ToolWar | Information Security (InfoSec) Tools
Thursday, 11 February 2021

PatrowlHears (Vulnerability Intelligence Center) :: Tools

›
    PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
Friday, 29 January 2021

WebReaver (Advanced Web Security Scanner) :: Framework

›
  WebReaver is an elegant, easy to use and fully-automated, web application security security testing tool for Mac, Windows and Linux, sui...

Creepy (A Geolocation OSINT Tool) :: Tools

›
    Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking ...
Thursday, 28 January 2021

SubBrute (Subdomain Bruteforcer) :: Tools

›
    SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of th...
Monday, 5 August 2019

WebSlayer (Brute Forcing Web Applications) :: Tools

›
WebSlayer is a tool designed for brute forcing Web Applications, it can be used for finding resources not linked (directories, servl...
Monday, 1 July 2019

OWASP Amass - Subdomain Enumeration/Scanner : Tool

›
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and p...
Sunday, 31 March 2019

FireEye Commando VM : Distribution

›
CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Penetration testers comm...
1 comment:
Saturday, 23 February 2019

Sublist3r - Subdomain Enumeration / Scanner : Tools

›
Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collec...
Monday, 22 August 2016

Raptor (Web Application Firewall) :: Tools

›
Raptor is an Open Source Tool, your focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’...
1 comment:

Katana (Penetration Testing) :: Framework

›
Katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to us...
1 comment:
Thursday, 21 April 2016

Echo Mirage 3.1 :: Tools

›
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Monday, 21 March 2016

Mobile Security Framework (MobSF) : Framework

›
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing fram...
Friday, 23 October 2015

File Checksum Integrity Verifier (FCIV) :: Tools

›
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
Monday, 13 April 2015

SpiderFoot (Open Source Footprinting) :: Tools

›
SpiderFoot is a free, open-source footprinting tool , enabling you to perform various scans against a given domain name in order to obta...
Monday, 6 April 2015

Suricata (IDS/IPS Engine) :: Tools

›
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just re...
Friday, 3 April 2015

EtherApe (Graphical Network Monitor) :: Tools

›
EtherApe is a graphical network monitor for Unix modeled after etherman . Featuring link layer, IP and TCP modes, it displays network ...
1 comment:
Sunday, 29 March 2015

XSSYA v2.0 (Cross Site Scripting Vulnerability Confirmation) :: Tools

›
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation) written in python scripting language confirm the XSS Vulnerabili...
Tuesday, 24 March 2015

Distributed Network Attack (DNA) :: Framework

›
Distributed Network Attack (DNA) is a new approach to recovering password protected files . In the past, recoveries have been limi...
Sunday, 22 March 2015

FoxAnalysis :: Tools

›
FoxAnalysis Plus is a software tool for extracting, viewing and analysing internet history from the Mozilla Firefox web browser...
Saturday, 7 March 2015

Juli (MITM) :: Tools

›
A simple automated perl script for MiTM ( man-in-the-middle ) attacks. Requirements: Linux ( I tested it on Ubuntu 14.04 LTS ) Per...
Thursday, 5 March 2015

Orbot (Tor for Android Devices) :: Tools

›
Orbot is a free proxy app that empowers other apps to use the internet more securely . Orbot uses Tor to encrypt your Internet traff...
Sunday, 1 March 2015

Capstone (Disassembly Framework) :: Framework

›
Capstone is a lightweight multi-platform, multi-architecture disassembly framework . Our target is to make Capstone the ultimate disass...
Monday, 9 February 2015

Mandiant Redline (Memory and File Analysis) :: Tools

›
  Redline, Mandiant’s premier free tool, provides host investigative capabilities to users to find signs of malicious activity throug...
Thursday, 29 January 2015

Microsoft's Network Monitor (Capturing and Protocol Analysis of Network Traffic) :: Tools

›
Microsoft's Network Monitor is a tools that allow capturing and protocol analysis of network traffic . Network Monitor 3 is a proto...
Monday, 15 December 2014

WAIDPS (Wireless Auditing and IDS/IPS) :: Tools

›
WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and wo...
Friday, 21 November 2014

Detekt :: Malware Detection Tool against Government Surveillance

›
Detekt is a free tool that scans your Windows computer for traces of known surveillance spyware used to target and monitor human righ...
›
Home
View web version
Powered by Blogger.