ACE (Telephony Analysis) :: Tools
ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of ...
ACE (Telephony Analysis) :: Tools
ACE (Automated Corporate Enumerator) is a simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of ...
Cisco Global Exploiter (CGE) , is an advanced, simple and fast security testing tool/ exploit engine, that is able to exploit 14...
Havij (Automated and Advanced SQL Injection) :: Tools
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web p...
Advanced Encryption Package :: Tools
Advanced Encryption Package is a File encryption , Secure File Transfer, Batch File Encryption and Encrypted Backups. Advanced Encryptio...
DLL Hijack Auditor (Audit DLL Hijacking Vulnerability) :: Tools
Dll Hijack Auditor is the smart tool to Audit against the Dll Hijacking Vulnerability in any Windows application. This is one of the c...
SSLsplit (MITM Attack against SSL/TLS) :: Tools
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently interc...
Simple Packet Sender- SRS (Packet Crafting) :: Tools
Simple Packet Sender (SPS) is a linux packet crafting tool . Supports IPv4, IPv6 including extension headers, and tunneling IPv6 over I...
PuTTY (SSH and Telnet Client) :: Tools
PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator. It is written ...
Oryon C Portable (Intelligence Investigations) :: Tools
Oryon C Portable is a web browser designed to assist researchers in conducting Open Source Intelligence investigations . Oryon comes...
Hash Generator :: Tools
Hash Generator is the FREE universal hash generator tool which automates the generation of 14 different type of hashes or checksums. ...
TCPXtract (Network Traffic Extracting) :: Tools
tcpxtract is a tool for extracting files from network traffic based on file signatures. Extracting files based on file type headers and...
Revealer Toolkit (Forensics) :: Framework
Revealer Toolkit is a framework and simple scripts for computer forensics . It uses Brian Carrier's The Sleuth Kit as the backbo...
BTCrack (Bluetooth PIN Bruteforce) :: Tools
BTCrack is the worlds first Bluetooth Pass phrase (PIN) bruteforce tool , BTCrack will bruteforce the Passkey and the Link key from...
RegistryDecoder (Windows Registry Forensics) :: Tools
RegistryDecoder is a automated Acquisition, Analysis, and Reporting of Registry Contents . Registry Decoder provides a single tool in w...
USB Write Blocker :: Tools
USB Write blocker is an application that will use the windows registry to write block USB devices . It is a useful tool for those who...
Hook Analyzer (Malware Analysis and Cyber Intelligence) :: Tools
Hook Analyser is a malware analysis and cyber intelligence (gathering and analysis) utility. As well as Hook Analyzer performs spawn ...
GDB GNU Debugger :: Tools
GDB, the GNU Project debugger , allows you to see what is going on `inside' another program while it executes -- or what another pr...
Download Evad3rs iOS 7 Jailbreak :: Tools
Evasi0n Jailbreaking tools available for Apple iOS 7 users. This jailbreak utility/tool made by Evad3rs team after 3 months of iOS 7...