexposedcisco.com/
thc-keyfinder|1.0|Finds crypto keys, encrypted data and compressed data in files by analyzing the entropy of parts of the file.|https://www.thc.org/releases.php
thc-pptp-bruter|0.1.4|A brute force program that works against pptp vpn endpoints (tcp port 1723).|http://www.thc.org
thc-smartbrute|1.0|This tool finds undocumented and secret commands implemented in a smartcard.|https://www.thc.org/thc-smartbrute/
ufo-wardriving|4|Allows you to test the security of wireless networks by detecting their passwords based on the router model|http://www.ufo-wardriving.com/
vnc-bypauth|0.0.1|Multi-threaded bypass authentication scanner for VNC servers <= 4.1.1.|http://pentester.fr/resources/tools/techno/VNC/VNC_bypauth/
vncrack|1.21|What it looks like: crack VNC.|http://phenoelit-us.org/vncrack
wifite|2.28fc5cd|A tool to attack multiple WEP and WPA encrypted networks at the same time.|http://code.google.com/p/wifite/
wmat|0.1|Automatic tool for testing webmail accounts.|http://netsec.rs/70/tools.html
wordbrutepress|28.8061c52|Python script that performs brute forcing against WordPress installs using a wordlist.|http://www.homelab.it/index.php/2014/11/03/wordpress-brute-force-multithreading/
wpbf|7.11b6ac1|Multithreaded WordPress brute forcer.|https://github.com/dejanlevaja/wpbf
wpbrute-rpc|3.e7d8145|Tool for amplified bruteforce attacks on wordpress based website via xmlrcp API.|https://github.com/zendoctor/wpbrute-rpc
wyd|0.2|Gets keywords from personal files. IT security/forensic tool.|http://www.remote-exploit.org/?page_id=418
zulu|0.1|A light weight 802.11 wireless frame generation tool to enable fast and easy debugging and probing of 802.11 networks.|http://sourceforge.net/projects/zulu-wireless/

View File

@ -1,34 +0,0 @@
aespipe|2.4d|Reads data from stdin and outputs encrypted or decrypted results to stdout.|http://loop-aes.sourceforge.net/aespipe/
auto-xor-decryptor|5.1f552be|Automatic XOR decryptor tool.|http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
b2sum|57.cb0506c|BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.|https://blake2.net/
bletchley|0.0.1|A collection of practical application cryptanalysis tools.|https://code.google.com/p/bletchley/
ciphertest|20.3224858|A better SSL cipher checker using gnutls.|https://github.com/OpenSecurityResearch/ciphertest
ciphr|105.db79691|A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.|https://github.com/frohoff/ciphr
codetective|39.7f44df4|A tool to determine the crypto/encoding algorithm used according to traces of its representation.|https://www.digitalloft.org/init/plugin_wiki/page/codetective
crypthook|17.0728cd1|TCP/UDP symmetric encryption tunnel wrapper.|https://github.com/chokepoint/CryptHook
cryptonark|0.5.6|SSL security checker.|http://blog.techstacks.com/cryptonark.html
findmyhash|1.1.2|Crack different types of hashes using free online services|http://code.google.com/p/findmyhash/
gnutls2|2.12.23|A library which provides a secure layer over a reliable transport layer (Version 2)|http://gnutls.org/
hashfind|8.e9a9a14|A tool to search files for matching password hash types and other interesting data.|https://github.com/rurapenthe/hashfind
hashid|397.7e8473a|Software to identify the different types of hashes used to encrypt data.|https://github.com/psypanda/hashID
hashpump|45.2d01d3b|A tool to exploit the hash length extension attack in various hashing algorithms.|https://github.com/bwall/HashPump
hdcp-genkey|18.e8d342d|Generate HDCP source and sink keys from the leaked master key.|https://github.com/rjw57/hdcp-genkey
kraken|32.368a837|A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.|http://opensource.srlabs.de/projects/a51-decrypt
luksipc|0.01|A tool to convert unencrypted block devices to encrypted LUKS devices in-place.|http://www.johannes-bauer.com/linux/luksipc
morxkeyfmt|1.0|Read a private key from stdin and output formatted data values.|http://www.morxploit.com/tools/
nomorexor|0.1|Tool to help guess a files 256 byte XOR key by using frequency analysis|https://github.com/hiddenillusion/NoMoreXOR
openstego|0.6.1|A tool implemented in Java for generic steganography, with support for password-based encryption of the data.|http://www.openstego.info/
outguess|0.2|A universal steganographic tool.|http://www.outguess.org/
pacumen|1.92a0884|Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).|https://github.com/bniemczyk/pacumen
pip3line|80.2e926b0|The Swiss army knife of byte manipulation.|https://github.com/nccgroup/pip3line
posttester|0.1|A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.|http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html
pwd-hash|2.0|A password hashing tool that use the crypt function to generate the hash of a string given on standard input.|http://vladz.devzero.fr/pwd-hash.php
sbd|1.36|Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more|http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=sbd
snow|20130616|Steganography program for concealing messages in text files.|http://darkside.com.au/snow/index.html
testssl|2.6|Testing TLS/SSL encryption.|https://github.com/drwetter/testssl.sh
tlsenum|77.b60e2c8|A command line tool to enumerate TLS cipher-suites supported by a server.|https://github.com/Ayrx/tlsenum
tlspretense|0.6.2|SSL/TLS client testing framework|https://github.com/iSECPartners/tlspretense
veracrypt|1.17|Disk encryption with strong security based on TrueCrypt|http://veracrypt.codeplex.com/
xorbruteforcer|0.1|Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.|http://eternal-todo.com/category/bruteforce
xorsearch|1.11.1|Program to search for a given string in an XOR, ROL or ROT encoded binary file.|http://blog.didierstevens.com/programs/xorsearch/
xortool|0.96|A tool to analyze multi-byte xor cipher.|https://github.com/hellman/xortool/

View File

@ -1,6 +0,0 @@
blindsql|1.0|Set of bash scripts for blind SQL injection attacks|http://www.enye-sec.org/programas.html
flamerobin|2370.c75f861|A tool to handle Firebird database management.|http://www.flamerobin.org/
getsids|0.0.1|Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing lsnrctl service.|http://www.cqure.net/wp/getsids/
metacoretex|0.8.0|MetaCoretex is an entirely JAVA vulnerability scanning framework for databases.|http://metacoretex.sourceforge.net/
mysql2sqlite|14.e5b2c31|Converts a mysqldump file into a Sqlite 3 compatible file.|https://gist.github.com/esperlu/943776
pgdbf|94.baa1d95|Convert XBase / FoxPro databases to PostgreSQL|https://github.com/kstrauser/pgdbf

View File

@ -1,8 +0,0 @@
edb|0.9.20|A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg.|http://www.codef00.com/projects.php#Debugger
gdb|7.11.1|The GNU Debugger|http://www.gnu.org/software/gdb/
lldb|3.8.0|Next generation, high-performance debugger|http://lldb.llvm.org/
ollydbg|201g|A 32-bit assembler-level analysing debugger|http://www.ollydbg.de
peda|1.1|Python Exploit Development Assistance for GDB|https://github.com/longld/peda
rr|4.2.0|A Record and Replay Framework.|https://github.com/mozilla/rr
shellnoob|2.1|A toolkit that eases the writing and debugging of shellcode|https://github.com/reyammer/shellnoob
vivisect|482.cae2a9d|A Python based static analysis and reverse engineering framework, Vdb is a Python based research/reversing focused debugger and programatic debugging API by invisigoth of kenshoto|http://visi.kenshoto.com/

View File

@ -1,4 +0,0 @@
jd-gui|1.4.0|A standalone graphical utility that displays Java source codes of .class files.|http://java.decompiler.free.fr/?q=jdgui
luyten|0.4.6|An Open Source Java Decompiler Gui for Procyon.|https://github.com/deathmarine/Luyten
procyon|0.5.30|A suite of Java metaprogramming tools focused on code generation and analysis.|https://bitbucket.org/mstrobel/procyon/
recstudio|4.0_20130717|Cross platform interactive decompiler|http://www.backerstreet.com/rec/rec.htm

View File

@ -1,16 +0,0 @@
arpon|2.7|A portable handler daemon that make ARP protocol secure in order to avoid the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks.|http://arpon.sourceforge.net/
artillery|163.e9ef627|A combination of a honeypot, file-system monitoring, system hardening, and overall health of a server to create a comprehensive way to secure a system.|https://www.trustedsec.com/downloads/artillery/
chkrootkit|0.50|Checks for rootkits on a system|http://www.chkrootkit.org/
ifchk|1.0.2|A network interface promiscuous mode detection tool.|http://www.noorg.org/ifchk/
inetsim|1.2.5|A software suite for simulating common internet services in a lab environment, e.g. for analyzing the network behaviour of unknown malware samples.|http://www.inetsim.org
jhead|3.00|EXIF JPEG info parser and thumbnail remover|http://www.sentex.net/~mwandel/jhead/
malmon|0.3|Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor.|http://sourceforge.net/projects/malmon/
mat|0.6.1|Metadata Anonymisation Toolkit composed of a GUI application, a CLI application and a library.|https://mat.boum.org/
portspoof|100.70b6bf2|This program's primary goal is to enhance OS security through a set of new techniques.|http://portspoof.org/
sniffjoke|0.4.1|Injects packets in the transmission flow that are able to seriously disturb passive analysis like sniffing, interception and low level information theft.|http://www.delirandom.net/sniffjoke/
snort|2.9.8.2|A lightweight network intrusion detection system.|http://www.snort.org
suricata|3.0.1|An Open Source Next Generation Intrusion Detection and Prevention Engine.|http://openinfosecfoundation.org/index.php/download-suricata
tabi|6.6654ceb|BGP Hijack Detection.|https://github.com/ANSSI-FR/tabi
tor-autocircuit|0.2|Tor Autocircuit was developed to give users a finer control over Tor circuit creation. The tool exposes the functionality of TorCtl library which allows its users to control circuit length, speed, geolocation, and other parameters.|http://www.thesprawl.org/projects/tor-autocircuit/
tor-browser-en|6.0.2|Tor Browser Bundle: Anonymous browsing using firefox and tor|https://www.torproject.org/projects/torbrowser.html.en
vidalia|0.2.21|Controller GUI for Tor.|https://www.torproject.org/vidalia

View File

@ -1 +0,0 @@
python2-binaryornot|0.4.0|Ultra-lightweight pure Python package to check if a file is binary or text.|https://github.com/audreyr/binaryornot

View File

@ -1,10 +0,0 @@
binnavi|6.1.0|A binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.|https://github.com/google/binnavi
binwalk|2.1.1|A tool for searching a given binary image for embedded files|http://binwalk.org
dissy|10|A graphical frontend to the objdump disassembler for compiler-generated code.|http://dissy.googlecode.com/
frida|284.79d63f5|An interactive disassembler based on LLVM and Qt.|https://www.frida.xyz/
libdisasm|0.23|A disassembler library.|http://bastard.sourceforge.net/libdisasm.html
marc4dasm|6.f11860f|This python-based tool is a disassembler for the Atmel MARC4 (a 4 bit Harvard micro).|https://github.com/ApertureLabsLtd/marc4dasm
pwntools|2.2.0|The CTF framework used by #Gallopsled in every CTF.|https://github.com/Gallopsled/pwntools
reverse|795.6617456|Reverse engineering tool for x86/ARM/MIPS. Generates indented pseudo-C with colored syntax code.|https://github.com/joelpx/reverse
smali|2.1.1|An assembler/disassembler for Android's dex format|https://github.com/JesusFreke/smali
viper|1096.1637f84|A Binary analysis framework.|https://github.com/botherder/viper

View File

@ -1,22 +0,0 @@
42zip|42|Recursive Zip archive bomb.|http://blog.fefe.de/?ts=b6cea88d
davoset|1.2.8|A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites.|http://websecurity.com.ua/davoset/
dnsdrdos|0.1|Proof of concept code for distributed DNS reflection DoS.|http://nullsecurity.net/tools/dos.html
goldeneye|16.7a38fe9|A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache.|https://github.com/jseidl/GoldenEye
hulk|11.a9b9ad4|A webserver DoS tool (Http Unbearable Load King) ported to Go with some additional features.|https://github.com/grafov/hulk
hwk|0.4|Collection of packet crafting and wireless network flooding tools|http://www.nullsecurity.net/
iaxflood|0.1|IAX flooder.|http://www.hackingexposedvoip.com/
inviteflood|2.0|Flood a device with INVITE requests|https://launchpad.net/~wagungs/+archive/kali-linux/+build/4386635
mausezahn|0.40|A free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.|http://www.perihel.at/sec/mz/
network-app-stress-tester|19.df75391|Network Application Stress Testing Yammer.|https://github.com/PherricOxide/Network-App-Stress-Tester
nkiller2|2.0|A TCP exhaustion/stressing tool.|http://sock-raw.org/projects.html
phpstress|5.f987a7e|A PHP denial of service / stress test for Web Servers running PHP-FPM or PHP-CGI.|https://github.com/nightlionsecurity/phpstress
shitflood|14.e74fc42|A Socks5 clone flooder for the Internet Relay Chat (IRC) protocol.|https://github.com/acidvegas/shitflood
siege|4.0.2|An http regression testing and benchmarking utility|http://www.joedog.org/JoeDog/Siege
slowhttptest|1.6|A highly configurable tool that simulates application layer denial of service attacks.|http://code.google.com/p/slowhttptest
slowloris|0.7|A tool which is written in perl to test http-server vulnerabilites for connection exhaustion denial of service (DoS) attacks so you can enhance the security of your webserver.|http://ha.ckers.org/slowloris/
synflood|0.1|A very simply script to illustrate DoS SYN Flooding attack.|http://thesprawl.org/projects/syn-flooder/
t50|5.5|Experimental Multi-protocol Packet Injector Tool.|http://t50.sourceforge.net/
tcgetkey|0.1|A set of tools that deal with acquiring physical memory dumps via FireWire and then scan the memory dump to locate TrueCrypt keys and finally decrypt the encrypted TrueCrypt container using the keys.|http://packetstormsecurity.com/files/119146/tcgetkey.1.html
thc-ssl-dos|1.4|A tool to verify the performance of SSL. To be used in your authorized and legitimate area ONLY. You need to accept this to make use of it, no use for bad intentions, you have been warned!|http://www.thc.org/thc-ssl-dos/
torshammer|1.0|A slow POST Denial of Service testing tool written in Python.|http://sourceforge.net/projects/torshammer/
ufonet|19.0287655|A tool designed to launch DDoS attacks against a target, using 'Open Redirect' vectors on third party web applications, like botnet.|https://github.com/epsylon/ufonet

View File

@ -1,3 +0,0 @@
missionplanner|1.2.55|A GroundControl Station for Ardupilot.|https://code.google.com/p/ardupilot-mega/wiki/Mission
skyjack|8.8b0a57c|Takes over Parrot drones, deauthenticating their true owner and taking over control, turning them into zombie drones under your own control.|https://github.com/samyk/skyjack
snoopy-ng|128.eac73f5|A distributed, sensor, data collection, interception, analysis, and visualization framework.|https://github.com/sensepost/snoopy-ng

