Creepy (A Geolocation OSINT Tool) :: Tools
Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking ...
Creepy (A Geolocation OSINT Tool) :: Tools
Creepy is an open-source Geolocation intelligence tool. It collects information about Geolocation by using various social networking ...
SubBrute (Subdomain Bruteforcer) :: Tools
SubBrute is a community driven project with the goal of creating the fastest, and most accurate subdomain enumeration tool. Some of th...
The OWASP Amass Project has developed a tool to help information security professionals perform network mapping of attack surfaces and p...
Raptor (Web Application Firewall) :: Tools
Raptor is an Open Source Tool, your focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’...
Echo Mirage 3.1 :: Tools
Echo Mirage is a generic network proxy. It uses DLL injection and function hooking techniques to redirect network related function call...
Mobile Security Framework (MobSF) : Framework
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing fram...
The File Checksum Integrity Verifier (FCIV) is a command-prompt utility that computes and verifies cryptographic hash values of files. FCI...
SpiderFoot (Open Source Footprinting) :: Tools
SpiderFoot is a free, open-source footprinting tool , enabling you to perform various scans against a given domain name in order to obta...
Suricata (IDS/IPS Engine) :: Tools
The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just re...
XSSYA v2.0 (Cross Site Scripting Vulnerability Confirmation) :: Tools
XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation) written in python scripting language confirm the XSS Vulnerabili...
Juli (MITM) :: Tools
A simple automated perl script for MiTM ( man-in-the-middle ) attacks. Requirements: Linux ( I tested it on Ubuntu 14.04 LTS ) Per...
Orbot (Tor for Android Devices) :: Tools
Orbot is a free proxy app that empowers other apps to use the internet more securely . Orbot uses Tor to encrypt your Internet traff...
Mandiant Redline (Memory and File Analysis) :: Tools
Redline, Mandiant’s premier free tool, provides host investigative capabilities to users to find signs of malicious activity throug...
Microsoft's Network Monitor (Capturing and Protocol Analysis of Network Traffic) :: Tools
Microsoft's Network Monitor is a tools that allow capturing and protocol analysis of network traffic . Network Monitor 3 is a proto...
WAIDPS (Wireless Auditing and IDS/IPS) :: Tools
WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and wo...
Detekt :: Malware Detection Tool against Government Surveillance
Detekt is a free tool that scans your Windows computer for traces of known surveillance spyware used to target and monitor human righ...
NoGoToFail :: Network Traffic Security Testing Tool
Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connect...
The Sleuth Kit (TSK - Forensics) :: Framework
The Sleuth Kit is a C++ library and collection of open source file system forensics tools that allow you to, among other things, vie...
DriveCrypt (Disk Encryption) :: Tools
DRIVECRYPT securely and easily protects all proprietary data on notebooks and desktop computers 100% of the time without users having...
NIELD (Network Forensics) :: Tools
NIELD (Network Interface Events Logging Daemon) is a tool that receives notifications from the kernel through the netlink socket, and...