Social Recon - Investigate The Online Presence And Footprint Of Someone Social Recon - Investigate The Online Presence And Footprint Of Someone Reviewed by Zion3R on 5:35 PM Rating: 5
SocialFish - Ultimate phishing tool with Ngrok integrated SocialFish - Ultimate phishing tool with Ngrok integrated Reviewed by Zion3R on 9:39 AM Rating: 5
lanGhost - A LAN dropbox chatbot controllable via Telegram lanGhost - A LAN dropbox chatbot controllable via Telegram Reviewed by Zion3R on 5:01 PM Rating: 5
Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Lynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems Reviewed by Zion3R on 10:15 AM Rating: 5
Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Nmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities Reviewed by Zion3R on 6:30 PM Rating: 5
Injectify - Perform Advanced MiTM Attacks On Websites With Ease Injectify - Perform Advanced MiTM Attacks On Websites With Ease Reviewed by Zion3R on 9:57 AM Rating: 5
DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker DEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker Reviewed by Zion3R on 6:30 PM Rating: 5
Infoga - Email Information Gathering Infoga - Email Information Gathering Reviewed by Zion3R on 10:21 AM Rating: 5
Twebit - Bitcoin Analysis in Twitter With Machine Learning Twebit - Bitcoin Analysis in Twitter With Machine Learning Reviewed by Zion3R on 6:00 PM Rating: 5
SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages SQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All Languages Reviewed by Zion3R on 10:22 AM Rating: 5
Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Web Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI (Perl) / ASP / ASPX Shells Reviewed by Zion3R on 6:07 PM Rating: 5
Wavecrack - Web Interface For Password Cracking With Hashcat Wavecrack - Web Interface For Password Cracking With Hashcat Reviewed by Zion3R on 9:47 AM Rating: 5
Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Al-Khaser v0.72 - Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection) Reviewed by Zion3R on 6:13 PM Rating: 5
Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible Reviewed by Zion3R on 10:15 AM Rating: 5
Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Pupy -  Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool Reviewed by Zion3R on 6:01 PM Rating: 5
rbndr - Simple DNS Rebinding Service rbndr - Simple DNS Rebinding Service Reviewed by Zion3R on 9:50 AM Rating: 5
Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization) Reviewed by Zion3R on 5:30 PM Rating: 5
Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search Through Databases And Extract Sensitive Information Reviewed by Zion3R on 10:09 AM Rating: 5
FakeImageExploiter - Use a Fake image.jpg (hide known file extensions) to exploit targets FakeImageExploiter - Use a Fake image.jpg (hide known file extensions) to exploit targets Reviewed by Zion3R on 5:35 PM Rating: 5
SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and password cracking script Reviewed by Zion3R on 10:05 AM Rating: 5
Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs Ketshash - A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs Reviewed by Zion3R on 6:11 PM Rating: 5
SwishDbgExt - Incident Response & Digital Forensics Debugging Extension SwishDbgExt - Incident Response & Digital Forensics Debugging Extension Reviewed by Zion3R on 10:10 AM Rating: 5
macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments Reviewed by Zion3R on 6:18 PM Rating: 5
Autorize - Automatic Authorization Enforcement Detection Extension For Burp Suite Autorize - Automatic Authorization Enforcement Detection Extension For Burp Suite Reviewed by Zion3R on 10:23 AM Rating: 5
OnionHarvester - A small TOR Onion Address harvester for checking if the address is available or not OnionHarvester - A small TOR Onion Address harvester for checking if the address is available or not Reviewed by Zion3R on 10:12 AM Rating: 5