View File

@ -1,86 +0,0 @@
aggroargs|50.d56728a|Bruteforce commandline buffer overflows, linux, aggressive arguments.|https://github.com/tintinweb/aggroArgs
armitage|150813|A graphical cyber attack management tool for Metasploit.|http://www.fastandeasyhacking.com/
armscgen|75.fdf2ff3|ARM Shellcode Generator (Mostly Thumb Mode).|https://github.com/alexpark07/ARMSCGen
arpoison|0.7|The UNIX arp cache update utility|http://www.arpoison.net
bed|0.5|Collection of scripts to test for buffer overflows, format string vulnerabilities.|http://www.aldeid.com/wiki/Bed
beef|0.4.7.0.195.g5fb1fa3|The Browser Exploitation Framework that focuses on the web browser|http://beefproject.com/
bfbtester|2.0.1|Performs checks of single and multiple argument command line overflows and environment variable overflows|http://sourceforge.net/projects/bfbtester/
binex|1.0|Format String exploit building tool.|http://www.morxploit.com/morxtool
bitdump|34.6a5cbd8|A tool to extract database data from a blind SQL injection vulnerability.|https://github.com/nbshelton/bitdump
blind-sql-bitshifting|52.2325724|A blind SQL injection module that uses bitshfting to calculate characters.|https://github.com/libeclipse/blind-sql-bitshifting
bowcaster|172.a2b084f|A framework intended to aid those developing exploits by providing useful set of tools and modules, such as payloads, encoders, connect-back servers, etc. Currently the framework is focused on the MIPS CPU architecture, but the design is intended to be modular enough to support arbitrary architectures.|https://github.com/zcutlip/bowcaster
chw00t|31.19a0726|Unices chroot breaking tool.|https://github.com/earthquake/chw00t
cisco-global-exploiter|1.3|A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products.|http://www.blackangels.it
cisco-torch|0.4b|Cisco Torch mass scanning, fingerprinting, and exploitation tool.|http://www.arhont.com
darkd0rk3r|1.0|Python script that performs dork searching and searches for local file inclusion and SQL injection errors.|http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html
darkmysqli|1.6|Multi-Purpose MySQL Injection Tool|https://github.com/BlackArch/darkmysqli
delorean|7.68139d1|NTP Main-in-the-Middle tool.|https://github.com/PentesterES/Delorean
dotdotpwn|3.0|The Transversal Directory Fuzzer|http://dotdotpwn.blogspot.com
encodeshellcode|0.1b|This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code.|http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html
enteletaor|64.399d107|Message Queue & Broker Injection tool that implements attacks to Redis, RabbitMQ and ZeroMQ.|https://github.com/cr0hn/enteletaor
exploit-db|1.6|The Exploit Database (EDB) an ultimate archive of exploits and vulnerable software - A collection of hacks|http://www.exploit-db.com
exploitpack|14.0c845d1|Exploit Pack - Project.|https://github.com/juansacco/exploitpack
eyepwn|1.0|Exploit for Eye-Fi Helper directory traversal vulnerability|http://www.pentest.co.uk
fimap|1.00|A little tool for local and remote file inclusion auditing and exploitation|http://code.google.com/p/fimap/
firstexecution|6.a275793|A Collection of different ways to execute code outside of the expected entry points.|https://github.com/nccgroup/firstexecution
formatstringexploiter|27.cd54eac|Helper script for working with format string bugs.|https://github.com/Owlz/formatStringExploiter
fs-exploit|3.28bb9bb|Format string exploit generation.|https://github.com/miaouPlop/fs
hackredis|1.67eeb6c|A simple tool to scan and exploit redis servers.|https://github.com/Ridter/hackredis
hamster|2.0.0|Tool for HTTP session sidejacking.|http://hamster.erratasec.com/
hcraft|1.0.0|HTTP Vuln Request Crafter|http://sourceforge.net/projects/hcraft/
hqlmap|38.bb6ab46|A tool to exploit HQL Injections.|https://github.com/PaulSec/HQLmap
htexploit|0.77|A Python script that exploits a weakness in the way that .htaccess files can be configured to protect a web directory with an authentication process|http://www.mkit.com.ar/labs/htexploit/
htshells|79.399feaa|Self contained web shells and other attacks via .htaccess files.|https://github.com/wireghoul/htshells
inception|432.e38dd7b|A FireWire physical memory manipulation and hacking tool exploiting IEEE 1394 SBP DMA.|http://www.breaknenter.org/projects/inception/
irpas|0.10|Internetwork Routing Protocol Attack Suite.|http://phenoelit-us.org/irpas
jboss-autopwn|1.3bc2d29|A JBoss script for obtaining remote shell access.|https://github.com/SpiderLabs/jboss-autopwn
katana|0.0.0.8|A framework that seekss to unite general auditing tools, which are general pentesting tools (Network,Web,Desktop and others).|http://sourceforge.net/projects/katanas/
killerbee|99|Framework and tools for exploiting ZigBee and IEEE 802.15.4 networks.|https://code.google.com/p/killerbee/
leroy-jenkins|3.bdc3965|A python tool that will allow remote execution of commands on a Jenkins server and its nodes.|https://github.com/captainhooligan/Leroy-Jenkins
lfi-autopwn|3.0|A Perl script to try to gain code execution on a remote server via LFI|http://www.blackhatlibrary.net/Lfi_autopwn.pl
lisa.py|30.622f9fe|An Exploit Dev Swiss Army Knife.|https://github.com/ant4g0nist/lisa.py
metasploit|38754.fd07da3|An open source platform that supports vulnerability research, exploit development and the creation of custom security tools representing the largest collection of quality-assured exploits.|http://www.metasploit.com
minimysqlator|0.5|A multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities.|http://www.scrt.ch/en/attack/downloads/mini-mysqlat0r
miranda-upnp|1.3|A Python-based Universal Plug-N-Play client application designed to discover, query and interact with UPNP devices|http://code.google.com/p/miranda-upnp/
mitmf|430.2dc1dd4|A Framework for Man-In-The-Middle attacks written in Python.|https://github.com/byt3bl33d3r/MITMf
mosquito|39.fe54831|XSS exploitation tool - access victims through HTTP proxy.|https://github.com/koto/mosquito
opensvp|64.56b2b8f|A security tool implementing "attacks" to be able to the resistance of firewall to protocol level attack.|https://github.com/regit/opensvp
osueta|68.827593a|A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.|https://github.com/c0r3dump3d/osueta
otori|0.3|A python-based toolbox intended to allow useful exploitation of XML external entity ("XXE") vulnerabilities.|http://www.beneaththewaves.net/Software/On_The_Outside_Reaching_In.html
padbuster|0.3.3|Automated script for performing Padding Oracle attacks.|http://www.gdssecurity.com/l/t.php
pirana|0.3.1|Exploitation framework that tests the security of a email content filter.|http://www.guay-leroux.com/projects.html
pmcma|1.00|Automated exploitation of invalid memory writes (being them the consequences of an overflow in a writable section, of a missing format string, integer overflow, variable misuse, or any other type of memory corruption).|http://packetstormsecurity.com/files/104724/Post-Memory-Corruption-Memory-Analyzer.00.html
pompem|85.a2dc2bb|A python exploit tool finder.|https://github.com/rfunix/Pompem
powersploit|321.262a260|A PowerShell Post-Exploitation Framework.|https://github.com/mattifestation/PowerSploit
ptf|530.c5fc34e|The Penetration Testers Framework is a way for modular support for up-to-date tools.|https://github.com/trustedsec/ptf
rebind|0.3.4|DNS Rebinding Tool|http://code.google.com/p/rebind/
rext|40.43ca8f6|Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.|https://github.com/j91321/rext
rfcat|150225|RF ChipCon-based Attack Toolset.|http://code.google.com/p/rfcat
ropeme|1.0|ROPME is a set of python scripts to generate ROP gadgets and payload.|http://www.vnsecurity.net/2010/08/ropeme-rop-exploit-made-easy/
ropgadget|5.4|Lets you search your gadgets on your binaries (ELF format) to facilitate your ROP exploitation.|https://github.com/JonathanSalwan/ROPgadget
ropper|1.10.7|Show information about binary files and find gadgets to build rop chains for different architectures|https://github.com/sashs/Ropper
roputils|189.07fc123|A Return-oriented Programming toolkit.|https://github.com/inaz2/roputils
routersploit|285.3e39991|The Router Exploitation Framework.|https://github.com/reverse-shell/routersploit
rp|136.5f0841c|A full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries.|https://github.com/0vercl0k/rp
rspet|97.70cd210|A Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.|https://github.com/panagiks/RSPET
shellcodecs|0.1|A collection of shellcode, loaders, sources, and generators provided with documentation designed to ease the exploitation and shellcode programming process.|http://www.blackhatlibrary.net/Shellcodecs
shellme|3.8c7919d|Because sometimes you just need shellcode and opcodes quickly. This essentially just wraps some nasm/objdump calls into a neat script.|https://github.com/hatRiot/shellme
shellsploit-framework|256.8198e14|New Generation Exploit Development Kit.|https://github.com/b3mb4m/shellsploit-framework
shocker|60.239286f|A tool to find and exploit servers vulnerable to Shellshock.|https://github.com/nccgroup/shocker
snarf-mitm|40.49cc8cb|SMB Man in the Middle Attack Engine / relay suite.|https://github.com/purpleteam/snarf
sqlninja|0.2.999|A tool targeted to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end.|http://sqlninja.sourceforge.net/
sqlsus|0.7.2|An open source MySQL injection and takeover tool, written in perl|http://sqlsus.sourceforge.net/
stackflow|2.2af525d|Universal stack-based buffer overfow exploitation tool.|https://github.com/d4rkcat/stackflow
subterfuge|5.0|Automated Man-in-the-Middle Attack Framework|http://kinozoa.com
tcpjunk|2.9.03|A general tcp protocols testing and hacking utility.|http://code.google.com/p/tcpjunk
unibrute|1.b3fb4b7|Multithreaded SQL union bruteforcer.|https://github.com/GDSSecurity/Unibrute
viproy-voipkit|2.99.1|VoIP Pen-Test Kit for Metasploit Framework|http://viproy.com/
webexploitationtool|155.85bcf0e|A cross platform web exploitation toolkit.|https://github.com/AutoSecTools/WebExploitationTool
websploit|3.0.0|An Open Source Project For, Social Engineering Works, Scan, Crawler & Analysis Web, Automatic Exploiter, Support Network Attacks|http://code.google.com/p/websploit/
wildpwn|9.379f0da|Unix wildcard attacks.|https://github.com/localh0t/wildpwn
wsuspect-proxy|22.0f79a2f|A tool for MITM'ing insecure WSUS connections.|https://github.com/ctxis/wsuspect-proxy
xcat|0.7.1|A command line tool to automate the exploitation of blind XPath injection vulnerabilities.|https://github.com/orf/xcat
xpl-search|42.d4dbc97|Search exploits in multiple exploit databases!.|https://github.com/CoderPirata/XPL-SEARCH
xxeinjector|51.55015d1|Tool for automatic exploitation of XXE vulnerability using direct and different out of band methods.|https://github.com/enjoiz/XXEinjector
yinjector|0.1|A MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.|http://packetstormsecurity.com/files/98359/yInjector-MySQL-Injection-Tool.html
zarp|0.1.8|A network attack tool centered around the exploitation of local networks.|https://defense.ballastsecurity.net/wiki/index.php/Zarp

View File

@ -1,21 +0,0 @@
asp-audit|2BETA|An ASP fingerprinting tool and vulnerability scanner.|http://seclists.org/basics/2006/Sep/128
blindelephant|7|A web application fingerprinter. Attempts to discover the version of a (known) web application by comparing static files at known locations|http://blindelephant.sourceforge.net/
cms-explorer|1.0|Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running|http://code.google.com/p/cms-explorer
complemento|0.7.6|A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever|http://complemento.sourceforge.net
dhcpf|2.96bc8a9|Passive DHCP fingerprinting implementation.|https://github.com/elceef/dhcpf
dnsmap|0.30|Passive DNS network mapper|http://dnsmap.googlecode.com
fl0p|0.1|A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks.|http://lcamtuf.coredump.cx/
fpdns|20130404|Program that remotely determines DNS server versions.|https://github.com/kirei/fpdns
ftpmap|52.cbeabbe|Scans remote FTP servers to identify what software and what versions they are running.|http://wcoserver.googlecode.com/files/
htrosbif|134.9dc3f86|Active HTTP server fingerprinting and recon tool.|https://github.com/lkarsten/htrosbif
httprint|301|A web server fingerprinting tool.|http://www.net-square.com/httprint.html
lbmap|145.93e6b71|Proof of concept scripts for advanced web application fingerprinting, presented at OWASP AppSecAsia 2012.|https://github.com/wireghoul/lbmap
mwebfp|16.a800b98|Mass Web Fingerprinter.|https://github.com/falcon-lnhg/mwebfp
neighbor-cache-fingerprinter|83.f1e596f|An ARP based Operating System version scanner.|https://github.com/PherricOxide/Neighbor-Cache-Fingerprinter
nimbostratus|54.c7c206f|Tools for fingerprintinging and exploiting Amazon cloud infrastructures.|https://github.com/andresriancho/nimbostratus
p0f|3.09b|Purely passive TCP/IP traffic fingerprinting tool|http://lcamtuf.coredump.cx/p0f3/
propecia|2|A fast class scanner that scans for a specified open port with banner grabbing|http://www.redlevel.org
sinfp|1.22|A full operating system stack fingerprinting suite.|http://www.networecon.com/tools/sinfp/
smtpmap|0.8.234_BETA|Tool to identify the running smtp software on a given host.|http://www.projectiwear.org/~plasmahh/software.html
smtpscan|0.5|An SMTP scanner|http://packetstormsecurity.com/files/31102/smtpscan.5.tar.gz.html
xprobe2|0.3|An active OS fingerprinting tool.|http://sourceforge.net/apps/mediawiki/xprobe/index.php?title=Main_Page

View File

@ -1,3 +0,0 @@
firmwalker|69.dd1ef71|Script for searching the extracted firmware file system for goodies.|https://github.com/craigz28/firmwalker
firmware-mod-kit|099|Modify firmware images without recompiling.|http://code.google.com/p/firmware-mod-kit
uefi-firmware-parser|141.fc50c86|Parse BIOS/Intel ME/UEFI firmware related structures: Volumes, FileSystems, Files, etc|https://github.com/theopolis/uefi-firmware-parser

View File

@ -1,66 +0,0 @@
aesfix|1.0.1|A tool to find AES key in RAM|http://citp.princeton.edu/memory/code/
aeskeyfind|1.0|A tool to find AES key in RAM|http://citp.princeton.edu/memory/code/
afflib|3.7.4|An extensible open format for the storage of disk images and related forensic information.|http://www.afflib.org
aimage|3.2.5|A program to create aff-images.|http://www.afflib.org
air|2.0.0|A GUI front-end to dd/dc3dd designed for easily creating forensic images.|http://air-imager.sourceforge.net/
autopsy|2.24|A GUI for The Sleuth Kit.|http://www.sleuthkit.org/autopsy
bmap-tools|3.2|Tool for copying largely sparse files using information from a block map file.|http://git.infradead.org/users/dedekind/bmap-tools.git
bulk-extractor|1.5.5|Bulk Email and URL extraction tool.|https://github.com/simsong/bulk_extractor
canari|1.1|A transform framework for maltego|http://www.canariproject.com/
captipper|66.98d63eb|Malicious HTTP traffic explorer tool.|http://www.omriher.com/2015/01/captipper-malicious-http-traffic.html
casefile|1.0.1|The little brother to Maltego without transforms, but combines graph and link analysis to examine links between manually added data to mind map your information|http://www.paterva.com/web6/products/casefile.php
chaosmap|1.3|An information gathering tool and dns / whois / web server scanner|http://freecode.com/projects/chaosmap
chntpw|140201|Offline NT Password Editor - reset passwords in a Windows NT SAM user database file|http://pogostick.net/~pnh/ntpasswd/
chromefreak|24.12745b1|A Cross-Platform Forensic Framework for Google Chrome|http://osandamalith.github.io/ChromeFreak/
dc3dd|7.2.641|A patched version of dd that includes a number of features useful for computer forensics.|http://sourceforge.net/projects/dc3dd
dcfldd|1.3.4.1|DCFL (DoD Computer Forensics Lab) dd replacement with hashing|http://dcfldd.sourceforge.net/
ddrescue|1.21|GNU data recovery tool|http://www.gnu.org/software/ddrescue/ddrescue.html
dumpzilla|03152013|A forensic tool for firefox.|http://www.dumpzilla.org/
eindeutig|20050628_1|Examine the contents of Outlook Express DBX email repository files (forensic purposes)|http://www.jonesdykstra.com/
exiv2|0.25|Exif, Iptc and XMP metadata manipulation library and tools|http://exiv2.org
extundelete|0.2.4|Utility for recovering deleted files from ext2, ext3 or ext4 partitions by parsing the journal|http://extundelete.sourceforge.net
foremost|1.5.7|A console program to recover files based on their headers, footers, and internal data structures|http://foremost.sourceforge.net/
galleta|20040505_1|Examine the contents of the IE's cookie files for forensic purposes|http://www.jonesdykstra.com/
grokevt|0.5.0|A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files.|http://code.google.com/p/grokevt/
guymager|0.8.1|A forensic imager for media acquisition.|http://guymager.sourceforge.net/
hashdeep|4.4|Advanced checksum hashing tool.|http://md5deep.sourceforge.net/
indxparse|166.14839a6|A Tool suite for inspecting NTFS artifacts.|http://www.williballenthin.com/forensics/mft/indxparse/
interrogate|0.0.4|A proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system), first and foremost for memory dump analysis and forensic usage.|https://github.com/carmaa/interrogate
iosforensic|1.0|iOS forensic tool https://www.owasp.org/index.php/Projects/OWASP_iOSForensic|https://github.com/Flo354/iOSForensic
ipba2|032013|IOS Backup Analyzer|http://www.ipbackupanalyzer.com/
iphoneanalyzer|2.1.0|Allows you to forensically examine or recover date from in iOS device.|http://www.crypticbit.com/zen/products/iphoneanalyzer
mac-robber|1.02|A digital investigation tool that collects data from allocated files in a mounted file system.|http://www.sleuthkit.org/mac-robber/download.php
magicrescue|1.1.9|Find and recover deleted files on block devices|http://freshmeat.net/projects/magicrescue/
make-pdf|0.1.6|This tool will embed javascript inside a PDF document.|http://blog.didierstevens.com/programs/pdf-tools/
malheur|0.5.4|A tool for the automatic analyze of malware behavior.|http://www.mlsec.org/malheur/
maltego|3.6.0.6640|An open source intelligence and forensics application, enabling to easily gather information about DNS, domains, IP addresses, websites, persons, etc.|http://www.paterva.com/web5
malwaredetect|0.1|Submits a file's SHA1 sum to VirusTotal to determine whether it is a known piece of malware|http://www.virustotal.com
mboxgrep|0.7.9|A small, non-interactive utility that scans mail folders for messages matching regular expressions. It does matching against basic and extended POSIX regular expressions, and reads and writes a variety of mailbox formats.|http://mboxgrep.sourceforge.net
mdbtools|0.7.1|Utilities for viewing data and exporting schema from Microsoft Access Database files|http://sourceforge.net/projects/mdbtools/
memdump|1.01|Dumps system memory to stdout, skipping over holes in memory maps.|http://www.porcupine.org/forensics/tct.html
memfetch|0.05b|Dumps any userspace process memory without affecting its execution.|http://lcamtuf.coredump.cx/
mobiusft|0.5.21|An open-source forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions.|http://savannah.nongnu.org/projects/mobiusft
mp3nema|0.4|A tool aimed at analyzing and capturing data that is hidden between frames in an MP3 file or stream, otherwise noted as "out of band" data.|http://packetstormsecurity.com/files/76432/MP3nema-Forensic-Analysis-Tool.html
nfex|2.5|A tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile.|https://code.google.com/p/nfex/
pasco|20040505_1|Examines the contents of Internet Explorer's cache files for forensic purposes|http://www.jonesdykstra.com/
pdf-parser|0.6.4|Parses a PDF document to identify the fundamental elements used in the analyzed file.|http://blog.didierstevens.com/programs/pdf-tools/
pdfbook-analyzer|2|Utility for facebook memory forensics.|http://sourceforge.net/projects/pdfbook/
pdfid|0.2.1|Scan a file to look for certain PDF keywords.|http://blog.didierstevens.com/programs/pdf-tools/
pdfresurrect|0.12|A tool aimed at analyzing PDF documents.|http://packetstormsecurity.com/files/118459/PDFResurrect-PDF-Analyzer.12.html
peepdf|0.3|A Python tool to explore PDF files in order to find out if the file can be harmful or not|http://eternal-todo.com/tools/peepdf-pdf-analysis-tool
pev|0.70|Command line based tool for PE32/PE32+ file analysis.|http://pev.sourceforge.net/
recoverjpeg|2.6|Recover jpegs from damaged devices.|http://www.rfc1149.net/devel/recoverjpeg
reglookup|1.0.1|Command line utility for reading and querying Windows NT registries|http://projects.sentinelchicken.org/reglookup
replayproxy|1.1|Forensic tool to replay web-based attacks (and also general HTTP traffic) that were captured in a pcap file.|https://code.google.com/p/replayproxy/
rifiuti2|0.6.1|A rewrite of rifiuti, a great tool from Foundstone folks for analyzing Windows Recycle Bin INFO2 file.|https://code.google.com/p/rifiuti2/
rkhunter|1.4.2|Checks machines for the presence of rootkits and other unwanted tools.|http://rkhunter.sourceforge.net/
safecopy|1.7|A disk data recovery tool to extract data from damaged media.|http://safecopy.sourceforge.net/
scalpel|2.0|A frugal, high performance file carver|http://www.digitalforensicssolutions.com/Scalpel/
scrounge-ntfs|0.9|Data recovery program for NTFS file systems|http://memberwebs.com/stef/software/scrounge/
skypefreak|33.9347a65|A Cross Platform Forensic Framework for Skype.|http://osandamalith.github.io/SkypeFreak/
sleuthkit|4.2.0|File system and media management forensic analysis tools|http://www.sleuthkit.org/sleuthkit
tekdefense-automater|88.42548cf|IP URL and MD5 OSINT Analysis|https://github.com/1aN0rmus/TekDefense-Automater
trid|2.20|An utility designed to identify file types from their binary signatures.|http://mark0.net/soft-trid-e.html
unhide|20130526|A forensic tool to find processes hidden by rootkits, LKMs or by other techniques.|http://sourceforge.net/projects/unhide/
vinetto|0.07beta|A forensics tool to examine Thumbs.db files|http://vinetto.sourceforge.net
xplico|33.0f6d8bc|Internet Traffic Decoder. Network Forensic Analysis Tool (NFAT).|http://www.xplico.org/

