PatrowlHears (Vulnerability Intelligence Center) :: Tools
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
PatrowlHears (Vulnerability Intelligence Center) :: Tools
PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...
KillerBee (Exploiting ZigBee and IEEE 802.15.4 Networks) :: Framework
KillerBee is a Python based framework and tool set for exploring and exploiting the security of ZigBee and IEEE 802.15.4 networks. ...
Shellter is a dynamic shellcode injection tool , and probably the first dynamic PE infector ever created. It can be used in order to inj...
Liffy (Local File Inclusion Exploitation) :: Tools
Liffy is a tool to exploit local file inclusion vulnerability using the built-in wrappers php://input, data://, and a process control ...
Immunity Canvas (Vulnerability Exploitation) :: Tools
Immunity Canvas is a commercial vulnerability exploitation tool from Dave Aitel's ImmunitySec. It includes more than 370 exploits an...
Cisco Torch is a mass scanning, fingerprinting, and exploitation tool was written while working on the next edition of the "Hac...
SAINT 8 (Security Auditing Suite) :: Framework
SAINT 8 is a fully-integrated security tool suite that combines vulnerability scanning , with penetration testing , social engineering ...
Cisco Global Exploiter (CGE) , is an advanced, simple and fast security testing tool/ exploit engine, that is able to exploit 14...
Immunity Debugger :: Tools
Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...
Ardamax Keylogger :: Tools
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be ...
Bizploit (ERP Penetration Testing) :: Framework
Bizploit is the first Opensource ERP Penetration Testing framework . Developed by the Onapsis Research Labs, Bizploit assists secur...
CSRFTester (CSRF Vulnerability Tester) :: Tools
OWASP CSRFTester is a tool for testing CSRF vulnerability in websites . Just when developers are starting to run in circles over Cross...
SILICA (WiFi Penetration Testing) :: Tools
SILICA is a tool for hacking or Wi-Fi penetration testing . Understanding the vulnerabilities of your WiFi network can be challengin...
Blooover (J2ME Phone Autditing) :: Tools
Blooover is a J2ME Phone Auditing Tool . Since Adam Laurie's BlueSnarf experiment and the subsequent BlueBug experiment it is proven t...
BlueBugger (Information Gathering) :: Tools
BlueBugger is a tool for bluetooth devices. You can get all informations, phonebook entries and messages with a simply run. Bluebugger i...
BlueMaho (Bluetooth Devices Security Testing) :: Tools
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices . It is freeware, opensource, written ...
Social Engineering Toolkit (SET) :: Tools
The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec . It is an open-source Python-driven tool aimed...
Kali Linux is a newer version of BackTrack with additional tools. Kali Linux is a Debian-derived Linux distribution designed for for...
Aircrack-ng is a free open source tool for cracking 802.11 WEP and WPA-PSK that can (crack the key through the enough data packets o...
Metasploit Framework
Metasploit Framework is a most usable framework for exploiting network or servers. Metasploit Framework took the security world by st...