
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
WebReaver is an elegant, easy to use and fully-automated, web application security security testing tool for Mac, Windows and Linux, sui...
Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking ...
SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of th...
WebSlayer is a tool designed for brute forcing Web Applications, it can be used for finding resources not linked (directories, servl...
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and p...
CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Penetration testers comm...
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collec...
Raptor is an Open Source Tool, your focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’...
Katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to us...
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing fram...
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
SpiderFoot is a free, open-source footprinting tool , enabling you to perform various scans against a given domain name in order to obta...
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just re...
EtherApe is a graphical network monitor for Unix modeled after etherman . Featuring link layer, IP and TCP modes, it displays network ...
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation) written in python scripting language confirm the XSS Vulnerabili...
Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...
FoxAnalysis Plus is a software tool for extracting, viewing and analysing internet history from the Mozilla Firefox web browser...
A simple automated perl script for MiTM ( man-in-the-middle ) attacks. Requirements: Linux ( I tested it on Ubuntu 14.04 LTS ) Per...
Orbot is a free proxy app that empowers other apps to use the internet more securely . Orbot uses Tor to encrypt your Internet traff...
Capstone is a lightweight multi-platform, multi-architecture disassembly framework . Our target is to make Capstone the ultimate disass...
Redline, Mandiant’s premier free tool, provides host investigative capabilities to users to find signs of malicious activity throug...
Microsoft's Network Monitor is a tools that allow capturing and protocol analysis of network traffic . Network Monitor 3 is a proto...
WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and wo...
Detekt is a free tool that scans your Windows computer for traces of known surveillance spyware used to target and monitor human righ...