View File

@ -1,65 +0,0 @@
afl|2.17b|Security-oriented fuzzer using compile-time instrumentation and genetic algorithms|http://lcamtuf.coredump.cx/afl/
backfuzz|36.8e54ed6|A network protocol fuzzing toolkit.|https://github.com/localh0t/backfuzz
browser-fuzzer|3|Browser Fuzzer 3|http://www.krakowlabs.com/dev.html
bunny|0.93|A closed loop, high-performance, general purpose protocol-blind fuzzer for C programs.|http://code.google.com/p/bunny-the-fuzzer/
burpsuite|1.7.03|An integrated platform for attacking web applications (free edition).|http://portswigger.net/burp/
cirt-fuzzer|1.0|A simple TCP/UDP protocol fuzzer.|http://www.cirt.dk/
conscan|1.2|A blackbox vulnerability scanner for the Concre5 CMS.|http://nullsecurity.net/tools/scanner.html
cookie-cadger|1.08|An auditing tool for Wi-Fi or wired Ethernet connections.|https://cookiecadger.com/
dizzy|0.8.3|A Python based fuzzing framework with many features.|http://www.c0decafe.de/
doona|135.9fa1f8d|A fork of the Bruteforce Exploit Detector Tool (BED).|https://github.com/wireghoul/doona
easyfuzzer|3.6|A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant).|http://www.mh-sec.de/downloads.html.en
firewalk|5.0|An active reconnaissance network security tool|http://packetfactory.openwall.net/projects/firewalk/
frisbeelite|1.2|A GUI-based USB device fuzzer.|https://github.com/nccgroup/FrisbeeLite
ftester|1.0|A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities.|http://www.inversepath.com/ftester.html
ftp-fuzz|1337|The master of all master fuzzing scripts specifically targeted towards FTP server sofware.|http://nullsecurity.net/tools/fuzzer.html
fuddly|273.38468f5|Fuzzing and Data Manipulation Framework (for GNU/Linux).|https://github.com/k0retux/fuddly
fusil|1.5|A Python library used to write fuzzing programs.|http://bitbucket.org/haypo/fusil/wiki/Home
fuzzball2|0.7|A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice.|http://nologin.org/
fuzzdb|279.637a885|Attack and Discovery Pattern Database for Application Fuzz Testing|https://code.google.com/p/fuzzdb/
fuzzdiff|1.0|A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes.|http://vsecurity.com/resources/tool
hexorbase|6|A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL).|https://code.google.com/p/hexorbase/
honggfuzz|0.7|A general-purpose fuzzer with simple, command-line interface.|https://code.google.com/p/honggfuzz/
http-fuzz|0.1|A simple http fuzzer.|none
ikeprober|1.12|Tool crafting IKE initiator packets and allowing many options to be manually set. Useful to find overflows, error conditions and identifiyng vendors|http://ikecrack.sourceforge.net/
jbrofuzz|2.5|Web application protocol fuzzer that emerged from the needs of penetration testing.|http://sourceforge.net/projects/jbrofuzz/
kitty|267.0dd0f69|Fuzzing framework written in python.|https://github.com/cisco-sas/kitty
malybuzz|1.0|A Python tool focused in discovering programming faults in network software.|http://eternal-todo.com/tools/malybuzz-network-fuzzer
melkor|1.0|An ELF fuzzer that mutates the existing data in an ELF sample given to create orcs (malformed ELFs), however, it does not change values randomly (dumb fuzzing), instead, it fuzzes certain metadata with semi-valid values through the use of fuzzing rules (knowledge base).|http://packetstormsecurity.com/files/127924/Melkor-ELF-Fuzzer.0.html
notspikefile|0.1|A Linux based file format fuzzing tool|http://packetstormsecurity.com/files/39627/notSPIKEfile.tgz.html
oat|1.3.1|A toolkit that could be used to audit security within Oracle database servers.|http://www.cqure.net/wp/test/
ohrwurm|0.1|A small and simple RTP fuzzer.|http://mazzoo.de/
oscanner|1.0.6|An Oracle assessment framework developed in Java.|http://www.cqure.net/wp/oscanner/
peach|3.0.202|A SmartFuzzer that is capable of performing both generation and mutation based fuzzing.|http://peachfuzzer.com/
peach-fuzz|52.070773a|Simple vulnerability scanning framework.|https://github.com/Caleb1994/peach
pentbox|1.8|A security suite that packs security and stability testing oriented tools for networks and systems.|http://www.pentbox.net
portmanteau|1.0|An experimental unix driver IOCTL security tool that is useful for fuzzing and discovering device driver attack surface.|https://packetstormsecurity.com/files/134230/Portmanteau-Unix-Driver-IOCTL-Security-Tool.html
powerfuzzer|1_beta|Powerfuzzer is a highly automated web fuzzer based on many other Open Source fuzzers available (incl. cfuzzer, fuzzled, fuzzer.pl, jbrofuzz, webscarab, wapiti, Socket Fuzzer). It can detect XSS, Injections (SQL, LDAP, commands, code, XPATH) and others.|http://www.powerfuzzer.com
profuzz|9.aa6dded|Simple PROFINET fuzzer based on Scapy.|https://github.com/HSASec/ProFuzz
pulsar|28.89552de|Protocol Learning and Stateful Fuzzing.|Protocol Learning and Stateful Fuzzing.
radamsa|0.4|General purpose data fuzzer.|https://github.com/aoh/radamsa
ratproxy|1.58|A passive web application security assessment tool|http://code.google.com/p/ratproxy/
sfuzz|0.7.0|A simple fuzzer.|http://aconole.brad-x.com/programs/sfuzz.html
skipfish|2.10b|A fully automated, active web application security reconnaissance tool|http://code.google.com/p/skipfish/
sloth-fuzzer|39.9f7f59a|A smart file fuzzer.|https://github.com/mfontanini/sloth-fuzzer
smtp-fuzz|1.0|Simple smtp fuzzer|none
snmp-fuzzer|0.1.1|SNMP fuzzer uses Protos test cases with an entirely new engine written in Perl.|http://www.arhont.com/en/category/resources/tools-utilities/
spiderpig-pdffuzzer|0.1|A javascript pdf fuzzer|https://code.google.com/p/spiderpig-pdffuzzer/
spike|2.9|IMMUNITYsec's fuzzer creation kit in C|http://www.immunitysec.com/resources-freesoftware.shtml
sploitego|153.d9568dc|Maltego Penetration Testing Transforms.|https://github.com/allfro/sploitego
sqlbrute|1.0|Brute forces data out of databases using blind SQL injection.|http://www.justinclarke.com/archives/2006/03/sqlbrute.html
sulley|1.0.3bce87a|A pure-python fully automated and unattended fuzzing framework.|https://github.com/OpenRCE/sulley/
taof|0.3.2|Taof is a GUI cross-platform Python generic network protocol fuzzer.|http://taof.sf.net
tcpcontrol-fuzzer|0.1|2^6 TCP control bit fuzzer (no ECN or CWR).|https://www.ee.oulu.fi/research/ouspg/tcpcontrol-fuzzer
termineter|0.1.0|Smart meter testing framework|https://code.google.com/p/termineter/
tftp-fuzz|1337|Master TFTP fuzzing script as part of the ftools series of fuzzers.|http://nullsecurity.net/tools/fuzzer.html
trinity|4606.84dc4dd|A Linux System call fuzzer.|http://codemonkey.org.uk/projects/trinity/
uniofuzz|1337|The universal fuzzing tool for browsers, web services, files, programs and network services/ports|http://nullsecurity.net/tools/fuzzer.html
uniscan|6.3|A simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.|http://sourceforge.net/projects/uniscan/
w3af|1.6.49|Web Application Attack and Audit Framework.|http://w3af.sourceforge.net/
wapiti|2.3.0|A vulnerability scanner for web applications. It currently search vulnerabilities like XSS, SQL and XPath injections, file inclusions, command execution, LDAP injections, CRLF injections...|http://wapiti.sourceforge.net/
webscarab|20120422.001828|Framework for analysing applications that communicate using the HTTP and HTTPS protocols|http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
webshag|1.10|A multi-threaded, multi-platform web server audit tool.|http://www.scrt.ch/en/attack/downloads/webshag
wfuzz|47.5c1b4ee|Utility to bruteforce web applications to find their not linked resources.|https://github.com/xmendez/wfuzz
wsfuzzer|1.9.5|A Python tool written to automate SOAP pentesting of web services.|https://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project
zzuf|0.14|Transparent application input fuzzer.|http://sam.zoy.org/zzuf/

View File

@ -1,4 +0,0 @@
arduino|1.0.5|Arduino SDK (includes patched avrdude and librxtx)|http://arduino.cc/en/Main/Software
dex2jar|2.0|A tool for converting Android's .dex format to Java's .class format|http://code.google.com/p/dex2jar
hdmi-sniff|5.f7fbc0e|HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP crypto keys from HDMI devices.|https://github.com/ApertureLabsLtd/hdmi-sniff
kautilya|0.5.5|Pwnage with Human Interface Devices using Teensy++2.0 and Teensy 3.0 devices.|https://github.com/samratashok/Kautilya/releases

View File

@ -1,12 +0,0 @@
beeswarm|1157.9793ae5|Honeypot deployment made easy http://www.beeswarm-ids.org/|https://github.com/honeynet/beeswarm/
conpot|0.5.1|ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org"|
fakeap|0.3.2|Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames.|http://www.blackalchemy.to/project/fakeap/
fiked|0.0.5|Fake IDE daemon|http://www.roe.ch/FakeIKEd
heartbleed-honeypot|0.1|Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's|http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
honeyd|1.6.7|A small daemon that creates virtual hosts on a network.|https://github.com/DataSoft/Honeyd/
honssh|88.82e1aeb|A high-interaction Honey Pot solution designed to log all SSH communications between a client and server.|https://code.google.com/p/honssh/
hpfeeds|164.f18712d|Honeynet Project generic authenticated datafeed protocol.|https://github.com/rep/hpfeeds
kippo|0.9|A medium interaction SSH honeypot designed to log brute force attacks and most importantly, the entire shell interaction by the attacker.|https://github.com/desaster/kippo
pshitt|23.dae7931|A lightweight fake SSH server designed to collect authentication data sent by intruders.|https://github.com/regit/pshitt
wifi-honey|1.0|A management tool for wifi honeypots|http://www.digininja.org/projects/wifi_honey.php
wordpot|38.ca12cb5|A Wordpress Honeypot.|https://github.com/gbrindisi/wordpot

View File

@ -1 +0,0 @@
sagan|1.0.0|A snort-like log analysis engine.|https://quadrantsec.com/sagan_log_analysis_engine/

View File

@ -1,2 +0,0 @@
logkeys|0.1.1a|Simple keylogger supporting also USB keyboards.|http://logkeys.googlecode.com/
xspy|1.0c|A utility for monitoring keypresses on remote X servers|http://www.freshports.org/security/xspy/

View File

@ -1,16 +0,0 @@
balbuzard|67.d6349ef1bc55|A package of malware analysis tools in python to extract patterns of interest from suspicious files (IP addresses, domain names, known file headers, interesting strings, etc).|https://bitbucket.org/decalage/balbuzard/
bamf-framework|35.30d2b4b|A modular framework designed to be a platform to launch attacks against botnets.|https://github.com/bwall/BAMF
bdlogparser|1|This is a utility to parse a Bit Defender log file, in order to sort them into a malware archive for easier maintanence of your malware collection.|http://magikh0e.xyz/
clamscanlogparser|1|This is a utility to parse a Clam Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your malware collection.|http://magikh0e.xyz/
cuckoo|2.0|A malware analysis system.|http://cuckoosandbox.org/
damm|30.5aa2a1e|Differential Analysis of Malware in Memory.|https://github.com/504ensicsLabs/DAMM
fprotlogparser|1|This is a utility to parse a F-Prot Anti Virus log file, in order to sort them into a malware archive for easier maintanence of your collection.|http://magikh0e.xyz/
maltrieve|342.b9e7560|Originated as a fork of mwcrawler. It retrieves malware directly from the sources as listed at a number of sites.|https://github.com/technoskald/maltrieve
malware-check-tool|1.2|Python script that detects malicious files via checking md5 hashes from an offline set or via the virustotal site. It has http proxy support and an update feature.|http://packetstormsecurity.com/files/93518/Malware-Check-Tool.2.html
origami|1.2.7|Aims at providing a scripting tool to generate and analyze malicious PDF files.|http://code.google.com/p/origami-pdf
peframe|90.c9dba76|Tool to perform static analysis on (portable executable) malware.|https://github.com/guelfoweb/peframe
pyew|100.2d086a1|A python tool to analyse malware.|https://code.google.com/p/pyew/
python2-yara|3.4.0|Tool aimed at helping malware researchers to identify and classify malware samples|https://plusvic.github.io/yara/
virustotal|4.9aea023|Command-line utility to automatically lookup on VirusTotal all files recursively contained in a directory.|https://github.com/botherder/virustotal
yara|3.4.0|Tool aimed at helping malware researchers to identify and classify malware samples|https://plusvic.github.io/yara/
zerowine|0.0.2|Malware Analysis Tool - research project to dynamically analyze the behavior of malware|http://zerowine.sf.net/

View File

@ -1,52 +0,0 @@
airgraph-ng|2853|Graphing tool for the aircrack suite.|http://www.aircrack-ng.org
base64dump|0.0.4|Extract and decode base64 strings from files.|http://blog.didierstevens.com/2015/10/12/update-base64dump-py-version-0-3/
bokken|1.8|GUI for radare2 and pyew.|http://inguma.eu/projects/bokken/
centry|72.6de2868|Cold boot & DMA protection|https://github.com/0xPoly/Centry
checkiban|0.2|Checks the validity of an International Bank Account Number (IBAN).|http://kernel.embedromix.ro/us/
cisco-router-config|1.1|copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration|
credmap|69.080273f|The Credential mapper - Tool that was created to bring awareness to the dangers of credential reuse.|https://github.com/lightos/credmap
crosstool-ng|1.22.0|Versatile (cross-)toolchain generator.|http://crosstool-ng.org/
dartspylru|7.5ef01b1|Simple dictionary with LRU behaviour.|https://pypi.python.org/pypi/darts.util.lru
dbd|1.50|A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32.|https://github.com/gitdurandal/dbd
dhcdrop|0.5|Remove illegal dhcp servers with IP-pool underflow.|http://www.netpatch.ru/dhcdrop.html
dsd|91.7ee04e5|Digital Speech Decoder|https://github.com/szechyjs/dsd
elettra|1.0|Encryption utility by Julia Identity|http://www.winstonsmith.info/julia/elettra/
elettra-gui|1.0|Gui for the elettra crypto application.|http://www.winstonsmith.info/julia/elettra/
ent|1.0|Pseudorandom number sequence test.|http://www.fourmilab.ch/random
evilgrade|2.0.0|Modular framework that takes advantage of poor upgrade implementations by injecting fake updates|http://www.infobyte.com.ar/developments.html
extracthosts|14.ec8b89c|Extracts hosts (IP/Hostnames) from files.|https://github.com/bwall/ExtractHosts
fakemail|1.0|Fake mail server that captures e-mails as files for acceptance testing.|http://sourceforge.net/projects/fakemail/
flare|0.6|Flare processes an SWF and extracts all scripts from it.|http://www.nowrap.de/flare.html
genlist|0.1|Generates lists of IP addresses.|
geoipgen|0.4|GeoIPgen is a country to IP addresses generator.|http://code.google.com/p/geoipgen/
http-put|1.0|Simple http put perl script|
httrack|3.48.21|An easy-to-use offline browser utility.|http://www.httrack.com/
laudanum|1.0|A collection of injectable files, designed to be used in a pentest when SQL injection flaws are found and are in multiple languages for different environments.|http://laudanum.inguardians.com/#
leo|5.2|Literate programmer's editor, outliner, and project manager.|http://webpages.charter.net/edreamleo/front.html
libpst|0.6.66|Outlook .pst file converter|http://www.five-ten-sg.com/libpst/
list-urls|0.1|Extracts links from webpage|http://www.whoppix.net
makepasswd|1.10_10|Generates true random passwords with the emphasis on security over pronounceability (Debian version)|http://packages.qa.debian.org/m/makepasswd.html
mibble|2.9.3|Mibble is an open-source SNMP MIB parser (or SMI parser) written in Java. It can be used to read SNMP MIB files as well as simple ASN.1 files.|http://www.mibble.org/
minimodem|334.d4ce821|A command-line program which decodes (or generates) audio modem tones at any specified baud rate, using various framing protocols.|https://github.com/kamalmostafa/minimodem
mrtparse|410.eb8d555|A module to read and analyze the MRT format data.|https://github.com/YoshiyukiYamauchi/mrtparse
onionshare|637.1295399|Securely and anonymously share a file of any size.|https://github.com/micahflee/onionshare/
princeprocessor|115.26cefc9|Standalone password candidate generator using the PRINCE algorithm.|https://github.com/jsteube/princeprocessor/
pyinstaller|3.1.1|A program that converts (packages) Python programs into stand-alone executables, under Windows, Linux, Mac OS X, Solaris and AIX.|http://www.pyinstaller.org/
python-utidylib|0.2|Python bindings for Tidy HTML parser/cleaner.|http://utidylib.berlios.de
redpoint|123.23ef36b|Digital Bond's ICS Enumeration Tools.|https://github.com/digitalbond/Redpoint3
sasm|3.2.0|A simple crossplatform IDE for NASM, MASM, GAS and FASM assembly languages.|https://github.com/Dman95/SASM
schnappi-dhcp|0.1|schnappi can fuck network with no DHCP|http://www.emanuelegentili.eu/
sslcat|1.0|SSLCat is a simple Unix utility that reads and writes data across an SSL enable network connection.|http://www.bindshell.net/tools/sslcat
sslyze|0.13.5|Python tool for analyzing the configuration of SSL servers and for identifying misconfigurations.|https://github.com/nabla-c0d3/sslyze/
stompy|0.0.4|An advanced utility to test the quality of WWW session identifiers and other tokens that are meant to be unpredictable.|http://lcamtuf.coredump.cx/
tcpxtract|1.0.1|A tool for extracting files from network traffic.|http://tcpxtract.sourceforge.net
tnscmd|1.3|a lame tool to prod the oracle tnslsnr process (1521/tcp)|http://www.jammed.com/~jwa/hacks/security/tnscmd/
tpcat|latest|TPCAT is based upon pcapdiff by the EFF. TPCAT will analyze two packet captures (taken on each side of the firewall as an example) and report any packets that were seen on the source capture but didnt make it to the dest.|http://sourceforge.net/projects/tpcat/
uatester|1.06|User Agent String Tester|http://code.google.com/p/ua-tester/
urlview|0.9|A curses URL parser for text files.|http://packages.qa.debian.org/u/urlview.html
usernamer|7.813139d|Pentest Tool to generate usernames/logins based on supplied names.|https://github.com/jseidl/usernamer
valabind|0.10.0|Tool to parse vala or vapi files to transform them into swig interface files, C++, NodeJS-ffi or GIR|http://radare.org
vfeed|63.f3abbc3|Open Source Cross Linked and Aggregated Local Vulnerability Database main repository.|http://www.toolswatch.org/vfeed
whatportis|34.66a04b2|A command to search port names and numbers.|https://github.com/ncrocfer/whatportis
winexe|1.00|Remotely execute commands on Windows NT/2000/XP/2003 systems.|http://sourceforge.net/projects/winexe/
wol-e|2.0|A suite of tools for the Wake on LAN feature of network attached computers.|http://code.google.com/p/wol-e/