Vegile - Tool for Post exploitation Techniques in Linux Vegile - Tool for Post exploitation Techniques in Linux Reviewed by Zion3R on 6:25 PM Rating: 5
EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack Reviewed by Zion3R on 10:04 AM Rating: 5
gOSINT - Open Source Intelligence Framework gOSINT - Open Source Intelligence Framework Reviewed by Zion3R on 5:16 PM Rating: 5
One-Lin3r - Gives you one-liners that aids in penetration testing operations One-Lin3r - Gives you one-liners that aids in penetration testing operations Reviewed by Zion3R on 9:55 AM Rating: 5
GTScan - The Nmap Scanner for Telco GTScan - The Nmap Scanner for Telco Reviewed by Zion3R on 6:30 PM Rating: 5
Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks Reviewed by Zion3R on 10:00 AM Rating: 5
Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems Reviewed by Zion3R on 6:02 PM Rating: 5
OWASP-Nettacker - Automated Penetration Testing Framework OWASP-Nettacker - Automated Penetration Testing Framework Reviewed by Zion3R on 9:44 AM Rating: 5
RFCrack - A Software Defined Radio Attack Tool RFCrack - A Software Defined Radio Attack Tool Reviewed by Zion3R on 5:30 PM Rating: 5
DNSExfiltrator - Data exfiltration over DNS request covert channel DNSExfiltrator - Data exfiltration over DNS request covert channel Reviewed by Zion3R on 9:41 AM Rating: 5
sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR) Reviewed by Zion3R on 5:38 PM Rating: 5
cSploit Android - The most complete and advanced IT security professional toolkit on Android cSploit Android - The most complete and advanced IT security professional toolkit on Android Reviewed by Zion3R on 10:34 AM Rating: 5
ACE - Automated, Collection, and Enrichment Platform ACE - Automated, Collection, and Enrichment Platform Reviewed by Zion3R on 5:30 PM Rating: 5
Salamandra - Spy Microphone Detection Tool Salamandra - Spy Microphone Detection Tool Reviewed by Zion3R on 10:01 AM Rating: 5
Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities Reviewed by Zion3R on 5:30 PM Rating: 5
Recon-ng - Full-Featured Web Reconnaissance Framework Recon-ng - Full-Featured Web Reconnaissance Framework Reviewed by Zion3R on 10:07 AM Rating: 5
truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History Reviewed by Zion3R on 5:12 PM Rating: 5
SNMPwn - An SNMPv3 User Enumerator and Attack tool SNMPwn - An SNMPv3 User Enumerator and Attack tool Reviewed by Zion3R on 10:11 AM Rating: 5
Anubis - Subdomain Enumeration And Information Gathering Tool Anubis - Subdomain Enumeration And Information Gathering Tool Reviewed by Zion3R on 6:03 PM Rating: 5
CoffeeMiner - Collaborative (MITM) Cryptocurrency Mining Pool In Wifi Networks CoffeeMiner - Collaborative (MITM) Cryptocurrency Mining Pool In Wifi Networks Reviewed by Zion3R on 10:05 AM Rating: 5
Wapiti 3.0.0 - The Web-Application Vulnerability Scanner Wapiti 3.0.0 - The Web-Application Vulnerability Scanner Reviewed by Zion3R on 5:32 PM Rating: 5
Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux Reviewed by Zion3R on 9:43 AM Rating: 5
Meltdown Exploit PoC Meltdown Exploit PoC Reviewed by Zion3R on 10:16 PM Rating: 5
In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors In-Spectre-Meltdown - Tool to identify Meltdown & Spectre Vulnerabilities in processors Reviewed by Zion3R on 5:04 PM Rating: 5
fuxploider - File Upload Vulnerability Scanner And Exploitation Tool fuxploider - File Upload Vulnerability Scanner And Exploitation Tool Reviewed by Zion3R on 10:13 AM Rating: 5
shimit - A tool that implements the Golden SAML attack shimit - A tool that implements the Golden SAML attack Reviewed by Zion3R on 5:45 PM Rating: 5
RetDec - A Retargetable Machine-Code Decompiler RetDec - A Retargetable Machine-Code Decompiler Reviewed by Zion3R on 10:18 AM Rating: 5