PatrowlHears (Vulnerability Intelligence Center) :: Tools PatrowlHears (Vulnerability Intelligence Center) :: Tools

    PatrowlHears provides a unified source of vulnerability, exploit and threat Intelligence feeds. Users accesses a comprehensive and conti...

Read more »

KillerBee (Exploiting ZigBee and IEEE 802.15.4 Networks) :: Framework KillerBee (Exploiting ZigBee and IEEE 802.15.4 Networks) :: Framework

KillerBee is a Python based framework and tool set for exploring and exploiting the security of ZigBee and IEEE 802.15.4 networks. ...

Read more »

Shellter (Dynamic Shellcode Injection) :: Tools Shellter (Dynamic Shellcode Injection) :: Tools

Shellter is a dynamic shellcode injection tool , and probably the first dynamic PE infector ever created. It can be used in order to inj...

Read more »

Liffy (Local File Inclusion Exploitation) :: Tools Liffy (Local File Inclusion Exploitation) :: Tools

Liffy is a tool to exploit local file inclusion vulnerability using the built-in wrappers php://input, data://, and a process control ...

Read more »

Immunity Canvas (Vulnerability Exploitation) :: Tools Immunity Canvas (Vulnerability Exploitation) :: Tools

Immunity Canvas is a commercial vulnerability exploitation tool from Dave Aitel's ImmunitySec. It includes more than 370 exploits an...

Read more »

Cisco Torch (Scanning, Fingerprinting and Exploitation) :: Tools Cisco Torch (Scanning, Fingerprinting and Exploitation) :: Tools

Cisco Torch is a mass scanning, fingerprinting, and exploitation tool was written while working on the next edition of the "Hac...

Read more »

SAINT 8 (Security Auditing Suite) :: Framework SAINT 8 (Security Auditing Suite) :: Framework

SAINT 8 is a fully-integrated security tool suite that combines vulnerability scanning , with penetration testing , social engineering ...

Read more »

Cisco Global Exploiter (CGE) :: Tools Cisco Global Exploiter (CGE) :: Tools

Cisco Global Exploiter (CGE) , is an advanced, simple and fast security testing tool/ exploit engine, that is able to exploit 14...

Read more »

Immunity Debugger :: Tools Immunity Debugger :: Tools

Immunity Debugger is a powerful new way to write exploits, analyze malware , and reverse engineer binary files. It builds on a solid ...

Read more »

Ardamax Keylogger :: Tools Ardamax Keylogger :: Tools

Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be ...

Read more »

Bizploit (ERP Penetration Testing) :: Framework Bizploit (ERP Penetration Testing) :: Framework

Bizploit is the first Opensource ERP Penetration Testing framework . Developed by the Onapsis Research Labs, Bizploit assists secur...

Read more »

CSRFTester (CSRF Vulnerability Tester) :: Tools CSRFTester (CSRF Vulnerability Tester) :: Tools

  OWASP CSRFTester is a tool for testing CSRF vulnerability in websites . Just when developers are starting to run in circles over Cross...

Read more »

SILICA (WiFi Penetration Testing) :: Tools SILICA (WiFi Penetration Testing) :: Tools

SILICA is a tool for hacking or Wi-Fi penetration testing . Understanding the vulnerabilities of your WiFi network can be challengin...

Read more »

Blooover (J2ME Phone Autditing) :: Tools Blooover (J2ME Phone Autditing) :: Tools

Blooover is a J2ME Phone Auditing Tool . Since Adam Laurie's BlueSnarf experiment and the subsequent BlueBug experiment it is proven t...

Read more »

BlueBugger (Information Gathering) :: Tools BlueBugger (Information Gathering) :: Tools

BlueBugger is a tool for bluetooth devices. You can get all informations, phonebook entries and messages with a simply run. Bluebugger i...

Read more »

BlueMaho (Bluetooth Devices Security Testing) :: Tools BlueMaho (Bluetooth Devices Security Testing) :: Tools

BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices . It is freeware, opensource, written ...

Read more »

Social Engineering Toolkit (SET) :: Tools Social Engineering Toolkit (SET) :: Tools

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec . It is an open-source Python-driven tool aimed...

Read more »

Kali Linux :: ToolWar Kali Linux :: ToolWar

Kali Linux is a newer version of BackTrack with additional tools. Kali Linux is a Debian-derived Linux distribution designed for for...

Read more »

Aircrack-ng 1.2 Beta :: Tools Aircrack-ng 1.2 Beta :: Tools

Aircrack-ng is a free open source tool for cracking 802.11 WEP and WPA-PSK that can (crack the key through the enough data packets o...

Read more »

Metasploit Framework Metasploit Framework

Metasploit Framework is a most usable framework for exploiting network or servers. Metasploit Framework took the security world by st...

Read more »
 
Top