View File

@ -1,13 +0,0 @@
androick|5.35048d7|A python tool to help in forensics analysis on android.|https://github.com/Flo354/Androick
android-ndk|r9c|Android C/C++ developer kit.|http://developer.android.com/sdk/ndk/index.html
android-sdk-platform-tools|r23.0.1|Platform-Tools for Google Android SDK (adb and fastboot).|http://developer.android.com/sdk/index.html
android-sdk|r24.4.1|Google Android SDK.|http://developer.android.com/sdk/index.html
android-udev-rules|211.2e075ef|Android udev rules.|https://github.com/bbqlinux/android-udev-rules
androidpincrack|2.ddaf307|Bruteforce the Android Passcode given the hash and salt.|https://github.com/PentesterES/AndroidPINCrack
androidsniffer|0.1|A perl script that lets you search for 3rd party passwords, dump the call log, dump contacts, dump wireless configuration, and more.|http://packetstormsecurity.com/files/97464/Andr01d-Magic-Dumper.1.html
cnamulator|5.4667c68|A phone CNAM lookup utility using the OpenCNAM API.|https://github.com/packetassailant/cnamulator
drozer|2.3.4|A security testing framework for Android - Precompiled binary from official repository.|https://github.com/mwrlabs/drozer
kalibrate-rtl|11.aae11c8|Fork of http://thre.at/kalibrate/ for use with rtl-sdr devices.|https://github.com/steve-m/kalibrate-rtl
mobsf|129.a594b08|An intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static, dynamic analysis and web API testing.|https://github.com/ajinabraham/Mobile-Security-Framework-MobSF
qark|38.c270b84|Tool to look for several security related Android application vulnerabilities.|https://github.com/linkedin/qark
smartphone-pentest-framework|104.fc45347|Repository for the Smartphone Pentest Framework (SPF).|https://github.com/georgiaw/Smartphone-Pentest-Framework

View File

@ -1,105 +0,0 @@
afpfs-ng|0.8.1|A client for the Apple Filing Protocol (AFP)|http://alexthepuffin.googlepages.com/
aiengine|527.a98ad93|A packet inspection engine with capabilities of learning without any human intervention.|https://bitbucket.org/camp0/aiengine/
argus|3.0.8.1|Network monitoring tool with flow control.|http://qosient.com/argus/
argus-clients|3.0.8|Network monitoring client for Argus.|http://qosient.com/argus/
arp-scan|1.9|A tool that uses ARP to discover and fingerprint IP hosts on the local network|http://www.nta-monitor.com/tools/arp-scan/
arpalert|2.0.12|Monitor ARP changes in ethernet networks.|http://www.arpalert.org/
arpwner|26.f300fdf|GUI-based python tool for arp posioning and dns poisoning attacks.|https://github.com/ntrippar/ARPwner
atftp|0.7.1|client/server implementation of the TFTP protocol that implements RFCs 1350, 2090, 2347, 2348, and 2349|http://sourceforge.net/projects/atftp/
bind-tools|9.10.4.P1|The ISC DNS tools|http://www.isc.org/software/bind/
bro|2.4.1|A powerful network analysis framework that is much different from the typical IDS you may know.|https://www.bro.org/download/index.html
buttinsky|138.1a2a1b2|Provide an open source framework for automated botnet monitoring.|https://github.com/buttinsky/buttinsky
cadaver|0.23.3|Command-line WebDAV client for Unix|http://www.webdav.org/cadaver
chaosreader|0.94|A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs.|http://chaosreader.sourceforge.net/
cidr2range|0.9|Script for listing the IP addresses contained in a CIDR netblock|http://www.cpan.org/authors/id/R/RA/RAYNERLUC
depdep|2.0|A merciless sentinel which will seek sensitive files containing critical info leaking through your network.|https://github.com/galkan/depdep
det|23.db3336a|(extensible) Data Exfiltration Toolkit.|https://github.com/sensepost/det
dinouml|0.9.5|A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC|http://kernel.embedromix.ro/us/
dnsfilexfer|14.20743e0|File transfer via DNS.|https://github.com/leonjza/dnsfilexfer
dnsteal|23.9b3b929|DNS Exfiltration tool for stealthily sending files over DNS requests..|https://github.com/m57/dnsteal
dump1090|386.bff92c4|A simple Mode S decoder for RTLSDR devices.|https://github.com/MalcolmRobb/dump1090
etherape|0.9.14|A graphical network monitor for various OSI layers and protocols|http://etherape.sourceforge.net/
exabgp|3274.358ef42|The BGP swiss army knife of networking.|https://github.com/Exa-Networks/exabgp
filibuster|164.f343308|A Egress filter mapping application with additional functionality.|https://github.com/subinacls/Filibuster
flowinspect|96.1f62b3b|A network traffic inspection tool.|https://github.com/7h3rAm/flowinspect
fping|3.13|A utility to ping multiple hosts at once|http://www.fping.org/
freeipmi|1.5.1|Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL).|http://www.gnu.org/software/freeipmi/
geoip|1.6.6|Non-DNS IP-to-country resolver C library & utils|http://www.maxmind.com/app/c
gwcheck|0.1|A simple program that checks if a host in an ethernet network is a gateway to Internet.|http://packetstormsecurity.com/files/62047/gwcheck.c.html
haka|0.2.2|A collection of tool that allows capturing TCP/IP packets and filtering them based on Lua policy files.|https://github.com/haka-security/haka
hharp|1beta|This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method.|http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html
hping|3.0.0|A command-line oriented TCP/IP packet assembler/analyzer.|http://www.hping.org
http-traceroute|0.5|This is a python script that uses the Max-Forwards header in HTTP and SIP to perform a traceroute-like scanning functionality.|http://packetstormsecurity.com/files/107167/Traceroute-Like-HTTP-Scanner.html
httping|2.4|A ping-like tool for http-requests|https://www.vanheusden.com/httping/
hyde|5.22d8e91|Just another tool in C to do DDoS (with spoofing).|https://github.com/CoolerVoid/Hyde
hyenae|0.36_1|flexible platform independent packet generator|http://sourceforge.net/projects/hyenae/
hyperfox|45.79ffeb5|A security tool for proxying and recording HTTP and HTTPs traffic.|github.com/xiam/hyperfox
ipaudit|1.1|Monitors network activity on a network.|http://ipaudit.sourceforge.net
ipdecap|83.b719681|Can decapsulate traffic encapsulated within GRE, IPIP, 6in4, ESP (ipsec) protocols, and can also remove IEEE 802.1Q (virtual lan) header.|http://www.loicp.eu/ipdecap#dependances
ipmitool|1.8.17|Command-line interface to IPMI-enabled devices|http://ipmitool.sourceforge.net
iputils|20160308.0db72a4|Network monitoring tools, including ping|http://www.skbuff.net/iputils/
jnetmap|0.5.3|A network monitor of sorts|http://www.rakudave.ch/jnetmap/?file=introduction
latd|1.31|A LAT terminal daemon for Linux and BSD.|http://sourceforge.net/projects/linux-decnet/files/latd/1.31/
macchanger|1.7.0|A small utility to change your NIC's MAC address|http://www.gnu.org/software/macchanger
maclookup|0.4|Lookup MAC addresses in the IEEE MA-L/OUI public listing.|https://github.com/paraxor/maclookup
malcom|704.ec915a3|Analyze a system's network communication using graphical representations of network traffic.|https://github.com/tomchop/malcom
mdns-scan|0.5|Scan mDNS/DNS-SD published services on the local network.|
middler|1.0|A Man in the Middle tool to demonstrate protocol middling attacks.|http://code.google.com/p/middler/
miredo|1.2.6|Teredo client and server.|http://www.remlab.net/miredo/
moloch|0.11.3|An open source large scale IPv4 full PCAP capturing, indexing and database system.|https://github.com/aol/moloch
mptcp|1.9.0|A tool for manipulation of raw packets that allows a large number of options.|http://packetstormsecurity.com/files/119132/Mptcp-Packet-Manipulator.9.0.html
mptcp-abuse|6.b0eeb27|A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.|https://github.com/Neohapsis/mptcp-abuse
mtr|0.86|Combines the functionality of traceroute and ping into one tool (CLI version)|http://www.bitwizard.nl/mtr/
nacker|23.b67bb39|A tool to circumvent 802.1x Network Access Control on a wired LAN.|https://github.com/carmaa/nacker
nbtool|2.bf90c76|Some tools for NetBIOS and DNS investigation, attacks, and communication.|http://wiki.skullsecurity.org/Nbtool
ncpfs|2.2.6|Allows you to mount volumes of NetWare servers under Linux.|http://www.novell.com/
nemesis|1.4|command-line network packet crafting and injection utility|http://nemesis.sourceforge.net/
netcon|0.1|A network connection establishment and management script.|http://www.paramecium.org/~leendert/
netmap|0.1.3|Can be used to make a graphical representation of the surounding network.|http://netmap.sourceforge.net
netreconn|1.78|A collection of network scan/recon tools that are relatively small compared to their larger cousins.|http://packetstormsecurity.com/files/86076/NetReconn-Scanning-Tool-Collection.76.html
netsed|1.2|Small and handful utility design to alter the contents of packets forwarded thru network in real time.|http://silicone.homelinux.org/projects/netsed/
nfdump|1.6.13|A set of tools to collect and process netflow data.|http://sourceforge.net/projects/nfdump/
ngrep|1.45|A grep-like utility that allows you to search for network packets on an interface.|http://ngrep.sourceforge.net/
nield|0.6.1|A tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache(ARP,NDP), IP address(IPv4,IPv6), routing, FIB rules, traffic control.|http://nield.sourceforge.net/
nsdtool|0.1|A netgear switch discovery tool. It contains some extra features like bruteoforce and setting a new password.|http://www.curesec.com/en/publications/tools.html
nsoq|1.9.5|A Network Security Tool for packet manipulation that allows a large number of options.|http://www.nsoq.org/
packet-o-matic|351|A real time packet processor. Reads the packet from an input module, match the packet using rules and connection tracking information and then send it to a target module.|http://www.packet-o-matic.org/
packeth|1.8.1|A Linux GUI packet generator tool for ethernet.|http://packeth.sourceforge.net/
packetsender|152.1e5c559|An open source utility to allow sending and receiving TCP and UDP packets.|https://github.com/dannagle/PacketSender
packit|1.0|A network auditing tool. Its value is derived from its ability to customize, inject, monitor, and manipulate IP traffic.|http://packit.sourceforge.net/
pcapfix|1.1.0|Tries to repair your broken pcap and pcapng files.|http://f00l.de/pcapfix/
prometheus|176.a316d66|A Firewall analyzer written in ruby|https://github.com/averagesecurityguy/prometheus
pwnat|9.1d07c2e|A tool that allows any number of clients behind NATs to communicate with a server behind a separate NAT with *no* port forwarding and *no* DMZ setup on any routers in order to directly communicate with each other.|http://samy.pl/pwnat/
pyersinia|49.73f4056|Network attack tool like yersinia but written in Python.|https://github.com/nottinghamprisateam/pyersinia
pyexfil|39.fa99980|A couple of beta stage tools for data exfiltration.|https://github.com/ytisf/PyExfil
pyminifakedns|0.1|Minimal DNS server written in Python; it always replies with a 127.0.0.1 A-record|http://code.activestate.com/recipes/491264/
rinetd|0.62|internet redirection server|http://www.boutell.com/rinetd
rtpbreak|1.3a|Detects, reconstructs and analyzes any RTP session|http://xenion.antifork.org/rtpbreak/
scapy|2.3.2|A powerful interactive packet manipulation program written in Python|http://www.secdev.org/projects/scapy/
sdn-toolkit|1.01|Discover, Identify, and Manipulate SDN-Based Networks|http://www.hellfiresecurity.com/tools.htm
sessionlist|1.0|Sniffer that intents to sniff HTTP packets and attempts to reconstruct interesting authentication data from websites that do not employ proper secure cookie auth.|http://www.0xrage.com/
silk|3.11.0.1|A collection of traffic analysis tools developed by the CERT NetSA to facilitate security analysis of large networks.|https://tools.netsa.cert.org/silk/
snmpattack|1.8|SNMP scanner and attacking tool.|http://www.c0decafe.de/
snmpcheck|1.8|A free open source utility to get information via SNMP protocols.|http://www.nothink.org/perl/snmpcheck/
socat|1.7.3.1|Multipurpose relay|http://www.dest-unreach.org/socat/
sockstat|0.3|A tool to let you view information about open connections. It is similar to the tool of the same name that is included in FreeBSD, trying to faithfully reproduce as much functionality as is possible.|https://packages.debian.org/unstable/main/sockstat
spiped|1.5.0|A utility for creating symmetrically encrypted and authenticated pipes between socket addresses.|https://www.tarsnap.com/spiped.html
sps|4.3|A Linux packet crafting tool. Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over IPv4.|https://sites.google.com/site/simplepacketsender/
sslh|1.18|SSL/SSH/OpenVPN/XMPP/tinc port multiplexer|http://www.rutschle.net/tech/sslh.shtml
stunnel|5.33|A program that allows you to encrypt arbitrary TCP connections inside SSL|https://www.stunnel.org/
swaks|20130209.0|Swiss Army Knife SMTP; Command line SMTP testing, including TLS and AUTH|http://jetmore.org/john/code/swaks/
tcpdump|4.7.4|A tool for network monitoring and data acquisition|http://www.tcpdump.org
tcpextract|1.1|Extracts files from captured TCP sessions. Support live streams and pcap files.|https://pypi.python.org/pypi/tcpextract/1.1
tcpflow|1.4.5|Captures data transmitted as part of TCP connections then stores the data conveniently|https://github.com/simsong/tcpflow
tcpreplay|4.1.0|Gives the ability to replay previously captured traffic in a libpcap format|http://tcpreplay.appneta.com
tcptraceroute|1.5beta7|A traceroute implementation using TCP packets.|http://michael.toren.net/code/tcptraceroute/
tcpwatch|1.3.1|A utility written in Python that lets you monitor forwarded TCP connections or HTTP proxy connections.|http://hathawaymix.org/Software/TCPWatch
tinc|1.0.28|VPN (Virtual Private Network) daemon|http://www.tinc-vpn.org/
tunna|19.f8c1881|a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.|https://github.com/SECFORCE/Tunna
udptunnel|19|Tunnels TCP over UDP packets.|http://code.google.com/p/udptunnel/
umit|1.0|A powerful nmap frontend.|http://www.umitproject.org/
uw-offish|0.1|Clear-text protocol simulator.|http://uberwall.org/bin/download/42/UW_offish.1.tar.gz
websockify|0.8.0|WebSocket to TCP proxy/bridge.|http://github.com/kanaka/websockify
yaf|2.7.1|Yet Another Flowmeter.|http://tools.netsa.cert.org/yaf/
yersinia|0.7.3|A network tool designed to take advantage of some weakness in different network protocols.|http://www.yersinia.net/
zackattack|5.1f96c14|A new tool set to do NTLM Authentication relaying unlike any other tool currently out there.|https://github.com/urbanesec/ZackAttack/

View File

@ -1 +0,0 @@
creak|17.e367b9f|Poison, reset, spoof, redirect MITM script.|https://github.com/codepr/creak

View File

@ -1 +0,0 @@
nfcutils|0.3.2|Provides a simple 'lsnfc' command that list tags which are in your NFC device field|http://code.google.com/p/nfc-tools

View File

@ -1 +0,0 @@
sherlocked|1.f190c2b|Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.|https://github.com/elfmaster/sherlocked

View File

@ -1,21 +0,0 @@
3proxy|0.7.1.2|Tiny free proxy server.|http://3proxy.ru/
bdfproxy|87.442a8f5|Patch Binaries via MITM: BackdoorFactory + mitmProxy|https://github.com/secretsquirrel/BDFProxy
dns-reverse-proxy|18.bb497e8|A reverse DNS proxy written in Go.|https://github.com/StalkR/dns-reverse-proxy
dnschef|0.3|A highly configurable DNS proxy for pentesters.|http://thesprawl.org/projects/dnschef/
elite-proxy-finder|51.1ced3be|Finds public elite anonymity proxies and concurrently tests them.|https://github.com/DanMcInerney/elite-proxy-finder
fakedns|66.62d1d78|A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses.|https://github.com/Crypt0s/FakeDns
mitmproxy|0.17|SSL-capable man-in-the-middle HTTP proxy|http://mitmproxy.org/
obfsproxy|0.2.13|A pluggable transport proxy written in Python|https://pypi.python.org/pypi/obfsproxy
pr0cks|19.39331bd|python script setting up a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target.|https://github.com/n1nj4sec/pr0cks
proxychains-ng|4.11|A hook preloader that allows to redirect TCP traffic of existing dynamically linked programs through one or more SOCKS or HTTP proxies|https://github.com/rofl0r/proxychains
proxyp|2013|Small multithreaded Perl script written to enumerate latency, port numbers, server names, & geolocations of proxy IP addresses.|http://sourceforge.net/projects/proxyp/
sergio-proxy|0.2.1|A multi-threaded transparent HTTP proxy for manipulating web traffic|https://github.com/darkoperator/dnsrecon
sshuttle|0.78.0|Transparent proxy server that forwards all TCP packets over ssh|https://github.com/sshuttle/sshuttle
ssrf-proxy|208.655d935|Facilitates tunneling HTTP communications through servers vulnerable to Server-Side Request Forgery.|https://github.com/bcoles/ssrf_proxy
starttls-mitm|7.b257756|A mitm proxy that will transparently proxy and dump both plaintext and TLS traffic.|https://github.com/ipopov/starttls-mitm
striptls|48.65a7078|Proxy PoC implementation of STARTTLS stripping attacks.|https://github.com/tintinweb/striptls
tftp-proxy|0.1|This tool accepts connection on tftp and reloads requested content from an upstream tftp server. Meanwhile modifications to the content can be done by pluggable modules. So this one's nice if your mitm with some embedded devices.|http://www.c0decafe.de/
tinyproxy|1.8.4|A light-weight HTTP proxy daemon for POSIX operating systems.|https://banu.com/tinyproxy/
tor|0.2.7.6|Anonymizing overlay network.|http://www.torproject.org/
torsocks|2.1.0|Wrapper to safely torify applications|https://gitweb.torproject.org/torsocks.git/
webfixy|24.41d8671|On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.|https://github.com/takeshixx/webfixy

View File

@ -1,4 +0,0 @@
gpredict|1.3|A real-time satellite tracking and orbit prediction application.|http://gpredict.oz9aec.net/
multimon-ng|20160303|An sdr decoder, supports pocsag, ufsk, clipfsk, afsk, hapn, fsk, dtmf, zvei.|http://dekar.wc3edit.net/2012/05/24/multimonng/
proxmark|1445.6fcb5dd|A powerful general purpose RFID tool, the size of a deck of cards, designed to snoop, listen and emulate everything from Low Frequency (125kHz) to High Frequency (13.56MHz) tags.|https://github.com/Proxmark/proxmark3
rtlamr|197.03369d1|An rtl-sdr receiver for smart meters operating in the 900MHz ISM band.|https://github.com/bemasher/rtlamr/

View File

@ -1,78 +0,0 @@
api-dnsdumpster|26.459abfa|Unofficial Python API for http://dnsdumpster.com/.|https://github.com/PaulSec/API-dnsdumpster.com
basedomainname|0.1|Tool that can extract TLD (Top Level Domain), domain extensions (Second Level Domain + TLD), domain name, and hostname from fully qualified domain names.|http://www.morningstarsecurity.com/research
bing-ip2hosts|0.4|Enumerates all hostnames which Bing has indexed for a specific IP address.|http://www.morningstarsecurity.com/research/bing-ip2hosts
catnthecanary|7.e9184fe|An application to query the canary.pw data set for leaked data.|https://github.com/packetassailant/catnthecanary
cutycapt|10|A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page.|http://cutycapt.sourceforge.net/
dnsbrute|2.b1dc84a|Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads.|https://github.com/d4rkcat/dnsbrute
dnsenum|1.2.4.2|Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results.|http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum
dnsrecon|0.8.9|Python script for enumeration of hosts, subdomains and emails from a given domain using google.|https://github.com/darkoperator/dnsrecon
dnsspider|0.8|A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.|http://nullsecurity.net/tools/scanner.html
dnstracer|1.9|Determines where a given DNS server gets its information from, and follows the chain of DNS servers|http://www.mavetju.org/unix/dnstracer.php
dnswalk|2.0.2|A DNS debugger|http://sourceforge.net/projects/dnswalk/
domain-analyzer|0.8.1|Finds all the security information for a given domain name.|http://sourceforge.net/projects/domainanalyzer/
dradis|3.0.0.rc1|An open source framework to enable effective information sharing.|http://dradisframework.org/
enum4linux|0.8.9|A tool for enumerating information from Windows and Samba systems.|http://labs.portcullis.co.uk/application/enum4linux/
facebot|23.57f6025|A facebook profile and reconnaissance system.|https://github.com/pun1sh3r/facebot
fbid|11.b8106f8|Show info about the author by facebook photo url.|https://github.com/guelfoweb/fbid
flashlight|107.39594b5|Automated Information Gathering Tool for Penetration Testers.|https://github.com/galkan/flashlight
geoedge|0.2|This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).|
githack|6.b83a744|A `.git` folder disclosure exploit.|https://github.com/lijiejie/githack
gitminer|29.e25f339|Tool for advanced mining for content on Github.|https://github.com/danilovazb/GitMiner
goodork|2.2|A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line.|http://goo-dork.blogspot.com/
goofile|1.5|Command line filetype search|https://code.google.com/p/goofile/
goog-mail|1.0|Enumerate domain emails from google.|http://www.darkc0de.com/others/goog-mail.py
gwtenum|7.f27a5aa|Enumeration of GWT-RCP method calls.|http://www.gdssecurity.com/l/t/d.php?k=GwtEnum
halcyon|0.1|A repository crawler that runs checksums for static files found within a given git repository.|http://www.blackhatlibrary.net/Halcyon
hasere|1.0|Discover the vhosts using google and bing.|https://github.com/galkan/hasere
idswakeup|1.0|A collection of tools that allows to test network intrusion detection systems.|http://www.hsc.fr/ressources/outils/idswakeup/index.html.en
intrace|1.5|Traceroute-like application piggybacking on existing TCP connections|http://intrace.googlecode.com
ircsnapshot|94.cb02a85|Tool to gather information from IRC servers.|https://github.com/bwall/ircsnapshot
ivre|954.2a7f74c|Network recon framework.|https://ivre.rocks/
kacak|1.0|Tools for penetration testers that can enumerate which users logged on windows system.|https://github.com/galkan/kacak
lanmap2|127.1197999|Passive network mapping tool.|http://github.com/rflynn/lanmap2
lbd|20130719|Load Balancing detector|http://ge.mine.nu/code/lbd
ldapenum|0.1|Enumerate domain controllers using LDAP.|https://gobag.googlecode.com/svn-history/r2/trunk/ldap/ldapenum/
lft|3.73|A layer four traceroute implementing numerous other features.|http://pwhois.org/lft/
linux-exploit-suggester|32.9db2f5a|A Perl script that tries to suggest exploits based OS version number.|https://github.com/PenturaLabs/Linux_Exploit_Suggester
loot|51.656fb85|Sensitive information extraction tool.|https://github.com/GuerrillaWarfare/Loot
machinae|61.67b9725|A tool for collecting intelligence from public sites/feeds about various security-related pieces of data.|https://github.com/HurricaneLabs/machinae
mdns-recon|7.cf67423|An mDNS recon tool written in Python.|https://github.com/chadillac/mdns_recon
metagoofil|1.4b|An information gathering tool designed for extracting metadata of public documents|http://www.edge-security.com/metagoofil.php
missidentify|1.0|A program to find Win32 applications.|http://missidentify.sourceforge.net/
monocle|1.0|A local network host discovery tool. In passive mode, it will listen for ARP request and reply packets. In active mode, it will send ARP requests to the specific IP range. The results are a list of IP and MAC addresses present on the local network.|http://packetstormsecurity.com/files/99823/Monocle-Host-Discovery-Tool.0.html
nasnum|5.df5df19|Script to enumerate network attached storages.|https://github.com/tcstool/nasnum.git
necromant|3.acbc448|Python Script that search unused Virtual Hosts in Web Servers.|https://github.com/PentesterES/Necromant
neglected|8.68d02b3|Facebook CDN Photo Resolver.|https://github.com/GuerrillaWarfare/neglected
netdiscover|0.3|An active/passive address reconnaissance tool, mainly developed for those wireless networks without dhcp server, when you are wardriving. It can be also used on hub/switched networks.|http://nixgeneration.com/~jaime/netdiscover/
netmask|2.4.3|Helps determine network masks|http://packages.qa.debian.org/n/netmask.html
nipper|0.11.7|Network Infrastructure Parser|https://www.titania-security.com/
nsec3walker|20101223|Enumerates domain names using DNSSEC|http://dnscurve.org/nsec3walker.html
ntp-ip-enum|0.1|Script to pull addresses from a NTP server using the monlist command. Can also output Maltego resultset.|http://www.securepla.net/
osinterator|3.8447f58|Open Source Toolkit for Open Source Intelligence Gathering.|https://github.com/guitarmanj/OSINTerator
parsero|81.e5b585a|A robots.txt audit tool.|https://github.com/behindthefirewalls/Parsero
pastenum|0.4.1|Search Pastebins for content, fork from nullthreat corelan pastenum2|http://github.com/shadowbq/pastenum
quickrecon|0.3.2|A python script for simple information gathering. It attempts to find subdomain names, perform zone transfers and gathers emails from Google and Bing.|http://packetstormsecurity.com/files/104314/QuickRecon.3.2.html
recon-ng|4.8.0|A full-featured Web Reconnaissance framework written in Python.|https://bitbucket.org/LaNMaSteR53/recon-ng
revipd|5.2aaacfb|A simple reverse IP domain scanner.|https://github.com/PypeRanger/revipd
ripdc|0.2|A script which maps domains related to an given ip address or domainname.|http://nullsecurity.net/tools/scanner
sctpscan|34.4d44706|A network scanner for discovery and security.|http://www.p1sec.com/
simplyemail|482.67fe027|Email recon made fast and easy, with a framework to build on http://CyberSyndicates.com.|https://github.com/killswitch-GUI/SimplyEmail
sipi|10.10f087f|Simple IP Information Tools for Reputation Data Analysis.|https://github.com/ST2Labs/SIPI
smbcrunch|4.46267a3|3 tools that work together to simplify reconaissance of Windows File Shares.|https://github.com/Raikia/SMBCrunch
smtp-user-enum|1.2|Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.|http://pentestmonkey.net/tools/user-enumeration/smtp-user-enum
sn1per|83.f402b9a|Automated Pentest Recon Scanner.|https://github.com/1N3/Sn1per
spiderfoot|2.6.1|The Open Source Footprinting Tool.|http://spiderfoot.net/
ssl-hostname-resolver|1|CN (Common Name) grabber on X.509 Certificates over HTTPS.|http://packetstormsecurity.com/files/120634/Common-Name-Grabber-Script.html
subdomainer|1.2|A tool designed for obtaining subdomain names from public sources.|http://www.edge-security.com/subdomainer.php
sysdig|0.10.1|Open source system-level exploration and troubleshooting tool|http://www.sysdig.org/
theharvester|53.0f9a670|Python tool for gathering e-mail accounts and subdomain names from different public sources (search engines, pgp key servers).|http://www.edge-security.com/theHarvester.php
tilt|90.2bc2ef2|An easy and simple tool implemented in Python for ip reconnaissance, with reverse ip lookup.|https://github.com/AeonDave/tilt
tinfoleak|3.6469eb3|Get detailed information about a Twitter user activity.|https://github.com/technoskald/tinfoleak/
traceroute|2.0.21|Tracks the route taken by packets over an IP network|http://traceroute.sourceforge.net/
treasure|6.a91d52b|Hunt for sensitive information through githubs code search.|https://github.com/GuerrillaWarfare/Treasure
twofi|2.0|Twitter Words of Interest.|http://www.digininja.org/projects/twofi.php
vbrute|1.11dda8b|Virtual hosts brute forcer.|https://github.com/nccgroup/vbrute
waldo|28.a33de7a|A lightweight and multithreaded directory and subdomain bruteforcer implemented in Python.|https://github.com/red-team-labs/waldo
websearch|1.cce2384|Search vhost names given a host range. Powered by Bing..|https://github.com/PentesterES/WebSearch
whatweb|4188.f467aa2|Next generation web scanner that identifies what websites are running.|http://www.morningstarsecurity.com/research/whatweb
zgrab|511.7b65b58|Grab banners (optionally over TLS).|https://github.com/zmap/zgrab

View File

@ -1,17 +0,0 @@
android-apktool|2.1.1|A tool for reengineering Android apk files.|http://forum.xda-developers.com/showthread.php?t=1755243
bsdiff|4.3|bsdiff and bspatch are tools for building and applying patches to binary files.|http://www.daemonology.net/bsdiff/
capstone|3.0.4|A lightweight multi-platform, multi-architecture disassembly framework|http://www.capstone-engine.org/index.html
flasm|1.62|Disassembler tool for SWF bytecode|http://www.nowrap.de/flasm.html
jad|1.5.8e|Java decompiler|http://www.varaneckas.com/jad
javasnoop|1.1|A tool that lets you intercept methods, alter data and otherwise hack Java applications running on your computer|https://code.google.com/p/javasnoop/
js-beautify|1.6.2|This little beautifier will reformat and reindent bookmarklets, ugly JavaScript, unpack scripts packed by Dean Edward?s popular packer, as well as deobfuscate scripts processed by javascriptobfuscator.com.|https://github.com/einars/js-beautify
jwscan|6.b0306f0|Scanner for Jar to EXE wrapper like Launch4j, Exe4j, JSmooth, Jar2Exe.|https://github.com/katjahahn/JWScan
malwasm|0.2|Offline debugger for malware's reverse engineering.|https://code.google.com/p/malwasm/
mikrotik-npk|11.d54e97c|Python tools for manipulating Mikrotik NPK format.|https://github.com/kost/mikrotik-npk
netzob|1.0rc1|An open source tool for reverse engineering, traffic generation and fuzzing of communication protocols.|http://www.netzob.org/
python-capstone|3.0.4|A lightweight multi-platform, multi-architecture disassembly framework|http://www.capstone-engine.org/index.html
python2-capstone|3.0.4|A lightweight multi-platform, multi-architecture disassembly framework|http://www.capstone-engine.org/index.html
radare2|0.10.3|Open-source tools to disasm, debug, analyze and manipulate binary files|http://radare.org
scanmem|0.15.8|Memory scanner designed to isolate the address of an arbitrary variable in an executing process|https://github.com/scanmem/scanmem
swfintruder|0.9.1|First tool for testing security in Flash movies. A runtime analyzer for SWF external movies. It helps to find flaws in Flash.|http://code.google.com/p/swfintruder/
udis86|1.7.2|A minimalistic disassembler library|http://udis86.sourceforge.net/

View File

@ -1,188 +0,0 @@
0trace|1.5|A hop enumeration tool|http://jon.oberheide.org/0trace/
admsnmp|0.1|ADM SNMP audit scanner.|
allthevhosts|1.0|A vhost discovery tool that scrapes various web applications.|http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
apache-users|2.1|This perl script will enumerate the usernames on a unix system that use the apache module UserDir.|https://labs.portcullis.co.uk/downloads/
athena-ssl-scanner|0.6.2|a SSL cipher scanner that checks all cipher codes. It can identify about 150 different ciphers.|http://packetstormsecurity.com/files/93062/Athena-SSL-Cipher-Scanner.html
atscan|605.d7d934e|Server, Site and Dork Scanner.|https://github.com/AlisamTechnology/ATSCAN-V3.1
birp|60.1d7c49f|A tool that will assist in the security assessment of mainframe applications served over TN3270.|https://github.com/sensepost/birp
bluto|141.2e87191|Recon, Subdomain Bruting, Zone Transfers.|https://github.com/RandomStorm/Bluto
braa|0.82|A mass snmp scanner|http://s-tech.elsat.net.pl/braa/
camscan|1.0057215|A tool which will analyze the CAM table of Cisco switches to look for anamolies.|https://github.com/securestate/camscan
cangibrina|114.57dc151|Dashboard Finder.|https://github.com/fnk0c/cangibrina
cecster|5.15544cb|A tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocols.|https://github.com/nccgroup/CECster
changeme|43.599eddc|A default credential scanner.|https://github.com/ztgrace/changeme
check-weak-dh-ssh|0.1|Debian OpenSSL weak client Diffie-Hellman Exchange checker.|http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html
cheetah-suite|21.2364713|Complete penetration testing suite (port scanning, brute force attacks, services discovery, common vulnerabilities searching, reporting etc.)|https://github.com/bl4de/Cheetah
chiron|0.9|An all-in-one IPv6 Penetration Testing Framework.|http://www.secfu.net/tools-scripts/
cipherscan|357.5d930c2|A very simple way to find out which SSL ciphersuites are supported by a target.|https://github.com/jvehent/cipherscan
ciscos|1.3|Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.|
climber|30.5530a78|Check UNIX/Linux systems for privilege escalation.|https://github.com/raffaele-forte/climber
cloudflare-enum|9.c1d8fca|Cloudflare DNS Enumeration Tool for Pentesters.|https://github.com/mandatoryprogrammer/cloudflare_enum
cmsmap|3.37b64be|A python open source Content Management System scanner that automates the process of detecting security flaws of the most popular CMSs.|https://www.dionach.com/blog/cmsmap-%E2%80%93-a-simple-cms-vulnerability-scanner
configpush|0.8.5|This is a tool to span /8-sized networks quickly sending snmpset requests with default or otherwise specified community string to Cisco devices.|http://packetstormsecurity.com/files/126621/Config-Push-snmpset-Utility.html
cpfinder|0.1|This is a simple script that looks for administrative web interfaces.|http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html
crackmapexec|275.928c9af|A swiss army knife for pentesting Windows/Active Directory environments.|https://github.com/byt3bl33d3r/CrackMapExec
creepy|137.9f60449|A geolocation information gatherer. Offers geolocation information gathering through social networking platforms.|http://github.com/ilektrojohn/creepy.git
cvechecker|3.5|The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.|http://cvechecker.sourceforge.net/
darkbing|0.1|A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection.|http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html
davtest|1.0|Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target|http://code.google.com/p/davtest/
deblaze|0.3|A remote method enumeration tool for flex servers|http://deblaze-tool.appspot.com/
delldrac|0.1a|DellDRAC and Dell Chassis Discovery and Brute Forcer.|https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/
dhcpig|69.cc4109a|Enhanced DHCPv4 and DHCPv6 exhaustion and fuzzing script written in python using scapy network library.|https://github.com/kamorin/DHCPig
dirb|2.22|A web content scanner, brute forceing for hidden files.|http://dirb.sourceforge.net/
dirbuster|1.0_RC1|An application designed to brute force directories and files names on web/application servers|http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
dirscanner|0.1|This is a python script that scans webservers looking for administrative directories, php shells, and more.|http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html
dmitry|1.3a|Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more.|http://www.mor-pah.net/
dnmap|0.6|The distributed nmap framework|http://sourceforge.net/projects/dnmap/
dns2geoip|0.1|A simple python script that brute forces DNS and subsequently geolocates the found subdomains.|http://packetstormsecurity.com/files/118036/DNS-GeoIP.html
dnsa|0.5|DNSA is a dns security swiss army knife|http://packetfactory.openwall.net/projects/dnsa/index.html
dnsbf|0.3|Search for available domain names in an IP range.|http://code.google.com/p/dnsbf
dnsgoblin|0.1|Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies.|http://nullsecurity.net/tools/scanner.html
dnspredict|0.0.2|DNS prediction|http://johnny.ihackstuff.com
dnstwist|151.c4215ef|Domain name permutation engine for detecting typo squatting, phishing and corporate espionage.|https://github.com/elceef/dnstwist
dpscan|0.1|Drupal Vulnerabilty Scanner.|https://github.com/insaneisnotfree/Blue-Sky-Information-Security
driftnet|1.1.5|Listens to network traffic and picks out images from TCP streams it observes.|http://www.ex-parrot.com/~chris/driftnet/
dripper|v1.r1.gc9bb0c9|A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS.|http://www.blackhatlibrary.net/Dripper
droopescan|1.34.3|A plugin-based scanner that aids security researchers in identifying issues with several CMSs, mainly Drupal & Silverstripe.|https://github.com/droope/droopescan
dvcs-ripper|44.a9d3afe|Rip web accessible (distributed) version control systems: SVN/GIT/...|https://github.com/kost/dvcs-ripper
eazy|0.1|This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more.|http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html
enum-shares|7.97cba5a|Tool that enumerates shared folders across the network and under a custom user account.|https://github.com/dejanlevaja/enum_shares
enumiax|1.0|An IAX enumerator.|http://sourceforge.net/projects/enumiax/
faraday|2447.2690215|A new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analyze of the generated data during the process of a security audit.|http://www.faradaysec.com/
fernmelder|6.c6d4ebe|Asynchronous mass DNS scanner.|https://github.com/stealth/fernmelder
fgscanner|11.893372c|An advanced, opensource URL scanner.|http://www.fantaghost.com/fgscanner
fierce|0.9.9|A DNS scanner|http://ha.ckers.org/fierce/
find-dns|0.1|A tool that scans networks looking for DNS servers.|https://packetstormsecurity.com/files/132449/Find-DNS-Scanner.html
flashscanner|11.6815b02|Flash XSS Scanner.|https://github.com/riusksk/FlashScanner
flunym0us|2.0|A Vulnerability Scanner for Wordpress and Moodle.|http://code.google.com/p/flunym0us/
forkingportscanner|1|Simple and fast forking port scanner written in perl. Can only scan on host at a time, the forking is done on the specified port range. Or on the default range of 1. Has the ability to scan UDP or TCP, defaults to tcp.|http://magikh0e.xyz/
fs-nyarl|1.0|A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit.|http://www.fulgursecurity.com/en/content/fs-nyarl
fsnoop|3.3|A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods").|http://vladz.devzero.fr/fsnoop.php
ftp-spider|1.0|FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository.|http://packetstormsecurity.com/files/35120/ftp-spider.pl.html
ftpscout|12.cf1dff1|Scans ftps for anonymous access.|https://github.com/RubenRocha/ftpscout
gggooglescan|0.4|A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames.|http://www.morningstarsecurity.com/research/gggooglescan
ghost-phisher|1.62|GUI suite for phishing and penetration attacks|http://code.google.com/p/ghost-phisher
gitrob|1.1.0|Scan Github For Sensitive Files.|http://michenriksen.com/blog/gitrob-putting-the-open-source-in-osint/
googlesub|1.3|A python script to find domains by using google dorks.|https://github.com/zombiesam/googlesub
greenbone-security-assistant|6.0.6|Greenbone Security Assistant (gsa) - OpenVAS web frontend|http://www.openvas.org/
grepforrfi|0.1|Simple script for parsing web logs for RFIs and Webshells v1.2|http://www.irongeek.com/downloads/grepforrfi.txt
gtp-scan|0.7|A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts.|http://www.c0decafe.de/
halberd|0.2.4|Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing.|http://halberd.superadditive.com/
hbad|1.0|This tool allows you to test clients on the heartbleed bug.|http://www.curesec.com/
hoppy|1.8.1|A python script which tests http methods for configuration issues leaking information or just to see if they are enabled.|https://labs.portcullis.co.uk/downloads/
host-extract|9|Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL.|https://code.google.com/p/host-extract/
hsecscan|38.8b7aa50|A security scanner for HTTP response headers.|https://github.com/riramar/hsecscan
http-enum|0.3|A tool to enumerate the enabled HTTP methods supported on a webserver.|https://www.thexero.co.uk/tools/http-enum/
httpsscanner|1.2|A tool to test the strength of a SSL web server.|https://code.google.com/p/libre-tools/
iaxscan|0.02|A Python based scanner for detecting live IAX/2 hosts and then enumerating (by bruteforce) users on those hosts.|http://code.google.com/p/iaxscan/
icmpquery|1.0|Send and receive ICMP queries for address mask and current time.|http://www.angio.net/security/
iis-shortname-scanner|4.b92772a|An IIS shortname Scanner.|https://github.com/lijiejie/IIS_shortname_Scanner
ike-scan|1.9|A tool that uses IKE protocol to discover, fingerprint and test IPSec VPN servers|http://www.nta-monitor.com/tools/ike-scan/
infip|0.1|A python script that checks output from netstat against RBLs from Spamhaus.|http://packetstormsecurity.com/files/104927/infIP.1-Blacklist-Checker.html
inurlbr|31.5bb8b38|Advanced search in the search engines - Inurl scanner, dorker, exploiter.|https://code.google.com/p/inurlbr/
ipscan|3.4.1|Angry IP scanner is a very fast IP address and port scanner.|http://www.angryziber.com/
iptv|134.720cc12|Search and brute force illegal iptv server.|https://github.com/Pinperepette/IPTV
ipv6toolkit|2.0|SI6 Networks' IPv6 Toolkit|http://www.si6networks.com/tools/ipv6toolkit/
jsql|0.74|A lightweight application used to find database information from a distant server.|https://code.google.com/p/jsql-injection/
knock|222.19f36ef|Subdomain scanner.|https://github.com/guelfoweb/knock
laf|12.7a456b3|Login Area Finder: scans host/s for login panels.|https://github.com/takeshixx/laf
letmefuckit-scanner|3.f3be22b|Scanner and Exploit Magento.|https://github.com/onthefrontline/LetMeFuckIt-Scanner
lfi-scanner|4.0|This is a simple perl script that enumerates local file inclusion attempts when given a specific target.|http://packetstormsecurity.com/files/102848/LFI-Scanner.0.html
linenum|18.b4c2541|Scripted Local Linux Enumeration & Privilege Escalation Checks|https://github.com/rebootuser/LinEnum
littleblackbox|0.1.3|Penetration testing tool, search in a collection of thousands of private SSL keys extracted from various embedded devices.|http://code.google.com/p/littleblackbox/wiki/FAQ
lotophagi|0.1|a relatively compact Perl script designed to scan remote hosts for default (or common) Lotus NSF and BOX databases.|http://packetstormsecurity.com/files/55250/lotophagi.rar.html
lte-cell-scanner|57.5fa3df8|LTE SDR cell scanner optimized to work with very low performance RF front ends (8bit A/D, 20dB noise figure).|https://github.com/Evrytania/LTE-Cell-Scanner
lynis|2.2.0|Security and system auditing tool to harden Unix/Linux systems|https://cisofy.com/lynis/
maligno|2.5|An open source penetration testing tool written in python, that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS.|http://www.encripto.no/tools/
masscan|1.0.3|TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes|https://github.com/robertdavidgraham/masscan
modscan|0.1|A new tool designed to map a SCADA MODBUS TCP based network.|https://code.google.com/p/modscan/
mssqlscan|0.8.4|A small multi-threaded tool that scans for Microsoft SQL Servers.|http://www.cqure.net/wp/mssqlscan/
nbtscan|1.5.1|NBTscan is a program for scanning IP networks for NetBIOS name information.|http://www.inetcat.net/software/nbtscan.html
netbios-share-scanner|1.0|This tool could be used to check windows workstations and servers if they have accessible shared resources.|http://www.secpoint.com/netbios-share-scanner.html
netscan|1.0|Tcp/Udp/Tor port scanner with: synpacket, connect TCP/UDP and socks5 (tor connection).|http://packetstormsecurity.com/files/125569/Netscan-Port-Scanner.0.html
netscan2|43.c225f25|Active / passive network scanner.|https://github.com/walchko/netscan2
nikto|2.1.6|A web server scanner which performs comprehensive tests against web servers for multiple items|https://github.com/sullo/nikto
nmap|7.12|Utility for network discovery and security auditing|http://nmap.org/
nmbscan|1.2.6|Tool to scan the shares of a SMB/NetBIOS network, using the NMB/SMB/NetBIOS protocols.|http://nmbscan.gbarbier.org/
nsia|1.0.6|A website scanner that monitors websites in realtime in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.|http://threatfactor.com/Products/
o-saft|1271.bfb8d1c|A tool to show informations about SSL certificate and tests the SSL connection according given list of ciphers and various SSL configurations.|https://www.owasp.org/index.php/O-Saft
ocs|0.2|Compact mass scanner for Cisco routers with default telnet/enable passwords.|http://packetstormsecurity.com/files/119462/OCS-Cisco-Scanner.2.html
onionscan|39.35fd1d3|Scan Onion Services for Security Issues.|github.com/s-rah/onionscan
openvas-cli|1.4.3|The OpenVAS Command-Line Interface|http://www.openvas.org/
openvas-libraries|8.0.5|The OpenVAS libraries|http://www.openvas.org/
openvas-manager|6.0.6|A layer between the OpenVAS Scanner and various client applications|http://www.openvas.org/
openvas-scanner|5.0.4|The OpenVAS scanning Daemon|http://www.openvas.org/
paketto|1.10|Advanced TCP/IP Toolkit.|http://www.doxpara.com/paketto
panhunt|26.cd58866|Searches for credit card numbers (PANs) in directories.|https://github.com/Dionach/PANhunt
paranoic|1.7|A simple vulnerability scanner written in Perl.|http://packetstormsecurity.com/files/128065/Paranoic-Scan.7.html
passhunt|5.332f374|Search drives for documents containing passwords.|https://github.com/Dionach/PassHunt
pcredz|29.05ae40f|A tool that extracts credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, and more from a pcap file or from a live interface.|https://github.com/lgandx/PCredz
plcscan|0.1|This is a tool written in Python that will scan for PLC devices over s7comm or modbus protocols.|http://packetstormsecurity.com/files/119726/PLC-Device-Scanner.html
pnscan|1.11|A parallel network scanner that can be used to survey TCP network services.|http://www.lysator.liu.se/~pen/pnscan/
poison|1.5.41|A fast, asynchronous syn and udp scanner.|http://nologin.org/main.pl?action=codeList&
prads|1124.dabcaa2|Is a "Passive Real-time Asset Detection System".|http://gamelinux.github.io/prads/
praeda|37.093d1c0|An automated data/information harvesting tool designed to gather critical information from various embedded devices.|https://github.com/percx/Praeda
proxycheck|0.1|This is a simple proxy tool that checks for the HTTP CONNECT method and grabs verbose output from a webserver.|http://packetstormsecurity.com/files/61864/proxycheck.pl.txt.html
proxyscan|0.3|A security penetration testing tool to scan for hosts and ports through a Web proxy server.|http://packetstormsecurity.com/files/69778/proxyScan.3.tgz.html
pytbull|2.0|A python based flexible IDS/IPS testing framework shipped with more than 300 tests|http://pytbull.sourceforge.net/
ranger-scanner|108.0c70888|A tool to support security professionals to access and interact with remote Microsoft Windows based systems.|https://github.com/funkandwagnalls/ranger
rawr|73.0924126|Rapid Assessment of Web Resources. A web enumerator.|https://bitbucket.org/al14s/rawr/wiki/Home
relay-scanner|1.7|An SMTP relay scanner.|http://www.cirt.dk
responder|166.448db12|A LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.|https://github.com/SpiderLabs/Responder/
routerhunter|19.0c9cb3c|Tool used to find vulnerable routers and devices on the Internet and perform tests.|https://github.com/jh00nbr/Routerhunter.0
rtlizer|35.5614163|Simple spectrum analyzer.|https://github.com/csete/rtlizer
rtlsdr-scanner|942.209bb5d|A cross platform Python frequency scanning GUI for the OsmoSDR rtl-sdr library.|https://github.com/EarToEarOak/RTLSDR-Scanner
sambascan|0.5.0|Allows you to search an entire network or a number of hosts for SMB shares. It will also list the contents of all public shares that it finds.|http://sourceforge.net/projects/sambascan2/
sandy|6.531ab16|An open-source Samsung phone encryption assessment framework|https://github.com/donctl/sandy
sb0x|19.04f40fe|A simple and Lightweight framework for Penetration testing.|https://github.com/levi0x0/sb0x-project
scanssh|2.1|Fast SSH server and open proxy scanner.|http://www.monkey.org/~provos/scanssh/
scout2|602.750d021|Security auditing tool for AWS environments.|http://isecpartners.github.io/Scout2/
scrape-dns|58.3df392f|Searches for interesting cached DNS entries.|https://github.com/304GEEK/Scrape-DNS
seat|0.3|Next generation information digging application geared toward the needs of security professionals. It uses information stored in search engine databases, cache repositories, and other public resources to scan web sites for potential vulnerabilities.|http://thesprawl.org/projects/search-engine-assessment-tool/
shareenum|46.3bfa81d|Tool to enumerate shares from Windows hosts.|https://github.com/CroweCybersecurity/shareenum
simple-lan-scan|1.0|A simple python script that leverages scapy for discovering live hosts on a network.|http://packetstormsecurity.com/files/97353/Simple-LAN-Scanner.0.html
sipshock|6.1d636ab|A scanner for SIP proxies vulnerable to Shellshock.|https://github.com/zaf/sipshock
smbexec|148.7827616|A rapid psexec style attack with samba tools.|https://github.com/pentestgeek/smbexec
smbmap|54.57b0176|A handy SMB enumeration tool.|https://github.com/ShawnDEvans/smbmap
smbspider|10.7db9323|A lightweight python utility for searching SMB/CIFS/Samba file shares.|https://github.com/T-S-A/smbspider
smod|27.7679302|A modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol.|https://github.com/enddo/smod
smtp-test|3.acbe743|Automated testing of SMTP servers for penetration testing.|https://github.com/isaudits/smtp-test
smtp-vrfy|1.0|An SMTP Protocol Hacker.|
smtptx|1.0|A very simple tool used for sending simple email and do some basic email testing from a pentester perspective.|http://www.0x90.se/
snmpenum|1.7|snmp enumerator|http://www.filip.waeytens.easynet.be/
snmpscan|0.1|A free, multi-processes SNMP scanner|http://www.nothink.org/perl/snmpscan/index.php
snoopbrute|17.589fbe6|Multithreaded DNS recursive host brute-force tool.|https://github.com/m57/snoopbrute
sparta|17.bdbf244|Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.|http://sparta.secforce.com/
sqlivulscan|20.0d6655f|This will give you the SQLi Vulnerable Website Just by Adding the Dork.|https://github.com/Hadesy2k/sqlivulscan
ssdp-scanner|1.0|SSDP amplification scanner written in Python. Makes use of Scapy.|http://packetstormsecurity.com/files/127994/SSDP-Amplification-Scanner.html
ssh-user-enum|5.3d83131|SSH User Enumeration Script in Python Using The Timing Attack.|https://github.com/nccgroup/ssh-user-enum
sslcaudit|524.f218b9b|Utility to perform security audits of SSL/TLS clients.|https://github.com/grwl/sslcaudit
ssllabs-scan|1.2.0|Command-line client for the SSL Labs APIs|https://github.com/ssllabs/ssllabs-scan
sslmap|0.2.0|A lightweight TLS/SSL cipher suite scanner.|http://thesprawl.org/projects/latest/
sslscan|1.10.2|A fast tools to scan SSL services, such as HTTPS to determine the ciphers that are supported|https://github.com/DinoTools/sslscan/
strutscan|4.8712c12|Apache Struts2 vulnerability scanner written in Perl.|https://github.com/riusksk/StrutScan
subbrute|1.2.1|A DNS meta-query spider that enumerates DNS records and subdomains|https://github.com/TheRook/subbrute
svn-extractor|34.bc6da4d|A simple script to extract all web resources by means of .SVN folder exposed over network.|https://github.com/anantshri/svn-extractor
synscan|5.02|fast asynchronous half-open TCP portscanner|http://www.digit-labs.org/files/tools/synscan/
topera|19.3e230fd|An IPv6 security analysis toolkit, with the particularity that their attacks can't be detected by Snort.|https://github.com/toperaproject/topera
umap|25.3ad8121|The USB host security assessment tool.|https://github.com/nccgroup/umap
unicornscan|0.4.7|A new information gathering and correlation engine.|http://www.unicornscan.org/
upnpscan|0.4|Scans the LAN or a given address range for UPnP capable devices.|http://www.cqure.net/wp/upnpscan/
uw-loveimap|0.1|Multi threaded imap bounce scanner.|http://uberwall.org/bin/download/45/UWloveimap.tgz
uw-udpscan|0.1|Multi threaded udp scanner.|http://uberwall.org/bin/download/44/UWudpscan.tar.gz
uw-zone|0.1|Multi threaded, randomized IP zoner.|http://uberwall.org/bin/download/43/UWzone.tgz
v3n0m|168.5c20fa5|A tool to automate mass SQLi d0rk scans and Metasploit Vulns.|https://github.com/v3n0m-Scanner/V3n0M-Scanner
vane|1855.6a47cd8|A vulnerability scanner which checks the security of WordPress installations using a black box approach.|https://github.com/delvelabs/vane
videosnarf|0.63|A new security assessment tool for pcap analysis|http://ucsniff.sourceforge.net/videosnarf.html
vscan|10.da4e47e|HTTPS / Vulnerability scanner.|https://github.com/pasjtene/Vscan
vulscan|2.0|A module which enhances nmap to a vulnerability scanner|http://www.computec.ch/projekte/vulscan/
waffit|137.4149c12|Identify and fingerprint Web Application Firewall (WAF) products protecting a website.|https://github.com/sandrogauci/wafw00f
webenum|0.1|Tool to enumerate http responses using dynamically generated queries and more. Useful for penetration tests against web servers.|http://code.google.com/p/webenum/
webpwn3r|35.3fb27bb|A python based Web Applications Security Scanner.|https://github.com/zigoo0/webpwn3r
webrute|3.3|Web server directory brute forcer.|https://github.com/BlackArch/webrute
wpscan|2053.825523a|A vulnerability scanner which checks the security of WordPress installations using a black box approach.|http://wpscan.org
xcname|9.08942ae|A tool for enumerating expired domains in CNAME records.|https://github.com/mandatoryprogrammer/xcname
xpire-crossdomain-scanner|1.0cb8d3b|Scans crossdomain.xml policies for expired domain names.|https://github.com/mandatoryprogrammer/xpire-crossdomain-scanner
xsstracer|5.f2ed21a|Python script that checks remote web servers for Clickjacking, Cross-Frame Scripting, Cross-Site Tracing and Host Header Injection.|https://github.com/1N3/XSSTracer
yasat|839|Yet Another Stupid Audit Tool.|http://yasat.sourceforge.net/
zmap|2.1.1|Fast network scanner designed for Internet-wide network surveys|https://zmap.io/

View File

@ -1,35 +0,0 @@
bettercap|803.6de1aaa|A complete, modular, portable and easily extensible MITM framework.|https://github.com/evilsocket/bettercap
bittwist|2.0|A simple yet powerful libpcap-based Ethernet packet generator. It is designed to complement tcpdump, which by itself has done a great job at capturing network traffic.|http://bittwist.sourceforge.net/
cdpsnarf|0.1.6|Cisco discovery protocol sniffer.|https://github.com/Zapotek/cdpsnarf
creds|17.1ec8297|Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols.|https://github.com/DanMcInerney/creds.py
darkstat|3.0.719|Network statistics gatherer (packet sniffer)|http://dmr.ath.cx/net/darkstat/
dsniff|2.4b1|Collection of tools for network auditing and penetration testing|http://www.monkey.org/~dugsong/dsniff/
ettercap|0.8.2|A network sniffer/interceptor/logger for ethernet LANs - console|http://ettercap.github.com/ettercap/
hexinject|1.5|A very versatile packet injector and sniffer that provides a command-line framework for raw network access.|http://hexinject.sourceforge.net
httpry|0.1.8|A specialized packet sniffer designed for displaying and logging HTTP traffic.|http://dumpsterventures.com/jason/httpry/
httpsniff|0.4|Tool to sniff HTTP responses from TCP/IP based networks and save contained files locally for later review.|http://www.sump.org/projects/httpsniff/
hubbit-sniffer|73.5f3b0a2|Simple application that listens for WIFI-frames and records the mac-address of the sender and posts them to a REST-api.|https://github.com/cthit/hubbIT-sniffer
hungry-interceptor|358.8d28133|Intercepts data, does something with it, stores it.|https://github.com/nbuechler/hungry-interceptor
junkie|1365.70a83d6|A modular packet sniffer and analyzer.|https://github.com/securactive/junkie
katsnoop|0.1|Utility that sniffs HTTP Basic Authentication information and prints the base64 decoded form.|http://packetstormsecurity.com/files/52514/katsnoop.tbz2.html
mfsniffer|0.1|A python script for capturing unencrypted TSO login credentials.|http://packetstormsecurity.com/files/120802/MF-Sniffer-TN3270-Password-Grabber.html
mitmer|22.b01c7fe|A man-in-the-middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.|https://github.com/husam212/MITMer
mots|5.34017ca|Man on the Side Attack - experimental packet injection and detection.|https://github.com/kevinkoo001/MotS
net-creds|58.30b16c0|Sniffs sensitive data from interface or pcap.|https://github.com/DanMcInerney/net-creds
netsniff-ng|0.6.1|A high performance Linux network sniffer for packet inspection.|http://netsniff-ng.org/
ostinato|0.6|An open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be "Wireshark in Reverse" and thus become complementary to Wireshark.|http://code.google.com/p/ostinato/
passivedns|1.1.4|A network sniffer that logs all DNS server replies for use in a passive DNS setup.|https://github.com/gamelinux/passivedns
pcapteller|1.1|A tool designed for traffic manipulation and replay.|https://www.encripto.no/nb/downloads/tools/
pytacle|alpha2|Automates the task of sniffing GSM frames|http://packetstormsecurity.com/files/124299/pytacle-alpha2.tar.gz
sipffer|27.f818593|SIP protocol command line sniffer.|https://github.com/xenomuta/SIPffer
snapception|8.c156f9e|Intercept and decrypt all snapchats received over your network.|https://github.com/thebradbain/snapception
ssl-phuck3r|2.0|All in one script for Man-In-The-Middle attacks.|https://github.com/zombiesam/ssl_phuck3r
ssldump|0.9b3|an SSLv3/TLS network protocol analyzer|http://www.rtfm.com/ssldump/
sslsniff|0.8|A tool to MITM all SSL connections on a LAN and dynamically generate certs for the domains that are being accessed on the fly|http://www.thoughtcrime.org/software/sslsniff/
stenographer|426.98cf479|A packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of those packets.|https://github.com/google/stenographer
tcpick|0.2.1|TCP stream sniffer and connection tracker|http://tcpick.sourceforge.net/
tuxcut|5.1|Netcut-like program for Linux written in PyQt.|http://bitbucket.org/a_atalla/tuxcut/
wifi-monitor|24.33b682e|Prints the IPs on your local network that're sending the most packets.|https://github.com/DanMcInerney/wifi-monitor
wireshark-cli|2.0.4|a free network protocol analyzer for Unix/Linux and Windows - CLI version|http://www.wireshark.org/
wireshark-gtk|2.0.4|a free network protocol analyzer for Unix/Linux and Windows - GTK frontend|http://www.wireshark.org/
xcavator|5.bd9e2d8|Man-In-The-Middle and phishing attack tool that steals the victim's credentials of some web services like Facebook.|https://github.com/nccgroup/xcavator

View File

@ -1,9 +0,0 @@
anontwi|1.1b|A free software python client designed to navigate anonymously on social networks. It supports Identi.ca and Twitter.com.|http://anontwi.sourceforge.net/
gophish|0.1.2|Open-Source Phishing Framework.|https://getgophish.com/
hemingway|6.d4ec5f1|A simple and easy to use spear phishing helper.|https://github.com/ytisf/hemingway
phemail|27.7ae21f2|A python open source phishing email tool that automates the process of sending phishing emails as part of a social engineering test.|https://github.com/Dionach/PhEmail
sees|67.cd741aa|Increase the success rate of phishing attacks by sending emails to company users as if they are coming from the very same company's domain.|https://github.com/galkan/sees/
set|7.0.3.5|Social-engineer toolkit. Aimed at penetration testing around Social-Engineering.|https://www.trustedsec.com/downloads/social-engineer-toolkit
social-vuln-scanner|11.91794c6|Gathers public information on companies to highlight social engineering risk.|https://github.com/Betawolf/social-vuln-scanner
spf|65.0d14a8e|A python tool designed to allow for quick recon and deployment of simple social engineering phishing exercises.|https://github.com/tatanus/SPF
weeman|87.e4720de|HTTP Server for phishing in Python.|https://github.com/Hypsurus/weeman

View File

@ -1,14 +0,0 @@
admid-pack|0.1|ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful.|http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
aranea|6.469b9ee|A fast and clean dns spoofing tool.|https://github.com/TigerSecurity
cisco-snmp-slap|5.daf0589|IP address spoofing tool in order to bypass an ACL protecting an SNMP service on Cisco IOS devices.|https://github.com/nccgroup/cisco-snmp-slap
dns-spoof|12.3918a10|Yet another DNS spoof utility.|https://github.com/maurotfilho/dns-spoof
fakenetbios|7.b83701e|A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN.|https://github.com/mubix/FakeNetBIOS
inundator|0.5|An ids evasion tool, used to anonymously inundate intrusion detection logs with false positives in order to obfuscate a real attack.|http://inundator.sourceforge.net/
lans|168.4ad2333|A Multithreaded asynchronous packet parsing/injecting arp spoofer.|https://github.com/DanMcInerney/LANs.py
lsrtunnel|0.2|Spoofs connections using source routed packets.|http://www.synacklabs.net/projects/lsrtunnel/
motsa-dns-spoofing|2.6ac6980|ManOnTheSideAttack-DNS Spoofing.|https://github.com/waytoalpit/ManOnTheSideAttack-DNS-Spoofing
multimac|1.0.3|Multiple MACs on an adapter|http://sourceforge.net/projects/multimac/
nbnspoof|1.0|NBNSpoof - NetBIOS Name Service Spoofer|http://www.mcgrewsecurity.com/tools/nbnspoof/
netcommander|1.3|An easy-to-use arp spoofing tool.|https://github.com/evilsocket/netcommander
smikims-arpspoof|14.7fd3021|Performs an ARP spoofing attack using the Linux kernel's raw sockets.|https://github.com/smikims/arpspoof
synner|1.1|A custom eth->ip->tcp packet generator (spoofer) for testing firewalls and dos attacks.|http://packetstormsecurity.com/files/69802/synner.c.html

View File

@ -1 +0,0 @@
magictree|1.3|A penetration tester productivity tool designed to allow easy and straightforward data consolidation, querying, external command execution and report generation|http://www.gremwell.com

View File

@ -1,15 +0,0 @@
chownat|0.08b|Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other|http://samy.pl/chownat/
corkscrew|2.0|A tool for tunneling SSH through HTTP proxies|http://www.agroman.net/corkscrew/
ctunnel|0.7|Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel.|http://nardcore.org/ctunnel
dns2tcp|0.5.2|A tool for relaying TCP connections over DNS.|http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
fraud-bridge|10.775c563|ICMP and DNS tunneling via IPv4 and IPv6.|https://github.com/stealth/fraud-bridge
httptunnel|3.3|Creates a bidirectional virtual data connection tunnelled in HTTP requests|http://www.nocrew.org/software/httptunnel
icmptx|0.2|IP over ICMP tunnel.|http://thomer.com/icmptx/
iodine|0.7.0|Tunnel IPv4 data through a DNS server|http://code.kryo.se/iodine
ip-https-tools|7.170691f|Tools for the IP over HTTPS (IP-HTTPS) Tunneling Protocol.|https://github.com/takeshixx/ip-https-tools
matahari|0.1.30|A reverse HTTP shell to execute commands on remote machines behind firewalls.|http://matahari.sourceforge.net
morxtunnel|1.0|Network Tunneling using TUN/TAP interfaces over TCP tool.|http://www.morxploit.com/tools/
multitun|43.9804513|Tunnel arbitrary traffic through an innocuous WebSocket.|https://github.com/covertcodes/multitun
proxytunnel|1.9.0.253|a program that connects stdin and stdout to a server somewhere on the network, through a standard HTTPS proxy|http://proxytunnel.sourceforge.net
ptunnel|0.72|A tool for reliably tunneling TCP connections over ICMP echo request and reply packets|http://www.cs.uit.no/~daniels/PingTunnel/#download
vstt|0.5.0|VSTT is a multi-protocol tunneling tool. It accepts input by TCP stream sockets and FIFOs, and can send data via TCP, POP3, and ICMP tunneling.|http://www.wendzel.de/dr.org/files/Projects/vstt/

View File

@ -1,19 +0,0 @@
ace|1.10|Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface|http://ucsniff.sourceforge.net/ace.html
bluebox-ng|0.1.8|A GPL VoIP/UC vulnerability scanner.|https://github.com/jesusprubio/bluebox-ng
erase-registrations|1.0|An IAX flooder.|http://www.hackingexposedvoip.com/
ilty|1.0|An interception phone system for VoIP network.|http://chdir.org/~nico/ilty/
isip|2.fad1f10|Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.|https://github.com/halitalptekin/isip
isme|0.12|Scans a VOIP environment, adapts to enterprise VOIP, and exploits the possibilities of being connected directly to an IP Phone VLAN.|https://packetstormsecurity.com/files/123534/IP-Phone-Scanning-Made-Easy.12.html
pcapsipdump|0.2|A tool for dumping SIP sessions (+RTP traffic, if available) to disk in a fashion similar to 'tcpdump -w' (format is exactly the same), but one file per sip session (even if there is thousands of concurrect SIP sessions).|http://pcapsipdump.sourceforge.net/
protos-sip|2|SIP test suite.|https://www.ee.oulu.fi/research/ouspg/PROTOS_Test-Suite_c07-sip
redirectpoison|1.1|A tool to poison a targeted issuer of SIP INVITE requests with 301 (i.e. Moved Permanently) redirection responses.|http://www.hackingexposedvoip.com/
rtp-flood|1.0|RTP flooder|http://www.hackingexposedvoip.com/
siparmyknife|11232011|A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.|http://packetstormsecurity.com/files/107301/sipArmyKnife_11232011.pl.txt
sipbrute|11.5be2fdd|A utility to perform dictionary attacks against the VoIP SIP Register hash.|https://github.com/packetassailant/sipbrute
sipp|3.3|A free Open Source test tool / traffic generator for the SIP protocol.|http://sipp.sourceforge.net/
sipsak|0.9.6|A small command line tool for developers and administrators of Session Initiation Protocol (SIP) applications.|http://sipsak.org
storm-ring|0.1|This simple tool is useful to test a PABX with "allow guest" parameter set to "yes" (in this scenario an anonymous caller could place a call).|http://packetstormsecurity.com/files/115852/Storm-Ringing-PABX-Test-Tool.html
teardown|1.0|Command line tool to send a BYE request to tear down a call.|http://www.hackingexposedvoip.com/
vnak|1.cf0fda7|Aim is to be the one tool a user needs to attack multiple VoIP protocols.|https://www.isecpartners.com/vnak.html
voiper|0.07|A VoIP security testing toolkit incorporating several VoIP fuzzers and auxilliary tools to assist the auditor.|http://voiper.sourceforge.net/
voipong|2.0|A utility which detects all Voice Over IP calls on a pipeline, and for those which are G711 encoded, dumps actual conversation to seperate wave files.|http://www.enderunix.org/voipong/

View File

@ -1,109 +0,0 @@
0d1n|189.61913dc|Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.|https://github.com/CoolerVoid/0d1n
adfind|11.b38db67|Admin Panel Finder.|https://github.com/sahakkhotsanyan/adfind
adminpagefinder|0.1|This python script looks for a large amount of possible administrative interfaces on a given site.|http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
albatar|18.5a65ce4|A SQLi exploitation framework in Python.|https://github.com/lanjelot/albatar
arachni|1.4.4.gcd7b47b|A feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.|https://www.arachni-scanner.com
bbqsql|259.4f7c086|SQL injection exploit tool.|https://github.com/neohapsis/bbqsql
bbscan|11.be218a8|A tiny Batch weB vulnerability Scanner.|https://github.com/lijiejie/bbscan
bing-lfi-rfi|0.1|This is a python script for searching Bing for sites that may have local and remote file inclusion vulnerabilities.|http://packetstormsecurity.com/files/121590/Bing-LFI-RFI-Scanner.html
bsqlbf|2.7|Blind SQL Injection Brute Forcer.|http://code.google.com/p/bsqlbf-v2/
bsqlinjector|8.5dc3f27|Blind SQL injection exploitation tool written in ruby.|https://github.com/enjoiz/BSQLinjector
cansina|139.47f6ac8|A python-based Web Content Discovery Tool.|https://github.com/deibit/cansina
cjexploiter|4.fe2b191|Drag and Drop ClickJacking exploit development assistance tool.|https://github.com/enddo/CJExploiter
cloudget|53.807d08e|Python script to bypass cloudflare from command line. Built upon cfscrape module.|https://github.com/eudemonics/cloudget
cms-few|0.1|Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python.|http://packetstormsecurity.com/files/64722/cms_few.py.txt.html
cmsfuzz|5.6be5a98|Fuzzer for wordpress, cold fusion, drupal, joomla, and phpnuke.|https://github.com/nahamsec/CMSFuzz
commix|594.9de7c65|Automated All-in-One OS Command Injection and Exploitation Tool.|https://github.com/stasinopoulos/commix
crawlic|46.50208c7|Web recon tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server).|https://github.com/Ganapati/Crawlic
csrftester|1.0|The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws.|http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project
darkjumper|5.8|This tool will try to find every website that host at the same server at your target|http://sourceforge.net/projects/darkjumper/
dff-scanner|1.1|Tool for finding path of predictable resource locations.|http://netsec.rs/70/tools.html
dirbuster-ng|9.0c34920|C CLI implementation of the Java dirbuster tool.|https://github.com/digination/dirbuster-ng
dirs3arch|153.ebcebc3|HTTP(S) directory/file brute forcer.|https://github.com/maurosoria/dirs3arch
domi-owned|24.e87c358|A tool used for compromising IBM/Lotus Domino servers.|https://github.com/coldfusion39/domi-owned
doork|4.3e2d70a|Passive Vulnerability Auditor.|https://github.com/AeonDave/doork
drupalscan|0.5.2|Simple non-intrusive Drupal scanner.|https://rubygems.org/gems/DrupalScan/
dsfs|32.e27d6cb|A fully functional File inclusion vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.|https://github.com/stamparm/DSFS
dsjs|21.79cb2c4|A fully functional JavaScript library vulnerability scanner written in under 100 lines of code.|https://github.com/stamparm/DSJS
dsss|116.6d14edb|A fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.|https://github.com/stamparm/DSSS
dsxs|116.21427d6|A fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.|https://github.com/stamparm/DSXS
epicwebhoneypot|2.0a|Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host.|http://sourceforge.net/projects/epicwebhoneypot/
eyewitness|518.b84b21e|Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.|https://github.com/ChrisTruncer/EyeWitness
fbht|69.95c8bd5|A Facebook Hacking Tool|https://github.com/chinoogawa/fbht-linux
fhttp|1.3|This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more.|http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html
ghost-py|0.2.3|Webkit based webclient (relies on PyQT).|http://jeanphix.github.com/Ghost.py/
golismero|40.ece1eba|Opensource web security testing framework.|https://github.com/golismero/golismero
grabber|0.1|A web application scanner. Basically it detects some kind of vulnerabilities in your website.|http://rgaucher.info/beta/grabber/
htcap|12.952aa27|A web application analysis tool for detecting communications between javascript and the server.|https://github.com/segment-srl/htcap
httpforge|11.02.01|A set of shell tools that let you manipulate, send, receive, and analyze HTTP messages. These tools can be used to test, discover, and assert the security of Web servers, apps, and sites. An accompanying Python library is available for extensions.|http://packetstormsecurity.com/files/98109/HTTPForge.02.01.html
httppwnly|36.a55b6f6|"Repeater" style XSS post-exploitation tool for mass browser control.|https://github.com/Danladi/HttpPwnly
isr-form|1.0|Simple html parsing tool that extracts all form related information and generates reports of the data. Allows for quick analyzing of data.|http://www.infobyte.com.ar/
jaidam|10.a7d7c4a|Penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or joomla platform was used and finally check them automatically, for web vulnerabilities using two well-known open source tools, WPScan and Joomscan.|https://github.com/stasinopoulos/jaidam
jomplug|0.1|This php script fingerprints a given Joomla system and then uses Packet Storm's archive to check for bugs related to the installed components.|http://packetstormsecurity.com/files/121390/Janissaries-Joomla-Fingerprint-Tool.html
jooforce|11.43c21ad|A Joomla password brute force tester.|https://github.com/rastating/jooforce
joomlascan|1.2|Joomla scanner scans for known vulnerable remote file inclusion paths and files.|http://packetstormsecurity.com/files/62126/joomlascan.2.py.txt.html
joomlavs|209.2a7f03e|A black box, Ruby powered, Joomla vulnerability scanner.|https://github.com/rastating/joomlavs
joomscan|2012.03.10|Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.|http://joomscan.sourceforge.net/
kadimus|50.5897871|LFI Scan & Exploit Tool.|https://github.com/P0cL4bs/Kadimus
kolkata|3.0|A web application fingerprinting engine written in Perl that combines cryptography with IDS evasion.|http://www.blackhatlibrary.net/Kolkata
lfi-exploiter|1.1|This perl script leverages /proc/self/environ to attempt getting code execution out of a local file inclusion vulnerability..|http://packetstormsecurity.com/files/124332/LFI-Exploiter.1.html
lfi-fuzzploit|1.1|A simple tool to help in the fuzzing for, finding, and exploiting of local file inclusion vulnerabilities in Linux-based PHP applications.|http://packetstormsecurity.com/files/106912/LFI-Fuzzploit-Tool.1.html
lfi-image-helper|0.8|A simple script to infect images with PHP Backdoors for local file inclusion attacks.|http://packetstormsecurity.com/files/129871/LFI-Image-Helper.8.html
lfi-sploiter|1.0|This tool helps you exploit LFI (Local File Inclusion) vulnerabilities. Post discovery, simply pass the affected URL and vulnerable parameter to this tool. You can also use this tool to scan a URL for LFI vulnerabilities.|http://packetstormsecurity.com/files/96056/Simple-Local-File-Inclusion-Exploiter.0.html
lfifreak|21.0c6adef|A unique automated LFi Exploiter with Bind/Reverse Shells.|https://github.com/OsandaMalith/LFiFreak/
lfimap|1.4.8|This script is used to take the highest beneficts of the local file include vulnerability in a webserver.|https://code.google.com/p/lfimap/
liffy|65.8011cdd|A Local File Inclusion Exploitation tool.|https://github.com/rotlogix/liffy
metoscan|05|Tool for scanning the HTTP methods supported by a webserver. It works by testing a URL and checking the responses for the different requests.|http://www.open-labs.org/
morxtraversal|1.0|Path Traversal checking tool.|http://www.morxploit.com/tools/
multiinjector|0.3|Automatic SQL injection utility using a lsit of URI addresses to test parameter manipulation.|http://chaptersinwebsecurity.blogspot.de/2008/11/multiinjector-v03-released.html
nosqlmap|182.0ff71dc|Automated Mongo database and NoSQL web application exploitation tool|https://github.com/tcstool/NoSQLMap.git
owasp-bywaf|26.e730d1b|A web application penetration testing framework (WAPTF).|https://github.com/depasonico/OWASP-ByWaf
owtf|1017.0bbeea1|The Offensive (Web) Testing Framework.|https://www.owasp.org/index.php/OWASP_OWTF
pappy-proxy|59.f28ab4f|An intercepting proxy for web application testing.|https://github.com/roglew/pappy-proxy
paros|3.2.13|Java-based HTTP/HTTPS proxy for assessing web app vulnerabilities. Supports editing/viewing HTTP messages on-the-fly, spiders, client certificates, proxy-chaining, intelligent scanning for XSS and SQLi, etc.|http://www.parosproxy.org
pblind|1.0|Little utility to help exploiting blind sql injection vulnerabilities.|http://www.edge-security.com/pblind.php
peepingtom|56.bc6f4d8|A tool to take screenshots of websites. Much like eyewitness.|https://bitbucket.org/LaNMaSteR53/peepingtom
phpsploit|686.d61fca7|Stealth post-exploitation framework.|https://github.com/nil0x42/phpsploit
plecost|88.149fd34|Wordpress finger printer Tool.|https://github.com/iniqua/plecost
plown|13.ccf998c|A security scanner for Plone CMS.|https://github.com/unweb/plown
proxenet|589.3e07775|THE REAL hacker friendly proxy for web application pentests.|https://github.com/hugsy/proxenet
pyfiscan|1548.d2ed692|Free web-application vulnerability and version scanner.|https://github.com/fgeek/pyfiscan
rww-attack|0.9.2|The Remote Web Workplace Attack tool will perform a dictionary attack against a live Microsoft Windows Small Business Server's 'Remote Web Workplace' portal. It currently supports both SBS 2003 and SBS 2008 and includes features to avoid account lock out.|http://packetstormsecurity.com/files/79021/Remote-Web-Workplace-Attack-Tool.html
sawef|28.e65dc9f|Send Attack Web Forms.|https://github.com/danilovazb/sawef
scrapy|1.0.5|A fast high-level scraping and web crawling framework.|http://scrapy.org
secscan|1.5|Web Apps Scanner and Much more utilities.|http://code.google.com/p/secscan-py/
shortfuzzy|0.1|A web fuzzing script written in perl.|http://packetstormsecurity.com/files/104872/Short-Fuzzy-Rat-Scanner.html
spaf|11.671a976|Static Php Analysis and Fuzzer.|https://github.com/Ganapati/spaf
sparty|0.1|An open source tool written in python to audit web applications using sharepoint and frontpage architecture.|http://sparty.secniche.org/
spiga|410.07b9055|Configurable web resource scanner.|https://github.com/getdual/scripts-n-tools/blob/master/spiga.py
spike-proxy|148|A Proxy for detecting vulnerabilities in web applications|http://www.immunitysec.com/resources-freesoftware.shtml
spipscan|69.4ad3235|SPIP (CMS) scanner for penetration testing purpose written in Python.|https://github.com/PaulSec/SPIPScan
sqid|0.3|A SQL injection digger.|http://sqid.rubyforge.org/
sqlmap|1.0.6|Automatic SQL injection and database takeover tool|http://sqlmap.org
themole|0.3|Automatic SQL injection exploitation tool.|http://sourceforge.net/projects/themole/
urlcrazy|0.5|Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.|http://www.morningstarsecurity.com/research/urlcrazy
urldigger|02c|A python tool to extract URL addresses from different HOT sources and/or detect SPAM and malicious code|https://code.google.com/p/urldigger/
vanguard|0.1|A comprehensive web penetration testing tool written in Perl thatidentifies vulnerabilities in web applications.|http://packetstormsecurity.com/files/110603/Vanguard-Pentesting-Scanner.html
vbscan|10.1afac1b|A black box vBulletin vulnerability scanner written in perl.|https://github.com/rezasp/vbscan
vega|1.0|An open source platform to test the security of web applications.|https://github.com/subgraph/Vega/wiki
vsvbp|6.241a7ab|Black box tool for Vulnerability detection in web applications.|https://github.com/varunjammula/VSVBP
wafp|0.01_26c3|An easy to use Web Application Finger Printing tool written in ruby using sqlite3 databases for storing the fingerprints.|http://packetstormsecurity.com/files/84468/Web-Application-Finger-Printer.01-26c3.html
web-soul|2|A plugin based scanner for attacking and data mining web sites written in Perl.|http://packetstormsecurity.com/files/122064/Web-Soul-Scanner.html
webhandler|324.047dddf|A handler for PHP system functions & also an alternative 'netcat' handler.|https://github.com/lnxg33k/webhandler
webslayer|5|A tool designed for brute forcing Web Applications.|https://code.google.com/p/webslayer/
webxploiter|20.41a11d1|An OWASP Top 10 Security scanner.|https://github.com/xionsec/WebXploiter
wig|561.e4e5482|WebApp Information Gatherer.|https://github.com/jekyc/wig
witchxtool|1.1|A perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.|http://packetstormsecurity.com/files/97465/Witchxtool-Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool.1.html
ws-attacker|1.7|A modular framework for web services penetration testing.|http://ws-attacker.sourceforge.net/
xsser|1.7|A penetration testing tool for detecting and exploiting XSS vulnerabilites.|http://xsser.sourceforge.net/
xssless|45.8e7ebe1|An automated XSS payload generator written in python.|https://github.com/mandatoryprogrammer/xssless
xsspy|25.7b1a833|Web Application XSS Scanner.|https://github.com/faizann24/XssPy
xsss|0.40b|A brute force cross site scripting scanner.|http://www.sven.de/xsss/
xssscan|17.7f1ea90|Command line tool for detection of XSS attacks in URLs. Based on ModSecurity rules from OWASP CRS.|https://github.com/gwroblew/detectXSSlib
xsssniper|0.9|An automatic XSS discovery tool|https://github.com/gbrindisi/xsssniper
xssya|12.abe1aec|A Cross Site Scripting Scanner & Vulnerability Confirmation.|https://github.com/yehia-mamdouh/XSSYA
yaaf|7.4d6273a|Yet Another Admin Finder.|https://github.com/Plasticoo/YAAF
yasuo|107.a917a6e|A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network.|https://github.com/0xsauby/yasuo
ycrawler|0.1|A web crawler that is useful for grabbing all user supplied input related to a given website and will save the output. It has proxy and log file support.|http://packetstormsecurity.com/files/98546/yCrawler-Web-Crawling-Utility.html
ysoserial|0.0.2|A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.|https://github.com/frohoff/ysoserial
zaproxy|2.5.0|Integrated penetration testing tool for finding vulnerabilities in web applications|https://www.owasp.org/index.php/ZAP

View File

@ -1,48 +0,0 @@
3proxy-win32|0.7.1.2|Tiny free proxy server.|http://3proxy.ru/
atstaketools|0.1|This is an archive of various @Stake tools that help perform vulnerability scanning and analysis, information gathering, password auditing, and forensics.|http://packetstormsecurity.com/files/50718/AtStakeTools.zip.html
brutus|2|One of the fastest, most flexible remote password crackers you can get your hands on.|http://www.hoobie.net/brutus/
chrome-decode|0.1|Chrome web browser decoder tool that demonstrates recovering passwords.|http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html
chromensics|1.0|A Google chrome forensics tool.|https://sourceforge.net/projects/chromensics/
dark-dork-searcher|1.0|Dark-Dork Searcher.|http://rafale.org/~mattoufoutu/darkc0de.com/c0de/c/
directorytraversalscan|1.0.1.0|Detect directory traversal vulnerabilities in HTTP servers and web applications.|http://sourceforge.net/projects/httpdirscan/
dumpacl|0.0|Dumps NTs ACLs and audit settings.|http://www.systemtools.com/cgi-bin/download.pl?DumpAcl
fport|2.0|Identify unknown open ports and their associated applications.|http://www.foundstone.com/us/resources/proddesc/fport.htm
fuzztalk|1.0.0.0|An XML driven fuzz testing framework that emphasizes easy extensibility and reusability.|https://code.google.com/p/fuzztalk
gtalk-decode|0.1|Google Talk decoder tool that demonstrates recovering passwords from accounts.|http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html
handle|0.0|An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,..|http://www.tarasco.org/security/handle/index.html
hookanalyser|3.1|A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.|http://hookanalyser.blogspot.de/
httpbog|1.0.0.0|A slow HTTP denial-of-service tool that works similarly to other attacks, but rather than leveraging request headers or POST data Bog consumes sockets by slowly reading responses.|http://sourceforge.net/projects/httpbog/
httprint-win32|301|A web server fingerprinting tool (Windows binaries).|http://net-square.com/httprint
hyperion|1.2|A runtime encrypter for 32-bit portable executables.|http://nullsecurity.net/tools/binary.html
ikeprobe|0.1|Determine vulnerabilities in the PSK implementation of the VPN server.|http://www.ernw.de/download/ikeprobe.zip
intercepter-ng|0.9.10|A next generation sniffer including a lot of features: capturing passwords/hashes, sniffing chat messages, performing man-in-the-middle attacks, etc.|http://sniff.su/download.html
klogger|1.0|A keystroke logger for the NT-series of Windows.|http://ntsecurity.nu/toolbox/klogger/
malwareanalyser|3.3|A freeware tool to perform static and dynamic analysis on malware.|http://malwareanalyser.blogspot.de/2011/10/malware-analyser.html
mbenum|1.5.0|Queries the master browser for whatever information it has registered.|http://www.cqure.net/wp/mbenum/
mimikatz|2.1.0_alpha_20160606.1|A little tool to play with Windows security.|https://github.com/gentilkiwi/mimikatz
msvpwn|65.328921b|Bypass Windows' authentication via binary patching.|https://bitbucket.org/mrabault/msvpwn
nbtenum|3.3|A utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts.|http://reedarvin.thearvins.com/
nishang|0.5.0|Using PowerShell for Penetration Testing.|https://code.google.com/p/nishang/
ntds-decode|0.1|This application dumps LM and NTLM hashes from active accounts stored in an Active Directory database.|http://packetstormsecurity.com/files/121543/NTDS-Hash-Decoder.b.html
orakelcrackert|1.00|This tool can crack passwords which are encrypted using Oracle's latest SHA1 based password protection algorithm.|http://freeworld.thc.org/thc-orakelcrackert11g/
pextractor|0.18b|A forensics tool that can extract all files from an executable file created by a joiner or similar.|http://packetstormsecurity.com/files/62977/PExtractor_v0.18b_binary_and_src.rar.html
php-vulnerability-hunter|1.4.0.20|An whitebox fuzz testing tool capable of detected several classes of vulnerabilities in PHP web applications.|https://phpvulnhunter.codeplex.com/
pmap|1.10|Passively discover, scan, and fingerprint link-local peers by the background noise they generate (i.e. their broadcast and multicast traffic).|http://www.hellfiresecurity.com/tools.htm
pstoreview|1.0|Lists the contents of the Protected Storage.|http://www.ntsecurity.nu/toolbox/pstoreview/
pwdump|7.1|Extracts the binary SAM and SYSTEM file from the filesystem and then the hashes.|http://www.tarasco.org/security/pwdump_7/index.html
radiography|2|A forensic tool which grabs as much information as possible from a Windows system.|http://www.security-projects.com/?RadioGraPhy
rpcsniffer|7.9fab095|Sniffs WINDOWS RPC messages in a given RPC server process.|https://github.com/AdiKo/RPCSniffer
sipscan|0.1|A sip scanner.|http://www.hackingvoip.com/sec_tools.html
skype-dump|0.1|This is a tool that demonstrates dumping MD5 password hashes from the configuration file in Skype.|http://packetstormsecurity.com/files/119155/Skype-Hash-Dumper.0.html
smbrelay|3|SMB / HTTP to SMB replay attack toolkit.|http://www.tarasco.org/security/smbrelay/
snscan|1.05|A Windows based SNMP detection utility that can quickly and accurately identify SNMP enabled devices on a network.|http://www.mcafee.com/uk/downloads/free-tools/snscan.aspx
spade|114|A general-purpose Internet utility package, with some extra features to help in tracing the source of spam and other forms of Internet harassment.|http://www.hoobie.net/brutus/
sqlping|4|SQL Server scanning tool that also checks for weak passwords using wordlists.|http://www.sqlsecurity.com/downloads
superscan|4.1|Powerful TCP port scanner, pinger, resolver.|http://www.foundstone.com/us/resources/proddesc/superscan.htm
sysinternals-suite|1.8|Sysinternals tools suite.|http://sysinternals.com/
unsecure|1.2|Bruteforces network login masks.|http://www.sniperx.net/
upnp-pentest-toolkit|1.1|UPnP Pentest Toolkit for Windows.|https://github.com/nccgroup/UPnP-Pentest-Toolkit
wifichannelmonitor|1.42|A utility for Windows that captures wifi traffic on the channel you choose, using Microsoft Network Monitor capture driver.|https://github.com/gentilkiwi/wifichannelmonitor
windows-privesc-check|181.9f304fd|Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems.|https://github.com/pentestmonkey/windows-privesc-check
winfo|2.0|Uses null sessions to remotely try to retrieve lists of and information about user accounts, workstation/interdomain/server trust accounts, shares (also hidden), sessions, logged in users, and password/lockout policy, from Windows NT/2000/XP.|http://www.ntsecurity.nu/toolbox/winfo/
x-scan|3.3|A general network vulnerabilities scanner for scanning network vulnerabilities for specific IP address scope or stand-alone computer by multi-threading method, plug-ins are supportable.|http://www.xfocus.org/

View File

@ -1,56 +0,0 @@
aircrack-ng|1.2rc4|Key cracker for the 802.11 WEP and WPA-PSK protocols|http://www.aircrack-ng.org
airflood|0.1|A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections.|http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
airoscript|45.0a122ee|A script to simplify the use of aircrack-ng tools.|http://midnightresearch.com/projects/wicrawl/
airpwn|1.4|A tool for generic packet injection on an 802.11 network.|http://airpwn.sourceforge.net
aphopper|0.3|AP Hopper is a program that automatically hops between access points of different wireless networks.|http://aphopper.sourceforge.net/
apnbf|0.1|A small python script designed for enumerating valid APNs (Access Point Name) on a GTP-C speaking device.|http://www.c0decafe.de/
batctl|2016.2|B.A.T.M.A.N. advanced control and management tool|http://www.open-mesh.net/
batman-adv|2016.0|Batman kernel module, (included upstream since .38)|http://www.open-mesh.net/
batman-alfred|2016.0|Almighty Lightweight Fact Remote Exchange Daemon|http://www.open-mesh.org/
beholder|0.8.10|A wireless intrusion detection tool that looks for anomalies in a wifi environment.|http://www.beholderwireless.org/
cowpatty|4.6|Wireless WPA/WPA2 PSK handshake cracking utility|http://www.wirelessdefence.org/Contents/Files/
create_ap|206.a7fa8b5|This script creates a NATed or Bridged WiFi Access Point.|https://github.com/oblique/create_ap
eapeak|115.478a781|Analysis Suite For EAP Enabled Wireless Networks.|https://github.com/securestate/eapeak
freeradius|3.0.11|The premier open source RADIUS server|http://www.freeradius.org/
fuzzap|14.f13932c|A python script for obfuscating wireless networks.|https://github.com/lostincynicism/FuzzAP
g72x++|1|Decoder for the g72x++ codec.|http://www.ps-auxw.de/
gerix-wifi-cracker|1.1c3cd73|A graphical user interface for aircrack-ng and pyrit.|https://github.com/TigerSecurity
giskismet|20110805|A program to visually represent the Kismet data in a flexible manner.|http://www.giskismet.org
gnuradio|3.7.9.2|General purpose DSP and SDR toolkit. With drivers for usrp and fcd.|http://gnuradio.org
gqrx|2.5.3|Interactive SDR receiver waterfall for many devices.|http://gqrx.dk/
hoover|4.9bda860|Wireless Probe Requests Sniffer.|https://github.com/xme/hoover/
hostapd-wpe|2.2|IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator - Wireless Pwnage Edition.|https://github.com/OpenSecurityResearch/hostapd-wpe
hotspotter|0.4|Hotspotter passively monitors the network for probe request frames to identify the preferred networks of Windows XP clients, and will compare it to a supplied list of common hotspot network names.|http://www.remote-exploit.org/?page_id=418
jcrack|0.3.3beta|A utility to create dictionary files that will crack the default passwords of select wireless gateways|http://www.thedrahos.net/jcrack/
kismet|2013_03_R1b|802.11 layer2 wireless network detector, sniffer, and intrusion detection system|http://www.kismetwireless.net/
kismet-earth|0.1|Various scripts to convert kismet logs to kml file to be used in Google Earth.|https://www.blackarch.org/
kismet2earth|1.0|A set of utilities that convert from Kismet logs to Google Earth .kml format|http://code.google.com/p/kismet2earth/
lorcon|2.0.0.20091101|Generic library for injecting 802.11 frames|http://802.11ninja.net/
mana|68.56bcfcd|A toolkit for rogue access point (evilAP) attacks first presented at Defcon 22.|https://github.com/sensepost/mana
mdk3|v6|WLAN penetration tool|http://aspj.aircrack-ng.org/
mfcuk|0.3.8|MIFARE Classic Universal toolKit|http://code.google.com/p/mfcuk/
pixiewps|53.1448fff|An offline WPS bruteforce utility.|https://github.com/wiire/pixiewps
reaver|1.4|Brute force attack against Wifi Protected Setup|http://code.google.com/p/reaver-wps/
rfdump|1.6|A back-end GPL tool to directly inter-operate with any RFID ISO-Reader to make the contents stored on RFID tags accessible|http://www.rfdump.org
rfidiot|73.91d9f16|An open source python library for exploring RFID devices.|http://rfidiot.org/
rfidtool|0.01|A opensource tool to read / write rfid tags|http://www.bindshell.net/tools/rfidtool.html
spectools|2010_04_R1|Spectrum-Tools is a set of utilities for using the Wi-Spy USB spectrum analyzer hardware. Stable version.|http://www.kismetwireless.net/spectools/
timegen|0.4|This program generates a *.wav file to "send" an own time signal to DCF77 compatible devices.|http://bastianborn.de/radio-clock-hack/
ubitack|0.3|Tool, which automates some of the tasks you might need on a (wireless) penetration test or while you are on the go.|https://code.google.com/p/ubitack/
waidps|16.ff8d270|Wireless Auditing, Intrusion Detection & Prevention System.|https://github.com/SYWorks/waidps
wavemon|0.8.0|Ncurses-based monitoring application for wireless network devices|http://eden-feed.erg.abdn.ac.uk/wavemon/
wepbuster|1.0_beta_0.7|script for automating aircrack-ng|http://code.google.com/p/wepbuster/
wi-feye|1.1|An automated wireless penetration testing tool written in python, its designed to simplify common attacks that can be performed on wifi networks so that they can be executed quickly and easily.|http://wi-feye.za1d.com/download.php
wifi-pumpkin|84.c8fa6fc|Framework for Rogue Wi-Fi Access Point Attack.|https://github.com/P0cL4bs/WiFi-Pumpkin
wificurse|0.3.9|WiFi jamming tool.|https://github.com/oblique/wificurse
wifijammer|66.abf7ea0|A python script to continuosly jam all wifi clients within range.|https://github.com/DanMcInerney/wifijammer
wifiphisher|243.1761d2c|Fast automated phishing attacks against WPA networks.|https://github.com/sophron/wifiphisher
wifiscanmap|106.3f45949|Another wifi mapping tool.|https://github.com/mehdilauters/wifiScanMap
wifitap|2b16088|WiFi injection tool through tun/tap device.|https://github.com/GDSSecurity/wifitap
wireless-ids|24.b132071|Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets.|https://github.com/SYWorks/wireless-ids
wirouter-keyrec|1.1.2|A powerful and platform independent software to recover the default WPA passphrases of the supported router models (Telecom Italia Alice AGPF, Fastweb Pirelli, Fastweb Tesley, Eircom Netopia, Pirelli TeleTu/Tele 2).|http://www.salvatorefresta.net/tools/
wlan2eth|1.3|Re-writes 802.11 captures into standard Ethernet frames.|http://www.willhackforsushi.com/?page_id=79
wpa-bruteforcer|4.d5f8586|Attacking WPA/WPA encrypted access point without client.|https://github.com/SYWorks/wpa-bruteforcer
wpa2-halfhandshake-crack|27.6ed850f|A POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing the passphrase of the actual AP.|https://github.com/dxa4481/WPA2-HalfHandshake-Crack
zizzania|115.a063e6c|Automated DeAuth attack.|https://github.com/cyrus-and/zizzania
zykeys|0.1|Demonstrates how default wireless settings are derived on some models of ZyXEL routers.|http://packetstormsecurity.com/files/119156/Zykeys-Wireless-Tool.html